Selecting Controllers For Networking Environment



Similar documents
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Firewall Defaults and Some Basic Rules

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Multi-Homing Security Gateway

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

Multi-Homing Gateway. User s Manual

Firewall Firewall August, 2003

LAN TCP/IP and DHCP Setup

Lab - Configure a Windows 7 Firewall

Ethernet Port Quick Start Manual

FortKnox Personal Firewall

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

Networking Basics for Automation Engineers

Lab - Configure a Windows XP Firewall

Configuring the WT-4 for ftp (Ad-hoc Mode)

EXPLORER. TFT Filter CONFIGURATION

Optimum Business SIP Trunk Set-up Guide

Broadband Phone Gateway BPG510 Technical Users Guide

UIP1868P User Interface Guide

Introduction to Network Security Lab 1 - Wireshark

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

About Firewall Protection

PART IV. Network Layer

Computer Networks I Laboratory Exercise 1

Transport and Network Layer

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Device Installer User Guide

1. Firewall Configuration

Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons

E-Mon Communication Gateway Utility Instructions for BACnet/mstp

Basic Network Configuration

Lab - Configure a Windows Vista Firewall

Protecting the Home Network (Firewall)

How to configure DVR and computer for running Remote Viewer via IP network

Chapter 4 Managing Your Network

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

Implementing Network Address Translation and Port Redirection in epipe

IP Filter/Firewall Setup

Network Configuration Settings

Lab Conducting a Network Capture with Wireshark

Networking Test 4 Study Guide

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version /2004

BASIC ANALYSIS OF TCP/IP NETWORKS

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

Network Terminology Review

Follow these steps to prepare the module and evaluation board for testing.

Computer Networks/DV2 Lab

1 PC to WX64 direction connection with crossover cable or hub/switch

Packet Tracer 3 Lab VLSM 2 Solution

Chapter 3 LAN Configuration

SSVP SIP School VoIP Professional Certification

Multifunctional Broadband Router User Guide. Copyright Statement

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Technical Support Information Belkin internal use only

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

Configuration Guide. DHCP Server. LAN client

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools

Network Scanner Tool R3.1. User s Guide Version

Chapter 8 Router and Network Management

Installing and Setting up Microsoft DNS Server

Configuring a Backup Path Test Using Network Monitoring

2. IP Networks, IP Hosts and IP Ports

Software installation and configuration IEC-line series

Guideline for setting up a functional VPN

MN-700 Base Station Configuration Guide

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Troubleshooting Tools

How To Check If Your Router Is Working Properly

How to connect your new virtual machine to the Internet

Chapter 12 Supporting Network Address Translation (NAT)

Windows Server 2008 R2 Initial Configuration Tasks

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Connecting to and Setting Up a Network

Lab PC Network TCP/IP Configuration

Cisco CNR and DHCP FAQs for Cable Environment

BioStar Config Guide V1.0

Citrix Access Gateway Plug-in for Windows User Guide

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

Configuration Notes 0215

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Information Security Practice II. Installation and set-up of Web Server and FTP accounts

Setting Up Your FTP Server

Part A:Background/Preparation

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Appendix D: Configuring Firewalls and Network Address Translation

MaxSea TimeZero NN3D Radar Connection Checklist

Question Question Question EdTech 552: Lab 3 Answer Sheet

Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.

Configuring the WT-4 for ftp (Ad-hoc Mode)

Debugging Network Communications. 1 Check the Network Cabling

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP)

Transcription:

Selecting Controllers For Networking Environment Prof. Dr. Alaa AL-Hamami* Soukaena Hassan Hashem** Abstract: Internet is network of networks; the Internet has numerous numbers of Internet sites. Many of these sites are sensitive and protected against the intentional hostile intrusion by strong protection systems. Most of these sites used the firewall protection system to protect them although the protected sites, networks, differs in architectures, addressing, computations and another maters. This paper concentrates on implementation of a proposed protection system on any Internet site with high performance, by control and detects most of networking environment parameters. Such as ports, listening to ports, IP addresses, IP conversion, IP scanning, ping, ping listening, online/offline operations, times of synchronization, TCP/IP requirement, routing operations, Application Programming Interface (API) calls. Keywords: Internet, protection, control, detect. 1- Introduction: To contact with the proposed networking controller first we must identify the important parameters of the proposed controller. Site is a piece of land; exploited for some benefits work. Internet site may be computer, Local Area Network (LAN), or multiple LAN(s) over a piece of land such as university, collage, government agency, office, company, organization, or individual [2,1]. Ports usually ports predefined (0 to 255) to well known applications (i.e., FTP and E-mail). Undefined ports are provided as well, allowing operating system to define their own ports when necessary [3]. For example TELNET connection has number 23 [4]. * Department of Computer Science of Al-Rafidian University College. 1

