Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What is an internet? What is the Internet?v What are the differences between an internet and the Internet? The following image shows an example of

What is an internet?

What is the Internet?v


What are the differences between an internet and the Internet?

The following image shows an example of an internet.

 

The following image shows a basic layout of the Internet.

To keep track of individual rules, you may use the # RuleNumber field. This field is not utilized by the firewall implementation.

Action = Block or Allow; Allow Rules should take priority over Block Rules.

Addresses of origin and destination are encoded in the form of the MAC address, which may be found in either the source or the destination.

# CIDR notation of xxx.xxx.xxx.xxx/xx as the seource or destination IP address

IANA defines protocol number as an integer (0-254)

If the protocol is TCP or UDP, then this is the IANA-recommended application port number.

Tracking rules will benefit from the # Comment/Note.

#

There should be a '-' character in each area that isn't being utilized for a match (except for RuleNumber/Comment).

Nullify any and all entries (i.e., have a rule like: 1, Block, -, -,...)

#

Warning: For the IP address, you must provide a network address that is suitable.

Use a subnet mask that matches the one you're using. If you wish to utilize a /16, for example,

The IP address must be x.x.0.0 if the subnet mask is #. Using an example, an address that is correct

A 192.168.10.x/24 network would be 192.168.10.x/24 if it were to be referenced. There is just one host.

A /32 divides the IP address # into 32 smaller ones. In other words, the narrator did a segment for a show.

/32 must be the only unused subnet.

#

The following are some examples of the rules:

Blocked from accessing a web server on the 10.0.1.0/24 network is the IP address 10.0.0.1, -,-,10.0.0.1/32, 6,-,80.

Rule 2 overrides the preceding rule and allows 10.0.0.1 to connect to a web server on 10.0.1.125, so long as it's on the same subnet.

 

 

 

 

 

the following is required:

 

Host 1 (IP Address 10.0.0.1) cannot access any web server on the US network (the subnet 10.0.1.0/24 network) because of the first rule. TCP IP Protocol (6) and TCP Port 80 are used by the web server.

 

In order to enable hq1 (IP Address 10.0.0.1) to access a web server on us5, the second rule overrides the first rule (IP Address 10.0.1.125)
[04/07, 12:09 pm] PayPal cashouts: It's not utilized in the firewall implementation, but it's a rule number that you may use to monitor a specific rule. Setup-firewall.py does not verify any value for this field. Match traffic and do not give rules precedence in this area, please.

 

o Block or Allow as an action Traffic that meets the remaining criteria of this rule will be blocked by block rules. As a result, the firewall's Let rules will override Block rules in order to allow specified traffic through (see below for an example). A string is the entry (Block,Allow).

 

This is the MAC address of the source and the destination. MAC Addresses may be used to identify a specific host. Use to match a certain piece of hardware in the real world. SDN-topology.py defines the MAC address of each host in the network.

 

Network Address in the form of xxx.XXXXXXXXXXX in CIDR notation for the source and destination. A single IP Address (using its IP address and a subnet mask of /32) or a specific Subnet may be matched using this method. An entry might look like this: 10.0.0.1/32. Make certain that the IP Address shown is the Network Address if you're not using /32 (individual host) as your CIDR mask.

 

Cidr notation is explained in this primer.

In an IP Address, the network and host addresses are encoded in 32 bits. Bits are split into four 8-bit chunks for a total of 32. The subnet mask /24 specifies the maximum number of bits in an IP Address that may be used to identify a specific network. 24 bits are used to identify the network and 8 are used to identify a specific host. A network address is defined by the first 24 bits (the 192.168.10), whereas a host address is defined by the last 24 bits (0). (255 hosts). For a /24, the IP must reflect the first 24 bits of the network address. The complete 32 bits of the /32 address are a network address and indicate one host. For each host, an IP address is specified in sdn-topology-py.

Protocol is defined by the IANA as an integer IP protocol number (0-254). An IP example is ICMP.

 

Protocol 1 is TCP, Protocol 6 is IP, and so on. An integer is required.

 

Source/Destination Port = IANA Application Port Number if Protocol is TCP or UDP. TCP Port 80, for example, is often used for online traffic. If you want to verify the regulations for this project, the following website is the place to go: https://en.wikipedia.org/wiki/List of TCP and UDP port numbers

To further complicate things, don't utilize ICMP port numbers to distinguish between various parts of the protocol.

