Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cisco Assignment1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 46

1.

Introduction to Application Layer


The application layer is a layer in the Open Systems Interconnection (OSI) seven-
layer model and in the TCP/IP convention suite. It comprises of conventions that
emphasis on procedure to-process correspondence over an IP arrange and gives a firm
communication between interface and end-client services.

The application layer provides a lot of services, including:

 SMPT – Simple Mail Transfer Protocol


 POP – Post Office Protocol
 FTP – File Transfer Protocol
 DNS – Domain Name System
 SNMP – Simple Network Management Protocol
 CMOT – Common Management Information Protocol
 BOOTP – Bootstrap Protocol
 HTTP – Hypertext Transfer Protocol
 IMAP – Internet Message Access Protocol
 DHCP – Dynamic Host Configuration Protocol

The application layer gives full end-client access to an assortment of shared network
services for productive OSI model information stream. This layer has numerous
duties, including error dealing and recovery, information stream over a system and
full system stream. It is likewise used to create network-based applications.
2. Introduction to Simple Mail Transfer Protocol (SMTP)

The Simple Mail Transfer Protocol, otherwise called SMTP, is a protocol used to
transmit email messages over the web. The standard itself was first distributed in
1981, and it has been improved constantly to adjust to changes in innovation and
client needs. As a web standard for more than 35 years, SMTP has been embraced
generally as the protocol of decision for transmitting email starting with one email
server then onto the next.

The SMTP standard characterizes the discussion between the sender of an email and
the SMTP mail server that conveys the email. In a SMTP discussion, the sender gives
a specific grouping of directions to the getting SMTP server. By and large, if the
sender issues substantial directions, and the expected beneficiaries of the email are
legitimate records on the getting server, the accepting server will acknowledge the
message and endeavour to convey it. Obviously, by far most of email senders never
observe this discussion in real life, on the grounds that their email customers handle
these transactions off behind the scenes.

2.1. SMTP Terminology

 Internet Engineering Task Force (IETF) - A global organization that makes


principles for conveying data over the web. The protocols that make the World
Wide Web and email conceivable were made and advanced by the IETF.
 Mail client - An application used to make, send, and get email on a client's PC
or cell phone.
 Multipurpose Internet Mail Extensions (MIME) - A web standard
that grows the capacities of email sent by means of SMTP. The
first SMTP detail just supported unaccented Latin characters in
the body of the email, and didn't support non-text attachments.
The MIME standard considers non-Latin characters, non-text
attachments, and emails that contain different parts, (for
example, a plain content segment and a HTML segment).

 Open mail relay - A SMTP server that enables anybody on the web
to send email through it, without verifying, (for example, by giving
a client name or password). SMTP servers were initially all open
relays, yet spammers and different noxious clients before long
began to manhandle them. With not very many special cases, all
SMTP servers presently require a type of validation.

 SMTP Authentication - An expansion of the first SMTP convention


that gives techniques for email customers to authenticate when
interfacing with a SMTP server, for example, by giving a client
name and password. Utilizing SMTP Authentication avoids
unapproved clients, for example, spammers, from sending email
through a SMTP server.

 STARTTLS - An augmentation to plain message communication


protocols, (for example, SMTP) that gives strategies to
encrypting connections that utilization those protocols.
Encryption adequately anticipates data sent over these
connections from being caught by outsiders.

SMTP works essentially on three ports:

 Port 25 – default SMTP non-scrambled port.


 Port 2525 – it is opened for all Site Ground Servers in the event that port 25 is
separated and you have to send non-scrambled messages with SMTP.
 Port 465 – used to send messages utilizing SMTP safely.

2.2. SMTP Model

 End-to-end method

 Store-and- forward method

The end to end model is utilized to impart between various associations while the
store and forward technique are utilized inside an association. A SMTP customer who
needs to send the mail will contact the goal's host SMTP legitimately so as to send the
mail to the goal. The SMTP server will remain quiet about the mail until it is
effectively duplicated to the recipient's SMTP.
The customer SMTP is the one which starts the session let us call it as the customer
SMTP and the server SMTP is the one which reacts to the session ask for and let us
call it as beneficiary SMTP. The customer SMTP will begin the session and the
beneficiary SMTP will react to the solicitation.

2.3. Components of SMTP

To start with, we will break the SMTP customer and SMTP server into two
parts, for example, user agent (UA) and mail transfer agent (MTA). The user
agent (UA) read the message, makes the envelope and afterward places the
message in the envelope. The mail transfer agent (MTA) moves this mail over
the web.
SMTP permits a progressively unpredictable framework by including a
relaying system. Rather than simply having one MTA at sending side and one
at accepting side, more MTAs can be included, acting either as a customer or
server to transfer the email.

The transferring framework without TCP/IP convention can likewise be


utilized to send the messages to clients, and this is accomplished by the
utilization of the mail gateway. The mail gateway is a transfer MTA that can
be utilized to get an email.

2.4. Working of SMTP

 Composition of Mail - A client sends an email by creating an


electronic mail message utilizing a Mail User Agent (MUA). Mail
User Agent is a program which is utilized to send and get mail. The
message contains two sections: body and header. The body is the
principle part of the message while the header incorporates data, for
example, the sender and beneficiary location. The header additionally
incorporates distinct data, for example, the subject of the message. For
this situation, the message body resembles a letter and header
resembles an envelope that contains the beneficiary's location.

 Submission of Mail - In the wake of making an email, the mail


customer at that point presents the finished email to the SMTP server
by utilizing SMTP on TCP port 25.
 Delivery of Mail - Email addresses contain two sections: username of
the recipient and domain name. For instance, cisco123@hotmail.com,
where "cisco123" is the username of the recipient and "hotmail.com"
is the domain name. In the event that the domain name of the
beneficiary's email address is not quite the same as the sender's
domain name, at that point MSA will send the mail to the Mail
Transfer Agent (MTA). To hand-off the email, the MTA will discover
the objective domain. It checks the MX record from Domain Name
System to get the objective space. The MX record contains the
Domain name and IP address of the beneficiary's domain. When the
record is found, MTA associates with the trade server to hand-off the
message.

 Receipt and Processing of Mail - When the approaching message is


gotten, the trade server conveys it to the approaching server (Mail
Delivery Agent) which stores the email where it trusts that the client
will recover it.

 Access and Retrieval of Mail - The stored email in MDA can be


recovered by utilizing MUA (Mail User Agent). MUA can be gotten
to by utilizing login and password.

2.5. SMTP Commands:

 HELO – Identifies the customer to the server, completely qualified domain


name, just sent once per session.
 MAIL – Initiate a message move, completely qualified area of originator.
 RCPT – Follows MAIL, distinguishes a recipient, ordinarily the completely
qualified name of the recipient and for numerous addressees utilize one RCPT
for every address.
 Information – send information line by line.

2.6. Advantages of SMTP


 A Simplicity - SMTP gives the most straightforward type of imparting
through email messages between different PCs in a specific system.
There are no issues for the end-clients as they just need to type their
email and send it to the beneficiary's email address. 'The email will
simply experience a basic procedure from the SMTP server to a trade
server for the beneficiary's PC making the electronic correspondence
straightforward and not muddled.

 Quick Email Delivery - SMTP gives the easiest type of conveying


through email messages between different PCs in a specific system.
There are no problems for the end-clients as they just need to type
their email and send it to the beneficiary's email address. The email
will simply experience a straightforward procedure from the SMTP
server to a trade server for the beneficiary's PC making the electronic
correspondence basic and not convoluted.

 Reliability - SMTP likewise offers dependability as far as active email


messages. If there are occasions where a specific message was not
effectively sent, the SMTP server will consistently attempt to re-send
a similar email until the transmission gets fruitful. This is not normal
for different methods for sending email wherein one may need to give
a few times in sending a shot an email.

 Option for Dedicated Servers - SMTP likewise offers dependability as


far as active email messages. If there are occasions where a specific
message was not effectively sent, the SMTP server will consistently
attempt to re-send a similar email until the transmission gets
successful. This is not normal for different methods for sending email
wherein one may need to give a few times in sending a shot an email.

2.7. Disadvantages of SMTP

 It is absurd to expect to get to messages without Internet.


 If there should arise an occurrence of a serious utilization of the email
administration, a major measure of store room on the server is vital.

 The records that have been made with IMAP won't be perused
utilizing POP (the main exemption is the document of the information
inbox).

 Normally requires increasingly to and fro discussion between servers


so as to convey your message, which can postpone sending and
furthermore increment the odds of the message not being delivered.

 Few firewalls can square ports ordinarily utilized with SMTP.

3. Demonstration of your chosen protocols by capturing their packets using


Wireshark.
1st Step: Open Wireshark and Send a email.
2nd Step: Open Wireshark and stop the data capture

3rd Step: on the search bar in Wireshark, search for SMTP.


Show the details

Decrypt AUTH parameters , decryption the username and password


4. Hierarchical Network Design Concept
To meet a client's matter of fact and specialized objectives for a corporate system
plan, you may need to suggest a network topology comprising of many interrelated
segments. This errand is caused simpler on the off chance that you to can "separate
and vanquish" the activity and build up the structure in layers.

Network design specialists have built up the vhierarchical network design model to
assist you with building up a topology in discrete layers. Each layer can be centered
around explicit capacities, enabling you to pick the correct frameworks and highlights
for the layer. For instance, rapid WAN switches can convey traffic over the
undertaking WAN spine, medium-speed switches can interface structures at every
ground, and switches can associate client gadgets and servers inside structures.
4.1. Network Layers

As demonstrated as follows, the various levelled organize model uses three layers.
These are the Core, Distribution, and Access layers.

Frequently, these layers, guide to the physical format of the system. As you will see
later, this isn't generally the situation, so attempt to consider them sensible layers.

The prerequisites and elements of each layer is extraordinary. To address this, the
structure way to deal with each layer should be diverse as well.
4.2. Access

The access layer is devoted to addressing the requirements of end-device availability

The access layer is the edge of the system where have gadgets interface. This
incorporates workstations, and printers. Gadgets that expand the system, for example,
Phones, and Access Points, additionally join here.

This is where the administrator invests the vast majority of their time. It is a very
element rich layer, as it needs to help such a significant number of various endpoints.
As it's the system edge, it's the principal line of protection for security, and is a
legitimate QoS trust limit.

This layer ordinarily incorporates administrations, for example,

Discovery and configuration – CDP and LLDP

Security and network identity – 802.1x, port security, DHCP snooping, DAI, Source
Guard, Identity Based Network Services, and Web-auth

Application recognition– QoS stamping, policing, queueing, NBAR

Network control – Routing protocols, crossing tree, DTP, LACP, UDLD, Flex Link
Physical foundation – PoE

The Access layer associates northbound to the distribution layer. The associations
might be layer-2 trunk ports, or layer-3 directed ports. Settling on layer-2 and layer-3
is a significant structure decision. This is shrouded in another article.

Gadgets associate with the entrance switches at layer-2.

4.3. Distribution

The distribution layer is a multi-purpose layer. Specifically, it needs to total access


layer traffic, and forward it to the remainder of the system. There are likely many
access layer switches in the system. Every one of these switches has uplinks to the
distribution layer switches. Many end gadgets crosswise over access layer switches
are collected at the distribution layer.

Utilizing dispersion changes to total traffic intelligently makes 'distribution blocks'.


Think about a grounds with four structures. Each building has two dissemination
switches, and eight get to layer switches. Every one of these structures is a dispersion
square. Traffic can course between dissemination hinders through the core layer.
Distribution blocks are valuable to stay away from 'destiny sharing'. Envision a
situation where there is an exchanging circle in one circulation square. This kind of
mistake is confined to this one square, the remainder of the system doesn't have the
equivalent 'destiny'.

The distribution layer gives a division point between the square and the remainder of
the network. This makes it a decent spot to apply network strategies. It is additionally
a decent security limit between the access layer and the remainder of the network.

The highlights in the distribution layer rely upon the plan of the core layer and the
access layer. For instance, on the off chance that EIGRP runs in the center, at that
point the distribution layer should likewise run EIGRP. On the off chance that the
access layer needs 10G ethernet, at that point the distribution layer additionally needs
10G.

The distribution layer consistently interfaces with the center through directed ports.
This implies the distribution layer switches must utilize dynamic routing. The
distribution layer is a total point for the gadgets in the access layer. This is likewise
valid for dynamic routing. The distribution layer outlines the entrance layer addresses
toward the center.

The distribution switches use either layer-2 or layer-3 to associate with the access
layer. This relies upon the access layer structure, which is shrouded in more
profundity in another article.
4.4. Core

The core layer is the foundation of the grounds arrange. It interconnects all the
distribution squares. The core layer has a solitary reason, and doesn't require
numerous highlights. There are no security strategies, no QoS, and no endpoints
appended.

The key structure standards of the core layer is that it must be quick, it must be
constantly accessible, and it must be dependable. It is important that there is no single
purpose of disappointment. In the event that there is a disappointment, recovery
should be as quick as could reasonably be expected.

The core layer doesn't as a rule have a great deal of design. It is likewise not updated
except if vital. It should be lean and mean. Regularly the core utilizes huge
undercarriage-based switches, for example, the Catalyst 6500 or the 4500-X. An
option in contrast to case switches is stack-wise switches.

The core runs unadulterated layer-3 connections (routed ports), and profoundly tuned
routing protocols.
5. Enterprise Network Components
The enterprise network interfaces the gadgets spreading over crosswise over different
divisions inside a venture. These offices could be found anyplace yet as yet being
associated. This system could be LANs (Local Area Network), MANs (Metropolitan
Area Network) and even WANs (Wide Area Network). It is especially subject to the
requirements of the undertaking itself and furthermore the different divisions inside.
The enterprise network can coordinate a wide range of framework and help to
improve the interconnectivity of different gadgets in the system. The parts of big
business organize incorporate Enterprise Campus, Enterprise Edge and Service
Provider Edge.

