SlideShare a Scribd company logo
1 of 41
Download to read offline
5
A study on practical uses of
common Network protocols
A network design for Rythmo Studio
W.A Neranjan Viduranga
4/20/2021
[Network protocols are set of rules and procedures for transmitting data/information between
at least two or more communication devices. Basically, they define what is communicated?
How it is communicated? And when it is communicated? In this report, the author will
discuss about some of the networking protocols and how to properly implement them.]
Key Words: Network, Networking Protocols, VLAN, OSPF, Syslog, Cisco Packet Tracer,
Router, Switch, End devices
6
1. Introduction
The main purpose of this report is to show the practical uses of networking protocols in a
real-world scenario. These protocols can increase the efficiency and the security of a network
by configuring and using them in a correct manner.
To demonstrate the networking protocols, the author has chosen Ethernet/LAN network due
to the wide use of Ethernet/LAN in the business world. To demonstrate that in a real-world-
scenario, the author has chosen the photography industry and the Rythmo Studio as the client.
In this report, the author will discuss some of the networking protocols and provide a new
network design for Rythmo Studio with evidence of protocol implementation in a network
simulation application.
2. Literature Review
New and emergent threats to small businesses and how can we manage them
Patricia A H Williams et al (2010), says [1] due to the more relaxed and less controlled
nature, small businesses are become the prime target for cybercrimes. Most of those cyber
threats are caused by human error. It can be intentional or accidental. But both kinds of
human errors can cause unimaginable harm to the business. One of the emerging cyber
threats to small businesses is caused by social media usage. Due to the more relaxed nature of
small businesses, employees are free to use their private social media accounts on working
computers/network. The threat arises when, shared links are clicked and malwares are
downloaded. This action can be intentional or accidental. But those downloaded malwares
can destroy the network/system instantaneously or quietly operated in background while
utilizing user bandwidth and sending sensitive data out of the business to a third party.
Managing cyber threats in a small business with limited computer security knowledge and
financial resources is a very difficult thing to do. Ideally, small businesses are also supposed
to implement cyber security measurements according to the ISO/IEC 27002 (Information
technology – Security techniques – Code of practice for information security management)
like bigger businesses. But it is not possible due to the limited resources that small businesses
can spend on that kind of larger projects. So, the best way to secure a small business is to
address security requirements daily by monitoring the network traffic, network performance
7
and keeping a good and up-to-date antivirus application in their system. Apart from that, they
can ensure their security by configuring a good firewall and installing an Intrusion Prevention
System (IPS) to prevent outsiders from getting in to the system.
Current status of network infrastructure and cyber security in small businesses
Kamala Raghavan, et al (2017), says [2] almost all businesses are turning toward to cloud
computing due to the large amount of benefits and lack of resources that need to implement
in-house servers. Even though cloud computing can help small businesses to grow fast
without having to invest huge amounts of resources for IT infrastructure and security; it can
be lead to serious data breaches. By using cloud computing facilities, small businesses are
exposed to the raw internet more than ever now. It increases the potential cyber threats to the
business. It becomes a major problem when, those small businesses have bigger companies as
their customers. By using those situations cyber criminals can get access to the major
businesses through unsecured small businesses. “Target” and “Home Depot” incidents are
some of the examples to that kind of situations. In those incidents cyber criminals used a
smaller business which provides services to those bigger companies as the entry point to a
credit card theft.
Network Security threats and Awareness in Sri Lanka
R.T.S Nagahawatta, et al (2020), says [3] Sri Lanka has established several laws to manage
cyber security and protect data. Almost all of those laws are based on English law and
international cyber security laws. Information and Communication Technology Act,
Computer crimes Act, Payment Devices Frauds Act and Electronic Transactions Act are
some of those acts that passed by the Sri Lankan parliament in recent years. According to the
Sri Lankan CERT (Computer Emergency Response Team), in 2016, 2341 total cybercrimes
have been reported. From those incidents, more than 95% incidents are social media related
incidents (2200).
R.T.S Nagahawatta, et al (2020), [3] in their research, collected data from 88,855
undergraduate students in order to find out the cyber security awareness among the youth of
Sri Lanka. Results of that research project shows, 39% of respondents have moderate level of
cyber security awareness, 30% has high level of knowledge, 9% has very high level of
knowledge, 6% has very low level of knowledge and 16% has low level of knowledge about
8
cyber security. According to the research results, male students have more cyber security
awareness compared to their female counterpart. Also, it shows, even though students have
acceptable level of knowledge about cyber security, there are some knowledge gaps with new
cyber threats.
3. Scenario Definition
Rythmo Studio has two branches. The main branch is located in Kadawatha. It has one
server, three large industrial printers and seven computers. Five of those computers are built
specifically for Photo and video editing. The network Administrator and the studio manager
use the remaining two computers.
The second branch, which is located in Ganemulla city, also has two large industrial printers
and five computers. Four of them are used by photo and video editors while the other one
used by the studio (branch) manager.
Currently, those two branches have two simple LANs and connected together through the
internet without any protection.
9
Current network design
Figure 1 - Current network design
Network requirements for the new network design
1. The main branch network should divide in to four VLANs by separating the Admin,
Server, Manager and Editing and printing Dept.
2. The second branch (Ganemulla) network should divide in to two VLANs by
separating the branch manager and the editing and printing Dept.
3. Two branch networks should have a secure connection between them in order to share
information and resources securely.
4. Routers should be secured using passwords and usernames.
5. Admin should be able to access the router securely through the Admin PC.
10
New network design
Figure 2 - New network design
In the new network design, the main branch network has been divided in to four VLANs.
Also, the second branch (Ganemulla) has been divided in to two VLANs. To build a secure
connection between two branches, VPN is used in the new design.
11
IP address table for Main branch (Kadawatha)
Table 1 - Main branch IP address table
Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN
ID
Admin 1 192.168.10
.16
192.168.10
.19
255.255.255.2
52
192.168.10.17 100
Studio
Manager
1 192.168.10
.20
192.168.10
.23
255.255.255.2
52
192.168.10.21 200
Editing and
printing
8 192.168.10
.0
192.168.10
.15
255.255.255.2
40
192.168.10.1 300
Server 1 192.168.10
.24
192.168.10
.27
255.255.255.2
52
192.168.10.25 400
IP address table for Second branch (Ganemulla)
Table 2 - Second branch IP address table
Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN
ID
Studio
Manager
1 192.168.20
.16
192.168.20
.19
255.255.255.2
52
192.168.20.17 10
Editing and
printing
6 192.168.20
.0
192.168.20
.15
255.255.255.2
40
192.168.20.1 20
Protocols that are used in the new network design
Network protocols are set of rules and procedures for transmitting data/information between
at least two or more communication devices [4]. Basically, they define the three main
questions of a communication method, what is communicated? How it is communicated?
And when it is communicated?
The newly proposed network design, that is designed for Rythmo studio is using some of the
more common protocols to communicate between departments and the two branches.