 

You may use this to keep track of the regulations.

 

 

 

 

 

In your current position, you work for GT-SDN Corporation, a multinational firm with locations in China, India, and the United Kingdom, which serves as the company's data center. The following objectives must be achieved by the firewall you build:

 

 

 

• Task 1: You have two active DNS servers on the headquarters network.

the older DNS-over-TLS protocol and the more recent UDP protocol)

standard). The public DNS service provided by hq1 is available to everyone, whereas the private DNS service provided by hq2 is only accessible to the five business networks (i.e., the US, China, India, UK, and Headquarters network). In order to accomplish such policies, write out a set of firewall rules. (UDP Port 53 and UDP Port 853 are the only ports you should use)

 

 

 

Host hq3 serves as a virtual private network (VPN) server on the headquarters network and links to each of the other sites (hosts us, uk, in, and cn3).

VPN server that uses OpenVPN (standard ports - both TCP and UDP Ports 1194). configure the firewall so that only the four remote hosts (us3, uk3, in3, and cn3) may connect to the hq3 OpenVPN server. Other hosts should not be able to connect to the OpenVPN server on hq3 for any reason.

 

 

 

Task 3: Make the Headquarters network accessible through ICMP ping to all other networks across the globe (including from the us, uk, in, and cn networks). Due to firewall implementation constraints, the hq network would be able to ping the us, uk, in, and cn networks from the rest of the globe. Why? What modifications to the implementation requirements may be made so that this is possible?

 

 

 

• Task 4: Ransomware may infiltrate a business network through a remote desktop connection, either via an unsafe version of a browser or by exploiting a vulnerability in the operating system.

Microsoft Remote Desktop Protocol (MDP) or Virtual Network Computing (VNC) protocols are both acceptable options for a remote desktop server. A set of rules should be created to prohibit Internet access to the five business networks' remote desktop servers. us, and the rest of the world to participate

 

20

 

remote desktop server on the headquarters network using in and cn When using VNC or Remote Desktop, use TCP Ports 3389 and 5900.

 

 

 

• Task 5: A micro webservice on TCP and UDP Port 8500 handles financial data on hosts us3 and us4. It's recommended that this service be restricted to hosts uk2, uk3, uk4, uk5, and uk6, as well as in4, in5, us5, and hq5. Use the lowest subnet mask that handles the given hosts in CIDR notation, and keep track of their IP addresses.)

 

 

 

In order to prevent the GRE IP Protocol from entering any of the five corporate networks, complete Task 6. (i.e., the US, China, India, UK, and Headquarters network). Encapsulation protocol GRE is utilized in PPTP-based VPN connections. PPTP-based VPN connections do not use any of the ports you've blocked; only the IP protocol does.

 

 

 

#!/usr/bin/python

POX-enabled SDN firewall project for CS 6250 Fall 2020

# habit-v23-building

 

In order to evaluate your work, this file specifies the topology that will be utilized. You

Using this file as a template, you may create a slew of different firewall configurations.

All of the commands in this section are the same Mininet commands that you used in the previous section.

This is a # project. Python 3 has been used to update this document.

 

import from mininet.topo Topo

by importing from MiniNet.net Mininet

Import CPULimitedHost and RemoteController from mininet.node.

import custom from mininet.util

TCLink may be imported from mininet.link.

Import CLI from mininet.cli into your program.

 

top-level class "FirewallTopo":

'''

This class specifies the Mininet Topology for the network utilized in the project. There are a total of a total of

a number of computers and networks:

 

At the top of the food chain (hq1-hq5). 10.0.0.0/24 as a subnet

The American Broadcasting Company (ABC) (us1-us5). 10.1.0.1/24 is the subnet address.

Network of India (in1-in5). The 10.0.20.0/24 subnet

China's Internet (cn1-cn5). The 10.0.30.0/24 subnet

The UK Broadcasting Corporation (uk1-uk5). 10.0.40/10.40.20

 

To get the IP and MAC addresses of a computer, use the host definitions shown below.

'''

 

 

In the example above, the cpu is at.1, the bw is at 10, and the latency is at nil.

super(FirewallTopo,self). init__()

 

Link setup includes the hostname.

