Module 5, Assignment 4-1

Susan
Ferdon,
EDTECH
552
SP11
Module 5, Assignment 4-1
4.1 Multiple Choice Questions:
1. Which transport layer protocol provides connection-oriented, reliable transport?
A. TFTP
B. UDP
C. Ethernet
D. TCP
E. Secure Shell
2. Which of the following are application layer protocols? Choose all that apply.
A. Ethernet
B. CDP
C. FTP
D. TFTP
E. Telnet
F. ARP
G. ICMP
H. ATM
3. Match the protocol with its port number:
A. FTP
20 (default data), 21 (control)
B. Telnet
23
C. TFTP (Trivial File Transfer)
69
D. DNS (domain Name Server)
53
E. SNMP (Simple Network Management Protocol)
161
F. SMTP (Simple Mail Transfer Protocol)
25
G. NTP (Network Time Protocol)
123
H. POP3 (Post Office Protocol)
110
I. http
80
4. Which protocols use TCP? Choose all that apply.
A. DNS
B. SNMP (UPD)
C. SMTP
D. FTP
E. TFTP (UPD)
F. POP3
5. Which port numbers are used by well-known protocols that use connectionless
transport?
A. 25
B. 53 (UDP and TCP)
C. 20
D. 69
Susan
Ferdon,
EDTECH
552
SP11
E. 161
F. 110
6. Which are elements of PAR? Choose all that apply.
A. Devices that collide must wait to retransmit.
B. The source device starts a timer for each segment and will retransmit
that segment if an
acknowledgment is not received before the timer expires.
C. Devices will broadcast for the hardware address of the receiver.
D. Source devices keep a record of all segments sent and expect an
acknowledgment for each one.
E. The receiving device will drop frames that it cannot buffer.
F. The receiving device will acknowledge receipt of a segment by sending
an acknowledgment indicating the next segment it expects.
7. Which layer of the TCP/IP model is responsible for interhost data movement, using
either connection-oriented or connectionless protocols?
A. Network
B. Internet
C. Transport
D. Network interface
E. Application
8. You notice an excessive number of pings on your network. What type of attack might
someone be doing on your network?
A. Reconnaissance attack
B. Denial of service attack
C. Access attack
D. Social engineering attack
9. What type of device is used to listen to all traffic on your network and automatically
configure your firewall or router to block an attack when it is matched against a
signature?
A. MARS
B. NAC
C. IPS
D. Anomaly Guard
10. Which of the following is a way to protect the confidentiality of your data?
A. Make a hash of each packet that can be verified when the packet is received.
B. Encrypt the payload of each packet.
C. Use rate limiting to prevent an excessive number of packets.
D. Install the latest patches to protect against worms and viruses.
Susan
Ferdon,
EDTECH
552
SP11
4.2 Identifying Collision and Broadcast Domains
**Please post your circled pictures on the bulletin board with explanation. **
Q 4.2.1
Number of Collision Domains: 16 (solid line)
Number of Broadcast Domains: 5 (dashed line)
Explanation:
From Networking Basics CCNA1 Companion Guide, page 328
Highest
Layer at
Device
Which it
Operates
Repeater 1
Hub
1
Bridge
2
Switch
2
Router
3
Separates LAN into Multiple
Collision Domains on Each
Interface
No
No
Yes
Yes
Yes
Separates LAN into
Multiple Broadcast
Domains on Each
Interface
No
No
No
No
Yes
This means that each connection to a router is a separate broadcast domain
(there are five). There are no repeaters, hubs or bridges. Each connection from
a switch is a collision domain (there are 16).
Susan
Ferdon,
EDTECH
552
SP11
**Please post your circled pictures on the bulletin board with explanation. **
Q 4.2.2:
Number of Collision Domains: 7 (solid line)
Number of Broadcast Domains: 3 (dashed line)
Explanation:
See table, above, from Networking Basics CCNA1 Companion Guide, page 328
Each connection to a router creates a separate broadcast domain - there are
three. Routers also create collision domains – there are three. Bridges and
switches separate collision domains – there are two connections to the bridge
(one of which is the collision domain created by the router) and four connections
to the switch. Hubs do not separate collision domains. That means that the
connections to the hubs are within collision domains created by the routers.