5.1. Enterprise Campus

Enterprise campus is tied in with structuring the system of the structure and campus.
The system must be planned in a manner that gives great adaptability to meet
potential future necessities. There are sub-modules in enterprise campus, including
campus core, building access, building dispersion and farm/data centre. The campus
centre is where it gives quick network between the sub-modules in the endeavour
grounds. It additionally gives excess. Then again, layer-2 exchanging system is made
in building access module. It associates with the distribution layer. Next, the structure
appropriation module performs load adjusting just as QoS. Links like fiber-optics link
can be utilized to fabricate the system here. At long last, the server farm/data center
are the spot for different servers like record and application servers to offer various
services to the customers.

5.2. Enterprise Edge

Enterprise edge can offer different sorts of administrations to the enterprise campus.
This module has sub-modules like e-commerce networks, corporate web, VPN and
remote access and WAN for big business. The e-commerce part comprises of servers
like web and database servers just as firewall. The corporate web module makes
servers like DNS and FTP (File Transfer Protocol) servers open. VPN and remote
access takes into consideration remotely get to various locales. At long last, WAN
enables access to different WANs.

5.3. Service Provider Edge

Finally, the service provider edge. This module enables the venture to access the web
by means of Internet Service Providers (ISPs).
6. Topology Designs
Network topology alludes to the physical or logical layout of a network. It
characterizes the manner in which various hubs are set and interconnected with one
another. Then again, network topology may portray how the information is moved
between these hubs.

There are two kinds of system topologies: physical and logical. Physical topology
underscores the physical format of the associated devices and hubs, while the logical
topology centers around the example of information move between organize hubs.

The physical and logical network topologies of a network don't really need to be
indistinguishable. Be that as it may, both physical and network topologies can be
arranged into few fundamental models:

6.1. Bus Topology

Bus topology is a network type in which each PC and network device is associated
with single link. At the point when it has precisely two endpoints, at that point it is
called Linear Bus topology.

Features of Bus Topology:

• It transmits information just one way.


• Each device is associated with a solitary link

Advantages of Bus Topology

• It is financially savvy.
• Link required is least contrasted with other network topology.
• Utilized in little arranges.
• It is straightforward.
• Simple to grow consolidating two links.

Disadvantages of Bus Topology

• Cables fails then entire network comes up short.


• On the off chance that system traffic is substantial or hubs are more the
exhibition of the system diminishes.
• cable has a restricted length.
• It is slower than the ring topology.

6.2. Ring Topology

It is called ring topology since it frames a ring as every PC is associated with


another PC, with the last one associated with the first. Precisely two
neighbours for every device

Features of Ring Topology


• Various repeaters are utilized for Ring topology with huge number of
hubs, in such a case that somebody needs to send a few information to
the last hub in the ring topology with 100 hubs, at that point the
information should go through 99 hubs to arrive at the 100th hub.
Henceforth to forestall information misfortune repeaters are utilized in
the system.
• The transmission is unidirectional; however it tends to be made
bidirectional by having 2 associations between each Network Node, it
is called Dual Ring Topology.
• In Dual Ring Topology, two ring systems are framed, and information
stream is inverse way in them. Additionally, in the event that one ring
comes up short, the subsequent ring can go about as a reinforcement,
to keep the system up.
• Information is moved in a consecutive way that is a tiny bit at a time.
Information transmitted, needs to go through every hub of the system,
till the goal hub.

Advantages of Ring Topology


• Transmitting system isn't influenced by high traffic or by including
more hubs, as just the hubs having tokens can transmit information.
• Not expensive to introduce and grow

Disadvantages of Ring Topology


• Investigating is troublesome in ring topology.
• Increasing or erasing the PCs upsets the system movement.
• Failure of one PC upsets the entire system.
6.3. Star Topology

In this sort of topology every one of the PCs are associated with a solitary center point
through a link. This center point is the focal hub and all others hubs are associated
with the central node.

Features of Star Topology

• Each hub has its very own committed association with the hub.
• Center point goes about as a repeater for information stream.
• Can be utilized with twisted pair, Optical Fibre or coaxial cable.

Advantages of Star Topology

• Quick execution with barely any hubs and low organize traffic.
• Hub can be redesigned effectively.
• Simple to investigate.
• Simple to arrangement and change.
• Just that hub is influenced which has fizzled, rest of the hubs can work easily.

Disadvantages of Star Topology

• Cost of establishment is high.


• Costly to utilize.
• On the off chance that the hub fails, at that point the entire network is halted in
light of the fact that every one of the hubs rely upon the hub.
• Execution depends on the hub that is it relies upon its ability.

6.4. Mesh Topology

It is a point-to-guide association toward different hubs or devices. All the network


hubs are associated with one another. Mesh has n(n-1)/2 physical channels to
interface n devices.

There are two strategies to transmit information over the Mesh topology, they are :

• MESH Topology: Routing


In routing, the hubs have a directing rationale, according to the network
necessities. Like routing rationale to guide the information to arrive at the goal
utilizing the shortest distance. Or on the other hand, routing rationale which
has data about the wrecked connections, and it maintains a strategic distance
from those hubs and so on. We can even have routing rationale, to re-arrange
the bombed hubs.

