Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The...

20
Proceedings of The Academic Conference of African Scholar Publications & Research International on Challenge and Prospects Vol. 8 No. 1. 10th December, 2015 – Bauchi State University, Gadau, University Assembly Hall, Main Campus, Itsa-Gadau, Bauchi State. A FRAMEWORK FOR INTERNET PROTOCOL VERSION4 ADDRESS GENERATOR IN A ROUTING AND SWITCHING ENVIRONMENT’S *MUHAMMAD ALIYU 1 *ILIYA MUSA ADAMU 2 *MAIDORAWA, AHMADU 3 *KULIYA MUHAMMED 4 *Department of Computer Science, Federal Polytechnic, Bauchi, Bauchi State (Nigeria). ABSTRACT This paper targeted and produced an IP address framework to grant access to users / network engineers in a routing and switching environment who wish to generate IP addresses at an accurate and real time. Each subnet of the IP Address generated creates identification as a sperate network on its own. The generation includes; Broadcast Ids, Subnet mask and IP Addresses PIN. The system is capable of generating valid IP addresses. The generated IP addresses will now be assigned dynamically to every host or router interface on the network. The developed system is strongly recommended for ISP’s and network engineer’s. . A competitive analysis based on research was conducted, feasibility study carried out as the system implemented in a platform using ASP.NET, whereas the codes are implemented in Visual Basic(10.0) and integrated with SQL Server 2005. Keywords: Protocol, Internet, Broadcast, Network, Subnet mask General Background Owing to the fact that the world is now becoming a global village, virtually every documented kind of job (file) over a long geographical terrain requires some level of computer network (Alamda , 2002). 1

Transcript of Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The...

Page 1: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

Proceedings of The Academic Conference of African Scholar Publications & Research International on Challenge and Prospects Vol. 8 No. 1. 10th December, 2015 – Bauchi State University, Gadau,

University Assembly Hall, Main Campus, Itsa-Gadau, Bauchi State.

A FRAMEWORK FOR INTERNET PROTOCOL VERSION4 ADDRESS GENERATOR IN A ROUTING AND SWITCHING ENVIRONMENT’S

*MUHAMMAD ALIYU1 *ILIYA MUSA ADAMU2 *MAIDORAWA, AHMADU3

*KULIYA MUHAMMED4

*Department of Computer Science, Federal Polytechnic, Bauchi, Bauchi State (Nigeria).

ABSTRACTThis paper targeted and produced an IP address framework to grant access to users / network engineers in a routing and switching environment who wish to generate IP addresses at an accurate and real time. Each subnet of the IP Address generated creates identification as a sperate network on its own. The generation includes; Broadcast Ids, Subnet mask and IP Addresses PIN. The system is capable of generating valid IP addresses. The generated IP addresses will now be assigned dynamically to every host or router interface on the network. The developed system is strongly recommended for ISP’s and network engineer’s. . A competitive analysis based on research was conducted, feasibility study carried out as the system implemented in a platform using ASP.NET, whereas the codes are implemented in Visual Basic(10.0) and integrated with SQL Server 2005.

Keywords: Protocol, Internet, Broadcast, Network, Subnet mask

General BackgroundOwing to the fact that the world is now becoming a global village, virtually every documented kind of job (file) over a long geographical terrain requires some level of computer network (Alamda , 2002). In (Jeffrey, 2000) building a network can be very simple, given the right tools and a basic understanding of how they work together can make the network not to function. With networks, starting small and planning to grow makes perfect sense. Even a modest network can pay large dividends by saving time; improving communication between faculty, students, and parents; increasing productivity; and opening new paths to learning resources located anywhere in the world. In this respect, networks are like cars, one need not to know the details about how the engine works to be able to get where you need to go.The computer revolution has made internet protocol address, one of the most important post World War II technologies. The proliferation of cheap, powerful Information

