Assignment Network FUPL

Embed Size (px)

Citation preview

  • 8/8/2019 Assignment Network FUPL

    1/20

    Table of Contents

    Table of Contents........................................................................................1

    QUESTION 1.................................................................................................2

    Question 2.................................................................................................11

    Reference..................................................................................................20

    Page 1 of 20

  • 8/8/2019 Assignment Network FUPL

    2/20

    QUESTION 1

    Nowadays, Internet has become one of necessity for many

    people. Internet is used for various activities like online

    banking, information sharing, teleworking, entertainment,

    and other services. To enable Internet access, a network

    connectivity is required. You were assigned to develop a

    networking solution for a new condominium project. The

    building has 20 floors with 10 houses per floor. Answer

    following questions to prepare your solution.

    Part (A) Discuss three (3) current networking

    technologies in the market. Which networking

    technology is popular and why?

    Ethernet

    Ethernet is the most widely installed local area network (LAN) nowadays.

    It was developed by Xerox Corporation in coorperation with DEC and Intel

    in 1976.

    The first commercial Ethernet was run on a shared thick coax cable to

    which each station was attached. Thick coax provides a wide bandwidth

    and good resistance to electromagnetic interference (EMI). It was denoted

    as 10BASE5, signified a 10-Mbps data rate. But thick coax, which has a

    diameter similar to a garden hose, is heavy and has a large minimum

    bend radius. Thick coax is difficult to work with and its layout designs are

    rather inflexible.

    Originally, the Ethernet protocol known as Carrier Sense Multiple Access

    with Collision Detection (CSMA/CD) governed the way the computer

    shared the channel. It can handle multiple accesses. When a station

    wanting to use the medium, it must first listen for activity on the bus; ifthe bus is being used, the station will hear the transmission (sense the

    carrier) and have to wait; if the bus is idle, the station can transmit

    immediately. After it transmit a frame, it must stop and repeat the

    CSMA/CD procedure to prevent it from monopolizing the LAN by

    transmitting continuously, which would block access by other stations.

    In 1985, a thin coax version of Ethernet, called thinnets was released.

    With a diameter about a pencil, thin coax maintains the EMI resistance of

    thick coax but offers many advantages over its thicker counterpart. The

    principal benefits are easier installation, cost reduction and elimination ofa separate piece of equipment. The tradeoff was reduction in the

    Page 2 of 20

  • 8/8/2019 Assignment Network FUPL

    3/20

    maximum segment span. Designated 10Base2, segments cannot exceed

    185 meters. No more that 30 notes are allowed per segment.

    The next substantial improvement was moving from a physical bus to a

    physical star. A central hub distributes signals from one station to all of

    the others. Cabling changed to the thinner, lighter, and more flexibleunshielded twisted pair (UTP), and the designation changed to 10Base-T.

    Several advantages accrued, which are reliability improved, Management

    improved and maintenance improved. A more dramatic improvement

    came from replacing the hub with a switch.

    Token Ring

    Token ring was created and patented by Olof S. Soderblom in the late

    1960. In the 1970s, it was positioned as a LAN that did not suffer from

    throughput degradation due to collisions and that had predictable and

    acceptable performance under all loading conditions, accomplishments

    that the Ethernet of that era could not match.

    The most common configuration of token ring is a physical star/logical ring

    formed by connecting each station to a multistation access unit (MAU) at

    the star center. Cabling usually is category 4 twisted-pair wires, although

    fiber also is possible.

    Logical topology requires operation as a point-to-point link between each

    node and its two immediate neighbours. This logical linkage forms a ring

    that can be implemented as a physical ring, bus, or star.

    A small packet called a token controls medium access. Operationally, the

    token circulates around the ring, visiting each station in turn. When a

    station receives a token, if it does not have a frame to transmit, it

    regenerates the token and sends it on; otherwise, it creates a data frame

    and sends that out.

    As a data frame circulates around the ring, it is read by each station in

    turn and, if destined for another station, it is regenerated and sent out. At

    the destination station, the frame is marked as read and sent back out

    again. It eventually gets back to the original sender who now notes that

    the message was received by the destination station. The sender canthen removed the message and free that token for use by others.

