Network Protocols - Computer Science Essay Example

Published: 2018-01-24
Network Protocols - Computer Science Essay Example
Type of paper:  Essay
Categories:  Computer science Information technologies Technology
Pages: 5
Wordcount: 1263 words
11 min read
143 views

12.2. Internal Routing Protocols

Internally, IPv6 will be configured to assign IP addresses. Other necessary protocols to be adopted include the Open Shortest Path First Version (OSPFv3) with an Intermediate System to Intermediate System (IS-IS) followed by two common contracts (Dong, 2007, p. 353). The OSPFv3 and ISIS will differ from RIPng where there is an extent from MP-BGP. In particular, a distance vector routing protocol will be adopted. The distance-vector routing protocols shares routing tables with neighbors. The distance vector information will be propagated through the network and eventually have routed through the route entries with multiple metrics values towards different IPv6 prefix as well as hop pointers for between the switches and protocols. In addition, the metric values towards each IPv6 are based on the link state of routing given that it helps in creating the appropriate routing protocols for flood information. In addition, a router using a link state protocol advertises changes with the neighbors. A static default route will be configured at the gateway, which will act as the default route on the edge router providing a gateway of the last resort. The configuration provides a perfect solution at the edge router by making the internal network through internal routers. The ultimate solutions include creating a better network by using the default route on the edge router to other internal routers. The routing protocols RIP, and OSPF, which will be provided with a mechanism to accomplish them.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

12.3. Spanning Tree Protocol (STP)

A Virtual Local Area Network broadcast domain through a remote computer network attached to the Layer 2. A switch will be used to partition the VLANs ports. An interconnected Trunk will be adopted to transport multiple VLANs interfaces where the link aggregation, quality of services and routing will be utilized. The VLANs will be leveraged in the WLAN design. Given IPv6 addressing scheme will be used, the VLAN will provide sufficient information on how to manage the access privileges. The security access privileges will be associated with the nature of how the VLAN is made.

13. IPv6 Subnets

On the two floors, there is 3 switches, 2 servers, 2 routers, one at the reserve and a number of connection and 60 client computers, and a possibility of a wireless hotspot. The IPv6 provides an appropriate subnetting scheme that will help in keeping the control center appropriately subnetted. The subnetted 2001:0DB8:0002:/48 will be used to specify the right subnetted under each category.

Required Subnets = 16

Bits registered = x, as of (2^x) >=3 , x = 2). From the following, four subnets will be created. However, the total volume is 50*(48+2)

The hexits are presented through 2 bits that are assigned to =1

Defining hexit is based on the hex values 0,4,8, 12, 16, 20, etc.

From the table, the defining hexit increments by 4 with discrete hex values 0002,

Thus, our 16 subnets are:

2001:0DB8:0002: 0000:/50

2001:0DB8:0002: 0004:/50

2001:0DB8:0002: 0008:/50

2001:0DB8:0002: 0012:/50

2001:0DB8:0002: 0016:/50

2001:0DB8:0002: 0020:/50

2001:0DB8:0002: 0024:/50

2001:0DB8:0002: 0028:/50

2001:0DB8:0002: 0032/50

2001:0DB8:0002: 0036:/50

2001:0DB8:0002: 0040:/50

2001:0DB8:0002: 0044:/50

2001:0DB8:0002: 0048:/50

2001:0DB8:0002: 0052:/50

2001:0DB8:0002: 0056:/50

2001:0DB8:0002: 0060:/50

2001:0DB8:0002: 0064:/50

13.1 Assigning IPv6 subnets and addresses to VLANS

To allocate IP addresses to the different blocks, the system uses Regional Internet Registries (RIRs). Each RIR allocates IP address based on the different situation facing the RIR. Illustratively, the RIR forms part of the Numbers Resource Organization that is represented through collective interests while ensuring that policy statements are coordinated. The IANA delegations are allocated through IPv6 established. Given the possibility of the infinity of IP addresses, the multicast allocations will provide a resource for the IPv6 addressing where it is possible to constitute 1/256 of the available address space. The maximum number of the multicast address is constrained by the requirement that is under Group ID and is contained in the last rightmost 112 bits of addressing. The approach leaves sufficient room for over four billion possible multicasts.

14. Network Testing

Testing the network is an important stage because this helps to establish the design process while allowing through confirming through the network design while meeting business and technical goals. In testing the design, one needs to verify the solution by developing and providing the performance of QoS through the customer expects. The actual design and testing project are specialized through integrated circuits. The testing includes test scripts, test logs, test objectives, and verifiable. The design and testing project through the Umqua system through the demonstrated the value of using a systematic approach that includes measuring and modeling current and future performance characteristics with appropriate techniques and tools. The design requires manipulation of the QoS requirements and other goals, scalability, security, availability, affordability, and manageability. The network design testing involves selecting and test optimization techniques that involve creating requirements.

15. User Education

Engage in the right security training – It will be important to train users against hackers by showing them the possible hacking possibilities, teaching them to respond to hoax email, spamming, phishing, intrusion, malware codes, viruses and antivirus system, firewall upgrade, password security, system design, and physical protection.

Determining the possible network security, which involves creating an abstract concept where the company builds on a range of technology efforts. Besides, it is advisable to encourage employees to understand the network information, which includes details as well as the security policies and the corporate network facing locked down.

Trainers will also be taught on what to do. That is, showing users how to respond to situations, for instances, responding to situations for example security incidences. Other important aspects include training employees how to detect possible intrusion and respond to them. The training will also be made accessible to all users while ensuring that it is possible to answer to the security incidences facing the security problem. It is important to create an IT support framework while training users on the ability to manage other new users. It is also important to educate users how to make security easy by training them on how to change of password as well as train employees how to use the network creatively without the possible interference with the system. Others include teaching employees to respond to the security breach.

16. Conclusion

Clearly, building the network Layer 1, 2 and 3 for the two floors require proper planning and careful evaluation of the design systems. From the outline provided, it is clear that the adopted design requires proper evaluation while ensuring that there is a perfect development of the system. The research has explored the progress of networking infrastructure while addressing the design consideration that relate to the network development process. As noted, the telecommunication closets in relation to the components that include, client PCs, cabling, switches and routers, while others include solutions, power protection and creating of the right desktop environment. The workstations and other network peripherals include switching, cabling and routing process that are involved in the three of the OSI model as mentioned. It is clear that the approach of the network was between top to down design that requires implementing procedures and policies that are important for the organization. The new style and new set of rules involves the development of the right leadership to the network build up process.

Reference lists

FitzGerald, J., & Dennis, A. (2009). Business data communications and networking. Hoboken, NJ: John Wiley.

Habraken, J. W. (2006). Home wireless networking. Indianapolis: Sams.

Dong, J., (2007). Network dictionary. (2007). Saratoga CA: Javvin Technologies, Inc.

Rybaczyk, P. (2005). Expert Network Time Protocol: An experience in time with NTP. Berkeley: Apress.

Oppenheimer, P. (2005). Top-Down Network Design, Second Edition. Cisco Press.

Egeler, K., & International Business Machines Corporation. (2007). Using z/VM for test and development environments: A roundup. United States?: IBM.

Teare, D. (2010). CCNP routing and switching foundation learning library (1st ed.). Indianapolis, Ind.: Cisco.

Donoso, Y. (2009). Network design for IP convergence (1st ed.). Boca Raton: CRC Press.

Cite this page

Network Protocols - Computer Science Essay Example. (2018, Jan 24). Retrieved from https://speedypaper.com/essays/network-protocols

Request Removal

If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism