Download docx - African Scholar Publications

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Net neutrality law wikipedia , lookup

Distributed firewall wikipedia , lookup

Network tap wikipedia , lookup

Internet protocol suite wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Peering wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Net bias wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Proceedings of The Academic Conference of African Scholar Publications & Research International on Challenge
and Prospects Vol. 8 No. 1. 10th December, 2015 – Bauchi State University, Gadau, University Assembly Hall,
Main Campus, Itsa-Gadau, Bauchi State.
A FRAMEWORK FOR INTERNET PROTOCOL VERSION4 ADDRESS
GENERATOR IN A ROUTING AND SWITCHING ENVIRONMENT’S
*MUHAMMAD ALIYU1 *ILIYA MUSA ADAMU2 *MAIDORAWA, AHMADU3
*KULIYA MUHAMMED4
*Department of Computer Science, Federal Polytechnic, Bauchi, Bauchi State (Nigeria).
ABSTRACT
This paper targeted and produced an IP address framework to grant access to users /
network engineers in a routing and switching environment who wish to generate IP
addresses at an accurate and real time. Each subnet of the IP Address generated creates
identification as a sperate network on its own. The generation includes; Broadcast Ids,
Subnet mask and IP Addresses PIN. The system is capable of generating valid IP addresses.
The generated IP addresses will now be assigned dynamically to every host or router
interface on the network. The developed system is strongly recommended for ISP’s and
network engineer’s. . A competitive analysis based on research was conducted, feasibility
study carried out as the system implemented in a platform using ASP.NET, whereas the
codes are implemented in Visual Basic(10.0) and integrated with SQL Server 2005.
Keywords: Protocol, Internet, Broadcast, Network, Subnet mask
General Background
Owing to the fact that the world is now becoming a global village, virtually every
documented kind of job (file) over a long geographical terrain requires some level of
computer network (Alamda , 2002).
In (Jeffrey, 2000) building a network can be very simple, given the right tools and a basic
understanding of how they work together can make the network not to function.
With networks, starting small and planning to grow makes perfect sense. Even a modest
network can pay large dividends by saving time; improving communication between faculty,
students, and parents; increasing productivity; and opening new paths to learning resources
located anywhere in the world. In this respect, networks are like cars, one need not to know
the details about how the engine works to be able to get where you need to go.
The computer revolution has made internet protocol address, one of the most important post
World War II technologies. The proliferation of cheap, powerful Information processing and
computerization control systems has altered the way in which data is being transferred over
1
a network. This has brought about an increase in the speed, scale of processing, efficiency
in computer and network devices communication of which has continued to have a profound
effect on the way packets (“smaller data”) are being manipulated across a network (Evi etal,
2001).
Internet protocol (IP) address is an address, which was designed to allow hosts on one
network to communicate with a host on a different network regardless of the type of Local
Area Network (LAN) the hosts are participating in. It also allows hosts to communicate with
hosts on the same network.
IP addresses can be assigned either statically or dynamically (Cisco Discovery, 2006).
With a static assignment, the network administrator must manually configure the network
information for a host. At a minimum, this includes the host IP address, subnet mask and
default gateway. Static addresses have some advantages. For instance, they are useful for
printers, servers and other networking devices that need to be accessible to clients on the
network. If hosts normally access a server at a particular IP address, it would not be good if
that address changed. Static assignment of addressing information can provide increased
control of network resources, but it can be time consuming to enter the information on each
host. When entering IP addresses statically, the host only performs basic error checks on the
IP address. Therefore, errors are more likely to occur.
When using static IP addressing, it is important to maintain an accurate list of which IP
addresses are assigned to which devices. Additionally, these are permanent addresses and
are not normally reused.
On local networks it is often the case that the user population changes frequently. New users
arrive with laptops and need a connection. Others have new workstations that need to be
connected. Rather than having the network administrator assigning IP addresses for each
workstation, it is easier to have IP addresses assigned automatically. This is done using a
protocol known as Dynamic Host Configuration Protocol (DHCP).