Hexagon's hconfig is set to cpu.

configuration = "bw": bw, "delay": delay;">

 

The firewall switch has been created.

self.addSwitch('s1') returns s1.

 

Hq1 = self.addHost("hq1," "10.0.0.1," "00:00:00:00:00:1e," **hconfig) hq1

in the self.addHost method, self.addHost("hq2";"ip:"10.0.0.2";"maac";"**hconfig") is called.

In this case, the value of hq3 is self.addHost(hq3; ip: '10.0.0.60', mac id '00:00:00:00:02:1e')

addHost('hq4', ip=10.0.0.63, mac: 00:00:00:00:03:1e, **hconfig) hq4 = self.addHost

Hq5 = self.addHost("hq5", "10.0.0.220", "00:00:00:00:04:1e", **hconfig) Hq5 =

self.addLink(s1,hq1)

self.addLink(s1,hq2)

self.addLink(s1,hq3)

self.addLink(s1,hq4)

self.addLink(s1,hq5)

 

mac='00:00:00:01:00:1e"; self.addHost("us1", ip='10.0.1.1', **hconfig)

"us2" = self.addHost("us2", ip="10.0.1.2", MAC="00:00:00 00:02:01:1e"), **hconfig

me = self.addHost("us3", "10.0.1.33", "00:00:00:03:02:1e");

self.addHost('us4', ip='10.0.1.34', mac='00:00:00:04:03:1e', **hconfig)

self.addHost('us5', ip='10.0.1.125', mac='00:00:00:05:04:1e', **hconfig) us5

self.addLink(s1,us1)

self.addLink(s1,us2)

self.addLink(s1,us3)

self.addLink(s1,us4)

self.addLink(s1,us5)

 

addHost in1 = self.addHost("in1", ip="10.0.20.1", mac="00:00:00:06:00:1e")

**hconfig 00:00:00:07:01:1e in2 = self.addHost("in2," ip="10.0.20.2")

**hconfig in3 = self.addHost("in3", ip="10.0.20.3", mac="00:00:00:08:02:1e");

**hconfig 00:00:00:09:03:1e in4 = self.addHost("in4", "10.0.20.126")

**hconfig 00:00:00:0a:04:1e in5 = self.addHost("in5", "10.0.20.125")

self.addLink(s1,in1)

self.addLink(s1,in2)

self.addLink(s1,in3)

self.addLink(s1,in4)

self.addLink(s1,in5)

 

**hconfig: cn1 = self.addHost("cn1," ip="10.0.30.1," mac="00000000000000000000000000")

to self.addHost(self.addHost, host, ip, mac, **hconfig) cn2 = self.addHost

In this case, the host is cn3 (self.addHost(cn3; ip='10.0.30.3; mac='00;00:00;22:00;1e', **hconfig)).

Ip=10.0.30.4, Mac=00:00:00:0e:03:1e; self.addHost("cn4", "ip")

cn5 = self.addHost('cn5', ip='10.0.30.5', mac='00:00:00:0f:04:1e', **hconfiguration)

self.addLink(s1,cn1)

self.addLink(s1,cn2)

self.addLink(s1,cn3)

self.addLink(s1,cn4)

self.addLink(s1,cn5)

 

Ip='10.0.40.1', Mac='00:00:00:10:00:1e;**hconfig;uk1', self.addHost("uk1");

In this example, the host name is "uk2" and the IP address is "10.0.40.128."

Ip='10.0.40.129', Mac='00:00:00:02:02:1e"; **hconfig); uk3 = self.addHost

(ip='10.0.40.130, mac='00:00:00:03:03:1e", self.addHost()) uk4

In this case, the uk5 host will be added to the self.addHost() function.

self.addLink(s1,uk1)

self.addLink(s1,uk2)

self.addLink(s1,uk3)

self.addLink(s1,uk4)

self.addLink(s1,uk5)

Usages of the Internet

The Internet is used for many purposes. The most common usages are the following.

Getting information

The Internet is the biggest source of the information. You can use the Internet to read newspapers and watch live news channels. Many companies publish their public information, research, and white papers on the Internet. You can use them to get information about a specific topic or know about a particular person or a thing. For example, you can use the Internet to find out who is the CEO of Google or Amazon, who is Volodymyr Zelensky, what is the latest cricket or football match score, what is the weather condition, and much more.

