Assignment 3 Computer Network BS-CS Sec-5B Muhammad Usman Bcsm-f19-407 a) Classify ACL (Access Control Lists) and explains its features and operations? Support your answer by labeling the diagrams? ACLs are lists of conditions that are applied to traffic traveling across a router's interface. These lists tell the router what types of packets to accept or deny. Acceptance and denial can be based on specified conditions. ACLs enable management of traffic and secure access to and from a network. Diagram: Packet Filtering: A router acts as a packet filter when it forwards or denies packets according to filtering rules. An ACL is a sequential list of permit or deny statements, known as access control entries (ACEs). ACL Operation: To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces. The router examines each packet and will forward or discard it based on the conditions specified in the ACL. An ACL makes routing decisions based on source address, destination address, protocols, and upper-layer port numbers. ACLs must be defined on a per protocol, per direction, or per port basis. To control traffic flow on an interface, an ACL must be defined for each protocol enabled on the interface. ACLs control traffic in one direction at a time on an interface. Two separate ACLs must be created to control inbound and outbound traffic. (b) Classify about the Routing Protocols Types? Types of Routing Protocols There are mainly two types of Network Routing Protocols Static Dynamic Routing Protocols Static Routing Protocols Static routing protocols are used when an administrator manually assigns the path from source to the destination network. It offers more security to the network. Advantages No overhead on router CPU. No unused bandwidth between links. Only the administrator is able to add routes Disadvantages The administrator must know how each router is connected. Not an ideal option for large networks as it is time intensive. Whenever link fails all the network goes down which is not feasible in small networks. Dynamic Routing Protocols Dynamic routing protocols are another important type of routing protocol. It helps routers to add information to their routing tables from connected routers automatically. These types of protocols also send out topology updates whenever the network changes’ topological structure. Advantage: Easier to configure even on larger networks. It will be dynamically able to choose a different route in case if a link goes down. It helps you to do load balancing between multiple links. Disadvantage: Updates are shared between routers, so it consumes bandwidth. Routing protocols put an additional load on router CPU or RAM. Distance Vector Routing Protocol (DVR) Distance Vector Protocols advertise their routing table to every directly connected neighbor at specific time intervals using lots of bandwidths and slow converge. In the Distance Vector routing protocol, when a route becomes unavailable, all routing tables need to be updated with new information. Advantages: Updates of the network are exchanged periodically, and it is always broadcast. This protocol always trusts route on routing information received from neighbor routers. Disadvantages: As the routing information are exchanged periodically, unnecessary traffic is generated, which consumes available bandwidth. Internet Routing Protocols: The following are types of protocols which help data packets find their way across the Internet: Routing Information Protocol (RIP) RIP is used in both LAN and WAN Networks. It also runs on the Application layer of the OSI model. The full form of RIP is the Routing Information Protocol. Two versions of RIP are 1. RIPv1 2. RIPv2 The original version or RIPv1 helps you determine network paths based on the IP destination and the hop count journey. RIPv1 also interacts with the network by broadcasting its IP table to all routers connected with the network. RIPv2 is a little more sophisticated as it sends its routing table on to a multicast address. Interior Gateway Protocol (IGP) IGRP is a subtype of the distance-vector interior gateway protocol developed by CISCO. It is introduced to overcome RIP limitations. The metrics used are load, bandwidth, delay, MTU, and reliability. It is widely used by routers to exchange routing data within an autonomous system. This type of routing protocol is the best for larger network size as it broadcasts after every 90 seconds, and it has a maximum hop count of 255. It helps you to sustain larger networks compared to RIP. IGRP is also widely used as it is resistant to routing loop because it updates itself automatically when route changes occur within the specific network. It is also given an option to load balance traffic across equal or unequal metric cost paths. Link State Routing Protocol Link State Protocols take a unique approach to search the best routing path. In this protocol, the route is calculated based on the speed of the path to the destination and the cost of resources. Routing protocol tables: Link state routing protocol maintains below given three tables: Neighbor table: This table contains information about