.

Friday, April 5, 2019

Wide Area Network (WAN)

Wide Area Network (wide area internet)1. Abstract unhinged Wide Area Network is a communication communicate that make usage of existing engineering science to connect local area network into a larger working network which may dog both national and international location.Wide Area Network allows a company to make use of common imagerys in order to operate, internal chokes such as sales, production, development, marketing and accounting tidy sum be shared with authorized locations through this sort of network application. So thats why it is so important today.In this paper, I am going to demonstrates the techniques required for computer network from technology, architecture, media, communications protocol and routing algorithm based on the OSI seven bed model.2. IntroductionBambi Co., Ltd. decided to implement a Wide Area Network surrounded by their two internet site in two different countries. As the network engineer of the company, is responsible to study, plan, constru ct and implementation of a Wide Area Network for connecting two sites local area network. The requirement by the company that made the WAN a necessity are enumerated. The choice of WAN, hardware and the software is explained within the context of the needs of the company. Finally the benefits accruing to the company are identified and determined.3. Company BackgroundBambi Co., Ltd. has two sites find in two different countries. Site A, the main office which located in Hong Kong and Site B, a factory which located in Shenzhen, the mainland China.In Site A, there are some 10 customer workstations and Site B around 40 client workstations.There are three legions located in Site A, they are the domain server, email server and content management server. An early(a) domain server also located in Site B, it mainly provide the services for Shenzhen drug users.4. User requirement4.1 FunctionalityOn most of the users, their main concern is application avail able from the network. This in cluding the following matters4.1.1 Fast response time solution time is the time between entering a command or keystroke and the execution of the command acquaint a response. For users on Bambi Co., Ltd. environment, response time is the response running application or access from/to the servers, transmission system of information as well as access to Internet.4.1.2 High throughputThe throughput environment on the company can be expected to be high. It can be expected that the throughput usage on the network depart involve many another(prenominal) users frequently access to the server and also to the Internet at same time.4.2 ScalabilityThe WAN implementation is expected to be function for a minimum of 5 years without the needs of arouse the network equipments or rewiring the horizontal or vertical cable.4.3 AdaptabilityThe WAN implementation must be negotiable enough to meet the demand of ever-growing needs of technologies when they become available. It might included with new er switching technology, more inexpugnable or faster router incorporating with new routing protocols and etc. Therefore, the WAN solution should be modular which allow added or swapped new network equipment with a minimum of network downtime.4.4 SecurityThe information transfer must be protect through the WAN environment. This is very important as to prevent the company info from stolen from their competitors.4.5 manageablenessThe WAN implementation must be manageable and able to monitor by the network administrator.4.6 reliablenessReliability of the WAN is important. The WAN must include fault-tolerance function and elements to give the stability of the network to restrict any unnecessary network downtime.5. WAN solution5.1 Regional Private NetworkService provider PacnetType MPLS VPNBandwidth 2MbpsDescription Connect between Bambi Co., Ltd. Site A and B5.1.1 Introducing of MPLS and architectureMPLS stands for Multiprotocol Label Switching. It has been around for several years. It is standardized by IETF. (The Internet Engineering Task Force) Why multiprotocol? Since at the OSI 7 layer model, it operates between the layer 2 (Data Link Layer) and the layer 3 (Network Layer), so it often view as a 2.5 layer protocol.Conventional selective information packets are routed based on IP address and other information in the header. MPLS simplifies the forwarding function by taking a total different advent by introducing a connection oriented mechanism inside the connectionless IP network. Label switching indicates that the packets switched are no longer IPv4 or IPv6 packets and even Layer 2 frames when switched, but they are labeled. Below exhibit the MPLS header format.First 20-bits Label value20 22 bits Three Experimental (EXP) bits, use for grapheme of service (QoS)23 bit Bottom of Stack (Bos) bit, 1 for bottom label, 0 otherwise24 to 31 bits Time To Live (TTL)5.1.2 MPLS comp 1nts and operationMPLS network comprise the following elementsLabel Edge Router (L ER) Router laid at the edge of the MPLS networkLabel Switching Router (LSR) MPLS capable routerLabel Switch Path (LSP) An say sequence of LSRsLabel Distribution Protocol (LDP) Set of procedures by which LSRs prepare LSPsIn MPLS network, an optimal passageway is firstly determine and tag. When packets enter the MPLS network, the input router and switch uses the layer 3 header to assign the packets to one of this predetermine path. MPLS using a label stacking process to better handle the traffic. A label is attached to the end to end