A Gigabit Ethernet ‘backbone’ LAN that might be used in a corporation in a single building with 10 to 20 floors and using either a IEEE 802.11 (select any version) wireless LAN, a Bluetooth wireless LAN, or two 100 Base T Switched Ethernet LANs (per floor)
Executive Summary
This report would be required for a corporation in a single building with 10 to 20 floors and using wireless LAN and 100 Base T Switched Ethernet LANs in each floor. It should been insured this building each Personal Computer and each wireless Access Point can be detected the single such as Laptops, portable machines and mobiles which have the wireless function. It also should be made sure “the real time speed” qualification and used like VOIP and video functions during the high traffic time.
Thus, the network environment of this report has been set as a real corporation environment. It also has been required the limit budget and suitable for the network system. This report will show the suitable network topology, equipments, and system security. To insure the whole network environment have enough abilities to maintain the stable performance of network and to prevent the basic hacker attack. Furthermore, the most important part will be how to prevent the whole corporation’s information access and data disclosure. As our team members regard, this network system should be involved in the servers maintain such as database server, file server and mail server etc. Each department of members should have their own access level and security detective solutions. These issues will be shown on the following contents.
This report will show from rough area such the standard of wireless and Ethernet equipments to the detailed segments and frames of package. The reference and bibliography will be listed at the last.
Table of Contents
1. Introduction…………………………………………………………4
2. Gigabit Ethernet backbone LAN with wireless networking...4
2.1 Suitable Topology……………………………………………4
2.2 Physical Media………………………………………………..6
2.3 Distance Limitations…………………………………………6
3. Monitoring and Modeling Network Traffic……………………..6
3.1 Wireless Network Traffic……………………………………6
3.2 100 Base T Network Traffic……………………………………………..8
4. Security Issues……………………………………………………..9
4.1 The Process of logging in system………………………11
4.2 Tag format……………………………………………………11
4.3 Basic Beacon (IP Broadcast) …………………………….11
5. Suitability for Real-Time Streaming Applications…..………12
5.1 Real Time Streaming Protocol (RTSP) process...….….12
5.2 Examples: Real Time Streaming Protocol process…..13
6. Conclusion…………………………………………………………13
7. List of References…………………………………………..……14
8. List of Bibliography………………………………………………14
1. Introduction
Since 1997, the standard IEEE 802.11 was founded as the first wireless networking protocol. After that, the 802.11b and
2. Gigabit Ethernet backbone LAN with wireless networking
Due to this kind of networking have to coexist two different equipments, wireless Access Point (wireless-AP) and Routers. The Extended-Star topology is adequate to connect and control these equipments because these equipments will set on around 20 floors building and every floor need hub or switch and wireless Access Point (wireless-AP). Every floor around 100 users, as a result this building will have over two thousand users.
On other hand, a building only needs a router to connect to Wide Area Network (WAN). Security is focus on local area network (LAN). The Extended-Star topology can also provide this higher security because local area network (LAN) does not too high security to limit users to access any data and waste cost on this one. However, only one important is careful that the user ranks and not anyone can access secret data.
2.1 Suitable Topology
The Extended-Star topology is suitable topology in 20 floors building because this topology can become more apparent in later chapters when switches and routers are discussed in detail including with wireless Access Point (AP). In the build needs one router to connect the Wide Area Network (WAN) and every floor needs more than one hub and wireless Access Point (AP). This policy will provide around 100 users per floor and a company can save money on equipment. Due to the company does not set up many RJ15 connecters and wireless Access Point (AP) is easy to maintenance (see Figure 2.1, 2.2).
Figure 2.1: Network per Building
Figure 2.2: Network Maps
2.2 Physical Media
In this 20 floors building will needs using either a IEEE 802.11n wireless LAN (see Picture 2.1) and 100 Base TX Switched Ethernet LANs per floor (see Picture 2.1).
Picture 2.1 Picture 2.2
2.3 Distance Limitations
Every floor will have more than one Hub and every room have more than ten RJ45 connecters. The distance limit in areas and wireless Access Point (AP) will set every room per one. The wireless Access Point (AP) can cover 50 meters.
3. Monitoring and Modeling Network Traffic
3.1 Wireless Network Traffic
IEEE 802,11n provides 200Mbps to transfer data. The bandwidth is about 2.4GHZ and the frequency band is scientific and medical (ISM) which is initially reserved internationally for the using RF electromagnetic fields. IEEE 802.11n equipment also is Multiple Input Multiple Output (MIMO) and this traffic distance is 50 meters.
