SlideShare a Scribd company logo
1 of 70
2014
Computer Networks
PROTOCOLS & DESIGN
Assignment 1
699434 / Rebecca Patient
699434/CMPRPATI
Content
Content...........................................................................................................................2
Word Count: 4000
Computer Networks
2
699434/CMPRPATI
Introduction
A proposed graphical network diagram with comparative network topology;
Tree and star were designed as possibly alternatives for site 1 design of the
city wide network. Analysis of physical media and network components has
been incorporated to justify decisions.
IP addressing for the main four sites is assigned to the diagram and
investigating TCP and UDP protocols to be applied when implementing
network applications. Finalise with summarising.
Findings
A full working design was created for the commercial company and
demonstrates all for sites across the city built and provision of connectivity
between the sites and includes connection to the internet. In more detail site
1 has been developed to include 5 departments; Human Resources, Finance,
Technical Support, Sales and Marketing.
Collision Domain
The collision domain is part of the network where data packets are sent using
Ethernet or Fast Ethernet devices and connected by hubs or repeaters which
can collide and cause loss of packets. One device/node has the ability to
transmit within the collision domain. The hub is contained in the physical layer
and is unable to recognize Ethernet frame or protocols.
When devices / nodes share an Ethernet / fast Ethernet local area network
using CSMA/CD (Carrier Sense Multi Access / Collision Detection) rules in
relation to the same collision domain means that when a collision happens, all
who are on the network will be affected and suffer losing data packets i.e.
emails.
3
699434/CMPRPATI
It is easier to not use hubs instead implement multi-switches which act as a
bridge can fully understand the Ethernet frame or protocols. In this instance
data packets will be forwarded and received to the correct port on the specific
multi-switch. Using the multi-switch allows for the designed network to splits
into multiple collision domains and less complicated when expanding because
it avoids any restrictions placed on the network.
Broadcast Domain
A broadcast domain is different to the collision domain it is processed by a
multi-switch and data packets are sent out to every port. The switch is a single
broadcast domain. All devices / nodes connected would receive a broadcast
message generated by any of the devices connected to the network using the
multi-switch. Consideration of 3 to 4 multi-switches which will be connected
across the city would cause unneeded problems.
Using VPN it would be better to implement individual single ports. Allowing all
traffic to be separated and configuration of specified numbers associated to
each device / node. This means traffic generated in site 1 can only be
forwarded within site 1. No crosses traffic to other sites is permitted. This is
why IP addresses across the sub network will be different for traffic to
recognise devices / nodes.
The router is the border control to stop broadcasts moving around the whole
network. Traffic will require being received to other sites. Using the router on
the VPN will be able to recognise specific sub network and will find the correct
pathway to another sub network and send the data packets to the correct
device / node.
The difference between collision domain and broadcast domain are the
switches and routers. When designing the network this will make it simpler to
recognise will is to developed for data packets to communicated across the
4
699434/CMPRPATI
city wide network. The collision is more possible as is lessens the potential for
packets colliding.
Whereas broadcast domains are to locate and define where broadcasts are
being sent to. It is possible to use combination and the graphical design in
Figure 3 illustrates this point because both routers and multi-switches have
been realised.
Physical Media
A wireless connection is to be installed to run alongside the VPN network.
There may be some elements requiring CAT5 or CAT6 for an Ethernet
connection, as a back-up system in each site. Making this more of a full proof
way to ensure datagram’s are transmitted throughout the network and no
down time occurs to any of the sites or sun networks if connectivity issues
arise.
The Remote access VPN will connect users remotely via an enterprise
network. Workstations and all other devices will connect using an access
circuit; cabling, DSL or wirelesses to the ISP (internet service provider) for
example BT or Virgin but depends on cost to install.
Using a client-model for the company (Figure 3) software applications
installed onto the workstations will have a built-in encrypted tunnel from all
sites running to the ISP using the Internet Security Protocol (IPSec), with
Layer 2 Tunnelling Protocol, or use point to point Tunnelling Protocol(PPTP).
Authentication will be required on the network for all users to login because it
will be a protected network which runs in conjunction with the ISP and
internet. During implementation an encrypted tunnel will be built connecting
the sites VPN router or concentrator.
5
699434/CMPRPATI
There are many servers which could be installed such as TACAS or RADIUS
authentic all users on the remote network. Allowing all employees,
management and partners to gain specific rights and differing levels of access
to the company network; for example a partner would have a higher grade
access than that of a receptionist for security and information assurance.
On completion remote users will then be authenticated onto the local
Windows domain Server, UNIX server or other mainframe hosts which are
available on search of the internet for costing and dependant on requirement
of the client. These hosts will have their own network account which can be
added to the VPN with simple login details.
Disadvantage’s to this mainly comes down to security ISP is less secured but
cost wise is more advantageous for company requirements. A client initiated
frame is better due to encryption and tunnel from which it is built from the ISP
side to the company VPN router or VPN concentrator. The tunnel itself will be
built using L2TP (Layer 2 Tunnel Protocol) or L2F (Layer 2 Forwarding)
Extranet
This type of VPN connects the departments within the company network;
operated by building a secure VPN connection from the department’s router to
the company VPN router or concentrator. Tunnelling in this instance uses
more specific tunnelling protocol which is functionally dependant on if there is
a router or remote dial-up connection.
There are options for a router connected extranet VPN which are classified as
IPSec or the Generic Routing Encapsulation (GRE). The dial-up connection
for extranet will also use and utilise L2TP or L2F.
Intranet
6
699434/CMPRPATI
Similar to the extranet VPN, the intranet VPN is a separate network and
connects all offices within the company using the secure network and same
processes of IPSec and GRE due to the tunnelling protocols. A front screen
on workstations allows all users on the network to connect anywhere within
the company, with use of the good old login and password.
There are three elements to IPSec better known as 3DES encryption, the IKE
Key exchange authentication and MD5 route authentication, by providing
authentication, authorisation and most importantly confidentiality.
Network Topology
The network topology is the logical layout for non-commercial / home /
business / education/ scientific / military / government system using
connected devices. Designing a network requires planning and understanding
of how devices communicate and are connected on a local area network
(LAN) and a wide area network (WAN). There are different types of topology;
Bus, Ring, Mesh, Star and Tree.
The company will be using a star topology for the VPN. This can be created
by using hosts remotely which connects through a VPN concentrator (or
better known as the central point). VPN concentrator will create the secure
tunnel to the individual hosts.
For example, if the reception communications to the researchers, data sent
from reception will pass through the VPN and on the researcher host. The
concentrator is able to maintain and support multiple connections. A tunnel is
found and secured to each of the chosen remote hosts.
Figure 1: Tree Topology Figure 2: Star Topology
7
699434/CMPRPATI
There is only one real problem with using the star topology if both
workstations are in close proximity they still need to use the central point to
transfer information. Figure 2 clearly shows the configuration is centralised.
This leads to maintenance carried singularly and minimises the effort or
requirement of an IT technician. With this ease it also incorporates single
point control, access and finance.
If the central point is turned off or broken, means a back-up system or a
second central point would be best kept in the server rooms to minimise down
time for the business. Also, if there is failure on individual ports the network
will keep running due to single port failure. Power of processing of the
concentrator for new connections is sectioned. There is no communication
between hosts due to the central point.
The tree topology shown in Figure 1 is a configuration of both the bus and star
and the most applied type of network for set-up and implementation and
connects all different star networks together. In this scenario the switch is
device connecting the LAN to WAN. Variant of a Tree is the Hybrid topology
8
699434/CMPRPATI
and can hold varying physical structures and connected using a single back
bone channel.
The star topology is more simplified and each device uses a point-to-point link
to the central controller named “Hub-PT”, this acts as the interchange point for
packets to exchange across the network. Traffic is minimal because it is non-
direct to all devices, transmission happen only through the hub itself. A device
is able to send data to one or more devices by passing it through the hub and
relay the data to specified devices on the network.
Strengths of the tree it is quick and simply to and more devices such as
another hub. The network can be separated for isolation purposes and priority
communications are allowed between different devices. There is also no
queuing for any data packets which are time sensitive. Weaknesses mean
distance of signal is increased. Cabling increases cost and if a hub is faulty all
connections are lost due to network being down.
Network Components
The VPN infrastructure will require the following network components to be
installed across the whole network:
• 30 Laptops X 4.
• 2 Printers X 4.
• 1 Router X 4.
• 1 Multi-Switch X 4h.
• 1 Server X 4.
• 1 Linksys (Remote access point for clients and use of classless IP
addresses).
• Workstations; 33-Sales, 40-Finance, 38-Human Resources, 26-
Technical Support and 40-Marketing X 4
9
699434/CMPRPATI
Inclusion of multi-switches, routers, and servers will be considered in the
implementation of the solution. An ISP provider would also need to research
for the best deal for example BT Business Hub. Perhaps, the ISP could
provide cost effective advantage by adding Hosting, Domain Name and
Emailing service.
Applications
VPN can hold many applications on its network. The need to be tied to a desk
is also long gone with advancements in technologies, software and devices
the possibilities are endless but in other ways. Technology can be too far
advanced and not be able to cope with its supported applications.
For example, Windows 8, Microsoft was amazed with its own innovation that it
forgot about its users and how it would be applied. They had to go back to the
drawing board and reconfigure it which is why 8.1 versions were released.
Users wanted and missed the original features of windows such as the tool
bar. Business and internet needs have automatically changed with these
advancements.
Including the laptop is not a primary device which would now be how users
would connect to the internet and be on the move. The smart phone and
tablets are the new in thing and are fully integrated into society.
Users are completely tuned in and consume internet data through these new
devices due to the marvellous innovation of technologies. It is on this point
that businesses should be concerned with private and public privacy, online
security, and protection using WI-FI hotspots. It is essential that a VPN is
applied when in these places or even at work.
VPN Apps
10
699434/CMPRPATI
Microsoft does hold the market where these apps are concerned. Blackberry
did try and take over the market but the public didn’t take to it and is still trying
to break in Microsoft’s share. There are other competitors who have managed
to Apple with the Idevice hardware operating IOS software and Google with its
Android software.
IOS Apps
It’s true the VPN space has only been supportive towards IOS and Android
which is more of the clear champion than Apple; Apple not allowing the
OpenVPN on any IOS device which is their downfall. They believe that PPTP
and L2PT protocols are enough to support IOS. Apple soon changed this and
gave permission for OpenVPN connect to be used and allowing connection to
an OpenVPN server with use of standard OpenVPN CA certificates.
Android Apps
The play store uses the OpenVPN which permits any OpenVPN service to be
configured on Android devices. In return VPN providers now release Android
apps for their support of the network. Free Android VPN apps are available
(1).
Other Apps
There are many VPN apps ready available on the internet. One of these is the
Speedtest.net app and can run on the IOS and Android. It checks
performance and can be downloaded direct to any device such as a phone or
tablet.
Scalability
The company is growing to a point where advancements of working form one
office is no longer a valid solution for the business. All employees,
11
699434/CMPRPATI
management, partners require a secure way to access resources on the
network via both onsite and offsite locations.
A dial-up remote access server would not meet the requirements of the
business. Adding modems to a network to cope with capacity and even
mounting financial costs is an issue to which the solution does not require.
The best way forward is to implement the VPN, it allows for the business to
grow without the requirement of taking out the existing network or perhaps
remodelling. This is why scalability is important to look at and make it cost-
effective and scalable from the start.
Installation of devices
Hardware and software devices connected to the network are demonstrated
on the concept diagram Figure 3; Specifics are as listed below:
Workstations
All workstations will be connected and assigned IP addresses specific to area.
All employees will be given their own login and password names which gives
a feeling freedom and owning their specific stations whilst working and space.
Printers
Two printers will be connected and shared accordingly in site 1. Due to the
volume of employees and workload, there is more need to manage
documentation. At present it is a smaller undeveloped site which does have
potential for expansion and could possibly include more printers later on.
12
699434/CMPRPATI
The VPN does allow the system to connect and work in the same way
seamlessly even if not in the same location as it. Known as printer sharing,
including wireless connection communication can happen. Allowing users to
print documents on machines located across town or country.
This is carried out by using the built-in printer sharer software. This operation
can work on any VPN, regardless of commercialism or using a free web
application. Naming is essential, and clicking the right criteria is needed.
Sending clients personal data to a different office is not a good idea and
waste of resources.
Laptops
Introduction of laptops to departments will allow for them to work away from
the office but still be connected to the network on a remote access
connection. However, this may not be required with free WIFI the connection
may not be necessary.
Multi -Switches
The choice to use Switch VPN application gives unique algorithms which are
a preventive measure against hackers and sniffers. They are compatible for
using with Windows, Mac, Linux, IOS Android, and DD-WRT routers.
Operating and by creating a virtual router which performs IP routing between
multi virtual hubs on the VPN server. This allows for layer 3 between Virtual
hubs sections via operating out the IP routing which would be in accordance
with the Administrator.
Servers
13
699434/CMPRPATI
Servers can be added to the VPN and will also feature which allow solicitors
to use a login server and as router server for the network. Installation and
activation will be applied by Windows VPN. This is carried out before users
can log into the network from a VPN session. A VPN session is established
via the internet, allowing users to log onto the office network from anywhere –
home or away.
Firewalls
The firewall uses packet filtering to give permission or non-permission for
traffic flow. This can be applied through specific types of network traffic. The
IP packet filtering system allows for precise what traffic is to transport through
the firewall. It is essential for filtering traffic via connecting to private intranets
and onto the internet and vice versa.
Looking at VPN and Firewalls, analysis shows there are two methods for
applying both the VPN and firewall together (2):
• VPN already has a connection to the internet and the firewall is in the
middle of the server and intranet, acting like a doorway requiring
permissions to pass through.
• The firewall is interconnected to the internet and VPN server, the VPN
server is in between the firewall and intranet.
Cloud
VPN permits access to be extended to be able to access from remote
locations. Using a Gladinet Cloud server for example, any device can be
added and used securely with the need to use the VPN. Allowing employees
to become more productive and focused on the job in hand than trying access
IPSec/VPN.
14
699434/CMPRPATI
BT Business Hub
This hub is designed to operate with a whole range of VNP solutions. The
main reason why it would be best suited to the Solicitors solution. It is well
known brand and takes into consideration line rental, broadband and domain
hosting.
In more detail it allows for (3):
• Outbound VPN client Connections
• Inbound connections to local VPN server
VPN Server & Appliance
The Windows Server and Windows Server 2003 have built in VPN server
function. Using software firewalls. For example, Microsoft ISA Server, Check
Point and Symantec Enterprise Firewall do include built in VPN gateway
function.
There are other variations which act as alternatives to the normal solution
which are dedicated VPN appliance or VPN contractors and can be found on
the internet - Cisco, Shiva, Citrix, AEP Networks, Evidian (TrustWay).The
provision of a gateway and operations are given by firewall appliances which
are Cisco, SonicWall, WatchGuard, Netscreen, Nokia (based on Check
Point).
Website
The company would be better to pay for a web hosting company, to create a