1

Page 2: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

processing and computerization control systems has altered the way in which data is being transferred over a network. This has brought about an increase in the speed, scale of processing, efficiency in computer and network devices communication of which has continued to have a profound effect on the way packets (“smaller data”) are being manipulated across a network (Evi etal, 2001).Internet protocol (IP) address is an address, which was designed to allow hosts on one network to communicate with a host on a different network regardless of the type of Local Area Network (LAN) the hosts are participating in. It also allows hosts to communicate with hosts on the same network.IP addresses can be assigned either statically or dynamically (Cisco Discovery, 2006).With a static assignment, the network administrator must manually configure the network information for a host. At a minimum, this includes the host IP address, subnet mask and default gateway. Static addresses have some advantages. For instance, they are useful for printers, servers and other networking devices that need to be accessible to clients on the network. If hosts normally access a server at a particular IP address, it would not be good if that address changed. Static assignment of addressing information can provide increased control of network resources, but it can be time consuming to enter the information on each host. When entering IP addresses statically, the host only performs basic error checks on the IP address. Therefore, errors are more likely to occur. When using static IP addressing, it is important to maintain an accurate list of which IP addresses are assigned to which devices. Additionally, these are permanent addresses and are not normally reused.On local networks it is often the case that the user population changes frequently. New users arrive with laptops and need a connection. Others have new workstations that need to be connected. Rather than having the network administrator assigning IP addresses for each workstation, it is easier to have IP addresses assigned automatically. This is done using a protocol known as Dynamic Host Configuration Protocol (DHCP). DHCP provides a mechanism for the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information. DHCP is generally the preferred method of assigning IP addresses to hosts on large networks since it reduces the burden on network support staff and virtually eliminates entry errors. Another benefit of DHCP is that an address is not permanently assigned to a host but is only leased for a period of time. If the host is powered down or taken off the network, the address is returned to the pool for reuse. This is especially helpful with mobile users that come and go on a network.Organizations with thousands of hosts rarely have them all in one place. Some organizations wanted to separate individual departments from each other for security or management purposes (Jeffery, 2000).A primary type of packet forwarded on a network is the broadcast packet. Broadcast packets are forwarded to all hosts within a single logical network. With thousands of hosts

2

Page 3: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

on a single network, sending broadcast traffic, and limited bandwidth available, network performance significantly decreased as more hosts were added.To solve these problems, the organizations leading the development of the Internet chose to partition their networks into mini-networks, or subnetworks, using a process called subnetting. How can a single IP network get split into multiple networks so that each subnet is treated as a separate network? Request For Comment (RFC) 917, defines the subnet mask as the method routers use to isolate the network portion from an IP address. When a router receives a packet, it uses the destination IP address in the packet and the subnet masks associated with the routes in its routing table to determine the appropriate path on which to forward the packet (cisco discovery, 2006).Lack of proper utilisation of IP addresses can make organisations purchase lots of addresses there by leading to waste of IP addresses. This can increase the global threat of running short of IP addresses.

Related LiteratureCommunication ProtocolAs the user data is processed down through the protocol stack, each layer adds an encapsulation at the sending host. Data is transmitted "over the wire" at the link level, left to right. The encapsulation stack procedure is reversed by the receiving host. Intermediate relays remove and add a new link encapsulation for retransmission, and inspect the IP layer for routing purposes (Berdal, 2004).The communications infrastructure of a network consists of its hardware components and a system of software layers that control various aspects of the architecture. While the hardware can often be used to support other software systems, it is the design and the rigorous standardization process of the software architecture that characterizes the Internet and provides the foundation for its scalability and success. The responsibility for the architectural design of network software systems has been delegated to the Internet Engineering Task Force (IETF). The IETF conducts standard-setting work groups; open to any individual, about the various aspects of Internet architecture (Noveck, 2009).The principal methods of networking that enable the Internet are contained in specially designated RFCs that constitute the Internet Standards. Other less rigorous documents are simply informative, experimental, or historical, or document the Best Current Practices (BCP) when implementing Internet technologies.The Internet standards describe a framework known as the Internet protocol suite. This is a model architecture that divides methods into a layered system of protocols (RFC 1122, RFC 1123). The layers correspond to the environment or scope in which their services operate. At the top is the application layer, the space for the application-specific networking methods used in software applications, e.g., a web browser program. Below this top layer, the transport layer connects applications on different hosts via the network