Host Configuration
n IP assignment (DHCP), Default Gateway
n On-site network access software installation
n Network discovery for enabling/disabling network access protocol
Key Management
n Store/invalidate session keys collected from multiple networks
n Roaming: always bypass authentication process if possible
n Renew keys within a session to enhance security
Mobility One AP Authorizer Verifier Internet Client+driver MS PASSPORT subnet beacon The subnet mask of Beacon is different Verifier IP
Mobility Two AP Authorizer Verifier Internet Client+driver MS PASSPORT subnet beacon Network_id is different authentication Authorizer
3.2 100 Base T Network Traffic
100
4. Security Issues
The popular security for wireless networking is Service Set ID (SSID)
Service Set ID (SSID) uses Shared-Key. The model has four.
1. MAC-level Filtering
l No protection against hardware address spoofing; does not scale
2. WEP (Wired Equivalent Privacy) Key Security
l Keys are hard-wired and cannot be changed flexibly
l WEP keys can be broken over time
l OK for small enterprises, but does not scale well
3. IEEE 802.1x port-based access control
l May require changes to existing AP hardware and software
4. WPA2
l Personal protects unauthorized network access by utilizing a set-up password.
l
The WPA2 will be safer for wireless networking security (see figure 4.1). However this building has to use two equipments. As a result, a good method for wired networking and wireless networking are into the Internet to be log in system.
3. session key public 4. WLAN SSID 5. Login internet 3. Authority 1. Client Connect 2. Client Authentication session key protocol
Figure 4.1: SSID Authentication: WPA2 + Radius Server
4.1 The Process of logging in system
Steps:
1. Client through DHCP to get IP Address
2. Client through Authorizer send beacon to get the network parameter
3. Beacon connect to web authentication
4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter
5. Client transfer packet and tag
Process to Internet (1/3) AP Authorizer Verifier Internet Client+driver 1. Client through DHCP to get IP Address 2. Client through Authorizer send beacon to get the network parameter beacon MS PASSPORT DHCP
Process to Internet (2/3) AP Authorizer Verifier Internet Client + driver 3. Beacon connect to web authentication 4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter Beacon Network_id Verifier_IP Authorizer_IP Web url … Web MS PASSPORT
Process to Internet (3/3) AP Authorizer Verifier Internet Client+driver MS PASSPORT packet tag packet 5. Client transfer packet and tag Check and delete tag than sent to Internet Policy
4.2 Tag format
Using session key to encrypt token, checksum
4.3 Basic Beacon (IP Broadcast)
l Beacon periodically sends
l Have not received beacon
n Client (
n Resume originally setting up, packet does not add tag
5. Suitability for Real-Time Streaming Applications
Real-Time Streaming is protocol and Real-Time Streaming is useful for Video Conference and this protocol tolerates transmission to delay and doesn’t need synchronization on networking. As a result, Wireless networking also suits for Real-Time Streaming Applications.
5.1 Real Time Streaming Protocol (RTSP) process:
Initially, user finds presentation description which one is user want and to click this presentation. RTSP browser will connect the presentation description file than find the address, port, and directory. Than connect to server and open presentation to show to user.
5.2 Examples: Real Time Streaming Protocol process
Data form: http://dslab.ee.ncku.edu.tw/~lily/learning/example1.html
6. Conclusion
802.11n is last protocol for wireless, the equipment also expensive but it can provide huge bandwidth and transmission speed. If uses the Extended-Star topology, the networking will reach maximum efficiency. On the other hand, the Extended-Star topology also suit two different kinds of equipment because every floor only need one switch to connect to router. It will save cost for company. The last point, this networking also suit for Real-Time Streaming Applications but one different point is that Real-Time Streaming Applications will use in LAN, if want to connect WAN, the Extended-Star topology will delay a lot of time.
7. List of References
1. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions
2. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals
3.
4. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)
8. List of Bibliography
1. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)
2. Cisco System, Inc. (2003) Cisco Access Routers
3. Ergen, M(2002) IEEE tutorial,
4. Intel Corporation(2001) Gigabit Ethernet Technology and Solutions
5. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals
6. Novaes, M(2000) Beacon: A Hierarchical Network Topology Monitoring System Based on IP Multicast
7. Pablo, B(1997) A Technical Tutorial on the IEEE 802.11 Protocol
8. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions
1 comment:
for monitoring traffic I use ProteMac Meter
Post a Comment