代做FIT9137 Assignment 3 Specification Semester 1 2024代做Python编程

FIT9137 Assignment 3 Specification

Semester 1 2024

Submission Guidelines details: -

• Deadline: Semester-1 Week-14 Tuesday 2024, [4th JUNE 2024 11:55 PM]

• You need to submit

▪ a report (a PDF file including your screenshots with file name format as FirstName_STUDENT_ID.pdf), and

▪ your network configuration file (the CORE file name format as FirstName_STUDENT_ID.imn) containing the required changes to complete the assignment tasks.

• Both files must be submitted via Moodle under a single submission link.

• Do not submit a compression of multiple files. Such submissions may receive a mark of zero.

• A handwritten document is not acceptable and will not be marked even if converted and submitted electronically.

• It is the student's responsibility to make sure that the submitted files can be opened on a standard Windows computer (without requiring specialised software), and that all contents such as images and texts shown are understandable/readable (in English). After uploading the files as draft (before finalising the submission), we recommend you download your submitted files and check that they open and run properly. If the files are not readable, openable, or corrupted, then you may receive a mark of zero. Once you finalise your submission, you will not be able to revise it.

• Assignment files left in draft mode are not accepted and will not be marked. Make sure to finalise your submission by the deadline.

• Written texts in your PDF must be submitted as actual texts, and not an image of a text. Accordingly, screenshots of typed texts as images are not accepted (of course, this rule excludes the screenshots you take to show the computer’s display).

• For the CORE configuration file, you may see a warning/error message returned by Turnitin after you upload your files. That is completely fine and you can simply ignore the Turnitin warning/error message for the IMN file.

• All special consideration/extension requests must be submitted via https://www.monash.edu/students/admin/assessments/cant-complete

• Without an approved special consideration request, a late submission penalty of 10% per day deduction will apply. Submissions that are more than 7 calendar days late will not be accepted, unless special case (SC) consideration is approved.

Marks:

This assignment is marked out of 100 marks and is worth 30% of your total unit marks. You must submit both the CORE configuration file and the PRF report. Otherwise, you may receive a mark of zero.

Feedback: Your Tutor will provide you with marks and feedback (if your submitted PDF file and the CORE *.imn file are readable and markable)

Brief Description:

Assignment will include the material covered in Weeks 4-12. In particular, the assignment will consist of questions related to network and transport layers, structures and functions of local area, backbone and wide area networks, and network security. The format of the student submission will be a written report and a network configuration.

Learning Outcomes covered:

The Assignment-2 covers material from Weeks 4-12. This is an individual assignment. By completing this Assignment, you will understand the learning outcomes 3 to 6.

• Examine networks using the underlying fundamental theories, models and protocols for data transmission.

• Analyse and formulate the functions and architectures of (wireless) local area networks, wide area networks and the Internet.

• Identify cybersecurity threats and ethical considerations in the Internet.

• Apply and implement cybersecurity enabling techniques and countermeasures such as virtual private networks (VPN).

Academic Integrity:

• This is an individual assignment and group work is prohibited. It is an academic integrity requirement that your submitted work be original. Penalties will be applied to the whole submission if there is any evidence of copying, collaboration, pasting from websites, or copying from textbooks. When asked to use the Internet, books, or other academic resources to answer a question, it does not mean to copy the text verbatim from the source. You must write the answers in your own words such that your understanding of the answer is evident. You must always cite your references within the text and list them at the end of the report. Academic integrity policies apply to all assessments. You can refer to this link below:

https://www.monash.edu/student-academic-success/learnhq/maintain-academic-integrity

Penalties:

• Late submissions will result in a 10% deduction of the total marks per calendar day (up to 7 days). For example, if you get 80/100 marks originally and submit 2 days late, then you would get a 20-mark deduction (10 marks per day) and your final marks would be 60/100.

• Submissions more than 7 calendar days after the due date will receive a mark of zero (0) and no assessment feedback will be provided.

Network Configuration and Security

Introduction

For this assignment you will use the core network emulator to complete a series of tasks on an individual core configuration file that is generated for you. To download your individual core configuration file, open the unit’s Moodle page then navigate to the Assessments section and follow the provided instructions for Assignment 3. The downloaded *.imn file will be in zip format, please unzip the file to use it.

You must write a report to explain

- the changes you make,

- the configurations you add to achieve the goals of each task,

- your reasons for each change/configuration, and

- the tests you perform. to check the task is accomplished.