12
Secure Shell (SSH)
SSH is a protocol that secures the remote logins from one device to another device. This
protocol uses the port 22. It provides the security for the communication using strong
authentication and data encryption [5]. Usually, SSH protocol used for,
• Provide secured access for users
• Issue remote commands
• Manage network infrastructure and other mission-critical system components
• Interactive and automated file transfers
SSH works in Client-Server model. Therefore, the connection made by the SSH client
connecting to the server (SSH). Then SSH server will send a public key to the client and it
will verify the identity of the SSH server. After that they can communicate through a strong
symmetric encryption and hashing algorithms to ensure the security of the connection [5].
Due to the strong security measurements of the SSH protocol, the author used SSH protocol
to design the new network design for Rythmo studio instead of Telnet protocol.
Telnet
Telnet is a protocol that is used to connect a computer to remote computers over a TCP/IP
network, using Telnet client software [6]. After connecting to the remote computer, the first
computer becomes a virtual terminal to the other remote computer. So users can
communicate with remote computers using the first computer. This protocol uses port 23.
Same as FTP and SSH, Telnet also is an Application Layer protocol in TCP/IP model [6].
Internet Protocol (IP)
IP is a protocol which has the task of delivering data packets from the source to the
destination based on IP addresses. Mainly, there are two types of IP addresses [7].
1. IP version 4: - IP version 4 addresses are in 32 bits of length. These 32 bits can be
broken in to 4 groups of 8 bits (4 octets). IPv4 has 3 classes. Class-A, Class-B and
Class-C. In Class-A, the first octet is the network portion and others are the host
potion. In Class-B, the first two octets are the network potion. In Class-C, the first
three octets are the network potion.
2. IP version 6: - IP version 6 addresses are in 128 bits of length. They can be broken in
to 8 groups of 16 bits.
13
Both IPv4 and IPv6 have Public IP addresses and Private IP addresses. A public IP address is
that you received from your ISP (Internet Service Provider) to your router. In order to access
to the internet, you must have a Public IP address. A private IP address is an IP address that
reserved for internal use behind a router, apart from public [7].
Internet Control Message Protocol (ICMP)
ICMP is a supporting protocol in the internet protocol suite. It is used by network devices to
send error messages and operational information. This protocol belongs to Internet Layer [8].
Transmission Control Protocol (TCP)
TCP is a part of Internet protocol suite. We called it TCP/IP suite [7]. When someone is
sending data using TCP, first it creates a connection between the source and the destination.
Then it will break the large data in to small data and send it to the destination. In the
destination, TCP will reassemble the data correctly and accurately. During this whole
process, TCP will keep its connection live. This protocol is a Transport Layer Protocol and
one of the most used protocols in digital network communication [7].
Dynamic Host Configuration Protocol (DHCP)
DHCP is a protocol that is used to centrally allocate and manage TCP/IP configuration of
client nodes. DHCP servers have pools of IP addresses. Instead of manually configuring
hosts, we can connect a DHCP server in to the network. The DHCP server will give IPs for
hosts as they need. IP addresses can be released for one time or leased for periods of time.
This is also an Application Layer protocol in TCP/IP model [9].
This protocol is very useful in larger networks which can be holding large number of end
devices and hosts. But in the case of Rythmo studio, the network holds limited number of end
devices and hosts. So, the author used static ip configuration instead of DHCP configuration
in the newly design network.
Authentication, Authorization and Accounting (AAA)
AAA is a collection of services, which controls the access to computer resources, enforcing
policies, assessing usage and giving the needed data to bill for services [10]. To establish
effective secure network management, these processes are very important.
In AAA, authentication gives a method to identify the users using valid usernames and
passwords. Before granting the network access to the user, AAA will compare the user
14
credentials with pre-configured user credentials stored in the database. If it is a match, the
user will get the access to the network and if it is not AAA will deny the network access to
that specific user.
Authorization is a process, which is used to enforcing policies and determine type of
activities/services/activities that user can access. After the authentication process,
authorization will determine that, what type of access is needed for the user.
In accounting process, the AAA will measure the resources and services that the user
consumed during his/her network access. This accounting process is performed out through
the logging of session statistics and usage information. It is used to do billing, resource
utilization, capacity planning, trend analysis and authorization control. The accounting
process will gather data including user’s system time and received or sent data amount during
a session.
In AAA, users can use Authentication alone, Accounting alone or all 3 services together.
However, users cannot use Authorization alone. It always requires authentication first [10].
In the newly designed network, the author used only the authentication feature of the AAA to
secure the logins. Due to the small size of the network and low security risk, a properly
configured and maintained authentication mechanism will be enough to provide the security
to the network.
Open Shortest Path First (OSPF) Protocol
OSPF is a link-state routing protocol, which acts as an Interior Gateway protocol (IGP) for
the WAN (Internet). As a link-state routing protocol, OSPF configured routers exchange
network topology information with their nearest neighbor routers [11]. In that way, OSPF
creates a complete picture of the network topology within the every neighbor routers. When
the communication begins, those shared information is used to calculate the best end-to-end
path all the way to the destination by using a variant of Dijkstra algorithm [11].
Due to the complete picture of the network topology in OSPF, routers can quickly calculate
the shortest, quickest and the most efficient path to deliver a packet to the intended
destination. Also, because of the small scale of the newly designed network, OSPF
configured routers will not have a hard time when adding or removing more routers to the
routing domain in the future.
15
IPsec
Internet Protocol secure or “IPsec” is a group of protocols that can be used to build secure
connections between hosts or devices. It helps to build a secure path between devices through
a public and unsecure network like internet [12]. By using IPsec, users can encrypt and
authenticate IP packets. In IPsec, there are six main steps,
1. Exchanging keys for encryption and decryption purposes.
2. Breaking down the data that is intended to send to the destination and creating data
packets.
3. Providing authentication for each data packet.
4. Encrypting all the data packets along with their ip headers (in tunnel mode)
5. Transmitting the data packets to the destination.
6. Decrypting the data packets in the destination.
There are three main protocol used in IPsec [12],
• Authentication Header (AH)
This helps to ensure the sender’s trustworthy. Also it provides the details of if the data
has been tempered or not.
• Encapsulating Security Protocol (ESP)
This helps to encrypt the IP header and the payloads of each packet. If the VPN uses
the transport mode, it only encrypts the payload of packets.
• Security Association (SA)
This protocol helps to negotiate encryption keys.
16
4. Simulation
To simulate the newly designed network, the author used Cisco packet tracer as the
simulation application.
New network design
Figure 3 - new network design in CPT
17
VLAN configurations in Main branch router
Figure 4 - VLAN Configuration in Main branch
18
Figure 5 - VLAN Configuration in Main branch
The Main branch LAN is divided in to 4 VLANs according to the network requirements.
Those VLANs can be recognizing as Admin (VLAN ID 100), Manager (VLAN ID 200),
Editing and Printing Dept. (VLAN ID 300) and the Server (VLAN ID 400).
19
VLAN configurations in Second branch router
Figure 6 - VLAN Configuration in Second branch
The Second branch LAN is divided in to 2 VLANs according to the network requirements.
Those VLANs can be recognizing as the Manager (VLAN ID 10) and the editing and printing
Dept. (VLAN ID 20).
