MyAssignmentServices uses cookies to deliver the best experience possible. Read more

Data Communications and Networks

Contents

Introduction.

LAN Design and Description.

Hardware.

Switch.

Router.

Hub.

Conclusion.

References.

Introduction to Network-Based Modeling and Analysis in Design

Key analysis of network needs includes flow as well as requirement analysis. Requirements Analysis describes how to gather user needs. In addition, flow analysis groups information flows into several types called flows. Requirements analysis consists of identifying actors, methods as well as techniques for extracting information as well as data, as well as the data collected. Flow analysis represents where the backbone flow is isolated. In the supplied scenario, network requirements include hardware such as routers, switches, as well as wires.

  1. The network plays an important role in our lives. The Network Development Lifecycle facilitates critical review of network analysis as well as design. These critical issues include a hierarchical network design as well as IP addressing design.
  2. There are two approaches to network analysis as well as design. 1) Top-down approach 2) Bottom-up approach.
  3. Top-down approach - This approach defines the design process as well as the divided design tasks to create a more centralized as well as controlled design.
  4. Bottom-Up Approach - This approach selects network technology as well as design.
  5. Life is impossible without a communication network. Therefore, it is very important that communication networks are secure, reliable, as well as high-performance.
  6. Key analysis of this network includes analysis of network requirements, logical design of the network, physical design, implementation, maintenance, optimization, monitoring, as well as management of the network.
  7. If the network is designed

The Document Deployment Part consists of two subparts: flow analysis as well as requirement analysis. Requirements analysis defines elements such as actor decisions as well as information to collect, while flow analysis defines where to distribute the backbone flow. The network topology used here is a ring topology that tends to connect each network device to two other network devices. For example, in a network diagram, a router is a connection point between switches. The network diagram represents individual routers that tend to join the switches associated with each state. Each state is assigned a public IPv4 address, depending on your requirements. For example, since WA requires 500 thousand, the unreserved public allocation range consists of 524,288 addresses. A network diagram consists of three basic hardware components, a router that tends to associate two devices, a switch that facilitates the individual connection of all nodes, as well as a cable that is used to connect the two devices. The conclusion finally provided a network diagram of the required scenario including the IP addresses associated with each state in Australia (Chen, Heydari, Maier and Panchal, 2018).

LAN Design and Description

Design as well as description of all state local area networks -

  1. Local area networks (LANs) are used to connect network terminals, printers, as well as computers, as well as are geographically restricted in access.
  2. Ethernet is the most commonly used technology in a LAN.
  3. You can connect LANs using a wide area network (WAN) or a metropolitan area network (MAN).
  4. LAN connects groups of people in the same local area.
  5. Deploy VLAN to connect people from different locations to share the same network.
  6. LAN Technology Symbols - Airport Express, Bluetooth, camera, mobile phone, palm, iPod, fax, earphone, scanner, flatbed scanner, printer, label printer, etc.
  7. A LAN example is a BUS topology. In a bus topology, two or more computers are connected using a single cable. It is a coaxial cable like this cable.

Network Topology: Why Select Specific Network Topology:-

  1. Examples of LANs include the following - Ring topology - Ring topology has a starting point where data is transferred at each successive station.
  2. Token Ring is also included. There is a small packet called a token that circulates around the ring.
  3. The ring token has a central node called a hub. Information addressed from one node to another by sending it through the node as well as switching to the receiving station.
  4. Create complex LAN topologies from bus, ring, as well as star topologies. Fibre-distributed interface networks created by special categories of equipment may also have "dual ring of trees" (Katsaros, Dimokas and Tassiulas, 2010).

The required network design is:

  1. Network topology - The network topology used is the ring topology where the switch is connected to the router. The ring topology configuration consists of interconnected devices where each device is connected to two other devices. This type of topology forms circular information paths, such as circles. This is basically used to associate the backbone with other users. The ring is used in both directions as well as configures two different paths to the public switch.
  2. LAN Network Design - In the network, Router 1 links Switch 1 as well as Switch 2. Switch 1 as well as Switch 2 are Western Australia as well as Northern Territory switches that connect further to the state's users. Similarly, Router 2 links Switch 2 to Switch 3 of Northern Territory as well as Queensland, Router 3 connects Switch 3 to Queensland of Switch 4 to New South Wales, as well as Router 4 connects to Switch 4. In addition to Switch 5, which is New South Wales as well as Victoria, Router 5 connects to Switch 5, New South Wales as well as Switch 6, which is Tasmania, as well as Router 6 connects to Switch 6 as well as Switch 1. South Australia as well as West Australia. In addition, all routers are connected to the Internet (Li, Kramer, Gordon and Agogino, 2018).
  3. The IP address assignment is:
  4. Switch 1 (WA) - The IP address range assigned to this switch is 3.160.0.1 to 3.167.255.254. The supplied network address is 3.160.0.0 as well as the subnet mask is 255.248.0.0. The total number of addresses assigned is approximately 524,288.
  5. Switch 2 (NT) - The IP address range assigned to this switch is 1.160.0.1 to 1.163.255. The supplied network address is 1.160.0.0 as well as the subnet mask is 255.252.0.0. The total number of addresses that can be assigned is approximately 262,142.
  6. Switch 3 (QLD) - The IP address range assigned to this switch is 87.120.0.1 to 87.127.255.254. The supplied network address is 87.120.0.0 as well as the subnet mask is 255.248.0.0. The total number of addresses that can be assigned is approximately 524,288.
  7. Switch 4 (NSW) - The IP address range assigned to this switch is 37.96.0.1 to 37.127.255.254. The supplied network address is 37.96.0.0 as well as the subnet mask is 255.224.0.0. The total number of addresses that can be assigned is approximately 2,097,152.
  8. Switch 5 (VIC) - The IP address range assigned to this switch is 43.192.0.1 to 43.207.255.254. The network address provided is 43.192.0.0 as well as the subnet mask is 255.240.0.0. The total number of addresses that can be assigned is approximately 1,048,574.
  9. Switch 6 (TUS) - The range of IP addresses assigned to this switch is 72.128.0.1 to 72.191.255.254. The network address provided is 72.128.0.0 as well as the subnet mask is 255.192.0.0. The total number of addresses that can be assigned is approximately 4,194,302.
  10. Switch 7 (SA) - The IP address range assigned to this switch is 64.64.0.1 to 64.127.255.254. The network address provided is 64.64.0.0 as well as the subnet mask is 255.192.0.0. The total number of addresses that can be assigned is approximately 4,194,302.

