Cisco Assignment1
Cisco Assignment1
Cisco Assignment1
The application layer gives full end-client access to an assortment of shared network
services for productive OSI model information stream. This layer has numerous
duties, including error dealing and recovery, information stream over a system and
full system stream. It is likewise used to create network-based applications.
2. Introduction to Simple Mail Transfer Protocol (SMTP)
The Simple Mail Transfer Protocol, otherwise called SMTP, is a protocol used to
transmit email messages over the web. The standard itself was first distributed in
1981, and it has been improved constantly to adjust to changes in innovation and
client needs. As a web standard for more than 35 years, SMTP has been embraced
generally as the protocol of decision for transmitting email starting with one email
server then onto the next.
The SMTP standard characterizes the discussion between the sender of an email and
the SMTP mail server that conveys the email. In a SMTP discussion, the sender gives
a specific grouping of directions to the getting SMTP server. By and large, if the
sender issues substantial directions, and the expected beneficiaries of the email are
legitimate records on the getting server, the accepting server will acknowledge the
message and endeavour to convey it. Obviously, by far most of email senders never
observe this discussion in real life, on the grounds that their email customers handle
these transactions off behind the scenes.
Open mail relay - A SMTP server that enables anybody on the web
to send email through it, without verifying, (for example, by giving
a client name or password). SMTP servers were initially all open
relays, yet spammers and different noxious clients before long
began to manhandle them. With not very many special cases, all
SMTP servers presently require a type of validation.
End-to-end method
The end to end model is utilized to impart between various associations while the
store and forward technique are utilized inside an association. A SMTP customer who
needs to send the mail will contact the goal's host SMTP legitimately so as to send the
mail to the goal. The SMTP server will remain quiet about the mail until it is
effectively duplicated to the recipient's SMTP.
The customer SMTP is the one which starts the session let us call it as the customer
SMTP and the server SMTP is the one which reacts to the session ask for and let us
call it as beneficiary SMTP. The customer SMTP will begin the session and the
beneficiary SMTP will react to the solicitation.
To start with, we will break the SMTP customer and SMTP server into two
parts, for example, user agent (UA) and mail transfer agent (MTA). The user
agent (UA) read the message, makes the envelope and afterward places the
message in the envelope. The mail transfer agent (MTA) moves this mail over
the web.
SMTP permits a progressively unpredictable framework by including a
relaying system. Rather than simply having one MTA at sending side and one
at accepting side, more MTAs can be included, acting either as a customer or
server to transfer the email.
The records that have been made with IMAP won't be perused
utilizing POP (the main exemption is the document of the information
inbox).
Network design specialists have built up the vhierarchical network design model to
assist you with building up a topology in discrete layers. Each layer can be centered
around explicit capacities, enabling you to pick the correct frameworks and highlights
for the layer. For instance, rapid WAN switches can convey traffic over the
undertaking WAN spine, medium-speed switches can interface structures at every
ground, and switches can associate client gadgets and servers inside structures.
4.1. Network Layers
As demonstrated as follows, the various levelled organize model uses three layers.
These are the Core, Distribution, and Access layers.
Frequently, these layers, guide to the physical format of the system. As you will see
later, this isn't generally the situation, so attempt to consider them sensible layers.
The prerequisites and elements of each layer is extraordinary. To address this, the
structure way to deal with each layer should be diverse as well.
4.2. Access
The access layer is the edge of the system where have gadgets interface. This
incorporates workstations, and printers. Gadgets that expand the system, for example,
Phones, and Access Points, additionally join here.
This is where the administrator invests the vast majority of their time. It is a very
element rich layer, as it needs to help such a significant number of various endpoints.
As it's the system edge, it's the principal line of protection for security, and is a
legitimate QoS trust limit.
Security and network identity – 802.1x, port security, DHCP snooping, DAI, Source
Guard, Identity Based Network Services, and Web-auth
Network control – Routing protocols, crossing tree, DTP, LACP, UDLD, Flex Link
Physical foundation – PoE
The Access layer associates northbound to the distribution layer. The associations
might be layer-2 trunk ports, or layer-3 directed ports. Settling on layer-2 and layer-3
is a significant structure decision. This is shrouded in another article.