20
Switchport Trunk in Main branch switch
Figure 7 - trunk configuration in main branch
By using “Switchport mode trunk” command, the author allows the traffic to go through the
switch in to the router and vice versa.
Switchport Trunk in Second branch switch
Figure 8 - trunk configuration in second branch
By using “Switchport mode trunk” command, the author allows the traffic to go through the
switch into the router and vice versa.
21
Switchport access in Main branch switch
Figure 9 - switchport access in main branch
In here, the author properly named all of the VLANs in the switch. Then using “Switchport
access” command specified certain interfaces to specific VLANs.
22
Switchport access in Second branch switch
Figure 10 - switchport access in second branch
In here, the author properly named all of the VLANs in the switch. Then using “Switchport
access” command specified certain interfaces to specific VLANs.
23
Static IP configuration on Main branch editing and printing Dept. PC05
Figure 11 - static ip configuration
Due to the limited number of end devices in the newly designed network, the static IP
configuration is used to give IP addresses to all the end devices instead of DHCP
configuration where it automatically give IPs to end devices from its IP pool.
24
Static IP configuration on Second branch Manager’s PC
Figure 12 - static ip configuration
Due to the limited number of end devices in the newly designed network, the static IP
configuration is used to give IP addresses to all the end devices instead of DHCP
configuration where it automatically give IPs to end devices from its IP pool.
25
OSPF configuration on Main branch router
Figure 13 - OSPF configuration
In here, OSPF protocol is used to connect the inside network of Kadawatha branch (network
IPs of all the VLANs) to the outside (10.10.1.0)
OSPF configuration on Middle router
Figure 14 - OSPF configuration
In here, both the outside network portions are connected together by using OSPF protocol.
OSPF configuration on Second branch router
Figure 15 - OSPF configuration
In here, OSPF protocol is used to connect the inside network of Ganemulla branch (network
IPs of all the VLANs) to the outside (10.10.2.0)
26
SYSLOG configuration on Main branch router
Figure 16 - SYSLOG configuration
AAA configuration on Main branch router
Figure 17 - AAA configuration
27
Console password configuration on Main branch router
Figure 18 - console password
SSH configuration on Second branch router
Figure 19 - SSH configuration
28
VPN configuration (IPsec) on Main branch router
Figure 20 - VPN configuration Main branch
29
Figure 21 - VPN configuration Main branch
30
VPN configuration (IPsec) on Second branch router
Figure 22 - VPN configuration Second branch
31
Figure 23 - VPN configuration Second branch
5. Result Discussion
This section is dedicated to discuss the testing results of the simulated network and Quality of
Service.
Quality of Service
Quality of Service or QoS means, any kind of technology, which can manage network or data
traffic in order to reduce packet lost, network latency and jitter on a network. QoS do that by
setting priorities for special tasks and specific types of data on the organizational network
[13].
QoS has specific parameters.
• Packet loss
32
• Jitter (result of network congestion, timing drift and route changes)
• Network latency
• Bandwidth
• Mean Opinion Score (to rate voice quality that uses a five-point scale)
Using those parameters, businesses can measure their QoS quantitatively.
There are three ways to implement QoS in your organization [13].
1. Best effort – in this model, data packets receive the same level of priority. Best effort
do not guaranteed to deliver packets successfully. This method is used when networks
have not configured or do not support QoS.
2. Integrated services – Integrated services model reserves bandwidth along a specific
path on the network. In this model, Apps communicate with the network in order to
resource reservation. Then network devices manage and monitor the flow of data
packets to ensure the network resources can accept those packets. Integrated services
(IntServ) require IntServ supported routers and Resource Reservation Protocol
(RSVP). In addition, IntServ has higher consumption of network resources and
limited scalability.
3. Differentiated services – In differentiated services (DiffServ), routers and switches
are configured to handle multiple classes of network/data traffic with different
priorities. Those classes must be based on organizational requirements.
In Rythmo studio, admin of the network can use Differentiated services (DiffServ) model as
the quality of service implementing method. So, the company can prioritize, which kind of
data traffic is the most important and least important in their organizational requirements.
Then, they can use it to implement QoS using DiffServ model based on that organizational
requirements.
As an example, Rythmo studio can prioritize their processes like money transactions,
Emailing and other main business processes as high priority traffic in their network. They can
ban social media access in their network because that will not be a priority of the
organizational requirements. Other processes like internet surfing can be categorized as the
second priority of the company. In addition, Rythmo studio can monitor the traffic in their
network in order to give a better service by identifying unnecessary and suspicious traffic and
removing them.
33
Test Plan
Table 3 - Test plan
No: Description Expected outcome Real outcome
01 Check the connectivity between
VLAN 100 and VLAN 200
4 replies
0% loss
3 replies
25% loss
02 Check the connectivity between
VLAN 100 and VLAN 300
4 replies
0% loss
4 replies
0% loss
03 Check the connectivity between
VLAN 100 and VLAN 400
4 replies
0% loss
3 replies
25% loss
04 Check the connectivity between
VLAN 10 and VLAN 20 (second
branch)
4 replies
0% loss
4 replies
0% loss
05 Testing the console password by
logging in to the main branch router.
With correct PW
Access Granted
With wrong PW
Access denied
With correct PW
Access Granted
With wrong PW
Access denied
06 Testing the SSH access by logging in
to the router through SSH connection
from a PC.
With correct PW
Access Granted
With wrong PW
Access denied
With correct PW
Access Granted
With wrong PW
Access denied
07 Testing the AAA by logging in to the
router
With correct PW &
user name
Access Granted
With wrong PW &
user name
Access denied
With correct PW &
user name
Access Granted
With wrong PW &
user name
Access denied
08 Testing the Syslog server by pinging
the server through the router and
checking the logs in syslog server
Pinging successful
(100%) and Syslog
server has created the
logs
Pinging successful
(100%) and Syslog
server has created the
logs
09 Testing the OSPF by pinging the
Second branch from the Main branch
and tracing the route.
4 replies
0% loss
Successful tracing
3 replies
25% loss
Successful tracing
34
Test cases
Test case 001
Objective – Check the connectivity between VLAN 100 and VLAN 200
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.22
Evidence –
Figure 24 - Test 1
Status - Ping statistics for 192.168.10.22:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms
Test case 002
Objective – Check the connectivity between VLAN 100 and VLAN 300
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.5
Evidence –
35
Figure 25 - Test 2
Status - Ping statistics for 192.168.10.5:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 9ms, Average = 2ms
Test case 003
Objective – Check the connectivity between VLAN 100 and VLAN 400
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.26
Evidence –
Figure 26 - Test 3
Status - Ping statistics for 192.168.10.26:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
36
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 1ms
Test case 004
Objective – Check the connectivity between VLAN 10 and VLAN 20 in second branch
Description – Check connectivity using “Ping” command.
C:>ping 192.168.20.5
Evidence –
Figure 27 - Test 4
Status - Ping statistics for 192.168.10.5:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 235ms, Average = 59ms
Test case 005
Objective – Test the Console password
Description – Test the console password by logging in to the Main branch router by giving
the correct PW and a wrong PW
Evidence –
37
Figure 28 - Test 5.1
Figure 29 - Test 5.2
Status – Test successful. The Console password, which is pre-configured, is needed to log in
to the router. Wrong passwords are not allowed to log in to the router.
