This document discusses a new network design for Rythmo Studio using various networking protocols. The author proposes dividing the main and secondary studio branches into VLANs for different departments. Key protocols discussed include SSH, Telnet, IP, ICMP, TCP, DHCP, AAA, OSPF, and IPsec. The network is simulated in Cisco Packet Tracer to demonstrate VLAN configurations for the main and secondary branch routers.
1. 5
A study on practical uses of
common Network protocols
A network design for Rythmo Studio
W.A Neranjan Viduranga
4/20/2021
[Network protocols are set of rules and procedures for transmitting data/information between
at least two or more communication devices. Basically, they define what is communicated?
How it is communicated? And when it is communicated? In this report, the author will
discuss about some of the networking protocols and how to properly implement them.]
Key Words: Network, Networking Protocols, VLAN, OSPF, Syslog, Cisco Packet Tracer,
Router, Switch, End devices
2. 6
1. Introduction
The main purpose of this report is to show the practical uses of networking protocols in a
real-world scenario. These protocols can increase the efficiency and the security of a network
by configuring and using them in a correct manner.
To demonstrate the networking protocols, the author has chosen Ethernet/LAN network due
to the wide use of Ethernet/LAN in the business world. To demonstrate that in a real-world-
scenario, the author has chosen the photography industry and the Rythmo Studio as the client.
In this report, the author will discuss some of the networking protocols and provide a new
network design for Rythmo Studio with evidence of protocol implementation in a network
simulation application.
2. Literature Review
New and emergent threats to small businesses and how can we manage them
Patricia A H Williams et al (2010), says [1] due to the more relaxed and less controlled
nature, small businesses are become the prime target for cybercrimes. Most of those cyber
threats are caused by human error. It can be intentional or accidental. But both kinds of
human errors can cause unimaginable harm to the business. One of the emerging cyber
threats to small businesses is caused by social media usage. Due to the more relaxed nature of
small businesses, employees are free to use their private social media accounts on working
computers/network. The threat arises when, shared links are clicked and malwares are
downloaded. This action can be intentional or accidental. But those downloaded malwares
can destroy the network/system instantaneously or quietly operated in background while
utilizing user bandwidth and sending sensitive data out of the business to a third party.
Managing cyber threats in a small business with limited computer security knowledge and
financial resources is a very difficult thing to do. Ideally, small businesses are also supposed
to implement cyber security measurements according to the ISO/IEC 27002 (Information
technology – Security techniques – Code of practice for information security management)
like bigger businesses. But it is not possible due to the limited resources that small businesses
can spend on that kind of larger projects. So, the best way to secure a small business is to
address security requirements daily by monitoring the network traffic, network performance
3. 7
and keeping a good and up-to-date antivirus application in their system. Apart from that, they
can ensure their security by configuring a good firewall and installing an Intrusion Prevention
System (IPS) to prevent outsiders from getting in to the system.
Current status of network infrastructure and cyber security in small businesses
Kamala Raghavan, et al (2017), says [2] almost all businesses are turning toward to cloud
computing due to the large amount of benefits and lack of resources that need to implement
in-house servers. Even though cloud computing can help small businesses to grow fast
without having to invest huge amounts of resources for IT infrastructure and security; it can
be lead to serious data breaches. By using cloud computing facilities, small businesses are
exposed to the raw internet more than ever now. It increases the potential cyber threats to the
business. It becomes a major problem when, those small businesses have bigger companies as
their customers. By using those situations cyber criminals can get access to the major
businesses through unsecured small businesses. “Target” and “Home Depot” incidents are
some of the examples to that kind of situations. In those incidents cyber criminals used a
smaller business which provides services to those bigger companies as the entry point to a
credit card theft.
Network Security threats and Awareness in Sri Lanka
R.T.S Nagahawatta, et al (2020), says [3] Sri Lanka has established several laws to manage
cyber security and protect data. Almost all of those laws are based on English law and
international cyber security laws. Information and Communication Technology Act,
Computer crimes Act, Payment Devices Frauds Act and Electronic Transactions Act are
some of those acts that passed by the Sri Lankan parliament in recent years. According to the
Sri Lankan CERT (Computer Emergency Response Team), in 2016, 2341 total cybercrimes
have been reported. From those incidents, more than 95% incidents are social media related
incidents (2200).