Entertainment

Many people use the Internet for entertainment. On the Internet, you can watch movies, listen to music, play games, and do many other activities. Many companies provide these facilities via mobile apps. Mobile apps allow you to access these resources directly on your mobile phone. If you have a mobile phone and the mobile phone is connected to the Internet, you can use such an app to watch the latest TV shows, live matches, movies, and listen to music. Netflix, Amazon prime videos, and Disney+ Hotstar are some examples of mobile apps that provide these facilities.

Education

The Internet allows teachers, instructors, and trainers to connect and teach their students and audiences virtually. By using the Internet, anyone can learn from anywhere in the world. For example, many colleges and universities provide online courses for all locations. Students can join these courses and earn certificates. In the recent Covid-19 pandemic, many schools used the Internet to provide virtual classes to their students.

Business

Companies and organizations use the Internet in many ways to expand their business. For example, they can use the Internet to show, list, and sell their products. Many companies have their business only on the Internet. Amazon, JioMart, Snapdeal, and Mantra are examples of companies that sell products online. You can also use the Internet to sell your products or buy products from other online sellers.

Social networking

The Internet allows people to connect with other people. Many social networking sites and apps allow you to connect, chat, and share events with your friends and family. Facebook, WhatsApp, and LinkedIn are some examples of websites and apps that provide social networking features.

Digital payment

People use the Internet to make digital payments. Many companies such as PayPal and Payoneer allow users to send or receive payments in digital mode. Banks offer the net banking facility to their customers. Some countries also have unique payment gateways. For example, India has UPI. UPI allows Indians to pay utility bills and send or receive money in real-time.

Scientific usages

The Internet allows many scientists from different geo-locations to work on the same project. They can also publish their research and reports on their websites, newsletters, and forums. Weather forecasting is one of the most common examples of the scientific use of the Internet. The weather department shares weather prediction reports on the Internet. By reading these reports, you can learn about the possible weather condition of a particular place.

Security usages

Many departments (such as police and defense), companies, and organizations use the Internet for security purposes. You can use the Internet to access your security devices from a remote location. For example, you can install an IP web camera in your home and access it from your office.

Navigation

Many companies such as Google and Apple provide navigation services on the Internet. The navigation service offers step-by-step instructions to reach the destination. You can use this service to find and visit a place or a location.

Advantages of the Internet

The main advantages of the Internet are the following.

  • Allow a user to connect, communicate, and chat with other users.
  • Allow a user to share its events, photos, and videos with friends and family
  • Allow companies to expand their businesses
  • Allow sellers to accept digital payments
  • Allow users to purchase things and pay bills from their homes
  • Allow users to watch movies, matches, and the latest TV shows on their mobiles
  • Allow users to find and visit any place or location

Disadvantages of the Internet

The main disadvantages of the Internet are the following.

  • Hackers use the Internet to steal money, personal information, and sensitive documents. If you use pirated software without any antivirus program and firewall, hackers can easily hack your computer and steal your private data.
  • Many people use the Internet to cheat other users. They use fake emails and websites, spam messages, and phishing links to deceive users. Generally, they send a fake link to the user. If the user clicks the link, they cheat the user.
  • The Internet increases the expenses of people. People are getting used to using the Internet all the time. To use the Internet, they have to recharge their Internet connection. Many times, they exhaust their data limit and pay more to get additional data.
  • The Internet puts a negative effect on health. With the help of the Internet, people can do most of their work directly from home. Because of this, they walk less and spend more time looking at mobiles or computers. Walking less and watching more on a computer or mobile screen causes many health problems.

Step by Step Solution

3.50 Rating (150 Votes )

There are 3 Steps involved in it

Step: 1

Certainly Lets explore the differences between internet and Internet 1 Internet with a capital I The Internet refers to the entire global network of interconnected computers and devices It encompasses ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Understanding Business Ethics

Authors: Peter A. Stanwick, Sarah D. Stanwick

3rd Edition

1506303234, 9781506303239

More Books

Students also viewed these Computer Network questions

Question

describe several successful positive work interventions.

Answered: 1 week ago