Your submitted core file will be marked by running the configuration and testing that the tasks are completed. The report will serve as a reference to be checked during marking. However, if a test fails when running your submitted core file, you will receive no mark for that failed test (i.e., part of a task) regardless of your explanations in the report. If tasks are similar, you only need to explain your reasons once, and then just report the changes you make to individual services on each node.

Network Structure

The provided network is Comprised of two organisations labelled Talos and Delos, a router named Internet playing the role of the Internet, and a global DNS server named clio. The internal subnets of Talos are labeled Internal, and the public servers of the Talos network are placed in a separate subnet named DMZ. The Internet facing router of the Talos organisation, R3, is also its network firewall. The Delos network is divided into two subnets: (i) a subnet for the organisation clients and private servers and (ii) a subnet for its public servers. The public servers of Delos are named apollo, artemis, and demeter providing web, domain name, and mail services respectively.

DNS Setup

The core file is configured to resolve the domain names between the two organisations, talos.edu and delos.edu. This is achieved through a global DNS server named clio. The server only resolves the names for the two domains in the configuration ( talos.edu and delos.edu) by sending the request to the corresponding nameserver for each domain and sending back the response to the requesting client. Each DNS server in aforementioned networks must have access to UDP port 53 of the server clio as the organisation DNS servers resolve the names on behalf of their respective clients. You do not need to make any changes to DNS servers; this section only explains the DNS setup.

Important Notes

• It is recommended to use tcpdump if you wish to capture traffic and to observe whether the packets reach their intended destination when trying to accomplish the tasks. To use tcpdump, you can right click on a node and move the mouse to select tcpdump in the provided list and then select the intended interface. You can also run tcpdump from the command line using the command tcpdump -l - i eth0 to print the summary of the captured packets from the eth0 interface in the terminal. To write the captured packets to a file, use the command with w option followed by a filename. For instance, running the command tcpdump -w /home/muni/R3_eth3.pcap - i eth3 on the node R3 will capture the traffic on its eth3 interface and store the frames in a file named R3_eth3.pcap under /home/muni directory. You can then stop the capture with Control+C and use Wireshark to analyse the captured packets.

• Any changes you make to the nodes when the emulation is running will be lost when you stop the emulation. You can test the changes you want to make when the emulation is running and once you have the correct commands, then add them through the GUI in the proper service. For example, to add static routes to a router that persist and will be stored with the configuration file, you need to add ip route add commands to the StaticRoute service of that router.

• If you make changes to a core configuration file and then close the CORE window without saving the changes, you will not be warned and the changes will be lost, hence if you wish to keep the changes you have made, you must save before closing the CORE window.

• Make sure to keep a backup of your CORE file somewhere outside of the VM in case you encounter issues with your VM and you need to replace the VM. This will make sure that you would not lose the work you have done. It is your responsibility to back up your work.

• You must not change the name of any node in the given configuration file.

Tasks

Task A: Routing

[35 + 10 = 45 Marks]

The routing tables of the routers in the provided network are not configured. The correct configuration of this task allows any host from any network to reach any other host in the entire network. You must satisfy the following requirements while completing static routing task:

1. All hosts inside the talos.edu network must be reachable from any other host within that network through an optimal path. You need to add static routes to routers R1, R2, R3, and R4 to accomplish this goal. You must explain your reasons for choosing a path in the report. The notation us for links represents the propagation delay in microseconds. You can assume that the processing delay is negligible.

2. The router R3 must be the default gateway of the talos.edu network. The router Internet must be the default gateway of R3 and minerva (the only router of Delos). You will lose marks if you create routing loops.

Task B: DHCP Server

[8 + 2 = 10 Marks]

The clients of delos are configured with static IP addresses. Your task is to:

1. Configure DHCP server on the node minerva to assign dynamic IP addresses and other required settings to the client machines in the client’s subnet. You can use the DHCP server configuration on R1 as a reference to follow.

2. Enable DHCP client service on clients of delos.

Note: The node leto is a private local server in the client’s subnet and must have a static IP address as assigned for the given configuration.

Task C: Firewall

[45 Marks]

The node R3 is the firewall for talos network. Configure the Firewall service on this node to satisfy the following requirements:

1. Allow traffic from anywhere to DMZ for the provided service by each server. This must be limited to only the public service that a server provides: dns only DNS, web only HTTP, mail only SMTP.

2. Allow servers in DMZ to initiate a communication if it is required by the service the server provides and only for that service (stateful inspection: DMZ → External).