Susan
Ferdon,
EDTECH
552
SP11
Module 5, Assignment 4-2
4.3 Building a Switch-based Network
Objective
 Create a simple network with four PCs using
a switch
 Configure workstation IP address information
 Test connectivity using the ping command
 Observe how switches learn MAC addresses
Step 3 Configure TCP/IP settings for the four PCs
Set the IP address information for each PC according to the information in the
table.
b. Note that the default gateway IP address is not required, since these computers
are directly connected. The default gateway is only required on local area
networks that are connected to a router.
a.
Computer
IP Address
Subnet mask
Default Gateway
Fred
192.168.1.1
255.255.255.0
Not Required
Barney
192.168.1.2
255.255.255.0
Not Required
Wilma
192.168.1.3
255.255.255.0
Not Required
Betty
192.168.1.4
255.255.255.0
Not Required
Step 8 Observe how a switch learn MAC addresses
Q 4.3.1: Please briefly describe data flows of the ping event and compare them with the
content on the textbook (p. 177-180).
Ping traveled from Barney to the switch. When the ping arrived, the switch learned
Barney’s MAC address. The switch did not have Fred in the MAC Table, so the switch
flooded the other ports (Betty, Wilma, Fred). Wilma and Betty were not the intended
recipient so they were marked “X” in packet tracer and the frame was discarded. Fred
was the correct recipient so a return ping went back to Barney, via the switch. With Fred
as the source, the switch was able to learn Fred’s MAC address. The return ping, from
Fred, arrived at device Barney successfully.
Compare this ping event to the content of the textbook (p. 177-180):
Susan
Ferdon,
EDTECH
552
SP11
 Both events began with an empty MAC Table.
 As mentioned on page 177, if a frame enters the switch and the source MAC
address is not in the MAC address table, the switch creates an entry. This is what
happened when Barney’s ping arrived at the switch – the switch added Barney to
the MAC Table.
 In the book, there is no address in the MAC Table, so the switch floods the ports.
The same happened in our example.
 In the example on page 178, the next MAC address is added after frame 2. The
same thing happens when Fred pings back – Fred’s MAC address is added to the
Table when it pinged back Barney.
 The book discussed Spanning Tree Protocol (STP). There is no evidence of STP
in the packet tracer simulation. All end-devices are operating as expected –
powered on and responding - and there are no loop-backs.
My screen capture video of this process may be viewed at:
http://www.youtube.com/watch?v=m92vQiUD2wM
Step 9 Please save your packet tracer file and submit it with this week’s lab
activities
Lab 4.4 Collision and Broadcast Domains
The purpose of this lab is to observe how several small domains reduce the negative
effects of a large collision domain.
Objective
 Use Packet Tracer to observe the function differences between switch and hub
Step1
 Download NA01-0815.pkt
(http://edtech2.boisestate.edu/hungj/edtech552/spring2011/lab/lab4/2011/NA01-0815.zip)
 Unzip and open it in the packet tracer.
Step 2 Switch to the simulation mode
Step 3 Enable switch MAC address table
Step 4 Enable PDU list window and ARP & ICMP events
Step 5 Send the following simple PDU events
 Ping Fred –> Wilma
 Ping Wilma -> Barney
 Ping Fred -> Barney
 Ping Wilma -> Barney
 Ping Betty -> Wilma
Susan
Ferdon,
EDTECH
552
SP11
Question 4.4.1: Briefly describe how the hub processes the frames.
The hub sends all received frames out every port, every time. For example, when Fred
pinged Wilma, the frame went into the hub and then back out all three ports – Fred,
Barney and the switch. Because the hub isn’t “smart” it sends frames places that it
doesn’t need to go – end-user devices then discard frames not meant for them.
Question 4.4.2: Briefly describe how the switch processes the frames.
If the MAC address is in the MAC Table, the switch will send the frame only to that
device. If the MAC address in not in the MAC Table, the switch will flood all ports except
the one the frame was received on. Devices that are not the destination for the frame will
discard the frame (“X” appears in packet tracer). The device that is the destination MAC
address will send back an acknowledgement and, since it is the source for this
transmission, the switch will learn that MAC address, adding it to the MAC Table for the
switch.