DHCP provides a mechanism for the automatic assignment of addressing information such
as IP address, subnet mask, default gateway, and other configuration information. DHCP is
generally the preferred method of assigning IP addresses to hosts on large networks since it
reduces the burden on network support staff and virtually eliminates entry errors. Another
benefit of DHCP is that an address is not permanently assigned to a host but is only leased
for a period of time. If the host is powered down or taken off the network, the address is
returned to the pool for reuse. This is especially helpful with mobile users that come and go
on a network.
Organizations with thousands of hosts rarely have them all in one place. Some organizations
wanted to separate individual departments from each other for security or management
purposes (Jeffery, 2000).
A primary type of packet forwarded on a network is the broadcast packet. Broadcast packets
are forwarded to all hosts within a single logical network. With thousands of hosts on a
2
single network, sending broadcast traffic, and limited bandwidth available, network
performance significantly decreased as more hosts were added.
To solve these problems, the organizations leading the development of the Internet chose to
partition their networks into mini-networks, or subnetworks, using a process called
subnetting. How can a single IP network get split into multiple networks so that each subnet
is treated as a separate network?
Request For Comment (RFC) 917, defines the subnet mask as the method routers use to
isolate the network portion from an IP address. When a router receives a packet, it uses the
destination IP address in the packet and the subnet masks associated with the routes in its
routing table to determine the appropriate path on which to forward the packet (cisco
discovery, 2006).
Lack of proper utilisation of IP addresses can make organisations purchase lots of addresses
there by leading to waste of IP addresses. This can increase the global threat of running short
of IP addresses.
Related Literature
Communication Protocol
As the user data is processed down through the protocol stack, each layer adds an
encapsulation at the sending host. Data is transmitted "over the wire" at the link level, left to
right. The encapsulation stack procedure is reversed by the receiving host. Intermediate
relays remove and add a new link encapsulation for retransmission, and inspect the IP layer
for routing purposes (Berdal, 2004).
The communications infrastructure of a network consists of its hardware components and a
system of software layers that control various aspects of the architecture. While the hardware
can often be used to support other software systems, it is the design and the rigorous
standardization process of the software architecture that characterizes the Internet and
provides the foundation for its scalability and success. The responsibility for the architectural
design of network software systems has been delegated to the Internet Engineering Task
Force (IETF). The IETF conducts standard-setting work groups; open to any individual,
about the various aspects of Internet architecture (Noveck, 2009).
The principal methods of networking that enable the Internet are contained in specially
designated RFCs that constitute the Internet Standards. Other less rigorous documents are
simply informative, experimental, or historical, or document the Best Current Practices
(BCP) when implementing Internet technologies.
The Internet standards describe a framework known as the Internet protocol suite. This is a
model architecture that divides methods into a layered system of protocols (RFC 1122, RFC
1123). The layers correspond to the environment or scope in which their services operate.
At the top is the application layer, the space for the application-specific networking methods
used in software applications, e.g., a web browser program. Below this top layer, the
transport layer connects applications on different hosts via the network (e.g., client–server
3
model) with appropriate data exchange methods. Underlying these layers are the core
networking technologies, consisting of two layers. The internet layer enables computers to
identify and locate each other via Internet Protocol (IP) addresses, and allows them to
connect to one another via intermediate (transit) networks. Last, at the bottom of the
architecture, is a software layer, the data link layer, that provides connectivity between hosts
on the same local network link, such as a local area network (LAN) or a dial-up connection.
The model, also known as TCP/IP, is designed to be independent of the underlying hardware,
which the model therefore does not concern itself with in any detail. Other models have been
developed, such as the Open Systems Interconnection (OSI) model, but they are not
compatible in the details of description or implementation; many similarities exist and the
TCP/IP protocols are usually included in the discussion of OSI networking (Cisco
Discovery, 2009).
The most prominent component of the Internet model is the Internet Protocol (IP), which
provides addressing systems (IP addresses) for computers on the Internet. IP enables
internetworking and in essence establishes the Internet itself. IP Version 4 (IPv4) is the initial
version used on the first generation of today's Internet and is still in dominant use. It was
designed to address up to 4.3 billion (109) Internet hosts. However, the explosive growth of
the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011, when
the global address allocation pool was exhausted. A new protocol version, IPv6, was
developed in the mid-1990s, which provides vastly larger addressing capabilities and more
efficient routing of Internet traffic. IPv6 is currently in growing deployment around the
world, since Internet address registries (RIRs) began to urge all resource managers to plan
rapid adoption and conversion (Jeffery, 2000).