3

Page 4: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

(e.g., client–server model) with appropriate data exchange methods. Underlying these layers are the core networking technologies, consisting of two layers. The internet layer enables computers to identify and locate each other via Internet Protocol (IP) addresses, and allows them to connect to one another via intermediate (transit) networks. Last, at the bottom of the architecture, is a software layer, the data link layer, that provides connectivity between hosts on the same local network link, such as a local area network (LAN) or a dial-up connection. The model, also known as TCP/IP, is designed to be independent of the underlying hardware, which the model therefore does not concern itself with in any detail. Other models have been developed, such as the Open Systems Interconnection (OSI) model, but they are not compatible in the details of description or implementation; many similarities exist and the TCP/IP protocols are usually included in the discussion of OSI networking (Cisco Discovery, 2009).The most prominent component of the Internet model is the Internet Protocol (IP), which provides addressing systems (IP addresses) for computers on the Internet. IP enables internetworking and in essence establishes the Internet itself. IP Version 4 (IPv4) is the initial version used on the first generation of today's Internet and is still in dominant use. It was designed to address up to 4.3 billion (109) Internet hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011, when the global address allocation pool was exhausted. A new protocol version, IPv6, was developed in the mid-1990s, which provides vastly larger addressing capabilities and more efficient routing of Internet traffic. IPv6 is currently in growing deployment around the world, since Internet address registries (RIRs) began to urge all resource managers to plan rapid adoption and conversion (Jeffery, 2000).IPv6 is not interoperable with IPv4. In essence, it establishes a parallel version of the Internet not directly accessible with IPv4 software. This means software upgrades or translator facilities are necessary for networking devices that need to communicate on both networks. Most modern computer operating systems already support both versions of the Internet Protocol. Network infrastructures, however, are still lagging in this development. Aside from the complex array of physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by technical specifications or protocols that describe how to exchange data over the network. Indeed, the Internet is defined by its interconnections and routing policies (Badger, 2003).

RoutingInternet packet routing is accomplished among various tiers of Internet Service Providers (ISP’s). Internet Service Providers connect customers to customers of other ISPs. At the top of the routing hierarchy are ten or so Tier 1 networks, large telecommunication companies which exchange traffic directly across to all other Tier 1 networks via unpaid peering agreements. Tier 2 networks buy Internet transit from other ISP to reach at least

4

Page 5: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

some parties on the global Internet, though they may also engage in unpaid peering (especially for local partners of a similar size). ISPs can use a single upstream provider for connectivity, or use multihoming to provide protection from problems with individual links. Internet exchange points create physical connections between multiple ISPs, often hosted in buildings owned by independent third parties. Computers and routers use routing tables to direct IP packets among locally connected machines. Tables can be constructed manually or automatically via Domain Host Configuration Protocol (DHCP) for an individual computer or a routing protocol for routers themselves. In single-homed situations, a default route usually points "up" toward an ISP providing transit. Higher-level ISPs use the Border Gateway Protocol to sort out paths to any given range of IP addresses across the complex connections of the global Internet. Academic institutions, large companies, governments, and other organizations can perform the same role as ISPs, engaging in peering and purchasing transit on behalf of their internal networks of individual computers. Research networks tend to interconnect into large subnetworks such as GEANT, GLORIAD, Internet2, and the UK's national research and education network, JANET. These in turn are built around smaller networks (Pastermark, 2006).

MethodologyApproach:In this work, two approaches that are namely qualitative and quantitative are considered. The quantitative approach is a process of inquiry based on testing a theory composed of variables, measures with number and analyzed using statistical techniques. It is also viewed as a process of building a complex and holistic picture of the phenomenon of interest, conducted in a natural setting. The goal of quantitative method is to determine whether the predictive generalization of a theory holds true, while the goal of the qualitative method is to develop an understanding of social or human problem from multiple perspectives (Karim, 2008).Approaching the development of an intelligent subnetting system, Service Oriented Architecture (SOA) is considered. SOA is cooperated with a broad range of capabilities, technologies, tools, and set of skill such as managing the services lifecycle- throught the finding, applying, evolving, and maintaining service. SOA will be use because it is an architectural style that guides all aspects of creating and using business processes. SOA is capable of establishing a platform and programming model, which include connecting, deploying, and managing services within a specific runtime platform. And finally the newly approach for the development of subnetting tool will be considered as the available option to develop the system.