Question 4.4.3: What is the difference between Question 4.4.1 and Question 4.4.2 in
collision?
There are more collisions in the domain that includes a hub. Since every frame goes to
every device, there is more traffic on the hub and frames go everywhere – more chance
of collisions. Frames that go to the switch are forwarded only to the recipient, unless the
MAC address has not been encountered. This LAN has three collision domains: 1) Fred,
Barney, the hub, and the cable to Fa2/1, 2) Wilma and the cable to switch port Fa0/1,
and 3) Betty and the cable to switch port Fa1/1. Collision domains for the switch have
fewer end-user devices so fewer opportunities for collisions to occur. The collision
domain that includes the hub has more devices, more forwarding of frames, and more
potential collisions.
4.5 Network Security
Q 4.5.1: Please describe your strategies to prevent security threats below:
To help prevent security threats, I would put precautions into place that would protect the
network from external attacks and, when possible, from internal attacks.
Part 1: LAN Design Considerations
In designing the LAN, segmenting the network would not only make it run more efficiently,
by reducing collisions/errors and maximizing bandwidth, but will also allow sensitive data
to be well protected. With firewalls blocking access to sensitive data (i.e. financial data,
private company information) only those with permissions would have easy access to
that information via password protected VLANs. Setting up VLANS would allow
departments, and others with similar needs, to be grouped together and security settings
put into place to match group needs.
Susan
Ferdon,
EDTECH
552
SP11
Part 2: IPS
Installation of an Intrusion Protection System (IPS) will allow network traffic to be
analyzed and compared to known attack signatures and perceived threats will be
reported and acted upon. Should an attack occur, quick action will lessen the impact,
and having devices react immediately is more efficient than waiting for a network
engineer or administrator to take action.
Part 3: Anti-x software
Software is available that guards against specific attacks. Anti-virus software will guard
against malware, worms, and other types of attacks on hardware, software, and
processing ability. Routine system scans and scanning of devices (external drives,
cameras, etc.) that are attached are good safeguards. Making sure that all anti-x
software is up-to-date means that the most current threats can be guarded against. PopUp blockers are another good tool for avoiding dangerous situations.
 Scanner – Use firewalls. Look for TCP control flags that are set in abnormal
ways – that can signal an attack in progress.
 Spyware – Anti-virus software, install updates and patches, read EULA – End
User License Agreements. Most people just click to close those annoying
windows, but by clicking, you may be agreeing to having spyware installed on
your computer. Products like AdAware will scan and remove spyware from your
computer.
 Worm – Anti-virus software, scan attachments/downloads.
 Keystroke logger – There are software programs (Spycop and SnoopFree
Software) designed to detect keystroke loggers. There are also hardware
keystroke loggers and software can’t detect those. Users should make sure they
lock computers when they are away and should not surf the Internet using a
computer that has administrative rights as there is too much potential for lost info.
It is also recommended that you avoid using public hotspots.
 Phishing – Educating users is the best defense against phishing. Network users
should be aware that they should never give out sensitive information (passwords,
personally identifiable info like SS#), and should be wary of any requests they get
for personal information. Anti-spyware typically includes anti-phishing.
 Malware – As above, including block pop-ups. Automatic software updates will
reduce the risk of malware. Use strong passwords and be cautious of free offers,
unexpected windows, or warnings. Be especially cautious of e-mail attachments
or clicking links in e-mails or IM posts.
Part 4: Internal Threats
Dangers to the network can enter through laptop computers, USB drives and other
devices that operate both inside and outside the network. Setting up connections so that
all devices must undergo a complete scan before connecting to the network is one way
to ensure that malicious content doesn’t make it onto the network. Setting up the
intranet so that only anti-virus protected computers may connect will improve security.
The most difficult type of threat to guard against is one that is willingly perpetrated by an
Susan
Ferdon,
EDTECH
552
SP11
employee. With permissions, employees can gain access to sensitive information and
take it or damage it as they bypass security measures that are in place.