4.3. Distribution
The distribution layer gives a division point between the square and the remainder of
the network. This makes it a decent spot to apply network strategies. It is additionally
a decent security limit between the access layer and the remainder of the network.
The highlights in the distribution layer rely upon the plan of the core layer and the
access layer. For instance, on the off chance that EIGRP runs in the center, at that
point the distribution layer should likewise run EIGRP. On the off chance that the
access layer needs 10G ethernet, at that point the distribution layer additionally needs
10G.
The distribution layer consistently interfaces with the center through directed ports.
This implies the distribution layer switches must utilize dynamic routing. The
distribution layer is a total point for the gadgets in the access layer. This is likewise
valid for dynamic routing. The distribution layer outlines the entrance layer addresses
toward the center.
The distribution switches use either layer-2 or layer-3 to associate with the access
layer. This relies upon the access layer structure, which is shrouded in more
profundity in another article.
4.4. Core
The core layer is the foundation of the grounds arrange. It interconnects all the
distribution squares. The core layer has a solitary reason, and doesn't require
numerous highlights. There are no security strategies, no QoS, and no endpoints
appended.
The key structure standards of the core layer is that it must be quick, it must be
constantly accessible, and it must be dependable. It is important that there is no single
purpose of disappointment. In the event that there is a disappointment, recovery
should be as quick as could reasonably be expected.
The core layer doesn't as a rule have a great deal of design. It is likewise not updated
except if vital. It should be lean and mean. Regularly the core utilizes huge
undercarriage-based switches, for example, the Catalyst 6500 or the 4500-X. An
option in contrast to case switches is stack-wise switches.
The core runs unadulterated layer-3 connections (routed ports), and profoundly tuned
routing protocols.
5. Enterprise Network Components
The enterprise network interfaces the gadgets spreading over crosswise over different
divisions inside a venture. These offices could be found anyplace yet as yet being
associated. This system could be LANs (Local Area Network), MANs (Metropolitan
Area Network) and even WANs (Wide Area Network). It is especially subject to the
requirements of the undertaking itself and furthermore the different divisions inside.
The enterprise network can coordinate a wide range of framework and help to
improve the interconnectivity of different gadgets in the system. The parts of big
business organize incorporate Enterprise Campus, Enterprise Edge and Service
Provider Edge.
Enterprise campus is tied in with structuring the system of the structure and campus.
The system must be planned in a manner that gives great adaptability to meet
potential future necessities. There are sub-modules in enterprise campus, including
campus core, building access, building dispersion and farm/data centre. The campus
centre is where it gives quick network between the sub-modules in the endeavour
grounds. It additionally gives excess. Then again, layer-2 exchanging system is made
in building access module. It associates with the distribution layer. Next, the structure
appropriation module performs load adjusting just as QoS. Links like fiber-optics link
can be utilized to fabricate the system here. At long last, the server farm/data center
are the spot for different servers like record and application servers to offer various
services to the customers.
Enterprise edge can offer different sorts of administrations to the enterprise campus.
This module has sub-modules like e-commerce networks, corporate web, VPN and
remote access and WAN for big business. The e-commerce part comprises of servers
like web and database servers just as firewall. The corporate web module makes
servers like DNS and FTP (File Transfer Protocol) servers open. VPN and remote
access takes into consideration remotely get to various locales. At long last, WAN
enables access to different WANs.
Finally, the service provider edge. This module enables the venture to access the web
by means of Internet Service Providers (ISPs).
6. Topology Designs
Network topology alludes to the physical or logical layout of a network. It
characterizes the manner in which various hubs are set and interconnected with one
another. Then again, network topology may portray how the information is moved
between these hubs.
There are two kinds of system topologies: physical and logical. Physical topology
underscores the physical format of the associated devices and hubs, while the logical
topology centers around the example of information move between organize hubs.
The physical and logical network topologies of a network don't really need to be
indistinguishable. Be that as it may, both physical and network topologies can be
arranged into few fundamental models:
Bus topology is a network type in which each PC and network device is associated
with single link. At the point when it has precisely two endpoints, at that point it is
called Linear Bus topology.
• It is financially savvy.
