Running head: NETWORKING QUESTIONS Networking Questions (Student’s Name) (Professor’s Name) (Course Title) (Date of Submission) NETWORKING QUESTIONS 2 Question 1: Benefits and Disadvantages of using Group Policy in an Organization Group policy is a system within the Active Directory that enables the network administrators to define user, security and organization wide policies throughout the network. This is possible because through the group policy, the administrators will be able to define the options for what the users can do on a network like what files, folders, and applications they can access and also what users are allowed or not allowed to do on their computers (Stanek, 2013). The benefits of group policy in an organization are as explained below: Security- Network security is a major concern for all businesses and thus through group policy an administrator can restrict unidentified users from remote computers to access the network resources and also can set minimum requirements for setting of passwords to make them strong and not easy to guess or crack. This can be attained by requiring the use of both capital, lowercase letters, numbers and symbols for the password to be accepted in the system. Ease of management- When the users are connected through group policy, the management of a network is much easier because it will be possible to implement company-wide policies as group policy settings will reflect all persons and computers in domain, site and organizational unit. Increased productivity- Through group policy settings, the users are no longer confined to a single work computer because all folders and files with their personalized settings can be made available on all computers. Time and cost saving- Through the use of group policy, administrator can install/update/upgrade software from a single location and thus be able to service every single computer simultaneously and most importantly the installations and updates can be scheduled to NETWORKING QUESTIONS 3 occur outside of business hours and in so doing, no one will be interrupted while they are working. Roaming profiles- Group policy enable users to have roaming profiles in that if any user logs into any computer within the network, it loads the settings to which his/her account is authorized and thus one will be able to access all the resources needed for one to accomplish a task depending on the account details rather than been tied to a specific computer. The disadvantages of group policy in an organization are as explained below: For large networks, organizing a large number of GPOs can become cumbersome as group policy can become complicated web of OUs, users and devices. In simpler environments, it can also be difficult to identify which sets of policies apply to which device. Configuration mistakes can also cause group policy to be ineffective or even not to work at all. Finally group policies are restrictive and thus in case one wants to lighten the restrictions for one machine temporarily, the administrator has to find and alter the group policy that controls what he/she wants to change for that machine. Having to go through such a process within multiple machines can prove to be a hard task. Question 2: Policies available in Windows 2012 Server Group policy is an infrastructure that enables the network administrator to specify managed configurations for users and computers through group policy preferences. One of the policies available in windows 2012 server is group policy infrastructure status and it displays the status of Active Directory and SYSVOL replication as it relates to all group policy objects or a single group policy object. Basically, group policy relies on being stored and replicated to all domain controllers in a domain and thus there can be a lag time after a change is made on one domain controller before the change is replicated to all other domain controllers. Until changes NETWORKING QUESTIONS 4 to a GPO are replicated to the domain controller that a client is accessing, that particular computer will receive the earlier version of the GPO during group policy refresh. In earlier versions of windows operating system, administrators had to download GPOtool.exe to diagnose these issues but in windows server 2012, an administrator needs not to download and run a separate tool for monitoring and diagnosing replication issues related to group policy at domain level. The following details will also be able to be viewed: ACL details, AD and SYSVOL GPO version details and the number of GPOs listed in AD and SYSVOL for each domain controller. (Morimoto, 2012) References Stanek, W. R. (2013). Microsoft Windows server 2012 inside out. Redmond, Wash: Microsoft Press. Morimoto, R., Noel, M., Droubi, O., Abbate, A., Yardeni, G., &Amaris, C. (2012).Windows Server 2012 unleashed. Indianapolis, IN: Sams. NETWORKING QUESTIONS 5 Question 3: TCP and UDP and their Differences Transmission Control Protocol is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data and it works with internet protocol that defines how computers send packets of data to each other. It is a connection oriented protocol which means a connection is established and maintained until the application programs at each end finish the exchange of messages. User Datagram Protocol is an alternative communications protocol to TCP that is used primarily for establishing low-latency and loss tolerating connections between applications on the internet. It is a connectionless protocol. The major differences are explained below: Reliability- TCP provides delivery guarantee because if a packet is lost in transit, the recipient requests for it and the sender retransmits it while UDP is unreliable as it doesn’t provide delivery guarantee. Ordering- TCP ensures that all sequencing and ordering is done from the receiving end of the network even if the packets arrive out of order while UDP doesn’t provide any ordering or sequence guarantee and thus packets may be received in any order. Speed- TCP is slow because it has to create a connection, ensure guaranteed and orderly delivery while UDP is fast because it has not to worry about such factors. Therefore UDP is more suitable where speed is a priority like online video streaming or telecast. Congestion or flow control- TCP handles reliability and congestion control as it requires three packets to set up a socket connection before any user data can be sent while UDP doesn’t have an option for flow control. From the differences discussed above, the two protocols have different field of applications that best suites each capabilities. Since TCP provides delivery and