Combo Offer 35% Off + 10% Extra OFF on WhatsApp

Data Communications and Networks Assignment Sample

Data Communications and Networks

  • Plagiarism & Error Free Assignments By Subject Experts
  • Affordable prices and discounts for students
  • On-time delivery before the expected deadline

No AI Generated Content

72000+ Projects Delivered

500+ Experts

Enjoy Upto 35% off
- +
1 Page
35% Off
AU$ 11.83
Estimated Cost
AU$ 7.69
Securing Higher Grades Costing Your Pocket? Book Your Assignment At The Lowest Price Now!
X

Introduction - Data Communications and Networks

Get Free Samples Written by our Top-Notch Subject Experts For Taking Online Assignment Help

This study describes the different types of network configuration as well as data communication in the new private company based on software development. Company design is one headquarter and also two branches on the location in Brisbane, Australia. The headquarters network is a very secure network (307 + 701 = 1008). This network includes different types of devices and controls like computers, three servers, (7 + 1 = 8) printers, one router, and two switches. Network devices connected subsequently for two branches (7 + 70= 77) 0 and 51 that devices included to the one router and two servers and every branch have 8 switches. Another term for it is poor sub netting. In contrast to the system and broadcast, it was possible to prove that the sub must handle at least seven devices. As a result, these computations were carried out, and they employed the same subnet mask as well as an extra calculating based on the network address. When using a discussion thread, the original XY components indicated inside the assignment are kept, and modifications to the authorized Subnet Address of the IPv6 configuration are allowed. It is also intended that this section will feature one printer and one server.

Address allocation plan for each subnet

2.1 IP addressing plan for IPV4

This part is defined as the allocation plane for IPv4 and IPv6. Apart from that, the mention is VLSM. This approach should be defined to the different subnet for IP addresses and that will be divided. When using a comment section, the original XY components indicated inside the assignment are kept, and modifications to the authorized Subnet Identity of the IPv6 config are permitted. It was also feasible to define that, in parallel to the network and broadcasting, the subnet must handle at least seven devices. It is also intended that this section will feature one printer and one server (Valdes-Garcia et al. 2019). This equipment included one network as well as two server farms, as well as light switches in each branch. This suggests that changes are only made after 64 bits since if changes are made inside 64 bits, the connection's identification would no longer become unique to only that relationship. As a consequence, these computations were carried out using the same subnet mask as well as an additional computation utilizing another subnet mask.

2.1.1 IPv4 allocation plan for Head Quarter

As previously stated, this company's IPv4 network address is 117.07.71.0. In addition, basic subnet criteria would be that the IP support network with at least 1008 connections. This parameter is necessary to establish the number of times bits would be stolen from the gateway ID to suit actual business needs (Kwark et al. 2019). It's also referred to as Low class subnetting, but it consists of breaking each subnet across smaller subnets. This network includes different types of devices and controls like computers, three servers, (7 + 1 = 8) printers, one router, and two switches. Network devices connected subsequently for two branches (7 + 70= 77) 0 and 51 that devices included to the one router and two servers and every branch have 8 switches.

2.1.2 IPv4 allocation plan for Branches (separate section for each branch)

Branch A now has seven devices, as per the information given. As a result of the identical methods employed inside the calculations again for Head Quarter, this was feasible to conclude also that the subnet must handle at least seven devices, along with the network plus broadcast. Furthermore, it is envisaged that somehow this section will feature one printer as well as one server. This network's smallest amount for this IPv4 became seven gadgets (Parida et al. 2019). However, as previously said, it really is expected that now the branch would grow significantly. As a result, that network could range to 64 addresses, somewhat like. As just a result, their subnet mask would be 26.

Branch B now has 70 devices, as per the information given. As a result of the identical methods employed inside the calculations again for Head Quarter, this was feasible to conclude also that the subnet must handle at least seven devices, along with the network plus broadcast. Furthermore, it is envisaged that somehow this section will feature one printer as well as one server (Martikainen et al. 2018). This network's smallest amount for this IPv4 became seven gadgets. However, as previously said, it really is expected that now the branch would grow significantly. As a result, that network could range to 64 addresses, somewhat like. As just a result, their subnet mask would be 26.