    Initially token ring operate at a speed of 4Mpbs. Although this seems slow

    compared to the original 10 Mbps Ethernet, but token ring was actually

    faster in operation under heavy loads. This is because there are no

    collisions, and every station gets a turn at a token.

    In 1989, the data transfer rates for token ring was boosted to 16 Mbps and

    the possibility of two token circulating at the same time. Nevertheless, it

    was overtaken by Ethernet, whose steady improvements, low cost,

    simplicity, ease of installation, and widespread cadre of knowledgeable

    practitioners led to token ring declined in popularity.

    Page 3 of 20

  • 8/8/2019 Assignment Network FUPL

    4/20

    In 1997, a group of manufacturers tend to regain the market share. The

    High Speed Token Ring Alliance was formed to push IEEE for higher speed

    standards. One result was 100 Mbps token ring, released in 1998. But it

    was too late. It didnt have much of an impact in the typical business

    environment, because by then Ethernet had eliminated the collision issue

    and was operating at higher speeds. Later, a 1-Gbps token ring was

    published but it didnt find many takers.

    ATM

    Asynchronous transfer mode (ATM) is a high-speed switching technology

    used to provide services for LANs and WANs alike. It is commonly used to

    supply backbone network capabilities and to provide high-bandwidth

    communication between nodes for transmission of full-motion video with

    voice and computer-aided design applications. ATM was developed as

    part of the broadband ISDN specifications. Originally, ATM speeds were

    set at 155 and 622 Mbps but other speeds such as 25 and 45 Mbps areavailable, and very-high-speed switches allow transmissions faster than

    1Gbps.

    ATM uses high-speed digital switches, fiber optic cables, and full-duplex

    transmission to attain its high throughput. ATM network transmit small,

    fixed-size frames called cells. A cell is 53 bytes long and usually carries 47

    or 48 bytes of data; the remaining 5 or 6 bytes is called the header. The

    header is used to provide flow control, cell type identification, addressing

    and error-checking. In setting up ATM on a LAN, additional equipment,

    such as switches, cabling and channel service unit/data service unit

    (CSU/DSU), must be deployed.

    ATM specifies four protocols, each of which is oriented to a specific class of

    service. These protocols are called adaptation leyers and are designated

    AAL-1, AAL-2, AAL-3/4 and AAL-5. The adaptation layers are designed to

    identify and support various classes of services, such as a constant bit

    rate for video and voice (AAL-1); time-sensitive variable bit rates for

    packetized voice (AAL-2); transmissions where delays can be tolerated,

    but error-checking is important (AAL-3/4); and services similar to AAL-3/4

    but with a reduced need for error checking (AAL-5).

    Conlusion

    Nowadays, the most popular networking technology is Ethernet LAN. This

    is because Ethernet LAB strikes a good balance between speed, cost, and

    ease of installation compared to other network technology.

    Page 4 of 20

  • 8/8/2019 Assignment Network FUPL

    5/20

    Part (B) Describe three (3) criteria for selection of a

    network backbone. Draw the schematic diagram of the

    network backbone that you proposed for this project.

    A network backbone is a part of network infrastructure that connects

    several local area networks. The performance of the LAN will be very

    depending on the implementation of the network backbone. The main

    criteria for selection of a network backbone are topology, protocol and

    media.

    Network topology

    Star Network Ring Network Bus Network

    Network topology is the network architecture used to interconnect the

    networking equipment. A network can be arranged or configured in

    several different arrangements. There are three principle network

    topologies, which are namely star, bus and ring.

    The star topology is the most common networking in todays LANs. In star

    network, a number of computer or peripheral devices are connected to a

    center unit which is either a hub or a switch. If a user want to send data

    to the network printer, the hub or switch provide the network connection.

    In bus network, a coaxial cable is looped through each networking device

    to facilitate data transfer. All LAN data traffic is carried over this cable

    link. As the information passed along the bus, it is examined by each

    device to see if the information is intended for it. The bus topology is

    seldom used in modern computer network as it is only suitable to link up afew computers.