sequencing NETWORKING QUESTIONS 6 guarantee, it is best suited for applications that require high reliability and transmission time is not a priority and should be used where one can’t afford to lose any message like in web browsing, email and file transfer. UDP is widely used for time sensitive applications and also servers that answer small queries from huge number of clients. UDP is compatible with packet broadcast and multicast and is commonly used in DNS, VoIP and online games (Comer, 2011). Question 4: Transition technologies for IPv6 Teredo gives full Ipv6 connectivity for dual stack hosts that are connected to the internet but which have no direct native connection to an IPv6 network. Teredo also encapsulates IPv6 data into IPv4 UDP packets and successfully operates through most NAT boundaries (Horley, 2014). Intra- Site Automatic Tunnel Addressing Protocol enables dual stack devices to transmit IPv6 traffic between each other across an IPv4 backbone. This technology enables new networking functions while preserving the underlying network as it is. Once an ISATAP server/router has been set up, only the clients need to be configured to connect to it and thus this solution enables organizations to deploy a simple and manageable IPv6 within their infrastructure with little time and effort. It is also advantageous because within a site, only one ISATAP router is needed and also a user can connect isolated IPv6/IPv4-dualstack hosts to the IPv6 internet. ISATAP uses IPv4 as non-broadcast multiple access data link layer and performs neighbor discovery on top of IPv4. Due to the benefits achieved by ISATAP, I will consider using this technology. This transition technology will be beneficial where an organization wants to deploy IPv6 as well as maintain compatibility with large existing base of IPv4 hosts and routers (Horley, 2014). NETWORKING QUESTIONS 7 From the online article I read, it is discussing about securing the Tunnels. It is argued that most of the tunneling protocols used to transition between IPv4 and IPv6 do not provide enough security mechanisms. My view is that one needs to secure the tunnels using ACLs and other network controls to prevent them from affecting the security of the overall network. Therefore ACLs should be defined correctly to limit the traffic that can enter and leave tunnels and also prevent packets with spoofed source address from entering the company network. By ensuring this, security will be maintained during the transition period. My organization is planning to undergo IPv6 transition and since we want the IPv4 to coexist with IPv6 for some time, we are considering using a native dual-stack migration. This is aimed to allow both IPv4 and IPv6 to run simultaneously over the network in order to facilitate communication between end user devices regardless of the protocol they are equipped for and also to ensure that there is no disruption of service if a client requests an IPv4 address. References Comer, D., & Stevens, D. L. (2011).Internetworking with TCP/IP. Englewood Cliffs, N.J: Prentice Hall. Horley, E. (2014). Practical IPv6 for Windows administrators. New York, N.Y.: Apress. NETWORKING QUESTIONS 8 Question 5: DHCP reservations and static IP addresses Some network devices like printers and servers require a constant IP address and this can be achieved by either manually configuring a static IP address or assigning a reservation on the DHCP server. Reservations are permanent lease assignments that help ensure that a specified client on a subnet will always have the same IP address. Networked printers, IP camera systems and network connected HVAC controllers should get IP addresses through reservations because they need to have the same IP address and the advantages of this over statically configuring the IP address will be that: In case the network parameters are changed at the DHCP server, the device configured with reserved IP address will receive the new network parameters when the device requests renewal of its lease, while to change the network parameters on a device configured with a static IP address, the changes will have to be made manually (Bigger, 2014). Another importance of DHCP reservation is that the administrators will have a central point of reference for all IP address allocations in the organization and this makes it easy to track down particular clients or reassigning new scopes. Servers can also use DHCP reservations and function appropriately although having a static IP address can help ensure that if the router dies, the server will keep going and clients that still have valid DHCP lease keep working properly before the problem can be fixed. Question 6: DHCP Messages Exchanged during Initial Lease Request DHCP servers and clients communicate through a series of DHCP messages and to obtain a lease, the DHCP client initiates a conversation with a DHCP server using a series of these messages: DHCP Discover- The DHCP client will request an IP address by broadcasting a DHCP Discover message to the local subnet. NETWORKING QUESTIONS 9 DHCP Offer- In our case, I assume the DHCP server will be down for around 30 seconds. The client will send DHCP Discover messages at intervals of 0,4, 8, 16 and 32 seconds until it finally receives a DHCP offer message from the DHCP server when the server will be up. If for some case the server could be down for more than a minute, the client will use APIPA to selfconfigure an IP address for its interface or if the client does not support alternate configuration or it is disabled, the network initialization will fail and in both cases, the client will begin a new cycle of DHCP discover message every five minutes using the same intervals of 0,4, 8, 16 and 32 seconds up to when the server able to respond. DHCP Request- The client will indicate the acceptance of the offer by selecting the offered address and broadcast a DHCP Request message in response. DHCP Ack- The client will be assigned the IP address and the DHCP server will broadcast a DHCP Ack message in response and thus finalizing the terms of the lease. When the client will receive the acknowledgement, it will configure its TCP/IP properties by using the DHCP option information in the reply and thus completing its initialization of TCP/IP (Droms, 2014). The diagram is as shown below for the above discussed IP address lease process: DHCP Lease Process Overview NETWORKING QUESTIONS 10 References Bigger, D. (2014). CompTIA Network+ 2014: Configuring DHCP. Droms, R., & Lemon, T. (2014).The DHCP handbook: Understanding, deploying, and managing automated configuration services. Indianapolis, IN: Macmillan Technical Pub.