Test case 006
Objective – Test the SSH
Description – Testing the SSH access by logging in to the router through SSH connection
from a PC by giving the correct PW and a wrong PW.
C:>ssh –l Admin 192.168.20.1
Evidence –
Figure 30 - Test 6.1
Figure 31 - Test 6.2
38
Status - Test successful. With the correct per-configured PW, local PC can access the router
through the SSH connection successfully. Wrong passwords are not allowed to access the
router through SSH connection.
Test case 007
Objective – Test the AAA
Description – Testing the AAA by logging in to the router by giving the correct PW and a
wrong PW.
Evidence –
Figure 32 - Test 7.1
Figure 33 - Test 7.2
Status – Test successful. To log in to the router a pre-given user name and password is
required. Wrong PWs and User names are not allowed.
Test case 008
Objective – Test the Syslog server
Description – Testing the Syslog server by pinging the server through the router and checking
the logs in syslog server.
Main_Branch#ping 192.168.10.26
Evidence –
39
Figure 34 - Test 8.1
Figure 35 - Test 8.2
Status – Test successful. Sent five 100 byte ICMP Echos to the server in 2 seconds. Success
rate is 100%. All the logs can be seen in the syslog server. Round trip minimum 0ms,
Average 1 ms and Maximum 2ms.
Test case 009
Objective – Test the OSPF configuration
Description – Testing the OSPF by pinging the Second branch from the Main branch and
tracing the route.
C:>ping 192.168.20.5
C:>tracert 192.168.20.5
Evidence –
40
Figure 36 - Test 9
Status - Ping statistics for 192.168.20.5:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 228ms, Average = 150ms
Tracing route to 192.168.20.5 over a maximum of 30 hops:
1 14ms 2ms 0ms 192.168.10.17
2 0ms 1ms 0ms 10.10.1.1
3 1ms 2ms 2ms 10.10.2.2
4 0ms 6ms 1ms 192.168.20.5
Trace complete
41
6. Conclusion
Network protocols are set of rules and procedures for transmitting data and information
between at least two or more communication devices. Basically, they define what is
communicated? How it is communicated? And when it is communicated? So, to be a working
and successful network, essential protocols must be implemented correctly.
In this report, the author discussed about commonly used network protocols that almost every
network have. To demonstrate the practical uses of those protocols, the author used the cisco
packet tracer which is an excellent network simulation application. For the inside security
and the easy of maintenance of the network, both LANs are divided in to separate VLANs
according to the company requirements. To provide additional security, AAA, Syslog, SSH
and console password are configured in to the network. To connect both networks of the two
branches, OSPF routing protocol is used by the author.
Finally, the author discussed about the testing of the network and their results along with the
Quality of Service.
7. Acknowledgement
I would like to pay my special thanks to my lecturer (of Internet Protocols and Services) Ms.
Ama Kulathilaka for giving this opportunity to do this Course work. Also I am very thankful
for educating me about Internet Protocols and Services which I did not know before the
lectures. This opportunity helped me to do researches and it gave me new knowledge to clear
my path towards to the future goals.
42
7. Appendix
1) Signed sheet of the course work
43
44
Reference List
[1] Williams, P. and Manheke, R., 2010. Small Business - A Cyber Resilience Vulnerability. [ebook]
Perth: Edith Cowan University, pp.112 - 114. Available at:
<https://ro.ecu.edu.au/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article=
1013&context=icr> [Accessed 20 April 2021].
[2] Raghavan, K., Desai, M. and Rajkumar, P., 2017. Managing Cybersecurity And E-Commerce
Risks In Small Businesses. [ebook] Houston: Department of Accounting and Finance. Texas Southern
University, pp.10 - 11. Available at: <http://ibii-us.org/Journals/JMSBI/V2N1/Publish/V2N1_2.pdf>
[Accessed 20 April 2021].
[3] Nagahawatta, R., Warren, M. and Yeoh, W., 2020. A Study Of Cybersecurity Awareness In Sri
Lanka. [ebook] Melbourne: Australian Cyber Warfare, pp.50 - 56. Available at:
<https://www.researchgate.net/profile/Ruwan_Nagahawatta3/publication/342762456_A_Study_of_C
ybersecurity_Awareness_in_Sri_Lanka/links/5f051e92a6fdcc4ca455c498/A-Study-of-Cybersecurity-
Awareness-in-Sri-Lanka.pdf> [Accessed 20 April 2021].
[4] Default. 2021. Network Protocol Definition | Computer Protocol | Computer Networks |
CompTIA. [online] Available at: <https://www.comptia.org/content/guides/what-is-a-network-
protocol> [Accessed 20 April 2021].
[5] Ssh.com. 2020. SSH Protocol – Secure Remote Login And File Transfer. [online] Available at:
<https://www.ssh.com/ssh/protocol/> [Accessed 20 April 2021].
[6] Fitzgibbons, L., 2021. What is Telnet and How is It Used?. [online] SearchNetworking. Available
at: <https://searchnetworking.techtarget.com/definition/Telnet> [Accessed 20 April 2021].
[7] cloudflare. 2021. What is the Internet Protocol?. [online] Available at:
<https://www.cloudflare.com/en-gb/learning/network-layer/internet-protocol/> [Accessed 20 April
2021].
[8] Cloudflare. 2021. What is the Internet Control Message Protocol (ICMP). [online] Available at:
<https://www.cloudflare.com/en-gb/learning/ddos/glossary/internet-control-message-protocol-icmp/>
[Accessed 20 April 2021].
[9] EfficientIP. 2021. What is DHCP and why is it important?. [online] Available at:
<https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/> [Accessed 20 April 2021].
[10] Arubanetworks.com. 2021. What Is AAA?. [online] Available at:
<https://www.arubanetworks.com/techdocs/ClearPass/6.7/Aruba_DeployGd_HTML/Content/802.1X
%20Authentication/About_AAA.htm> [Accessed 20 April 2021].
45
[11] Price Evans, I., n.d. What is Open Shortest Path First (OSPF)?. [online] Metaswitch.com.
Available at: <https://www.metaswitch.com/knowledge-center/reference/what-is-open-shortest-path-
first-ospf> [Accessed 19 April 2021].
[12] cloudflare. 2021. What is IPsec? | How IPsec VPNs work. [online] Available at:
<https://www.cloudflare.com/en-gb/learning/network-layer/what-is-ipsec/> [Accessed 19 April
2021].
[13] SearchUnifiedCommunications. 2020. What Is Qos (Quality Of Service) ? - Definition From
Whatis.Com. [online] Available at:
<https://searchunifiedcommunications.techtarget.com/definition/QoS-Quality-of-
Service#:~:text=Quality%20of%20service%20(QoS)%20refers,of%20data%20on%20the%20network
.> [Accessed 20 April 2021].

