Networking Technologies Assignment
VerifiedAdded on  2021/02/19
|9
|2023
|44
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Networking Technologies:
Part B
Part B
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Introduction......................................................................................................................................1
DHCP ..............................................................................................................................................1
Overview.....................................................................................................................................1
Current gaps................................................................................................................................2
Future solutions...........................................................................................................................2
Reflections...................................................................................................................................3
802.11...............................................................................................................................................3
Overview.....................................................................................................................................3
Current gaps................................................................................................................................4
Future solutions...........................................................................................................................4
Reflections...................................................................................................................................4
Conclusion.......................................................................................................................................5
References........................................................................................................................................5
Introduction......................................................................................................................................1
DHCP ..............................................................................................................................................1
Overview.....................................................................................................................................1
Current gaps................................................................................................................................2
Future solutions...........................................................................................................................2
Reflections...................................................................................................................................3
802.11...............................................................................................................................................3
Overview.....................................................................................................................................3
Current gaps................................................................................................................................4
Future solutions...........................................................................................................................4
Reflections...................................................................................................................................4
Conclusion.......................................................................................................................................5
References........................................................................................................................................5
Introduction
Network technology refers to exchange of data among small as well as large information
systems that are being used by educational institutions and businesses. Basically, it denotes any
technology by which computer systems are connected for carrying out communication (Agarwal,
Biswas and Nandi, 2017). Network technology is a wide concept which comprises of DNS, IP
addresses, ICMP, etc. It involves communication devices, intranet, extranet and tools for
carrying out interaction. In this end-users can transfer messages, files or any other data via
different channels. This assignment comprises of Domain Host Configuration Protocol (DHCP)
and 802.11.
DHCP
Overview
The network management protocol that is being utilised on UDP/IP networks and is
liable for assigning IP addresses is referred to as dynamic host configuration protocol (DHCP). It
enables system to request IP addresses as well as networking parameters from ISP's thereby
eliminates requirement of network administrator for assigning IP addresses manually (DHCP
()Dynamic Host Configuration Protocol, 2019). It executes on application layer of TCP/IP
protocol stack that dynamically assign IP's to DHCP clients as well as assign TCP/IP
configuration to their DHCP clients. This also involves information related with subnet mask,
domain name system addresses and IP address of default gateway. It is a client server protocol
that is responsible for managing a pool of different addresses and information related with
configuration parameters of client. The components of DHCP have been illustrated below:
ï‚· DHCP Server: It comprises of IP addresses as well as configuration information. It acts
as a host like SD-WAN appliance.
ï‚· DHCP Client: The end-point which receives information related with configuration from
dynamic host configuration protocol server. They are configured for receiving
information as a default.
ï‚· IP address pool: Address ranges are available to DHCP clients and they are handed
sequentially from low to high.
ï‚· Subnet: In this, IP networks are partitioned into segments which are referred subnet, they
makes network manageable (Kelley and et. al, 2018).
1
Network technology refers to exchange of data among small as well as large information
systems that are being used by educational institutions and businesses. Basically, it denotes any
technology by which computer systems are connected for carrying out communication (Agarwal,
Biswas and Nandi, 2017). Network technology is a wide concept which comprises of DNS, IP
addresses, ICMP, etc. It involves communication devices, intranet, extranet and tools for
carrying out interaction. In this end-users can transfer messages, files or any other data via
different channels. This assignment comprises of Domain Host Configuration Protocol (DHCP)
and 802.11.
DHCP
Overview
The network management protocol that is being utilised on UDP/IP networks and is
liable for assigning IP addresses is referred to as dynamic host configuration protocol (DHCP). It
enables system to request IP addresses as well as networking parameters from ISP's thereby
eliminates requirement of network administrator for assigning IP addresses manually (DHCP
()Dynamic Host Configuration Protocol, 2019). It executes on application layer of TCP/IP
protocol stack that dynamically assign IP's to DHCP clients as well as assign TCP/IP
configuration to their DHCP clients. This also involves information related with subnet mask,
domain name system addresses and IP address of default gateway. It is a client server protocol
that is responsible for managing a pool of different addresses and information related with
configuration parameters of client. The components of DHCP have been illustrated below:
ï‚· DHCP Server: It comprises of IP addresses as well as configuration information. It acts
as a host like SD-WAN appliance.
