Network Protocol Analysis & Reverse Engineering
VerifiedAdded on 2020/02/24
|16
|2617
|94
AI Summary
This assignment focuses on network protocol analysis and reverse engineering. It requires students to understand various network protocols, analyze their structures and functionalities, and explore the tools used in reverse engineering these protocols. The provided research papers delve into aspects like vulnerability detection in MANETs using TSDRP and AODV routing protocols, state-of-the-art network protocol reverse engineering tools, analysis of the Bitcoin backbone protocol, and automated network protocol message format analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: TCP/IP NETWORKING
TCP/IP NETWORKING
[Name of the student]
[Name of the University]
TCP/IP NETWORKING
[Name of the student]
[Name of the University]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1TCP/IP NETWORKING
Table of Contents
Introduction 2
Task 1.A. Addressing solution 2
Task 1. B. Explanation 8
Task 2. A. Communication protocol & Role of network analyzers 8
Task 2. B. Network analyzer tools 11
Benefits and Usability 11
Associated costs 12
Recommendation 13
Conclusion 13
References 14
Table of Contents
Introduction 2
Task 1.A. Addressing solution 2
Task 1. B. Explanation 8
Task 2. A. Communication protocol & Role of network analyzers 8
Task 2. B. Network analyzer tools 11
Benefits and Usability 11
Associated costs 12
Recommendation 13
Conclusion 13
References 14
2TCP/IP NETWORKING
Introduction
In this report within six individual buildings, a network architecture implementation will
be done which is considered as M2M solution. The solution will be consisting of secret internet
standard that will be shared among the different buildings. Within this report, the sharing of the
IP is identified as such as the network address sharing model in accordance with the requested
case study (Garay, Kiayias, & Leonardos, 2015). The number workstations that M2M solution is
consisting of is almost twelve hundred in total. The provided network diagram within the report
has provided a brief idea regarding the internet connectivity.
Task 1.A. Addressing solution
Figure 1: The M2M solution Network design and addressing solution
(Source: Created by author)
Introduction
In this report within six individual buildings, a network architecture implementation will
be done which is considered as M2M solution. The solution will be consisting of secret internet
standard that will be shared among the different buildings. Within this report, the sharing of the
IP is identified as such as the network address sharing model in accordance with the requested
case study (Garay, Kiayias, & Leonardos, 2015). The number workstations that M2M solution is
consisting of is almost twelve hundred in total. The provided network diagram within the report
has provided a brief idea regarding the internet connectivity.
Task 1.A. Addressing solution
Figure 1: The M2M solution Network design and addressing solution
(Source: Created by author)
3TCP/IP NETWORKING
The organization has six different buildings to be accommodate 1200 host, therefore they
need to distribute their private internet protocol in different subnets. The M2M solution have a
private internet protocol 10.0.0.0, which is being distributed among their sites. However, from
the above figure it can be assumed that how they are connected to the internet and their inter-
networking topology. Consequently, the following subnet calculation is prepared for M2M
solution, which is being assign to each site of this organization.
Subnet
Name
Neede
d Size
Allocate
d Size
Address Slash
notatio
n
Subnet Mask Assignabl
e Range
Broadcas
t
Finance
Office
260 510 10.0.4.0 /23 255.255.254.0 10.0.4.1 -
10.0.5.254
10.0.5.25
5
Transport
Office
130 254 10.0.6.0 /24 255.255.255.0 10.0.6.1 -
10.0.6.254
10.0.6.25
5
Research
Office
120 126 10.0.7.0 /25 255.255.255.12
8
10.0.7.1 -
10.0.7.126
10.0.7.12
7
Sales
Office
40 62 10.0.7.19
2
/26 255.255.255.19
2
10.0.7.193
-
10.0.7.254
10.0.7.25
5
Informatio
n
technology
520 1022 10.0.0.0 /22 255.255.252.0 10.0.0.1 -
10.0.3.254
10.0.3.25
5
Head
Office
60 62 10.0.7.12
8
/26 255.255.255.19
2
10.0.7.129
-
10.0.7.190
10.0.7.19
1
Finance Office:
IP Address: 10.0.4.0
Netmask: 255.255.254.0
Wildcard Mask: 0.0.1.255
CIDR Notation: /23
Network Address: 10.0.4.0
Usable Host Range: 10.0.4.1 - 10.0.5.254
The organization has six different buildings to be accommodate 1200 host, therefore they
need to distribute their private internet protocol in different subnets. The M2M solution have a
private internet protocol 10.0.0.0, which is being distributed among their sites. However, from
the above figure it can be assumed that how they are connected to the internet and their inter-
networking topology. Consequently, the following subnet calculation is prepared for M2M
solution, which is being assign to each site of this organization.