front end website for its business. Allowing site 1 to be the Host Identity
15
699434/CMPRPATI
Protocol; permits the IP network to recognise the business by giving it a
generated Domain Name. All that would be required is to configure the
workstations. There is support for varying machines and devices which
include iPads, Android, Windows and Macs.
Benefits include being able to access sites such as Facebook, Twitter and
Flickr. Not only is this access to streaming and watching BBC iPlayer also
attainable. Installation would only take minutes but with a larger network
perhaps a little longer with checking that all configuration settings are correct
before going live.
Email
The best way to set up a pop Email on a VPN server would be to use a
Microsoft server which offers a routing and remote access application on its
software. It has a VPN service that would enable a private encrypted
connection whilst using the internet. Allowing the server to also host the
terminal; using a DSL as the high speed service provider which would require
the email. The easiest way would be to configure the POP and then the server
could use both.
Which to choose from?
Use of turn-key appliances does make installation easier and to deploy it.
Limitations do exist with how many connections can be supported. Leading to
the fact of dealing with upgrading of software is harder when extra users are
required on the network. Adding hardware to cope with the eventuality is the
quickest option but may not by the best.
Running a VPN server on a normal network operating system with a standard
server, more RAM can be added, the processor upgraded and the network
16
699434/CMPRPATI
interface cards to change. Innovating and upgrading the hardware will add
increased capabilities without requirement of buying new devices.
Performance & Fault Management
Requirements for a fast visible network service with inclusion of planning are
necessary. Finding faults and detecting issues is a major part of the
management system. Include full handling of network management and
equipment. This is important to enable and differentiate form other companies
by offering a high value service to customers and clients.
Leveraging network based applications ensures the endless capabilities and
pre integrate software to be compatible and give a full and final solution to
scalability with minimal fuss and financial constraints.
Throughput deals with how much traffic is transferred from one location to
another within a selected time. Using to measure the performance of hard
drives and the RAM; including the internet and the connections the network
uses.
Network Manager
This a software program which is to help understand and make it easier to
use the computer network on operating systems such a Windows or Linux –
based systems. There are two components of the utility:
1. Network Manager itself – the software manages all connections and
sends reports about network changes.
2. The user interface changes dependent on what is being used. For
example, Shell, KDE Plasma Workspaces and Cinnamon.
Mobile broadband configuration is in development and older versions were
first developed in April 2008. This allowed for mobiles to also be configured in
a more relatively easy process. It basically is a set of tools which make
17
699434/CMPRPATI
networking straight forward. Whether this be through the WI-FI, Ethernet,
bond, and bridge, 3G or Bluetooth..
Integration of applications gives power and flexibility to the network manager.
It provides facilities for other apps such as browsers, client emails, or system
services making its user aware of its status i.e. online or offline.
Line Utilisation
Ensuring the line is utilised to its full capacity would be to look at the full line
utilization and CPU utilization. An application called MTRG is the Multi Router
Traffic Grapher. This is a tool which can monitor the traffic load on the links. It
is free under the GNU terms (General Public License).
It can generate a HTML page displaying images that provide a live visual
representation of the company’s traffic. However, there is another way to look
how the network is being utilized is by logging onto the router and use “show
interface serial x” command, which allows to look at the interface load.
User Response Times
Using a remote user with a VPN client can bring up some issues of lost
connection from the main office or opening documents takes a long to open.
Attaching laptops to the domain also can cause disruption due to trafficking. It
is essential that there are enough logon caches to support the growing VPN
solution.
If at any time the VPN becomes fragmented it could cause some really
problematic errors which could take time solve, which means the network will
be slow but once everything is resolved runtime should be back to normal.
Getting users to ping the buffer size which with Microsoft is around 1500 but
situations require 1400 drop to avoid problems arising when connecting via
ISP and the network.
18
699434/CMPRPATI
Configuration of network
The configuration of the network will be using a VPN. The Virtual Private
Network allows for an installation of a secure network around 1000 devices –
workstations, printers, servers, switches and possible inclusion of laptops by
creating a physical network.
The VPN will be built on top of the existing network infrastructure, using a
simple level which will have the requirement of the L2TP to binding VPN data
packets into datagram’s and then using IPSec to encrypt the data packets.
VPN means a virtual way of connecting a network as it does not require
additional physical devices. Private access is gained to the network,
controlled and its traffic is encrypted. Clients can then connect to the available
network service.
The company is best suited to this solution they will be provided with access
to LAN (Local Area Network) resources to remote users being connected to
entrusted public networks which configure a VPN Gateway.
Gateway will control access to all resources on the company’s private
network. Management will be given remote access that can then connect to
the VPN gateway using a public interface or website once it has been
authenticated, partners will be able to access private resources not seen by
the other users on the network.
Ensuring all traffic in between the workstations and company network will be
encrypted and could possible include a special client-side server which is a
part of the VPN gateway package. There is room for configuration of a peer-
to-peer, this basically means clients are configured with sharing capabilities
via VPN configuration. This type of network can only exist when two or more
peers are running which will be a future development.
19
699434/CMPRPATI
User Access
Creating a VPN between the networks will require an address group system
which will represent the local network and the address for remote network.
Creating an address object for each sides of the VPN and then add to the full
group.
It is essential that remote and local address groups are carried out and
maintained accordingly. SonicWall is a good piece of software which allows
this to happen. Otherwise an individual VPN tunnel may be required:
 Local group = 142.212.182.0 - 255.255.255.0
Remote group = 142.212.182.9 - 255.255.255.0
Using the same peer public IP address means a separate tunnel for each
subnet would be required communicate accordingly. The initial VPN lan-lan
installation should permit a mask or default class b mask. There may be
space for a supernet mask or summarization mask.
Graphical Network Diagram
The final concept design for the companies VPN solution clearly
demonstrates how all 4 sites with sub networks and departments will be set-
up and implemented across the city. It is a good way to keep all data and
personal information safe whilst using a public network called WIFI with
remote access.
Figure 3: Company VNP network:
20
699434/CMPRPATI
Time taken to design a full proof network and would fully function would take
around three weeks; with analysis of users, employees and proposed outline
of the perimeters of the implementation. Looking at the design it was decided
to colour code each department and give it a naming scheme to make it
easier to look back and reference where errors or maintenance work could
possibly be needed.
It clearly shows firewalls, internet connection and communication to and from
each office. Remote access for laptops, PDA’s and tablets. There is a
safeguard of firewalls within the routers but extra software is to be provided as
a secondary security measure. Due to the nature of the work all employees in
each department will be undertaking training, all work stations will require a
high-speed internet connection.
A levelling system will also be required looking at the aspect of different roles
and trust issues as respect of the office admin would have the same rights or
privacy policies as those of management.
For example, a simple way to deal with is would be to have different partial
drive areas:
 (C :) = Human Resources and IT Drive Space
 (P :) = Management Drive Space
21
699434/CMPRPATI
 (E :) All other employees Drive Space
Shared storage space will also allow all users to gain access to files and other
relevant information. Each staff member will have a personal account which
will allow them to login to any work station in both offices.
Address Allocation
An IP addressing system was assigned to the router; computer and or devices
(end system). Human errors were common and problems difficult to resolve
due to time and lack of realising where faults happen. Auto configuration is
mainly used but IP’s can still be manually designated and in this case the IP
addresses have been assigned manually to devices on the network.
Comparing to technologies in the 80’s; a telephone number was used as an
IP address and could identify the caller. This was defined as BOOTP
(Bootstrap Protocol) it is the first transmission control protocol / internet
protocol (TCP/IP) network configuration. It was invented to prevent requiring
to manually assigning IP addresses.
IP Address Design
Creation of the IP addressing table for the city-wide network over 4 sites,
including showing 4 subnets is demonstrated in Figure 4. 4,000 hosts were
equally divided across the 4 sites. In more detail of a further two tables are
included in Figure 5 and 6 showing implementation of IP addresses being
assigned to devices and named interfaces to correlate with the VPN design
network.
Remote access to the company site will allow for IP’s to be assigned to
devices and clients will be able to connect on and off the website application
22
699434/CMPRPATI
by acquiring these IP addresses when using the company web page. Once a
client has finished, the IP will be reassigned to another device.
A classless IP address block was formed from the base IP address:
124.212.128.0 and calculated proof to support the evidence of the information
in tables are provided below:
• IP base address: 142.212.128.0
• Sub network: 255.255.0.0/16
• Address Class type: Class B (128.0.x.x) to (192.255.x.x), this is a
classful IP address.
• Network - sub networks = 4
• Variable Length Subnet Mask (VLSM) = 255/255/192/0.
Sub netting:
1. Classless Inter Domain Routing (CIDR) Prefix = 18.
2. Max hosts/subnet = 16382.
3. Max subnets = 65536.
4. Bits for sub netting = 2.
5. Bits for network = 16.
6. Bits for hosts in subnets = 14.
Two layers on network; Layer 1 will deal with the collision domain. If there are
for example 24 interfaces on the multi-switch then 24 collision domains will be
created. This will be if all interfaces are connected to the network. Layer 2 is
the broadcast domain and allows the multi-switch to be faster at transmitting
communications over the network using:
• Network ID = 142/212/0/0.
• Network Broadcast = 142/212/0/255.
Splitting the IP addresses was derived by the following calculation:
23
699434/CMPRPATI
1. 4000 hosts / 4 sites = 1000 hosts for each site.
2. 1000 hosts were divided up by the amount of devices to be set-up:
• 30 Laptops.
• 2 Printers.
• 1 Router.
• 1 Multi-Switch.
• 1 Server.
• 1 Linksys (Remote access point for clients and use of classless IP
addresses).
• Workstations; 33-Sales, 40-Finance, 38-Human Resources, 26-
Technical Support and 40-Marketing.
In total 212 hosts assigned to the network. This was implemented as a failsafe
in case the internet connection was lost, the network could still function and
vice versa.
388 hosts are still available to be assigned when the company grows and
would like to expand; capability is preinstalled into the design for all sites to
become interchangeable.
Figure 4: IP Addressing Table
Network Sub network ID Host IP Range (Start – End Number)
1 142.212.0.0 142.212.0.1 - 142.212.63.254
2 142.212.64.0 142.212.64.1 - 142.212.127.254
3 142.212.128.0 142.212.128.1 - 142.212.191.254
4 142.212.192.0 142.212.192.1 - 142.212.255.254
24
699434/CMPRPATI
An IP addressing table was devised to assign IP addresses to specific
devices and location on the network. Ensuring correctness and error free
handling of the VNP network and using a naming scheme – Figure 5,
allowed for all devices to be accounted for and IT technical support to resolve
issues with understanding where a problem may lay.
Figure 5: IP addressing sample table for Site 1, using network 3 with sub
network ID 142.212.128.0 from Figure 4:
IP Addressing Table
Site 1
Devic
e
Interface IP Address Depart Login Passwo
rd
Shar
e
Grou
p
Domai
n
Comp HR 142.212.128.
14
Human
Resourc
es
******* ******* 2 1 +
Comp FIN 142.212.128.
15
Finance ******* ******* 2 2 +
Comp TS 142.212.128.
16
Technica
l Support
******* ******* 2 3 +
Comp SAL 142.212.128.
17
Sales ******* ******* 2 4 +
Comp MARK 142.212.128.
18
Marketin
g
******* ******* 2 5 +
Print Printer1 142.212.128.
26
Printer ******* ******* 2 6 +
Print Printer1
a.
142.212.128.
27
Printer ******* ******* 2 6 +
Laptops
Lap HRtLap
1
142.212.128
.38
Human
Resource
******* ******** 2 1 +
25
699434/CMPRPATI
s
Lap FINLap2 142.212.128
.39
Finance ******* ******** 2 2 +
Lap TSLap3 142.212.128
.40
Technical
Support
******* ******** 2 3 +
Lap SALLap
4
142.212.128
.41
Sales ******* ******** 2 4 +
Lap MARLap
5
142.212.128
.42
Marketing ******* ******** 2 5 +
The table will grow with more devices connected and IP addresses assigned
and level of security given to each employee. All connection devices are
listed in Figure 6. Pinpointing errors or faults on the network is reduced and
locating problems quicker because devices are matched to a specific network
site using the interface name and IP address.
Figure 6: The IP Address Table for the VPN design.
Device Interface IP Address Subnet Mask Default
Gateway
ISP/CLOUD WAN 136.212.128.
240
255.255.255.2
55
0.0.0.0
INTRANET LAN1 142.212.3.0 255.255.255.0 10.211.254.2
54
INTRANET LAN2 142.212.4.0 255.255.255.0 10.211.254.2
54
INTRANET LAN3 142.212.5.0 255.255.255.0 10.211.254.2
54
INTERNET LAN4 142.212.6.0 255.255.255.0 10.211.254.2
54
VPN HOST 142.54.0.1 255.255.255.0 10.211.254.2
54
ROUTER 1 FA 0/0 142.212.128. 255.255.255.0 10.211.254.2
26
699434/CMPRPATI
8 54
ROUTER 1 FA 1/0 142.212.128.
7
255.255.255.0 10.211.254.2
54
ROUTER 2 FA 0/0 142.212.128.
6
255.255.255.0 10.211.254.2
54
ROUTER 2 FA 0/1 142.212.128.
5
255.255.255.0 10.211.254.2
54
ROUTER 3 FA 0/0 142.212.128.
4
255.255.255.0 10.211.254.2
54
ROUTER 3 FA 1/0 142.212.128.
3
255.255.255.0 10.211.254.2
54
ROUTER 4 FA 0/0 142.212.128.
2
255.255.255.0 10.211.254.2
54
ROUTER 4 FA 0/1 142.212.128.
1
255.255.255.0 10.211.254.2
54
SERVER 1 SERVSITE
1
142.212.128.
55
255.255.255.0 10.211.254.2
54
SERVER 2 SERVSITE
2
142.212.128.
54
255.255.255.0 10.211.254.2
54
SERVER 3 SERVSITE
3
142.212.128.
53
255.255.255.0 10.211.254.2
54
SERVER 4 SERVSITE
4
142.212.128.
52
255.255.255.0 10.211.254.2
54
LINKSYS – REMOTE
ACCESS
LINKRASI
TE1
142.212.
128.9
255.255.255.0 10.211.254.2
54
SUBNETWORK1 SUBNETSI
TE1
142.212.96.1
3
255.255.255.0 10.211.254.2
54
SUBNETWORK2 SUBNETSI
TE2
142.212.96.1
2
255.255.255.0 10.211.254.2
54
SUBNETWORK3 SUBNETSI
TE3
142.212.96.1
1
255.255.255.0 10.211.254.2
54
SUBNETWORK4 SUBNETSI 142.212.96.1 255.255.255.0 10.211.254.2
27
699434/CMPRPATI
TE4 0 54
ENCRYPTION 168-BIT 3-
DES
AUTHENTICATION HMAC-
MD5
The table details all devices required for the whole network to be installed
across the city. All unassigned IP addresses will be implemented in the
remote access addressing scheme to provide wider usage for customers and
employees connecting on devices outside of the LAN.
Wireshark Lab: IP
Investigation of the IP protocol was carried out with analysis of a trace IP
datagram which has been sent and received and answering questions to
show understanding from the IP Wireshark lab and illustrate using
screenshots:
Lab Activity 4 - IP
Figure 7 identifies ICMP Echo Requests or better known as PING which can
be traced to the client computer through intermediate routers.
Figure 7: ICMP Echo Request capture.
28
699434/CMPRPATI
Activity 6.a - IP
1. Select the first ICMP Echo Request message sent in this trace, and expand
the Internet Protocol par of the packet in the packet details window. What is
the source IP address?
Answer – Using figure 7: the source of the IP address is 192.168.1.102.
2. Within the IP packet header, what is the value in the upper layer protocol
field?
Answer- The value in the upper layer protocol is ICMP (1).
3. Has this IP datagram been fragmented? Explain how you determined
whether or not the datagram has been fragmented.
Answer – The IP datagram not been fragmented. This is determined by the
more fragments bit = 0, meaning the data was not fragmented.
Activity 6.b - Fragmentation
1. Has that message been fragmented across more than one IP datagram?
Answer- The packet has been fragmented across more than one IP
datagram:
29
699434/CMPRPATI
Figure 8: ICMP Echo Request packet size = 2000, first fragment
The first ICMP Echo Request message which was sent to the computer after
the Packet Size was changed in Wireshark to 2000 is shown in Figure 8.
2. Print out the first fragment of the fragmented IP datagram. What information
in the IP header indicates that the datagram has been fragmented? What
information in the IP header indicates whether this is the first fragment versus
a latter fragment? How long is this IP datagram?
Answer – The IP header indicates that the datagram has been fragmented
by looking at the flags bit is set which has been fragmented. Understanding
the first and second fragment is to look at the fragment which is offset at 0;
the first fragment is 0. The IP datagram is 1500 in total length and includes
the header.
30
699434/CMPRPATI
Figure 9: ICMP Echo Request packet size = 2000, second fragment
3. Print out the second fragment of the fragmented IP datagram. What
information in the IP header indicates that this is not the first datagram?
Answer - The second fragment can be identified in Figure 9 by looking at
the IP header and the fragment offset has changed to 1480. There are more
fragments because the flag is not set.
Transport Layer Protocols
The transport layer is the host to host within the TCP/IP model. It is the
conversion point between the hardware layers, at the architectural centre and
above software orientated layers. Protocols functioning at the transport layer
