Cisco Assignment
Cisco Assignment
Table of Content
Introduction…………………………………………………………………….. 3
The architecture of Transmission Control Protocol…………………………......5
Working principle of TCP………………………………………………............ 6
Hierarchical Design concept and enterprise network components. …………... 9
Demonstration of capturing TCP packets using Wireshark. …………………. 13
Discuss the IPv4 address sub-netting and provide calculation including addressing table
………………………………………………………………………………… 15
Reference ………………………………………………………………………42
2
Introduction
Transport Protocol Layer is that the layer responsible for the communication sessions
that being establish in those application and provide data for those. There are UDP
and TCP protocol that widely use for the protocols through the Internet. The packet
will be sent to IP address wherever a packet is sent over those protocols. Those
packets are all the same way that process from computer to router therefore to the
destination.
TCP UDP
Connection Oriented Protocol Connectionless Protocol
Used for make message sent from computer to Used for transport message but not Connection
computer and it’s Connection based based
Recommend Used for high reliability, less Recommend Used for fast efficient and
transmission time application for the example transmission application for the example the
Microsoft mobile application game
Protocols that being used in HTTP, FTP, Protocols that being used in DHCP, DNS,
SMTP TFTP
Rearrange the order of the data packet No specific order is needed for the data packet
Slower speed Faster Speed
The transfer of data should always be the same The transfer of data have no guarantee for
order while sent and reach the destination same order all the time
Regularly, the TCP set is named stateless, which implies that every customer demand is
viewed as new on the grounds that it is free of the past request. Stateless individuals can
free up system ways so they can be utilized persistently.
In any case, the transport layer is stateful. It sends a message individually and its
association continues as before until all have been reassembled when it’s till the
destination.
The TCP work is separated into four layers; Each layer consists of a particular protocol.
3
Application Layer
Transport Layer
The transport layer is in charge of keeping up end to end correspondence over the
network. TCP handles correspondence among hosts and supply flow control,
multiplexing, and unwavering quality and the last but not the least is the reliability of the
TCP. Transport conventions incorporate TCP and User Datagram Protocol - UDP, once
in a while utilized instead of TCP for extraordinary purposes.
Internet layer
Internet layer is practically like the OSI network layer. It characterizes the protocol in charge
of the logical exchange of information crosswise over the network. The principle of protocol
that dwell on this layer are IP - which is in charge of exchanging packet from the source to
the end have by taking a gander at the IP address in the bundle header. There are 2 variants of
IP that is IPv4 and IPv6. IPv4 is at present utilized by generally sites. Be that as it may, IPv6
is developing in light of the fact that the quantity of IPv4 addresses is restricted contrasted
with the quantity of clients. ICMP is that the representative of Internet Control Message
Protocol. It is embodied in an IP datagram and is in charge of furnishing the host with data
4
about network issues. ARP is the represents of Address Resolution Protocol. There are a few
sorts of ARP: turn around ARP, intermediary ARP, free ARP, and invert ARP.
The network access layer forms packet and associates with discrete systems to transport
packet crosswise over network limits. The network layer protocol is the IP and Internet
Control Message Protocol - ICMP for blunder detailing.
For the ARP that as the protocol of the internet layer that conflict with the declaration
that the protocol of internet layer or isn’t the network layer. It’s the lowest level of TCP
protocol that carried out include encapsulation of packets, mapping IP and physical
transmission of the data.
Keep in mind that the association of TCP headers and TCP in a packet. The header estimate
without choices is 20 bytes.
A 16-bit that distinguishes the application to which the TCP portion is sent on the getting
host. The destination port use similar port number as the one held for the source port.
A 32-bit that recognizes the present area of the main information byte in the whole byte
stream fragment of a TCP association
A 32-bit that recognizes the following information byte that the sender needs to get from the
recipient. Thusly, the number will be one more prominent than the most as of late gotten
information byte. This field is possibly utilized when the ACK control bit is turned on.
1.2.5 title length
A 4-bit that indicates the all-out TCP header length. On the off chance that there is no choice,
the length of the TCP header is dependably 20 bytes. The biggest TCP header can be 60
bytes. This field is required in light of the fact that the span of the alternative field can't be
resolved ahead of time.
