Sei sulla pagina 1di 22

1

Table of Content
Introduction…………………………………………………………………….. 3
The architecture of Transmission Control Protocol…………………………......5
Working principle of TCP………………………………………………............ 6
Hierarchical Design concept and enterprise network components. …………... 9
Demonstration of capturing TCP packets using Wireshark. …………………. 13
Discuss the IPv4 address sub-netting and provide calculation including addressing table
………………………………………………………………………………… 15
Reference ………………………………………………………………………42

2
Introduction

Transport Protocol Layer is that the layer responsible for the communication sessions
that being establish in those application and provide data for those. There are UDP
and TCP protocol that widely use for the protocols through the Internet. The packet
will be sent to IP address wherever a packet is sent over those protocols. Those
packets are all the same way that process from computer to router therefore to the
destination.

TCP UDP
Connection Oriented Protocol Connectionless Protocol
Used for make message sent from computer to Used for transport message but not Connection
computer and it’s Connection based based

Recommend Used for high reliability, less Recommend Used for fast efficient and
transmission time application for the example transmission application for the example the
Microsoft mobile application game

Protocols that being used in HTTP, FTP, Protocols that being used in DHCP, DNS,
SMTP TFTP
Rearrange the order of the data packet No specific order is needed for the data packet
Slower speed Faster Speed
The transfer of data should always be the same The transfer of data have no guarantee for
order while sent and reach the destination same order all the time

20 byte size 8 byte size

The architecture of Transmission Control Protocol

TCP utilizes a customer/server correspondence display in which a client is served by the


computer that other from this through the network connection.

Regularly, the TCP set is named stateless, which implies that every customer demand is
viewed as new on the grounds that it is free of the past request. Stateless individuals can
free up system ways so they can be utilized persistently.

In any case, the transport layer is stateful. It sends a message individually and its
association continues as before until all have been reassembled when it’s till the
destination.

TCP model layer

The TCP work is separated into four layers; Each layer consists of a particular protocol.

3
Application Layer

The application layer supply information exchange to applications. protocol incorporate


hypertext transfer protocol - HTTP, file transfer protocol - FTP, post office protocol3 -
POP3, simple mail transfer protocol - SMTP, and simple network management protocol
- SNMP.

Transport Layer

The transport layer is in charge of keeping up end to end correspondence over the
network. TCP handles correspondence among hosts and supply flow control,
multiplexing, and unwavering quality and the last but not the least is the reliability of the
TCP. Transport conventions incorporate TCP and User Datagram Protocol - UDP, once
in a while utilized instead of TCP for extraordinary purposes.

Internet layer

Internet layer is practically like the OSI network layer. It characterizes the protocol in charge
of the logical exchange of information crosswise over the network. The principle of protocol
that dwell on this layer are IP - which is in charge of exchanging packet from the source to
the end have by taking a gander at the IP address in the bundle header. There are 2 variants of
IP that is IPv4 and IPv6. IPv4 is at present utilized by generally sites. Be that as it may, IPv6
is developing in light of the fact that the quantity of IPv4 addresses is restricted contrasted
with the quantity of clients. ICMP is that the representative of Internet Control Message
Protocol. It is embodied in an IP datagram and is in charge of furnishing the host with data

4
about network issues. ARP is the represents of Address Resolution Protocol. There are a few
sorts of ARP: turn around ARP, intermediary ARP, free ARP, and invert ARP.

Network Access Layer

The network access layer forms packet and associates with discrete systems to transport
packet crosswise over network limits. The network layer protocol is the IP and Internet
Control Message Protocol - ICMP for blunder detailing.

For the ARP that as the protocol of the internet layer that conflict with the declaration
that the protocol of internet layer or isn’t the network layer. It’s the lowest level of TCP
protocol that carried out include encapsulation of packets, mapping IP and physical
transmission of the data.

Working principle of TCP

Keep in mind that the association of TCP headers and TCP in a packet. The header estimate
without choices is 20 bytes.

1.2.1 Source port


A 16-bit that recognizes the TCP portion sent to host from the application. The port number
is separated into three territories, well know ports, registered ports and dedicated ports. TCP
utilizes port task as an interface to the application layer. A couple of complete IP addresses in
addition to a couple of complete TCP ports characterize an all-inclusive one of a kind TCP
association.

1.2.2 destination port

A 16-bit that distinguishes the application to which the TCP portion is sent on the getting
host. The destination port use similar port number as the one held for the source port.

1.2.3 serial number

A 32-bit that recognizes the present area of the main information byte in the whole byte
stream fragment of a TCP association

1.2.4 Confirmation number

A 32-bit that recognizes the following information byte that the sender needs to get from the
recipient. Thusly, the number will be one more prominent than the most as of late gotten
information byte. This field is possibly utilized when the ACK control bit is turned on.
1.2.5 title length

A 4-bit that indicates the all-out TCP header length. On the off chance that there is no choice,
the length of the TCP header is dependably 20 bytes. The biggest TCP header can be 60
bytes. This field is required in light of the fact that the span of the alternative field can't be
resolved ahead of time.

5
1.2.6 Reserved

The right now unused 6-bit field is saved for some time later.

1.2.7 Control Bit

On the off chance that this bit field is set, the accepting TCP ought to translate the urgent
pointer field.

1.2.8 window

A 16-bit whole number utilized by TCP for stream control as an information exchange
window estimate. This number tells the sender how much information the beneficiary is
happy to acknowledge. The most extreme estimation of this field confines the window size to
65,535 bytes

1.2.9 checksum

The TCP sender figures this esteem dependent on the substance of the TCP header and
information fields. This 16-bit will be contrasted with the esteem produced by the recipient
utilizing a similar count. In the event that the qualities match, the beneficiary can be
extremely sure that the fragment is finished.

1.2.10 emergency pointer

At times, the TCP sender may need to inform the beneficiary of the pressing information that
ought to be handled by the getting application as quickly as time permits. The 16-bit tell
when the last byte of urgent information in the beneficiary fragment closes.

Hierarchical Design concept and enterprise network components.

Layered Network Design


Access Layer of Layered Network Design Model

To meet your clients' endeavour, organize structure business and innovation objectives, you
may need to prescribe a system topology comprising of many interrelated parts.

Network design specialists have built up a layered system configuration model to enable you
to create topologies in discrete layers. Each layer can concentrate on explicit highlights,
enabling you to pick the correct framework and highlights for your layer. For instance, a
rapid WAN switch can transmit traffic on an endeavour WAN spine organize, a medium-
speed switch can interface with structures in every grounds, and a switch can associate client
gadgets and servers inside a structure.

Typical hierarchical topology is that the core layers of top of the line switches and switches
are improved for accessibility and execution. The distribution layer of switches and switches

6
that actualize arrangements. Interface the client's entrance layer through the low-end switch
and the remote passageway.

Access Layer, Distribution Layer and Core layer

Why a layered network design model is being utilize?


network that don't have any plans and don't focus are regularly created in an unstructured
organization by pointing out the issues brought about by exorbitant CPU nearness, the
weaknesses of the hairball topology. At the point when a system gadget speaks with
numerous different gadgets, the measure of work the CPU requires on the gadget can be
awkward. For instance, in a huge level system, broadcasting bundles is unwieldy. The
communicate parcel interferes with the CPU on every gadget in the communicate space and
requires preparing time on every gadget on which the communicate convention is introduced.
This incorporates switches, workstations and servers.

Notwithstanding communicated packet, another potential issue with non-various levelled


systems is that the switch speaks with numerous different switches and handles the CPU
remaining task at hand required for countless promotions. The layered network design
approach enables you to structure a particular topology to restrain the quantity of
correspondence switches.