• Link required is least contrasted with other network topology.
• Utilized in little arranges.
• It is straightforward.
• Simple to grow consolidating two links.
In this sort of topology every one of the PCs are associated with a solitary center point
through a link. This center point is the focal hub and all others hubs are associated
with the central node.
• Each hub has its very own committed association with the hub.
• Center point goes about as a repeater for information stream.
• Can be utilized with twisted pair, Optical Fibre or coaxial cable.
• Quick execution with barely any hubs and low organize traffic.
• Hub can be redesigned effectively.
• Simple to investigate.
• Simple to arrangement and change.
• Just that hub is influenced which has fizzled, rest of the hubs can work easily.
There are two strategies to transmit information over the Mesh topology, they are :
• Completely associated.
• Powerful.
• Not adaptable.
It has a root hub and every single other hub are associated with it shaping a chain of
command. It is likewise called hierarchical topology. It ought to at any rate have three
levels to the pecking order.
• Vigorously cabled.
• Cost is high.
• On the off chance that more hubs are included upkeep is hard.
• If focal centre point fails, network will also fail.
6.6. Hybrid Topology
It is two unique sorts of topologies which is a blend of at least two topologies. For
instance, if in an office in one division ring topology is utilized and, in another star,
topology is utilized, interfacing these topologies will bring about Hybrid Topology
(ring topology and star topology).
• Complex in plan.
• Expensive.
7. My Topology Design
This is a network that I have designed for a medium-sized company. The router that I
used in this network is all 2911 model and switches model that I used are 2960-24TT,
the network devices that I used are all connected with the copper straight-through
cable. The network address used in this network are all IPv6 addresses one IPv6
subnet can have 2^64 address. Therefore, the total number of hosts for this network is
5.53 ×1019 hosts.
The packet can be successfully forwarded from one computer to another with the IPv6
unicast-routing.
Device Interface IPv6 Address/ Prefix IPv6
Default
Gateway
Rounter Serial 0/0/0 1234:AB3:1:C004::2/64 FE80::2
Rounter A Gig0/0 1234:AB3:2:66::9/64 N/A
Gig0/1 1234:AB3:2:67::9/64 N/A
Gig0/2 1234:AB3:2:68::9/64 N/A
Router B Gig0/0 1234:AB3:2:11::9/64 FE80::1
Gig0/1 1234:AB3:2:12::9/64 FE80::1
Gig0/2 1234:AB3:2:13::9/64 FE80::1
Router C Gig0/0 1234:AB3:2:32:A102::9/64 FE80::1
Gig0/1 1234:AB3:2:33:BFDC::9/64 FE80::1
Gig0/2 1234:AB3:2:34:DDDD::9/64 FE80::1
Router D Gig0/0 1234:AB3:2:47:A134::9/64 FE80::1
Gig0/1 1234:AB3:2:48:CADB::9/64 FE80::1
Gig0/2 1234:AB3:2:49:D716::9/64 FE80::1
PC1 NIC 1234:AB3:2:26:BADC::8/64 FE80::1
PC2 NIC 1234:AB3:2:27:FFFF::21/64 FE80::1
PC 3 NIC 1234:AB3:2:33:BFDC::35/64 FE80::1
PC 4 NIC 1234:AB3:2:34:DDDD::41/64 FE80::1
PC 5 NIC 1234:AB3:2:48:CADB::2/64 FE80::1
LaptopA NIC 1234:AB3:2:26:BADC::31/64 FE80::1
LaptopB NIC 1234:AB3:2:27:FFFF::17/64 FE80::1
LaptopC NIC 1234:AB3:2:33:BFDC::37/64 FE80::1
LaptopD NIC 1234:AB3:2:49:D716::26/64 FE80::1
Printer I NIC 1234:AB3:2:34:DDDD::56/64 FE80::1
Printer II NIC 1234:AB3:2:48:CADB::63/64 FE80::1
Printer III NIC 1234:AB3:2:49:D716::88/64 FE80::1
The for all intents and purposes limitless inventory of IPv6 address space takes into
consideration a tending to design never again compelled by the shortage of IPv4
addresses. Procedures, for example, Classless Inter-Domain Routing (CIDR) and
Variable Length Subnet Masking (VLSM), recently required in IPv4 to monetarily
coordinate subnet size to have rely on a given system fragment, become pointless and
out of date in IPv6. Rather, a predictable and neat tending to conspire is made
conceivable by the wealth of IPv6 addresses. As we'll see, this wealth likewise takes
into account the alternative of allocating criticalness to gatherings of site subnets as
indicated by capacity or area. This can make firewall strategies and course
conglomeration a lot simpler to plan and control. Such systems, alongside standard
IPv6 subnet sizes, guarantee to improve operational proficiency and augment future
arrange adaptability.