• MESH Topology: Flooding


In routing, the hubs have a directing rationale, according to the network
necessities. Like routing rationale to guide the information to arrive at the goal
utilizing the shortest distance. Or on the other hand, routing rationale which
has data about the wrecked connections, and it maintains a strategic distance
from those hubs and so on. We can even have routing rationale, to re-arrange
the bombed hubs.
Types of Mesh Topology

• Partial Mesh Topology


In this topology a portion of the systems are associated in a similar manner as
mesh topology yet a few devices are just associated with a few devices such as
two or three devices.
• Full Mesh Topology
Every single hubs or devices are associated with each another.

Features of Mesh Topology

• Completely associated.
• Powerful.
• Not adaptable.

Advantages of Mesh Topology

• Every association can convey its own information load.


• It is hearty.
• Deficiency is analysed effectively.
• Gives security and protection.
Disadvantages of Mesh Topology

• Establishment and design are hard.


• Cabling budget is more.
• Mass wiring is required.

6.5. Tree Topology

It has a root hub and every single other hub are associated with it shaping a chain of
command. It is likewise called hierarchical topology. It ought to at any rate have three
levels to the pecking order.

Features of Tree Topology

• Perfect if workstations are situated in gatherings.


• Utilized in Wide Area Network.

Advantages of Tree Topology

• Augmentation of bus and star topologies.


• Development of hubs is conceivable and simple.
• Effectively oversaw and kept up.
• Mistake recognition is easier to be done.

Disadvantages of Tree Topology

• Vigorously cabled.
• Cost is high.
• On the off chance that more hubs are included upkeep is hard.
• If focal centre point fails, network will also fail.
6.6. Hybrid Topology

It is two unique sorts of topologies which is a blend of at least two topologies. For
instance, if in an office in one division ring topology is utilized and, in another star,
topology is utilized, interfacing these topologies will bring about Hybrid Topology
(ring topology and star topology).

Features of Hybrid Topology

• It is a blend of two or topologies


• Acquires the focal points and inconveniences of the topologies included

Advantages of Hybrid Topology

• Dependable as Error recognizing and inconvenience shooting is simple.


• Viable.
• Adaptable as size can be expanded effectively.
• Adaptable.

Disadvantages of Hybrid Topology

• Complex in plan.
• Expensive.
7. My Topology Design
This is a network that I have designed for a medium-sized company. The router that I
used in this network is all 2911 model and switches model that I used are 2960-24TT,
the network devices that I used are all connected with the copper straight-through
cable. The network address used in this network are all IPv6 addresses one IPv6
subnet can have 2^64 address. Therefore, the total number of hosts for this network is
5.53 ×1019 hosts.
The packet can be successfully forwarded from one computer to another with the IPv6
unicast-routing.
Device Interface IPv6 Address/ Prefix IPv6
Default
Gateway
Rounter Serial 0/0/0 1234:AB3:1:C004::2/64 FE80::2
Rounter A Gig0/0 1234:AB3:2:66::9/64 N/A
Gig0/1 1234:AB3:2:67::9/64 N/A
Gig0/2 1234:AB3:2:68::9/64 N/A
Router B Gig0/0 1234:AB3:2:11::9/64 FE80::1
Gig0/1 1234:AB3:2:12::9/64 FE80::1
Gig0/2 1234:AB3:2:13::9/64 FE80::1
Router C Gig0/0 1234:AB3:2:32:A102::9/64 FE80::1
Gig0/1 1234:AB3:2:33:BFDC::9/64 FE80::1
Gig0/2 1234:AB3:2:34:DDDD::9/64 FE80::1
Router D Gig0/0 1234:AB3:2:47:A134::9/64 FE80::1
Gig0/1 1234:AB3:2:48:CADB::9/64 FE80::1
Gig0/2 1234:AB3:2:49:D716::9/64 FE80::1
PC1 NIC 1234:AB3:2:26:BADC::8/64 FE80::1
PC2 NIC 1234:AB3:2:27:FFFF::21/64 FE80::1
PC 3 NIC 1234:AB3:2:33:BFDC::35/64 FE80::1
PC 4 NIC 1234:AB3:2:34:DDDD::41/64 FE80::1
PC 5 NIC 1234:AB3:2:48:CADB::2/64 FE80::1
LaptopA NIC 1234:AB3:2:26:BADC::31/64 FE80::1
LaptopB NIC 1234:AB3:2:27:FFFF::17/64 FE80::1
LaptopC NIC 1234:AB3:2:33:BFDC::37/64 FE80::1
LaptopD NIC 1234:AB3:2:49:D716::26/64 FE80::1
Printer I NIC 1234:AB3:2:34:DDDD::56/64 FE80::1
Printer II NIC 1234:AB3:2:48:CADB::63/64 FE80::1
Printer III NIC 1234:AB3:2:49:D716::88/64 FE80::1