** Department of Computer Science and Information System of the University Of Technology. IP Addressing Each 32-bit IP address is divided into two parts: a prefix and suffix; the two-level hierarchy is designed to make routing efficient. An IP address is a 32-bit long and is commonly expressed as a four decimal number ranging from 0 to 255, with each number separated by a dot [5]. The address prefix identifies the physical network to which the computer attached, while the suffix identifies an individual computer on network [6]. Ping is an Internet Control Message Protocol (ICMP) echo request and replay packets, where ICMP is a protocol used by IP when sends an error message and ICMP uses IP to transport messages [6]. Online/ Offline operations detect the computation of specified host was online or offline. Routing When connecting networks together to form the Internet, the most important protocol is called, not surprising Internet protocol (IP). The Internet protocol is responsible for getting packets of information moved from one network to another, via process called routing. The IP protocol depends 32-bit addressed that uniquely identify each computer (called host) and network. Application programming Interface The interface an application uses when it interacts with transport protocol software is known as an Application Programming Interface (API), it is a bare-bones set of functions provided by the operating system, also is a specific method prescribed by a computer operating system so that a programmer writing an application program can make request of the operating system. An API can be contrasted with an interactive user interface or a command interface as an interface to an operating system. So it represent interface between an application program and the communication protocols in an operating system [6]. 2- The Proposed System Controllers: The proposed system controllers contained in a main menu. This part is the basic level to implement the proposed protection system, the main menu contains all the controllers. It has ten controllers on the right side and other tens on the left side, as shown in figure (1). In addition there are two menu controllers bars in the top of the main menu has the following fields. FILE which contain only Exiting option, View which contain the setting controller and tool bars, TOOLS which contain all the controllers with their specific keys, HELP contain all the information related with the proposed system and the addresses of the site developed the proposed system. The bottom bar contains the product's copyright, IP address of the computer, and the host name of the computer. As shown in figure (2). 2

Bandwidth Monitor IP Address Scanner IP Calculator IP Converter Dot/Long Net State Online/Offline Checker Ping Ping Listener Port Scanner Resolve Host or IP TCP/IP Configuration Time Synch Trace Route Whois & MX lookup States Setting Check for Update Web Page About Software Exit Figure (1) Main menu with arrows detects the names of all the controllers. Figure (2) The main menu with menu bars at the top and bottom. 2.1- Bandwidth Monitor Controller menu: This menu detect the most important physical parameter, bandwidth, which determine rate of data transmitting ( sent & received) in kilobyte per second. Estimate both the speed for upload and download. By this controller the system regulates the sent and received packets by the direct and dial up connections. See figure (3). 3

Figure (3) The bandwidth monitor menu. 2.2- IP Address Scanner Controller menu: This menu present the start address for scanning as the address of the computer installed on it, and the end address is the last address scanned on the network. The range of the scanned addresses determined by the class of IP address, for example the start IP address is 169.254.121.189 and the class was C then the end address is 169.254.121.255. This controller response to detect all nodes related with the network and mentions their host name if the user want that. There are two buttons in the bottom of the menu the first named Begin Scan response to activate the scanning operation ( through scanning operation the name of the button changed to Stop Scan if the user want to end the scan before it complete) and after the scanning complete would display a message detect the numbers of the nodes related with it. The second button named Close response to close the menu. See figure (4). Figure (4) display the IP scanner when IP scanner operation activated and detected. 2.3- IP Calculator Controller menu: This menu detect the IP address of the computer installed on it, the subnet mask related with the IP address, and the network identification connected to it this computer, see figure (5). This controller is a tool for administrator control, it check if the IP address and subnet mask they are suitable with the network or not. 4

This menu has five buttons. The button named Compute Now response to the following operations: Calculate binary information for the IP address, subnet mask, and network ID. Calculate networking information represented by detect the IP Address Class, Address Type, and last ask if the IP address suitable with the host and give the reason. Calculate subnetting information represented by detect the numbers of the subnetworks, numbers of the host, and last the range. Calculate the network ID and the broadcast ID. The second button named Reset response to repeat the work on the menu from beginning. The third Default Mask detected according the IP address if the IP address was class C then the default mask is 255.255.255.0. The fourth button named Save To File save all the information in the IP calculation menu to file. The five button Close response to close the IP calculation menu. In the proposed system this menu gives all the information related to the host connected to a network. Figure (5) The IP calculation menu. 2.4- IP Converter - Dot IP to Long / Long IP to Dot- Controller menu: This menu response to convert the Dot IP address to long IP address and vice versa, also detect IP information, network information which include network class / network number / local host number, and represent the both Dot IP address and Long IP address to binary, see figure (6). This controller convert the doted IP to long IP to perform all the computation operation related with it. This menu have three buttons, the first button named Dot IP address to "long" response to convert the doted IP address to long IP address. The second button named "long" To Dot 5