IPv6 is not interoperable with IPv4. In essence, it establishes a parallel version of the Internet
not directly accessible with IPv4 software. This means software upgrades or translator
facilities are necessary for networking devices that need to communicate on both networks.
Most modern computer operating systems already support both versions of the Internet
Protocol. Network infrastructures, however, are still lagging in this development. Aside from
the complex array of physical connections that make up its infrastructure, the Internet is
facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by
technical specifications or protocols that describe how to exchange data over the network.
Indeed, the Internet is defined by its interconnections and routing policies (Badger, 2003).
Routing
Internet packet routing is accomplished among various tiers of Internet Service Providers
(ISP’s). Internet Service Providers connect customers to customers of other ISPs. At the top
of the routing hierarchy are ten or so Tier 1 networks, large telecommunication companies
which exchange traffic directly across to all other Tier 1 networks via unpaid peering
agreements. Tier 2 networks buy Internet transit from other ISP to reach at least some parties
on the global Internet, though they may also engage in unpaid peering (especially for local
4
partners of a similar size). ISPs can use a single upstream provider for connectivity, or use
multihoming to provide protection from problems with individual links. Internet exchange
points create physical connections between multiple ISPs, often hosted in buildings owned
by independent third parties. Computers and routers use routing tables to direct IP packets
among locally connected machines. Tables can be constructed manually or automatically via
Domain Host Configuration Protocol (DHCP) for an individual computer or a routing
protocol for routers themselves. In single-homed situations, a default route usually points
"up" toward an ISP providing transit. Higher-level ISPs use the Border Gateway Protocol to
sort out paths to any given range of IP addresses across the complex connections of the
global Internet. Academic institutions, large companies, governments, and other
organizations can perform the same role as ISPs, engaging in peering and purchasing transit
on behalf of their internal networks of individual computers. Research networks tend to
interconnect into large subnetworks such as GEANT, GLORIAD, Internet2, and the UK's
national research and education network, JANET. These in turn are built around smaller
networks (Pastermark, 2006).
Methodology
Approach:
In this work, two approaches that are namely qualitative and quantitative are considered.
The quantitative approach is a process of inquiry based on testing a theory composed of
variables, measures with number and analyzed using statistical techniques. It is also viewed
as a process of building a complex and holistic picture of the phenomenon of interest,
conducted in a natural setting. The goal of quantitative method is to determine whether the
predictive generalization of a theory holds true, while the goal of the qualitative method is
to develop an understanding of social or human problem from multiple perspectives (Karim,
2008).
Approaching the development of an intelligent subnetting system, Service Oriented
Architecture (SOA) is considered. SOA is cooperated with a broad range of capabilities,
technologies, tools, and set of skill such as managing the services lifecycle- throught the
finding, applying, evolving, and maintaining service. SOA will be use because it is an
architectural style that guides all aspects of creating and using business processes. SOA is
capable of establishing a platform and programming model, which include connecting,
deploying, and managing services within a specific runtime platform. And finally the newly
approach for the development of subnetting tool will be considered as the available option
to develop the system.
System Design
Database Design
The system database was designed using MySQL server 2007 Version (2.5) because it has
a helpful interface that allow user to create tables and develop database without much
technical skill required. The author decided to use MySQL database, because the PHP
already come along with it as backend, which allow easy connection between them.
5
Table 1: output table
Fields
CIDR
No. of subnet
No.of host / subnet
Block size
Network id
IP ID
Broadcast ID
Table2:input table
Fields
Surname
First name
Other names
Phone no.
Email id
User id
Password
Check
IP Address
Type
Varchar(11)
Varchar(11)
Varchar(11)
Varchar(11)
Varchar(11)
Varchar(11)
Varchar(11)
Expected input
Alphanumeric
Numeric
Numeric
Numerics
Numeric
Numeric
Numeric
Type
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Size
20
100
100
100
1000
1000
1000
Expected input
String
String
String
Numeric
Alphanumeric
String
Alphanumeric
Boolean
String
Size
20
20
20
20
20
20
20
2
5
Table1 and table2 above shows the output and input fields, data types, and the various sizes
the system will accept.