5
1.2.6 Reserved
The right now unused 6-bit field is saved for some time later.
On the off chance that this bit field is set, the accepting TCP ought to translate the urgent
pointer field.
1.2.8 window
A 16-bit whole number utilized by TCP for stream control as an information exchange
window estimate. This number tells the sender how much information the beneficiary is
happy to acknowledge. The most extreme estimation of this field confines the window size to
65,535 bytes
1.2.9 checksum
The TCP sender figures this esteem dependent on the substance of the TCP header and
information fields. This 16-bit will be contrasted with the esteem produced by the recipient
utilizing a similar count. In the event that the qualities match, the beneficiary can be
extremely sure that the fragment is finished.
At times, the TCP sender may need to inform the beneficiary of the pressing information that
ought to be handled by the getting application as quickly as time permits. The 16-bit tell
when the last byte of urgent information in the beneficiary fragment closes.
To meet your clients' endeavour, organize structure business and innovation objectives, you
may need to prescribe a system topology comprising of many interrelated parts.
Network design specialists have built up a layered system configuration model to enable you
to create topologies in discrete layers. Each layer can concentrate on explicit highlights,
enabling you to pick the correct framework and highlights for your layer. For instance, a
rapid WAN switch can transmit traffic on an endeavour WAN spine organize, a medium-
speed switch can interface with structures in every grounds, and a switch can associate client
gadgets and servers inside a structure.
Typical hierarchical topology is that the core layers of top of the line switches and switches
are improved for accessibility and execution. The distribution layer of switches and switches
6
that actualize arrangements. Interface the client's entrance layer through the low-end switch
and the remote passageway.
7
Enterprise network components support for the local user and system that the main region of
this capability is that for the example that the access layer is that give those client and worker
access to network, for the distribution layer is that give the connectivity and control based on
the policy and the boundary in the between of core layer and also the access layer and the
communicate area control, since switches or multilayer switches don't advance
communicates. The gadget goes about as the outline point between communicate areas. The
last but not the least is that the core layer that provide a certain and special that having the
faster speed of transportation in between of those switches in the distribution in the
enterprise. Scaling by utilizing quicker, and not more, gear and staying away from CPU-
serious parcel control brought about by security, investigation, nature of administration
arrangement, or different procedures
8
Demonstration of capturing TCP packets using Wireshark.
You’ll see the packets start to appear in real time. Wireshark capture each packet sent or from
your system then click capture > options and verify the enable promiscuous mode on all
interface and checkbox is activated at the bottom of this window.
Click the red Stop button at top left window to stop capturing the traffic. You can click on the
Analyse > Display Filters to choose a filter from among the default filter in the Wireshark
then create filters from there and there are few of the filter is used right here that is DNS and
TCP
It’s well- known port numbers that the number in between 0 to 1024 these port numbers are
overseen by IANA and are held for the most flexible TCP/IP applications. IANA just
allocates these port numbers to conventions that have been institutionalized utilizing TCP/IP
RFC techniques, which are being institutionalized or might be institutionalized later on.
On most PCs, these port numbers are utilized just by server forms running by framework
executives or special clients. These typically compare to forms that execute basic IP
applications, for example, web servers, FTP servers, etc. Thusly, these are once in a while
alluded to as framework port numbers.
9
Step 1 of Three-Way Handshake
10
Ipv4: 172.18.179.114
Google.com web browser IP address 157.55.135.128
Physical address: 30-5A-3A-B9-2C-25
Step 2
11
Step 3
Step 4
12
Given the semantics of SYN and ACK it should be possible to send SYN+ACK in different
packets and those delay the handshake. Client sends a SYN, server replies with an ACK to
acknowledge the wish of the client for a new connection, but it does not grant the wish yet.
Later the server sends a SYN and gets the matching ACK back from the client and the
connection is established. But I doubt that anybody does connection establishment this way
and it might be, that some OS will croak on it. But, there is another scenario for a four-way-
handshake, however with a different ordering of the packets.