More Related Content

Similar to Network protocols study for Rythmo Studio design

IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingIJERA Editor
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...CSCJournals
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 

Similar to Network protocols study for Rythmo Studio design (15)

IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
WNA.pdf
WNA.pdfWNA.pdf
WNA.pdf
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Network protocols study for Rythmo Studio design

  • 1. 5 A study on practical uses of common Network protocols A network design for Rythmo Studio W.A Neranjan Viduranga 4/20/2021 [Network protocols are set of rules and procedures for transmitting data/information between at least two or more communication devices. Basically, they define what is communicated? How it is communicated? And when it is communicated? In this report, the author will discuss about some of the networking protocols and how to properly implement them.] Key Words: Network, Networking Protocols, VLAN, OSPF, Syslog, Cisco Packet Tracer, Router, Switch, End devices
  • 2. 6 1. Introduction The main purpose of this report is to show the practical uses of networking protocols in a real-world scenario. These protocols can increase the efficiency and the security of a network by configuring and using them in a correct manner. To demonstrate the networking protocols, the author has chosen Ethernet/LAN network due to the wide use of Ethernet/LAN in the business world. To demonstrate that in a real-world- scenario, the author has chosen the photography industry and the Rythmo Studio as the client. In this report, the author will discuss some of the networking protocols and provide a new network design for Rythmo Studio with evidence of protocol implementation in a network simulation application. 2. Literature Review New and emergent threats to small businesses and how can we manage them Patricia A H Williams et al (2010), says [1] due to the more relaxed and less controlled nature, small businesses are become the prime target for cybercrimes. Most of those cyber threats are caused by human error. It can be intentional or accidental. But both kinds of human errors can cause unimaginable harm to the business. One of the emerging cyber threats to small businesses is caused by social media usage. Due to the more relaxed nature of small businesses, employees are free to use their private social media accounts on working computers/network. The threat arises when, shared links are clicked and malwares are downloaded. This action can be intentional or accidental. But those downloaded malwares can destroy the network/system instantaneously or quietly operated in background while utilizing user bandwidth and sending sensitive data out of the business to a third party. Managing cyber threats in a small business with limited computer security knowledge and financial resources is a very difficult thing to do. Ideally, small businesses are also supposed to implement cyber security measurements according to the ISO/IEC 27002 (Information technology – Security techniques – Code of practice for information security management) like bigger businesses. But it is not possible due to the limited resources that small businesses can spend on that kind of larger projects. So, the best way to secure a small business is to address security requirements daily by monitoring the network traffic, network performance
  • 3. 7 and keeping a good and up-to-date antivirus application in their system. Apart from that, they can ensure their security by configuring a good firewall and installing an Intrusion Prevention System (IPS) to prevent outsiders from getting in to the system. Current status of network infrastructure and cyber security in small businesses Kamala Raghavan, et al (2017), says [2] almost all businesses are turning toward to cloud computing due to the large amount of benefits and lack of resources that need to implement in-house servers. Even though cloud computing can help small businesses to grow fast without having to invest huge amounts of resources for IT infrastructure and security; it can be lead to serious data breaches. By using cloud computing facilities, small businesses are exposed to the raw internet more than ever now. It increases the potential cyber threats to the business. It becomes a major problem when, those small businesses have bigger companies as their customers. By using those situations cyber criminals can get access to the major businesses through unsecured small businesses. “Target” and “Home Depot” incidents are some of the examples to that kind of situations. In those incidents cyber criminals used a smaller business which provides services to those bigger companies as the entry point to a credit card theft. Network Security threats and Awareness in Sri Lanka R.T.S Nagahawatta, et al (2020), says [3] Sri Lanka has established several laws to manage cyber security and protect data. Almost all of those laws are based on English law and international cyber security laws. Information and Communication Technology Act, Computer crimes Act, Payment Devices Frauds Act and Electronic Transactions Act are some of those acts that passed by the Sri Lankan parliament in recent years. According to the Sri Lankan CERT (Computer Emergency Response Team), in 2016, 2341 total cybercrimes have been reported. From those incidents, more than 95% incidents are social media related incidents (2200). R.T.S Nagahawatta, et al (2020), [3] in their research, collected data from 88,855 undergraduate students in order to find out the cyber security awareness among the youth of Sri Lanka. Results of that research project shows, 39% of respondents have moderate level of cyber security awareness, 30% has high level of knowledge, 9% has very high level of knowledge, 6% has very low level of knowledge and 16% has low level of knowledge about
  • 4. 8 cyber security. According to the research results, male students have more cyber security awareness compared to their female counterpart. Also, it shows, even though students have acceptable level of knowledge about cyber security, there are some knowledge gaps with new cyber threats. 3. Scenario Definition Rythmo Studio has two branches. The main branch is located in Kadawatha. It has one server, three large industrial printers and seven computers. Five of those computers are built specifically for Photo and video editing. The network Administrator and the studio manager use the remaining two computers. The second branch, which is located in Ganemulla city, also has two large industrial printers and five computers. Four of them are used by photo and video editors while the other one used by the studio (branch) manager. Currently, those two branches have two simple LANs and connected together through the internet without any protection.
  • 5. 9 Current network design Figure 1 - Current network design Network requirements for the new network design 1. The main branch network should divide in to four VLANs by separating the Admin, Server, Manager and Editing and printing Dept. 2. The second branch (Ganemulla) network should divide in to two VLANs by separating the branch manager and the editing and printing Dept. 3. Two branch networks should have a secure connection between them in order to share information and resources securely. 4. Routers should be secured using passwords and usernames. 5. Admin should be able to access the router securely through the Admin PC.
  • 6. 10 New network design Figure 2 - New network design In the new network design, the main branch network has been divided in to four VLANs. Also, the second branch (Ganemulla) has been divided in to two VLANs. To build a secure connection between two branches, VPN is used in the new design.
  • 7. 11 IP address table for Main branch (Kadawatha) Table 1 - Main branch IP address table Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN ID Admin 1 192.168.10 .16 192.168.10 .19 255.255.255.2 52 192.168.10.17 100 Studio Manager 1 192.168.10 .20 192.168.10 .23 255.255.255.2 52 192.168.10.21 200 Editing and printing 8 192.168.10 .0 192.168.10 .15 255.255.255.2 40 192.168.10.1 300 Server 1 192.168.10 .24 192.168.10 .27 255.255.255.2 52 192.168.10.25 400 IP address table for Second branch (Ganemulla) Table 2 - Second branch IP address table Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN ID Studio Manager 1 192.168.20 .16 192.168.20 .19 255.255.255.2 52 192.168.20.17 10 Editing and printing 6 192.168.20 .0 192.168.20 .15 255.255.255.2 40 192.168.20.1 20 Protocols that are used in the new network design Network protocols are set of rules and procedures for transmitting data/information between at least two or more communication devices [4]. Basically, they define the three main questions of a communication method, what is communicated? How it is communicated? And when it is communicated? The newly proposed network design, that is designed for Rythmo studio is using some of the more common protocols to communicate between departments and the two branches.