ï‚· DHCP Client: The end-point which receives information related with configuration from
dynamic host configuration protocol server. They are configured for receiving
information as a default.
ï‚· IP address pool: Address ranges are available to DHCP clients and they are handed
sequentially from low to high.
ï‚· Subnet: In this, IP networks are partitioned into segments which are referred subnet, they
makes network manageable (Kelley and et. al, 2018).
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ï‚· Lease: It denotes time which is held by DHCP client with respect to information of IP
address. In addition to this when lease will expire, it needs to be renewed.
ï‚· DHCP Relay: A host or router that is liable for listening to messages from client as well
as broadcast them on network and they are being sent to configure server.
Current gaps
DHCP protocol do not need any kind of authentication, this denotes that any client can be
a part of network quickly. But it also leads to diverse security risks which comprises of
unauthorised handling of servers, unknown clients are provided IP addresses and depletion of IP
addresses from malicious clients. Client do not have any way to validate authentication of DHCP
servers, wrong information can be provided by rouge ones. This might lead to attacks like man-
in-middle, denial-of-service attack, etc. as in this fake server might intercept data that is being
utilised for malicious means (DHCP defined and how it works, 2019). As DHCP server do not
possess any way to authenticate their client, they will render information of IP addresses to
devices which may ask for that. A threat actor can continually alter credentials of client which
will lead to exhaust all IP addresses available. Thereby, leads firm to prevent from having access
to network.
Future solutions
The DHCP specifications acknowledge few issues. There exist Relay Agent information
option which enables the network engineers to tag dynamic host configuration protocols
messages when they reach the network. This tag is being utilised for controlling access to
network. There exists provisions for authenticating DHCP management but in this case key
management becomes complex. For securing DHCP, network access control (NAC) can be used.
Various vendors support NAC and it is also easy to deploy that. It is an intelligent network
infrastructure which can be utilised for identification of users, identify as well as analyse the
integrity checks present on computers which are being used by clients and give them access for
specified locations. Along with this, policies and procedures are formulated with respect to
identity of machine and users. It is utilised for accounting, authentication as well as authorization
of network connections (Younes, 2016). This leads to continuously monitor devices behaviour
present on the network for collection of logs, packets and flows. They can be also be applied for
security analytics as well as machine learning for detecting malicious behaviour which might
lead to attack on network infrastructure.
2
address. In addition to this when lease will expire, it needs to be renewed.
ï‚· DHCP Relay: A host or router that is liable for listening to messages from client as well
as broadcast them on network and they are being sent to configure server.
Current gaps
DHCP protocol do not need any kind of authentication, this denotes that any client can be
a part of network quickly. But it also leads to diverse security risks which comprises of
unauthorised handling of servers, unknown clients are provided IP addresses and depletion of IP
addresses from malicious clients. Client do not have any way to validate authentication of DHCP
servers, wrong information can be provided by rouge ones. This might lead to attacks like man-
in-middle, denial-of-service attack, etc. as in this fake server might intercept data that is being
utilised for malicious means (DHCP defined and how it works, 2019). As DHCP server do not
possess any way to authenticate their client, they will render information of IP addresses to
devices which may ask for that. A threat actor can continually alter credentials of client which
will lead to exhaust all IP addresses available. Thereby, leads firm to prevent from having access
to network.
Future solutions
The DHCP specifications acknowledge few issues. There exist Relay Agent information
option which enables the network engineers to tag dynamic host configuration protocols
messages when they reach the network. This tag is being utilised for controlling access to
network. There exists provisions for authenticating DHCP management but in this case key
management becomes complex. For securing DHCP, network access control (NAC) can be used.