System DesignDatabase DesignThe system database was designed using MySQL server 2007 Version (2.5) because it has a helpful interface that allow user to create tables and develop database without much

5

Page 6: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

technical skill required. The author decided to use MySQL database, because the PHP already come along with it as backend, which allow easy connection between them.

Table 1: output tableFields Type Expected input SizeCIDR Varchar(11) Alphanumeric 20No. of subnet Varchar(11) Numeric 100No.of host / subnet

Varchar(11) Numeric 100

Block size Varchar(11) Numerics 100Network id Varchar(11) Numeric 1000IP ID Varchar(11) Numeric 1000Broadcast ID Varchar(11) Numeric 1000

Table2:input tableFields Type Expected input SizeSurname Varchar String 20First name Varchar String 20Other names Varchar String 20Phone no. Varchar Numeric 20Email id Varchar Alphanumeric 20User id Varchar String 20Password Varchar Alphanumeric 20Check Varchar Boolean 2IP Address Varchar String 5

Table1 and table2 above shows the output and input fields, data types, and the various sizes the system will accept.

Interface DesignThe front-end of the system was designed and implemented using the Macromedia Dreamweaver 8 (PHP). The Dreamweaver and the MySQL server can run on a single platform1 Input Interface To effectively carryout easy and documented subnetting, the program must be presented with the required data to the program. This is inputted to the program through the data statement and the input statement.

2 Output Interface The objective of any system design is to produce an accurate and efficient output; the system being developed has been targeted to make design and subnetting more efficient.

6

Page 7: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

Program DesignAlgorithm adoptedProcedure: subnetting IP( IP Address, Subnets, Binbits, N.Smask, INCR)This algoritm splits an IP adress into subnetts1. [32bit IP address?] If IP address ≠4octect group,

Then Print : INVALID ADDRESS and return

2. Subnets=binbits Required3. [Reserve bits in subnetmask and determine the increament] Assume 0=hosts, 1=network; N.Smask = Increament (Numb of binbits) by netwok bits; decreament (Numb of bits) by Host bits OR;

Number of one’s = N.Smask INCR= decimal possition of Lowest Network bit4. Use the increament to determine the network range If O.Smask = 1st Octect Then INCR= INCR+2nd IPOCTECT ELSE; If O.Smask = 2nd Octect then INCR= INCR+3rd IPOCTECT ELSE; If O.Smask = 3rd Octect then INCR= INCR+4th IPOCTECT ELSE;5. Return

The System Block DiagramThis block diagram depicts the various blocked representation of how the system works. It shows how the system is being related, and the various blocked function of the system. The diagram depicts the role of the various components and how they relate to the database.

Figure 1: system block diagram

7

Database

Valid username and Password?

Username

IP address generator

tuitorchatarticles

events

contact

Page 8: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

Class Diagram:The reason of using a class diagram is for the system developer to better understand and explain how the systems classes, attribute, and their relationship with classes are, the use of Class Diagram become mandatory. Therefore, this system developer realized the use of such powerful design tools and decide to used it in order to proper plan what should be in the system interface, internal operations of the system, and the system behavior. The below class diagram indicates administrator and users functions such as login into the system, generating IP address, uploading document, admin adding Users, chat forum, users comment and many more functions as shown.

Figure 2: System Class Diagram: TESTING Testing in any developed system is mandatory.The aim of the system testing is to check system functionalities and the features in order to find an error, as many as possible and look into change it during the system maintenance.

8

IP Generator

-Generate IP Address

Forum

-chat

Page 9: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

ResultAfter the system development and implementation, the next stage is to get result of the newly developed system. Administrator and user requirements are gathered and laid on to get result of the newly developed system. It shows what the system provides after the interraction between the front end and the back end.

IP Address Generator Report Various subnets have their respective broadcast addresses. The system has the capability to generate both the classful and classless subnetting. However, fixed-length subnet masks (Classful) can waste a significant number of IP addresses. For example, an organization with one site has approximately 8,000 hosts and three other locations with 1,000, 400, and 100 hosts, respectively. With a fixed-length subnet mask, each subnet would have to support at least 8,000 hosts, even the one assigned to the location needing only 100 addresses.Variable length subnet masking (VLSM) helps to solve this issue (Classless). VLSM addressing allows an address space to be divided into networks of various sizes. This is done by subnetting subnets. VLSM saves thousands of IP addresses that would be wasted with traditional classful subnetting.