Subnet
Name
Neede
d Size
Allocate
d Size
Address Slash
notatio
n
Subnet Mask Assignabl
e Range
Broadcas
t
Finance
Office
260 510 10.0.4.0 /23 255.255.254.0 10.0.4.1 -
10.0.5.254
10.0.5.25
5
Transport
Office
130 254 10.0.6.0 /24 255.255.255.0 10.0.6.1 -
10.0.6.254
10.0.6.25
5
Research
Office
120 126 10.0.7.0 /25 255.255.255.12
8
10.0.7.1 -
10.0.7.126
10.0.7.12
7
Sales
Office
40 62 10.0.7.19
2
/26 255.255.255.19
2
10.0.7.193
-
10.0.7.254
10.0.7.25
5
Informatio
n
technology
520 1022 10.0.0.0 /22 255.255.252.0 10.0.0.1 -
10.0.3.254
10.0.3.25
5
Head
Office
60 62 10.0.7.12
8
/26 255.255.255.19
2
10.0.7.129
-
10.0.7.190
10.0.7.19
1
Finance Office:
IP Address: 10.0.4.0
Netmask: 255.255.254.0
Wildcard Mask: 0.0.1.255
CIDR Notation: /23
Network Address: 10.0.4.0
Usable Host Range: 10.0.4.1 - 10.0.5.254
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4TCP/IP NETWORKING
Broadcast Address: 10.0.5.255
Binary Netmask: 11111111.11111111.11111110.00000000
Total number of hosts: 512
Number of usable hosts: 510
Transport Office:
IP Address: 10.0.6.0
Netmask: 255.255.255.0
Wildcard Mask: 0.0.0.255
CIDR Notation: /24
Network Address: 10.0.6.0
Usable Host Range: 10.0.6.1 - 10.0.6.254
Broadcast Address: 10.0.6.255
Binary Netmask: 11111111.11111111.11111111.00000000
Total number of hosts: 256
Number of usable hosts: 254
Research Office:
IP Address: 10.0.7.0
Broadcast Address: 10.0.5.255
Binary Netmask: 11111111.11111111.11111110.00000000
Total number of hosts: 512
Number of usable hosts: 510
Transport Office:
IP Address: 10.0.6.0
Netmask: 255.255.255.0
Wildcard Mask: 0.0.0.255
CIDR Notation: /24
Network Address: 10.0.6.0
Usable Host Range: 10.0.6.1 - 10.0.6.254
Broadcast Address: 10.0.6.255
Binary Netmask: 11111111.11111111.11111111.00000000
Total number of hosts: 256
Number of usable hosts: 254
Research Office:
IP Address: 10.0.7.0
5TCP/IP NETWORKING
Netmask: 255.255.255.128
Wildcard Mask: 0.0.0.127
CIDR Notation: /25
Network Address: 10.0.7.0
Usable Host Range: 10.0.7.1 - 10.0.7.126
Broadcast Address: 10.0.7.127
Binary Netmask: 11111111.11111111.11111111.10000000
Total number of hosts: 128
Number of usable hosts: 126
Sales Office:
IP Address: 10.0.7.192
Netmask: 255.255.255.192
Wildcard Mask: 0.0.0.63
CIDR Notation: /26
Network Address: 10.0.7.192
Netmask: 255.255.255.128
Wildcard Mask: 0.0.0.127
CIDR Notation: /25
Network Address: 10.0.7.0
Usable Host Range: 10.0.7.1 - 10.0.7.126
Broadcast Address: 10.0.7.127
Binary Netmask: 11111111.11111111.11111111.10000000
Total number of hosts: 128
Number of usable hosts: 126
Sales Office:
IP Address: 10.0.7.192
Netmask: 255.255.255.192
Wildcard Mask: 0.0.0.63
CIDR Notation: /26
Network Address: 10.0.7.192
6TCP/IP NETWORKING
Usable Host Range: 10.0.7.193 - 10.0.7.254
Broadcast Address: 10.0.7.255
Binary Netmask: 11111111.11111111.11111111.11000000
Total number of hosts: 64