R.T.S Nagahawatta, et al (2020), [3] in their research, collected data from 88,855
undergraduate students in order to find out the cyber security awareness among the youth of
Sri Lanka. Results of that research project shows, 39% of respondents have moderate level of
cyber security awareness, 30% has high level of knowledge, 9% has very high level of
knowledge, 6% has very low level of knowledge and 16% has low level of knowledge about
4. 8
cyber security. According to the research results, male students have more cyber security
awareness compared to their female counterpart. Also, it shows, even though students have
acceptable level of knowledge about cyber security, there are some knowledge gaps with new
cyber threats.
3. Scenario Definition
Rythmo Studio has two branches. The main branch is located in Kadawatha. It has one
server, three large industrial printers and seven computers. Five of those computers are built
specifically for Photo and video editing. The network Administrator and the studio manager
use the remaining two computers.
The second branch, which is located in Ganemulla city, also has two large industrial printers
and five computers. Four of them are used by photo and video editors while the other one
used by the studio (branch) manager.
Currently, those two branches have two simple LANs and connected together through the
internet without any protection.
5. 9
Current network design
Figure 1 - Current network design
Network requirements for the new network design
1. The main branch network should divide in to four VLANs by separating the Admin,
Server, Manager and Editing and printing Dept.
2. The second branch (Ganemulla) network should divide in to two VLANs by
separating the branch manager and the editing and printing Dept.
3. Two branch networks should have a secure connection between them in order to share
information and resources securely.
4. Routers should be secured using passwords and usernames.
5. Admin should be able to access the router securely through the Admin PC.
6. 10
New network design
Figure 2 - New network design
In the new network design, the main branch network has been divided in to four VLANs.
Also, the second branch (Ganemulla) has been divided in to two VLANs. To build a secure
connection between two branches, VPN is used in the new design.
7. 11
IP address table for Main branch (Kadawatha)
Table 1 - Main branch IP address table
Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN
ID
Admin 1 192.168.10
.16
192.168.10
.19
255.255.255.2
52
192.168.10.17 100
Studio
Manager
1 192.168.10
.20
192.168.10
.23
255.255.255.2
52
192.168.10.21 200
Editing and
printing
8 192.168.10
.0
192.168.10
.15
255.255.255.2
40
192.168.10.1 300
Server 1 192.168.10
.24
192.168.10
.27
255.255.255.2
52
192.168.10.25 400
IP address table for Second branch (Ganemulla)
Table 2 - Second branch IP address table
Dept. Hosts Start IP End IP Subnet Mask Gateway IP VLAN
ID
Studio
Manager
1 192.168.20
.16
192.168.20
.19
255.255.255.2
52
192.168.20.17 10
Editing and
printing
6 192.168.20
.0
192.168.20
.15
255.255.255.2
40
192.168.20.1 20
Protocols that are used in the new network design
Network protocols are set of rules and procedures for transmitting data/information between
at least two or more communication devices [4]. Basically, they define the three main
questions of a communication method, what is communicated? How it is communicated?
And when it is communicated?
The newly proposed network design, that is designed for Rythmo studio is using some of the
more common protocols to communicate between departments and the two branches.
8. 12
Secure Shell (SSH)
SSH is a protocol that secures the remote logins from one device to another device. This
protocol uses the port 22. It provides the security for the communication using strong
authentication and data encryption [5]. Usually, SSH protocol used for,
• Provide secured access for users
• Issue remote commands
• Manage network infrastructure and other mission-critical system components
• Interactive and automated file transfers
SSH works in Client-Server model. Therefore, the connection made by the SSH client
connecting to the server (SSH). Then SSH server will send a public key to the client and it
will verify the identity of the SSH server. After that they can communicate through a strong
symmetric encryption and hashing algorithms to ensure the security of the connection [5].
Due to the strong security measurements of the SSH protocol, the author used SSH protocol
to design the new network design for Rythmo studio instead of Telnet protocol.