are required to ensure services are working to run the software applications
above to run an internetwork.
They allow connections to be established and maintained between software
services on devices furthest away on the network. Acting like a bridge
31
699434/CMPRPATI
between the higher layer applications to send data reliably without error
corrections, loss of data, flow management and the network layer protocols
(where unreliability occurs with no acknowledgement).
TCP (Transmission Control Protocol) – sustains high throughput and
consumes high-speed transfers over a wide distance. There is development
of Fast TCP which is a comparison to TCP and congestion control.
UDP (User Datagram Protocol) – this is similar to TCP and operates
over IP networks. There are fewer error recovery systems with UDP, relying
on a user resending datagram’s if they are lost. It is a more direct and quicker
way to send and receive data for broadcasts.
Wireshark Lab: TCP
Investigation of TCP was carried out with analysis of the behaviour in terms of
how they are sent and received by transferring a 150KB file named alice.txt.
Answering questions to show understanding of TCP Wireshark lab and
illustrate using screenshots:
Lab Activity 3 – TCP
Figure 6 is a screenshot displaying filtered packets using a TCP protocol.
32
699434/CMPRPATI
Figure 6: TCP Protocol
Lab Activity 4.a
1. What is the IP address and TCP port number used by the client computer
(source) that is transferring the file to gaia.cs.umass.edu?
Answer – The IP address is 192.168.1.102 and TCP port number is 1161
used by the client computer when transferring the file to gaia.cs.umass.edu.
2. What is the IP address of gaia.cs.umass.edu? On what port number is it
sending and receiving TCP segments for this connection?
Answer – The IP address of gaia.cs.umass.edu is 128.119.245.12 and port
number 80 is used for the connection which indicates a web server.
Lab Activity 4.b
1. What is the sequence number of the TCP SYN segment that is used to
initiate the TCP connection between the client computer and
gaia.cs.umass.edu? What is it in the segment that identifies the segment as a
SYN segment?
33
699434/CMPRPATI
Answer – 0 is the sequence number of the TCP SYN segment to initiate the
TCP connection with the client computer and gaia.cs.umass.edu. The
segment can be set to 1 which will identify it as segment and can be located
in the flag section.
2. What is the sequence number of the SYNACK segment sent by
gaia.cs.umass.edu to the client computer in reply to the SYN? What is the
value of the Acknowledgement field in the SYNACK segment? How
didgaia.cs.umass.edu determine that value? What is it in the segment that
identifies the segment as a SYNACK segment?
Answer – The sequence number of the SYNACK segment sent by
gaia.cs.umass.edu to the client computer in reply is 0. The Acknowledgement
number: 1 is the value of the acknowledgement field and gaia.cs.umass.edu
determined using value by adding 1 to the sequence number of the previous
segment. The segment can be identified as a SYNACK Acknowledgement
and syn bits are both set.
3. What is the sequence number of the TCP segment containing the HTTP
POST command? Note that in order to find the POST command, you’ll need
to dig into the packet content field at the bottom of the Wireshark window,
looking for a segment with a “POST” within its DATA field.
Answer - The sequence number of the TCP segment containing the HTTP
POST command is 1.
Types of Data Transfer with VPN
The VPN is interchangeable and can offer both TCP and UDP connections to
the network server. The company is given more flexibility with TCP and is
more reliable than UDP. Once a packet is sent with TCP, an ACK
34
699434/CMPRPATI
(acknowledgement) packet is received as a reply confirmation acknowledging
it has been sent and received but is not always needed with VPN.
Connections using TCP are allowed networks which use firewalls with ports
such as 80, 443, unlike UDP traffic may be possibly blocked especially in
commercial networks. Disadvantages to TCP with VPN means connection is
slower than UDP. To try and fasten the process would be to source a VPN
provider who offers L2TP or consider OpenVPN on a UDP for that faster
connection.
Choosing to use UDP does mean that the connection is faster in comparison
to TCP. Depending what its purpose UDP is more consistent fir video/audio
streaming and P2P traffic. The OpenVPN connection is more suited for UDP
in terms if functioning over non-blocked ports likes 53/UDP (DNS). Unlike
TCP the UDP can become unreliable and there is no guarantee or
acknowledgement when packets are delivered.
The company can allow to run both TCP/UDP and should consider more what
data or information is being sent. TCP is more likely to be used with the VPN
with the majority of employees will requiring using the internet, send emails
and would like the network traffic to be strong link and not have data going
missing.
Social media is fast becoming the new fad with streaming videos and posting
photos using (Netflix, Face book and Twitter) TCP would be too slow and
would buffer whilst waiting for all the packets to be sent and received in the
right order. The UDP is a quicker way and the image/video would be instant.
In the case of loss of connection, the image/video would be resent once it was
realised it had not be received.
Protocol Considerations
35
699434/CMPRPATI
The VPN has secure tunnels through the use of the internet. This is created
by the company’s remote access site 1; these are also site to site VPN and
include the VPN servers on the network. Various tunnelling protocols are
available and put into place as the actual VPN or the VPN connection.
Some of these which can be considered are:
 (PPTP) – Point to Point Tunnelling Protocol.
 (L2T) – Layer 2 Tunnelling Protocol
 (IPSec) Internet Protocol Security tunnel mode
 (SSL) Secure Sockets Layer
The implementation of the VPN solution will include the support of these
protocols. Though these can be limited dependant on how the design is set-
up. Much thought of the scalability is needed as it does effect which tunnelling
protocols are to be most suited.
For example, the remote access users should ensure sufficient client software
which can support the protocols chosen. Including looking at department to
department VPN, the gateway VPN at both points have compatible or
common protocols.
PPTP
A Microsoft protocol PPTP is included in their operating systems, this is built
in and called PPTP client software. Availability of other PPTP clients for
Macintosh and Linux/UNIX operating systems are out there; making PPTP a
viable choice for the VPN.
It is not deemed as secure as other tunnelling protocols. It uses an encryption
method, a Microsoft point to point encryption (MPPE) but not certified based.
36
699434/CMPRPATI
It is supported by ISA server wall also a Microsoft technology, the Cisco PIX
and inclusion of other models of WatchGuard.
L2TP
Microsoft and Cisco worked together to develop and combine PPTP and
Layer 2 Forwarding (L2F) protocols. It incorporated the IPSec as the
encryption. Thus providing a more secure and strong security with certification
based authentication and data uprightness and more importantly
confidentiality.
The L2TP would allow for the office to use a Microsoft operating system due
to it being built in. For example, it is on Windows 2000, XP and the server
2003. Software is all too easily attainable from the internet. Installation and
cost free program software can be installed on computers such as Windows
98, Me, and NT 4.0 due to compatibility.
If using Linux clients, software like OpenL2TP can be implemented.
Macintosh operating systems (Panther) also uses Check Point, Cisco PIX and
WatchGuard firewall or integrated VPN products with the Microsoft ISA
server, allowing for a simple office to office VPN to work.
IPSec
The IPSec could be added to the encryption for L2PT connection. It has a
tunnel model which can create a connection. An IPSec VPN is supported by
firewalls and integrated VPN appliances. Also it is the only tunnelling protocol
to be supported by the main known firewalls:
 Microsoft's ISA Server
 Check Point
 Cisco PIX, Netscreen,
37
699434/CMPRPATI
 SonicWall, WatchGuard, Symantec
Scalability is more manageable by using this type for office to office VPN.
SSL
A third scalable VPN protocol is the SSL; if true it wouldn’t be a full VPN
solution to begin with. It is a clientless solution which incorporates a selected
web browser. The browser becomes the client and is a good answer if the
users need access to web enabled servers only.
Look at today’s world and technology there really is not computer or laptop
that does not use a web browser which supports SSL. Access can be
provided for one to many clients required. It ensures the use of an operating
system up to date such as Microsoft Windows 8 / 8.1, 7 or Vista. It is a very
cost effective solution and minimal installation of software for the client and
disruption to business.
Security
There are various security issues relating to Networks. The IPSec operation is
a very relevant and preventative security protocol for networking. IPSec is
connected to RFC 2401 and innovated for everyday use with VPN’s right
across the internet and for example schools, colleges and Universities.
The packet structure is made from an IP header/IPSec header/Encapsulating
security payload. The encryption facility is provided by IPSec with the 3DES
and authentication with MD5. There is also an internet Key Exchange (IKE)
and ISAKMP, this automatically allows distribution of Security (secret) Keys in
between the IPSec peer devices, these are the routers and concentrators.
Securing VPN
38
699434/CMPRPATI
The VPN uses the internet to connect to a private network and it is assumed
that this is a secure connection permitting confidential data to be transmitted
over the public network. Sharing files, resources, data files and video without
thought because it is deemed that the network is connected on the same
network.
This is the best way for remote access and allows for the option for global
offices to be added and data to be shared and viewed privately. Connection of
the entire network using the VPN would be best to ensure connection is made
at both ends of the locations with the main router or gateway address. This
would mean there would be a requirement of VPN being built in for such a
function.
Solution does support remote access to users outside the office. This allows
for when staff use the WI-FI hotspot to gain access to the company network, if
required in meetings and information is needed. The employee would not
have to leave to go back to the office. Main point to remember the employee’s
device must support the same VPN solution to work correctly.
Active Directory
The active directory permits the management of network to be implemented
and maintained through a numbers of functions. It forms a relationship of trust
and long term this trust is managed. Modifications to the concept of the
network can be altered.
It also allows for configuration of site links and servers. The image below
illustrates various areas of the Active Directory which needs to be considered:
Active Directory-Based Activation (ADBA) (7):
39
699434/CMPRPATI
The latest software which Microsoft windows has been introduced is Windows
8.1. It has its own Active Directory-Based Activation (ADBA) which is new to
the Windows Umbrella. Its functionality lets businesses activate workstations
through a connection to their own domain.
Other enterprises operate by off-site locations that can connect to company
applications. Gone are the days when such work based technologies would
require a retail key or Multiple Activation Key (MAK) or needing to manually
connecting to a network in order to activate and run software applications by
use of Key Management Services (KMS).
Using ADBA would make implementing the network and devices a lot simpler.
Activation can automatically be operated, if chosen devices are compatible
with the Windows operating system, and connect to the domain service.
Once users join the devices to the domain, ADBA for example will
automatically activate the Windows framework which is installed on a
computer. This is dependent on whether the computer or device has a generic
Volume licence key (GVLK) installed. Advantage no single device would be
required to act as the active object due to it being fully distributed through the
domain.
40
699434/CMPRPATI
Example of the Active Directory Windows Server, 2012, Windows 8 & Office
2013 (4):
Cost of Network
Total cost breakdown for all hardware and software took time to research and
look for the best computability of existing equipment with the first site and
advancing to the rest of the network for best performance.
There are costs which will be one-off and this deal with the hardware and
installation of the software. However, updates to software could possibly incur
an annual fee for subscription which is down to Microsoft monopolising the
market with Windows 8.
Other areas to look at are host domain names and charges. Some are free
and only ask for you to keep it up to date and blog every 3 to 6 months.
Whereas, other sites ask for a small fee and look after the site for you with
minimal input from client to add data such as dates and adding events or
promotions to entice new customers.
Looking at possible VPN Hosting one alternative to using BT for this service
would be Free VPN Hosting. They offer the service with free with 5 GB secure
cloud solution which is a requirement of the solicitors (6).
41
699434/CMPRPATI
They are a very trusted site and provider of the PPTP VPN service. All
partners would be able to login and know that their data, web access and
privacy rights were being upheld at no extra cost.
Summary
A network is best used enabling and sharing hardware devices, computer
data and information with ease of access. Using a remote access point on a
computer through a local area network or intranet is most effective and
naming it so users can find files and data is known as sharing resources or
network resources.
In more detail shared LAN are used by many different system resources for
example hard drives, scanners, printers and network cards. Sharing
resources does mean there are some restrictions which must be met: File
Transfer Protocol (FTP) and File sharing.
It is a must that security procedures are implemented and maintained to the
highest standard in order to keep the perimeters of the network safe including
all technologies on it. Mapping: Proper naming schemes must be created and
shared destination addresses. All shared operating systems, hardware, files
can then be determined and accessed where necessary.
Compatibility: Client server-side require the same operating systems or
applications to access the shared resources. Otherwise a message box will
appear advising of compatibility issues arising and requested for the correct
software/hardware to run file sharing – troubleshooting; communication delays
dependent also if the network is connected correctly.
Peak times are one issue where some users cannot get on to the internet due
to the server working overtime to fulfil the needs of a global network. Users
can pay more for their broadband as BT, Sky, Virgin and other business can
charge whatever price they choose to the expense of the user.
42
699434/CMPRPATI
With advancements in technologies more and more devices are being added
to local and global networks and thanks to the cloud linking it to mobiles and
app stores such as play store for android. This has led to people’s opinions
and expectations changing quite considerably from the early days of computer
networks.
Managers who deal with IT want to be able to present and use applications
with various devices from PDA’s to tablets; enhancements of HD web
streaming to client downloads and using websites to make meetings across
public and private networks controlling the equipment themselves and with
ease of use.
Networks are ever changing and adjusting to cope with the demand of user
expectations. Through performance and access issues come into play when
relating to such expectations, user’s behaviours and how they are used either
work or gaming for example.
Local area network is being over taken by the wider area network as users
want and need to be able to communicate with the outside world. For example
users being holiday and wanting to call home via Skype or Facebook free call.
Business networks are also jumping on to cloud and connecting devices
which will also turn into a network at some point in the near future.
Completed Wireshark Labs
Lab Activity 1 – Getting Started
Learning about Wireshark through packet capturing, below is a screenshot of
the software in action. Displaying live packet data containing protocol
messages exchanged between the laptop and the gaia.cs.umass.edu server:
Figure 1: Wireshark window at HTTP GET Message from gaia.cs.umass.edu
URL.
43
699434/CMPRPATI
Figure 1.Packet Capture
Using the filter to search “HTTP” permits the HTTP message to be shown
within the packet-listing. The HTTP GET message is highlighted showing the
Ethernet frame, IP datagram, Internet Protocol and Transmission Control
Protocol.
Figure 2: Listed protocols in live capture:
1. List 3 different protocols that appear in the protocol column in the unfiltered
packet listing window in step 7 above.
Answer - Three different protocols which appear in the protocol column are
TCP, UDP, and SSDP prior to filtering the packet-listing.
44
699434/CMPRPATI
2. How long did it take from when the HTTP GET message was sent until the
HTTP OK reply was received? (By default, the value of the Time column in
the packet listing window is the amount of time, in seconds, since Wireshark
tracing began. To display the Time field in time-of-day format, select the
Wireshark View pull down menu,then select Time Display Format, then select
Time-of-day.)
Answer - Allotted time taken for the HTTP GET message to be sent was
106.380374000 until the HTTP OK reply was received at 106.49769000,
leaving a delay of 0.117316 seconds.
3. What is the Internet address of the gaia.cs.umass.edu (also known as
wwwnet.cs.umass.edu)?
What is the Internet address of your computer?
Answer- Looking at figure 2 of the screen shot, the IP address of the IP
address of gaia.cs.umass.edu is 192.168.0.3; the IP address of the laptop is
128.119.245.12.
4. Print the two HTTP messages (GET and OK) referred to in question 2
above. To do so, select Print from the Wireshark File command menu, and
select the “Selected Packet Only” and “Print as displayed” radial buttons, and
then click OK
Answer – Print out of HTTP GET and HTTP Reply message demonstrating
communication of sending and receiving protocol messages.
This is a print screen of how the print out of a HTTP GET message would look
like:
45
699434/CMPRPATI
This is a print screen of how the print out of a HTTP Reply message would
look like:
Lab Activity 2.A – HTTP
An quick insight into HTTP/response interaction by using a downloaded HTML
file; which is small and contains no embedded objects. Figure 3: Screenshot
of Wireshark once http://gaia.cs.umass.edu/wireshark-labs/HTTP-file1.html
was retrieved in the browser.
46
699434/CMPRPATI
Figure 3.HTTP