Discuss the IPv4 address sub-netting and provide calculation including addressing table
Table of Calculation
13
Default
Device Interface IP Address Subnet Mask Gateway
RouterBoss Serial 0/2/0 172.28.6.254 255.255.255.0 N/A
Serial 0/2/1 172.28.7.254 255.255.255.0 N/A
Serial 0/3/0 172.28.8.254 255.255.255.0 N/A
Router 1 Serial 0/3/0 172.28.6.1 255.255.255.0 N/A
Serial 0/3/0 172.28.0.1 255.255.255.0 N/A
Serial 0/3/0 172.28.1.1 255.255.255.0 N/A
Switch0 VLAN 1 172.28.0.2 255.255.255.0 172.28.6.254
PC0 NIC 172.28.0.253 255.255.255.0 172.28.6.254
PC1 NIC 172.28.0.254 255.255.255.0 172.28.6.254
Switch1 VLAN 1 172.28.1.2 255.255.255.0 172.28.6.254
PC2 NIC 172.28.1.253 255.255.255.0 172.28.6.254
PC3 NIC 172.28.1.254 255.255.255.0 172.28.6.254
Router 2 G0/0 172.28.7.1 255.255.255.0 N/A
G0/1 172.28.2.1 255.255.255.0 N/A
G0/2 172.28.3.1 255.255.255.0 N/A
Switch2 VLAN 1 172.28.2.2 255.255.255.0 172.28.7.254
PC4 NIC 172.28.2.253 255.255.255.0 172.28.7.254
PC5 NIC 172.28.2.254 255.255.255.0 172.28.7.254
Switch3 VLAN 1 172.28.3.2 255.255.255.0 172.28.7.254
PC6 NIC 172.28.3.253 255.255.255.0 172.28.7.254
PC7 NIC 172.28.3.254 255.255.255.0 172.28.7.254
Router 3 G0/0 172.28.8.1 255.255.255.0 N/A
G0/1 172.28.4.1 255.255.255.0 N/A
G0/2 172.28.5.1 255.255.255.0 N/A
Switch4 VLAN 1 172.28.4.2 255.255.255.0 172.28.8.254
PC8 NIC 172.28.4.253 255.255.255.0 172.28.8.254
PC9 NIC 172.28.4.254 255.255.255.0 172.28.8.254
Switch5 VLAN 1 172.28.5.2 255.255.255.0 172.28.8.254
PC10 NIC 172.28.5.253 255.255.255.0 172.28.8.254
PC11 NIC 172.28.5.254 255.255.255.0 172.28.8.254
Topology design with complete Detail and Demostration of topology using Packet Tracer
Simulation
14
PC 3
Router 2
15
Router 3
Switch1#show running-config
Building configuration...
version 12.2
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Switch1
interface FastEthernet0/1
interface FastEthernet0/2
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
16
interface FastEthernet0/11
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface GigabitEthernet0/1
interface GigabitEthernet0/2
interface Vlan1
ip address 172.28.1.2 255.255.255.0
ip default-gateway 172.28.6.254
line con 0
line vty 0 4
login
line vty 5 15
login
end
17
FastEthernet0/4 unassigned YES manual down down
FastEthernet0/5 unassigned YES manual down down
FastEthernet0/6 unassigned YES manual down down
FastEthernet0/7 unassigned YES manual down down
FastEthernet0/8 unassigned YES manual down down
FastEthernet0/9 unassigned YES manual down down
FastEthernet0/10 unassigned YES manual down down
FastEthernet0/11 unassigned YES manual down down
FastEthernet0/12 unassigned YES manual down down
FastEthernet0/13 unassigned YES manual down down
FastEthernet0/14 unassigned YES manual down down
FastEthernet0/15 unassigned YES manual down down
FastEthernet0/16 unassigned YES manual down down
FastEthernet0/17 unassigned YES manual down down
FastEthernet0/18 unassigned YES manual down down
FastEthernet0/19 unassigned YES manual down down
FastEthernet0/20 unassigned YES manual down down
FastEthernet0/21 unassigned YES manual down down
FastEthernet0/22 unassigned YES manual down down
FastEthernet0/23 unassigned YES manual down down
FastEthernet0/24 unassigned YES manual down down
GigabitEthernet0/1 unassigned YES manual up up
GigabitEthernet0/2 unassigned YES manual down down
Vlan1 172.28.1.2 YES manual up up
Router3#show running-config
Building configuration...