Interface Design
The front-end of the system was designed and implemented using the Macromedia
Dreamweaver 8 (PHP). The Dreamweaver and the MySQL server can run on a single
platform
1
Input Interface
To effectively carryout easy and documented subnetting, the program must be presented
with the required data to the program. This is inputted to the program through the data
statement and the input statement.
2
Output Interface
The objective of any system design is to produce an accurate and efficient output; the
system being developed has been targeted to make design and subnetting more efficient.
Program Design
Algorithm adopted
6
Procedure: subnetting IP( IP Address, Subnets, Binbits, N.Smask, INCR)
This algoritm splits an IP adress into subnetts
1.
[32bit IP address?]
If IP address ≠4octect group,
Then Print : INVALID ADDRESS
and return
2.
Subnets=binbits Required
3.
[Reserve bits in subnetmask and determine the increament]
Assume 0=hosts, 1=network;
N.Smask = Increament (Numb of binbits) by netwok bits;
decreament (Numb of bits) by Host bits
OR;
Number of one’s = N.Smask
INCR= decimal possition of Lowest Network bit
4.
Use the increament to determine the network range
If O.Smask = 1st Octect
Then INCR= INCR+2nd IPOCTECT ELSE;
If O.Smask = 2nd Octect then INCR= INCR+3rd IPOCTECT ELSE;
If O.Smask = 3rd Octect then INCR= INCR+4th IPOCTECT ELSE;
5.
Return
The System Block Diagram
This block diagram depicts the various blocked representation of how the system works. It
shows how the system is being related, and the various blocked function of the system. The
diagram depicts the role of the various components and how they relate to the database.
Username
Valid username
and Password?
articl
es
eve
nts
chat
contac
t
tuitor
Figure 1: system block diagram
7
IP
address
generat
or
Databa
se
Class Diagram:
The reason of using a class diagram is for the system developer to better understand and
explain how the systems classes, attribute, and their relationship with classes are, the use of
Class Diagram become mandatory. Therefore, this system developer realized the use of such
powerful design tools and decide to used it in order to proper plan what should be in the
system interface, internal operations of the system, and the system behavior. The below class
diagram indicates administrator and users functions such as login into the system, generating
IP address, uploading document, admin adding Users, chat forum, users comment and many
more functions as shown.
System Class Diagram
«interface»
Forget password
New user
Check availability
Forget password
User sign-In
-add username : string
-email : string
-password : string
+editprofile() : bool
Check availabiity
Home page
Sign-in form
-about us
-Contact us
-Browse site
-admin log-in
-user log-in
-user sign-up
-user sign-out
-give feedback
Admin log
Check availability
Forum
User name()
Password()
-chat
«interface»
Sign-in form
-exchange idea
Training material
-List of features
-upload Books
-download
-view
-comment
IP Generator
Books store
Social News
-list of features
-update social news
-comment
-removel
-List of features
-Generate
IP Address
-upload
Books
-download
-view
-comment
-CIDR and classful
+addstudent() : bool
-Subnet ,ast
Search
-comment
-upload
-update
-save
+addpayment() : bool
Figure 2: System Class Diagram:
TESTING
Testing in any developed system is mandatory.The aim of the system testing is to check
system functionalities and the features in order to find an error, as many as possible and look
into change it during the system maintenance.
8
Result
After the system development and implementation, the next stage is to get result of the newly
developed system. Administrator and user requirements are gathered and laid on to get result
of the newly developed system. It shows what the system provides after the interraction
between the front end and the back end.
IP Address Generator Report
Various subnets have their respective broadcast addresses. The system has the capability to
generate both the classful and classless subnetting.
However, fixed-length subnet masks (Classful) can waste a significant number of IP
addresses. For example, an organization with one site has approximately 8,000 hosts and
three other locations with 1,000, 400, and 100 hosts, respectively. With a fixed-length subnet
mask, each subnet would have to support at least 8,000 hosts, even the one assigned to the
location needing only 100 addresses.