Number of usable hosts: 62
Information technology:
IP Address: 10.0.0.0
Netmask: 255.255.252.0
Wildcard Mask: 0.0.3.255
CIDR Notation: /22
Network Address: 10.0.0.0
Usable Host Range: 10.0.0.1 - 10.0.3.254
Broadcast Address: 10.0.3.255
Binary Netmask: 11111111.11111111.11111100.00000000
Total number of hosts: 1,024
Usable Host Range: 10.0.7.193 - 10.0.7.254
Broadcast Address: 10.0.7.255
Binary Netmask: 11111111.11111111.11111111.11000000
Total number of hosts: 64
Number of usable hosts: 62
Information technology:
IP Address: 10.0.0.0
Netmask: 255.255.252.0
Wildcard Mask: 0.0.3.255
CIDR Notation: /22
Network Address: 10.0.0.0
Usable Host Range: 10.0.0.1 - 10.0.3.254
Broadcast Address: 10.0.3.255
Binary Netmask: 11111111.11111111.11111100.00000000
Total number of hosts: 1,024
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7TCP/IP NETWORKING
Number of usable hosts: 1,022
Head Office:
IP Address: 10.0.7.128
Netmask: 255.255.255.192
Wildcard Mask: 0.0.0.63
CIDR Notation: /26
Network Address: 10.0.7.128
Usable Host Range: 10.0.7.129 - 10.0.7.190
Broadcast Address: 10.0.7.191
Binary Netmask: 11111111.11111111.11111111.11000000
Total number of hosts: 64
Number of usable hosts: 62
Number of usable hosts: 1,022
Head Office:
IP Address: 10.0.7.128
Netmask: 255.255.255.192
Wildcard Mask: 0.0.0.63
CIDR Notation: /26
Network Address: 10.0.7.128
Usable Host Range: 10.0.7.129 - 10.0.7.190
Broadcast Address: 10.0.7.191
Binary Netmask: 11111111.11111111.11111111.11000000
Total number of hosts: 64
Number of usable hosts: 62
8TCP/IP NETWORKING
Task 1. B. Explanation
The main challenge in accommodating 1,024 hosts in a site is broadcasting in this
network. A broadcasting is technique of sending data packet though all the host in a network, if
any network having any broadcasting issue than it might be causes a rollover. However, if any
network having more than 1,022 hosts in a network, where require hosts per site is 1,024 then it
also deal with wastages of internet protocol issue.
Task 2. A. Communication protocol & Role of network analyzers
Communication protocols are required to provide end to end reliable data transmission. A
commutation protocol can be define as a set of rule that responsible to provided secure and
reliable data transmission (Chaubey et al., 2015). The M2M solution has around 1200 has in their
six building. Consequently, they have to utilize suitable systems for network devices to
recognize and additionally make the association between each other. These protocols are
likewise in charge of arranging decides that can determine how the information acquired from
network devices and additionally sent over the system. Consequently, the communication
protocol component likewise valuable to improve the execution of the system by message
verification as well as data compression.