Various vendors support NAC and it is also easy to deploy that. It is an intelligent network
infrastructure which can be utilised for identification of users, identify as well as analyse the
integrity checks present on computers which are being used by clients and give them access for
specified locations. Along with this, policies and procedures are formulated with respect to
identity of machine and users. It is utilised for accounting, authentication as well as authorization
of network connections (Younes, 2016). This leads to continuously monitor devices behaviour
present on the network for collection of logs, packets and flows. They can be also be applied for
security analytics as well as machine learning for detecting malicious behaviour which might
lead to attack on network infrastructure.
2
Reflections
I have observed that DHCP servers renders huge benefits to different institutions as well
as firms. It is liable for providing accurate IP configuration, minimise conflict related with
internet protocol addresses, automation is provided as well as there exist effective change
management in terms of addresses, endpoints or scopes. But on the other hand there are certain
drawbacks also, DHCP is vulnerable to man-in-middle attack where attacker intercept as well as
relay messages among two parties who communicate directly with one other. In addition to this,
I have observed that DHCP servers are also subject to vulnerabilities related with memory
corruption. The Windows DHCP server was attacked by attackers and it lead to compromise the
Active Directory of Microsoft.
802.11
Overview
It is a wireless network protocol and is liable for illustration of set of physical layer
protocols as well as MAC (Media Access Control) to implement WLAN in different frequencies.
IEEE 802.11 is defined as set of standards which specify communication for WLAN, it is
branded as Wi-Fi to their customers. All the specifications make use of CSMA/CA (Carrier
Sense Access with Collision Avoidance) and Ethernet protocol for sharing path. Phase-shift
keying is used within original modulation and in new specifications complementary code keying
is being utilised for rendering high speed as well as minimise vulnerability within interference.
Here, radio frequencies (RF) technologies are being used, a frequency in electromagnetic
spectrum that is related with radio waves propagation (Ba and et. al, 2016). Access point is liable
to broadcast wireless signal to devices and they tune with them. Wireless network hardware
provides standards for encryption, they are WPA (Wi-Fi Protected Access), WEP (Wired
Equivalent Privacy), WPA2 (Wi-Fi Protected Access 2). When longer as well as strong
passwords are being used then WPA and WPA2 provides better security. Wi-Fi and Bluetooth
makes use of 2.4 GHz ISM brand which results in interference among them.
Current gaps
Authentication is one of the major challenging area within wireless network. In addition
to this, if 802.11a is utilised then high radio waves can be absorbed easily by the obstacles like
walls which will lead to decline in the performance. In case of 802.11b transmission speed is less
3
I have observed that DHCP servers renders huge benefits to different institutions as well
as firms. It is liable for providing accurate IP configuration, minimise conflict related with
internet protocol addresses, automation is provided as well as there exist effective change
management in terms of addresses, endpoints or scopes. But on the other hand there are certain
drawbacks also, DHCP is vulnerable to man-in-middle attack where attacker intercept as well as
relay messages among two parties who communicate directly with one other. In addition to this,
I have observed that DHCP servers are also subject to vulnerabilities related with memory
corruption. The Windows DHCP server was attacked by attackers and it lead to compromise the
Active Directory of Microsoft.
802.11
Overview
It is a wireless network protocol and is liable for illustration of set of physical layer
protocols as well as MAC (Media Access Control) to implement WLAN in different frequencies.
IEEE 802.11 is defined as set of standards which specify communication for WLAN, it is
branded as Wi-Fi to their customers. All the specifications make use of CSMA/CA (Carrier
Sense Access with Collision Avoidance) and Ethernet protocol for sharing path. Phase-shift
keying is used within original modulation and in new specifications complementary code keying
is being utilised for rendering high speed as well as minimise vulnerability within interference.
Here, radio frequencies (RF) technologies are being used, a frequency in electromagnetic
spectrum that is related with radio waves propagation (Ba and et. al, 2016). Access point is liable
to broadcast wireless signal to devices and they tune with them. Wireless network hardware
provides standards for encryption, they are WPA (Wi-Fi Protected Access), WEP (Wired
Equivalent Privacy), WPA2 (Wi-Fi Protected Access 2). When longer as well as strong
passwords are being used then WPA and WPA2 provides better security. Wi-Fi and Bluetooth
makes use of 2.4 GHz ISM brand which results in interference among them.
