Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

CAB303 Networks: Identify the Protocol Disrupted Andnormal Behaviour

Scenario Description:

Donald is trying to download critical files from the company FTP server. When he tries to connect the server does not respond at all. He asks you for help as you are networking experts. You suspect there may be a problem with the FTP server as it appears to not be answering any requests. You decide to investigate further by examining a sample of the network traffic on the FTP server.

Tasks:

• Identify the abnormal behaviour of the protocol that is causing the interrupted service.
• Prepare a brief report for your supervisor detailing the possible causes, your proposed solutions and any limitations of those solutions. You must complete your findings in the provided template.

1.Identify the protocol disrupted and explain the normal behaviour
2.Affected header fields
3.Explain the abnormal behaviour

Answer:

Problem Details

Identify the protocol disrupted and explain the normal behaviour:

The transmission control protocol is disrupted for operation. FTP uses TCP exclusively for its transportation needs and data transfer (Myers ., 2016). This


is protocol is used other than the UDP since the protocol does not drop the packets sent between the hosts. All the packets between the client and the server are received in the way they are sent as compared to UDP. This starts with the initialization of the FTP client connection on port 21 to the server. The server listens for incoming clients and responds. Once the handshake between client and server is complete the server initiates a connection to FTP client and an active session is established for the data transfer (Jorgensen, Intellectual Ventures 2017).

Affected header fields:

Checksum flag – This field is used to ensure that data in the TCP section reaches the target destination. Checksum validation is disabled and therefore calculations based on the pseudo-header to ensure the segment reaches the target is not validated.

Window flag – Used to indicate the amount of data to be accepted by the sender. The size of the window which is a measure of the number of bytes used is not determined during data transfer.

Explain the abnormal behaviour:

ICMP Packets with a large fragment offset are dropped off, this means that no session is established between the client and the server. Traffic is therefore blocked, no incoming packets can reach the server.

Solution:

Adoption of the MTU discovery technique to prevent fragmentation. This method usually works by sending ICMP packets to the server with a DF bit. MTU message is then sent back to the client. This message contains MTU values that are used to stop the fragmentation of the protocol (Craft et al ., 2016).

When a large number of packets are sent to the server, the huge number of smaller packets are spawned. A large number of packets cause congestion since MTU is not able to handle all the packets and therefore results in some of the packets being dropped.

Limitations of Solution:

ICMP messages do not support any form of authentication, this means that the packets sent between the hosts can not be checked if valid or not. Spoofing attacks can, therefore, be performed for all the packets sent between the hosts (Sadot et al ., 2015).

Pseudo-header Field is used in the calculation of the checksum. Since checksum calculation is disabled, TCP header checksum is not calculated which affects the segments.

 

References

Myers, R., 2016. Attacks on TCP/IP Protocols. Last accessed Jan, 4.

Jorgensen, J.W., Intellectual Ventures I LLC, 2017. Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PtMP) transmission system architecture. U.S. Patent 9,712,289.

Silnov, D.S., Prokofiev, A.O., Berezovskaya, G., Perevozchikov, V.A., Troitskiy, S.S. and Shumakov, I.U., 2017, September. A method of detecting malicious actions using HTTP and FTP protocols. In 2017 Intelligent Systems Conference (IntelliSys) (pp. 1083-1088). IEEE.

Craft, P.K., Philbrick, C.M. and Starr, D.D., Alacritech Inc, 2016. TCP offload sends optimization. U.S. Patent 9,413,788.

Sadot, E. and Zilbershtein, I.E., Avaya Communications Israel Ltd, 2015. Packet fragmentation prevention. U.S. Patent 9,088,494.


Buy CAB303 Networks: Identify the Protocol Disrupted Andnormal Behaviour Answers Online

Talk to our expert to get the help with CAB303 Networks: Identify the Protocol Disrupted Andnormal Behaviour Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for CAB303 Networks: Identify the Protocol Disrupted Andnormal Behaviour Assignment Help Online

Copyright © 2009-2023 UrgentHomework.com, All right reserved.