the neighbors of the router only. For example, adjacency has been formed. Topology table: This table stores information about the whole topology. For example, it contains both the best and backup routes to a particular advertised network. Routing table: This type of table contains all the best routes to the advertised network. Advantages: This protocol maintains separate tables for both the best route and the backup routes, so it has more knowledge of the inter-network than any other distance vector routing protocol. Concept of triggered updates are used, so it does not consume any unnecessary bandwidth. Partial updates will be triggered when there is a topology change, so it does not need to update where the whole routing table is exchanged. Exterior Gateway Protocol (EGP) EGP is a protocol used to exchange data between gateway hosts that are neighbors with each other within autonomous systems. This routing protocol offers a forum for routers to share information across different domains. The full form for EGP is the Exterior Gateway Protocol. EGP protocol includes known routers, network addresses, route costs, or neighboring devices. Enhanced Interior Gateway Routing Protocol (EIGRP) EIGRP is a hybrid routing protocol that provides routing protocols, distance vector, and linkstate routing protocols. The full form routing protocol EIGRP is Enhanced Interior Gateway Routing Protocol. It will route the same protocols that IGRP routes using the same composite metrics as IGRP, which helps the network select the best path destination. Open Shortest Path First (OSPF) Open Shortest Path First (OSPF) protocol is a link-state IGP tailor-made for IP networks using the Shortest Path First (SPF) method. OSPF routing allows you to maintain databases detailing information about the surrounding topology of the network. It also uses the Dijkstra algorithm (Shortest path algorithm) to recalculate network paths when its topology changes. This protocol is also very secure, as it can authenticate protocol changes to keep data secure. c) Classify about the Distance Vector Routing Protocols (RIP) and its types? Routing Information Protocol (RIP) (RIP) is a dynamic routing protocol that uses hop count as a routing metric to find the best path between the source and the destination network. It is a distance-vector routing protocol that has an AD value of 120 and works on the application layer of the OSI model. RIP uses port number 520. Features of RIP : 1. Updates of the network are exchanged periodically. 2. Updates (routing information) are always broadcast. 3. Full routing tables are sent in updates. 4. Routers always trust routing information received from neighbor routers. This is also known as Routing on rumours. RIP versions : There are three versions of routing information protocol – RIP Version1, RIP Version2, and RIPng. RIP v1 RIP v2 RIPng Sends update as broadcast Sends update as multicast Sends update as multicast RIP v1 RIP v2 RIPng Multicast at FF02::9 (RIPng can only run on IPv6 networks) Broadcast at 255.255.255.255 Multicast at 224.0.0.9 Doesn’t support authentication of update messages Supports authentication of RIPv2 update messages – Classful routing protocol Classless protocolupdated supports classful Classless updates are sent RIP v1 is known as Classful Routing Protocol because it doesn’t send information of subnet mask in its routing update. RIP v2 is known as Classless Routing Protocol because it sends information of subnet mask in its routing update. (d) Classify about NAT & PAT? NAT: Network Address Translation (NAT) basically connects two networks and map the private (inside local) addresses into public addresses (inside global). Here the term inside local signifies that the host address belongs to an internal network and not assigned by Network Information Center or service provider. And the inside global means that the address is a licit address assigned by the NIC or service provider and it also represents one or more inside local addresses to the outside world. The main purpose of NAT was to slow down the rate of depletion of available IP address space by enabling many private IP addresses to be represented by some smaller number of public IP addresses. Furthermore, only one address can be configured in NAT to represent the entire network to the outside world. Therefore it provides security as the translation process is transparent. NAT can be used as a tool for network migration and merging, server load sharing, virtual server creation, etc. NAT can be of three types : Static NAT – In this type of NAT a local address is mapped to a global address, and there exists a one-to-one relationship. Static NAT is useful when a host requires a consistent address, which must be accessed from the internet. For example, enterprise servers or networking devices. Dynamic NAT – Dynamic NAT allows unregistered private IP address to be translated into registered public IP address from a pool of public IP addresses. PAT/ NAT Overloading/IP masquerading – PAT is most popular type among the three types. It is a variant of Dynamic NAT and is similar to it, but it maps