8. IPv6 Addressing Scheme


For most associations, IPv6 will be sent in parallel with IPv4 in a current IPv4
creation internetwork. It is maybe normal to trust that the current IPv4 tending to plan
may essentially be copied in some style in IPv6. Contingent upon the association, the
structure and regulatory straightforwardness to send and oversee IPv6 utilizing such a
strategy may at first demonstrate profitable. Yet, any brief bit of leeway picked up by
such an alternate way will eventually be predominated by the straightforwardness and
effectiveness of activity and configuration offered by a legitimate IPv6 tending to
design—one that joins the key advantages of the exponentially bigger designations
conceivable with IPv6.

The for all intents and purposes limitless inventory of IPv6 address space takes into
consideration a tending to design never again compelled by the shortage of IPv4
addresses. Procedures, for example, Classless Inter-Domain Routing (CIDR) and
Variable Length Subnet Masking (VLSM), recently required in IPv4 to monetarily
coordinate subnet size to have rely on a given system fragment, become pointless and
out of date in IPv6. Rather, a predictable and neat tending to conspire is made
conceivable by the wealth of IPv6 addresses. As we'll see, this wealth likewise takes
into account the alternative of allocating criticalness to gatherings of site subnets as
indicated by capacity or area. This can make firewall strategies and course
conglomeration a lot simpler to plan and control. Such systems, alongside standard
IPv6 subnet sizes, guarantee to improve operational proficiency and augment future
arrange adaptability.

8.1. How IPv6 addresses are constructed

Before diving into the subtleties identified with an IPv6 tending to design, it might be
valuable to quickly survey how IPv6 addresses are built. Review that an IPv6 address
comprises of 128 bits. These bits are cut up to make a limit between the "arrange
number" and the "have number." More explicitly, the 64 bits of the system number
part of the location are isolated into the worldwide steering prefix and the subnet ID.
The initial three bits of any all inclusive routable location are set to 001. The
following 45 bits characterize the worldwide directing prefix. The 16 bits following
that are the subnet ID. The staying 64 bits of the location are saved for the interface
ID. Additionally delineated beneath is which association is liable for allotting the
significant bits of the worldwide steering prefix.
For most organizations, the majority of planning required for their IPv6 addressing
scheme will focus on the 16 bits of the subnet ID.

8.2. How many IPv6 addresses will you need?

This inquiry may appear to be a little impossible to miss given that the fundamental
interface subnet for IPv6, a/64 (or 1.8x1019 address), contains around 4 billion times
the quantity of addresses accessible in all of IPv4 space. Be that as it may, as
referenced prior, it is decisively this location bounty that gives new chances to more
prominent consistency and adaptability in IPv6 tending to plans.

To begin with, you'll have to decide the suitable size portion to demand for an
essential allotment. Associations with single locales normally get a/48 (or 1.2x1024
address). Associations with different locales get a bigger designation dependent on the
quantity of in general destinations that need tending to. Table below shows the
quantity of/48-sized destinations upheld by the quantity of bits in the worldwide
directing prefix for different designation sizes.
It's improbable obviously that any single association would have 65,536 sites needing
addressing to! Or maybe, bigger allotments are held by the RIRs for task to specialist
co-ops, who will thusly dispense littler prefixes to associations dependent on their
tending to prerequisites.

You may see that lone worldwide directing prefix measures in products of four bits
are recorded previously. This training, showed in more detail later in the record, is
utilized to save prefix decipherability and concision (since prefix lengths not in
products of four are not as quickly clear and may compel address extension to explain
the subsequent gatherings of accessible subnets).

8.3. Assigning Subnets and Addresses within a Site

The standard single site portion is a/48 (the most extreme number of bits took into
consideration a prefix that ISPs will acknowledge and re-publicize). The subnet ID bit
of the prefix takes into account subnet assignments inside a given site.

Any subnets got from this essential site task ought not be any littler (i.e., more bits)
than the standard interface task in IPv6 of a/64.

The more granular subnet assignments got from the/48 relegated to a site have two
essential qualities. To start with, as referenced above, they are commonly bigger than
the standard/64 interface task and are properly measured to characterize gatherings of
these interface subnets. Second, these gatherings will be estimated and relegated
dependent on the system capacity or area they give addressing to.

Table below shows the number of subnet groups per /48 with the resulting number
of /64 subnets.
These qualities should help manage what number of gatherings of subnets, just as/64s
per gathering, are required for a given site. When all is said in done, the more/64s
required for a specific capacity or area inside the site, the less the quantity of bigger
subnets accessible for different areas or capacities at that equivalent site. Luckily,
most associations are probably not going to utilize more than 4,096/64 subnets for a
solitary site capacity or area (a farthest point which would at present take into
consideration 15 extra/52s—each with 4,096/64 subnets).