Telnet
Telnet is a protocol that is used to connect a computer to remote computers over a TCP/IP
network, using Telnet client software [6]. After connecting to the remote computer, the first
computer becomes a virtual terminal to the other remote computer. So users can
communicate with remote computers using the first computer. This protocol uses port 23.
Same as FTP and SSH, Telnet also is an Application Layer protocol in TCP/IP model [6].
Internet Protocol (IP)
IP is a protocol which has the task of delivering data packets from the source to the
destination based on IP addresses. Mainly, there are two types of IP addresses [7].
1. IP version 4: - IP version 4 addresses are in 32 bits of length. These 32 bits can be
broken in to 4 groups of 8 bits (4 octets). IPv4 has 3 classes. Class-A, Class-B and
Class-C. In Class-A, the first octet is the network portion and others are the host
potion. In Class-B, the first two octets are the network potion. In Class-C, the first
three octets are the network potion.
2. IP version 6: - IP version 6 addresses are in 128 bits of length. They can be broken in
to 8 groups of 16 bits.
9. 13
Both IPv4 and IPv6 have Public IP addresses and Private IP addresses. A public IP address is
that you received from your ISP (Internet Service Provider) to your router. In order to access
to the internet, you must have a Public IP address. A private IP address is an IP address that
reserved for internal use behind a router, apart from public [7].
Internet Control Message Protocol (ICMP)
ICMP is a supporting protocol in the internet protocol suite. It is used by network devices to
send error messages and operational information. This protocol belongs to Internet Layer [8].
Transmission Control Protocol (TCP)
TCP is a part of Internet protocol suite. We called it TCP/IP suite [7]. When someone is
sending data using TCP, first it creates a connection between the source and the destination.
Then it will break the large data in to small data and send it to the destination. In the
destination, TCP will reassemble the data correctly and accurately. During this whole
process, TCP will keep its connection live. This protocol is a Transport Layer Protocol and
one of the most used protocols in digital network communication [7].
Dynamic Host Configuration Protocol (DHCP)
DHCP is a protocol that is used to centrally allocate and manage TCP/IP configuration of
client nodes. DHCP servers have pools of IP addresses. Instead of manually configuring
hosts, we can connect a DHCP server in to the network. The DHCP server will give IPs for
hosts as they need. IP addresses can be released for one time or leased for periods of time.
This is also an Application Layer protocol in TCP/IP model [9].
This protocol is very useful in larger networks which can be holding large number of end
devices and hosts. But in the case of Rythmo studio, the network holds limited number of end
devices and hosts. So, the author used static ip configuration instead of DHCP configuration
in the newly design network.
Authentication, Authorization and Accounting (AAA)
AAA is a collection of services, which controls the access to computer resources, enforcing
policies, assessing usage and giving the needed data to bill for services [10]. To establish
effective secure network management, these processes are very important.
In AAA, authentication gives a method to identify the users using valid usernames and
passwords. Before granting the network access to the user, AAA will compare the user
10. 14
credentials with pre-configured user credentials stored in the database. If it is a match, the
user will get the access to the network and if it is not AAA will deny the network access to
that specific user.
Authorization is a process, which is used to enforcing policies and determine type of
activities/services/activities that user can access. After the authentication process,
authorization will determine that, what type of access is needed for the user.
In accounting process, the AAA will measure the resources and services that the user
consumed during his/her network access. This accounting process is performed out through
the logging of session statistics and usage information. It is used to do billing, resource
utilization, capacity planning, trend analysis and authorization control. The accounting
process will gather data including user’s system time and received or sent data amount during
a session.
In AAA, users can use Authentication alone, Accounting alone or all 3 services together.
However, users cannot use Authorization alone. It always requires authentication first [10].
In the newly designed network, the author used only the authentication feature of the AAA to
secure the logins. Due to the small size of the network and low security risk, a properly
configured and maintained authentication mechanism will be enough to provide the security
to the network.
Open Shortest Path First (OSPF) Protocol
OSPF is a link-state routing protocol, which acts as an Interior Gateway protocol (IGP) for
the WAN (Internet). As a link-state routing protocol, OSPF configured routers exchange
network topology information with their nearest neighbor routers [11]. In that way, OSPF
creates a complete picture of the network topology within the every neighbor routers. When
the communication begins, those shared information is used to calculate the best end-to-end
path all the way to the destination by using a variant of Dijkstra algorithm [11].