multiple private IP addresses to a single public IP address by making use of ports. Definition of PAT Port Address Translation (PAT) is a type of Dynamic NAT through which address translation can be configured at the port level, and the remaining IP address usage is also optimized. PAT maps multiple source local addresses and ports to a single global IP address and port from a pool of IP addresses that are routable on the destination network. Here the interface IP address is used in combination with the port number and multiple hosts could have same IP address because the port number is unique. It uses unique source port address on the inside global IP address to identify the distinct translations. The total number of NAT translations that can be carried out is 65536 because the port number is encoded in 16 bits. Original source ports are preserved by the PAT. If the source port is already allocated the available ports are searched. The port groups are divided into three ranges that are from 0 to 511, 512 to 1023, or 1024 to 65535. Q 2: (a) Analyse VLAN and Inter-VLAN Routing and frame relay? VLAN: is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network. The result becomes a virtual LAN that is administered like a physical LAN. The full form of VLAN is defined as Virtual Local Area Network. Inter-VLAN: Inter-VLAN routing can be defined as a way to forward traffic between different VLAN by implementing a router in the network. As we learnt previously, VLANs logically segment the switch into different subnets, when a router is connected to the switch, an administrator can configure the router to forward the traffic between the various VLANs configured on the switch. The user nodes in the VLANs forwards traffic to the router which then forwards the traffic to the destination network regardless of the VLAN configured on the switch. Frame Relay: Frame Relay is a packet-switching technology offered as a telecommunications service by telcos and long-distance carriers, used primarily for WAN links. Frame relay can be used to encapsulate local area network (LAN) traffic such as Ethernet frames for transmission over digital data transmission lines for wide area networks (WANs) and can connect multiple LANs to form a multipoint WAN. Frame relay technology was originally an offshoot of Integrated Services Digital Network (ISDN) digital communication technology. (C) Analyze in detail about Spanning Tree Protocol? Spanning Tree Protocol (STP) is a communication protocol operating at data link layer the OSI model to prevent bridge loops and the resulting broadcast storms. It creates a loop − free topology for Ethernet networks. Working Principle A bridge loop is created when there are more than one paths between two nodes in a given network. When a message is sent, particularly when a broadcast is done, the bridges repeatedly rebroadcast the same message flooding the network. Since a data link layer frame does not have a time-to-live field in the header, the broadcast frame may loop forever, thus swamping the channels. Spanning tree protocol creates a spanning tree by disabling all links that form a loop or cycle in the network. This leaves exactly one active path between any two nodes of the network. So when a message is broadcast, there is no way that the same message can be received from an alternate path. The bridges that participate in spanning tree protocol are often called spanning tree bridges. To construct a spanning tree, the bridges broadcast their configuration routes. Then they execute a distributed algorithm for finding out the minimal spanning tree in the network, i.e. the spanning tree with minimal cost. The links not included in this tree are disabled but not removed. In case a particular active link fails, the algorithm is executed again to find the minimal spanning tree without the failed link. The communication continues through the newly formed spanning tree. When a failed link is restored, the algorithm is re-run including the newly restored link. Example Let us consider a physical topology, as shown in the diagram, for an Ethernet network that comprises of six interconnected bridges. The bridges are named {B1, B2, B3, B4, B5, B6} and several nodes are connected to each bridge. The links between two bridges are named {L1, L2, L3, L4, L5, L6, L7, L8, L9}, where L1 connects B1 and B2, L2 connects B1 and B3 and so on. It is assumed that all links are of uniform costs. From the diagram we can see that there are multiple paths from a bridge to any other bridge in the network, forming several bridge loops that makes the topology susceptible to broadcast storms. According to spanning tree protocol, links that form a cycle are disabled. Thus,we get a logical topology so that there is exactly one route between any two bridges. One possible logical topology is shown in the following diagram below containing links {L1, L2, L3, L4, L5} − In the above logical configuration, if a situation arises such that link L4 fails. Then, the spanning tree is reconstituted leaving L4. A possible logical reconfiguration containing links {L1, L2, L3, L5, L9} is as follows −