IPAG can generate both the classful and classless subnets.

Figure 2: Subnetted Ip addresses

9

Page 10: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

The figure above shows the depiction of the classful sunets. It shows the fixed number of subnets that can be found per subnet.

Figure 3: classless subnettingThe figure above shows the classless subnetting. User is required to supply the subnet ID and the broadcast ID. The system can now use the selected number of borrowed bits that the user slected to generate the available usable host IP addresses.

DISCUSSIONValidation of ResultThe manual method and the computertised IPAG sytem were tested and found to be producing the same result. Using the adopted algorithm; an IP adress 192.168.10.0 if it was to be subnetted;Manually;192.168.10.0 with a default subnetmask 255.255.255.0. Creating four subnets will require a network engineer to borrow 2bits from the host portion of the subnetmask and add it to the network portion. 11111111.11111111.11111111.00000000 old subnet11111111.1111111.11111111.11000000 newsubnet 255.255.255.224Or /26.Increament is going to be at the lowest network bit= 64Table5 : manual subnet result of 192.168.10.0 /26Network ID Broadcast ID Usable host addresses192.168.10.0 192.168.10.63 192.168.10.1 - 192.168.10.62

10

Page 11: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

192.168.10.64 192.168.10.127 192.168.10.63 - 192.168.10.126192.168.10.128 192.168.10.191 192.168.10.127 - 192.168.10. 190192.168.10.192 192.168.10.255 192.168.10.193 - 192.168.10.254

Fig4: network ID’s and broadcast ID

Fig5:Usable host addresses

11

Page 12: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

Fig6: Usable host addresses

ConclusionInternet protocol Address Generator(IPAG) in a routing and switching environment has been tested and found functioning effectively in solving the problems of manual calculation and generation. It allows the storage of the IP addresses in the computer database system so as to eliminate the use of paper documentation which is volatile to destruction. Also, there will be better management of generated result and other relevant information with high degree of accuracy and speed. This work is strongly recommended to ISP’s and network engineers.

REFERENCESAlamda C.A (2002). Sybex IncNetwork Plus study guide. The GIS Book Onward Press, USA.Anthony B. (2003), A reachability-based access control model for networks Proceeding to

DBSocial Database and social networks Available at http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/2000000/1996419/p31abdessalem.pdf?ip=194.80.131.5&CFID=28218926&CFTOKEN=18553935&__acm__=1308800536_9f5c3ea632726b7d826ef0ed9b70860d accessed on 23rd July, 2012Berdal S. and Dorothy N. (2004), Subnetting make easy: Conceptual foundation and

research issues in MIS Quarterly March 2001 Vol. 25. No, 3. Pp 107-136. Cisco discovery curriculum (2009).

Evi N., Garth S., Trent R., Ben W. (2011); Unix and Linux System Administration Handbook 4th Edition. Pp 76-96

James P. (2007), AN explorative study on the role of network structure and knowledge processing orientation in work unit knowledge management SIGMIS Database, Vol 38(2), ACM http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/1250000/1240620/p8-song.pdf?

12

Page 13: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

ip=194.80.131.5&CFID=28530829&CFTOKEN=10413157&__acm__=1308927328_d4589be8611cfc6fb54640f77d1e9faf accessed on 24th July, 2012 Jeffrey, W. ; (2000) - Designing a network. The comp field press, London. Pp 113-150 Karim A. (2008), Network Topology handbook.

Noveck R. (2009), Building a signed network from interactions in wikipedia Proceeding to DBSocial Database and social networks Available at http://delivery.acm.org.ezproxy.wales.ac.uk:2048/10.1145/2000000/1996417/p19maniu.pdf?ip=194.80.131.5&CFID=28218926&CFTOKEN=18553935&__acm__=1308800208_d98673f37bd7a95530dc68d0c36ae490 accessed on 23rd August. 2012

13

Page 14: Proceedings of The Academic Conference of African Scholar ...€¦  · Web viewProceedings of The Academic Conference of African Scholar Publications & Research International on

14