Wednesday, May 6, 2020
Spectroscopic Methods Nanomaterials Characterization - Free Samples
Question: Discuss about the Spectroscopic Methods for Nanomaterials Characterization. Answer: Introduction The M2M Solutions is a medium sized organization. The organization currently looking to expand its operations, and hence they are required to relay their network structure. For the purpose of relaying the network architecture I have been entrusted with task of taking the full responsibility of the task. I have also been also provided with a team of several administrators of the system. The task one of this report contains the information about the designing of the Addressing solution for the organization. The report provides the design for the Simple Addressing solution, the description of the Simple Addressing Design and also provides information about the subnetting techniques and the network divisions that are implemented for the system. In addition to this, some additional justification for the network design has also been provided in the report. The M2M Company has already provided the information about their requirements. The company has acquired about six sites across the city of Sydney. They are looking to implement a network for the six different department of the company. The six different departments that are present in the company are the Finance department, Transport Office, Research Office, Sales Office, Information System and the Head Office. Now the company is looking to implement a network that would be connecting all the departments of the company to the single network. The company is also looking to subnet their network and it is also informed that they would be having a single subnet for each of the departments in the company. In addition to this, the design is required to accommodate around 1200 work station in their network. In addition to this, the distribution of the workstation of the company is done in the following process: Finance Office - 260 workstations Transport Office - 130 workstations Research Office - 120 workstations Sales Office - 40 workstations Information technology - 520 workstations Head Office - 60 workstations Hence, the network that is implemented should be accommodating the aforesaid number of machines in the system. Description of the Addressing solution The network design is implemented according to the requirement stated by the company. For the implantation the system central server is connected to the six departments of the company. The six different servers are implemented for the six different sectors of the company that they need to integrate into their system. Hence, the network would be subnetted efficiently into six different sub networks. This provides the company with the benefit of stopping the access to the different administrators of the different networks. Hence, this would be providing various type secure facilities for the network of the company. In addition to this, the authentication aspect within the network would also be improved efficiently by this design. The calculations and the further discussions of the network are provided below. For the subnetting of the network the major network was selected as 10.0.0.0/20. The available IP addresses in major network: 4094 The number of IP addresses needed: 1130 The available IP addresses in allocated subnets: 2036 In addition to this, it should also be noted that about 50% of available major network address space is used and about 56% of subnetted network address space is used. The table provided below displays the subnetting procedures efficiently. Subnet Name Needed Size Mask Dec Mask Assignable Range Broadcast Address Allocated Size Finance_Offfice 260 /23 255.255.254.0 10.0.4.1 - 10.0.5.254 10.0.5.255 10.0.4.0 510 Transport_Office 130 /24 255.255.255.0 10.0.6.1 - 10.0.6.254 10.0.6.255 10.0.6.0 254 Research_Office 120 /25 255.255.255.128 10.0.7.1 - 10.0.7.126 10.0.7.127 10.0.7.0 126 Sales_Office 40 /26 255.255.255.192 10.0.7.193 - 10.0.7.254 10.0.7.255 10.0.7.192 62 Infiormation_Technology 520 /22 255.255.252.0 10.0.0.1 - 10.0.3.254 10.0.3.255 10.0.0.0 1022 Head_Office 60 /26 255.255.255.192 10.0.7.129 - 10.0.7.190 10.0.7.191 10.0.7.128 62 Justification of the network design The network design is according to the needs mentioned by the company. The network would be providing efficient communication facilities for the company and also the network would allow integration of the different departments of the company within the same network efficiently. The network would also provide very efficient security and the very efficient authentication facilities for the company. The network has also been designed efficiently for implementation of the network that would be accommodating about 1200 in the system. In addition to this the division of the network has also been done according to the requirements mentioned by the M2M Company. The sub netting of the company is also according to the requirements of the mentioned by the company. The system would also allow only the allocated number of machine in the network. The subnet /20 are being used in this system. Hence, the total number of addresses that would be allowed in this system is 4096. But if the number of add resses in each building exceeds more than 1024 them it would be impossible to allocate that number of addresses in the network. As 1024 x 6 exceeds more than 4096 addresses and hence, this would result in the congestion of the network. For conclusion it can be said that the network design provided for the network would be helpful for the company to implement their network in which the sub network would be efficiently divided for the company. This report provides the details about the network design. The task one of this report contains the information about the designing of the Addressing solution for the organization. The report provides the design for the Simple Addressing solution, the description of the Simple Addressing Design and also provides information about the subnetting techniques and the network divisions that are implemented for the system. In addition to this, some additional justification for the network design has also been provided in the report. Protocols in the communication Network and role of network analyzer tool The M2M Solutions is a medium sized organization. The organization currently looking to expand its operations, and hence they are required to relay their network structure. For the purpose of relaying the network architecture I have been entrusted with task of taking the full responsibility of the task. I have also been also provided with a team of several administrators of the system. The task two in this report provides the information