CN Assignment 2
CN Assignment 2
1. Branch Routers
Cisco 3900 Series Integrated Services Routers Cisco 3800 Series Integrated Services Routers Cisco 2900 Series Integrated Services Routers Cisco 2800 Series Integrated Services Routers Cisco 1900 Series Integrated Services Routers Cisco 1800 Series Integrated Services Routers Cisco 800 Series Routers
Cisco ASR 901 Series Aggregation Services Routers Cisco XR 12000 Series Router
remote office. However, the most popular router in the 1600 series is the 1605, in part because of its dual Ethernet ports, which enable it to route effectively between two LANs and a WAN. The following table shows the standard and upgradeable hardware for the Cisco 1605. (The WICs listed can be installed in any 1600 Series router with a WIC interface.)
ANS 2)
In 1991, the IETF decided that the current version of IP, called IPv4, had outlived its design. The new version of IP, called either IPng (Next Generation) or IPv6 (version 6), was the result of a long and tumultuous process which came to a head in 1994, when the IETF gave a clear direction for IPv6. IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6. The differences between IPv6 and IPv4 are in five major areas: addressing and
routing, security, network address translation, administrative workload, and support for mobile devices. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4.
IPv6 Headers
The new IPv6 header structure has a header boundary at 64-bits and has only 40 bytes, where 32 of them are used for IPv6 addresses and the remaining 8 bytes by 6 additional fields. Whereas IPv4 headers are terminated on a 32-bit boundary and consist of 24 bytes, where 8 of them are used for IPv4 address and the remaining 16 bytes by 12 additional fields. IPv6 headers do not contain any optional elements. If additional functions are need IPv6 uses extension headers. This makes the new IPv6 header much simpler then its predecessor. Below is a side-by-side comparison of the IPv4 and IPv6 header
The IPv6 Header Fields: Version. This is a four-bit value, and for IPv6 must be equal to six. This field is the only field that has the same meaning from IPv4 to IPv6. Priority. This four-bit priority field allows an application to specify the type of traffic that is being sourced. This allows the network to take advantage of the various queuing and congestion control mechanisms that may exist within it.
Flow Label. This is a 24-bit value used to identify packets that belong to the same flow. Similar to the Service Type field in IPv4, this allows networks devices to prioritize and shape traffic flows appropriately. Payload Length. This is a 16-bit field that contains an integer value equal to the length of the packet payload in bytes. It is very similar to the IPv4 Total Length Field, except that IPv6's field is the length of the data carried after the header whereas IPv4 included the header. Next Header. This 8-bit field value indicates what protocol is in use in the header immediately following the IPv6 packet. Similar to the IPv6 protocol field, the next header field may refer to a higher-layer protocol like TCP or UDP, but it may also indicate the existence of an IPv6 extension header. Hop Limit. This 8-bit field is used every time a node forwards a packet, it decrements this eight-bit field by one. If the hop limit reaches zero, the packet is discarded. This is very similar to IPv4, where the TTL (time-to-live) field fulfills a similar purpose. Source Address. This is the 128-bit address of the node originating the IPv6 packet. Destination Address. This is the 128-bit address of the intended recipient of the IPv6 packet. This address may be a unicast, multicast, or anycast address. If a routing extension is being used (which specifies a particular route that the packet must traverse), the destination address may be one of those intermediate nodes instead of the destination node. Extension Header. The current IPv6 specification defines 6 extension headers o Hop-by-Hop Options Header. This header carries information that is intended to be examined by every node en route from the source to the destination. o Routing Header. This header replaces source routing as it was implemented in IPv4. Source routing allows you to specify router that the packet must traverse on its way to its destination. IPv6 defines a generic routing extension header, with two one-byte fields: a routing type field, indicating what kind of routing header is in use, and a segment-left field, which indicates how many additional routers listed in the rest of the header must still be visited before the packet reaches it final destination.
o Fragment Header. By allowing fragmentation only by the source node, IPv6 streamlines the processing of packets by intermediate routers. The fragment header fields include: Next header field. This eight-bit field is common to all IPv6 headers Reserved. The next eight bits are unused at this time and set to zero. Fragment offset field. This 13-bit field indicates, in units of eight bytes, where the data included in this packet (a fragment) begins in relation to the beginning of the fragmented portion of the data. Reserved field. This two-bit field is set to zero and is not currently used. M flags. This single bit indicates whether or not more fragments are to come. Identification field. This is like the IPv4 ID field except that it is 32 bits long rather than 16 bits.
o Authentication Header. The authentication header provides a mechanism for a source node to digitally sign packets. All data that follows an authentication header remains in plaintext and may be intercepted by attacker. Upon receipt by the destination node, however, the data can be authenticated with the data included in the authentication header. o Encrypted Security Payload. The ESP header makes it possible to encrypt the contents of a packet. The ESP header holds enough data to allow the recipient to decrypt the rest of the packet (all data following an ESP header is encrypted).
Destination Option Header. This option provides a mechanism, like the hop-by-hop options header, to deliver optional information along with IPv6 packets.
ANS 3)
Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, in May 2006 the project was renamed Wireshark due to trademark issues.
[3]
Wireshark is cross-platform, using the GTK+ widget toolkit to implement its user interface, and using pcap to capture packets; it runs on various Unix-like operating systems including Linux, Mac OS X, BSD, and Solaris, and on Microsoft Windows. There is also a terminalbased (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License. Wireshark allows the user to put the network interfaces that support promiscuous mode into that mode, in order to see all traffic visible on that interface, not just traffic addressed to one of the interface's configured addresses and broadcast/multicast traffic. However, when capturing with a packet analyzer in promiscuous mode on a port on a network switch, not all of the traffic traveling through the switch will necessarily be sent to the port on which the capture is being done, so capturing in promiscuous mode will not necessarily be sufficient to see all traffic on the network. Port mirroring or various network taps extend capture to any point on net; simple passive taps are extremely resistant to malware tampering. On Linux, BSD, and Mac OS X, with libpcap 1.0.0 or later, Wireshark 1.4 and later can also put WiFi adapters into monitor mode.
ANS 5)
Router A device that determines where to send a data packet between at least two networks. Its decision is based on its current understanding of the networks. A router maintains a table of the available routes and their conditions. It uses this table together with distance and cost algorithms to determine the best route for a given data packet. Data packets often travel through a number of networks and routers before arriving at their destination.ex-CISCO routers Switch A device that directs data packets along a path. It may include the function of a router. In general, a switch is a simpler and faster mechanism than a router as it does not maintain knowledge of the networks. A switch is not always required in a network. Many LANs are organised so that the nodes inspect each data packet.ex- netgear switches Hub A hub is a central connecting device in a network. Data arrives at the hub from one or more devices and is forwarded out using just one cable. For example, four cables from three computers and a printer are connected to a hub and then a single cable connects the hub to a server. A hub can also include a router. Most hubs were originally passive. The data simply passed through the hub without any change.ex-Verizon Hub Gateway A combination of hardware and software to link two different types of networks. This usually involves converting different protocols. For example, a gateway could be used to convert a TCP/IP packet to a NetWare IPX packet.ex-Citrix
Bridge A combination of hardware and software to link two similar networks. It often connects LANs that use the same protocol, such as Ethernet. A bridge examines each data packet on a LAN and forwards any data packets addressed to a connected LAN. Bridges are faster than routers because they connect networks that are using the same protocol.ex-Linksys WET54G Wireless
Ethernet Bridge.