Hardware

The hardware used to form the above network includes:

  1. Routers - Networks use routers to form or interconnect networks as well as coordinate all associated devices. The router acts as a central link, allowing devices to interact as well as communicate with each other.
  2. Switches - Provide separate links/connections to each node or computer system in the state network. It forms a series of instant networks that consist of only two devices that interact with each other at a particular moment.
  3. Hub - A wire used to link two devices together. For example, a connection between a computer as well as an Internet service provider (Rietsch, Naveau, Gilardi and Guillou, 2013).

Switch

  1. Switches are used to connect two or more computers. Switches play a more important role than hubs.
  2. Multiport devices are used to improve network efficiency.
  3. Switches not only maintain routing information about nodes in the internal network, but also allow the system to connect like a hub as well as a router.
  4. Most LANs are connected by switches
  5. The switch reads the addresses of incoming packets as well as sends them to the destination.
  6. The switch has virtual circuits, which can make it difficult to investigate network monitors, which can enhance security.
  7. Multi-layer switches can operate on both the switch as well as router layers.

Router

  1. Routers use different network topologies to send packets to destinations as well as identify interconnected devices.
  2. The router stores information about the network from which it is connected.
  3. Routers also use LAN to WAN translation data. This is used for LAN as well as WAN use different network protocols.
  4. The router divides two or more networks into sub-networks. Routers are dedicated computers only.
  5. The router can also connect to another router. Routers can be static or dynamic.

Hub

  1. The hub connects multiple computers at once. The hub uses digital signals as well as analog signals that provide the configuration of input data
  2. For example, if the data is in digital format, the data passes through the packet. Passes data using the signal format, as if the data were in analog format.
  3. The hub connects LAN components with the same protocol.
  4. The hub does not require addressing as well as packet filtering. Sends a data packet to the attached device.
  5. The hub is the physical layer of the OSI model. There are two types of hubs - simple ports as well as multiple ports (Song, Luo and Wood, 2018).

Conclusion on Network-Based Modeling and Analysis in Design

Finally, the conclusion consists of a network that uses an unreserved public IPv4 address or is assigned to each user in the state. Ring topology is used to link switches between routers as well as networks. Routers connect switches in each state to each other. In addition, routers are also connected/linked to the Internet.

A network topology plays an important role in connecting a computer to many other computers. The network structure defines how they communicate. The network topology defines the physical as well as logical aspects of the network. There may be many different topologies, such as buses, rings, as well as stars. These topologies can be connected using LANWAN as well as MAN networks. The physical aspects of all these networks are used to connect all networks together, such as hubs, switches, routers, etc., to accommodate local, geographic, or global weather. Different topologies have different costs as well as effects. Some of them are very cheap, but some are very expensive.

References for Network-Based Modeling and Analysis in Design

Chen, W., Heydari, B., Maier, A. and Panchal, J., 2018. Network-based Modeling and Analysis in Design. Design Science, 4.

Katsaros, D., Dimokas, N. and Tassiulas, L., 2010. Social network analysis concepts in the design of wireless Ad Hoc network protocols. IEEE Network, 24(6), pp.23-29.

Li, N., Kramer, J., Gordon, P. and Agogino, A., 2018. Co-author network analysis of human-centered design for development. Design Science, 4.

Rietsch, T., Naveau, P., Gilardi, N. and Guillou, A., 2013. Network design for heavy rainfall analysis. Journal of Geophysical Research: Atmospheres, 118(23), pp.13,075-13,086.

Song, B., Luo, J. and Wood, K., 2018. Data-Driven Platform Design: Patent Data and Function Network Analysis. Journal of Mechanical Design, 141(2).

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Not Specific >5000
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

Request Callback

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help

Get 500 Words FREE
Ask your Question
Need Assistance on your
existing assignment order?