Due to the complete picture of the network topology in OSPF, routers can quickly calculate
the shortest, quickest and the most efficient path to deliver a packet to the intended
destination. Also, because of the small scale of the newly designed network, OSPF
configured routers will not have a hard time when adding or removing more routers to the
routing domain in the future.
11. 15
IPsec
Internet Protocol secure or “IPsec” is a group of protocols that can be used to build secure
connections between hosts or devices. It helps to build a secure path between devices through
a public and unsecure network like internet [12]. By using IPsec, users can encrypt and
authenticate IP packets. In IPsec, there are six main steps,
1. Exchanging keys for encryption and decryption purposes.
2. Breaking down the data that is intended to send to the destination and creating data
packets.
3. Providing authentication for each data packet.
4. Encrypting all the data packets along with their ip headers (in tunnel mode)
5. Transmitting the data packets to the destination.
6. Decrypting the data packets in the destination.
There are three main protocol used in IPsec [12],
• Authentication Header (AH)
This helps to ensure the sender’s trustworthy. Also it provides the details of if the data
has been tempered or not.
• Encapsulating Security Protocol (ESP)
This helps to encrypt the IP header and the payloads of each packet. If the VPN uses
the transport mode, it only encrypts the payload of packets.
• Security Association (SA)
This protocol helps to negotiate encryption keys.
12. 16
4. Simulation
To simulate the newly designed network, the author used Cisco packet tracer as the
simulation application.
New network design
Figure 3 - new network design in CPT
14. 18
Figure 5 - VLAN Configuration in Main branch
The Main branch LAN is divided in to 4 VLANs according to the network requirements.
Those VLANs can be recognizing as Admin (VLAN ID 100), Manager (VLAN ID 200),
Editing and Printing Dept. (VLAN ID 300) and the Server (VLAN ID 400).
15. 19
VLAN configurations in Second branch router
Figure 6 - VLAN Configuration in Second branch
The Second branch LAN is divided in to 2 VLANs according to the network requirements.
Those VLANs can be recognizing as the Manager (VLAN ID 10) and the editing and printing
Dept. (VLAN ID 20).
16. 20
Switchport Trunk in Main branch switch
Figure 7 - trunk configuration in main branch
By using “Switchport mode trunk” command, the author allows the traffic to go through the
switch in to the router and vice versa.
Switchport Trunk in Second branch switch
Figure 8 - trunk configuration in second branch
By using “Switchport mode trunk” command, the author allows the traffic to go through the
switch into the router and vice versa.
17. 21
Switchport access in Main branch switch
Figure 9 - switchport access in main branch
In here, the author properly named all of the VLANs in the switch. Then using “Switchport
access” command specified certain interfaces to specific VLANs.
18. 22
Switchport access in Second branch switch
Figure 10 - switchport access in second branch
In here, the author properly named all of the VLANs in the switch. Then using “Switchport
access” command specified certain interfaces to specific VLANs.
19. 23
Static IP configuration on Main branch editing and printing Dept. PC05
Figure 11 - static ip configuration
Due to the limited number of end devices in the newly designed network, the static IP
configuration is used to give IP addresses to all the end devices instead of DHCP
configuration where it automatically give IPs to end devices from its IP pool.
20. 24
Static IP configuration on Second branch Manager’s PC
Figure 12 - static ip configuration
Due to the limited number of end devices in the newly designed network, the static IP
configuration is used to give IP addresses to all the end devices instead of DHCP
configuration where it automatically give IPs to end devices from its IP pool.
21. 25
OSPF configuration on Main branch router
Figure 13 - OSPF configuration
In here, OSPF protocol is used to connect the inside network of Kadawatha branch (network
IPs of all the VLANs) to the outside (10.10.1.0)
OSPF configuration on Middle router
Figure 14 - OSPF configuration
In here, both the outside network portions are connected together by using OSPF protocol.