path information in the packet. The label together with the information packet as it cross the network. All other routers along the path use the label to determine the next bound off address instead of the IP address. Since this device only operates on the information in the label, processor-intensive analysis and mixture of the layer 3 header occur only at the entrance to the network. This remove much of the operating expense used in the network and therefore, speed up the overall processing of data.5.1.3 MPLS ProtocolsMPLS use 2 protocols to establish the LSP, they areMPLS Routing protocol Distribute topology information only. Interior gateway protocol such as OSPF, IS-, BGP-4 is normally use.MPLS Signaling protocol Information for program the switching fabric. RSVP-TE and LDP is used.5.1.4 MPLS VPNMPLS Virtual Private Networks (VPN) is the most universal and widespread implementation of MPLS technology. A VPN provide communication at OSI layer 2 or 3. VPN is protected by strong encryption. In general, the data travel across the VPN is not visible and encapsulated. MPLS is well desirable for VPN because of its characteristics.5.2 Internet ConnectionService Provider PacnetType SHDSLBandwidth 4Mbps downstream/4Mbps upstreamDescription Applied at Site A. By the way, the WAN connection will be allowed the Internet share with Site B office.In order to fulfill both sites demand, Single High Speed Digital Subscriber de rake ate (SHDSL) has chosen. SHDSL is one of the DSL family technology. Similar with other SDSL service, the upstream and downstream data rates are equal. iodin of its advantage of SHDSL is its high symmetric data rates with guaranteed bandwidth and low interference. In Bambi Co., Ltd. a 4M/4M speed line is using for their Internet connection.6. Ethernet StandardCAT 6 (Category 6) twisted-pair UTP is using under Bambi Co., Ltd. local area network environment. Its Gigabit Ethernet cable standard which bandwidth up to 400MHz and over a range of 100 m. It meet up the ANSI/TIA-568-B.2-1 performance specification.7. Network surroundings Overview7.1 Entire Network Diagram7.2 Hardware/Software description7.3 Network configuration7.3.1 Protocol and LAN segmentsWith the popularity of the Internet, TCP/IP become the most popular protocol. In Bambi Co., Ltd. only TCP/IP protocol allowed to be implement on the network environment. All servers and desktop PCs located on Site A and B will have stati c addresses, while notebook PCs will obtain addresses by utilizing projectile Host Configuration Protocol (DHCP).IPv4 will be chosen as the type. Compare with IPv6, IPv4 had been around for many years, there are much more hardware and software supports.8. SecurityThe following is the security governance for protect companys data8.1 AuthenticationEach staff sign an individual login id for access their workstation and server resource like the email. The password establishes complexity level with minimum length of 5 characters. The password will employ change either 3 months.8.2 AuthorizationOnly some authorize staffs with Internet connection. This prevent the data disclose by FTP, web mail or any online storage.8.3 AuditThe email server is able to keep logging which allow the administrative staff trace whether any company important data disclose by email.8.4 MonitorThe firewall and switch are able to monitor the network for suspicious activity. For example, if the firewall obtain heavy traffic or overload session, it will send email alert to the network administrator.8.5 virus ProtectionSome kind of computer virus will steal infected computers data. So every servers and client workstations has install a memory resident antivirus software for protection. The UMT firewall also provide gateway antivirus function which prevent virus from the layer 2 level.8.6 EncryptionThe MPLS VPN deployed to be high security network tunnel. The data transmit between site A and B office with strong encryption.9. ConclusionIn the user requirement chapter, 6 requirements were outlined. We summarize the benefits from applying the MPLS as below9.1 FunctionalityNo performance bottleneck of CPE VPN devicesReduced network latencyGuaranteed SLA (Service level agreement) for time critical applicationsSupports the delivery of services with QoS (Quality of service) guarantees9.2 ScalabilityHighly scalable since no site to site peering is required and reconfiguration of VPN devices.9.3 A daptabilityMultiple connection type and bandwidth selection (e.g. ATM, Metro Ethernet, Broadband, etc.)9.4 SecurityPrivate network completely isolated from Internet.9.5 ManageabilityCustomer is able to complete control their own routing.9.6 Reliability change fast restoration from failuresThe network design presented here meets all those objectives. Both for today and in the future.10. point of referenceRosen, E., Viswanathan, A. and Callon, R. (2001) Multiprotocol Label Switching Architecture, IETF Documents, Online Available from http//tools.ietf.org/html/rfc3031, accessed on 07/03/10PACNET 2010 Pacnet Domestic IP VPN Available on http//hk.pacnet.com/network/domestic-ip-vpn/, accessed on 13/03/10Bates, R. (2002) Broadband Telecommunications Handbook. 2nd edition. McGraw-Hill Professional, Columbus.Guichard, B. PepeInjak, I. and Apcar, J. (2003) MPLS and VPN Architectures, Volume II. Cisco Press, Indiana.Ghein, L. (2007) MPLS Fundamentals. Cisco Press, Indiana.Jamison, S. Cardarel li, M. and Hanley, S. (2007) Essential SharePoint 2007. Pearson Education, Inc., Boston.

No comments:

Post a Comment