Before diving into the subtleties identified with an IPv6 tending to design, it might be
valuable to quickly survey how IPv6 addresses are built. Review that an IPv6 address
comprises of 128 bits. These bits are cut up to make a limit between the "arrange
number" and the "have number." More explicitly, the 64 bits of the system number
part of the location are isolated into the worldwide steering prefix and the subnet ID.
The initial three bits of any all inclusive routable location are set to 001. The
following 45 bits characterize the worldwide directing prefix. The 16 bits following
that are the subnet ID. The staying 64 bits of the location are saved for the interface
ID. Additionally delineated beneath is which association is liable for allotting the
significant bits of the worldwide steering prefix.
For most organizations, the majority of planning required for their IPv6 addressing
scheme will focus on the 16 bits of the subnet ID.
This inquiry may appear to be a little impossible to miss given that the fundamental
interface subnet for IPv6, a/64 (or 1.8x1019 address), contains around 4 billion times
the quantity of addresses accessible in all of IPv4 space. Be that as it may, as
referenced prior, it is decisively this location bounty that gives new chances to more
prominent consistency and adaptability in IPv6 tending to plans.
To begin with, you'll have to decide the suitable size portion to demand for an
essential allotment. Associations with single locales normally get a/48 (or 1.2x1024
address). Associations with different locales get a bigger designation dependent on the
quantity of in general destinations that need tending to. Table below shows the
quantity of/48-sized destinations upheld by the quantity of bits in the worldwide
directing prefix for different designation sizes.
It's improbable obviously that any single association would have 65,536 sites needing
addressing to! Or maybe, bigger allotments are held by the RIRs for task to specialist
co-ops, who will thusly dispense littler prefixes to associations dependent on their
tending to prerequisites.
You may see that lone worldwide directing prefix measures in products of four bits
are recorded previously. This training, showed in more detail later in the record, is
utilized to save prefix decipherability and concision (since prefix lengths not in
products of four are not as quickly clear and may compel address extension to explain
the subsequent gatherings of accessible subnets).
The standard single site portion is a/48 (the most extreme number of bits took into
consideration a prefix that ISPs will acknowledge and re-publicize). The subnet ID bit
of the prefix takes into account subnet assignments inside a given site.
Any subnets got from this essential site task ought not be any littler (i.e., more bits)
than the standard interface task in IPv6 of a/64.
The more granular subnet assignments got from the/48 relegated to a site have two
essential qualities. To start with, as referenced above, they are commonly bigger than
the standard/64 interface task and are properly measured to characterize gatherings of
these interface subnets. Second, these gatherings will be estimated and relegated
dependent on the system capacity or area they give addressing to.
Table below shows the number of subnet groups per /48 with the resulting number
of /64 subnets.
These qualities should help manage what number of gatherings of subnets, just as/64s
per gathering, are required for a given site. When all is said in done, the more/64s
required for a specific capacity or area inside the site, the less the quantity of bigger
subnets accessible for different areas or capacities at that equivalent site. Luckily,
most associations are probably not going to utilize more than 4,096/64 subnets for a
solitary site capacity or area (a farthest point which would at present take into
consideration 15 extra/52s—each with 4,096/64 subnets).
The assurance of what number of gatherings of subnets (and/64s per gathering) are
required ought to incorporate current generation prerequisites just as anticipated
development. The 4-piece limit favored for prefix neatness leaves room in the middle
of for sudden development (however at the potential future expense of concision and
clarity).
Picture below demonstrates /48 site allocation subnet groups when the nibble
boundary is adhered to.