OSPF configuration on Second branch router
Figure 15 - OSPF configuration
In here, OSPF protocol is used to connect the inside network of Ganemulla branch (network
IPs of all the VLANs) to the outside (10.10.2.0)
22. 26
SYSLOG configuration on Main branch router
Figure 16 - SYSLOG configuration
AAA configuration on Main branch router
Figure 17 - AAA configuration
23. 27
Console password configuration on Main branch router
Figure 18 - console password
SSH configuration on Second branch router
Figure 19 - SSH configuration
27. 31
Figure 23 - VPN configuration Second branch
5. Result Discussion
This section is dedicated to discuss the testing results of the simulated network and Quality of
Service.
Quality of Service
Quality of Service or QoS means, any kind of technology, which can manage network or data
traffic in order to reduce packet lost, network latency and jitter on a network. QoS do that by
setting priorities for special tasks and specific types of data on the organizational network
[13].
QoS has specific parameters.
• Packet loss
28. 32
• Jitter (result of network congestion, timing drift and route changes)
• Network latency
• Bandwidth
• Mean Opinion Score (to rate voice quality that uses a five-point scale)
Using those parameters, businesses can measure their QoS quantitatively.
There are three ways to implement QoS in your organization [13].
1. Best effort – in this model, data packets receive the same level of priority. Best effort
do not guaranteed to deliver packets successfully. This method is used when networks
have not configured or do not support QoS.
2. Integrated services – Integrated services model reserves bandwidth along a specific
path on the network. In this model, Apps communicate with the network in order to
resource reservation. Then network devices manage and monitor the flow of data
packets to ensure the network resources can accept those packets. Integrated services
(IntServ) require IntServ supported routers and Resource Reservation Protocol
(RSVP). In addition, IntServ has higher consumption of network resources and
limited scalability.
3. Differentiated services – In differentiated services (DiffServ), routers and switches
are configured to handle multiple classes of network/data traffic with different
priorities. Those classes must be based on organizational requirements.
In Rythmo studio, admin of the network can use Differentiated services (DiffServ) model as
the quality of service implementing method. So, the company can prioritize, which kind of
data traffic is the most important and least important in their organizational requirements.
Then, they can use it to implement QoS using DiffServ model based on that organizational
requirements.
As an example, Rythmo studio can prioritize their processes like money transactions,
Emailing and other main business processes as high priority traffic in their network. They can
ban social media access in their network because that will not be a priority of the
organizational requirements. Other processes like internet surfing can be categorized as the
second priority of the company. In addition, Rythmo studio can monitor the traffic in their
network in order to give a better service by identifying unnecessary and suspicious traffic and
removing them.
29. 33
Test Plan
Table 3 - Test plan
No: Description Expected outcome Real outcome
01 Check the connectivity between
VLAN 100 and VLAN 200
4 replies
0% loss
3 replies
25% loss
02 Check the connectivity between
VLAN 100 and VLAN 300
4 replies
0% loss
4 replies
0% loss
03 Check the connectivity between
VLAN 100 and VLAN 400
4 replies
0% loss
3 replies
25% loss
04 Check the connectivity between
VLAN 10 and VLAN 20 (second
branch)
4 replies
0% loss
4 replies
0% loss
05 Testing the console password by
logging in to the main branch router.
With correct PW
Access Granted
With wrong PW
Access denied
With correct PW
Access Granted
With wrong PW
Access denied
06 Testing the SSH access by logging in
to the router through SSH connection
from a PC.
With correct PW
Access Granted
With wrong PW
Access denied
With correct PW
Access Granted
With wrong PW
Access denied
07 Testing the AAA by logging in to the
router
With correct PW &
user name
Access Granted
With wrong PW &
user name
Access denied
With correct PW &
user name
Access Granted
With wrong PW &
user name
Access denied
08 Testing the Syslog server by pinging
the server through the router and
checking the logs in syslog server
Pinging successful
(100%) and Syslog
server has created the
logs
Pinging successful
(100%) and Syslog
server has created the
logs
09 Testing the OSPF by pinging the
Second branch from the Main branch
and tracing the route.