7
Enterprise network components support for the local user and system that the main region of
this capability is that for the example that the access layer is that give those client and worker
access to network, for the distribution layer is that give the connectivity and control based on
the policy and the boundary in the between of core layer and also the access layer and the
communicate area control, since switches or multilayer switches don't advance
communicates. The gadget goes about as the outline point between communicate areas. The
last but not the least is that the core layer that provide a certain and special that having the
faster speed of transportation in between of those switches in the distribution in the
enterprise. Scaling by utilizing quicker, and not more, gear and staying away from CPU-
serious parcel control brought about by security, investigation, nature of administration
arrangement, or different procedures

Enterprise Network Design

8
Demonstration of capturing TCP packets using Wireshark.

You’ll see the packets start to appear in real time. Wireshark capture each packet sent or from
your system then click capture > options and verify the enable promiscuous mode on all
interface and checkbox is activated at the bottom of this window.

Click the red Stop button at top left window to stop capturing the traffic. You can click on the
Analyse > Display Filters to choose a filter from among the default filter in the Wireshark
then create filters from there and there are few of the filter is used right here that is DNS and
TCP

It’s well- known port numbers that the number in between 0 to 1024 these port numbers are
overseen by IANA and are held for the most flexible TCP/IP applications. IANA just
allocates these port numbers to conventions that have been institutionalized utilizing TCP/IP
RFC techniques, which are being institutionalized or might be institutionalized later on.

On most PCs, these port numbers are utilized just by server forms running by framework
executives or special clients. These typically compare to forms that execute basic IP
applications, for example, web servers, FTP servers, etc. Thusly, these are once in a while
alluded to as framework port numbers.

9
Step 1 of Three-Way Handshake

Step 2 of Three-Way Handshake

Step 3 of Three-Way Handshake

10
Ipv4: 172.18.179.114
Google.com web browser IP address 157.55.135.128
Physical address: 30-5A-3A-B9-2C-25

Four-way Hand Shake


Step1

Step 2

11
Step 3

Step 4

12
Given the semantics of SYN and ACK it should be possible to send SYN+ACK in different
packets and those delay the handshake. Client sends a SYN, server replies with an ACK to
acknowledge the wish of the client for a new connection, but it does not grant the wish yet.
Later the server sends a SYN and gets the matching ACK back from the client and the
connection is established. But I doubt that anybody does connection establishment this way
and it might be, that some OS will croak on it. But, there is another scenario for a four-way-
handshake, however with a different ordering of the packets.

Discuss the IPv4 address sub-netting and provide calculation including addressing table

Table of Calculation

13
Default
Device Interface IP Address Subnet Mask Gateway
RouterBoss Serial 0/2/0 172.28.6.254 255.255.255.0 N/A
  Serial 0/2/1 172.28.7.254 255.255.255.0 N/A
  Serial 0/3/0 172.28.8.254  255.255.255.0 N/A
Router 1 Serial 0/3/0 172.28.6.1 255.255.255.0 N/A
  Serial 0/3/0 172.28.0.1 255.255.255.0 N/A
  Serial 0/3/0 172.28.1.1 255.255.255.0 N/A
Switch0 VLAN 1 172.28.0.2 255.255.255.0 172.28.6.254
PC0 NIC 172.28.0.253 255.255.255.0 172.28.6.254
PC1 NIC 172.28.0.254 255.255.255.0 172.28.6.254
Switch1 VLAN 1 172.28.1.2 255.255.255.0 172.28.6.254
PC2 NIC 172.28.1.253 255.255.255.0 172.28.6.254
PC3 NIC 172.28.1.254 255.255.255.0 172.28.6.254
Router 2 G0/0 172.28.7.1 255.255.255.0 N/A
  G0/1 172.28.2.1 255.255.255.0 N/A
  G0/2 172.28.3.1 255.255.255.0 N/A
Switch2 VLAN 1 172.28.2.2 255.255.255.0 172.28.7.254
PC4 NIC 172.28.2.253 255.255.255.0 172.28.7.254
PC5 NIC 172.28.2.254 255.255.255.0 172.28.7.254
Switch3 VLAN 1 172.28.3.2 255.255.255.0 172.28.7.254
PC6 NIC 172.28.3.253 255.255.255.0 172.28.7.254
PC7 NIC 172.28.3.254 255.255.255.0 172.28.7.254
Router 3 G0/0 172.28.8.1 255.255.255.0 N/A
  G0/1 172.28.4.1 255.255.255.0 N/A
  G0/2 172.28.5.1 255.255.255.0 N/A
Switch4 VLAN 1 172.28.4.2 255.255.255.0 172.28.8.254
PC8 NIC 172.28.4.253 255.255.255.0 172.28.8.254
PC9 NIC 172.28.4.254 255.255.255.0 172.28.8.254
Switch5 VLAN 1 172.28.5.2 255.255.255.0 172.28.8.254
PC10 NIC 172.28.5.253 255.255.255.0 172.28.8.254
PC11 NIC 172.28.5.254 255.255.255.0 172.28.8.254