2.1.3 IPv4 allocation plan for router to router (separate section could be for each subnet)

These subnets interconnecting routers contain moment in time connections, and yet this particular organization has three subnets here between routers. Furthermore, several routers’ subnet masks must handle at least 4 gadgets. In addition, most routers don't even have a default gateway ip. As a result, the Ipv4 4 as well as 6 addresses was just as follows:

Location

Sub ID

Sub mask

CIDR

Network Add

IP Add (range)

Broadcast Add

R 1

0 1

117.11 7.117.170

/18

117.07.71 .0

117.07.22 5 -117.07. 71.4

117.07.227 

R 2

0 2

117.117.1 17.170

/18

117.0 7.7 1.2

117.0 7.2 2 9 -1 17.07.71.0

117.07.231

R 3

0 3

117.1.117.170

/18

117.07.71. 1

117.07.23 3 - 11 7.07.71.34

117.0723 5

3.2 IP addressing plan for IPV6

3.2.1IPv6 allocation plan for Head Quarter

As previously stated, this company's IPv6 network address is 1045:BD8:5701: /48 in addition, basic subnet criteria would be that the IP support network with at least 1008 connections. This parameter is necessary to establish the number of times bits would be stolen from the gateway ID to suit actual business needs (Tagami et al. 2017). It's also referred to as Low class sub netting, but it consists of breaking each subnet across smaller subnets. This network includes different types of devices and controls like computers, three servers, (7 + 1 = 8) printers, one router, and two switches. Network devices connected subsequently for two branches (7 + 70= 77) 0 and 51 that devices included to the one router and two servers and every branch have 8 switches. As a result, changing the subnet bits will typically not be permitted (Zhang et al. 2018). Inside this example, however, each client was given a unique IP network 1045:BD8:5701::/48. This implies that modifications are only done after 64 bits since if modifications are introduced within the 64 bits, its identity will no longer be unique to just that connection. As a result, these calculations have been performed using the same subnet mask and also an extra computation using the subnet mask utilizing 56. While using the comment thread, initial XY elements specified within the assignment will be preserved, and modifications to the authorized Subnet Identity of something like the IPv6 configuration will be permitted (Fuchs et al. 2019). Nonetheless, there really is not much in Ipv6. That equipment consisted of one router and two servers, with eight switches in each branch. As a result, altering the subnet bits is usually prohibited. However, in this case, each client was assigned a unique IP network 1045:BD8:5701:: /48. This suggests that changes are only made after 64 bits since if changes are made inside 64 bits, the connection's identity will no longer be unique to only that connection. As a consequence, these computations were conducted using the same subnet mask as well as an additional computation using the subnet mask 56 (Huang et al. 2017). When utilizing a comment thread, the original XY components stated inside the assignment are retained, and changes to the allowed Subnet Identity of something like the IPv6 configuration are permitted. Nonetheless, there isn't much to IPv6. 

3.2.2 IPv6 allocation plan for Branches (separate section for each branch)

Branch A

Location

Sub ID

CIDR

Network add

Default gateway add

Key IP add

IP add (range)

B A

0 2

/48

1 0 4 5: B D 8:5 7 0 1::/48

1 0 4 5:B D 8:5 7 0 1: 3 F F F1::/48

10 4 5:B D 8:5 7 0 1::/48 to 1 0 4 5:B D 8 :5 7 0 1: 3 F F F 1::/48

1 0 4 5:B D 8 : 5 7 0 1: 3 F F F 1 ::/48 to 1 0 4 5 : B D 8:5 7 0 1 :: /48

B A

0 2

/60

1 0 4 5:B D 8:5 7 0 1::/60

1 0 4 5:B D 8:5 7 0 1:73F::/60

1 0 4 5:B D 8:5 7 0 1::/60 to 1 0 4 5:B D 8:5701:73 F::/60

1045:BD8:5 7 0 1:73F::/60 to 1 0 4 5:BD8:5701::/60

3.2.3 IPv6 allocation plan for router to router (separate section could be for eacg subnet)

Location

Sub ID

CIDR

Network Add

Last IP

R 1

0 1

/48

/60

1 0 4 5 : B D 8 : 5 7 0 1 ::/48

1 0 4 5 : B D 8 : 5 7 0 1 ::/60

1 0 4 5 : B D 8 : 5 7 0 1 ::/48

1 0 4 5 : B D 8 : 5 7 0 1 ::/60

R 2

0 2

/48

/60

1 0 4 5:B D 8:5 7 0 1: A 0 0 0::/48

1 0 4 5:B D 8: 5 7 0 1: 5 7 A 0::/60

1 0 4 5 : B D 8 : 5 7 0 1 : A 0 0 0 ::/48

1 0 4 5 : B D 8 : 5 7 0 1 : 5 7 A 0 ::/60

R 3

0 3

/48

/60

1 0 4 5:B D 8:5 7 0 1: 6 0 0 0

::/48

1 0 4 5:B D 8:5 7 0 1:8 0 0 0 ::/60

1 0 4 5: B D 8 : 5 7 0 1: 6 0 0 0

::/48

1 0 4 5 :B D 8 : 5 7 0 1 : 8 0 0 0 ::/60

  1. 4. Complete Diagram (logical) including IP address, subnetting

image of Network diagram and IP allocation

Figure 1: Network diagram and IP allocation

(Source: Self-created in draw.io)