4 replies
0% loss
Successful tracing
3 replies
25% loss
Successful tracing
30. 34
Test cases
Test case 001
Objective – Check the connectivity between VLAN 100 and VLAN 200
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.22
Evidence –
Figure 24 - Test 1
Status - Ping statistics for 192.168.10.22:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms
Test case 002
Objective – Check the connectivity between VLAN 100 and VLAN 300
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.5
Evidence –
31. 35
Figure 25 - Test 2
Status - Ping statistics for 192.168.10.5:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 9ms, Average = 2ms
Test case 003
Objective – Check the connectivity between VLAN 100 and VLAN 400
Description – Check connectivity using “Ping” command.
C:>ping 192.168.10.26
Evidence –
Figure 26 - Test 3
Status - Ping statistics for 192.168.10.26:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
32. 36
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 2ms, Average = 1ms
Test case 004
Objective – Check the connectivity between VLAN 10 and VLAN 20 in second branch
Description – Check connectivity using “Ping” command.
C:>ping 192.168.20.5
Evidence –
Figure 27 - Test 4
Status - Ping statistics for 192.168.10.5:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 235ms, Average = 59ms
Test case 005
Objective – Test the Console password
Description – Test the console password by logging in to the Main branch router by giving
the correct PW and a wrong PW
Evidence –
33. 37
Figure 28 - Test 5.1
Figure 29 - Test 5.2
Status – Test successful. The Console password, which is pre-configured, is needed to log in
to the router. Wrong passwords are not allowed to log in to the router.
Test case 006
Objective – Test the SSH
Description – Testing the SSH access by logging in to the router through SSH connection
from a PC by giving the correct PW and a wrong PW.
C:>ssh –l Admin 192.168.20.1
Evidence –
Figure 30 - Test 6.1
Figure 31 - Test 6.2
34. 38
Status - Test successful. With the correct per-configured PW, local PC can access the router
through the SSH connection successfully. Wrong passwords are not allowed to access the
router through SSH connection.
Test case 007
Objective – Test the AAA
Description – Testing the AAA by logging in to the router by giving the correct PW and a
wrong PW.
Evidence –
Figure 32 - Test 7.1
Figure 33 - Test 7.2
Status – Test successful. To log in to the router a pre-given user name and password is
required. Wrong PWs and User names are not allowed.
Test case 008
Objective – Test the Syslog server
Description – Testing the Syslog server by pinging the server through the router and checking
the logs in syslog server.
Main_Branch#ping 192.168.10.26
Evidence –
35. 39
Figure 34 - Test 8.1
Figure 35 - Test 8.2
Status – Test successful. Sent five 100 byte ICMP Echos to the server in 2 seconds. Success
rate is 100%. All the logs can be seen in the syslog server. Round trip minimum 0ms,
Average 1 ms and Maximum 2ms.
Test case 009
Objective – Test the OSPF configuration
Description – Testing the OSPF by pinging the Second branch from the Main branch and
tracing the route.
C:>ping 192.168.20.5
C:>tracert 192.168.20.5
Evidence –
36. 40
Figure 36 - Test 9
Status - Ping statistics for 192.168.20.5:
Packets: Sent = 4, Received = 3, Lost = 1 (25% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 228ms, Average = 150ms
Tracing route to 192.168.20.5 over a maximum of 30 hops:
1 14ms 2ms 0ms 192.168.10.17
2 0ms 1ms 0ms 10.10.1.1
3 1ms 2ms 2ms 10.10.2.2
4 0ms 6ms 1ms 192.168.20.5
Trace complete
37. 41
6. Conclusion
Network protocols are set of rules and procedures for transmitting data and information
between at least two or more communication devices. Basically, they define what is
communicated? How it is communicated? And when it is communicated? So, to be a working
and successful network, essential protocols must be implemented correctly.
In this report, the author discussed about commonly used network protocols that almost every
network have. To demonstrate the practical uses of those protocols, the author used the cisco
packet tracer which is an excellent network simulation application. For the inside security
and the easy of maintenance of the network, both LANs are divided in to separate VLANs
according to the company requirements. To provide additional security, AAA, Syslog, SSH
and console password are configured in to the network. To connect both networks of the two
branches, OSPF routing protocol is used by the author.
Finally, the author discussed about the testing of the network and their results along with the
Quality of Service.
7. Acknowledgement
I would like to pay my special thanks to my lecturer (of Internet Protocols and Services) Ms.
