Professional Documents
Culture Documents
Assignment 2 – Network
Report
STUDENT ID : 29984939
NAME : POOJA VISHAL PANCHOLI
Channel Occupancy
The given access points work mainly over two channels, channel 6 and channel 13. Apparently,
network transmissions over channel 13 via access point 2 will have no interference as it does not
have to compete with other access points on the same channel. Mainly, there are two access
points sharing transmissions over channel 6. But, channel 6 is considered to be a non-overlapping
channel in the 2.4 GHz frequency band. Hence, the two access points do not interfere each other.
Interference
There were many non-transparent objects that were found between the access point and the
device that is using the WIFI. This in turn created interference between the two devices
connected and hence, the signal strength reduced. The improvements can be made by fixing the
configurations where the amount of interference is minimum and which introduces less
disturbance due to walls, windows, doors as well as human body. It was also noticed that the
devices connected to 2.4 GHz were having more interference due to attenuation created by the
human body as compared to those devices connected over 5 GHz frequency band.
Coverage
The area was covered by all the access points. All the access points were placed in the regions
in such a way that as soon as the device lost connectivity with one access point, the device is
connected to another access point automatically.
Roaming
The overlapping signals enabled roaming for the end user devices. Hence, the devices when lost
connectivity from one access point, it can get connected to the access point without breaking
the connection with the device.
Task 2 : Network Configuration and Bug Fixing
□ Router 2 Configuration :
To connect intranet to servers : /sbin/ip route add 69.10.90.0/24 via 69.10.52.2
To connect intranet to clients : /sbin/ip route add 69.10.37.0/24 via 69.10.92.2
□ Router 3 Configuration :
To connect servers to clients : /sbin/ip route add 69.10.37.0/24 via 69.10.26.1
To connect servers to intranet : /sbin/ip route add 69.10.39.0/24 via 69.10.52.1
□ The port number of ethernet device 0 was given “30” instead of “24” in the dns server.
Before detection: 69.10.90.12/30
After detection changed to: 69.10.90.12/24
Error Found: No response received
Method to detect and test the fix: ping to the DNS server from client
This error was detected because no response was receieved from the other end because
the port was incorrect.
□ The same IP address (69.10.59.2/24) was detected between Router 1 and Router 4.
Before detection: 69.10.59.2/24 (Router 1) and 69.10.59.2/24
(Router 4)
After detection changed to: 69.10.59.1/24 (Router 1) and 69.10.59.2/24
(Router 4)
Error Found: Network not reachable
Method to detect and test the fix: ping to any server from client
This error was detected because network was not reachable because there were
multiple same IPs while sending ping to the servers.
#DNS Configuration
iptables -A FORWARD -p udp -d 69.10.90.12/24 --dport 53 -j ACCEPT
iptables -A FORWARD -p udp -s 69.10.90.12/24 --dport 53 -j ACCEPT
#HTTP Configuration
iptables -A FORWARD -p tcp -d 69.10.90.11/24 --dport www -j ACCEPT
iptables -A FORWARD -p tcp -s 69.10.90.11/24 --dport www -j ACCEPT
#SSH Configuration
iptables -A FORWARD -p tcp -d 69.10.90.10 --dport 22 -j ACCEPT
iptables -A FORWARD -p tcp -s 69.10.90.10 --dport 22 -j ACCEPT
#ICMP Configuration
iptables -A FORWARD -p icmp -d 69.10.90.12 -j ACCEPT
iptables -A FORWARD -p icmp -s 69.10.90.12 -j ACCEPT
iptables -A FORWARD -p icmp -d 69.10.90.11 -j ACCEPT
iptables -A FORWARD -p icmp -s 69.10.90.11 -j ACCEPT
iptables -A FORWARD -p icmp -d 69.10.90.10 -j ACCEPT
iptables -A FORWARD -p icmp -s 69.10.90.10 -j ACCEPT
Implementation Testing
b) For accepting the packets inside the company network, the following command needs to be added in the Router
3’s Firewall configuration
Test Cases:
c) To accept any packets that are related to the connections that are established inside the company network, we
need to add the following line in the Router 3’s Firewall configuration.
d) To accept any SSH packets into company network, the below given configuration must be added to the Router
3’s Firewall configuration.
Test Cases:
e) Other clients which do not have access to SSH willnot be able to access the clients that are not in the same
subnet.