1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is
the server running?
Answer – The browser is running HTTP version 1.1. The server is operating
HTTP version 1.1.
2. What languages (if any) does your browser indicate that it can accept to the
server?
Answer – There is no indication of what languages are accepted to the
server. In figure 3 there is an Accept-Range: bytesrn with Content-Length:
128rn. The type of language the server would accept is en-us.en;q-0.5rn.
3. What is the IP address of your computer? Of the gaia.cs.umass.edu
server?
Answer - Looking at figure 3 of the screen shot, the IP address of the IP
address of the gaia.cs.umass.edu server is 192.168.0.3; the IP address of the
laptop is 128.119.245.12.
47
699434/CMPRPATI
4. What is the status code returned from the server to your browser?
Answer – The status code returned from the server to the browser was
HTTP/1.1 200 OK (text/html).
5. When was the HTML file that you are retrieving last modified at the server?
Answer – The retrieved HTML file was Last-Modified on Thu, 27 Nov 2014
03:40:01 GMYrn at the server.
6. How many bytes of content are being returned to your browser?
Answer – Bytes of content being returned to the browser is Content-Length:
128rn.
7. By inspecting the raw data in the packet content window, do you see any
headers within the data that are not displayed in the packet-listing window? If
so, name one.
Answer– Looking at the raw data within the packet content window, there
are no headers within the data which are not shown in the packet-listing. The
reason for this is headers are located in the raw data.
Lab Activity 2.B - HTTP Authentication
Demonstrating the type of sequence when HTTP messages are exchanged;
Figure 4: Screenshot of Wireshark once
http://gaia.cs.umass.edu/wiresharklabs/protected pages /HTTP-
wiresharkfile5.html was retrieved in the browser.
48
699434/CMPRPATI
Figure 4.HTTP Authentication
1. What is the server’s response (status code and phrase) in response to the
initial HTTP GET message from your browser?
Answer – The response from the server was Status Code 401, Phrase
Authorization Required (text/html) to the initial response of the HTTP GET
message from the browser.
2. When your browser’s sends the HTTP GET message for the second time,
what new
field is included in the HTTP GET message?
Answer – Figure 5: Authorisation field included in the HTTP GET message
as displayed below:
Figure 5: Authorization column.
Looking at Figure 5 a new field was added and highlighted as Authorisation.
(Basic d2ly ZXN0dwrl bnRzom5ldHdvcms=).
49
699434/CMPRPATI
Lab Activity 3 – TCP
Figure 6 is a screenshot displaying filtered packets using a TCP protocol.
Figure 6: TCP
Lab Activity 4.a
1. What is the IP address and TCP port number used by the client computer
(source) that is transferring the file to gaia.cs.umass.edu? To answer this
question, it’s probably easiest to select an HTTP message and explore the
details of the TCP packet used to carry this HTTP message, using the “details
of the selected packet header window” (refer to Figure 2 in the “Getting
Started with Wireshark” Lab if you’re uncertain about the Wireshark windows.
Answer – The IP address is 192.168.1.102 and TCP port number is 1161
used by the client computer when transferring the file to gaia.cs.umass.edu.
50
699434/CMPRPATI
2. What is the IP address of gaia.cs.umass.edu? On what port number is it
sending and receiving TCP segments for this connection?
Answer – The IP address of gaia.cs.umass.edu is 128.119.245.12 and port
number 80 is used for the connection which indicates a web server.
Lab Activity 4.b
1. What is the sequence number of the TCP SYN segment that is used to
initiate the TCP connection between the client computer and
gaia.cs.umass.edu? What is it in the segment that identifies the segment as a
SYN segment?
Answer – 0 is the sequence number of the TCP SYN segment to initiate the
TCP connection with the client computer and gaia.cs.umass.edu. The
segment can be set to 1 which will identify it as segment and can be located
in the flag section.
2. What is the sequence number of the SYNACK segment sent by
gaia.cs.umass.edu to the client computer in reply to the SYN? What is the
value of the Acknowledgement field in the SYNACK segment? How
didgaia.cs.umass.edu determine that value? What is it in the segment that
identifies the segment as a SYNACK segment?
Answer – The sequence number of the SYNACK segment sent by
gaia.cs.umass.edu to the client computer in reply is 0. The Acknowledgement
number: 1 is the value of the acknowledgement field and gaia.cs.umass.edu
determined using value by adding 1 to the sequence number of the previous
segment. The segment can be identified as a SYNACK Acknowledgement
and syn bits are both set.
51
699434/CMPRPATI
3. What is the sequence number of the TCP segment containing the HTTP
POST command? Note that in order to find the POST command, you’ll need
to dig into the packet content field at the bottom of the Wireshark window,
looking for a segment with a “POST” within its DATA field.
Answer - The sequence number of the TCP segment containing the HTTP
POST command is 1.
Lab Activity 4 - IP
Figure 7 identifies ICMP Echo Requests or better known as PING which can
be traced to the client computer through intermediate routers.
Figure 7: ICMP Echo Request capture.
Activity 6.a - IP
1. Select the first ICMP Echo Request message sent in this trace, and expand
the Internet Protocol part
of the packet in the packet details window. What is the source IP address?
Answer – The source of the IP address is 192.168.1.102.
52
699434/CMPRPATI
2. Within the IP packet header, what is the value in the upper layer protocol
field?
Answer - The value in the upper layer protocol is ICMP (1).
3. Has this IP datagram been fragmented? Explain how you determined
whether or not the datagram has been fragmented.
Answer – The IP datagram not been fragmented. This is determined by the
more fragments bit = 0, meaning the data was not fragmented.
Activity 6.b - Fragmentation
1. Has that message been fragmented across more than one IP datagram?
Answer - The packet has been fragmented across more than one IP
datagram:
Figure 8: ICMP Echo Request packet size = 2000, first fragment
53
699434/CMPRPATI
The first ICMP Echo Request message which was sent to the computer after
the Packet Size was changed in Wireshark to 2000 is shown in Figure 8.
2. Print out the first fragment of the fragmented IP datagram. What information
in the IP header indicates that the datagram has been fragmented? What
information in the IP header indicates whether this is the first fragment versus
a latter fragment? How long is this IP datagram?
Answer – The IP header indicates that the datagram has been fragmented
by looking at the flags bit is set which has been fragmented. Understanding
the first and second fragment is to look at the fragment which is offset at 0;
the first fragment is 0. The IP datagram is 1500 in total length and includes
the header.
Figure 9: ICMP Echo Request packet size = 2000, second fragment
3. Print out the second fragment of the fragmented IP datagram. What
information in the IP header indicates that this is not the first datagram
Answer - The second fragment can be identified in Figure 9 by looking at
the IP header and the fragment offset has changed to 1480. There are more
fragments because the flag is not set.
54
699434/CMPRPATI
Lab Activity 4 – Ethernet
Understanding the Ethernet protocol and addressing by capturing and
analysing Ethernet frames:
Figure 10: HTTP GET message sent from gaia.cs.umass.edu.
Packet 334 in Figure 10 contains the HTTP GET message. This was
implemented by entering the http://gaia.cs.umass.edu/wireshark-labs/HTTP-
ethereal-lab-file3.html into the browser.
55
699434/CMPRPATI
Figure 11: IP4 enabled protocols disabled displaying information about below
the IP.
Activity 8.a – Ethernet
1. What is the 48-bit Ethernet address of your computer?
Answer – The 48-bit address of the computer is 00:18:de:e1:ab:ee.
2. What is the 48-bit destination address in the Ethernet frame? Is this the
Ethernet address of gaia.cs.umass.edu? (Hint: the answer is no). What device
has this as its Ethernet address?
Answer – The 48-bit destination address in the Ethernet frame is
20:0c:c8:9d:08:cb. The Ethernet address is not the gaia.cs.umass.edu. It is
the Netgear router which is the device of the address, this is the link used to
leave the subnet.
56
699434/CMPRPATI
3. What is the value of the Ethernet source address? Is this the address of
your computer, or of
gaia.cs.umass.edu (Hint: the answer is no). What device has this as its
Ethernet address?
Answer – The Ethernet source address is 00:18:de:e1:ab:ee. This is the
address of the computer and not gaia.cs.umass.edu. The Netgear router has
this as the Ethernet address.
4. What is the destination address in the Ethernet frame? Is this the Ethernet
address of your computer?
Answer – 20:0c:c8:9d:08:cb is the destination address in the Ethernet
address. This address does not belong to the computer but to the Netgear
router.
5. Give the hexadecimal value for the two-byte Frame type field. What upper
layer protocol
does this correspond to?
Answer – 0x0800 is the hexadecimal value for the two-byte Frame type field
which corresponds to the IP upper layer.
Additional Lab Material
Activity Lab 3.a – DNS
1. Run nslookup to obtain the IP address of a Web server in Asia (eg. Kyoto
University in Japan). What is the IP address of that server?
57
699434/CMPRPATI
Answer – Command prompt to operate nslookup to obtain the IP address of
Kyoto University; a web server in Asia.
Figure 12: nslookup in action with command prompt.
Figure 12 displays 192.168.0.1 as the IP address of the server in Asia.
2. Run nslookup to determine the authoritative DNS servers for The University
of Loannina in Greece.
Answer – Command prompt to operate nslookup to determine the DNS
servers in Europe.
Figure 13: nslookup determining authoritative DNS servers.
Figure 13 displays the nslookup for a European University in Ioannina
Greece.
58
699434/CMPRPATI
3. Run nslookup so that one of the DNS servers obtained in Question 2 is
queried for the mail servers for Yahoo! Mail (mail.yahoo.com). What is its IP
address?
Answer – nslookup operated for the DNS servers obtained in Question 2 can
query the mail servers for Yahoo! Mail (mail.yahoo.com).
Figure 14: nslookup of DNS server querying task 2 with mail servers for
Yahoo mail.
Figure 14 was unable to complete the nslookup query due to not being to
find the Yahoo mail address. Attempts made after was also unable to carry
out the task due to the DNS server timing out. To answer this task another
nslookup was completed and returned the correct information.
A search for a Hong Kong University in china was functioned – the IP address
was 137.189.6.21 and server barnowl.itsc.cuhk.edu.hk.
59
699434/CMPRPATI
Activity Lab 3.b – Tracing DNS
Figure 15: ipconfigall in action within command prompt:
1. Locate the DNS query and response messages. Are they sent over UDP or
TCP?
Answer – The DNS query and response messages are sent over UDP as
displayed in the screenshot Figure 16 below:
60
699434/CMPRPATI
Figure 16: Tracing DNS in action.
2. What is the destination port for the DNS query message? What is the
source port of DNS response message?
Answer – The destination port is 53 for DNS query message. The source
port of the DNS response is 53.
3. To what IP address is the DNS query message sent? Use ipconfig to
determine the IP address of your local DNS server. Are these two IP
addresses the same?
Answer – IP address 192.168.0.1 is where the DNS query message is sent.
Using Figure 15: ipconfig-all to find the DNS IP address shows 192.168.0.1
is the same one because it is the local server.
4. Examine the DNS query message. What “Type” of DNS query is it? Does
the query message contain any “answers”?
Answer – The “Type” of DNS query is A Standard Query. It does not contain
answers within it.
61
699434/CMPRPATI
5. Examine the DNS response message. How many “answers” are provided?
What do each of these answers contain?
Answer – Using Figure 17 below, the DNS server contains only one
answer which is the name of the host, class and IP address:
Figure 17: DNS Response
6. Consider the subsequent TCP SYN packet sent by your host. Does the
destination IP address of the SYN packet correspond to any of the IP
addresses provided in the DNS response message?
62
699434/CMPRPATI
Answer – The destination IP address does correspond with other IP
addresses in the DNS response message. The IP address 4.31.198.44 is
provided by the DNS server for www.ietf.org, as shown in Figure 18.
Figure 18: IP address provided by the DNS server.
7. This web page contains images. Before retrieving each image, does your
host issue new DNS queries?
Answer – The DNS query does not require issuing new queries to retrieve
images. They are uploaded from www.ietf.org site as the host uses a cached
address which stores information.
Lab Activity 4 - UDP
Figure 19 displaying packets being captured by the host demonstrating the
sending and receiving of UDP packets.
Figure 19: UDP Capture.
1. Select one UDP packet from your trace. From this packet, determine how
many fields there are in the UDP header. Name these fields
63
699434/CMPRPATI
Answer – Looking at Figure 19 and choosing packet 20; there are four fields
in the UDP header. These fields are the source port, destination port, length
and the checksum.
2. By consulting the displayed information in Wireshark’s packet content field
for this packet, determine the length (in bytes) of each of the UDP header
fields.
Answer – The packet content field will allow for each UDP header field to be
20 bytes long in length.
3. What is the protocol number for UDP? Give your answer in both
hexadecimal and decimal notation. To answer this question, you’ll need to
look into the Protocol field of the IP datagram containing this UDP segment.
Answer – Protocol number for UDP is 11. The hexadecimal number is
0x11hex and decimal notation is 17 in value.
4. Examine a pair of UDP packets in which your host sends the first UDP
packet and the second UDP packet is a reply to this first UDP packet. (Hint:
for a second packet to be sent in response to a first packet, the sender of the
first packet should be the destination of the second packet). Describe the
relationship between the port numbers in the two packets.
Answer – Using Figure 20 and 21 to compare demonstrates the source port
of the UDP sent by the host is the same as the destination port (26865 /
30035). This is reversed when the destination port of the UDP packet is the
same as the source port of the reply packet.
64
699434/CMPRPATI
Figure 20: UDP sent by the host.
Figure 21: UDP reply to the host.
Activity Lab 7 – DHCP
Performance of several DHCP-related commands and captures the DHCP
messages exchanged as a result of executing these commands in Figure
22.
65
699434/CMPRPATI
Figure 22: Command prompt in action using Ipconfig/release and renew.
Figure 23 demonstrates the first ipconfig renew command and shows
generation of four new DHCP packets; DHCP Discover packet, DCHP Offer
packet, DCHP Request packet and a DCHP Ack packet:
66
699434/CMPRPATI
Figure 23: DHCP Packet number 36 with DHCP Discover packet expanded.
Activity 7.a
1. Are DHCP messages sent over UDP or TCP?
Answer – UDP stands for User Datagram Protocol and used for DHCP
messages not TCP.
2. Draw a timing datagram illustrating the sequence of the first four-packet
Discover/Offer/Request/ACK DHCP exchange between the client and server.
For each packet, indicated the source and destination port numbers.
Answer – Port numbers are the same as in the packet capture as the graph
analysis.
DCHP Discover: Source 0.0.0.0 to Destination 255.255.255.255
DCHP Request: Source 0.0.0.0 to Destination 255.255.255.255
DCHP Offer: Source 192.168.0.1 to Destination 192.168.0.3
DCHP Ack: Source 192.168.0.1 to Destination 192.168.0.3
67
699434/CMPRPATI
Figure 24: Timing datagram to show the first four-packet
Discover/Offer/Request and Ack.
3. What is the link-layer (e.g., Ethernet) address of the host?
Answer – The link layer address of the host on the computer is
(00:18:de:e1:ab:ee) which uses the Ethernet.
4. What values in the DHCP discover message differentiate this message
from the DHCP request message?
Answer – Option 53: DHCP Message Type is where the values differentiate
the Discover message from the request message.
5. What is the IP address of the DHCP server?
Answer – The value of the Transaction ID is 0xe7646a7d. The second
Transaction ID is 0xe4eff25f. A transaction ID is used so that the DCHP
server can differentiate between client requests during the request process.
6. Explain the purpose of the lease time. How long is the lease time in your
experiment?
Answer – Lease time is the amount of time the DHCP server will assign an
IP address to a client. During the lease time, a DHCP server will not assign
the IP given to a client to another, unless the client releases it. The expiry
time can end and the IP address will be reused by the DHCP server and the
IP dedicated to another client. The lease time in Figure 23 is 1 day.
7. What is the purpose of the DHCP release message? Does the DHCP
server issue an acknowledgment of receipt of the client’s DHCP request?
What would happen if the client’s DHCP release message is lost?
68
699434/CMPRPATI
Answer – The purpose of the DHCP Release message is to cancel the lease
of the IP address given by the DHCP server. No acknowledgement message
is sent to the client informing of the DHCP Release message. Loss of a DHCP
Release message from a client would leave the DHCP server to wait until the
release period was over for the specified IP address to be reusable for
another client.
References
1. Anon, (2014). [online] Available at: 2)
https://www.owasp.org/index.php/Main_Page [Accessed 19 Nov.
2014].
2. Anon, (2014). [online] Available at: 4) http://www.malcher.fr/activation-
basee-sur-active-directory/ [Accessed 3 Dec. 2014].
3. Bestvpnservice.com, (2014). Free VPN Android - Free VPN Android
App. [online] Available at: http://www.bestvpnservice.com/blog/android-
vpn-apps-list-of-free-vpn-apps-for-android/ [Accessed 3 Dec. 2014].
4. Freevpnhosting.com, (2014). Free VPN Hosting Service | We Host
Free VPN accounts for everyone. [online] Available at:
http://freevpnhosting.com/ [Accessed 5 Dec. 2014].
5. Packet Tracer. (2014). Cisco.
6. Technet.microsoft.com, (2014). VPN’s and Firewalls. [online] Available
at: http://technet.microsoft.com/en-us/library/cc958037.aspx [Accessed
2 Dec. 2014].
7. Warner, T. (2014). [online] Available at: http://4sysops.com/wp-
content/uploads/2012/04/Windows-Server-8-domain-Active- Directory-
Users-and-Computers-in-Windows-Server-8-Beta.png [Accessed 2
Dec. 2014].
8. Wireshark. (2014).
9. Your Agile IT Partner for your Office 365 Migration, Private & Public
Cloud Solutions and Fixed Price IT Support, (2014). Active Directory,
PKI, NAP, & 802.1x Consulting | Your Agile IT Partner for your Office
69
699434/CMPRPATI
365 Migration, Private & Public Cloud Solutions and Fixed Price IT
Support. [online] Available at: http://www.agileit.com/enterprise/identity-
access-security/active-directory-pki-and-802-1x-consulting/ [Accessed
1 Dec. 2014].
70

