Networking Report Project You will need to develop a network architecture, describe what happens as a request for a resource travels through the network, and research and analyze potential attacks at...

1 answer below »
Hi, I need a report with that follows the requirements from the doc networkingReport.docThe book used in the class is Computer Networking, A Top-down Approach,Kurose and Ross
Thank you.



Networking Report Project You will need to develop a network architecture, describe what happens as a request for a resource travels through the network, and research and analyze potential attacks at each network layer and determine how to stop that from happening. You may use any resources or notes but may not copy/duplicate/plagiarize anyone’s work. You will ensure that you cite all sources using APA format. Instructions 1. Network Architecture: You will develop a network architecture consisting of the following components: a. Minimum of 5 hosts (one of which will be a wireless host). Hosts can be laptops, desktops, tablets, or smartphones. b. Divide the hosts into at least two different networks c. Use a minimum of two switches d. Use a minimum of one router e. Use a minimum of one firewall f. Use a minimum of two public servers that you are trying to connect to g. Annotate a public network h. You will place the appropriate addressing scheme with each object in the diagram (host, switch, router). Addressing must be formatted correctly. You may use any IP addresses you want, but ensure that the IP address is appropriate for the device that you are assigning the IP to (Public facing vs Private). i. Use common network architecture symbology. j. The network architecture will be incorporated to the final document (cut and paste or screen capture). Ensure that it is legible; easily read. You may use any applicable tool to create your diagram. Some examples are packet tracer, PowerPoint, Microsoft Visio, Draw.IO. 2. Resource Request: Using a theme such as sending an email or transferring a file, you will discuss 20 concepts that allow your data to move from your host to the resource you are requesting and back again. Do not cut and paste from another source. Use your own words and understanding of the concepts to explain the process. If you reference or use a quote to provide clarity to a concept, you must reference your source. This will be prose not fill in the blank or in list format. This section will consist of the following: a. Minimum of 20 concepts along the “path” of the resource request. Each layer of the TCP/IP model (Chapters 2, 3, 4/5, 6) will have a minimum of five concepts explained (5 x 4 = 20). Each concept is worth two points. b. Each step will consist of the following: i. Concept ii. Concept Definition iii. Applicable Port and Protocol iv. Applicable data unit (Data, Segment, Datagram, Frame) v. What this concept provides the user vi. For each concept you use you will label your network diagram with where that concept takes place vii. Example: Bob would like to access a webpage at www.example.com. His computer does not currently have an IP address so his computer creates a DHCP message request. The DHCP server is a network management protocol that dynamically assigns IP address to network devices. It uses two ports 67 for the server and 68 for the client. This message is contained within a UDP segment which will be encapsulated within an IP datagram. When DHCP provides Bob’s computer with an IP address the computer will be able to communicate networked resources 3. Research and Analysis: You will research four attacks; one at each layer of the TCP/IP stack. Each attack is worth 25 Points. You cannot use any of the attacks that you have researched from previous assignments. a. You will answer the following questions for each of these attacks: i. What was the attack? Provide what layer the attack typically occurs at and description of what the attack does. ii. How is the attack carried out? iii. What does the attack hope to achieve? Relate this to the CIA triad. iv. What network vulnerability does the attack take advantage of? v. What recommendations would you make to senior management? (i.e. What can be done to mitigate the attack?) b. For each of the four attacks you will use a different source for a minimum of four cited sources. You will use academic resources such as peerreviewed journals, scholarly articles, textbooks, etc. 4. Paper Guidelines: a. Project will be a minimum of 1500 words (not including the network architecture) b. Project will use APA format c. Project will include a cover page d. Project will include a reference page e. To reiterate: the network architecture will be incorporated to the final document (cut and paste or screen capture). Ensure that it is legible; easily read. You may use any applicable tool to create your diagram. Some examples are packet tracer, PowerPoint, Microsoft Visio, Draw.IO 5. Grading Rubric: See attached grading rubric for a detailed breakdown for this assignment. In general, your assignment will be graded as follows: a. Content: i. Architecture: 40 Points ii. Resource Request: 40 Points iii. Research and Analysis: 100 Points (25 Points for each attack/layer) b. Structure: i. Formatting, Grammar, Research Elements: 20
Answered 3 days AfterMay 08, 2021

Answer To: Networking Report Project You will need to develop a network architecture, describe what happens as...

Ali Asgar answered on May 11 2021
145 Votes
1. Network Configuration Diagram
2. Resource Request
Scenario 1: Accessing a webpage.
Let us assume that, our user Paul wants to access www.google.com
He has just rebooted his laptop and it does not yet have any IP address.
Concept 1: DHCP Discover
Paul’s computer creates a DHCP discover packet containing 0.0.0.0 as both client and server IPs.
The packet payload is a UDP segment. It uses port 68 on client and 67 on server. This packet is then forwarded onto the broadcast address of 255.255.255.255. The packet is then encapsulated in a frame and sent out on FFFF.FFFF.FFFF the broadcast mac address. This packet is then forwarded out via the ethernet port on the computer.
Concept 2: Packet Switching
When Paul’s computer’s DHCP discover request is received by switch, it checks the destination mac address and finds it as the broadcast mac, the switch thus sends out this frame to all ports on the switch, that are in same VLAN except the port on which it was received.
Concept 3: DHCP Offer
When Paul’s request reaches the DHCP server, the DHCP server is programmed to receive packets on broadcast address. Thus, when the frame is decapsulated and packet is read, it is passed to application listening on port 67 (DHCP service) for processing. The DHCP does not already have an entry and thus creates a new DHCP offer packet and sends it out via broadcast IP address. This offer packet reaches all hosts in the network, but every other host rejects it as they already know the DHCP server.
Concept 4: DHCP Request
When Paul’s computer receives a DHCP offer packet, it reads it and creates a DHCP request packet this time having destination IP address of the DHCP server and source IP as 0.0.0.0 and ports as 68 and 67 on source and destination respectively. This request packet is encapsulated in a frame and sent out on broadcast mac.
Concept 5: DHCP Ack
When the DHCP server receives this request packet, it binds the mac address to a free IP address in its table and sends this IP information to the requester via broadcast address as the destination.
Concept 6: IP address configuration
When Paul’s computer receives the DHCP Ack packet, it assigns it self the provided IP address configuration. All other machines receiving this information packets drops it. DHCP configuration is complete. Paul’s system is now ready to access any network service.
Concept 7: ICMP
After assigning IP address to the computer, the DHCP server pings the client. This ping is done using ICMP protocol. It is a layer 3 protocol and thus does not work on ports. Since the IP is on the same network, the packet will be directly sent to it. server does not know the next hop mac address; it sends out an ARP request with destination IP.
Concept 8: ARP
Address resolution protocol ARP is used to find the mac address associated with any IP address. For this an ARP request is sent out having source IP of the requester and Destination IP of the required machine. This is a data link layer protocol and thus directly sent using frames on the broadcast mac address. When the switch receives this frame, it sends it out to all ports except the receiving port. When a machine with matching Destination IP receives the packet, it responds to it.
Concept 9: Gratuitous ARP request
A newly connected host sends out its mac address information to all hosts in the network on its own. This is called gratuitous ARP request. Here the other connected host receives this packet and adds the mac-IP binding in their ARP table.
Concept 10:...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here