Current gaps
Authentication is one of the major challenging area within wireless network. In addition
to this, if 802.11a is utilised then high radio waves can be absorbed easily by the obstacles like
walls which will lead to decline in the performance. In case of 802.11b transmission speed is less
3
and it also renders access to few users simultaneously. 2.4 GHz frequency is utilised by 802.11g
which leads to problems related with interference similar to 802.11b but its cost is higher than
that (Malik and et. al, 2015). On the whole IEEE 802.11 leads to traffic disruptions, maintenance
as well as network security must be secured. Along with this, there needs to be periodic
maintenance and data which is transmitted via radio waves might be captured through devices
that are ready for Wi-Fi. In addition to this, there can be unauthorized usage, frame spoofing and
session hijacking
Future solutions
The new wireless standards can be utilised that renders enhanced security features. They
are being provided by 802.11i which defines enhanced robust authentication, encryption as well
as key exchanges along with options for pre-authentication and key caching. It is liable for
rendering security as well as authentication to Medium access control layer within WLAN. In
this, four-way handshake is evolved through which data sessions can be secured. It comprises of
Counter, TKIP and WEP with CCMP (CBC-MAC Mode Protocol) encryption algorithms. For
ensuring data integrity, encryption, authentication, protection as well as confidentiality CCMP
can be used (Wu and et. al, 2017). In addition to this, AES encryption algorithm is implemented
and concept of RSN (Robust Security Network) is brought in.
Reflections
The IEEE 802.11 standard comprises of various advancements within technology and
each enhancement is amended by a standard by adding suffix to it. Initially, 802.11 standard
protocol provided a bandwidth of 2 Mbps on 2.4 GHz band and it goes on increasing with
evolution. I observed that each standard provided unique features but 802.11i ensured that
confidentiality and integrity of data is being maintained. It is liable for rendering high frequency
as well as they are easy to install. Along with this, the expenses related with wiring have been
eliminated through this and it also makes of radio spectrum. Along with this, I have also
observed that there were traffic disruptions, unauthorised usage, spoofing, hijacking and there
was a need for continuous maintenance.
Conclusion
From above it has been found that, DHCP is a protocol that is liable for rendering
dynamic IP addresses for their devices that are present on network. It supports both dynamic as
4
which leads to problems related with interference similar to 802.11b but its cost is higher than
that (Malik and et. al, 2015). On the whole IEEE 802.11 leads to traffic disruptions, maintenance
as well as network security must be secured. Along with this, there needs to be periodic
maintenance and data which is transmitted via radio waves might be captured through devices
that are ready for Wi-Fi. In addition to this, there can be unauthorized usage, frame spoofing and
session hijacking
Future solutions
The new wireless standards can be utilised that renders enhanced security features. They
are being provided by 802.11i which defines enhanced robust authentication, encryption as well
as key exchanges along with options for pre-authentication and key caching. It is liable for
rendering security as well as authentication to Medium access control layer within WLAN. In
this, four-way handshake is evolved through which data sessions can be secured. It comprises of
Counter, TKIP and WEP with CCMP (CBC-MAC Mode Protocol) encryption algorithms. For
ensuring data integrity, encryption, authentication, protection as well as confidentiality CCMP
can be used (Wu and et. al, 2017). In addition to this, AES encryption algorithm is implemented
and concept of RSN (Robust Security Network) is brought in.
Reflections
The IEEE 802.11 standard comprises of various advancements within technology and
each enhancement is amended by a standard by adding suffix to it. Initially, 802.11 standard
protocol provided a bandwidth of 2 Mbps on 2.4 GHz band and it goes on increasing with
evolution. I observed that each standard provided unique features but 802.11i ensured that
confidentiality and integrity of data is being maintained. It is liable for rendering high frequency
as well as they are easy to install. Along with this, the expenses related with wiring have been
eliminated through this and it also makes of radio spectrum. Along with this, I have also
observed that there were traffic disruptions, unauthorised usage, spoofing, hijacking and there
was a need for continuous maintenance.