More Related Content

What's hot

Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuideEugene Yu
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksChristopher Lietz
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
Paper id 21201446
Paper id 21201446Paper id 21201446
Paper id 21201446IJRAT
 
Article: 4G Technology
Article: 4G TechnologyArticle: 4G Technology
Article: 4G TechnologyMuhammad Ahmed
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fieSAT Publishing House
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computingKomalah Nair
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration examsHossam Zein
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manualprashant0001
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)mashiur
 

What's hot (19)

Documentation
DocumentationDocumentation
Documentation
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
APManagement_FeatureGuide
APManagement_FeatureGuideAPManagement_FeatureGuide
APManagement_FeatureGuide
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area NetworksWhite Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Network data
Network dataNetwork data
Network data
 
Paper id 21201446
Paper id 21201446Paper id 21201446
Paper id 21201446
 
Article: 4G Technology
Article: 4G TechnologyArticle: 4G Technology
Article: 4G Technology
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
Data Communications and Net-Centric computing
Data Communications and Net-Centric computingData Communications and Net-Centric computing
Data Communications and Net-Centric computing
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
Ccna exploration exams
Ccna exploration examsCcna exploration exams
Ccna exploration exams
 
PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006 PACE-IT: WAN Technologies (part 1) - N10 006
PACE-IT: WAN Technologies (part 1) - N10 006
 
Muo Network Manual
Muo Network ManualMuo Network Manual
Muo Network Manual
 
Raisul Haq Rajib (063435056)
Raisul Haq Rajib  (063435056)Raisul Haq Rajib  (063435056)
Raisul Haq Rajib (063435056)
 
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONEPROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
PROTECTED DESKTOP ACCESS BASED ON USE OF MOBILE PHONE
 

Similar to ComputerNetworksAssignment

Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE IJERA Editor
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docxeugeniadean34240
 
Report on routing interface configuration
Report on routing interface configurationReport on routing interface configuration
Report on routing interface configurationDebjyotiSaha9
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2kiamiel
 

Similar to ComputerNetworksAssignment (20)

Siemens Industrial Training
Siemens Industrial TrainingSiemens Industrial Training
Siemens Industrial Training
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
K010426371
K010426371K010426371
K010426371
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx1Running Head Network Design3Network DesignUn.docx
1Running Head Network Design3Network DesignUn.docx
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Report on routing interface configuration
Report on routing interface configurationReport on routing interface configuration
Report on routing interface configuration
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

