Sunteți pe pagina 1din 17

NETWORK INFASTRUCTURE

(Communicating Engineering Information) MEX3211

TECHNICAL REPORT

Prepared by: Gamage Akila Viranda Perera 411094536 Faculty of Engineering Technology Department of Mechanical Engineering (MEX 3211) The Open University of Sri Lanka TITLE
1

NETWORKING is the biggest part of the new technological world. At present world cant be run with out Information Technology in any area like industrial, social, and economical etc. My title Networking is the base of this Information Technology. The Networking Infrastructure is the way how the interconnection of the network devices, implementing, behaving, upgrading and maintain above mentioned network environment. In my title Network Infrastructure I am going to briefly explain about the devices which are must in the Network environment. Those are Routers, Firewalls, and Switches. Also we need to talk about the Maintain, security, recovery of the network infrastructure. Because it is the heart of any company or any other industry. Also I need to mention here, I am not going to explain basic theory and concepts in networking. From this report you can get an idea about a industrial level knowledge of networking. How it is working? How it is look like? How it is access? So I am invite you to get a knowledge or expand your knowledge in Networking from go through this report. I think this will interesting with you.

Contents
2

Title1.......................................................................................................................... 2 List of graphic aids.................................................................................................... 4 Complexity of Todays Network............................................................................... 5 How is the Design of Networks..................................................................................6 Routers ...................................................................................................... 8 Switch.........................................................................................................................10 Cyber Threat Evolution.............................................................................................. 12 Network Security....................................................................................................... 14 Appendixes and Annexes.......................................................................................... 15 References..........................................................................................17

List of Graphic Aids


3

FIG 1 Todays complexity of the network in practical world FIG 2 Design of a Network Infrastructure FIG 3 How firewall works FIG 4 The Router FIG 5 The Switch FIG 6 MPLS Networking FIG 7 How MPLS Networking looks like

Complexity of Todays Network


4

FIG - 1 FIG 1

Large network, as backbone for connectivity across the countries. For this connectivity it needs to be lot of fulfillments. Both hardware and software based. Connecting those networks it can be get in to a one premises. It is the development of the communication. There is the data to play with this network. Mostly business needs this is very occasional. Connecting large networks, Link those networks together we need to get support from ISP. In Sri Lanka we can take Sri Lanka Telekom, Dialog, Suntel, Lankabell, as available ISPs. They are basically providing the dedicated links to requesters.
After we take ISP, then need to select technology which we are going to take. As examples, CDMA, DSl, MPLS, etc. This is the way how we are going to communicate with other end. If we think we are the person who needs to talk with other networks, It means we are a company and need to talk outside, in our internal network need to be well equipped and with a standard. Here we need to talk about Routers, Firewalls, and Switches. Here we can see lot of vendors who providing those devices. For example Cisco, Nortel, Juniper, Avaya, Maipu, etc. Mainly above mentioned things are the basically we need to have for communicate with outside. Other than that we need to design our internal network devices, Servers, and other equipments, If we talk about development about IT as industrial, we can have lot of data storage, we can access workplaces resources staying at home, speedy access, etc.

How is the Design of Networks


When we design a Networking environment its need to be necessary things commonly. Before I explain those this we get a total idea with in a graphical aid.

FIG 2 Here we can divide in to two stages, one is internal Network and other one is external Network. Its divide from the router because its function is connect two different networks. Internal Network All the servers, Workstations coming under internal network. We can access and configure all the devices in here. Normal Users access the workstations and Network devices and All Servers access by the IT Admins.

External Network It means the outside users who trying to access internal devices or outside devices who is trying to access from internal. For example VPN Users, Branch offices can be categorized under this. If we talk about above FIG 2, here after router we are using a FIREWALL for the network security. Sometimes this Firewall comes together with router also. This is we called as hardware firewall, because we can see software firewalls too. We can add different rules, ACLs from these firewalls. So that we can tell to the network who and what are the things can access outside from internal users And also who and what are the things can access inside from outside user. There are lots of external users can be try to get in internal network. There are also can be authorized or unauthorized. This unauthorized access can be harmful to the internal network. From this firewall block those access and protect network. Here we can see DMZ zone and Enterprise network. Enterprise network means as we talk early internal network. Then DMZ Zone use to put our public servers like WEB servers, Mail Servers etc.

FIG 3

Then we are using SWITCH to connect more internal devices together. There are different types of switches available in industry.