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname Router3
ip cef
no ipv6 cef
interface GigabitEthernet0/0
no ip address
18
duplex auto
speed auto
interface GigabitEthernet0/1
ip address 172.28.4.1 255.255.255.0
duplex auto
speed auto
interface GigabitEthernet0/2
ip address 172.28.5.1 255.255.255.0
duplex auto
speed auto
interface Serial0/3/0
ip address 172.28.8.1 255.255.255.0
interface Serial0/3/1
no ip address
clock rate 2000000
interface Vlan1
no ip address
shutdown
router rip
network 172.28.0.0
ip classless
ip flow-export version 9
line con 0
line aux 0
line vty 0 4
login
end
Router3#show ip in
Router3#show ip interface b
Router3#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 unassigned YES manual up down
GigabitEthernet0/1 172.28.4.1 YES NVRAM up up
GigabitEthernet0/2 172.28.5.1 YES NVRAM up up
Serial0/3/0 172.28.8.1 YES manual up up
Serial0/3/1 unassigned YES unset down down
Vlan1 unassigned YES NVRAM administratively down down
19
RouterBoss#show running-config
Building configuration...
version 15.1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
hostname RouterBoss
ip cef
no ipv6 cef
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
interface Serial0/2/0
ip address 172.28.6.254 255.255.255.0
clock rate 2000000
interface Serial0/2/1
ip address 172.28.7.254 255.255.255.0
interface Serial0/3/0
ip address 172.28.8.254 255.255.255.0
clock rate 2000000
interface Serial0/3/1
no ip address
clock rate 2000000
20
interface Vlan1
no ip address
shutdown
router rip
network 172.28.0.0
ip classless
ip flow-export version 9
line con 0
line aux 0
line vty 0 4
login
end
RouterBoss#show ip i
RouterBoss#show ip interface b
RouterBoss#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0 unassigned YES NVRAM up down
GigabitEthernet0/1 unassigned YES NVRAM up down
GigabitEthernet0/2 unassigned YES NVRAM up down
Serial0/2/0 172.28.6.254 YES manual up up
Serial0/2/1 172.28.7.254 YES manual up up
Serial0/3/0 172.28.8.254 YES manual up up
Serial0/3/1 unassigned YES NVRAM up up
Vlan1 unassigned YES NVRAM administratively down down
References
5, P. J. (n.d.). Differences between TCP and UDP. Retrieved from GeeksforGeeks:
https://www.geeksforgeeks.org/differences-between-tcp-and-udp/
Academy, C. N. (2014, May 9). Cisco Networking Academy Connecting Networks
Companion Guide: Hierarchical Network Design. Retrieved from CiscoPress:
http://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4
21
Antoniou, S. (n.d.). Simplify Routing with Subnetting: How to Organize Your Network Into
Smaller Subnets. Retrieved from Pluralsight: https://www.pluralsight.com/blog/it-
ops/simplify-routing-how-to-organize-your-network-into-smaller-subnets
Hierarchical Network Design - Access Layer of the Hierarchical Network Design Model.
(2009, May 20). Retrieved from Edraw: https://www.edrawsoft.com/Hierarchical-
Network-Design.php
HoffMan, C. (2017, July 3). What’s the Difference Between TCP and UDP? Retrieved from
how-to Geek: https://www.howtogeek.com/190014/htg-explains-what-is-the-
difference-between-tcp-and-udp/
Orgera, S. (2018, December 12). How to Use Wireshark: A Complete Tutorial. Retrieved
from LifeWire: https://www.lifewire.com/wireshark-tutorial-4143298
Rouse, M. (2019, Feb). TCP/IP (Transmission Control Protocol/Internet Protocol). Retrieved
from SearchNetworking: https://searchnetworking.techtarget.com/definition/TCP-IP
Sanchez, R. (2015, November 17). What is TCP/IP and How Does It Make the Internet
Work? Retrieved from Hosting Advice: https://www.hostingadvice.com/blog/tcpip-
make-internet-work/
Stallings, W. (2001, Nov 30). TCP/IP Architecture and Operation. Retrieved from InformIT:
http://www.informit.com/articles/article.aspx?p=24258
Technology, I. J. (2010, September). An Approach to Topology Design and Routing of
Computer Networks. Retrieved from SSRN: https://papers.ssrn.com/sol3/papers.cfm?
abstract_id=1706502
22