  • 8. 12 Secure Shell (SSH) SSH is a protocol that secures the remote logins from one device to another device. This protocol uses the port 22. It provides the security for the communication using strong authentication and data encryption [5]. Usually, SSH protocol used for, • Provide secured access for users • Issue remote commands • Manage network infrastructure and other mission-critical system components • Interactive and automated file transfers SSH works in Client-Server model. Therefore, the connection made by the SSH client connecting to the server (SSH). Then SSH server will send a public key to the client and it will verify the identity of the SSH server. After that they can communicate through a strong symmetric encryption and hashing algorithms to ensure the security of the connection [5]. Due to the strong security measurements of the SSH protocol, the author used SSH protocol to design the new network design for Rythmo studio instead of Telnet protocol. Telnet Telnet is a protocol that is used to connect a computer to remote computers over a TCP/IP network, using Telnet client software [6]. After connecting to the remote computer, the first computer becomes a virtual terminal to the other remote computer. So users can communicate with remote computers using the first computer. This protocol uses port 23. Same as FTP and SSH, Telnet also is an Application Layer protocol in TCP/IP model [6]. Internet Protocol (IP) IP is a protocol which has the task of delivering data packets from the source to the destination based on IP addresses. Mainly, there are two types of IP addresses [7]. 1. IP version 4: - IP version 4 addresses are in 32 bits of length. These 32 bits can be broken in to 4 groups of 8 bits (4 octets). IPv4 has 3 classes. Class-A, Class-B and Class-C. In Class-A, the first octet is the network portion and others are the host potion. In Class-B, the first two octets are the network potion. In Class-C, the first three octets are the network potion. 2. IP version 6: - IP version 6 addresses are in 128 bits of length. They can be broken in to 8 groups of 16 bits.
  • 9. 13 Both IPv4 and IPv6 have Public IP addresses and Private IP addresses. A public IP address is that you received from your ISP (Internet Service Provider) to your router. In order to access to the internet, you must have a Public IP address. A private IP address is an IP address that reserved for internal use behind a router, apart from public [7]. Internet Control Message Protocol (ICMP) ICMP is a supporting protocol in the internet protocol suite. It is used by network devices to send error messages and operational information. This protocol belongs to Internet Layer [8]. Transmission Control Protocol (TCP) TCP is a part of Internet protocol suite. We called it TCP/IP suite [7]. When someone is sending data using TCP, first it creates a connection between the source and the destination. Then it will break the large data in to small data and send it to the destination. In the destination, TCP will reassemble the data correctly and accurately. During this whole process, TCP will keep its connection live. This protocol is a Transport Layer Protocol and one of the most used protocols in digital network communication [7]. Dynamic Host Configuration Protocol (DHCP) DHCP is a protocol that is used to centrally allocate and manage TCP/IP configuration of client nodes. DHCP servers have pools of IP addresses. Instead of manually configuring hosts, we can connect a DHCP server in to the network. The DHCP server will give IPs for hosts as they need. IP addresses can be released for one time or leased for periods of time. This is also an Application Layer protocol in TCP/IP model [9]. This protocol is very useful in larger networks which can be holding large number of end devices and hosts. But in the case of Rythmo studio, the network holds limited number of end devices and hosts. So, the author used static ip configuration instead of DHCP configuration in the newly design network. Authentication, Authorization and Accounting (AAA) AAA is a collection of services, which controls the access to computer resources, enforcing policies, assessing usage and giving the needed data to bill for services [10]. To establish effective secure network management, these processes are very important. In AAA, authentication gives a method to identify the users using valid usernames and passwords. Before granting the network access to the user, AAA will compare the user
  • 10. 14 credentials with pre-configured user credentials stored in the database. If it is a match, the user will get the access to the network and if it is not AAA will deny the network access to that specific user. Authorization is a process, which is used to enforcing policies and determine type of activities/services/activities that user can access. After the authentication process, authorization will determine that, what type of access is needed for the user. In accounting process, the AAA will measure the resources and services that the user consumed during his/her network access. This accounting process is performed out through the logging of session statistics and usage information. It is used to do billing, resource utilization, capacity planning, trend analysis and authorization control. The accounting process will gather data including user’s system time and received or sent data amount during a session. In AAA, users can use Authentication alone, Accounting alone or all 3 services together. However, users cannot use Authorization alone. It always requires authentication first [10]. In the newly designed network, the author used only the authentication feature of the AAA to secure the logins. Due to the small size of the network and low security risk, a properly configured and maintained authentication mechanism will be enough to provide the security to the network. Open Shortest Path First (OSPF) Protocol OSPF is a link-state routing protocol, which acts as an Interior Gateway protocol (IGP) for the WAN (Internet). As a link-state routing protocol, OSPF configured routers exchange network topology information with their nearest neighbor routers [11]. In that way, OSPF creates a complete picture of the network topology within the every neighbor routers. When the communication begins, those shared information is used to calculate the best end-to-end path all the way to the destination by using a variant of Dijkstra algorithm [11]. Due to the complete picture of the network topology in OSPF, routers can quickly calculate the shortest, quickest and the most efficient path to deliver a packet to the intended destination. Also, because of the small scale of the newly designed network, OSPF configured routers will not have a hard time when adding or removing more routers to the routing domain in the future.
  • 11. 15 IPsec Internet Protocol secure or “IPsec” is a group of protocols that can be used to build secure connections between hosts or devices. It helps to build a secure path between devices through a public and unsecure network like internet [12]. By using IPsec, users can encrypt and authenticate IP packets. In IPsec, there are six main steps, 1. Exchanging keys for encryption and decryption purposes. 2. Breaking down the data that is intended to send to the destination and creating data packets. 3. Providing authentication for each data packet. 4. Encrypting all the data packets along with their ip headers (in tunnel mode) 5. Transmitting the data packets to the destination. 6. Decrypting the data packets in the destination. There are three main protocol used in IPsec [12], • Authentication Header (AH) This helps to ensure the sender’s trustworthy. Also it provides the details of if the data has been tempered or not. • Encapsulating Security Protocol (ESP) This helps to encrypt the IP header and the payloads of each packet. If the VPN uses the transport mode, it only encrypts the payload of packets. • Security Association (SA) This protocol helps to negotiate encryption keys.
  • 12. 16 4. Simulation To simulate the newly designed network, the author used Cisco packet tracer as the simulation application. New network design Figure 3 - new network design in CPT
  • 13. 17 VLAN configurations in Main branch router Figure 4 - VLAN Configuration in Main branch
  • 14. 18 Figure 5 - VLAN Configuration in Main branch The Main branch LAN is divided in to 4 VLANs according to the network requirements. Those VLANs can be recognizing as Admin (VLAN ID 100), Manager (VLAN ID 200), Editing and Printing Dept. (VLAN ID 300) and the Server (VLAN ID 400).
  • 15. 19 VLAN configurations in Second branch router Figure 6 - VLAN Configuration in Second branch The Second branch LAN is divided in to 2 VLANs according to the network requirements. Those VLANs can be recognizing as the Manager (VLAN ID 10) and the editing and printing Dept. (VLAN ID 20).
  • 16. 20 Switchport Trunk in Main branch switch Figure 7 - trunk configuration in main branch By using “Switchport mode trunk” command, the author allows the traffic to go through the switch in to the router and vice versa. Switchport Trunk in Second branch switch Figure 8 - trunk configuration in second branch By using “Switchport mode trunk” command, the author allows the traffic to go through the switch into the router and vice versa.