    In a ring network, each device is connected to two other devices, forming

    a ring. Messages are passed around the ring as an electrical token until

    they reach the correct destination. If a user wants to transmit, the

    computer waits until it has possession of the token. Ring topology is

    seldom used nowadays due to the difficulties on maintenance and

    troubleshooting.

    Page 5 of 20

  • 8/8/2019 Assignment Network FUPL

    6/20

    Network Protocol

    Network protocol is a set of rules established for user to gain control of the

    network to exchange information. In order for two computers to talk to

    each other, they must be speaking the same language.

    There are many different types of network protocols and standards toensure that a computer can communicate with another computer. For

    example: TCP/IP (for UNIX, Windows and other platforms), IPX (for Novell

    NetWare), AppleTalk (for Macintosh computer), NetBIOS/NetBEUI (for LAN

    manager and Windows NT networks), and etc.

    Network media

    Twisted Pair Cable Coaxial Cable Fiber Optic Cable

    Network media is the communication channel between different computer

    and networking devices. These channels actually carry the data from one

    computer to another. There are two categories of communication

    channels. One category connects sending and receiving devices by

    providing a physical connection such as a wire or cable. The other

    category is wireless.

    Physical media use a solid medium to connect sending and receiving

    devices. These media include twisted pair cable, coaxial cable, and fiber-

    optic cable.

    Currently, the most commonly used medium in network is twisted pair.

    One wire carries signal, and the other is the ground. The wire are

    insulated and twisted around each other in a spiral fashion to reduce

    crosstalk from external radiation. Within a cable bundle, it may contain

    from two pair two thousands of pairs. Twisted pair comes in two basicvarieties unshielded (UTP) and shielded (STP).

    Coaxial cables are concentric. A wire conductor running through the

    centre of the cable (axially) is surrounded (co-axially) by a conducting

    braided metal or foil shield, protected by an outer jacket. Coaxial cable

    offer much greater capacity for carrying signals and is relatively immune

    to external sources of interference. But, coax is more bulky than any

    variety of twisted pair. It is more difficult to install. It has larger minimum

    bend radius, making it harder to snake around obstacles. Coax also more

    costly.

    Page 6 of 20

  • 8/8/2019 Assignment Network FUPL

    7/20

    Fiber optic cable transmits data as pulses of light through tiny tubes of

    glass. It has over 26,000 times the transmission capacity of twisted pair.

    However, it is significantly smaller. A fiber optic tube can be half the

    diameter of a human hair. Such cables are immune to electronic

    interferences, which makes them more secure. Compared to coaxial

    cable, they are lighter and more liable at transmitting data. They transmit

    information using beams of light at light speeds making tem far faster

    than copper cable.

    Wireless connections do not use a solid substance to connect sending and

    receiving devices. They use the air as a medium to transmit data.

    Primary technologies used for wireless connections are Wi-Fi, Bluetooth,

    Infrared, broadcast radio, microwave, and satellite.

    Proposed Network Backbone

    The network backbone proposed for the 20 floors will be using star

    topology because of it greater maintainability and expandability.

    For the network media, we will be a using twisted pair cable as it can

    provide high performance and ease of installation. Wireless medium will

    be using together to provide greater mobility.

    TCP/IP will be used as the network protocol on this proposed network

    because it is widely supported and is included in operating systems such

    as Windows, Mac OS, Unix and Linux. It is suite to use for communications

    between hosts in most local networks and the Internet.

    Below is the network diagram for the proposed network backbone.

    Internet

    Broadband Router

    Proxy Server

    24 Port Switch

    Proposed Network Backbone

    12 Port Switchs at All Floor

    100Mbps

    Ethernet CableTo Each Floor

    Page 7 of 20

  • 8/8/2019 Assignment Network FUPL

    8/20

    Part (C) Identify what are networking equipments that

    will be used to enable access to each tenants at every

    floor. Justify (explain) why you choose the network

    equipments. Show in a diagram, how you connects the

    network equipment to the backbone.