As per the M2M solution networking infrastructure, design directing conventions
additionally required distinguishing different switches in the system. The router is assignment
with a routing protocol for utilized as a part of the switches to deal with the pathway between
sources to destination (Garay, Kiayias & Leonardos, 2015). There are few well-known routings
protocols are BGP, EIGRP and also OSPF. Through, the M2M solution it can execute the OSPF
Task 1. B. Explanation
The main challenge in accommodating 1,024 hosts in a site is broadcasting in this
network. A broadcasting is technique of sending data packet though all the host in a network, if
any network having any broadcasting issue than it might be causes a rollover. However, if any
network having more than 1,022 hosts in a network, where require hosts per site is 1,024 then it
also deal with wastages of internet protocol issue.
Task 2. A. Communication protocol & Role of network analyzers
Communication protocols are required to provide end to end reliable data transmission. A
commutation protocol can be define as a set of rule that responsible to provided secure and
reliable data transmission (Chaubey et al., 2015). The M2M solution has around 1200 has in their
six building. Consequently, they have to utilize suitable systems for network devices to
recognize and additionally make the association between each other. These protocols are
likewise in charge of arranging decides that can determine how the information acquired from
network devices and additionally sent over the system. Consequently, the communication
protocol component likewise valuable to improve the execution of the system by message
verification as well as data compression.
As per the M2M solution networking infrastructure, design directing conventions
additionally required distinguishing different switches in the system. The router is assignment
with a routing protocol for utilized as a part of the switches to deal with the pathway between
sources to destination (Garay, Kiayias & Leonardos, 2015). There are few well-known routings
protocols are BGP, EIGRP and also OSPF. Through, the M2M solution it can execute the OSPF
9TCP/IP NETWORKING
protocol for their association to manage private systems administration locales with a center
switch, as appeared in the above figure 1.
The network protocol analyzer can be an instrument or programming that measure the
system execution by some system parameters. Moreover, the M2M arrangement has presented
six distinct destinations that can be associated with the web, hence they need to utilize an
examination device to check vulnerability and performance as well (Namesh & Ramakrishnan,
2015).
Figure 2: ZVA40 vector network analyzer
(Source: Duchêne et al., 2017, pp-13)
The network analyzer programming likewise compresses crude information into
something that sounds good to a client, who is insufficient shrewd with network administration
protocol for their association to manage private systems administration locales with a center
switch, as appeared in the above figure 1.
The network protocol analyzer can be an instrument or programming that measure the
system execution by some system parameters. Moreover, the M2M arrangement has presented
six distinct destinations that can be associated with the web, hence they need to utilize an
examination device to check vulnerability and performance as well (Namesh & Ramakrishnan,
2015).
Figure 2: ZVA40 vector network analyzer
(Source: Duchêne et al., 2017, pp-13)
The network analyzer programming likewise compresses crude information into
something that sounds good to a client, who is insufficient shrewd with network administration
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10TCP/IP NETWORKING
component. This interpretive apparatus can give outline information of the mistake from any
view of the application layer (Williams & Yumerefendi, 2017). For instance, if the M2M
arrangement is having some inconvenience like DOS attack or flooding, at that point they have
to channel in which have or where an unapproved get to endeavor. In that circumstance, they
should utilize the Wireshark organize analyzer device to channel that host or malignant client.
Figure 3: Network analyzer software – Wireshark
(Source: Garay, Kiayias, & Leonardos, 2015, pp-301)
component. This interpretive apparatus can give outline information of the mistake from any
view of the application layer (Williams & Yumerefendi, 2017). For instance, if the M2M
arrangement is having some inconvenience like DOS attack or flooding, at that point they have
to channel in which have or where an unapproved get to endeavor. In that circumstance, they
should utilize the Wireshark organize analyzer device to channel that host or malignant client.