3. Allow internal hosts to access all services provided by servers in the DMZ (stateful inspection: Internal → DMZ). This includes all services that DMZ servers provide. You can be more permissive here and use address ranges and all IP traffic. All servers in DMZ run SSH service which you can use to test your rules for the internal subnets.

4. Allow internal hosts to reach other internal hosts (if the traffic passes through R3). All traffic is allowed if it is internal to internal.

5. Allow internal nodes to access external servers however packets from external to internal are only allowed if they are responses to communications that were initiated from inside (stateful inspection: Internal → External).

6. Allow the nodes in clients subnet of talos to ssh to node R3 (any host connected to the R1.eth0 subnet).

7. Allow the node R3 to send and receive ICMP echo messages to internal nodes and DMZ servers.

8. All other traffic must be dropped (see Notes below).

Important Notes for Task C:

• If the Requirement 8 is not satisfied, you will receive a zero mark for the firewall task regardless of any other correct rule you add as it would expose the entire network. You will lose partial marks if your rules are too permissive allowing more traffic than specified to reach the destination for each requirement.

• You only receive marks if the test for each requirement succeeds. No partial marks will be given if only part of a rule is correct. When two rules are required for the incoming and outgoing traffic, no partial marks will be given if one of the rules is correct.

• For stateful inspection, the traffic is allowed if it is initiated from the more trusted side of the firewall to the less trusted side. The traffic in the opposite direction, from the less trusted interface to the more trusted interface, is only allowed if the packets are the responses to an initiated communication from the more trusted side. The trust level in the requirements is indicated as

Higher→ Lower for each stateful inspection, meaning the connection initiation is allowed from the higher level to the lower level and only the responses for the initiated connections are allowed from the lower level to the higher level.

• If you have reachability issues in Task A, i.e. a host is not reachable from another host, you may lose marks in firewall tests as well when the traffic must be allowed. You will not lose any marks for firewall rules if a host is reachable but through a sub-optimal path and the firewall rules are correct.

• You must submit the CORE file with Firewall service enabled on node R3. The service is enabled in the individual files without any rules hence all traffic is allowed.

Reference Notes

Please acknowledge any reference appropriately and the use of any AI tools (refer to the assignment link on Moodle to access information from Learn HQ).





热门主题

课程名

omp9727 ddes9903 mgt253 fc021 int2067/int5051 bsb151 babs2202 mis2002s phya21 18-213 cege0012 math39512 math38032 mech5125 mdia1002 cisc102 07 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 efim20036 mn-3503 comp9414 math21112 fins5568 comp4337 bcpm000028 info6030 inft6800 bcpm0054 comp(2041|9044) 110.807 bma0092 cs365 math20212 ce335 math2010 ec3450 comm1170 cenv6141 ftec5580 ecmt1010 csci-ua.0480-003 econ12-200 ectb60h3f cs247—assignment ib3960 tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 econ7230 msinm014/msing014/msing014b math2014 math350-real eec180 stat141b econ2101 fit2004 comp643 bu1002 cm2030 mn7182sr ectb60h3s ib2d30 ohss7000 fit3175 econ20120/econ30320 acct7104 compsci 369 math226 127.241 info1110 37007 math137a mgt4701 comm1180 fc300 ectb60h3 llp120 bio99 econ7030 csse2310/csse7231 comm1190 125.330 110.309 csc3100 bu1007 comp 636 qbus3600 compx222 stat437 kit317 hw1 ag942 fit3139 115.213 ipa61006 econ214 envm7512 6010acc fit4005 fins5542 slsp5360m 119729 cs148 hld-4267-r comp4002/gam cava1001 or4023 cosc2758/cosc2938 cse140 fu010055 csci410 finc3017 comp9417 fsc60504 24309 bsys702 mgec61 cive9831m pubh5010 5bus1037 info90004 p6769 bsan3209 plana4310 caes1000 econ0060 ap/adms4540 ast101h5f plan6392 625.609.81 csmai21 fnce6012 misy262 ifb106tc csci910 502it comp603/ense600 4035 csca08 8iar101 bsd131 msci242l csci 4261 elec51020 blaw1002 ec3044 acct40115 csi2108–cryptographic 158225 7014mhr econ60822 ecn302 philo225-24a acst2001 fit9132 comp1117b ad654 comp3221 st332 cs170 econ0033 engr228-digital law-10027u fit5057 ve311 sle210 n1608 msim3101 badp2003 mth002 6012acc 072243a 3809ict amath 483 ifn556 cven4051 2024 comp9024 158.739-2024 comp 3023 ecs122a com63004 bms5021 comp1028
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图