The assurance of what number of gatherings of subnets (and/64s per gathering) are
required ought to incorporate current generation prerequisites just as anticipated
development. The 4-piece limit favored for prefix neatness leaves room in the middle
of for sudden development (however at the potential future expense of concision and
clarity).

Picture below demonstrates /48 site allocation subnet groups when the nibble
boundary is adhered to.
As referenced, all system interfaces ought to be relegated a/64 of course. The main
special cases to this standard are for point-to-point joins and loopback addresses.

As of late, there has been a lot of discussion in the Internet building network and
among organize administrators concerning what size subnet ought to be utilized for
point-to point joins. Introductory IPv6 arrangements regularly utilized/64s for the
good of consistency yet security issues (i.e., neighbour reserve fatigue and sending
circles) rose that made this technique questionable. Subsequently, both/126s and/127s
were proposed and conveyed as best other options. All the more as of late, RFC 6164
suggests the utilization of/127s on point-to-point joins.

Below shows each of the standard IPv6 subnet assignments.


To save address plan consistency, each point-to-point connection can be assigned a/64
however arranged with a solitary/127 from that portion. On the other hand, a/64 can
be dispensed per steering area from which the entirety of the/127s for that space will
be doled out.

/128s can be doled out from one/64 dispensed per directing space only for loopback
addresses.

8.4. Getting IPv6 Addresses

Since you have some data to decide what number of IPv6 addresses you may require,
the following stage is to acquire an IPv6 address portion. This is commonly done in
one of two different ways: an association will either demand IPv6 space from their
ISP or from one of the Regional Internet Registries (or RIRs). The choice to demand
an IPv6 designation from an ISP or a RIR depends on whether an association needs a
Provider Aggregatable (PA) allotment or a Provider Independent (PI) assignment.

8.5. A Sample Plan

Suppose you're making a location plan for a grounds LAN that has gatherings of
system sections supporting specific capacities (i.e., voice, wired and remote
information, and so on.). Notwithstanding the tending to required for these capacities,
you'll likewise require addresses for foundation. At last, extra subnets for sometime
later ought to likewise be incorporated:
• Wired data
• VoIP
• Wireless
• Wireless guest
• Finance
• Infrastructure
• Future use

A sum of six subnets would be required to help the above capacities (alongside two
put in a safe spot for some time later). This would require the booking of three bits in
the prefix to give the important subnets (appeared beneath by 'N,' while 'X' are
undefined):

2001:db8:abcd:[NNNXXXXXXXXXXXX]::/51

Note that while this gives adequate subnets, the subsequent prefix isn't as intelligible
on the grounds that the bit limit doesn't line up with the 4 bits used to characterize the
hexadecimal character in the address:

2001:db8:abcd:0000::/51

to

2001:db8:abcd:1FFF::/51

2001:db8:abcd:2000::/51

to

2001:db8:abcd:3FFF::/51

For each subnet gathering, just one worth is feasible for the hexadecimal character
that relates to the 4-piece limit in the IPv6 prefix (for this situation, a/52). This makes
the subsequent prefix all the more promptly decipherable.
Clearly, the utilization of the more bits gives us more gatherings of subnets—16 for
this situation, 6 of which we'll utilize promptly and 10 for future. Be that as it may,
less host ID bits additionally decreases the quantity of accessible/64 subnets in each
gathering. In our above model, we went from 8,192/64s accessible per/51 to just
4,096/64s accessible with a/52.

As referenced already, we'll need to save a/64 each for both/127 point-to-point
subnets just as any/128 loopback addresses we may require.

Figure Below beneath exhibits the utilization of these standards portraying some
portion of an IPv6 tending to anticipate an ExampleCorp, an anecdotal endeavor.

In any case, imagine a scenario in which your association has more than one site.
Since the standard site assignment is a/48 any associations that have more than one
site will get a bigger portion from the RIR or ISP. The realistic beneath (figure 5)
shows our anecdotal organization growing to three destinations. Note that however
a/46 would be adequate to give three/48s one remaining over for future development,
the RIRs, until further notice, regularly hold fast to the 4 piece limit to acquire the
advantages of clarity and productivity previously examined. In this manner, the/44
utilized for our model below.
Notice that in the two models the capacity/VLAN subnet assignments are effectively
recognizable by the prefix given that the assignments fit in with a 4-piece limit.
Likewise, note the task of capacity or area criticalness to an IPv6 subnet.

8.6. Host Address Assignment

Three essential strategies for have task exist in IPv6. Two of these strategies (static
tending to and DHCP) ought to be well-known from IPv4, while one (Stateless
Address Autoconfiguration, or SLAAC) is one of a kind to IPv6.