Figure 3: Network analyzer software – Wireshark
(Source: Garay, Kiayias, & Leonardos, 2015, pp-301)
11TCP/IP NETWORKING
Task 2. B. Network analyzer tools
Benefits and Usability
The network analysers are used to analyse traffic all over the network of M2M solution.
There are two type of network analysers are available in the market such as a hardware device to
tracer the bandwidth, signal strength etc. as well as a software for data packets analysis.
Therefore, according to their category they have different specific functionality and features as
well (Segata et al., 2014). Consequently, a hardware device is ZVA40 vector network analyser
and Wireshark packet capturing tool is required in M2M solution to check their functionality.
A network protocol analyser like Wireshark offers many advantages that make it
engaging for regular utilize in most of the organization. The Wireshark network traffic analyser
can be utilized more than one hundred of network protocol. It can store the captured transmitted
data for offline or live examination, where the organization can filter out vital information
(Chaubey et al., 2015). It has been expected that Wireshark is very much compatible with Linux,
NetBSD, Windows, Solaris, and FreeBSD.
The hardware tool is being utilized in M2M solution is vector network analyser ZVA40
can measure the network traffic by watching a few parameters. For example, an order is a
measure of how well a coupler can isolate signals moving the diverse way (Burns et al., 2016).
Therefore, VAN is use to test the following component of M2M solution network infrastructure
Task 2. B. Network analyzer tools
Benefits and Usability
The network analysers are used to analyse traffic all over the network of M2M solution.
There are two type of network analysers are available in the market such as a hardware device to
tracer the bandwidth, signal strength etc. as well as a software for data packets analysis.
Therefore, according to their category they have different specific functionality and features as
well (Segata et al., 2014). Consequently, a hardware device is ZVA40 vector network analyser
and Wireshark packet capturing tool is required in M2M solution to check their functionality.
A network protocol analyser like Wireshark offers many advantages that make it
engaging for regular utilize in most of the organization. The Wireshark network traffic analyser
can be utilized more than one hundred of network protocol. It can store the captured transmitted
data for offline or live examination, where the organization can filter out vital information
(Chaubey et al., 2015). It has been expected that Wireshark is very much compatible with Linux,
NetBSD, Windows, Solaris, and FreeBSD.
The hardware tool is being utilized in M2M solution is vector network analyser ZVA40
can measure the network traffic by watching a few parameters. For example, an order is a
measure of how well a coupler can isolate signals moving the diverse way (Burns et al., 2016).
Therefore, VAN is use to test the following component of M2M solution network infrastructure
12TCP/IP NETWORKING
radio wires, RF switch, couplers, channel, links, and in addition intensifiers. It also helps the
organization to increase the system uptime by utilizing its auto error correction methodology.
Associated costs
Network Device Cost
SL No. Product Cost Man
Power
1 Rohde & Schwarz ZVL6 Vector Network Analyzer $11,500.00 7
2 Wireshark Free 7
Total $11,500.00 14
Cost of VNA Installation & Maintenance
SL No. Resource Cost
1 Resource Network Administration $300.00
2 Resource Network Installation $250.00
3 Resource Network Device Monitor $180.00
4 Resource Network Monitor $200.00
5 Resource Administrator $400.00
6 Resource Maintenance Staff 1 $220.00
radio wires, RF switch, couplers, channel, links, and in addition intensifiers. It also helps the
organization to increase the system uptime by utilizing its auto error correction methodology.