  • 17. 21 Switchport access in Main branch switch Figure 9 - switchport access in main branch In here, the author properly named all of the VLANs in the switch. Then using “Switchport access” command specified certain interfaces to specific VLANs.
  • 18. 22 Switchport access in Second branch switch Figure 10 - switchport access in second branch In here, the author properly named all of the VLANs in the switch. Then using “Switchport access” command specified certain interfaces to specific VLANs.
  • 19. 23 Static IP configuration on Main branch editing and printing Dept. PC05 Figure 11 - static ip configuration Due to the limited number of end devices in the newly designed network, the static IP configuration is used to give IP addresses to all the end devices instead of DHCP configuration where it automatically give IPs to end devices from its IP pool.
  • 20. 24 Static IP configuration on Second branch Manager’s PC Figure 12 - static ip configuration Due to the limited number of end devices in the newly designed network, the static IP configuration is used to give IP addresses to all the end devices instead of DHCP configuration where it automatically give IPs to end devices from its IP pool.
  • 21. 25 OSPF configuration on Main branch router Figure 13 - OSPF configuration In here, OSPF protocol is used to connect the inside network of Kadawatha branch (network IPs of all the VLANs) to the outside (10.10.1.0) OSPF configuration on Middle router Figure 14 - OSPF configuration In here, both the outside network portions are connected together by using OSPF protocol. OSPF configuration on Second branch router Figure 15 - OSPF configuration In here, OSPF protocol is used to connect the inside network of Ganemulla branch (network IPs of all the VLANs) to the outside (10.10.2.0)
  • 22. 26 SYSLOG configuration on Main branch router Figure 16 - SYSLOG configuration AAA configuration on Main branch router Figure 17 - AAA configuration
  • 23. 27 Console password configuration on Main branch router Figure 18 - console password SSH configuration on Second branch router Figure 19 - SSH configuration
  • 24. 28 VPN configuration (IPsec) on Main branch router Figure 20 - VPN configuration Main branch
  • 25. 29 Figure 21 - VPN configuration Main branch
  • 26. 30 VPN configuration (IPsec) on Second branch router Figure 22 - VPN configuration Second branch
  • 27. 31 Figure 23 - VPN configuration Second branch 5. Result Discussion This section is dedicated to discuss the testing results of the simulated network and Quality of Service. Quality of Service Quality of Service or QoS means, any kind of technology, which can manage network or data traffic in order to reduce packet lost, network latency and jitter on a network. QoS do that by setting priorities for special tasks and specific types of data on the organizational network [13]. QoS has specific parameters. • Packet loss
  • 28. 32 • Jitter (result of network congestion, timing drift and route changes) • Network latency • Bandwidth • Mean Opinion Score (to rate voice quality that uses a five-point scale) Using those parameters, businesses can measure their QoS quantitatively. There are three ways to implement QoS in your organization [13]. 1. Best effort – in this model, data packets receive the same level of priority. Best effort do not guaranteed to deliver packets successfully. This method is used when networks have not configured or do not support QoS. 2. Integrated services – Integrated services model reserves bandwidth along a specific path on the network. In this model, Apps communicate with the network in order to resource reservation. Then network devices manage and monitor the flow of data packets to ensure the network resources can accept those packets. Integrated services (IntServ) require IntServ supported routers and Resource Reservation Protocol (RSVP). In addition, IntServ has higher consumption of network resources and limited scalability. 3. Differentiated services – In differentiated services (DiffServ), routers and switches are configured to handle multiple classes of network/data traffic with different priorities. Those classes must be based on organizational requirements. In Rythmo studio, admin of the network can use Differentiated services (DiffServ) model as the quality of service implementing method. So, the company can prioritize, which kind of data traffic is the most important and least important in their organizational requirements. Then, they can use it to implement QoS using DiffServ model based on that organizational requirements. As an example, Rythmo studio can prioritize their processes like money transactions, Emailing and other main business processes as high priority traffic in their network. They can ban social media access in their network because that will not be a priority of the organizational requirements. Other processes like internet surfing can be categorized as the second priority of the company. In addition, Rythmo studio can monitor the traffic in their network in order to give a better service by identifying unnecessary and suspicious traffic and removing them.
  • 29. 33 Test Plan Table 3 - Test plan No: Description Expected outcome Real outcome 01 Check the connectivity between VLAN 100 and VLAN 200 4 replies 0% loss 3 replies 25% loss 02 Check the connectivity between VLAN 100 and VLAN 300 4 replies 0% loss 4 replies 0% loss 03 Check the connectivity between VLAN 100 and VLAN 400 4 replies 0% loss 3 replies 25% loss 04 Check the connectivity between VLAN 10 and VLAN 20 (second branch) 4 replies 0% loss 4 replies 0% loss 05 Testing the console password by logging in to the main branch router. With correct PW Access Granted With wrong PW Access denied With correct PW Access Granted With wrong PW Access denied 06 Testing the SSH access by logging in to the router through SSH connection from a PC. With correct PW Access Granted With wrong PW Access denied With correct PW Access Granted With wrong PW Access denied 07 Testing the AAA by logging in to the router With correct PW & user name Access Granted With wrong PW & user name Access denied With correct PW & user name Access Granted With wrong PW & user name Access denied 08 Testing the Syslog server by pinging the server through the router and checking the logs in syslog server Pinging successful (100%) and Syslog server has created the logs Pinging successful (100%) and Syslog server has created the logs 09 Testing the OSPF by pinging the Second branch from the Main branch and tracing the route. 4 replies 0% loss Successful tracing 3 replies 25% loss Successful tracing
  • 30. 34 Test cases Test case 001 Objective – Check the connectivity between VLAN 100 and VLAN 200 Description – Check connectivity using “Ping” command. C:>ping 192.168.10.22 Evidence – Figure 24 - Test 1 Status - Ping statistics for 192.168.10.22: Packets: Sent = 4, Received = 3, Lost = 1 (25% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 1ms, Average = 0ms Test case 002 Objective – Check the connectivity between VLAN 100 and VLAN 300 Description – Check connectivity using “Ping” command. C:>ping 192.168.10.5 Evidence –
  • 31. 35 Figure 25 - Test 2 Status - Ping statistics for 192.168.10.5: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 9ms, Average = 2ms Test case 003 Objective – Check the connectivity between VLAN 100 and VLAN 400 Description – Check connectivity using “Ping” command. C:>ping 192.168.10.26 Evidence – Figure 26 - Test 3 Status - Ping statistics for 192.168.10.26: Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