Conclusion
From above it has been found that, DHCP is a protocol that is liable for rendering
dynamic IP addresses for their devices that are present on network. It supports both dynamic as
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
well as static IP addresses. Basically, it eliminates the hassle related with manually assigning
different address to each system. 802.11 standard defines over-the-air interface among base
station and wireless client. It pertains to wireless local area network and is responsible for
providing certain transmission by the usage of DSSS (Direct-sequence spread spectrum) or
FHSS (Frequency hopping spread spectrum).
5
different address to each system. 802.11 standard defines over-the-air interface among base
station and wireless client. It pertains to wireless local area network and is responsible for
providing certain transmission by the usage of DSSS (Direct-sequence spread spectrum) or
FHSS (Frequency hopping spread spectrum).
5
References
Books & Journals
Agarwal, M., Biswas, S. and Nandi, S., 2017. Discrete event system framework for fault
diagnosis with measurement inconsistency: case study of rogue DHCP
attack. IEEE/CAA Journal of Automatica Sinica, 6(3), pp.789-806.
Ba, A. and et. al, 2016. A 1.3 nJ/b IEEE 802.11 ah fully-digital polar transmitter for IoT
applications. IEEE Journal of Solid-State Circuits, 51(12), pp.3103-3113.
Kelley, M. and et. al, 2018. On the Deployment of DHCP. Journal of Computer Science and
Software Engineering, 9(4).
Malik, A. and et. al, 2015. QoS in IEEE 802.11-based wireless networks: a contemporary
review. Journal of Network and Computer Applications, 55, pp.24-46.
Wu, R. and et. al, 2017. 64-QAM 60-GHz CMOS transceivers for IEEE 802.11 ad/ay. IEEE
Journal of Solid-State Circuits, 52(11), pp.2871-2891.
Younes, O. S., 2016. A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer
and Communications, 4(01), p.39.
Online
DHCP (Dynamic Host Configuration Protocol). 2019. [Online]. Available through:
<https://searchnetworking.techtarget.com/definition/DHCP>.
DHCP defined and how it works. 2019. [Online]. Available through:
<https://www.networkworld.com/article/3299438/dhcp-defined-and-how-it-works.html>.
6
Books & Journals
Agarwal, M., Biswas, S. and Nandi, S., 2017. Discrete event system framework for fault
diagnosis with measurement inconsistency: case study of rogue DHCP
attack. IEEE/CAA Journal of Automatica Sinica, 6(3), pp.789-806.
Ba, A. and et. al, 2016. A 1.3 nJ/b IEEE 802.11 ah fully-digital polar transmitter for IoT
applications. IEEE Journal of Solid-State Circuits, 51(12), pp.3103-3113.
Kelley, M. and et. al, 2018. On the Deployment of DHCP. Journal of Computer Science and
Software Engineering, 9(4).
Malik, A. and et. al, 2015. QoS in IEEE 802.11-based wireless networks: a contemporary
review. Journal of Network and Computer Applications, 55, pp.24-46.
Wu, R. and et. al, 2017. 64-QAM 60-GHz CMOS transceivers for IEEE 802.11 ad/ay. IEEE
Journal of Solid-State Circuits, 52(11), pp.2871-2891.
Younes, O. S., 2016. A Secure DHCP Protocol to Mitigate LAN Attacks. Journal of Computer
and Communications, 4(01), p.39.
Online
DHCP (Dynamic Host Configuration Protocol). 2019. [Online]. Available through:
<https://searchnetworking.techtarget.com/definition/DHCP>.
DHCP defined and how it works. 2019. [Online]. Available through:
<https://www.networkworld.com/article/3299438/dhcp-defined-and-how-it-works.html>.
6
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.