IPv4 address sub-netting

Topology design with complete Detail and Demostration of topology using Packet Tracer
Simulation

14
PC 3

Router 2

15
Router 3

Switch1#show running-config
Building configuration...

Current configuration : 1125 bytes

version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption

hostname Switch1

spanning-tree mode pvst


spanning-tree extend system-id

interface FastEthernet0/1

interface FastEthernet0/2

interface FastEthernet0/3

interface FastEthernet0/4

interface FastEthernet0/5

interface FastEthernet0/6

interface FastEthernet0/7

interface FastEthernet0/8

interface FastEthernet0/9

interface FastEthernet0/10

16
interface FastEthernet0/11

interface FastEthernet0/12

interface FastEthernet0/13

interface FastEthernet0/14

interface FastEthernet0/15

interface FastEthernet0/16

interface FastEthernet0/17

interface FastEthernet0/18

interface FastEthernet0/19

interface FastEthernet0/20

interface FastEthernet0/21

interface FastEthernet0/22

interface FastEthernet0/23

interface FastEthernet0/24

interface GigabitEthernet0/1

interface GigabitEthernet0/2

interface Vlan1
ip address 172.28.1.2 255.255.255.0

ip default-gateway 172.28.6.254

line con 0

line vty 0 4
login
line vty 5 15
login
end

Switch1#show ip interface brief


Interface IP-Address OK? Method Status Protocol
FastEthernet0/1 unassigned YES manual up up
FastEthernet0/2 unassigned YES manual up up
FastEthernet0/3 unassigned YES manual down down

17
FastEthernet0/4 unassigned YES manual down down
FastEthernet0/5 unassigned YES manual down down
FastEthernet0/6 unassigned YES manual down down
FastEthernet0/7 unassigned YES manual down down
FastEthernet0/8 unassigned YES manual down down
FastEthernet0/9 unassigned YES manual down down
FastEthernet0/10 unassigned YES manual down down
FastEthernet0/11 unassigned YES manual down down
FastEthernet0/12 unassigned YES manual down down
FastEthernet0/13 unassigned YES manual down down
FastEthernet0/14 unassigned YES manual down down
FastEthernet0/15 unassigned YES manual down down
FastEthernet0/16 unassigned YES manual down down
FastEthernet0/17 unassigned YES manual down down
FastEthernet0/18 unassigned YES manual down down
FastEthernet0/19 unassigned YES manual down down
FastEthernet0/20 unassigned YES manual down down
FastEthernet0/21 unassigned YES manual down down
FastEthernet0/22 unassigned YES manual down down
FastEthernet0/23 unassigned YES manual down down
FastEthernet0/24 unassigned YES manual down down
GigabitEthernet0/1 unassigned YES manual up up
GigabitEthernet0/2 unassigned YES manual down down
Vlan1 172.28.1.2 YES manual up up

Router3#show running-config
Building configuration...

Current configuration : 859 bytes

version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption

hostname Router3

ip cef
no ipv6 cef

license udi pid CISCO2911/K9 sn FTX1524521Z-

spanning-tree mode pvst

interface GigabitEthernet0/0
no ip address

18
duplex auto
speed auto

interface GigabitEthernet0/1
ip address 172.28.4.1 255.255.255.0
duplex auto
speed auto

interface GigabitEthernet0/2
ip address 172.28.5.1 255.255.255.0
duplex auto
speed auto

interface Serial0/3/0
ip address 172.28.8.1 255.255.255.0

interface Serial0/3/1
no ip address
clock rate 2000000

interface Vlan1
no ip address
shutdown

router rip
network 172.28.0.0

ip classless

ip flow-export version 9

line con 0

line aux 0

line vty 0 4
login

end

Router3#show ip in
Router3#show ip interface b
Router3#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 unassigned YES manual up down
GigabitEthernet0/1 172.28.4.1 YES NVRAM up up
GigabitEthernet0/2 172.28.5.1 YES NVRAM up up
Serial0/3/0 172.28.8.1 YES manual up up
Serial0/3/1 unassigned YES unset down down
Vlan1 unassigned YES NVRAM administratively down down