IP Address response to convert the long IP address to doted IP address. The third button named Close response to close the menu. Figure (6) The IP converter menu after use the Dot IP address To "Long". 2.5- Net Statistical Controller menu: This menu support two options, as shown in figure (7) they are: Use Net Statistical With API: When using this option the user will use Net Stat which is used with direct API calls to windows. It suitable for the user but its work completely depends on functions written by users so it has lowest fast from the second option. Use Net Statistical Built In To Windows: Use this option if the user have problems with the first option. When using this option it will use the built in Net Stat that comes with windows. It is very fast in the working, but it is bad and difficult for the user because it depend on commands. If the user choose the second option then would appear second menu display the Net Stat in windows. This new menu appear as an empty list when the user click the Update button then the results would appear later. As shown in figure (8). This menu has two buttons the first named OK response to activate the option that it selected by the user. The second named Close response to close the menu. Figure (7) The Net Stat menu. Figure (8) Net Statistical in windows contained in Net Stat menu. 2.6- Online / Offline Checker Controller Menu: This menu determine the connected sites and their statues. The statues either be (Online or Offline). The menu has four buttons. The first button named Check response to check the statues for one site selected by the user. The second button named Check All response to check the statues of all the sites founded in that 6

menu., The third button named Edit List has new menu response to add new IP addresses, remove selected IP addresses, and last save and exit as shown in figure (9). Figure (9) The online / offline menu. 2.7- Ping Controller Menu: This menu control the pings call. It contains the IP / Host address, number of the pings and last the number of the packet. The ping controller response to check specific site if it is work or may be has a wrong in physical operation, such as the channel may be destroyed. It contains two buttons, as shown in figure (10). The first one named Ping response to display the information about the pings, as shown in figure (11). The second named Close response to close the menu. Figure (10) The ping menu. Figure (11) The ping information menu contained in ping menu 2.8- Port Listener Controller Menu: This menu to listen to the specific determined ports, related to specific determined protocol such as TCP or UDP, it has three buttons as shown in figure (12). This controller response to detect the port work or not, only make request for communication on specific port. The first button named Listen if it clicked then the server begin to listen to the selected port on choice protocol. As shown in figure 7

(13). The second button named Stop response to stop the listen of the server if that needed by the user. The third button named Close response to close the menu. Figure (12) port listener menu Figure (13) The menu of listen on UDP protocol contained in port listener menu 2.9- Port Scanner Controller Menu: This menu makes scanning on all the ports from (1) to (65535) it provide the IP address, and has five buttons, as shown in figure (14). This controller detects each port work or not it very important to check the ports of the protected site from the time to time. Figure (14) port scanner menu The first button named Scan response to activate the port scanning operation and detect the ports in list called open ports. The second button named Stop response to stop the port scanning operation if that needed by the user. The third button named Clear response to clean up the list called open port. The fourth button named Save To File response to record a report about the results of the port scanning operation, The fivth button named Close response to close the menu. 8

2.10- Resolve Host Or IP Controller Menu: This menu response to convert the host name of the computer to it is IP address and vice versa. this menu has two buttons, as shown in figure (15). The first button named Get response on converts the Host name of the computer to the corresponding IP address. The second button named Get Host Name response to converts the IP address to the host name of the computer. Figure (15) The Get operations in resolve host or IP. 2.11- TCP/IP Configuration Controller Menu: This menu get all the information and fixed information about the TCP/IP configuration related with host connected to the site, as shown in figure (16). These information are adapter name, adapter type, adapter address, IP address, subnet mask, default gateway, DHCP server it is a technique used to detect if there are servers communicate at the time with our server or not. Primary WINS server and secondary WINS server response for the IP forwarding and direct filtering, lease obtained, lease expires and DHCP enable. Also there are fixed information they are host name, node type, net bios scope ID, DNS server, if IP routing enabled, if WINS proxy enabled. 9

Figure (16) TCP / IP configuration menu. 2.12- Time Synchronization Controller Menu: This menu response about detects the synchronization time, as shown in figure (17). In the Internet there is a clock, there is a specific port to communicate with it called clock. It is return the times that we are communicate in it, or detect the real time on the Internet. Figure (17) Time synch menu. 2.13- Trace Route Controller Menu: This menu support two options, as shown in figure (18) they are: Use Trace Route With API: When using this option the user will use trace route used with direct API call to windows. Use Trace Route Built In To Windows: Use this option if the user have a problem with the first option. When using this option it will use the built in trace route that comes with windows. If the user choice the second option then would appear second menu display the Trace Route in windows. This new menu appears as an empty list when the user click the trace route button then the results would appear after moments. As shown in figure (19). This menu has two buttons the first named OK response to activate the option that it selected by the user. The second named Close response to close the menu. 10