As with IPv4, static tending to is ordinarily used for servers, switches, switches,
firewalls, and system the board interfaces for any apparatuses—or any occurrence
where address assignments are probably not going to change after some time.

Stateless Address Autoconfiguration (SLAAC) is accessible on switch interfaces that


help IPv6 and will enable has on such a fragment to self-allocate a novel address
(default switch data is given through ICMPv6 Router Advertisements). Since SLAAC
provides any confirmation component and enables a host to associate with the system
and speak with different hubs, this tending to technique isn't suggested where security
is required or liked. Lab conditions or completely disconnected systems where tight
host control isn't a necessity are great contender for the selective utilization of
SLAAC.

Another issue with the utilization of SLAAC may emerge where protection
augmentations are empowered on the host. Protection augmentations permit the
interface ID part of a SLAAC assigned address to be randomized with an end goal to
expand security for traffic beginning from the host (generally the SLAAC doled out
host address will consistently contain the detectable equipment address of the host's
system interface). Security augmentations are configurable in most host working
frameworks and may should be crippled on the host if exacting following and control
of hosts is wanted.

On the other hand, Stateful DHCPv6 gives dynamic host address task yet in addition
incorporates the capacity to pass extra alternatives to the customer. These choices
incorporate data such DNS recursive name servers or the default area name. Stateless
DHCPv6 is one more design alternative. With Stateless DHCPv6, SLAAC is utilized
to give have address task and default switch data while DHCPv6 gives a rundown of
DNS recursive name servers or the default area name.

At last, RFC6106 proposes including DNS server and search list data in RAs to give
have arrangement alternatives to SLAAC presently gave by DHCPv6, however it isn't
generally actualized among host operating systems.
9. Reference
1. Techopedia.com. (2017). What is the Application Layer? - Definition from
Techopedia. [online] Available at:
https://www.techopedia.com/definition/6006/application-layer [Accessed 10
Nov. 2019].
2. Amazon Web Services, Inc. (2016). What does SMTP stand for? | Simple
Mail Transfer Protocol, Server, Service | AWS. [online] Available at:
https://aws.amazon.com/ses/what-is-smtp/ [Accessed 10 Nov. 2019].
3. Softaken.com. (2015). What is IMAP/POP/SMTP and What are Their Uses in
Email Communication. [online] Available at:
https://www.softaken.com/blog/what-is-the-difference-between-imappop-and-
smtp [Accessed 10 Nov. 2019].
4. Ayush, Verma. (2015). What is my SMTP Server? | SMTP Server for Testing
[With Examples]. [online] Pepipost. Available at:
https://pepipost.com/blog/what-is-smtp/ [Accessed 11 Nov. 2019].
5. www.javatpoint.com. (2017). SMTP - Simple Mail Transfer Protocol -
javatpoint. [online] Available at: https://www.javatpoint.com/simple-mail-
transfer-protocol [Accessed 11 Nov. 2019].
6. Monika, S. (2017). Simple Mail Transfer Protocol (SMTP) - GeeksforGeeks.
[online] GeeksforGeeks. Available at: https://www.geeksforgeeks.org/simple-
mail-transfer-protocol-smtp/ [Accessed 11 Nov. 2019].
7. Erwin, Z. (2012). Benefits of SMTP. [online] Benefits Of. Available at:
http://benefitof.net/benefits-of-smtp/ [Accessed 12 Nov. 2019].
8. Clouding Knowledge Base. (2013). IMAP and POP3: Differences,
advantages and disadvantages. [online] Available at:
https://clouding.io/kb/en/imap-and-pop3-differences-advantages-and-
disadvantages/ [Accessed 12 Nov. 2019].
9. Edrawsoft.com. (2014). Hierarchical Network Design - Access Layer of the
Hierarchical Network Design Model. [online] Available at:
https://www.edrawsoft.com/Hierarchical-Network-Design.php [Accessed 12
Nov. 2019].
10. Network Direction. (2018). Hierarchical Network Model - Network Direction.
[online] Available at: https://networkdirection.net/articles/network-
theory/hierarchicalnetworkmodel/ [Accessed 13 Nov. 2019].
11. Techopedia.com. (2012). What is Network Topology? - Definition from
Techopedia. [online] Available at:
https://www.techopedia.com/definition/5538/network-topology [Accessed 13
Nov. 2019].
12. Abhishek, A. (2016). Types of Network Topology in Computer Networks |
Studytonight. [online] Studytonight.com. Available at:
https://www.studytonight.com/computer-networks/network-topology-types
[Accessed 13 Nov. 2019].
13. Docs.oracle.com. (2012). Chapter 3 Planningan IPv6 Addressing Scheme
(Overview) (System Administration Guide: IP Services). [online] Available at:
https://docs.oracle.com/cd/E19120-01/open.solaris/819-3000/ipv6-overview-
7/index.html [Accessed 14 Nov. 2019].

You might also like