Tax Net Training
Tax Net Training
SUMMER TRAINING
AT
IBM
BY:
SRM UNIVERSITY
B.Tech (EEE)
June, 2014
PREFACE
Income Tax department (DIT) has offices in more than 510 cities and towns across
India covering 751 buildings. DIT intends to implement All India Income Tax Network
(TAXNET) under phase III of computerization to augment its existing network and to
cover the additional cities and buildings in the country. DITs consultant IBM handles
all its computerised operations.
I am extremely grateful to get the opportunity to undergo my summer training here. I
got to work with the extremely efficient persons of IBM and gained immense
exposure and knowledge from this training.
In this particular project I have tried to cover the LAN, WAN, MPLS, IPSec, Layers,
Security Leading practices, IP for routers and Switches, as based on the requirement
and knowledge I captured through discussion with DITs consultant IBM.
I thank for giving me the opportunity to undergo the summer training at this
highly esteemed company. This project would not have been a success without the
able guidance of Sir. I am thankful to each and every person at IBM for their
cooperation and guidance which led to the completion of this project.
CONTENTS
Sl. No. Topic
1.
2.
LAN sites
3.
WAN topology
4.
LAN topology
5.
LAN security
6.
Leased Line
7.
MPLS
8.
DATA Security
9.
10.
OSI Model
11.
IP : TCP/UDP
12.
Hardware Overview
Each of these LAN sites have different LAN device configuration depending on
the capacity requirements and also the redundancy and failover requirements.
WAN TOPOLOGY:
The phrase WAN Topology refers to the arrangement or relative positioning of links and
nodes.
Point-to-Point
Point-to-point networks see WAN sites connected by high-capacity network cabling
known as backbone. The sites are connected as if in a line, with each site (other
than the ones at the ends of the line) only linked to the sites directly before and after
it. This is a simple topology to implement, and provides cost benefits in that it
requires minimal cabling. However, it leaves networks vulnerable to failure, as a
single fault on the backbone can bring whole sections of the network down.
MPLS
LAN TOPOLOGY
Ring
The ring topology is the same as the point-to-point topology, except the sites at the
end of the backbone are connected to each other as well. This makes ring topology
WANs less vulnerable to failure, as traffic can be routed the opposite way around the
ring if a fault is detected on the network. However, adding new sites to ring topology
WANs requires additional work and cost when compared to point-to-point setups, as
each new site requires two connections instead of one.
Star
The star topology sees all sites connected to a central hub, a little like the spokes of
a wheel. WAN hubs use a technology known as a concentrator router to ensure data
is sent to the right destination. This topology allows for sites to be added to the
network easily an important consideration for business WANs and is not
vulnerable to a single cable failure bringing down the whole network. However, it is
entirely dependent on the concentrator router to be able to run.
Bus
In bus topologies, all computers are connected to a single cable or "trunk or
backbone", by a transceiver either directly or by using a short drop cable. All ends of
the cable must be terminated, that is plugged into a device such as a computer or
terminator. Most bus topologies use coax cables.
The number of computers on a bus network will affect network performance, since
only one computer at a time can send data, the more computers you have on the
network the more computers there will be waiting send data. A line break at any
point along the trunk cable will result in total network failure. Computers on a bus
only listen for data being sent they do not move data from one computer to the next,
this is called passive topology.
Mesh
LAN SECURITY
This section covers different security mechanisms available in LAN environments to
protect the LAN switch network from unauthorised access and resource protection.
DHCP SNOOPING
DHCP (dynamic host configuration protocol) snooping is a DHCP security feature
that provides network security by filtering untrusted DHCP messages and by
building and maintaining a DHCP snooping binding table. An untrusted message is
a message that is received from outside the network or firewall that can cause traffic
attacks within your network.
DIT is planning to use manual IP addressing for all the sites due to their requirement
to ensure a static IP address is available for all the hosts. This is to ensure that,
network or application access control can be achieved based on the IP address and
hence an individual user.
DYNAMIC ARP INSPECTION
Dynamic arp inspection is a security feature that validitates ARP packets in a
network. It intercepts, logs and discards ARP packets with invalid IP-to-MAC
address bindings. This protects the network from certain man in the middle attacks.
For TAXNET network, dynamic ARP inspection is not a scalable option because of
the non DHCP environments.
PORT SECURITY
PortSecurity helps to ensure that only valid sources are allowed to transmit traffic
into the LAN network. Port Security feature uses dynamically learned and static
MAC addresses to restrict ingress traffic to an interface by limiting the MAC
addresses that are allowed to send traffic into a port. Upon assigning secure MAC
addresses to a secure port, the port does not forward packets with source
addresses outside the group of defined addresses.
As security of LAN is a critical requirement for DIT, port security can be used to
protect the network from unauthorized workstations gaining access. This ensures
that only one allowed MAC address (i.e. Workstation) can send traffic into the
switch.