We can connect our branch offices through a dedicated lines, also through the VPN connections users home users can access internal network. These configurations need to be done in Network devices. Also we need to

Router

FIG 4 As mentioned above router is a device that connects two different networks together. We can log in to these routers and configure as we need. These routing maintain routing tables after configuration done. These routing tables can configure manually, we called as static routing. Here we tell to router where the traffic need to end exactly. We can see it in below mentioned routing table.
10.0.0.0/24 is subnetted, 4 subnets C 10.10.1.0 is directly connected, FastEthernet0/0 S 10.10.2.0 [1/0] via 10.10.1.2 S 10.10.3.0 [1/0] via 10.10.1.2 S 10.10.10.0 [1/0] via 10.10.1.2

Also Routing tables can be generated by listening to other routers. This we called as Dynamic Routing. Here we are using routing protocols to generate these routing tables. RIP, RIP Version 2, IGRP, EIGRP. OSPF, BGP are the examples for those protocols. This type not like static routing if one route fails in the loop the routing tables automatically updates the routing table and find another path by sending messages called Hello messages.

172.30.0.0/16 is variably subnetted, 2 subnets, 2 masks D 172.30.32.0/20 [90/4879540] via 10.1.1.2 D 172.30.32.0/24 [90/25789217] via 10.1.1.1 8

S* 0.0.0.0/0 [1/0] via 10.1.1.3

When configuring routers we need to logging to router through a console cable. Then we need to do configuration through CLI (Command Line interface) mode. There are lots of commands and it is vary according to the product. For example in Cisco Routers: Set the enable password
View startup configuration (NVRAM) Overview all interfaces on the router To enable IRGP with a AS of 200, to all interfaces Save the current configuration from DRAM to NVRAM Router(config)#enable password cisco show startup-config show ip interfaces brief Router(config)#router igrp 200 Router(config-router)#network 172.16.0.0 copy running-config startup-config

Switch

FIG - 5 Switches can be divided in to two categories, Its Layer 2 and Layer 3 Switches. Layer 2 means its only dong the switching part. And Layer 3 means its doing both routing and switching parts. It means it work as Router also. Also there can be various numbers of ports in a one switch. It can be 12,16,24,48, etc. It can be have both RJ45 and Fiber optics ports. These switches also manageable and we can log in through console port and configure with CLI mode. Here we can manage switch ports using VLAN (Virtual Lans). It means we can divided switch in to some segments and add ports in those segments. The special is normal way those segments cant communicate each other. For communicate those we need to configure trucking. From this we can manage switch easily. We can add commands like we discussed early in routers. Distribution_1#vlan database Distribution_1(vlan)#vtp transparent Distribution_1(vlan)#exit Distribution_1#conf t Distribution_1(config)#vlan 5 Distribution_1(config-vlan)# name Cameron Distribution_1(config-vlan)#vlan 8
10

Distribution_1(config-vlan)# name Logan Distribution_1(config-vlan)# vlan 10 Distribution_1(config-vlan)# name Katie Distribution_1(config-vlan)# end Distribution_1 #copy running-config startup-config

Basically Switch use to connect servers or workstations to the network and its filter traffic based on MAC address. A frame will only be forwarded to the port that connects to the host with the destination MAC address.

11

Cyber Threat Evolution


Web defacement

When a hacker changes the front page of a website to something other than what was originally there it is called a web defacement. There are sites that archive the web defacements of sites

Spam Spoofing

Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source. A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing). Examples of spoofing: Man-in-the-middle Packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection Routing redirect Redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack). Source routing Redirects individual packets by hackers host Blind spoofing Predicts responses from a host, allowing commands to be sent, but can't get immediate feedback. Flooding SYN flood fills up receive queue from random source addresses; smurf/ fraggle spoofs victims address, causing everyone respond to the victim. Proxy Scan

Use Proxy scanners for to find proxy servers, after find these servers they can try to break and get in to it. Denial of Service

Although a DoS attack does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming
12

and files in affected computer systems. In some cases, DoS attacks have forced Web sites accessed by millions of people to temporarily cease operation Distributed Denial of Service

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. Malicious Codes Virus A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of it over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. Bots This is an automated software program that can execute certain commands when it receives a specific input (like a ro-"bot"). Bots are most often seen at work in the Internet-related areas of online chat and Web searching. The online chat bots do things like greet people when they enter a chat room, advertise Web sites, and kick people out of chat rooms when they violate the chat room rules. Web searching bots, also known as spiders and crawlers, search the Web and retrieve millions of HTML documents, then record the information and links found on the pages. From there, they generate electronic catalogs of the sites that have been "spidered." These catalogs make up the index of sites that are used for search engine results.