Associated costs
Network Device Cost
SL No. Product Cost Man
Power
1 Rohde & Schwarz ZVL6 Vector Network Analyzer $11,500.00 7
2 Wireshark Free 7
Total $11,500.00 14
Cost of VNA Installation & Maintenance
SL No. Resource Cost
1 Resource Network Administration $300.00
2 Resource Network Installation $250.00
3 Resource Network Device Monitor $180.00
4 Resource Network Monitor $200.00
5 Resource Administrator $400.00
6 Resource Maintenance Staff 1 $220.00
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13TCP/IP NETWORKING
7 Resource Maintenance Staff 2 $220.00
Total $1,770.00
Cost of Wireshark Maintenance
SL No. Resource Cost
1 Network security Build Finance $400.00
2 Network Maintenance Administration Build Transport $150.00
3 Network troubleshoot Administration Build Research $150.00
4 Network troubleshoot Administration Build Sales $150.00
5 Network troubleshoot Administration Build Head $400.00
6 Network troubleshoot Administration Build Information $150.00
7 Network security Administration Build Head $150.00
Total $1,400.00
Grand Total Cost $14,670.00
7 Resource Maintenance Staff 2 $220.00
Total $1,770.00
Cost of Wireshark Maintenance
SL No. Resource Cost
1 Network security Build Finance $400.00
2 Network Maintenance Administration Build Transport $150.00
3 Network troubleshoot Administration Build Research $150.00
4 Network troubleshoot Administration Build Sales $150.00
5 Network troubleshoot Administration Build Head $400.00
6 Network troubleshoot Administration Build Information $150.00
7 Network security Administration Build Head $150.00
Total $1,400.00
Grand Total Cost $14,670.00
14TCP/IP NETWORKING
Recommendation
In this report the M2M solution have a private network 10.0.0.0 which is being divided
among six, hence after examinations their prerequisite it can be expected that they require
hardware device and software both can help for their organization. Subsequently, as expressed in
over the Rohde and Schwarz ZVL6 Vector Network Analyser is suggested equipment gadget
that can give a propel error correcting component. In any case, the equipment related issues are
measured by the Rohde and Schwarz ZVL6 Vector Network Analyser, aside from that a network
analyser programming Wireshark is required for inspect their internal network and access of the
outside of their network as well.
Conclusion
This report incorporates all network infrastructure related answers for the M2M
arrangement. The M2M arrangement needs to build up another system framework which is
totally characterized in this report. The system outline demonstrates the helpful tending to
answer for the M2M arrangement, which is being actualized for their locales. This association
likewise needs to think about their strategies for upgrading, which is characterized as system
analyzer device. In this report two different type of network analysis solution was recommended.
However, both of these devices are essential for the M2M solution. The purpose for the need of
that gadget likewise characterized in this report, which encourages the M2M solution for better
get it. Be that as it may, from this above examination and created tending to the arrangement, it
Recommendation
In this report the M2M solution have a private network 10.0.0.0 which is being divided
among six, hence after examinations their prerequisite it can be expected that they require
hardware device and software both can help for their organization. Subsequently, as expressed in
over the Rohde and Schwarz ZVL6 Vector Network Analyser is suggested equipment gadget
that can give a propel error correcting component. In any case, the equipment related issues are
measured by the Rohde and Schwarz ZVL6 Vector Network Analyser, aside from that a network
analyser programming Wireshark is required for inspect their internal network and access of the
outside of their network as well.
Conclusion
This report incorporates all network infrastructure related answers for the M2M
arrangement. The M2M arrangement needs to build up another system framework which is
totally characterized in this report. The system outline demonstrates the helpful tending to
answer for the M2M arrangement, which is being actualized for their locales. This association
likewise needs to think about their strategies for upgrading, which is characterized as system
analyzer device. In this report two different type of network analysis solution was recommended.
However, both of these devices are essential for the M2M solution. The purpose for the need of
that gadget likewise characterized in this report, which encourages the M2M solution for better
get it. Be that as it may, from this above examination and created tending to the arrangement, it
15TCP/IP NETWORKING
can be presumed that all required design and solution for the M2M solution are depicted in this
report.
can be presumed that all required design and solution for the M2M solution are depicted in this
report.
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.