Ama Kulathilaka for giving this opportunity to do this Course work. Also I am very thankful
for educating me about Internet Protocols and Services which I did not know before the
lectures. This opportunity helped me to do researches and it gave me new knowledge to clear
my path towards to the future goals.
40. 44
Reference List
[1] Williams, P. and Manheke, R., 2010. Small Business - A Cyber Resilience Vulnerability. [ebook]
Perth: Edith Cowan University, pp.112 - 114. Available at:
<https://ro.ecu.edu.au/cgi/viewcontent.cgi?referer=https://scholar.google.com/&httpsredir=1&article=
1013&context=icr> [Accessed 20 April 2021].
[2] Raghavan, K., Desai, M. and Rajkumar, P., 2017. Managing Cybersecurity And E-Commerce
Risks In Small Businesses. [ebook] Houston: Department of Accounting and Finance. Texas Southern
University, pp.10 - 11. Available at: <http://ibii-us.org/Journals/JMSBI/V2N1/Publish/V2N1_2.pdf>
[Accessed 20 April 2021].
[3] Nagahawatta, R., Warren, M. and Yeoh, W., 2020. A Study Of Cybersecurity Awareness In Sri
Lanka. [ebook] Melbourne: Australian Cyber Warfare, pp.50 - 56. Available at:
<https://www.researchgate.net/profile/Ruwan_Nagahawatta3/publication/342762456_A_Study_of_C
ybersecurity_Awareness_in_Sri_Lanka/links/5f051e92a6fdcc4ca455c498/A-Study-of-Cybersecurity-
Awareness-in-Sri-Lanka.pdf> [Accessed 20 April 2021].
[4] Default. 2021. Network Protocol Definition | Computer Protocol | Computer Networks |
CompTIA. [online] Available at: <https://www.comptia.org/content/guides/what-is-a-network-
protocol> [Accessed 20 April 2021].
[5] Ssh.com. 2020. SSH Protocol – Secure Remote Login And File Transfer. [online] Available at:
<https://www.ssh.com/ssh/protocol/> [Accessed 20 April 2021].
[6] Fitzgibbons, L., 2021. What is Telnet and How is It Used?. [online] SearchNetworking. Available
at: <https://searchnetworking.techtarget.com/definition/Telnet> [Accessed 20 April 2021].
[7] cloudflare. 2021. What is the Internet Protocol?. [online] Available at:
<https://www.cloudflare.com/en-gb/learning/network-layer/internet-protocol/> [Accessed 20 April
2021].
[8] Cloudflare. 2021. What is the Internet Control Message Protocol (ICMP). [online] Available at:
<https://www.cloudflare.com/en-gb/learning/ddos/glossary/internet-control-message-protocol-icmp/>
[Accessed 20 April 2021].
[9] EfficientIP. 2021. What is DHCP and why is it important?. [online] Available at:
<https://www.efficientip.com/what-is-dhcp-and-why-is-it-important/> [Accessed 20 April 2021].
[10] Arubanetworks.com. 2021. What Is AAA?. [online] Available at:
<https://www.arubanetworks.com/techdocs/ClearPass/6.7/Aruba_DeployGd_HTML/Content/802.1X
%20Authentication/About_AAA.htm> [Accessed 20 April 2021].
41. 45
[11] Price Evans, I., n.d. What is Open Shortest Path First (OSPF)?. [online] Metaswitch.com.
Available at: <https://www.metaswitch.com/knowledge-center/reference/what-is-open-shortest-path-
first-ospf> [Accessed 19 April 2021].
[12] cloudflare. 2021. What is IPsec? | How IPsec VPNs work. [online] Available at:
<https://www.cloudflare.com/en-gb/learning/network-layer/what-is-ipsec/> [Accessed 19 April
2021].
[13] SearchUnifiedCommunications. 2020. What Is Qos (Quality Of Service) ? - Definition From
Whatis.Com. [online] Available at:
<https://searchunifiedcommunications.techtarget.com/definition/QoS-Quality-of-
Service#:~:text=Quality%20of%20service%20(QoS)%20refers,of%20data%20on%20the%20network
.> [Accessed 20 April 2021].