19
RouterBoss#show running-config
Building configuration...

Current configuration : 986 bytes

version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption

hostname RouterBoss

ip cef
no ipv6 cef

license udi pid CISCO2911/K9 sn FTX15243VRE-

spanning-tree mode pvst

interface GigabitEthernet0/0
no ip address
duplex auto
speed auto

interface GigabitEthernet0/1
no ip address
duplex auto
speed auto

interface GigabitEthernet0/2
no ip address
duplex auto
speed auto

interface Serial0/2/0
ip address 172.28.6.254 255.255.255.0
clock rate 2000000

interface Serial0/2/1
ip address 172.28.7.254 255.255.255.0

interface Serial0/3/0
ip address 172.28.8.254 255.255.255.0
clock rate 2000000

interface Serial0/3/1
no ip address
clock rate 2000000

20
interface Vlan1
no ip address
shutdown

router rip
network 172.28.0.0

ip classless

ip flow-export version 9

line con 0

line aux 0

line vty 0 4
login
end

RouterBoss#show ip i
RouterBoss#show ip interface b
RouterBoss#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 unassigned YES NVRAM up down
GigabitEthernet0/1 unassigned YES NVRAM up down
GigabitEthernet0/2 unassigned YES NVRAM up down
Serial0/2/0 172.28.6.254 YES manual up up
Serial0/2/1 172.28.7.254 YES manual up up
Serial0/3/0 172.28.8.254 YES manual up up
Serial0/3/1 unassigned YES NVRAM up up
Vlan1 unassigned YES NVRAM administratively down down

References
5, P. J. (n.d.). Differences between TCP and UDP. Retrieved from GeeksforGeeks:
https://www.geeksforgeeks.org/differences-between-tcp-and-udp/
Academy, C. N. (2014, May 9). Cisco Networking Academy Connecting Networks
Companion Guide: Hierarchical Network Design. Retrieved from CiscoPress:
http://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4

21
Antoniou, S. (n.d.). Simplify Routing with Subnetting: How to Organize Your Network Into
Smaller Subnets. Retrieved from Pluralsight: https://www.pluralsight.com/blog/it-
ops/simplify-routing-how-to-organize-your-network-into-smaller-subnets
Hierarchical Network Design - Access Layer of the Hierarchical Network Design Model.
(2009, May 20). Retrieved from Edraw: https://www.edrawsoft.com/Hierarchical-
Network-Design.php
HoffMan, C. (2017, July 3). What’s the Difference Between TCP and UDP? Retrieved from
how-to Geek: https://www.howtogeek.com/190014/htg-explains-what-is-the-
difference-between-tcp-and-udp/
Orgera, S. (2018, December 12). How to Use Wireshark: A Complete Tutorial. Retrieved
from LifeWire: https://www.lifewire.com/wireshark-tutorial-4143298
Rouse, M. (2019, Feb). TCP/IP (Transmission Control Protocol/Internet Protocol). Retrieved
from SearchNetworking: https://searchnetworking.techtarget.com/definition/TCP-IP
Sanchez, R. (2015, November 17). What is TCP/IP and How Does It Make the Internet
Work? Retrieved from Hosting Advice: https://www.hostingadvice.com/blog/tcpip-
make-internet-work/
Stallings, W. (2001, Nov 30). TCP/IP Architecture and Operation. Retrieved from InformIT:
http://www.informit.com/articles/article.aspx?p=24258
Technology, I. J. (2010, September). An Approach to Topology Design and Routing of
Computer Networks. Retrieved from SSRN: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=1706502

22

Potrebbero piacerti anche