Variable length subnet masking (VLSM) helps to solve this issue (Classless). VLSM
addressing allows an address space to be divided into networks of various sizes. This is done
by subnetting subnets. VLSM saves thousands of IP addresses that would be wasted with
traditional classful subnetting.
IPAG can generate both the classful and classless subnets.
Figure 2: Subnetted Ip addresses
9
The figure above shows the depiction of the classful sunets. It shows the fixed number of
subnets that can be found per subnet.
Figure 3: classless subnetting
The figure above shows the classless subnetting. User is required to supply the subnet ID
and the broadcast ID. The system can now use the selected number of borrowed bits that the
user slected to generate the available usable host IP addresses.
DISCUSSION
Validation of Result
The manual method and the computertised IPAG sytem were tested and found to be
producing the same result. Using the adopted algorithm; an IP adress 192.168.10.0 if it was
to be subnetted;
Manually;
192.168.10.0 with a default subnetmask 255.255.255.0. Creating four subnets will require a
network engineer to borrow 2bits from the host portion of the subnetmask and add it to the
network portion.
11111111.11111111.11111111.00000000 old subnet
11111111.1111111.11111111.11000000
newsubnet
 255.255.255.224
Or /26.
Increament is going to be at the lowest network bit= 64
Table5 : manual subnet result of 192.168.10.0 /26
Network ID
Broadcast ID
Usable host addresses
192.168.10.0
192.168.10.63
192.168.10.1 - 192.168.10.62
10
192.168.10.64
192.168.10.128
192.168.10.192
192.168.10.127
192.168.10.191
192.168.10.255
192.168.10.63 - 192.168.10.126
192.168.10.127 - 192.168.10. 190
192.168.10.193 - 192.168.10.254
Fig4: network ID’s and broadcast ID
Fig5:Usable host addresses
11
Fig6: Usable host addresses
Conclusion
Internet protocol Address Generator(IPAG) in a routing and switching environment has been
tested and found functioning effectively in solving the problems of manual calculation and
generation. It allows the storage of the IP addresses in the computer database system so as
to eliminate the use of paper documentation which is volatile to destruction. Also, there will
be better management of generated result and other relevant information with high degree
of accuracy and speed. This work is strongly recommended to ISP’s and network engineers.
REFERENCES
Alamda C.A (2002). Sybex IncNetwork Plus study guide. The GIS Book Onward Press,
USA.
Anthony B. (2003), A reachability-based access control model for networks Proceeding to
DBSocial
Database
and
social
networks
Available
at
http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/2000000/1996419/p31abdessale
m.pdf?ip=194.80.131.5&CFID=28218926&CFTOKEN=18553935&__acm__=130880053
6_9f5c3ea632726b7d826ef0ed9b70860d accessed on 23rd July, 2012
Berdal S. and Dorothy N. (2004), Subnetting make easy: Conceptual foundation and
research issues in MIS Quarterly March 2001 Vol. 25. No, 3. Pp 107-136.
Cisco discovery curriculum (2009).
Evi N., Garth S., Trent R., Ben W. (2011); Unix and Linux System Administration
Handbook 4th Edition. Pp 76-96
James P. (2007), AN explorative study on the role of network structure and knowledge
processing orientation in work unit knowledge management SIGMIS Database, Vol
38(2),
ACM
http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/1250000/1240620/p8song.pdf?ip=194.80.131.5&CFID=28530829&CFTOKEN=10413157&__acm__=1
308927328_d4589be8611cfc6fb54640f77d1e9faf accessed on 24th July, 2012
Jeffrey, W. ; (2000) - Designing a network. The comp field press, London. Pp 113150
12
Karim A. (2008), Network Topology handbook.
Noveck R. (2009), Building a signed network from interactions in wikipedia Proceeding to
DBSocial
Database
and
social
networks
Available
at
http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/2000000/1996417/p19m
aniu.pdf?ip=194.80.131.5&CFID=28218926&CFTOKEN=18553935&__acm__=1
308800208_d98673f37bd7a95530dc68d0c36ae490 accessed on 23rd August. 2012
13
14