  • 32. 36 Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 2ms, Average = 1ms Test case 004 Objective – Check the connectivity between VLAN 10 and VLAN 20 in second branch Description – Check connectivity using “Ping” command. C:>ping 192.168.20.5 Evidence – Figure 27 - Test 4 Status - Ping statistics for 192.168.10.5: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 235ms, Average = 59ms Test case 005 Objective – Test the Console password Description – Test the console password by logging in to the Main branch router by giving the correct PW and a wrong PW Evidence –
  • 33. 37 Figure 28 - Test 5.1 Figure 29 - Test 5.2 Status – Test successful. The Console password, which is pre-configured, is needed to log in to the router. Wrong passwords are not allowed to log in to the router. Test case 006 Objective – Test the SSH Description – Testing the SSH access by logging in to the router through SSH connection from a PC by giving the correct PW and a wrong PW. C:>ssh –l Admin 192.168.20.1 Evidence – Figure 30 - Test 6.1 Figure 31 - Test 6.2
  • 34. 38 Status - Test successful. With the correct per-configured PW, local PC can access the router through the SSH connection successfully. Wrong passwords are not allowed to access the router through SSH connection. Test case 007 Objective – Test the AAA Description – Testing the AAA by logging in to the router by giving the correct PW and a wrong PW. Evidence – Figure 32 - Test 7.1 Figure 33 - Test 7.2 Status – Test successful. To log in to the router a pre-given user name and password is required. Wrong PWs and User names are not allowed. Test case 008 Objective – Test the Syslog server Description – Testing the Syslog server by pinging the server through the router and checking the logs in syslog server. Main_Branch#ping 192.168.10.26 Evidence –
  • 35. 39 Figure 34 - Test 8.1 Figure 35 - Test 8.2 Status – Test successful. Sent five 100 byte ICMP Echos to the server in 2 seconds. Success rate is 100%. All the logs can be seen in the syslog server. Round trip minimum 0ms, Average 1 ms and Maximum 2ms. Test case 009 Objective – Test the OSPF configuration Description – Testing the OSPF by pinging the Second branch from the Main branch and tracing the route. C:>ping 192.168.20.5 C:>tracert 192.168.20.5 Evidence –
  • 36. 40 Figure 36 - Test 9 Status - Ping statistics for 192.168.20.5: Packets: Sent = 4, Received = 3, Lost = 1 (25% loss), Approximate round trip times in milli-seconds: Minimum = 2ms, Maximum = 228ms, Average = 150ms Tracing route to 192.168.20.5 over a maximum of 30 hops: 1 14ms 2ms 0ms 192.168.10.17 2 0ms 1ms 0ms 10.10.1.1 3 1ms 2ms 2ms 10.10.2.2 4 0ms 6ms 1ms 192.168.20.5 Trace complete
  • 37. 41 6. Conclusion Network protocols are set of rules and procedures for transmitting data and information between at least two or more communication devices. Basically, they define what is communicated? How it is communicated? And when it is communicated? So, to be a working and successful network, essential protocols must be implemented correctly. In this report, the author discussed about commonly used network protocols that almost every network have. To demonstrate the practical uses of those protocols, the author used the cisco packet tracer which is an excellent network simulation application. For the inside security and the easy of maintenance of the network, both LANs are divided in to separate VLANs according to the company requirements. To provide additional security, AAA, Syslog, SSH and console password are configured in to the network. To connect both networks of the two branches, OSPF routing protocol is used by the author. Finally, the author discussed about the testing of the network and their results along with the Quality of Service. 7. Acknowledgement I would like to pay my special thanks to my lecturer (of Internet Protocols and Services) Ms. Ama Kulathilaka for giving this opportunity to do this Course work. Also I am very thankful for educating me about Internet Protocols and Services which I did not know before the lectures. This opportunity helped me to do researches and it gave me new knowledge to clear my path towards to the future goals.
  • 38. 42 7. Appendix 1) Signed sheet of the course work
  • 39. 43
  • 40. 44 Reference List [1] Williams, P. and Manheke, R., 2010. Small Business - A Cyber Resilience Vulnerability. [ebook] Perth: Edith Cowan University, pp.112 - 114. Available at: <https://ro.ecu.edu.au/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article= 1013&context=icr> [Accessed 20 April 2021]. [2] Raghavan, K., Desai, M. and Rajkumar, P., 2017. Managing Cybersecurity And E-Commerce Risks In Small Businesses. [ebook] Houston: Department of Accounting and Finance. Texas Southern University, pp.10 - 11. Available at: <http://ibii-us.org/Journals/JMSBI/V2N1/Publish/V2N1_2.pdf> [Accessed 20 April 2021]. [3] Nagahawatta, R., Warren, M. and Yeoh, W., 2020. A Study Of Cybersecurity Awareness In Sri Lanka. [ebook] Melbourne: Australian Cyber Warfare, pp.50 - 56. Available at: <https://www.researchgate.net/profile/Ruwan_Nagahawatta3/publication/342762456_A_Study_of_C ybersecurity_Awareness_in_Sri_Lanka/links/5f051e92a6fdcc4ca455c498/A-Study-of-Cybersecurity- Awareness-in-Sri-Lanka.pdf> [Accessed 20 April 2021]. [4] Default. 2021. Network Protocol Definition | Computer Protocol | Computer Networks | CompTIA. [online] Available at: <https://www.comptia.org/content/guides/what-is-a-network- protocol> [Accessed 20 April 2021]. [5] Ssh.com. 2020. SSH Protocol – Secure Remote Login And File Transfer. [online] Available at: <https://www.ssh.com/ssh/protocol/> [Accessed 20 April 2021]. [6] Fitzgibbons, L., 2021. What is Telnet and How is It Used?. [online] SearchNetworking. Available at: <https://searchnetworking.techtarget.com/definition/Telnet> [Accessed 20 April 2021]. [7] cloudflare. 2021. What is the Internet Protocol?. [online] Available at: <https://www.cloudflare.com/en-gb/learning/network-layer/internet-protocol/> [Accessed 20 April 2021]. [8] Cloudflare. 2021. What is the Internet Control Message Protocol (ICMP). [online] Available at: <https://www.cloudflare.com/en-gb/learning/ddos/glossary/internet-control-message-protocol-icmp/> [Accessed 20 April 2021]. [9] EfficientIP. 2021. What is DHCP and why is it important?. [online] Available at: <https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/> [Accessed 20 April 2021]. [10] Arubanetworks.com. 2021. What Is AAA?. [online] Available at: <https://www.arubanetworks.com/techdocs/ClearPass/6.7/Aruba_DeployGd_HTML/Content/802.1X %20Authentication/About_AAA.htm> [Accessed 20 April 2021].
  • 41. 45 [11] Price Evans, I., n.d. What is Open Shortest Path First (OSPF)?. [online] Metaswitch.com. Available at: <https://www.metaswitch.com/knowledge-center/reference/what-is-open-shortest-path- first-ospf> [Accessed 19 April 2021]. [12] cloudflare. 2021. What is IPsec? | How IPsec VPNs work. [online] Available at: <https://www.cloudflare.com/en-gb/learning/network-layer/what-is-ipsec/> [Accessed 19 April 2021]. [13] SearchUnifiedCommunications. 2020. What Is Qos (Quality Of Service) ? - Definition From Whatis.Com. [online] Available at: <https://searchunifiedcommunications.techtarget.com/definition/QoS-Quality-of- Service#:~:text=Quality%20of%20service%20(QoS)%20refers,of%20data%20on%20the%20network .> [Accessed 20 April 2021].