Nt1310 Unit 4 Assignment Essay

FACULTY OF SCIENCE, ENGINEERING AND TECHNOLOGY SWINBURNE UNIVERSITY OF TECHNOLOGY

Prepared as part of the assessment requirements for Data Communications and Security COS20012 & COS70007

Version: 1.0

Author:Alistair Hutchings

Student ID:4964276

STANDARDS ORGANISATIONS [1-2 PAGES, EMBED LINKS TO INTERNET RESOURCES WITH YOUR EXPLANATION] Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.

ITU-T IETF ISO IEEE

RFCS – [1 – 2 PAGES] WHAT ARE THEY USED FOR? (1 -2 SENTENCES) RFC’s or Request’s for Comments are formal documents from the IETF. RFC’s relate to activities and architectures surrounding the internet. Not all RFC’s are “standards”, however they can be treated as standards, with future RFC’s overriding others. (Rouse, 2011) WHAT WOULD I FIND IN AN RFC? (SUMMARIZE SECTIONS INCLUDED)

RFC’s generally use a consistent template when drafted. Previous documents should be used as templates for formatting guidelines(Waitzman, 1997). The document will be broken down into the following sections: 1.DOCUMENT HEADER

Containing information about the author of the document, including affiliations and/or their organisation(s). Information regarding previous and overruled RFC’s is included as well. 2.ABSTRACT A summary of the document, stating an overview of the document and its intention. 3.DOCUMENT TITLE Title of the document, formatted to the centre of the document 4.STATUS OF MEMO Containing “A paragraph describing the type of the RFC, and (2) the distribution statement” (Waitzman, 1997). 5.COPYRIGHT NOTICE Containing distribution permission and copyright rules of the RFC, provided by the RFC editor (Waitzman, 1997). 6. TABLE OF CONTENTS The table of contents is “required in RFCs longer than 30 pages and recommended for an RFC longer than 15 pages”(IEFT, 2012) . 7.BODY Containing the main content of the document, i.e. What it is proposing. 8.AUTHOR Containing contact information for the author of the RFC, including name, email address and phone number.

DESCRIBE THE PROCESS AND RFC GOES THROUGH BEFORE IT BECOMES A STANDARD. The Internet Standards Process is complex and often revised. The process is broken down into two “tracks”: Proposed Standard and Internet Standard. This was recently consolidated into two tracks, from the multiple tracks previously (Spencer Dawkins, 1996). DRAFTING

Initially a document is drafted and published in the “Internet Drafts” directory on the IETF website. The draft must be left online for a minimum of two weeks for community review. Once public review has been completed it can be submitted to the IESG for elevation to the “Proposed Standard” track. This process usually takes many revisions before it becomes a Proposed Standard (Chapin, 1992). PROPOSED STANDARD

After the RFC becomes a Proposed standard, it is up to organizations to implement the standard. The Proposed Standard must remain for a minimum of six months. Multiple criteria must be met before the RFC can progress to the Internet Standard Track. Proposed standard can be revised but significant revision my start the standard process again (Spencer Dawkins, 1996). As determined by RFC 6410, there is four criteria that must be met before track advancement: 1.“There are at least two independent interoperating implementations with widespread deployment and successful operational experience.”(R. Housley, 2011) 2.“There are no errata against the specification that would cause a new implementation to fail to interoperate with deployed ones.”(R. Housley, 2011) 3.“There are no unused features in the specification that greatly increase implementation complexity.” (R. Housley, 2011) 4.“If the technology required to implement the specification requires patented or otherwise controlled technology, then the set of implementations must demonstrate at least two independent, separate and successful uses of the licensing process”.(R. Housley, 2011) INTERNET STANDARD

These criteria must be met within four weeks of the “Last Call”. The last call is an IETF wide announcement, made by the IESG. If the proposed standard meets the criteria within the time frame it can become an Internet Standard. Internet Standards will have their RFC reclassified, adding a standard number and removing the listing from the IEFT’s “Internal Drafts”. (Spencer Dawkins, 1996)

WHERE CAN I OBTAIN A COPY OF AN RFC? (PROVIDE LINK) https://www.ietf.org/rfc.html

NETWORK HARDWARE [1 – 2 PAGES, EMBED LINKS TO INTERNET RESOURCES WITH YOUR EXPLANATION] Describe in your own words the important functions performed by following hardware commonly found in a network. Include a diagram (draw this yourself) indicating where these devices would be found in a network. SWITCH

A switch, a layer 2 device, allows hosts to communicate with each other. Switch’s receive information and send it to its appropriate destination only (Shinde, 2014). Switch’s work with MAC/Physical addresses and frames. Switches are responsible for frame verification via three methods, storing and verifying frame before sending it to their destination; Cutting through the packet, verifying only the frame header or by verifying only first 64 bytes of a packet, where addressing details are store. Some switches can perform these three functions automatically depending on network traffic (Shinde, 2014). ROUTER

A router, a layer 3 device, joins multiple computer networks together. Routers determine “the next network point to which a packet should be forwarded towards its destination”(Rouse, 2006), acting as a gateway between networks. Routers work with IP address and packets. Router’s keep traffic within the network when needed and can forward packet onwards into the broader internet. MODEM

A modem (modulator-demodulator) is a device or program allowing data transmission from analogue to digital and vice versa(Beal). Often, routers act as modems, reducing the need for separate devices. In a home environment, a modem connects a network to your ISP, providing access to the internet. HOST

A host is a network connected computer, communicating with other nodes on the network. Nodes are a connection or endpoints on a network. LINK (TALK ABOUT THE WAY NODES ARE JOINED TOGETHER?) Links connect nodes to each other via a network medium. NETWORK INTERFACE CARD

THE INTERNET PROTOCOL STACK – [1 PAGE]

DESCRIBE THE DIFFERENT LAYERS FOUND IN THE KUROSE ROSS PROTOCOL STACK (AS DESCRIBED IN THE TEXT BOOK) AND LIST PROTOCOLS (COVERED IN THIS UNIT) COMMONLY ASSOCIATED WITH EACH LAYER.