about the current company policies and the discussions involving the network analyzers. The report provides the information about the protocols that are used for the communication in the network, the role of the network analyzer, selection of the network analyzer and the various type of benefits for the network analyzer tool and other discussions about the tool. The company policies do not involve the use of network analyzers in their network although the network analyzers are very efficient for the company to carry out their processes. In addition to this, the network analyzer would also help the company tom identify the flaws that are existent within the network. The information about the protocols that are being used in the network is provided below. The main protocols that are being used for the network are HTTP, FTP and SMTP protocol. The HTTP is the hyper text transfer protocol, the FTP is the File transfer protocol and the SMTP is the Simple mail transfer protocol. The HTTP protocol would enable the network to have access to the internet connection and system would be able to go online. In addition to this, the FTP protocol would allow the systems in enable to transfer files within the network. The SMTP protocol would enable the components of the network to communicate among them very efficiently. In addition to this, the communication in between the staffs of the company would also be very efficient and they would be able to exchange emails among themselves. The network analyzer is combination of the hardware and software. It plays various type of roles for the network: It can be used for the analysis of the network. It can also be used for the security of the network. Currently available network analyzer tool The wire shark framework is used as a network analyzer for the analysis of the network that is designed in task one. The wireshark network analyzer would be able to perform the analysis about the data packets that are being transferred within the network. They are also going to trace the packets that are flowing through the network. Wireshark is one the most efficient tool that can be used as a network analyzer In addition to this; the product is very popular in the market and posses quite a high ranking in the market for the network analyzer department. Wireshark provides various type of benefits for the network implemented by the users. Firstly, it supports a wide range of protocols that vary from the IP and DHCP to the AppleTalk and BitTorrent. In addition to this, with each of the update the tool is updated and a new protocol is added to the application on a daily basis. The analyzer supports about 850 protocols. The tool also helps in the analysis of the network and performs excellent monitoring of the systems. Hence, they protect the systems form the external intruders. The WireShark Network Protocol Analyzer tool is an open source tool that can be used for both the individual use and also for the commercial uses as well. The cost for the implementation of the analyzer on the network system is also very minimal and there are no external hardware requirements for the analyzer. Hence, the associated cost for the analyzer is almost nil. For using the tool the minimum requirements of the network are: 60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. In addition to this, system is required to possess a Network Interface Controller. Recommendation and preferences of using the tool For conclusion it can be said that the Wireshark Network Protocol Analyzer is the best tool that can be used for the network that is designed for the M2M to implement. The information about the current company policies and the discussions involving the network analyzers have been provided in this report. The report provides the information about the protocols that are used for the communication in the network, the role of the network analyzer, selection of the network analyzer and the various types of benefits for the network analyzer tool and other discussions about the tool. The usability of the network analyzer has also been provided in this report. Bibliography Alexander, G., Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP side channels. InComputer Communications (INFOCOM), 2015 IEEE Conference on(pp. 1589-1597). IEEE. Bauer, G., Bawej, T., Behrens, U., Branson, J., Chaze, O., Cittolin, S., ... Dupont, A. (2014). 10 Gbps TCP/IP streams from the FPGA for high energy physics. InJournal of Physics: Conference Series(Vol. 513, No. 1, p. 012042). IOP Publishing. Bishop, S., Fairbairn, M., Norrish, M., Ridge, T., Sewell, P., Smith, M., Wansbrough, K. (2015). Engineering with Logic: Rigorous Specification and Validation for TCP/IP and the Sockets API.URL: https://www. cl. cam. ac. uk/pes20/Netsem/paper3. pdf. Black, E. D. (2017). Introduction to the Network Analyzer and the Digital Fast Fourier Transform (FFT). Conti, M., Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new research directions.IEEE Communications Magazine,52(1), 85-96. Jerger, M., Vasseli, Z., Fedorov, A. (2017). In situ characterization of qubit control lines: a qubit as a vector network analyzer.arXiv preprint arXiv:1706.05829. Lewandowski, A., Wiatr, W., Gu, D., Orloff, N. D., Booth, J. (2017). A Multireflect-Thru Method of Vector Network Analyzer Calibration.IEEE Transactions on Microwave Theory and Techniques,65(3), 905-915. Micheli, D., Pastore, R., Vricella, A., Delfini, A., Marchetti, M., Santoni, F. (2017). Electromagnetic Characterization of Materials by Vector Network Analyzer Experimental Setup.Spectroscopic Methods for Nanomaterials Characterization, 195. Savin, A. A. (2013, October). A novel factor verification technique for one-port vector network analyzer. InMicrowave Conference (EuMC), 2013 European(pp. 60-63). IEEE. Savin, A. A., Guba, V. G., Rumiantsev, A., Maxson, B. D. (2014, June). Estimation of complex residual errors of calibrated two-port vector network analyzer. InARFTG Microwave Measurement Conference (ARFTG), 2014 83rd(pp. 1-4). IEEE. Shang, W., Yu, Y., Droms, R., Zhang, L. (2016).Challenges in IoT networking via TCP/IP architecture. NDN Project, Tech. Rep. NDN-0038. Shojafar, M., Cordeschi, N., Abawajy, J. H., Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. InGlobecom Workshops (GC Wkshps), 2015 IEEE(pp. 1-6). IEEE. Tiwari, A., Jaiswal, M., Varma, N., Joshi, B. L. (2014). TCP/IP Protocol Suite, Attacks, and Security Tools.URl= https://www. academia. edu/7134687/TCP_IP_Protocol_Suite_Attacks_and_Security_Tools. Yasukata, K., Honda, M., Santry, D., Eggert, L. (2016, June). StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. InUSENIX Annual Technical Conference(pp. 43-56).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.