ComputerNetworksAssignment

  • 1. 2014 Computer Networks PROTOCOLS & DESIGN Assignment 1 699434 / Rebecca Patient
  • 3. 699434/CMPRPATI Introduction A proposed graphical network diagram with comparative network topology; Tree and star were designed as possibly alternatives for site 1 design of the city wide network. Analysis of physical media and network components has been incorporated to justify decisions. IP addressing for the main four sites is assigned to the diagram and investigating TCP and UDP protocols to be applied when implementing network applications. Finalise with summarising. Findings A full working design was created for the commercial company and demonstrates all for sites across the city built and provision of connectivity between the sites and includes connection to the internet. In more detail site 1 has been developed to include 5 departments; Human Resources, Finance, Technical Support, Sales and Marketing. Collision Domain The collision domain is part of the network where data packets are sent using Ethernet or Fast Ethernet devices and connected by hubs or repeaters which can collide and cause loss of packets. One device/node has the ability to transmit within the collision domain. The hub is contained in the physical layer and is unable to recognize Ethernet frame or protocols. When devices / nodes share an Ethernet / fast Ethernet local area network using CSMA/CD (Carrier Sense Multi Access / Collision Detection) rules in relation to the same collision domain means that when a collision happens, all who are on the network will be affected and suffer losing data packets i.e. emails. 3
  • 4. 699434/CMPRPATI It is easier to not use hubs instead implement multi-switches which act as a bridge can fully understand the Ethernet frame or protocols. In this instance data packets will be forwarded and received to the correct port on the specific multi-switch. Using the multi-switch allows for the designed network to splits into multiple collision domains and less complicated when expanding because it avoids any restrictions placed on the network. Broadcast Domain A broadcast domain is different to the collision domain it is processed by a multi-switch and data packets are sent out to every port. The switch is a single broadcast domain. All devices / nodes connected would receive a broadcast message generated by any of the devices connected to the network using the multi-switch. Consideration of 3 to 4 multi-switches which will be connected across the city would cause unneeded problems. Using VPN it would be better to implement individual single ports. Allowing all traffic to be separated and configuration of specified numbers associated to each device / node. This means traffic generated in site 1 can only be forwarded within site 1. No crosses traffic to other sites is permitted. This is why IP addresses across the sub network will be different for traffic to recognise devices / nodes. The router is the border control to stop broadcasts moving around the whole network. Traffic will require being received to other sites. Using the router on the VPN will be able to recognise specific sub network and will find the correct pathway to another sub network and send the data packets to the correct device / node. The difference between collision domain and broadcast domain are the switches and routers. When designing the network this will make it simpler to recognise will is to developed for data packets to communicated across the 4
  • 5. 699434/CMPRPATI city wide network. The collision is more possible as is lessens the potential for packets colliding. Whereas broadcast domains are to locate and define where broadcasts are being sent to. It is possible to use combination and the graphical design in Figure 3 illustrates this point because both routers and multi-switches have been realised. Physical Media A wireless connection is to be installed to run alongside the VPN network. There may be some elements requiring CAT5 or CAT6 for an Ethernet connection, as a back-up system in each site. Making this more of a full proof way to ensure datagram’s are transmitted throughout the network and no down time occurs to any of the sites or sun networks if connectivity issues arise. The Remote access VPN will connect users remotely via an enterprise network. Workstations and all other devices will connect using an access circuit; cabling, DSL or wirelesses to the ISP (internet service provider) for example BT or Virgin but depends on cost to install. Using a client-model for the company (Figure 3) software applications installed onto the workstations will have a built-in encrypted tunnel from all sites running to the ISP using the Internet Security Protocol (IPSec), with Layer 2 Tunnelling Protocol, or use point to point Tunnelling Protocol(PPTP). Authentication will be required on the network for all users to login because it will be a protected network which runs in conjunction with the ISP and internet. During implementation an encrypted tunnel will be built connecting the sites VPN router or concentrator. 5
  • 6. 699434/CMPRPATI There are many servers which could be installed such as TACAS or RADIUS authentic all users on the remote network. Allowing all employees, management and partners to gain specific rights and differing levels of access to the company network; for example a partner would have a higher grade access than that of a receptionist for security and information assurance. On completion remote users will then be authenticated onto the local Windows domain Server, UNIX server or other mainframe hosts which are available on search of the internet for costing and dependant on requirement of the client. These hosts will have their own network account which can be added to the VPN with simple login details. Disadvantage’s to this mainly comes down to security ISP is less secured but cost wise is more advantageous for company requirements. A client initiated frame is better due to encryption and tunnel from which it is built from the ISP side to the company VPN router or VPN concentrator. The tunnel itself will be built using L2TP (Layer 2 Tunnel Protocol) or L2F (Layer 2 Forwarding) Extranet This type of VPN connects the departments within the company network; operated by building a secure VPN connection from the department’s router to the company VPN router or concentrator. Tunnelling in this instance uses more specific tunnelling protocol which is functionally dependant on if there is a router or remote dial-up connection. There are options for a router connected extranet VPN which are classified as IPSec or the Generic Routing Encapsulation (GRE). The dial-up connection for extranet will also use and utilise L2TP or L2F. Intranet 6
  • 7. 699434/CMPRPATI Similar to the extranet VPN, the intranet VPN is a separate network and connects all offices within the company using the secure network and same processes of IPSec and GRE due to the tunnelling protocols. A front screen on workstations allows all users on the network to connect anywhere within the company, with use of the good old login and password. There are three elements to IPSec better known as 3DES encryption, the IKE Key exchange authentication and MD5 route authentication, by providing authentication, authorisation and most importantly confidentiality. Network Topology The network topology is the logical layout for non-commercial / home / business / education/ scientific / military / government system using connected devices. Designing a network requires planning and understanding of how devices communicate and are connected on a local area network (LAN) and a wide area network (WAN). There are different types of topology; Bus, Ring, Mesh, Star and Tree. The company will be using a star topology for the VPN. This can be created by using hosts remotely which connects through a VPN concentrator (or better known as the central point). VPN concentrator will create the secure tunnel to the individual hosts. For example, if the reception communications to the researchers, data sent from reception will pass through the VPN and on the researcher host. The concentrator is able to maintain and support multiple connections. A tunnel is found and secured to each of the chosen remote hosts. Figure 1: Tree Topology Figure 2: Star Topology 7
  • 8. 699434/CMPRPATI There is only one real problem with using the star topology if both workstations are in close proximity they still need to use the central point to transfer information. Figure 2 clearly shows the configuration is centralised. This leads to maintenance carried singularly and minimises the effort or requirement of an IT technician. With this ease it also incorporates single point control, access and finance. If the central point is turned off or broken, means a back-up system or a second central point would be best kept in the server rooms to minimise down time for the business. Also, if there is failure on individual ports the network will keep running due to single port failure. Power of processing of the concentrator for new connections is sectioned. There is no communication between hosts due to the central point. The tree topology shown in Figure 1 is a configuration of both the bus and star and the most applied type of network for set-up and implementation and connects all different star networks together. In this scenario the switch is device connecting the LAN to WAN. Variant of a Tree is the Hybrid topology 8
  • 9. 699434/CMPRPATI and can hold varying physical structures and connected using a single back bone channel. The star topology is more simplified and each device uses a point-to-point link to the central controller named “Hub-PT”, this acts as the interchange point for packets to exchange across the network. Traffic is minimal because it is non- direct to all devices, transmission happen only through the hub itself. A device is able to send data to one or more devices by passing it through the hub and relay the data to specified devices on the network. Strengths of the tree it is quick and simply to and more devices such as another hub. The network can be separated for isolation purposes and priority communications are allowed between different devices. There is also no queuing for any data packets which are time sensitive. Weaknesses mean distance of signal is increased. Cabling increases cost and if a hub is faulty all connections are lost due to network being down. Network Components The VPN infrastructure will require the following network components to be installed across the whole network: • 30 Laptops X 4. • 2 Printers X 4. • 1 Router X 4. • 1 Multi-Switch X 4h. • 1 Server X 4. • 1 Linksys (Remote access point for clients and use of classless IP addresses). • Workstations; 33-Sales, 40-Finance, 38-Human Resources, 26- Technical Support and 40-Marketing X 4 9
  • 10. 699434/CMPRPATI Inclusion of multi-switches, routers, and servers will be considered in the implementation of the solution. An ISP provider would also need to research for the best deal for example BT Business Hub. Perhaps, the ISP could provide cost effective advantage by adding Hosting, Domain Name and Emailing service. Applications VPN can hold many applications on its network. The need to be tied to a desk is also long gone with advancements in technologies, software and devices the possibilities are endless but in other ways. Technology can be too far advanced and not be able to cope with its supported applications. For example, Windows 8, Microsoft was amazed with its own innovation that it forgot about its users and how it would be applied. They had to go back to the drawing board and reconfigure it which is why 8.1 versions were released. Users wanted and missed the original features of windows such as the tool bar. Business and internet needs have automatically changed with these advancements. Including the laptop is not a primary device which would now be how users would connect to the internet and be on the move. The smart phone and tablets are the new in thing and are fully integrated into society. Users are completely tuned in and consume internet data through these new devices due to the marvellous innovation of technologies. It is on this point that businesses should be concerned with private and public privacy, online security, and protection using WI-FI hotspots. It is essential that a VPN is applied when in these places or even at work. VPN Apps 10
  • 11. 699434/CMPRPATI Microsoft does hold the market where these apps are concerned. Blackberry did try and take over the market but the public didn’t take to it and is still trying to break in Microsoft’s share. There are other competitors who have managed to Apple with the Idevice hardware operating IOS software and Google with its Android software. IOS Apps It’s true the VPN space has only been supportive towards IOS and Android which is more of the clear champion than Apple; Apple not allowing the OpenVPN on any IOS device which is their downfall. They believe that PPTP and L2PT protocols are enough to support IOS. Apple soon changed this and gave permission for OpenVPN connect to be used and allowing connection to an OpenVPN server with use of standard OpenVPN CA certificates. Android Apps The play store uses the OpenVPN which permits any OpenVPN service to be configured on Android devices. In return VPN providers now release Android apps for their support of the network. Free Android VPN apps are available (1). Other Apps There are many VPN apps ready available on the internet. One of these is the Speedtest.net app and can run on the IOS and Android. It checks performance and can be downloaded direct to any device such as a phone or tablet. Scalability The company is growing to a point where advancements of working form one office is no longer a valid solution for the business. All employees, 11
  • 12. 699434/CMPRPATI management, partners require a secure way to access resources on the network via both onsite and offsite locations. A dial-up remote access server would not meet the requirements of the business. Adding modems to a network to cope with capacity and even mounting financial costs is an issue to which the solution does not require. The best way forward is to implement the VPN, it allows for the business to grow without the requirement of taking out the existing network or perhaps remodelling. This is why scalability is important to look at and make it cost- effective and scalable from the start. Installation of devices Hardware and software devices connected to the network are demonstrated on the concept diagram Figure 3; Specifics are as listed below: Workstations All workstations will be connected and assigned IP addresses specific to area. All employees will be given their own login and password names which gives a feeling freedom and owning their specific stations whilst working and space. Printers Two printers will be connected and shared accordingly in site 1. Due to the volume of employees and workload, there is more need to manage documentation. At present it is a smaller undeveloped site which does have potential for expansion and could possibly include more printers later on. 12
  • 13. 699434/CMPRPATI The VPN does allow the system to connect and work in the same way seamlessly even if not in the same location as it. Known as printer sharing, including wireless connection communication can happen. Allowing users to print documents on machines located across town or country. This is carried out by using the built-in printer sharer software. This operation can work on any VPN, regardless of commercialism or using a free web application. Naming is essential, and clicking the right criteria is needed. Sending clients personal data to a different office is not a good idea and waste of resources. Laptops Introduction of laptops to departments will allow for them to work away from the office but still be connected to the network on a remote access connection. However, this may not be required with free WIFI the connection may not be necessary. Multi -Switches The choice to use Switch VPN application gives unique algorithms which are a preventive measure against hackers and sniffers. They are compatible for using with Windows, Mac, Linux, IOS Android, and DD-WRT routers. Operating and by creating a virtual router which performs IP routing between multi virtual hubs on the VPN server. This allows for layer 3 between Virtual hubs sections via operating out the IP routing which would be in accordance with the Administrator. Servers 13
  • 14. 699434/CMPRPATI Servers can be added to the VPN and will also feature which allow solicitors to use a login server and as router server for the network. Installation and activation will be applied by Windows VPN. This is carried out before users can log into the network from a VPN session. A VPN session is established via the internet, allowing users to log onto the office network from anywhere – home or away. Firewalls The firewall uses packet filtering to give permission or non-permission for traffic flow. This can be applied through specific types of network traffic. The IP packet filtering system allows for precise what traffic is to transport through the firewall. It is essential for filtering traffic via connecting to private intranets and onto the internet and vice versa. Looking at VPN and Firewalls, analysis shows there are two methods for applying both the VPN and firewall together (2): • VPN already has a connection to the internet and the firewall is in the middle of the server and intranet, acting like a doorway requiring permissions to pass through. • The firewall is interconnected to the internet and VPN server, the VPN server is in between the firewall and intranet. Cloud VPN permits access to be extended to be able to access from remote locations. Using a Gladinet Cloud server for example, any device can be added and used securely with the need to use the VPN. Allowing employees to become more productive and focused on the job in hand than trying access IPSec/VPN. 14
  • 15. 699434/CMPRPATI BT Business Hub This hub is designed to operate with a whole range of VNP solutions. The main reason why it would be best suited to the Solicitors solution. It is well known brand and takes into consideration line rental, broadband and domain hosting. In more detail it allows for (3): • Outbound VPN client Connections • Inbound connections to local VPN server VPN Server & Appliance The Windows Server and Windows Server 2003 have built in VPN server function. Using software firewalls. For example, Microsoft ISA Server, Check Point and Symantec Enterprise Firewall do include built in VPN gateway function. There are other variations which act as alternatives to the normal solution which are dedicated VPN appliance or VPN contractors and can be found on the internet - Cisco, Shiva, Citrix, AEP Networks, Evidian (TrustWay).The provision of a gateway and operations are given by firewall appliances which are Cisco, SonicWall, WatchGuard, Netscreen, Nokia (based on Check Point). Website The company would be better to pay for a web hosting company, to create a front end website for its business. Allowing site 1 to be the Host Identity 15
  • 16. 699434/CMPRPATI Protocol; permits the IP network to recognise the business by giving it a generated Domain Name. All that would be required is to configure the workstations. There is support for varying machines and devices which include iPads, Android, Windows and Macs. Benefits include being able to access sites such as Facebook, Twitter and Flickr. Not only is this access to streaming and watching BBC iPlayer also attainable. Installation would only take minutes but with a larger network perhaps a little longer with checking that all configuration settings are correct before going live. Email The best way to set up a pop Email on a VPN server would be to use a Microsoft server which offers a routing and remote access application on its software. It has a VPN service that would enable a private encrypted connection whilst using the internet. Allowing the server to also host the terminal; using a DSL as the high speed service provider which would require the email. The easiest way would be to configure the POP and then the server could use both. Which to choose from? Use of turn-key appliances does make installation easier and to deploy it. Limitations do exist with how many connections can be supported. Leading to the fact of dealing with upgrading of software is harder when extra users are required on the network. Adding hardware to cope with the eventuality is the quickest option but may not by the best. Running a VPN server on a normal network operating system with a standard server, more RAM can be added, the processor upgraded and the network 16
  • 17. 699434/CMPRPATI interface cards to change. Innovating and upgrading the hardware will add increased capabilities without requirement of buying new devices. Performance & Fault Management Requirements for a fast visible network service with inclusion of planning are necessary. Finding faults and detecting issues is a major part of the management system. Include full handling of network management and equipment. This is important to enable and differentiate form other companies by offering a high value service to customers and clients. Leveraging network based applications ensures the endless capabilities and pre integrate software to be compatible and give a full and final solution to scalability with minimal fuss and financial constraints. Throughput deals with how much traffic is transferred from one location to another within a selected time. Using to measure the performance of hard drives and the RAM; including the internet and the connections the network uses. Network Manager This a software program which is to help understand and make it easier to use the computer network on operating systems such a Windows or Linux – based systems. There are two components of the utility: 1. Network Manager itself – the software manages all connections and sends reports about network changes. 2. The user interface changes dependent on what is being used. For example, Shell, KDE Plasma Workspaces and Cinnamon. Mobile broadband configuration is in development and older versions were first developed in April 2008. This allowed for mobiles to also be configured in a more relatively easy process. It basically is a set of tools which make 17
  • 18. 699434/CMPRPATI networking straight forward. Whether this be through the WI-FI, Ethernet, bond, and bridge, 3G or Bluetooth.. Integration of applications gives power and flexibility to the network manager. It provides facilities for other apps such as browsers, client emails, or system services making its user aware of its status i.e. online or offline. Line Utilisation Ensuring the line is utilised to its full capacity would be to look at the full line utilization and CPU utilization. An application called MTRG is the Multi Router Traffic Grapher. This is a tool which can monitor the traffic load on the links. It is free under the GNU terms (General Public License). It can generate a HTML page displaying images that provide a live visual representation of the company’s traffic. However, there is another way to look how the network is being utilized is by logging onto the router and use “show interface serial x” command, which allows to look at the interface load. User Response Times Using a remote user with a VPN client can bring up some issues of lost connection from the main office or opening documents takes a long to open. Attaching laptops to the domain also can cause disruption due to trafficking. It is essential that there are enough logon caches to support the growing VPN solution. If at any time the VPN becomes fragmented it could cause some really problematic errors which could take time solve, which means the network will be slow but once everything is resolved runtime should be back to normal. Getting users to ping the buffer size which with Microsoft is around 1500 but situations require 1400 drop to avoid problems arising when connecting via ISP and the network. 18
  • 19. 699434/CMPRPATI Configuration of network The configuration of the network will be using a VPN. The Virtual Private Network allows for an installation of a secure network around 1000 devices – workstations, printers, servers, switches and possible inclusion of laptops by creating a physical network. The VPN will be built on top of the existing network infrastructure, using a simple level which will have the requirement of the L2TP to binding VPN data packets into datagram’s and then using IPSec to encrypt the data packets. VPN means a virtual way of connecting a network as it does not require additional physical devices. Private access is gained to the network, controlled and its traffic is encrypted. Clients can then connect to the available network service. The company is best suited to this solution they will be provided with access to LAN (Local Area Network) resources to remote users being connected to entrusted public networks which configure a VPN Gateway. Gateway will control access to all resources on the company’s private network. Management will be given remote access that can then connect to the VPN gateway using a public interface or website once it has been authenticated, partners will be able to access private resources not seen by the other users on the network. Ensuring all traffic in between the workstations and company network will be encrypted and could possible include a special client-side server which is a part of the VPN gateway package. There is room for configuration of a peer- to-peer, this basically means clients are configured with sharing capabilities via VPN configuration. This type of network can only exist when two or more peers are running which will be a future development. 19