    Internet

    20th Floor

    19th Floor

    18th Floor

    3rd

    Floor

    2nd

    Floor

    1st

    Floor

    Server RoomNetwork Backbone

    Wireless Access Point

    16 Port Switch

    RJ45 Socket

    100Mbps Cat-5 EthernetCable

    Proposed Network Connection for 20 Floor Condominium

    4th FloorTo

    17th Floor

    having thesamelayout

    The above diagram shows the proposed network connection for the 20

    floor condominium. The Cat-5 UTP cable will be pulled from the main

    switch at the server room to the switch at each floor. At each floor the

    UTP cable will be lay from the switch to each lots RJ45 socket and two

    wireless access points.

    All the equipment used will be summarized in the table below.

    Broadband Modem RouterThis router is used to route the local area networkto the internet. This router will be provided bythe internet ISP.

    Proxy ServerThe purpose to install a proxy server is to controlthe bandwidth and traffic of each networkconnection to ensure that the internet bandwidth

    can be fully utilized by all the users. It alsoserves as a firewall to protect the local area

    Page 8 of 20

  • 8/8/2019 Assignment Network FUPL

    9/20

    network.

    Cisco 24 port switchThis switch provides connection to the switch ateach of the twenty floors. We are using a Ciscoswitch because this is the backbone of the

    network. We the best performance device.16 ports switchThis 16 port switch will be located at each floor toprovide the network connection from thebackbone switch to the Wireless AP and RJ45socket at every lot. We used 16 ports switchbecause only 13 ports are needed at each floor.

    The other three served at standby port.

    Wireless Access PointTwo wireless access points will be installed ateach floor so that the whole floor will be coveredby the wireless signal. Wireless APs provide the

    Wi-Fi internet to all the users in the condominium.RJ45 socketA RJ45 socket will be installed at every lot toprovide a more stable internet connection to theusers. The users can expand their home networkby connecting their own LAN or Wireless LAN tothe RJ45 socket to get the internet connection.

    Cat-5 UTP cableCat-5 UTP cable is used as the networkingmedium from the server room to each floor andthen into each condominium lot. UTP cables

    provide high performance with lower cost. It ismore flexible to lay around as it has the minimumbend radius.

    Page 9 of 20

  • 8/8/2019 Assignment Network FUPL

    10/20

    Part (D) List the Internet access services that are

    available in Malaysia, which one that you find the best

    for this project. State the reason (why?)

    In Malaysia, the internet access services can mainly be divided in to two

    types. The main difference of these two types is the transport media.

    They are namely fixed line internet services and wireless internet services.

    The fixed line internet service is provided by TM, the Malaysia dominant

    telecommunication provider. TM provides several types of internet service

    packages to home, business and corporate users. These services are

    namely 1515 dial-up internet, Streamyx Broadband, ISDN, Lease Line,

    Business Broadband and Direct Broadband. The internet access speed

    range from the 1515 dial up of 56Kbps to Direct Broadband of 1Gbps.

    The wireless internet service is provided by the three major mobile

    communication providers in Malaysia which are Celcom, Maxis and Digi.

    The wireless broadband internet services is provided using their GPRS,

    EDGE, 3G and 3GX network with speed up to 3.6Mbps.

    For this condominium project, I will be using the TM Direct Broadband

    155Mbps. TM is the only internet access provider that can provide

    internet service up to 1Gbps. Streamyx and others wireless broadband

    will not be considered as they only provide speed up to 4 Mbps, this

    bandwidth is only enough to a few user.

    For this project, the 155Mbps bandwidth is just enough to accommodate

    the usage of 200 families in the condominium. Actually, If the all the 200

    families is online together using 1M bandwidth 155Mbps wont be enough.

    But due to the cost constraint, we can only subscribe for the 155Mbps line.

    We will be using a proxy server to average up the bandwidth. So, that all

    the users can enjoy an average acceptable speed and the line will not be

    congested by just a few heavy users.

    Page 10 of 20

  • 8/8/2019 Assignment Network FUPL

    11/20

    Question 2

    Networking technology consist of various elements such asnetwork equipments, protocols, concepts, techniques,

    standards, topology, industry player, etc. Answer following

    questions.

    Part (A) Open System Interconnection (OSI) reference

    model was introduced earlier before TCP/IP was

    created. List and describe the function of every layers

    in OSI and TCP/IP. Explain why layering techniques were

    used in designing a network protocol?

    Open system interconnection (OSI) reference mode was developed by the

    International Organisation for Standardization (ISO) in 1984. The model

    describes how information from an application in one computer moves

    through a network medium to an application on another computer.

    The OSI model contains seven layers where each layer representing a

    group of related logical functions. The seven layers as defined by the

    group are summarized in the followings diagram.

    Page 11 of 20

  • 8/8/2019 Assignment Network FUPL

    12/20

    TCP/IP (Transmission Control Protocol/Internet Protocol) is the protocol

    suite used for communications between hosts in most local area networks

    and the Internet.

    The Transmission Control Protocol was first proposed in 1974 in paper. In

    1978, the suite of protocols called TCP/IP was introduced. In 1983, TCP/IP

    replaced the Network Control Protocol (NCP) as the standard networking

    protocol used by Arpanet, considered the predecessor to todays internet.

    Page 12 of 20

  • 8/8/2019 Assignment Network FUPL

    13/20

    TCP/IP model consists of four layers which are application, transport,

    internet and network interface. Each of these layers has their own

    purposes as described in the table below.

    Page 13 of 20

  • 8/8/2019 Assignment Network FUPL

    14/20

    Layering Technique

    Why we need layering in the networking model? Lets think about

    communication over network. There is great complexity entailed in the

    design and operation of a network. Many companies are involved indeveloping and producing hardware and software to run on network.

    Therefore, the main intention of the layering is to provide a framework for

    networking that ensures compatibility in the network hardware and soft

    ware development.

    In the layering model, the various tasks that a network has to perform

    were break down into separate logical procedures, so that the network

    operation was divided into a number of functions. Then, the function was

    grouped and the groups interface was specified.

    In that way, the means for carrying out the tasks of a function group are

    left to the designers, while the connections between particular groups are

    standardized so that they can operate smoothly together. This can also

    help to accelerate the development of new networking technologies.

    Page 14 of 20

  • 8/8/2019 Assignment Network FUPL

    15/20

    Part (B) Explain what is Personal Area Network (PAN),

    give an example of a technology that uses PAN and how

    it operates.

    Personal area network (PAN) is a personal connectivity to accommodate

    data sharing and connectivity needs of small, often impromptu groups of

    people. The personal in PAN refers to its very limited span, so the

    devices are close to person

    PAN provides connection between laptops, mobile phone, PDA, mp3

    player, camera and so on the share data in an ad hoc network. As such, it

    has limited use in the corporate world and, as it generic name implies, is

    much more likely to be used by individuals.

    PAN connection can be established using cable or wireless technology.

    The common types of cable for PAN connection are USB and Firewire.

    Whereas the wireless PAN technology are Infrared and Bluetooth. The

    predominant PAN technology today is Bluetooth.

    Bluetooth is a relatively new technology, not even 10 years old. It was

    first created by Ericsson Mobile Communication; it was named for Harald

    Bluetooth.

    Bluetooth uses radio waves for transmission over a very short range of

    around 30 to 40 feet. Recent developments have extended the range tonearly half a mile by increasing transmission power and using special

    antennas.

    The original impetus for its design was to replace the clutter of desktop

    cables by enabling wireless connection between keyboards and

    computers, computers and printers, headphones and sound cards, and the

    like. Before long, that concept expanded to the creation of a personal

    area network (PAN), a mini-network among devices in close proximity.

    Bluetooth networks operate with a master/slave relationship one device

    automatically assumes the role of master through which allcommunication travel; assignment is ad hoc. Bluetooth-enabled devices,

    including laptops, mobile phone, digital cameras, and PDAs, can join an

    existing group or form a new one just by being turned on.

    A Bluetooth group is called a personal area network (PAN). Its members

    can come and go on the fly. The basic Bluetooth PAN is called a piconet,

    which needs at least two active members and can have up to eight.

    Piconets are established automatically on the fly as a device enters a

    piconet with fewer than eight active members, it is given an address and

    members can come and go at will.

    Page 15 of 20

  • 8/8/2019 Assignment Network FUPL

    16/20

    Bluetooth is based on the IEEE 802.11 standard, as WLANs are, and

    operates in the same ISM 2.4GHz band as 802.11b and g. However,

    Bluetooth does not use the 802.x LAN protocols because it is not designed

    for large-scale data transmissions. Bluetooth uses FHSS. There are two

    major advantages of FHSS. Firstly, the interference with and from other

    spread spectrum networks within range is reduced. Secondly

    eavesdropping prevention is enhanced.

    Page 16 of 20

  • 8/8/2019 Assignment Network FUPL

    17/20

    Part (C) Discuss the advantages and disadvantages of

    normal LAN vs. wireless LAN.

    LAN has been widely used within organizations and homes. LAN allowdifferent computer to share resources. Computer can be connected in a

    variety of ways including electrical wiring, telephone wiring, and special

    cables. Today, with the advancement of wireless technology, one of the

    simplest ways to connect computers is without cable or wireless.

    A wireless local area network is typically referred to as a wireless LAN

    (WLAN). It uses radio frequencies to connect computers and other

    devices. All communications pass through the networks centrally located

    wireless receiver. This receiver interprets incoming radio frequencies and

    routs communication to the appropriate devices.

    Both normal and wireless can claim advantages over the other. Below we

    can compare advantages and disadvantages of wired and wireless

    networking in few key areas.

    Ease of installation

    The installation for normal LAN is more difficult compared to WLAN. For

    normal LAN, Ethernet cables must be run from each computer to another

    computer or to the central device. It can be time-consuming and difficult

    to run cables under the floor or through walls, especially when computers

    sit in different rooms.

    WLAN is easier to install, you no need to worry about how to run the wires

    in your building. WLAN just require wireless network adapters and a

    wireless access point. You just need to install in a central location where

    wireless radio signals can reach your all your computers with minimal

    interference. If your building area is too big, you just need to add another

    wireless access point at another location as a repeater.

    Total cost

    WLAN cost is more expensive than normal LAN. As for normal LAN,

    Ethernet cables, Ethernet card, hubs and switches are very inexpensive.Wireless devices cost are more than the equivalent wired Ethernet

    products. At full retail prices, wireless adapters and access points may

    cost three or four times as much as Ethernet adapter, cable and

    hubs/switches.

    Performance

    At the performance wise, normal LAN offer better performance compare to

    WLAN. With Fast Ethernet technology, a normal LAN can easily offer

    speed at range of 100Mbps to 1Gbps.

    Wireless LANs using 802.11b support a maximum theoretical bandwidth of

    11Mbps and 802.11g WLANs support up to 54Mbps, which is

    Page 17 of 20

  • 8/8/2019 Assignment Network FUPL

    18/20

    approximately one-half the bandwidth of Fast Ethernet. Futhermore, Wi-Fi

    performance is distance sensitive, the performance will degrade on

    computers farther away from the access point. As more wireless devices

    utilize the WLAN more heavily, performance degrades even further.

    Mobility and ExpandabilityThe greater mobility of WLANs helps offset the performance disadvantage.

    Mobile computers do not need to be tied to an Ethernet cable and can

    roam freely within the WLAN range. For normal LAN, the LAN point is

    fixed. We need to rearrange the cable if we need to move our computer

    to other location, which is a tedious job.

    Furthermore, WLAN provide better expandability, where a new computer

    can be easily connected to the WLAN within the wireless range. Unlike

    normal LAN, if you need to connect another new computer to the LAN, you

    need to pull another network cable to the central switch.

    Security

    In theory, WLANs are less secure than normal LANs, because wireless

    communication signals travel through the air and can easily be

    intercepted. But, in practical, WLANs protect their data through the Wired

    Equivalent Privacy (WEP) encryption standard that makes wireless

    communications reasonably as safe as wired ones.

    No computer network is completely secure. Important security

    considerations for computer user tend to not be related to whether the

    network is wired or wireless but rather ensuring that internet firewall isproperly configured, and user knowledge on internet spam, viruses and

    spyware.

    Table below summarizes the main criteria discussed above.