LEASED LINE:
A leased line is a service contract between a provider and a customer, whereby the
provider agrees to deliver a symmetric telecommunication line connecting two or
more locations in exchange for a monthly rent (hence the term lease). It is
sometimes known as a "private circuit" or "data line". Leased lines can be used for
telephone, data or internet services.
Typically, leased lines are used by businesses to connect geographically distant
offices. Unlike dial-up connections, a leased line is always active. The fee for the
connection is a fixed monthly rate. The primary factors affecting the monthly fee are
distance between end points and the speed of the circuit. Because the connection
does not carry anybody else's communications, the carrier can assure a given level
of quality.
An Internet leased line is a premium internet connectivity product, delivered over
fibre normally, which is dedicated and provides uncontended, symmetrical speeds,
full-duplex. It is also known as an Ethernet leased line, DIA line, data circuit or
private circuit.
Leased lines, as opposed to DSL, are being used by companies and individuals
for Internet access because they afford faster data transfer rates and are costeffective for heavy users of the Internet.
Applications:
ADVANTAGES:
Customer networks are connected via Customer Edge (CE) routers to the provider
MPLS network. In MPLS-VPN terminology, an Edge LSR that provides VPN services
over MPLS is referred to as a PE. The Customer Edge router runs ordinary IP
forwarding (static or dynamic) will not run MPLS. If the CE does run MPLS, it will
usually use it independently of the provider.
Efficient Traffic Management MPLS is a careful and effective way of fixing the paths
of various traffic classes. There will be MPLS packets that would be specified for the
MPLS routerers. That way, whether the bandwidth traffic is from video, voice or data, these
would not end up jammed within the network which results to slower connection and other
problems. With leased lines, such in-depth engineering for traffic management can not be
mimicked.
Improved QoS there is no doubt that when it comes to Quality of Service, MPLS
definitely wins over leased line. The streamlining of traffic flows also gives an opportunity to
specify which traffic is more important over the other. For example, data class traffic would
be automatically considered as a lower priority compared to video class traffic. Because of
such impressive QoS, various applications would function much more smoothly.
Shorter Response TimeThis is primarily because MPLS has lesser hops. Compared
to leased line, data needs to travel more before it reaches destination and before the
inbound data is received. With MPLS, less hops between network points make response
time almost instantaneous.
OSI Model
7. Application
Data
6. Presentation
Function
Data
representation,
encryption
and
decryption,
convert
Host
layers
5. Session
Segments 4. Transport
Packet
3. Network
Interhost
communication,
managing
sessions
between
applications
Media
layers Bit/Frame 2. Data Link
Bit
1. Physical
Media Access Control (MAC) layer - responsible for controlling how computers in
the network gain access to data and permission to transmit it.
Logical Link Control (LLC) layer - control error checking and packet
synchronization.
The Point-to-Point (PPP) is an example of a data link layer in the TCP/IP protocol
stack.
letting the network find the way to deliver ("route") the message to the destination
node. In addition to message routing, the network may (or may not) implement
message delivery by splitting the message into several fragments, delivering each
fragment by a separate route and reassembling the fragments, report delivery errors,
etc.
Functions:
The Internet Protocol is responsible for addressing hosts and for routing diagrams
(packets) from a source host to a destination host across one or more IP networks.
For this purpose the Internet Protocol defines the format of packets and provides an
addressing system that has two functions: identifying hosts and providing a logical
location service.
Range of IP used:
In the Internet addressing architecture, a private network is a network that uses
private IP address space, following the standards set by RFC 1918 for IPv4.
The Internet Assigned Numbers Authority (IANA) has reserved the following IPv4
address ranges for private network.
RFC1918 name
IP address range
Number of addresses
24-bit block
10.0.0 - 10.255.255.255
16,777,216
20-bit block
172.16.0.01722.31.255.255
1,048,576
16-bit block
192.168.0.0192.168.255.255
65,536
Function:
The protocol corresponds to the transport layer of TCP/IP suite. TCP provides a
communication service at an intermediate level between an application program and
the Internet Protocol (IP).
IP works by exchanging pieces of information called packets. A packet is a sequence
of octets (bytes) and consists of a header followed by a body. The header describes
the packet's source, destination and control information.
Due to network congestion, traffic load balancing, or other unpredictable network
behavior, IP packets can be lost, duplicated, or delivered out of order. TCP detects
these problems, requests retransmission of lost data, rearranges out-of-order data,
and even helps minimize network congestion to reduce the occurrence of the other
problems. Once the TCP receiver has reassembled the sequence of octets originally
transmitted, it passes them to the receiving application. While IP handles actual
delivery of the data, TCP keeps track of the individual units of data transmission,
called segments that a message is divided into for efficient routing through the
network. Thus, TCP abstracts the application's communication from the underlying
networking details.
HARDWARE OVERVIEW: