Saturday, 22 May 2010

Network Scenarios

A Gigabit Ethernet ‘backbone’ LAN that might be used in a corporation in a single building with 10 to 20 floors and using either a IEEE 802.11 (select any version) wireless LAN, a Bluetooth wireless LAN, or two 100 Base T Switched Ethernet LANs (per floor)

Executive Summary

This report would be required for a corporation in a single building with 10 to 20 floors and using wireless LAN and 100 Base T Switched Ethernet LANs in each floor. It should been insured this building each Personal Computer and each wireless Access Point can be detected the single such as Laptops, portable machines and mobiles which have the wireless function. It also should be made sure “the real time speed” qualification and used like VOIP and video functions during the high traffic time.

Thus, the network environment of this report has been set as a real corporation environment. It also has been required the limit budget and suitable for the network system. This report will show the suitable network topology, equipments, and system security. To insure the whole network environment have enough abilities to maintain the stable performance of network and to prevent the basic hacker attack. Furthermore, the most important part will be how to prevent the whole corporation’s information access and data disclosure. As our team members regard, this network system should be involved in the servers maintain such as database server, file server and mail server etc. Each department of members should have their own access level and security detective solutions. These issues will be shown on the following contents.

This report will show from rough area such the standard of wireless and Ethernet equipments to the detailed segments and frames of package. The reference and bibliography will be listed at the last.

Table of Contents

1. Introduction…………………………………………………………4

2. Gigabit Ethernet backbone LAN with wireless networking...4

2.1 Suitable Topology……………………………………………4

2.2 Physical Media………………………………………………..6

2.3 Distance Limitations…………………………………………6

3. Monitoring and Modeling Network Traffic……………………..6

3.1 Wireless Network Traffic……………………………………6

3.1.1 Monitoring and Modeling for wireless……………..7

3.2 100 Base T Network Traffic……………………………………………..8

4. Security Issues……………………………………………………..9

4.1 The Process of logging in system………………………11

4.2 Tag format……………………………………………………11

4.3 Basic Beacon (IP Broadcast) …………………………….11

5. Suitability for Real-Time Streaming Applications…..………12

5.1 Real Time Streaming Protocol (RTSP) process...….….12

5.2 Examples: Real Time Streaming Protocol process…..13

6. Conclusion…………………………………………………………13

7. List of References…………………………………………..……14

8. List of Bibliography………………………………………………14

1. Introduction

Since 1997, the standard IEEE 802.11 was founded as the first wireless networking protocol. After that, the 802.11b and 802.11g were widely used over the world for public places and home. Nowadays 802.11n was found. This last protocol can transfer 200Mbps by radio frequency. Which means using the Internet has not to stay the some place because there are not only the utilize line and cable to connect the network. Users can use the wireless network. More than half per cent of population have used the Internet.

2. Gigabit Ethernet backbone LAN with wireless networking

Due to this kind of networking have to coexist two different equipments, wireless Access Point (wireless-AP) and Routers. The Extended-Star topology is adequate to connect and control these equipments because these equipments will set on around 20 floors building and every floor need hub or switch and wireless Access Point (wireless-AP). Every floor around 100 users, as a result this building will have over two thousand users.

On other hand, a building only needs a router to connect to Wide Area Network (WAN). Security is focus on local area network (LAN). The Extended-Star topology can also provide this higher security because local area network (LAN) does not too high security to limit users to access any data and waste cost on this one. However, only one important is careful that the user ranks and not anyone can access secret data.

2.1 Suitable Topology

The Extended-Star topology is suitable topology in 20 floors building because this topology can become more apparent in later chapters when switches and routers are discussed in detail including with wireless Access Point (AP). In the build needs one router to connect the Wide Area Network (WAN) and every floor needs more than one hub and wireless Access Point (AP). This policy will provide around 100 users per floor and a company can save money on equipment. Due to the company does not set up many RJ15 connecters and wireless Access Point (AP) is easy to maintenance (see Figure 2.1, 2.2).

Figure 2.1: Network per Building

Figure 2.2: Network Maps

2.2 Physical Media

In this 20 floors building will needs using either a IEEE 802.11n wireless LAN (see Picture 2.1) and 100 Base TX Switched Ethernet LANs per floor (see Picture 2.1).

Picture 2.1 Picture 2.2

2.3 Distance Limitations

Every floor will have more than one Hub and every room have more than ten RJ45 connecters. The distance limit in areas and wireless Access Point (AP) will set every room per one. The wireless Access Point (AP) can cover 50 meters.

3. Monitoring and Modeling Network Traffic

3.1 Wireless Network Traffic

IEEE 802,11n provides 200Mbps to transfer data. The bandwidth is about 2.4GHZ and the frequency band is scientific and medical (ISM) which is initially reserved internationally for the using RF electromagnetic fields. IEEE 802.11n equipment also is Multiple Input Multiple Output (MIMO) and this traffic distance is 50 meters.

3.1.1 Monitoring and Modeling for wireless:

Host Configuration

n IP assignment (DHCP), Default Gateway

n On-site network access software installation

n Network discovery for enabling/disabling network access protocol

Key Management

n Store/invalidate session keys collected from multiple networks

n Roaming: always bypass authentication process if possible

n Renew keys within a session to enhance security

Mobility One

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

subnet

beacon

The subnet mask of Beacon is different

Verifier IP

Mobility Two

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

subnet

beacon

Network_id is different authentication

Authorizer

3.2 100 Base T Network Traffic

100 Base TX uses 4B/5B encoded data, which is scrambled and converted to multilevel transmit-three levels. For example, converts each set of 4 bits into a 5 bit pattern, improved error detection and simplified transmitter and receiver design

4. Security Issues

The popular security for wireless networking is Service Set ID (SSID)

Service Set ID (SSID) uses Shared-Key. The model has four.

1. MAC-level Filtering

l No protection against hardware address spoofing; does not scale

2. WEP (Wired Equivalent Privacy) Key Security

l Keys are hard-wired and cannot be changed flexibly

l WEP keys can be broken over time

l OK for small enterprises, but does not scale well

3. IEEE 802.1x port-based access control

l May require changes to existing AP hardware and software

4. WPA2

l Personal protects unauthorized network access by utilizing a set-up password.

l Enterprise verifies network users through a server.

The WPA2 will be safer for wireless networking security (see figure 4.1). However this building has to use two equipments. As a result, a good method for wired networking and wireless networking are into the Internet to be log in system.

3. session key public

4. WLAN SSID

5. Login internet

3. Authority

1. Client Connect

2. Client Authentication

session key protocol

Figure 4.1: SSID Authentication: WPA2 + Radius Server

4.1 The Process of logging in system

Steps:

1. Client through DHCP to get IP Address

2. Client through Authorizer send beacon to get the network parameter

3. Beacon connect to web authentication

4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter

5. Client transfer packet and tag

Process to Internet (1/3)

AP

Authorizer

Verifier

Internet

Client+driver

1. Client through DHCP to get IP Address

2. Client through Authorizer send beacon to get the network parameter

beacon

MS PASSPORT

DHCP

Process to Internet (2/3)

AP

Authorizer

Verifier

Internet

Client + driver

3. Beacon connect to web authentication

4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter

Beacon

Network_id

Verifier_IP

Authorizer_IP

Web url

Web

MS PASSPORT

Process to Internet (3/3)

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

packet

tag

packet

5. Client transfer packet and tag

Check and delete tag than sent to Internet

Policy

4.2 Tag format

Using session key to encrypt token, checksum

4.3 Basic Beacon (IP Broadcast)

l Beacon periodically sends

l Have not received beacon

n Client (Mobile node) Leave CHOICE network

n Resume originally setting up, packet does not add tag


5. Suitability for Real-Time Streaming Applications

Real-Time Streaming is protocol and Real-Time Streaming is useful for Video Conference and this protocol tolerates transmission to delay and doesn’t need synchronization on networking. As a result, Wireless networking also suits for Real-Time Streaming Applications.

5.1 Real Time Streaming Protocol (RTSP) process:

Initially, user finds presentation description which one is user want and to click this presentation. RTSP browser will connect the presentation description file than find the address, port, and directory. Than connect to server and open presentation to show to user.

5.2 Examples: Real Time Streaming Protocol process

Data form: http://dslab.ee.ncku.edu.tw/~lily/learning/example1.html


6. Conclusion

802.11n is last protocol for wireless, the equipment also expensive but it can provide huge bandwidth and transmission speed. If uses the Extended-Star topology, the networking will reach maximum efficiency. On the other hand, the Extended-Star topology also suit two different kinds of equipment because every floor only need one switch to connect to router. It will save cost for company. The last point, this networking also suit for Real-Time Streaming Applications but one different point is that Real-Time Streaming Applications will use in LAN, if want to connect WAN, the Extended-Star topology will delay a lot of time.

7. List of References

1. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions

2. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals

3. National Cheng Kung University (2004) Real Time Streaming Protocol process Retrieved 28 January 2008 from http://dslab.ee.ncku.edu.tw/~lily/learning/example1.html

4. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)

8. List of Bibliography

1. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)

2. Cisco System, Inc. (2003) Cisco Access Routers

3. Ergen, M(2002) IEEE tutorial, University of California Berkeley

4. Intel Corporation(2001) Gigabit Ethernet Technology and Solutions

5. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals

6. Novaes, M(2000) Beacon: A Hierarchical Network Topology Monitoring System Based on IP Multicast

7. Pablo, B(1997) A Technical Tutorial on the IEEE 802.11 Protocol

8. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions

1 comment:

Unknown said...

for monitoring traffic I use ProteMac Meter