Conclusions

This research discusses the many forms of network design as well as data transfer in a new software development-based private organization. The company is designed with one headquarters and two branches in Brisbane, Australia. Their Central office network is extremely secure. This network has several sorts of devices and controllers. This parameter is required to determine the number of times bits first from gateway ID might be stolen to meet actual business requirements. Impoverished sub netting is another name for it. It was also possible to establish that the subnet must manage at least seven devices, in addition to the network and broadcast. Furthermore, it is planned that this portion will have one printer and one server. This research successfully was done.

List of References

Journal

Bi, Y., Han, G., Lin, C., Guizani, M. and Wang, X., 2019. Mobility management for intro/inter domain handover in software-defined networks. IEEE Journal on Selected Areas in Communications37(8), pp.1739-1754.

Burleigh, S.C., De Cola, T., Morosi, S., Jayousi, S., Cianca, E. and Fuchs, C., 2019. From Connectivity to advanced internet services: a comprehensive review of small satellites communications and networks. Wireless Communications and Mobile Computing2019.

Ge, X., Pan, L., Li, Q., Mao, G. and Tu, S., 2017. Multipath cooperative communications networks for augmented and virtual reality transmission. IEEE Transactions on Multimedia19(10), pp.2345-2358.

Gong, S., Xu, J., Niyato, D., Huang, X. and Han, Z., 2019. Backscatter-aided cooperative relay communications in wireless-powered hybrid radio networks. IEEE Network33(5), pp.234-241.

Gu, X., Liu, D., Baks, C., Tageman, O., Sadhu, B., Hallin, J., Rexberg, L., Parida, P., Kwark, Y. and Valdes-Garcia, A., 2019. Development, implementation, and characterization of a 64-element dual-polarized phased-array antenna module for 28-GHz high-speed data communications. IEEE Transactions on Microwave Theory and Techniques67(7), pp.2975-2984.

Jameel, F., Wyne, S., Nawaz, S.J. and Chang, Z., 2018. Propagation channels for mmWave vehicular communications: State-of-the-art and future research directions. IEEE Wireless Communications26(1), pp.144-150.

Mumtaz, S., Jornet, J.M., Aulin, J., Gerstacker, W.H., Dong, X. and Ai, B., 2017. Terahertz communication for vehicular networks. IEEE Transactions on Vehicular Technology66(7).

Nguyen, D., Shen, Z., Jin, J. and Tagami, A., 2017, December. ICN-Fog: An information-centric fog-to-fog architecture for data communications. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-6). IEEE.

Ojanperä, T., Mäkelä, J., Mämmelä, O., Majanen, M. and Martikainen, O., 2018, June. Use cases and communications architecture for 5G-enabled road safety services. In 2018 European Conference on Networks and Communications (EuCNC) (pp. 335-340). IEEE.

Xu, Z., Shi, P., Su, H., Wu, Z.G. and Huang, T., 2017. Global $ H_\infty $ Pinning Synchronization of Complex Networks With Sampled-Data Communications. IEEE transactions on neural networks and learning systems29(5), pp.1467-1476.

Zhang, D., Xu, Z., Karimi, H.R., Wang, Q.G. and Yu, L., 2017. Distributed $ H_\infty $ Output-Feedback Control for Consensus of Heterogeneous Linear Multiagent Systems With Aperiodic Sampled-Data Communications. IEEE Transactions on Industrial Electronics65(5), pp.4145-4155.

Zhang, K., Leng, S., Peng, X., Pan, L., Maharjan, S. and Zhang, Y., 2018. Artificial intelligence inspired transmission scheduling in cognitive vehicular communications and networks. IEEE internet of Things Journal6(2), pp.1987-1997.

Recently Download Samples by Customers
Get best price for your work

offer valid for limited time only*

© Copyright 2024 | New Assignment Help | All rights reserved