As referenced, all system interfaces ought to be relegated a/64 of course. The main
special cases to this standard are for point-to-point joins and loopback addresses.
As of late, there has been a lot of discussion in the Internet building network and
among organize administrators concerning what size subnet ought to be utilized for
point-to point joins. Introductory IPv6 arrangements regularly utilized/64s for the
good of consistency yet security issues (i.e., neighbour reserve fatigue and sending
circles) rose that made this technique questionable. Subsequently, both/126s and/127s
were proposed and conveyed as best other options. All the more as of late, RFC 6164
suggests the utilization of/127s on point-to-point joins.
/128s can be doled out from one/64 dispensed per directing space only for loopback
addresses.
Since you have some data to decide what number of IPv6 addresses you may require,
the following stage is to acquire an IPv6 address portion. This is commonly done in
one of two different ways: an association will either demand IPv6 space from their
ISP or from one of the Regional Internet Registries (or RIRs). The choice to demand
an IPv6 designation from an ISP or a RIR depends on whether an association needs a
Provider Aggregatable (PA) allotment or a Provider Independent (PI) assignment.
Suppose you're making a location plan for a grounds LAN that has gatherings of
system sections supporting specific capacities (i.e., voice, wired and remote
information, and so on.). Notwithstanding the tending to required for these capacities,
you'll likewise require addresses for foundation. At last, extra subnets for sometime
later ought to likewise be incorporated:
• Wired data
• VoIP
• Wireless
• Wireless guest
• Finance
• Infrastructure
• Future use
A sum of six subnets would be required to help the above capacities (alongside two
put in a safe spot for some time later). This would require the booking of three bits in
the prefix to give the important subnets (appeared beneath by 'N,' while 'X' are
undefined):
2001:db8:abcd:[NNNXXXXXXXXXXXX]::/51
Note that while this gives adequate subnets, the subsequent prefix isn't as intelligible
on the grounds that the bit limit doesn't line up with the 4 bits used to characterize the
hexadecimal character in the address:
2001:db8:abcd:0000::/51
to
2001:db8:abcd:1FFF::/51
2001:db8:abcd:2000::/51
to
2001:db8:abcd:3FFF::/51
For each subnet gathering, just one worth is feasible for the hexadecimal character
that relates to the 4-piece limit in the IPv6 prefix (for this situation, a/52). This makes
the subsequent prefix all the more promptly decipherable.
Clearly, the utilization of the more bits gives us more gatherings of subnets—16 for
this situation, 6 of which we'll utilize promptly and 10 for future. Be that as it may,
less host ID bits additionally decreases the quantity of accessible/64 subnets in each
gathering. In our above model, we went from 8,192/64s accessible per/51 to just
4,096/64s accessible with a/52.
As referenced already, we'll need to save a/64 each for both/127 point-to-point
subnets just as any/128 loopback addresses we may require.
Figure Below beneath exhibits the utilization of these standards portraying some
portion of an IPv6 tending to anticipate an ExampleCorp, an anecdotal endeavor.
In any case, imagine a scenario in which your association has more than one site.
Since the standard site assignment is a/48 any associations that have more than one
site will get a bigger portion from the RIR or ISP. The realistic beneath (figure 5)
shows our anecdotal organization growing to three destinations. Note that however
a/46 would be adequate to give three/48s one remaining over for future development,
the RIRs, until further notice, regularly hold fast to the 4 piece limit to acquire the
advantages of clarity and productivity previously examined. In this manner, the/44
utilized for our model below.
Notice that in the two models the capacity/VLAN subnet assignments are effectively
recognizable by the prefix given that the assignments fit in with a 4-piece limit.
Likewise, note the task of capacity or area criticalness to an IPv6 subnet.
Three essential strategies for have task exist in IPv6. Two of these strategies (static
tending to and DHCP) ought to be well-known from IPv4, while one (Stateless
Address Autoconfiguration, or SLAAC) is one of a kind to IPv6.
As with IPv4, static tending to is ordinarily used for servers, switches, switches,
firewalls, and system the board interfaces for any apparatuses—or any occurrence
where address assignments are probably not going to change after some time.