  • 20. 699434/CMPRPATI User Access Creating a VPN between the networks will require an address group system which will represent the local network and the address for remote network. Creating an address object for each sides of the VPN and then add to the full group. It is essential that remote and local address groups are carried out and maintained accordingly. SonicWall is a good piece of software which allows this to happen. Otherwise an individual VPN tunnel may be required:  Local group = 142.212.182.0 - 255.255.255.0 Remote group = 142.212.182.9 - 255.255.255.0 Using the same peer public IP address means a separate tunnel for each subnet would be required communicate accordingly. The initial VPN lan-lan installation should permit a mask or default class b mask. There may be space for a supernet mask or summarization mask. Graphical Network Diagram The final concept design for the companies VPN solution clearly demonstrates how all 4 sites with sub networks and departments will be set- up and implemented across the city. It is a good way to keep all data and personal information safe whilst using a public network called WIFI with remote access. Figure 3: Company VNP network: 20
  • 21. 699434/CMPRPATI Time taken to design a full proof network and would fully function would take around three weeks; with analysis of users, employees and proposed outline of the perimeters of the implementation. Looking at the design it was decided to colour code each department and give it a naming scheme to make it easier to look back and reference where errors or maintenance work could possibly be needed. It clearly shows firewalls, internet connection and communication to and from each office. Remote access for laptops, PDA’s and tablets. There is a safeguard of firewalls within the routers but extra software is to be provided as a secondary security measure. Due to the nature of the work all employees in each department will be undertaking training, all work stations will require a high-speed internet connection. A levelling system will also be required looking at the aspect of different roles and trust issues as respect of the office admin would have the same rights or privacy policies as those of management. For example, a simple way to deal with is would be to have different partial drive areas:  (C :) = Human Resources and IT Drive Space  (P :) = Management Drive Space 21
  • 22. 699434/CMPRPATI  (E :) All other employees Drive Space Shared storage space will also allow all users to gain access to files and other relevant information. Each staff member will have a personal account which will allow them to login to any work station in both offices. Address Allocation An IP addressing system was assigned to the router; computer and or devices (end system). Human errors were common and problems difficult to resolve due to time and lack of realising where faults happen. Auto configuration is mainly used but IP’s can still be manually designated and in this case the IP addresses have been assigned manually to devices on the network. Comparing to technologies in the 80’s; a telephone number was used as an IP address and could identify the caller. This was defined as BOOTP (Bootstrap Protocol) it is the first transmission control protocol / internet protocol (TCP/IP) network configuration. It was invented to prevent requiring to manually assigning IP addresses. IP Address Design Creation of the IP addressing table for the city-wide network over 4 sites, including showing 4 subnets is demonstrated in Figure 4. 4,000 hosts were equally divided across the 4 sites. In more detail of a further two tables are included in Figure 5 and 6 showing implementation of IP addresses being assigned to devices and named interfaces to correlate with the VPN design network. Remote access to the company site will allow for IP’s to be assigned to devices and clients will be able to connect on and off the website application 22
  • 23. 699434/CMPRPATI by acquiring these IP addresses when using the company web page. Once a client has finished, the IP will be reassigned to another device. A classless IP address block was formed from the base IP address: 124.212.128.0 and calculated proof to support the evidence of the information in tables are provided below: • IP base address: 142.212.128.0 • Sub network: 255.255.0.0/16 • Address Class type: Class B (128.0.x.x) to (192.255.x.x), this is a classful IP address. • Network - sub networks = 4 • Variable Length Subnet Mask (VLSM) = 255/255/192/0. Sub netting: 1. Classless Inter Domain Routing (CIDR) Prefix = 18. 2. Max hosts/subnet = 16382. 3. Max subnets = 65536. 4. Bits for sub netting = 2. 5. Bits for network = 16. 6. Bits for hosts in subnets = 14. Two layers on network; Layer 1 will deal with the collision domain. If there are for example 24 interfaces on the multi-switch then 24 collision domains will be created. This will be if all interfaces are connected to the network. Layer 2 is the broadcast domain and allows the multi-switch to be faster at transmitting communications over the network using: • Network ID = 142/212/0/0. • Network Broadcast = 142/212/0/255. Splitting the IP addresses was derived by the following calculation: 23
  • 24. 699434/CMPRPATI 1. 4000 hosts / 4 sites = 1000 hosts for each site. 2. 1000 hosts were divided up by the amount of devices to be set-up: • 30 Laptops. • 2 Printers. • 1 Router. • 1 Multi-Switch. • 1 Server. • 1 Linksys (Remote access point for clients and use of classless IP addresses). • Workstations; 33-Sales, 40-Finance, 38-Human Resources, 26- Technical Support and 40-Marketing. In total 212 hosts assigned to the network. This was implemented as a failsafe in case the internet connection was lost, the network could still function and vice versa. 388 hosts are still available to be assigned when the company grows and would like to expand; capability is preinstalled into the design for all sites to become interchangeable. Figure 4: IP Addressing Table Network Sub network ID Host IP Range (Start – End Number) 1 142.212.0.0 142.212.0.1 - 142.212.63.254 2 142.212.64.0 142.212.64.1 - 142.212.127.254 3 142.212.128.0 142.212.128.1 - 142.212.191.254 4 142.212.192.0 142.212.192.1 - 142.212.255.254 24
  • 25. 699434/CMPRPATI An IP addressing table was devised to assign IP addresses to specific devices and location on the network. Ensuring correctness and error free handling of the VNP network and using a naming scheme – Figure 5, allowed for all devices to be accounted for and IT technical support to resolve issues with understanding where a problem may lay. Figure 5: IP addressing sample table for Site 1, using network 3 with sub network ID 142.212.128.0 from Figure 4: IP Addressing Table Site 1 Devic e Interface IP Address Depart Login Passwo rd Shar e Grou p Domai n Comp HR 142.212.128. 14 Human Resourc es ******* ******* 2 1 + Comp FIN 142.212.128. 15 Finance ******* ******* 2 2 + Comp TS 142.212.128. 16 Technica l Support ******* ******* 2 3 + Comp SAL 142.212.128. 17 Sales ******* ******* 2 4 + Comp MARK 142.212.128. 18 Marketin g ******* ******* 2 5 + Print Printer1 142.212.128. 26 Printer ******* ******* 2 6 + Print Printer1 a. 142.212.128. 27 Printer ******* ******* 2 6 + Laptops Lap HRtLap 1 142.212.128 .38 Human Resource ******* ******** 2 1 + 25
  • 26. 699434/CMPRPATI s Lap FINLap2 142.212.128 .39 Finance ******* ******** 2 2 + Lap TSLap3 142.212.128 .40 Technical Support ******* ******** 2 3 + Lap SALLap 4 142.212.128 .41 Sales ******* ******** 2 4 + Lap MARLap 5 142.212.128 .42 Marketing ******* ******** 2 5 + The table will grow with more devices connected and IP addresses assigned and level of security given to each employee. All connection devices are listed in Figure 6. Pinpointing errors or faults on the network is reduced and locating problems quicker because devices are matched to a specific network site using the interface name and IP address. Figure 6: The IP Address Table for the VPN design. Device Interface IP Address Subnet Mask Default Gateway ISP/CLOUD WAN 136.212.128. 240 255.255.255.2 55 0.0.0.0 INTRANET LAN1 142.212.3.0 255.255.255.0 10.211.254.2 54 INTRANET LAN2 142.212.4.0 255.255.255.0 10.211.254.2 54 INTRANET LAN3 142.212.5.0 255.255.255.0 10.211.254.2 54 INTERNET LAN4 142.212.6.0 255.255.255.0 10.211.254.2 54 VPN HOST 142.54.0.1 255.255.255.0 10.211.254.2 54 ROUTER 1 FA 0/0 142.212.128. 255.255.255.0 10.211.254.2 26
  • 27. 699434/CMPRPATI 8 54 ROUTER 1 FA 1/0 142.212.128. 7 255.255.255.0 10.211.254.2 54 ROUTER 2 FA 0/0 142.212.128. 6 255.255.255.0 10.211.254.2 54 ROUTER 2 FA 0/1 142.212.128. 5 255.255.255.0 10.211.254.2 54 ROUTER 3 FA 0/0 142.212.128. 4 255.255.255.0 10.211.254.2 54 ROUTER 3 FA 1/0 142.212.128. 3 255.255.255.0 10.211.254.2 54 ROUTER 4 FA 0/0 142.212.128. 2 255.255.255.0 10.211.254.2 54 ROUTER 4 FA 0/1 142.212.128. 1 255.255.255.0 10.211.254.2 54 SERVER 1 SERVSITE 1 142.212.128. 55 255.255.255.0 10.211.254.2 54 SERVER 2 SERVSITE 2 142.212.128. 54 255.255.255.0 10.211.254.2 54 SERVER 3 SERVSITE 3 142.212.128. 53 255.255.255.0 10.211.254.2 54 SERVER 4 SERVSITE 4 142.212.128. 52 255.255.255.0 10.211.254.2 54 LINKSYS – REMOTE ACCESS LINKRASI TE1 142.212. 128.9 255.255.255.0 10.211.254.2 54 SUBNETWORK1 SUBNETSI TE1 142.212.96.1 3 255.255.255.0 10.211.254.2 54 SUBNETWORK2 SUBNETSI TE2 142.212.96.1 2 255.255.255.0 10.211.254.2 54 SUBNETWORK3 SUBNETSI TE3 142.212.96.1 1 255.255.255.0 10.211.254.2 54 SUBNETWORK4 SUBNETSI 142.212.96.1 255.255.255.0 10.211.254.2 27
  • 28. 699434/CMPRPATI TE4 0 54 ENCRYPTION 168-BIT 3- DES AUTHENTICATION HMAC- MD5 The table details all devices required for the whole network to be installed across the city. All unassigned IP addresses will be implemented in the remote access addressing scheme to provide wider usage for customers and employees connecting on devices outside of the LAN. Wireshark Lab: IP Investigation of the IP protocol was carried out with analysis of a trace IP datagram which has been sent and received and answering questions to show understanding from the IP Wireshark lab and illustrate using screenshots: Lab Activity 4 - IP Figure 7 identifies ICMP Echo Requests or better known as PING which can be traced to the client computer through intermediate routers. Figure 7: ICMP Echo Request capture. 28
  • 29. 699434/CMPRPATI Activity 6.a - IP 1. Select the first ICMP Echo Request message sent in this trace, and expand the Internet Protocol par of the packet in the packet details window. What is the source IP address? Answer – Using figure 7: the source of the IP address is 192.168.1.102. 2. Within the IP packet header, what is the value in the upper layer protocol field? Answer- The value in the upper layer protocol is ICMP (1). 3. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. Answer – The IP datagram not been fragmented. This is determined by the more fragments bit = 0, meaning the data was not fragmented. Activity 6.b - Fragmentation 1. Has that message been fragmented across more than one IP datagram? Answer- The packet has been fragmented across more than one IP datagram: 29
  • 30. 699434/CMPRPATI Figure 8: ICMP Echo Request packet size = 2000, first fragment The first ICMP Echo Request message which was sent to the computer after the Packet Size was changed in Wireshark to 2000 is shown in Figure 8. 2. Print out the first fragment of the fragmented IP datagram. What information in the IP header indicates that the datagram has been fragmented? What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram? Answer – The IP header indicates that the datagram has been fragmented by looking at the flags bit is set which has been fragmented. Understanding the first and second fragment is to look at the fragment which is offset at 0; the first fragment is 0. The IP datagram is 1500 in total length and includes the header. 30
  • 31. 699434/CMPRPATI Figure 9: ICMP Echo Request packet size = 2000, second fragment 3. Print out the second fragment of the fragmented IP datagram. What information in the IP header indicates that this is not the first datagram? Answer - The second fragment can be identified in Figure 9 by looking at the IP header and the fragment offset has changed to 1480. There are more fragments because the flag is not set. Transport Layer Protocols The transport layer is the host to host within the TCP/IP model. It is the conversion point between the hardware layers, at the architectural centre and above software orientated layers. Protocols functioning at the transport layer are required to ensure services are working to run the software applications above to run an internetwork. They allow connections to be established and maintained between software services on devices furthest away on the network. Acting like a bridge 31
  • 32. 699434/CMPRPATI between the higher layer applications to send data reliably without error corrections, loss of data, flow management and the network layer protocols (where unreliability occurs with no acknowledgement). TCP (Transmission Control Protocol) – sustains high throughput and consumes high-speed transfers over a wide distance. There is development of Fast TCP which is a comparison to TCP and congestion control. UDP (User Datagram Protocol) – this is similar to TCP and operates over IP networks. There are fewer error recovery systems with UDP, relying on a user resending datagram’s if they are lost. It is a more direct and quicker way to send and receive data for broadcasts. Wireshark Lab: TCP Investigation of TCP was carried out with analysis of the behaviour in terms of how they are sent and received by transferring a 150KB file named alice.txt. Answering questions to show understanding of TCP Wireshark lab and illustrate using screenshots: Lab Activity 3 – TCP Figure 6 is a screenshot displaying filtered packets using a TCP protocol. 32
  • 33. 699434/CMPRPATI Figure 6: TCP Protocol Lab Activity 4.a 1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? Answer – The IP address is 192.168.1.102 and TCP port number is 1161 used by the client computer when transferring the file to gaia.cs.umass.edu. 2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection? Answer – The IP address of gaia.cs.umass.edu is 128.119.245.12 and port number 80 is used for the connection which indicates a web server. Lab Activity 4.b 1. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment? 33
  • 34. 699434/CMPRPATI Answer – 0 is the sequence number of the TCP SYN segment to initiate the TCP connection with the client computer and gaia.cs.umass.edu. The segment can be set to 1 which will identify it as segment and can be located in the flag section. 2. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How didgaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? Answer – The sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply is 0. The Acknowledgement number: 1 is the value of the acknowledgement field and gaia.cs.umass.edu determined using value by adding 1 to the sequence number of the previous segment. The segment can be identified as a SYNACK Acknowledgement and syn bits are both set. 3. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you’ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA field. Answer - The sequence number of the TCP segment containing the HTTP POST command is 1. Types of Data Transfer with VPN The VPN is interchangeable and can offer both TCP and UDP connections to the network server. The company is given more flexibility with TCP and is more reliable than UDP. Once a packet is sent with TCP, an ACK 34
  • 35. 699434/CMPRPATI (acknowledgement) packet is received as a reply confirmation acknowledging it has been sent and received but is not always needed with VPN. Connections using TCP are allowed networks which use firewalls with ports such as 80, 443, unlike UDP traffic may be possibly blocked especially in commercial networks. Disadvantages to TCP with VPN means connection is slower than UDP. To try and fasten the process would be to source a VPN provider who offers L2TP or consider OpenVPN on a UDP for that faster connection. Choosing to use UDP does mean that the connection is faster in comparison to TCP. Depending what its purpose UDP is more consistent fir video/audio streaming and P2P traffic. The OpenVPN connection is more suited for UDP in terms if functioning over non-blocked ports likes 53/UDP (DNS). Unlike TCP the UDP can become unreliable and there is no guarantee or acknowledgement when packets are delivered. The company can allow to run both TCP/UDP and should consider more what data or information is being sent. TCP is more likely to be used with the VPN with the majority of employees will requiring using the internet, send emails and would like the network traffic to be strong link and not have data going missing. Social media is fast becoming the new fad with streaming videos and posting photos using (Netflix, Face book and Twitter) TCP would be too slow and would buffer whilst waiting for all the packets to be sent and received in the right order. The UDP is a quicker way and the image/video would be instant. In the case of loss of connection, the image/video would be resent once it was realised it had not be received. Protocol Considerations 35
  • 36. 699434/CMPRPATI The VPN has secure tunnels through the use of the internet. This is created by the company’s remote access site 1; these are also site to site VPN and include the VPN servers on the network. Various tunnelling protocols are available and put into place as the actual VPN or the VPN connection. Some of these which can be considered are:  (PPTP) – Point to Point Tunnelling Protocol.  (L2T) – Layer 2 Tunnelling Protocol  (IPSec) Internet Protocol Security tunnel mode  (SSL) Secure Sockets Layer The implementation of the VPN solution will include the support of these protocols. Though these can be limited dependant on how the design is set- up. Much thought of the scalability is needed as it does effect which tunnelling protocols are to be most suited. For example, the remote access users should ensure sufficient client software which can support the protocols chosen. Including looking at department to department VPN, the gateway VPN at both points have compatible or common protocols. PPTP A Microsoft protocol PPTP is included in their operating systems, this is built in and called PPTP client software. Availability of other PPTP clients for Macintosh and Linux/UNIX operating systems are out there; making PPTP a viable choice for the VPN. It is not deemed as secure as other tunnelling protocols. It uses an encryption method, a Microsoft point to point encryption (MPPE) but not certified based. 36
  • 37. 699434/CMPRPATI It is supported by ISA server wall also a Microsoft technology, the Cisco PIX and inclusion of other models of WatchGuard. L2TP Microsoft and Cisco worked together to develop and combine PPTP and Layer 2 Forwarding (L2F) protocols. It incorporated the IPSec as the encryption. Thus providing a more secure and strong security with certification based authentication and data uprightness and more importantly confidentiality. The L2TP would allow for the office to use a Microsoft operating system due to it being built in. For example, it is on Windows 2000, XP and the server 2003. Software is all too easily attainable from the internet. Installation and cost free program software can be installed on computers such as Windows 98, Me, and NT 4.0 due to compatibility. If using Linux clients, software like OpenL2TP can be implemented. Macintosh operating systems (Panther) also uses Check Point, Cisco PIX and WatchGuard firewall or integrated VPN products with the Microsoft ISA server, allowing for a simple office to office VPN to work. IPSec The IPSec could be added to the encryption for L2PT connection. It has a tunnel model which can create a connection. An IPSec VPN is supported by firewalls and integrated VPN appliances. Also it is the only tunnelling protocol to be supported by the main known firewalls:  Microsoft's ISA Server  Check Point  Cisco PIX, Netscreen, 37
  • 38. 699434/CMPRPATI  SonicWall, WatchGuard, Symantec Scalability is more manageable by using this type for office to office VPN. SSL A third scalable VPN protocol is the SSL; if true it wouldn’t be a full VPN solution to begin with. It is a clientless solution which incorporates a selected web browser. The browser becomes the client and is a good answer if the users need access to web enabled servers only. Look at today’s world and technology there really is not computer or laptop that does not use a web browser which supports SSL. Access can be provided for one to many clients required. It ensures the use of an operating system up to date such as Microsoft Windows 8 / 8.1, 7 or Vista. It is a very cost effective solution and minimal installation of software for the client and disruption to business. Security There are various security issues relating to Networks. The IPSec operation is a very relevant and preventative security protocol for networking. IPSec is connected to RFC 2401 and innovated for everyday use with VPN’s right across the internet and for example schools, colleges and Universities. The packet structure is made from an IP header/IPSec header/Encapsulating security payload. The encryption facility is provided by IPSec with the 3DES and authentication with MD5. There is also an internet Key Exchange (IKE) and ISAKMP, this automatically allows distribution of Security (secret) Keys in between the IPSec peer devices, these are the routers and concentrators. Securing VPN 38
  • 39. 699434/CMPRPATI The VPN uses the internet to connect to a private network and it is assumed that this is a secure connection permitting confidential data to be transmitted over the public network. Sharing files, resources, data files and video without thought because it is deemed that the network is connected on the same network. This is the best way for remote access and allows for the option for global offices to be added and data to be shared and viewed privately. Connection of the entire network using the VPN would be best to ensure connection is made at both ends of the locations with the main router or gateway address. This would mean there would be a requirement of VPN being built in for such a function. Solution does support remote access to users outside the office. This allows for when staff use the WI-FI hotspot to gain access to the company network, if required in meetings and information is needed. The employee would not have to leave to go back to the office. Main point to remember the employee’s device must support the same VPN solution to work correctly. Active Directory The active directory permits the management of network to be implemented and maintained through a numbers of functions. It forms a relationship of trust and long term this trust is managed. Modifications to the concept of the network can be altered. It also allows for configuration of site links and servers. The image below illustrates various areas of the Active Directory which needs to be considered: Active Directory-Based Activation (ADBA) (7): 39
  • 40. 699434/CMPRPATI The latest software which Microsoft windows has been introduced is Windows 8.1. It has its own Active Directory-Based Activation (ADBA) which is new to the Windows Umbrella. Its functionality lets businesses activate workstations through a connection to their own domain. Other enterprises operate by off-site locations that can connect to company applications. Gone are the days when such work based technologies would require a retail key or Multiple Activation Key (MAK) or needing to manually connecting to a network in order to activate and run software applications by use of Key Management Services (KMS). Using ADBA would make implementing the network and devices a lot simpler. Activation can automatically be operated, if chosen devices are compatible with the Windows operating system, and connect to the domain service. Once users join the devices to the domain, ADBA for example will automatically activate the Windows framework which is installed on a computer. This is dependent on whether the computer or device has a generic Volume licence key (GVLK) installed. Advantage no single device would be required to act as the active object due to it being fully distributed through the domain. 40