COMPARE AND CONTRAST THE KUROSE ROSS PROTOCOL STACK WITH THE OSI MODEL.

ETHERNET – [2 -4 PAGES]

PROVIDE A URL LINK & TABLE THAT DESCRIBES DIFFERENT ETHERNET STANDARDS. INCLUDE AT LEAST 15 DIFFERENT VARIATIONS. MAKE 5-6 COMMENTS BELOW THE TABLE ABOUT THE SIGNIFICANT DIFFERENCES BETWEEN SOME OF THE STANDARDS (SPEED, DISTANCE, LINK TYPES ETC.) WHY DO MOST OF THE ETHERNET PROTOCOLS SPECIFY THE MAXIMUM DISTANCE BETWEEN NODES? CAPTURE A FRAME USING WIRESHARK FROM YOUR HOME COMPUTING NETWORK. EXPAND THE PART THAT SHOWS THE ETHERNET FRAME. TAKE A SCREEN DUMP (SHIFT PRINT SCREEN / PAINT) AND PASTE IT HERE. IDENTIFY EACH FIELD IN THE FRAME AND DESCRIBE THEIR PURPOSE. PROVIDE EXAMPLES OF THE EXPECTED VALUES FOR EACH FIELD. RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.

1.SWITCH – [1 PAGE] EXPLAIN HOW A SWITCH LEARNS ABOUT MAC ADDRESSES. (Detailed answer required with a supporting diagram)

ONCE UPON A TIME SWITCHES WERE CONSIDERED TO BE INSECURE. HAVE THERE BEEN ENHANCEMENTS TO SWITCH TECHNOLOGIES THAT MAKE THEM MORE SECURE. IDENTIFY TWO AND DESCRIBE THEM HERE. FOCUS ON SECURITY ISSUES.

2.ARP – [1 -2 PAGES]

WHEN IS ARP NEEDED? DESCRIBE IN DETAIL (DOWN TO FIELD LEVEL) WHAT WOULD BE FOUND IN AN ARP REQUEST, INCLUDE A WIRESHARK TRACE (1 FRAME) DESCRIBE IN DETAIL WHAT WOULD BE FOUND IN AN ARP RESPONSE (1 FRAME) (DOWN TO FIELD LEVEL) EXPLAIN WHY ARP IS NOT A SECURE PROTOCOL? (0.5 – 1 PAGE)

3.LINKS & DELAYS – [0.5 – 1 PAGE] PROVIDE A ONE OR TWO-SENTENCE EXPLANATION OF THE FOLLOWING. INCLUDE AN IMAGE IF IT WILL ENHANCE YOUR ANSWER. (Chawia, 2013) Figure 1 WHAT IS BANDWIDTH? Bandwidth refers to the amount of data “that can be transmitted in a fixed amount of time”(Beal). Bandwidth is expressed as bits or bytes per second for digital devices or hertz and cycles per second for analogue devices (Beal). WHAT IS NODAL PROCESSING DELAY?

Nodal processing delay refers to the time it takes to process a packet (header) within a network node. The delay can be dependent on a number of factors, including device speed and network congestion (LovetoKnow). WHAT IS PROPAGATION DELAY?

Propagation delay refers to the time it may take for a message (bit) to travel from one point to another (a link) (NetworkInfoBlog, 2016). For example in (Chawia, 2013) Figure 1, the propagation delay refers to the time it takes for a message to pass from Router A to Router B, after transmission, via the link. WHAT IS THROUGHPUT?

Often confused with bandwidth, throughput refers to how much actual data can be sent per time measurement (e.g. seconds). For example, sending data via an 100Mbps Ethernet connection (theoretical bandwidth) could have an actual throughput of 89.4Mbps (actual throughput) (Kozierok, 2005).

4.TOOLS – [2 PAGES]

a)Describe what NSlookup can be used for and include three (distinct) examples.

Capture a NSlookup session using Wireshark.

b)Paste the DNS request here and describe the fields in the request.

c)Paste the DNS response here and describe the parts of the response.

JAVA [1-2 PAGES] FIND A COPY OF THE JAVA TCP FILE SERVER ON THE INTERNET. PASTE THE CODE INTO A DOCUMENT AND THEN PROVIDE DETAILED NOTES ABOUT WHAT EACH OF THE LINES OF CODE DOES. YOU NEED ONLY MODEL THE SERVER SIDE OF THE CODE. YOUR DESCRIPTION IS TO BE IN THE FORM OF COMMENTS MADE IN THE STYLE BELOW. Example comment:

public static void main(String[] args)

LINES 1 – 7

LINE 9

LINE 10

LINES 11 & 12

LINE 13

LINE 14

LINE 15

LINE 16

LINE 17

LINE 18 & 19

LINE 20 & 21