Figure (18) The trace route menu. Figure (19) Trace route built in to windows contained route menu. 2.14- Whois & MX lookup Controller Menu: This menu store the sites of the internet in the MX lookup and when the user want to communicate with one of these site, only write the name of the site in the space after www. And click the lookup button. Then the built in DNS convert the site name to it is corresponding IP address, as shown in figure (20). Figure (20) The whois & MX lookup menu. 2.15- Statistical Controller Menu: This section declare all the statistically of TCP, IP, ICMP ( IN), ICMP (OUT) protocols, as shown in figure (21). For example in IP the time to live statistical. All these information may be changed and updated continuously. Figure (21) The statistical menu. 2.16- Setting Controller Menu: 11

This menu response to set some parameters such as enable sound in the start of the software and shutting down, also begin the software as maximized picture, last enable the bandwidth meter, as shown in figure (22). Figure (22) The setting menu. 2.17- Check For Update Controller Menu: This menu response to checking for the updating of the system for all it is releases and versions. This menu include many fields always would be updated such as current version, update version, update release date, update file name and file size. The button response to activate the checking and updating named Information, when it clicked all the information of updating would be displayed in the list beside it, as shown in figure (23). Figure (23) The check for update menu. This menu also include information on file down load progress such as total size, received size speed, time remaining, elapsed time. The button named update response to file down load progress. 2.18- About CS Internet Tools Controller Menu: This menu response to declare the name of the company, CS Internet Tools, version of the proposed system, the product label, coy rights, and last the web of the 12

proposed company, as shown in figure (24). This menu has Information System button response to display all the information related with the proposed controllers, as shown in figure (25). Figure (24) About controller. Figure (25) the information menu contained in about CS internet tools menu. For information about the product connect with the web of the proposed company, as shown in figure (26). Figure (26) The request of information menu 2.19- Web Page Controller Menu: This menu is response to make the interaction between the users inside the site and the users outside it. This menu would display all the downloaded and uploaded files. 2.20- Exit Controller : This controller response to exit from the proposed system controller. Exit the controller and then return to windows desktop. 3- Conclusions: 13

The study shows that, to protect an Internet site by any proposed protection system at first we must have powerful knowledge about the site environment. By using the proposed controller system. The site administrators would detect numbers of nodes in the site, the type of the addressing and all the information related with it. Also the open ports, the statistically of transmission protocols, TCP/IP configuration for each node, routing information, information about any site the administrators want to communicate with it and another important parameters. All that would simplify the implementation of the proposed protection systems on any site. 4- References: 1- IDG S 3D Visual series, Internet and World Wide Web Simplified, Maran Graphics, Ins,1995. 2- Halsall.F., Data Communication,Computer Networks and Open System, Fourth Edition, Addision-wesley Publishing Company Inc., 1996. 3- Russell.T., Telecommunication Protocols, Second Edition, Mc- Graw Hill Companies,Inc.,2000. 4- Buchanan.W., Advanced Data Communications and Networks, First Edition,Chapman,Hall,1997. 5- Held.G., Understanding Data Communication, Fifth Edition, Prentice-Hall, 1998. 6- Comer.D.E., Computer Network and Internets with Internet Application,Third Edition, Prentice-Hall, Inc., 2001. 14

الخالصة: Selecting Controllers For Networking Environment أ.د عالء حسين الحمامي* سكينة حسن هاشم** االنترنيت شبكة من الشبكات. يتكون من عدد اكثرهاا المواقع من جدا" كبير تكاون محمياة ضد التطفل الحتوائها على معلومات سرية وذلك على االغلب أنظماة بواساطة جادران الناار على الرغم من اختالف المواقع في معمارياتها وعنونتها و قضايا اخرى. هذا البحث يركز علاى أي امكانياة تنفياذ نظاا حماياة مرتارل علاى أي موقاع ماع فعالياة عالياة مان خاالس السايطر علاى بي اة الشابكة فاي الموقاع و تحدياد كال العوامال والتاي بهاا المتعلراة تشمل ports, listening to ports, IP addresses, IP conversion, IP scanning, ping, ping listening, online/offline operations, times of synchronization, TCP/IP requirement, routing operations, Application Programming Interface (API) calls.and aothers. 15

قسم علم احلاسبات يف كلية الرافدين اجلامعة. قسم علم احلاسبات و نظم املعلومات يف اجلامعة التكنولوجية. * ** 16