Data Theft and Data Manipulation Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pose as someone else. The information can be used to obtain credit, merchandise, and services using the victims name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often attributed to the victim Financial Frauds Fraud or manipulation in the annual financial report including registration and maintaining of financial figures in Novo Nordisk. Accounting manipulation is defined as when the managers of an organization intentionally misstate their financial information to favourably represent the entitys financial performance

Social engineering Scams A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be responding to a phishing email, following the link and entering your banking credentials on a fraudulent website. The stolen credentials are then used for everything from finance fraud to outright identity theft. An old adage comes to mind

13

here, "it pays to be suspicious". With socially engineered attacks, the opposite is also true - if you aren't suspicious, you likely will end up paying. Network Security Physical Security for Devices

When we talking about Network security the first thing is physical security for network devices. It means it needs to be well protecting to Network devices. For achieve this; - Access control for the server room where the devices are placed - Camera system for security purposes - All the network devices need to be password protected. Use Hardware & Software Firewall

Early we discussed about Hardware firewall. In the software firewall happens that security give by a software. We can give rules through that software. It is easy to manage rather that the hardware firewall. Use Licensed Anti Virus Guard.

We all know about Anti Virus Guard is very common thing for in IT field. But here we use advances system. Its allocated a Admin panel and from this we can manage clients. We can do what ever thing from this server.

Data Back System.

Data is the most important thing. So we need to get daily back up the data. Then we can restore it when we need it back in emergency. For this we use Backup system. It can be different. We can use Tape Drives, Hard disks, DVDs etc. Disaster Recovery Plan.

From any natural disaster can be change anything. So in IT industry designed for this one also. For the disaster recovery every network devices have backup device in ready. In some companies use another server room away from the existing place. So can recover the systems back. Keep confidential IT Environment (Passwords, Information, etc)

This is very simple and very important thing. Because IT is very critical and important in the industry. So IT persons need to be keeping IT environment confidentially. Information shouldnt be go outside and everything need to be password protected and well documented.

14

Appendix

raw data When we discuss about networking the cables are very important. But I already talk about that on my 1st and 2nd presentations. Anyway, here is the basic knowledge that needs to be getting about cables. In industry level we are normally using UTP and Fiber optic cables. It is decide as per the requirement.

Future

Near future Networking is going with the concepts of Cloud computing. Also known as Multiprotocol Label Switching. Cloud Computing is an internet-based computer network, where a resource, software and applications are shared to be utilized by other computers connecting to it. This is a whole new form of computing concept. Why is this novel concept referred to as cloud computing? It is because the internet is often visualized as a big cloud consisting of a large network of computers connected to each other.

FIG - 6 In essence cloud computing can be defined as a set of computers connected together sharing applications stored on the internet-based server allowing thousands of users from all around the world to access something without having to download and install anything on their own computers. An example of this would be Google Docs. So what is the big deal about cloud computing? What makes it so fabulous? Here are just a few of the reasons:
15

Savings Through Reduced Energy Usage: Using cloud computing technology the need to

maintain room temperatures to cool down servers goes down compared to the old way of computing.

Easy Backup & Recovery: Servers that run inside a virtual machine can be stored in one

image file containing the entire system configuration and settings. In case a server crashes, you dont have to scratch from beginning to perform reinstallation and reconfiguration. Simply take a copy of the saved image, restore data from last backup and the server will be back up and running again. You can save time, effort and resources.

Easy Deployment: Virtual servers can be cloned as much as possible and can be run on

another machine without having to change configuration, hence reducing the workload of IT staff and expediting the process.

Maintenance & Management Made Easy: Fewer number of servers will automatically Slashing Of Hardware Costs: Companies can cut down on hardware investment because by

reduce the time and cost to manage servers.

using cloud computing they do not have to purchase additional servers, peripherals and other network gear.

Lesser Space Demands: The fewer the number of servers the less space needed to store the Hardware Standardization: Hardware virtualization in cloud computing involves emulation

network equipment, the server is placed on a shared server or data center.

and encapsulation so that the process of introduction and removal of a particular hardware can be carried out with ease.

Easy Replacement and Upgrading: Replacing or upgrading a server specification can be

easier to execute using cloud computing. If the parent server is overloaded and specifications are not sufficient anymore, we can easily upgrade the specification or move a virtual machine to another, more powerful server.

16

FIG - 7 Reference Theory notes which get from followed Coerces. Through Internet forums. Working Experience of the relevant area. Networking ebooks.

17

S-ar putea să vă placă și