Showing reports for year: 2009

Title:Mobile Networks in IPV6
Authors:Noronha, Sean
Serial Number:2009-01
Publication Date:1- 3-2009
Abstract:This research study, Mobile Networks in IPv6 with VOIP, was conducted at the United States Naval Academy (USNA) with the end goal of testing the capabilities of IPv6 in low bandwidth networks. Specifically, this study focused on the effects of using IPv6 on networks whose speeds are comparable to 56K Dial Up access, ISDN, and various other low bandwidth wireless networks. The first segment of this research project aimed to examine the feasibility of sending large amounts of data from high to small bandwidth networks. A significant portion of this project aimed to correlate MTU settings and transmission speeds. A hypothesis to be tested aimed to see if increasing or decreasing the MTU size would affect those speeds, but enough data was collected which showed that changing the MTU size only affected error rates, not transmission speeds. Tests were conducted to determine how line conditions would affect the way IPv6 would be transmitted across networks of varying bandwidth but extensive tests were unable to be conducted since legacy hardware was not able to be acquired. To help mitigate the hardware gap, a three-pronged approach of theory, simulation, and experiment setup was used to validate results. The second segment of this research project focused on the viability of incorporating separate IPv6 networks tunneled through existing IPv4 connections. Our recommendation to have a tunneled network is derived from the impracticality of completely transitioning over to IPv6 without having a “stepping stone” in case there are design flaws or the lack of personnel to support such a colossal move. The research shows that this is a more palatable concept for future development as only simple knowledge of implementing a tunnel and appropriate hardware compatibility are required.
View ReportView bibtex

Title:Resource Contrained Network Design and Implementation
Authors:Gawne, Michael B.
Serial Number:2009-02
Publication Date:1- 3-2009
Abstract:The research study, Resource Constrained Network Design and Implementation, was conducted at the United States Naval Academy (USNA) in order to simulate creating a secure and functional network with constrained resources. This is a problem faced by any administrator trying to maximize the security and functionality of a private network while minimizing the costs involved in the creation and maintenance of a local area network (LAN). The goals of this research study were established in a step-wise foundation, each step relying upon the completion of the previous goal. The goals were: 1) Configure the most basic LAN, one comprised of a switch and two nodes and establish communication between the two nodes, 2) Introduce a 3600 series router into the network dividing the two LANs to simulate an internal network LAN, and the external internet and permit communications between the two networks, 3) Create Virtual LANs (VLAN) and implement their use on the network, 4) Utilize Access Control Lists with rulesets based upon the VLANs, 5) Introduce a PIX 515E firewall into the network to isolate and protect the internal LAN from the simulated internet. At the conclusion of the study it was deemed that education and knowledge levels must be included when considering all the resources available to the network administrator. By far, the most difficult segment of this research project was the last segment, introducing the PIX 515E firewall into the network and establishing communications through the firewall. Internet resources are plentiful in the form of forums, web blogs, and other information technology support sites for novice network administrators to educate themselves on the basics of configuring their network, but online education for establishing a firewall is not as plentiful. Furthermore, even with the assistance of two Cisco Certified Network Associates (CCNA), a mid-level certification, and a Cisco Certified Internetwork Expert (CCIE), it is sometimes difficult to find the one error that drops all traffic and renders your network isolated from the rest of the world. One of the most beneficial ways to spend precious resources may very well be a seminar or other education venue where the network administrator may first hone his/her skills on firewall configuration before attempting to configure the firewall with no formalized training. Through the review of this research study it appears that while a secure, effective network can be constructed in a resource constrained environment, especially when resources are properly allocated.
View ReportView bibtex