Another issue with the utilization of SLAAC may emerge where protection
augmentations are empowered on the host. Protection augmentations permit the
interface ID part of a SLAAC assigned address to be randomized with an end goal to
expand security for traffic beginning from the host (generally the SLAAC doled out
host address will consistently contain the detectable equipment address of the host's
system interface). Security augmentations are configurable in most host working
frameworks and may should be crippled on the host if exacting following and control
of hosts is wanted.
On the other hand, Stateful DHCPv6 gives dynamic host address task yet in addition
incorporates the capacity to pass extra alternatives to the customer. These choices
incorporate data such DNS recursive name servers or the default area name. Stateless
DHCPv6 is one more design alternative. With Stateless DHCPv6, SLAAC is utilized
to give have address task and default switch data while DHCPv6 gives a rundown of
DNS recursive name servers or the default area name.
At last, RFC6106 proposes including DNS server and search list data in RAs to give
have arrangement alternatives to SLAAC presently gave by DHCPv6, however it isn't
generally actualized among host operating systems.
9. Reference
1. Techopedia.com. (2017). What is the Application Layer? - Definition from
Techopedia. [online] Available at:
https://www.techopedia.com/definition/6006/application-layer [Accessed 10
Nov. 2019].
2. Amazon Web Services, Inc. (2016). What does SMTP stand for? | Simple
Mail Transfer Protocol, Server, Service | AWS. [online] Available at:
https://aws.amazon.com/ses/what-is-smtp/ [Accessed 10 Nov. 2019].
3. Softaken.com. (2015). What is IMAP/POP/SMTP and What are Their Uses in
Email Communication. [online] Available at:
https://www.softaken.com/blog/what-is-the-difference-between-imappop-and-
smtp [Accessed 10 Nov. 2019].
4. Ayush, Verma. (2015). What is my SMTP Server? | SMTP Server for Testing
[With Examples]. [online] Pepipost. Available at:
https://pepipost.com/blog/what-is-smtp/ [Accessed 11 Nov. 2019].
5. www.javatpoint.com. (2017). SMTP - Simple Mail Transfer Protocol -
javatpoint. [online] Available at: https://www.javatpoint.com/simple-mail-
transfer-protocol [Accessed 11 Nov. 2019].
6. Monika, S. (2017). Simple Mail Transfer Protocol (SMTP) - GeeksforGeeks.
[online] GeeksforGeeks. Available at: https://www.geeksforgeeks.org/simple-
mail-transfer-protocol-smtp/ [Accessed 11 Nov. 2019].
7. Erwin, Z. (2012). Benefits of SMTP. [online] Benefits Of. Available at:
http://benefitof.net/benefits-of-smtp/ [Accessed 12 Nov. 2019].
8. Clouding Knowledge Base. (2013). IMAP and POP3: Differences,
advantages and disadvantages. [online] Available at:
https://clouding.io/kb/en/imap-and-pop3-differences-advantages-and-
disadvantages/ [Accessed 12 Nov. 2019].
9. Edrawsoft.com. (2014). Hierarchical Network Design - Access Layer of the
Hierarchical Network Design Model. [online] Available at:
https://www.edrawsoft.com/Hierarchical-Network-Design.php [Accessed 12
Nov. 2019].
10. Network Direction. (2018). Hierarchical Network Model - Network Direction.
[online] Available at: https://networkdirection.net/articles/network-
theory/hierarchicalnetworkmodel/ [Accessed 13 Nov. 2019].
11. Techopedia.com. (2012). What is Network Topology? - Definition from
Techopedia. [online] Available at:
https://www.techopedia.com/definition/5538/network-topology [Accessed 13
Nov. 2019].
12. Abhishek, A. (2016). Types of Network Topology in Computer Networks |
Studytonight. [online] Studytonight.com. Available at:
https://www.studytonight.com/computer-networks/network-topology-types
[Accessed 13 Nov. 2019].
13. Docs.oracle.com. (2012). Chapter 3 Planningan IPv6 Addressing Scheme
(Overview) (System Administration Guide: IP Services). [online] Available at:
https://docs.oracle.com/cd/E19120-01/open.solaris/819-3000/ipv6-overview-
7/index.html [Accessed 14 Nov. 2019].