enterprise campus networks

22
Enterprise Campus Networks Presented by Central Computing Center NIT Silchar

Upload: kishor-satpathy

Post on 06-Apr-2017

297 views

Category:

Education


1 download

TRANSCRIPT

Enterprise Campus Networks

Presented by Central Computing Center

NIT Silchar

Outline• Traditional Campus Networks • Complex Networks & Challenges• Bandwidth Utilization• Prioritized Traffic• Supporting Techniques• Security Requirements• Simplification of Network• Policies • Conclusion

Traditional Campus Networks

Traditional Campus NetworksCampus Network• A building or group of buildings connected into one enterprise

network that consists of or more LANs.• The company usually owns the physical wires deployed in the

campus.• Generally uses LAN technologies.• Generally deploy a campus design that is optimized for the fastest

functional architecture over existing wire.

Complex Networks & Challenges• Complex in terms of number of end users, networking components,

topology, administrative policies.

• Challenges• Availability • Supporting Atmosphere as per requirement• Security • Performance• cost

Complex Networks & ChallengesNetwork Administrator Challenges• LAN run effectively and efficiently• Availability and performance impacted by the amount of bandwidth in the

network• Understand, implement and manage traffic flow

Current Issues• Broadcasts: IP ARP requestsEmerging Issues• Multicast traffic (traffic propagated to a specific group of users on a subnet),

video conferencing, multimedia traffic• Security and traffic flow

Topology & Network requirements

Simplified, Hierarchical Network Architecture, Personalized Topology

Bandwidth Utilization • Network traffic has became highly unpredictable. in terms of Speed: at what speed we require additional bandwidthDirection: where my traffic is going

• Video enabled application• Mobile devices

Multiplexing• Whenever the bandwidth of a medium linking two devices is greater

than the bandwidth needs of the devices, the link can be shared. • Multiplexing is the set of techniques that allows the simultaneous

transmission of multiple signals across a single data link. • As data and telecommunications use increases, so does traffic.

Prioritized Traffic• Direction in terms of high traffic utilization path• Address based priority • More Ideas on Traffic Management

• Improve TCP• Stay with end-point only architecture

• Enhance routers to help TCP• Random Early Discard

• Enhance routers to control traffic • Rate limiting• Fair Queuing

• Provide QoS by limiting congestion

Supporting Techniques• Availability• Physical link

• LACP• Logical connectivity

• Dynamic protocols based on situation• Unnecessary broadcast, multicast traffic

• Security• Traffic

• VLAN, VTP• STP

• Availability • VPN• DOS & DDOS• Sniffing, Spam, Large amount of junk data

LACP (Link Aggregation Control Protocol)• IEEE 802.3AD that allows us to bunch of physical ports to form a

single logical channel. Maintained in full duplex mode and parallel point to point with at least 1G connections.• higher Potential transmission speed• higher Accessibility• higher Availability & Reliability• Balancing and Rebalancing

VLAN (Virtual LAN)• Sub divided LAN into Virtual LAN, which creates own broadcast

domain that is partitioned and isolated in our network from Layer-2.• Broadcast Traffic Control• Security: from Port level

• VTP: VLAN Trucking protocol (802.1Q) configured in Layer-2 devices to communicate VLAN information over Trunk Port.

STP (Spanning Tree Protocol)• STP: Network Protocol that ensures a loop free connection and

avoiding Broadcast Traffic.

• Security: Avoiding end users to share their own network.

• STP Port security: ensure to dedicate specific Systems with their Media Access Control.

Fundamental Pillars of Alternative Approach of Enterprise Network• Architecture: simplified network model• Control: intelligence, handling context dynamically or administratively• Operations: visibility on what happening in network and able to

manage

Security Requirements (From End-User Port to Boundaries of Private Network)

• Firewall• Anti Virus• Anti Spam• Anti Malware• Port Scanners• Email Scanners• URL Filters

• IPsec• IDS, IPS• TLS,SSL• Wireless Controller• VPN• Packet Inspectors• Application Controller

Proxies and Tools • PRTG, Whatsup Gold, Nessus, Angry IP Scanner, Wireshark, Ethereal,

Snort, Netcat, BURP, TCPdump, Hping, DNSiff, GFI LANguard, Ettercap, Nikto, John the Ripper, OpenSSH, TripWire, Kismet, NetFilter, IP Filter, pf, fport, SAINT, OpenPGP …

Policies

Policies should be based on Network Usage, Requirements, Scenario, Applications, Number of Users, Traffic, Bandwidth

Conclusion• Campus network functional service have to fulfil with out sacrificing

security, performance, reliability based on predefined administrative policies. Traditional approaches may not efficient now, alternative personalized approaches are required

Thanking You