Task In your role as a Solutions Architect at M2M Solutions, you are leading a team of several system administrators. M2M solutions is a medium sized organisation and is currently expanding its...

1 answer below »
Task

In your role as a Solutions Architect at M2M Solutions, you are leading a team of several system administrators. M2M solutions is a medium sized organisation and is currently expanding its operations.


The company has acquired six sites across Sydney to accommodate its various departments.You have been asked to design a network by utilizing 10.0.0.0 private IP address. The network should span six buildings with a router in each building to join the networks. It is assumed that each building will have its own single subnet .Company expects approximately 1200 workstation across all the sites with approximate numbers in each building as follows:



  • Finance Office - 260 workstations

  • Transport Office - 130 workstations

  • Research Office - 120 workstations

  • Sales Office - 40 workstations

  • Information technology - 520 workstations

  • Head Office - 60 workstations



TASK 1 -Write a 1000 words (+/- 10%) report explaining:


a.The detailed design of a simple addressing solution (with diagram(s) and step by step workout of the calculations) that leaves room for growth, is easy to administer and has the minimum wastage of available IP address space.


b.Explain what happens to your design if the number of hosts per network jumps to over 1,024 per building.



TASK 2
- Currently the company policy does not allow the use of network analysers on the organisational network. You have recently had a team meeting where all the staff are of the view that the use of network analysers can bring more efficiency in troubleshooting processes.


Write an 800 words (+/- 10%) report for the board of directors proposing to allow the use of network analysers for diagnostic purposes in new proposed network architecture. Your report should include:


a. Brief explanation of protocol in the context of communication networks and the role of network analysers. Explanation should include example of a situation where network analysers can be used in the context of Task 1.
b. An analysis of currently available network analyser tools. The analysis should contain:


i. Benefits, associated costs, ease of usability
ii. Recommendation from you, as to what tool would you prefer to use and why.



(The reports should be targeted towards your audience i.e. the board of directors who may not be technologically savvy. Therefore the report should be easy to read and contain step by step overview of the design that includes calculations and assumptions.
Additionally, the report contencts should be logically, systematically and succinctly structured to create a cohesive and coherent analytical piece of work, using formal academic language and should adhere to grammatical conventions.)

Answered Same DayDec 27, 2021

Answer To: Task In your role as a Solutions Architect at M2M Solutions, you are leading a team of several...

Robert answered on Dec 27 2021
130 Votes
PROTOCOL
Protocol can be regarded as an access method which is used for exchanging data over a network. A
network protocol consists of
some rules which is always followed by the network devices in order
to communicate with each other. It also looks into the packaging of data before it is sent or
received. In order to provide more security, protocols also provide acknowledgement and data
compression for more reliable data transfer.
There are different types of protocols used in the communication. Some of them are described
below:
1. TCP/IP – TCP(Transmission Control Protocol) is responsible for the creation of packets, putting
them in correct order and during the transmission it ensure that no packets get lost. The reason
behind using packets is because those packets can be sent via different routes and reassembled
again at the destination. If a packet is lost, TCP will resend the packet again. IP(Internet Protocol)
on the other hand is responsible for the routing of the messages to proper address. Every packet
contains an IP address of the destination. IP is not responsible for making physical connections
between the computers. This function is managed by TCP.
2. UDP – UDP(User Datagram Protocol) is used with IP when small amounts of information is
involved. The main drawbacks of UDP is that it lacks flow-control and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here