    Normal LAN WLANInstallation Moderate difficulty EasierCost Less MorePerformance Superior Reasonably highMobility /Expandability

    Limited Outstanding

    Security Reasonably good Reasonably good

    As a conclusion, normal Ethernet LAN is probably for users that are very

    cost-conscious, need maximum performance of the network system, and

    dont care much about mobility.

    On the other hand, a WLAN is for users if cost is less of an issue, like being

    an early adopter of leading-edge technologies and really concerned about

    the task of wiring their home or small business with Ethernet cable.

    Page 18 of 20

  • 8/8/2019 Assignment Network FUPL

    19/20

    Part (D) Subnetting is a technique that can be

    implemented in a LAN. Explain what is subnetting and

    describe why we need to do subnetting. Give an

    example of a subnetmask address for a class C IP

    network.

    Subnetting is a technique used to breakdown networks into subnets. The

    subnets are created through the use of subnet masks. The subnet mask

    identifies what bits in the IP address are to be used to represent the

    network/subnet portion of an IP address.

    Subnets are created by borrowing bits from the host portion of the IP

    address. The network portion of the IP address and the new subnet bits

    are used to define the new subnet.

    Here is an example to demonstrate how to do the subnetting. ABC

    company Using a class C IP address 196.1.1.0. They need to divide their

    network into 6 departments. Each department will require its own subnet.

    Each department LAN requirement are:

    o Admin 25 nodes

    o Account 10 nodes

    o Executive 15 nodes

    o Logistic 5 nodes

    o Management 10 nodes

    o Training 20 nodes

    From here we can see that 6 subnet is needed. We add 2(for network and

    broadcast addresses) to 8. The nearest power of two is 8, which equal 23.

    This means a 3-bit subnet mask is required.

    Reserving three bits from the top down creates a subnet mask with the

    pattern 11100000. The decimal value for this number is 128+64+32

    which is equals to 224. This extends the default subnet mask for the Class

    C address from 255.255.255.0 to 255.255.255.224.

    The number of usable host per subnet can be calculated with the formula

    2m 2 where m is the number of host bit left. 25 2 = 30. Therefore, the

    number of host per subnet is 30, which is enough to accommodate all the

    department requirements.

    All the subnets addresses is listed at the table below:

    Page 19 of 20

  • 8/8/2019 Assignment Network FUPL

    20/20

    Network IP: 196.1.1.0 Subnet mask: 255.255.255.224

    UsableSubnet

    Subnet#

    SubnetworkIP

    Host Range Broadcast

    Not in used 0 Subnet 196.1.1.0 196.1.1.1 -

    196.1.1.30

    196.1.1.31

    Admin 1st

    Subnet196.1.1.32 196.1.1.31 -

    196.1.1.62196.1.1.63

    Account 2nd

    Subnet196.1.1.64 196.1.1.65 -

    196.1.1.94196.1.1.95

    Executive 3rd

    Subnet196.1.1.96 196.1.1.97 -

    196.1.1.126196.1.1.12

    7

    Logistic 4th

    Subnet196.1.1.128 196.1.1.129 -

    196.1.1.158196.1.1.15

    9

    Management

    5th

    Subnet196.1.1.160 196.1.1.161 -

    196.1.1.190196.1.1.19

    1

    Training 6th

    Subnet196.1.1.192 196.1.1.193 -

    196.1.1.222196.1.1.22

    3

    Not in used 7th

    Subnet196.1.1.224 196.1.1.225 -

    196.1.1.254196.1.1.25

    5

    ReferenceBarry Dumas and Morris Schwartz. Principles of computer networks and

    communications, Upper Saddle River, NJ: Pearson/Prentice Hall, 2009

    Jeffrey S. Beasley. Networking. Upper Saddle River, NJ: Pearson/Prentice

    Hall, 2004

    Laura A. Chappell and Ed Tittel. Guide to TCP/IP, 2ndedn, Canada:

    Thomson Learning, 2004

    David A. Stamper. Local Area Networks,3rdedn. Upper Saddle River, NJ:

    Pearson/Prentice Hall, 2001

    Brian K. Williams and Stacey C. Sawyer. Using information Technology.

    New York: McGraw-Hill Higher Education, 2003