  • 41. 699434/CMPRPATI Example of the Active Directory Windows Server, 2012, Windows 8 & Office 2013 (4): Cost of Network Total cost breakdown for all hardware and software took time to research and look for the best computability of existing equipment with the first site and advancing to the rest of the network for best performance. There are costs which will be one-off and this deal with the hardware and installation of the software. However, updates to software could possibly incur an annual fee for subscription which is down to Microsoft monopolising the market with Windows 8. Other areas to look at are host domain names and charges. Some are free and only ask for you to keep it up to date and blog every 3 to 6 months. Whereas, other sites ask for a small fee and look after the site for you with minimal input from client to add data such as dates and adding events or promotions to entice new customers. Looking at possible VPN Hosting one alternative to using BT for this service would be Free VPN Hosting. They offer the service with free with 5 GB secure cloud solution which is a requirement of the solicitors (6). 41
  • 42. 699434/CMPRPATI They are a very trusted site and provider of the PPTP VPN service. All partners would be able to login and know that their data, web access and privacy rights were being upheld at no extra cost. Summary A network is best used enabling and sharing hardware devices, computer data and information with ease of access. Using a remote access point on a computer through a local area network or intranet is most effective and naming it so users can find files and data is known as sharing resources or network resources. In more detail shared LAN are used by many different system resources for example hard drives, scanners, printers and network cards. Sharing resources does mean there are some restrictions which must be met: File Transfer Protocol (FTP) and File sharing. It is a must that security procedures are implemented and maintained to the highest standard in order to keep the perimeters of the network safe including all technologies on it. Mapping: Proper naming schemes must be created and shared destination addresses. All shared operating systems, hardware, files can then be determined and accessed where necessary. Compatibility: Client server-side require the same operating systems or applications to access the shared resources. Otherwise a message box will appear advising of compatibility issues arising and requested for the correct software/hardware to run file sharing – troubleshooting; communication delays dependent also if the network is connected correctly. Peak times are one issue where some users cannot get on to the internet due to the server working overtime to fulfil the needs of a global network. Users can pay more for their broadband as BT, Sky, Virgin and other business can charge whatever price they choose to the expense of the user. 42
  • 43. 699434/CMPRPATI With advancements in technologies more and more devices are being added to local and global networks and thanks to the cloud linking it to mobiles and app stores such as play store for android. This has led to people’s opinions and expectations changing quite considerably from the early days of computer networks. Managers who deal with IT want to be able to present and use applications with various devices from PDA’s to tablets; enhancements of HD web streaming to client downloads and using websites to make meetings across public and private networks controlling the equipment themselves and with ease of use. Networks are ever changing and adjusting to cope with the demand of user expectations. Through performance and access issues come into play when relating to such expectations, user’s behaviours and how they are used either work or gaming for example. Local area network is being over taken by the wider area network as users want and need to be able to communicate with the outside world. For example users being holiday and wanting to call home via Skype or Facebook free call. Business networks are also jumping on to cloud and connecting devices which will also turn into a network at some point in the near future. Completed Wireshark Labs Lab Activity 1 – Getting Started Learning about Wireshark through packet capturing, below is a screenshot of the software in action. Displaying live packet data containing protocol messages exchanged between the laptop and the gaia.cs.umass.edu server: Figure 1: Wireshark window at HTTP GET Message from gaia.cs.umass.edu URL. 43
  • 44. 699434/CMPRPATI Figure 1.Packet Capture Using the filter to search “HTTP” permits the HTTP message to be shown within the packet-listing. The HTTP GET message is highlighted showing the Ethernet frame, IP datagram, Internet Protocol and Transmission Control Protocol. Figure 2: Listed protocols in live capture: 1. List 3 different protocols that appear in the protocol column in the unfiltered packet listing window in step 7 above. Answer - Three different protocols which appear in the protocol column are TCP, UDP, and SSDP prior to filtering the packet-listing. 44
  • 45. 699434/CMPRPATI 2. How long did it take from when the HTTP GET message was sent until the HTTP OK reply was received? (By default, the value of the Time column in the packet listing window is the amount of time, in seconds, since Wireshark tracing began. To display the Time field in time-of-day format, select the Wireshark View pull down menu,then select Time Display Format, then select Time-of-day.) Answer - Allotted time taken for the HTTP GET message to be sent was 106.380374000 until the HTTP OK reply was received at 106.49769000, leaving a delay of 0.117316 seconds. 3. What is the Internet address of the gaia.cs.umass.edu (also known as wwwnet.cs.umass.edu)? What is the Internet address of your computer? Answer- Looking at figure 2 of the screen shot, the IP address of the IP address of gaia.cs.umass.edu is 192.168.0.3; the IP address of the laptop is 128.119.245.12. 4. Print the two HTTP messages (GET and OK) referred to in question 2 above. To do so, select Print from the Wireshark File command menu, and select the “Selected Packet Only” and “Print as displayed” radial buttons, and then click OK Answer – Print out of HTTP GET and HTTP Reply message demonstrating communication of sending and receiving protocol messages. This is a print screen of how the print out of a HTTP GET message would look like: 45
  • 46. 699434/CMPRPATI This is a print screen of how the print out of a HTTP Reply message would look like: Lab Activity 2.A – HTTP An quick insight into HTTP/response interaction by using a downloaded HTML file; which is small and contains no embedded objects. Figure 3: Screenshot of Wireshark once http://gaia.cs.umass.edu/wireshark-labs/HTTP-file1.html was retrieved in the browser. 46
  • 47. 699434/CMPRPATI Figure 3.HTTP 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? Answer – The browser is running HTTP version 1.1. The server is operating HTTP version 1.1. 2. What languages (if any) does your browser indicate that it can accept to the server? Answer – There is no indication of what languages are accepted to the server. In figure 3 there is an Accept-Range: bytesrn with Content-Length: 128rn. The type of language the server would accept is en-us.en;q-0.5rn. 3. What is the IP address of your computer? Of the gaia.cs.umass.edu server? Answer - Looking at figure 3 of the screen shot, the IP address of the IP address of the gaia.cs.umass.edu server is 192.168.0.3; the IP address of the laptop is 128.119.245.12. 47
  • 48. 699434/CMPRPATI 4. What is the status code returned from the server to your browser? Answer – The status code returned from the server to the browser was HTTP/1.1 200 OK (text/html). 5. When was the HTML file that you are retrieving last modified at the server? Answer – The retrieved HTML file was Last-Modified on Thu, 27 Nov 2014 03:40:01 GMYrn at the server. 6. How many bytes of content are being returned to your browser? Answer – Bytes of content being returned to the browser is Content-Length: 128rn. 7. By inspecting the raw data in the packet content window, do you see any headers within the data that are not displayed in the packet-listing window? If so, name one. Answer– Looking at the raw data within the packet content window, there are no headers within the data which are not shown in the packet-listing. The reason for this is headers are located in the raw data. Lab Activity 2.B - HTTP Authentication Demonstrating the type of sequence when HTTP messages are exchanged; Figure 4: Screenshot of Wireshark once http://gaia.cs.umass.edu/wiresharklabs/protected pages /HTTP- wiresharkfile5.html was retrieved in the browser. 48
  • 49. 699434/CMPRPATI Figure 4.HTTP Authentication 1. What is the server’s response (status code and phrase) in response to the initial HTTP GET message from your browser? Answer – The response from the server was Status Code 401, Phrase Authorization Required (text/html) to the initial response of the HTTP GET message from the browser. 2. When your browser’s sends the HTTP GET message for the second time, what new field is included in the HTTP GET message? Answer – Figure 5: Authorisation field included in the HTTP GET message as displayed below: Figure 5: Authorization column. Looking at Figure 5 a new field was added and highlighted as Authorisation. (Basic d2ly ZXN0dwrl bnRzom5ldHdvcms=). 49
  • 50. 699434/CMPRPATI Lab Activity 3 – TCP Figure 6 is a screenshot displaying filtered packets using a TCP protocol. Figure 6: TCP Lab Activity 4.a 1. What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu? To answer this question, it’s probably easiest to select an HTTP message and explore the details of the TCP packet used to carry this HTTP message, using the “details of the selected packet header window” (refer to Figure 2 in the “Getting Started with Wireshark” Lab if you’re uncertain about the Wireshark windows. Answer – The IP address is 192.168.1.102 and TCP port number is 1161 used by the client computer when transferring the file to gaia.cs.umass.edu. 50
  • 51. 699434/CMPRPATI 2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection? Answer – The IP address of gaia.cs.umass.edu is 128.119.245.12 and port number 80 is used for the connection which indicates a web server. Lab Activity 4.b 1. What is the sequence number of the TCP SYN segment that is used to initiate the TCP connection between the client computer and gaia.cs.umass.edu? What is it in the segment that identifies the segment as a SYN segment? Answer – 0 is the sequence number of the TCP SYN segment to initiate the TCP connection with the client computer and gaia.cs.umass.edu. The segment can be set to 1 which will identify it as segment and can be located in the flag section. 2. What is the sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply to the SYN? What is the value of the Acknowledgement field in the SYNACK segment? How didgaia.cs.umass.edu determine that value? What is it in the segment that identifies the segment as a SYNACK segment? Answer – The sequence number of the SYNACK segment sent by gaia.cs.umass.edu to the client computer in reply is 0. The Acknowledgement number: 1 is the value of the acknowledgement field and gaia.cs.umass.edu determined using value by adding 1 to the sequence number of the previous segment. The segment can be identified as a SYNACK Acknowledgement and syn bits are both set. 51
  • 52. 699434/CMPRPATI 3. What is the sequence number of the TCP segment containing the HTTP POST command? Note that in order to find the POST command, you’ll need to dig into the packet content field at the bottom of the Wireshark window, looking for a segment with a “POST” within its DATA field. Answer - The sequence number of the TCP segment containing the HTTP POST command is 1. Lab Activity 4 - IP Figure 7 identifies ICMP Echo Requests or better known as PING which can be traced to the client computer through intermediate routers. Figure 7: ICMP Echo Request capture. Activity 6.a - IP 1. Select the first ICMP Echo Request message sent in this trace, and expand the Internet Protocol part of the packet in the packet details window. What is the source IP address? Answer – The source of the IP address is 192.168.1.102. 52
  • 53. 699434/CMPRPATI 2. Within the IP packet header, what is the value in the upper layer protocol field? Answer - The value in the upper layer protocol is ICMP (1). 3. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented. Answer – The IP datagram not been fragmented. This is determined by the more fragments bit = 0, meaning the data was not fragmented. Activity 6.b - Fragmentation 1. Has that message been fragmented across more than one IP datagram? Answer - The packet has been fragmented across more than one IP datagram: Figure 8: ICMP Echo Request packet size = 2000, first fragment 53
  • 54. 699434/CMPRPATI The first ICMP Echo Request message which was sent to the computer after the Packet Size was changed in Wireshark to 2000 is shown in Figure 8. 2. Print out the first fragment of the fragmented IP datagram. What information in the IP header indicates that the datagram has been fragmented? What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram? Answer – The IP header indicates that the datagram has been fragmented by looking at the flags bit is set which has been fragmented. Understanding the first and second fragment is to look at the fragment which is offset at 0; the first fragment is 0. The IP datagram is 1500 in total length and includes the header. Figure 9: ICMP Echo Request packet size = 2000, second fragment 3. Print out the second fragment of the fragmented IP datagram. What information in the IP header indicates that this is not the first datagram Answer - The second fragment can be identified in Figure 9 by looking at the IP header and the fragment offset has changed to 1480. There are more fragments because the flag is not set. 54
  • 55. 699434/CMPRPATI Lab Activity 4 – Ethernet Understanding the Ethernet protocol and addressing by capturing and analysing Ethernet frames: Figure 10: HTTP GET message sent from gaia.cs.umass.edu. Packet 334 in Figure 10 contains the HTTP GET message. This was implemented by entering the http://gaia.cs.umass.edu/wireshark-labs/HTTP- ethereal-lab-file3.html into the browser. 55
  • 56. 699434/CMPRPATI Figure 11: IP4 enabled protocols disabled displaying information about below the IP. Activity 8.a – Ethernet 1. What is the 48-bit Ethernet address of your computer? Answer – The 48-bit address of the computer is 00:18:de:e1:ab:ee. 2. What is the 48-bit destination address in the Ethernet frame? Is this the Ethernet address of gaia.cs.umass.edu? (Hint: the answer is no). What device has this as its Ethernet address? Answer – The 48-bit destination address in the Ethernet frame is 20:0c:c8:9d:08:cb. The Ethernet address is not the gaia.cs.umass.edu. It is the Netgear router which is the device of the address, this is the link used to leave the subnet. 56
  • 57. 699434/CMPRPATI 3. What is the value of the Ethernet source address? Is this the address of your computer, or of gaia.cs.umass.edu (Hint: the answer is no). What device has this as its Ethernet address? Answer – The Ethernet source address is 00:18:de:e1:ab:ee. This is the address of the computer and not gaia.cs.umass.edu. The Netgear router has this as the Ethernet address. 4. What is the destination address in the Ethernet frame? Is this the Ethernet address of your computer? Answer – 20:0c:c8:9d:08:cb is the destination address in the Ethernet address. This address does not belong to the computer but to the Netgear router. 5. Give the hexadecimal value for the two-byte Frame type field. What upper layer protocol does this correspond to? Answer – 0x0800 is the hexadecimal value for the two-byte Frame type field which corresponds to the IP upper layer. Additional Lab Material Activity Lab 3.a – DNS 1. Run nslookup to obtain the IP address of a Web server in Asia (eg. Kyoto University in Japan). What is the IP address of that server? 57
  • 58. 699434/CMPRPATI Answer – Command prompt to operate nslookup to obtain the IP address of Kyoto University; a web server in Asia. Figure 12: nslookup in action with command prompt. Figure 12 displays 192.168.0.1 as the IP address of the server in Asia. 2. Run nslookup to determine the authoritative DNS servers for The University of Loannina in Greece. Answer – Command prompt to operate nslookup to determine the DNS servers in Europe. Figure 13: nslookup determining authoritative DNS servers. Figure 13 displays the nslookup for a European University in Ioannina Greece. 58
  • 59. 699434/CMPRPATI 3. Run nslookup so that one of the DNS servers obtained in Question 2 is queried for the mail servers for Yahoo! Mail (mail.yahoo.com). What is its IP address? Answer – nslookup operated for the DNS servers obtained in Question 2 can query the mail servers for Yahoo! Mail (mail.yahoo.com). Figure 14: nslookup of DNS server querying task 2 with mail servers for Yahoo mail. Figure 14 was unable to complete the nslookup query due to not being to find the Yahoo mail address. Attempts made after was also unable to carry out the task due to the DNS server timing out. To answer this task another nslookup was completed and returned the correct information. A search for a Hong Kong University in china was functioned – the IP address was 137.189.6.21 and server barnowl.itsc.cuhk.edu.hk. 59
  • 60. 699434/CMPRPATI Activity Lab 3.b – Tracing DNS Figure 15: ipconfigall in action within command prompt: 1. Locate the DNS query and response messages. Are they sent over UDP or TCP? Answer – The DNS query and response messages are sent over UDP as displayed in the screenshot Figure 16 below: 60
  • 61. 699434/CMPRPATI Figure 16: Tracing DNS in action. 2. What is the destination port for the DNS query message? What is the source port of DNS response message? Answer – The destination port is 53 for DNS query message. The source port of the DNS response is 53. 3. To what IP address is the DNS query message sent? Use ipconfig to determine the IP address of your local DNS server. Are these two IP addresses the same? Answer – IP address 192.168.0.1 is where the DNS query message is sent. Using Figure 15: ipconfig-all to find the DNS IP address shows 192.168.0.1 is the same one because it is the local server. 4. Examine the DNS query message. What “Type” of DNS query is it? Does the query message contain any “answers”? Answer – The “Type” of DNS query is A Standard Query. It does not contain answers within it. 61
  • 62. 699434/CMPRPATI 5. Examine the DNS response message. How many “answers” are provided? What do each of these answers contain? Answer – Using Figure 17 below, the DNS server contains only one answer which is the name of the host, class and IP address: Figure 17: DNS Response 6. Consider the subsequent TCP SYN packet sent by your host. Does the destination IP address of the SYN packet correspond to any of the IP addresses provided in the DNS response message? 62
  • 63. 699434/CMPRPATI Answer – The destination IP address does correspond with other IP addresses in the DNS response message. The IP address 4.31.198.44 is provided by the DNS server for www.ietf.org, as shown in Figure 18. Figure 18: IP address provided by the DNS server. 7. This web page contains images. Before retrieving each image, does your host issue new DNS queries? Answer – The DNS query does not require issuing new queries to retrieve images. They are uploaded from www.ietf.org site as the host uses a cached address which stores information. Lab Activity 4 - UDP Figure 19 displaying packets being captured by the host demonstrating the sending and receiving of UDP packets. Figure 19: UDP Capture. 1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. Name these fields 63
  • 64. 699434/CMPRPATI Answer – Looking at Figure 19 and choosing packet 20; there are four fields in the UDP header. These fields are the source port, destination port, length and the checksum. 2. By consulting the displayed information in Wireshark’s packet content field for this packet, determine the length (in bytes) of each of the UDP header fields. Answer – The packet content field will allow for each UDP header field to be 20 bytes long in length. 3. What is the protocol number for UDP? Give your answer in both hexadecimal and decimal notation. To answer this question, you’ll need to look into the Protocol field of the IP datagram containing this UDP segment. Answer – Protocol number for UDP is 11. The hexadecimal number is 0x11hex and decimal notation is 17 in value. 4. Examine a pair of UDP packets in which your host sends the first UDP packet and the second UDP packet is a reply to this first UDP packet. (Hint: for a second packet to be sent in response to a first packet, the sender of the first packet should be the destination of the second packet). Describe the relationship between the port numbers in the two packets. Answer – Using Figure 20 and 21 to compare demonstrates the source port of the UDP sent by the host is the same as the destination port (26865 / 30035). This is reversed when the destination port of the UDP packet is the same as the source port of the reply packet. 64
  • 65. 699434/CMPRPATI Figure 20: UDP sent by the host. Figure 21: UDP reply to the host. Activity Lab 7 – DHCP Performance of several DHCP-related commands and captures the DHCP messages exchanged as a result of executing these commands in Figure 22. 65
  • 66. 699434/CMPRPATI Figure 22: Command prompt in action using Ipconfig/release and renew. Figure 23 demonstrates the first ipconfig renew command and shows generation of four new DHCP packets; DHCP Discover packet, DCHP Offer packet, DCHP Request packet and a DCHP Ack packet: 66
  • 67. 699434/CMPRPATI Figure 23: DHCP Packet number 36 with DHCP Discover packet expanded. Activity 7.a 1. Are DHCP messages sent over UDP or TCP? Answer – UDP stands for User Datagram Protocol and used for DHCP messages not TCP. 2. Draw a timing datagram illustrating the sequence of the first four-packet Discover/Offer/Request/ACK DHCP exchange between the client and server. For each packet, indicated the source and destination port numbers. Answer – Port numbers are the same as in the packet capture as the graph analysis. DCHP Discover: Source 0.0.0.0 to Destination 255.255.255.255 DCHP Request: Source 0.0.0.0 to Destination 255.255.255.255 DCHP Offer: Source 192.168.0.1 to Destination 192.168.0.3 DCHP Ack: Source 192.168.0.1 to Destination 192.168.0.3 67
  • 68. 699434/CMPRPATI Figure 24: Timing datagram to show the first four-packet Discover/Offer/Request and Ack. 3. What is the link-layer (e.g., Ethernet) address of the host? Answer – The link layer address of the host on the computer is (00:18:de:e1:ab:ee) which uses the Ethernet. 4. What values in the DHCP discover message differentiate this message from the DHCP request message? Answer – Option 53: DHCP Message Type is where the values differentiate the Discover message from the request message. 5. What is the IP address of the DHCP server? Answer – The value of the Transaction ID is 0xe7646a7d. The second Transaction ID is 0xe4eff25f. A transaction ID is used so that the DCHP server can differentiate between client requests during the request process. 6. Explain the purpose of the lease time. How long is the lease time in your experiment? Answer – Lease time is the amount of time the DHCP server will assign an IP address to a client. During the lease time, a DHCP server will not assign the IP given to a client to another, unless the client releases it. The expiry time can end and the IP address will be reused by the DHCP server and the IP dedicated to another client. The lease time in Figure 23 is 1 day. 7. What is the purpose of the DHCP release message? Does the DHCP server issue an acknowledgment of receipt of the client’s DHCP request? What would happen if the client’s DHCP release message is lost? 68
  • 69. 699434/CMPRPATI Answer – The purpose of the DHCP Release message is to cancel the lease of the IP address given by the DHCP server. No acknowledgement message is sent to the client informing of the DHCP Release message. Loss of a DHCP Release message from a client would leave the DHCP server to wait until the release period was over for the specified IP address to be reusable for another client. References 1. Anon, (2014). [online] Available at: 2) https://www.owasp.org/index.php/Main_Page [Accessed 19 Nov. 2014]. 2. Anon, (2014). [online] Available at: 4) http://www.malcher.fr/activation- basee-sur-active-directory/ [Accessed 3 Dec. 2014]. 3. Bestvpnservice.com, (2014). Free VPN Android - Free VPN Android App. [online] Available at: http://www.bestvpnservice.com/blog/android- vpn-apps-list-of-free-vpn-apps-for-android/ [Accessed 3 Dec. 2014]. 4. Freevpnhosting.com, (2014). Free VPN Hosting Service | We Host Free VPN accounts for everyone. [online] Available at: http://freevpnhosting.com/ [Accessed 5 Dec. 2014]. 5. Packet Tracer. (2014). Cisco. 6. Technet.microsoft.com, (2014). VPN’s and Firewalls. [online] Available at: http://technet.microsoft.com/en-us/library/cc958037.aspx [Accessed 2 Dec. 2014]. 7. Warner, T. (2014). [online] Available at: http://4sysops.com/wp- content/uploads/2012/04/Windows-Server-8-domain-Active- Directory- Users-and-Computers-in-Windows-Server-8-Beta.png [Accessed 2 Dec. 2014]. 8. Wireshark. (2014). 9. Your Agile IT Partner for your Office 365 Migration, Private & Public Cloud Solutions and Fixed Price IT Support, (2014). Active Directory, PKI, NAP, & 802.1x Consulting | Your Agile IT Partner for your Office 69
  • 70. 699434/CMPRPATI 365 Migration, Private & Public Cloud Solutions and Fixed Price IT Support. [online] Available at: http://www.agileit.com/enterprise/identity- access-security/active-directory-pki-and-802-1x-consulting/ [Accessed 1 Dec. 2014]. 70