5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network



Similar documents
DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Mobile IP Part I: IPv4

VPN. Date: 4/15/2004 By: Heena Patel

Configuring Network Address Translation (NAT)

Basic IPv6 WAN and LAN Configuration

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Technical papers Virtual private networks

Network Configuration Settings

Network Security Topologies. Chapter 11

Chapter 3 LAN Configuration

Secure Network Design: Designing a DMZ & VPN

Wireless VPN White Paper. WIALAN Technologies, Inc.

Chapter 5. Data Communication And Internet Technology

6 Mobility Management

Chapter 12 Supporting Network Address Translation (NAT)

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Local Area Networks (LANs) Blueprint (May 2012 Release)

Configuring Windows Server 2008 Network Infrastructure

GSM Network and Services

Understand Wide Area Networks (WANs)

WAN Failover Scenarios Using Digi Wireless WAN Routers

R4: Configuring Windows Server 2008 Network Infrastructure

Chapter 3 Security and Firewall Protection

LAN TCP/IP and DHCP Setup

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

ewon-vpn - User Guide Virtual Private Network by ewons

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Top-Down Network Design

IBM enetwork VPN Solutions

21.4 Network Address Translation (NAT) NAT concept

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Chapter 2 TCP/IP Networking Basics

EE6390. Fall Research Report. Mobile IP in General Packet Radio System

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Virtual Private Networks

Chapter 4 Customizing Your Network Settings

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Using Remote Desktop Software with the LAN-Cell

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Routing Security Server failure detection and recovery Protocol support Redundancy

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

Wireless Encryption Protection

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Computer Networking Networks

MN-700 Base Station Configuration Guide

HOWTO: How to configure IPSEC gateway (office) to gateway

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

White Paper. Mobility and Mobile IP, Introduction. Abstract

Introduction to MPLS-based VPNs

White Paper. Telenor VPN

GPRS / 3G Services: VPN solutions supported

2. IP Networks, IP Hosts and IP Ports

Chapter 4 Customizing Your Network Settings

Controlling Ashly Products From a Remote PC Location

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Cisco RV220W Network Security Firewall

GPRS and 3G Services: Connectivity Options

Infrastructure-less networks

Protecting the Home Network (Firewall)

Cisco Which VPN Solution is Right for You?

Deploying IPv6, Now. Christian Huitema. Architect Windows Networking & Communications Microsoft Corporation

GPRS Network Security

Wireless Networks: Network Protocols/Mobile IP

Tech-Note Bridges Vs Routers Version /06/2009. Bridges Vs Routers

Basic Network Configuration

Quidway MPLS VPN Solution for Financial Networks

Cornerstones of Security

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

DMZ Network Visibility with Wireshark June 15, 2010

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

Source-Connect Network Configuration Last updated May 2009

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

Intranet Security Solution

Security Design.

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager

Tomás P. de Miguel DIT-UPM. dit UPM

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Using LISP for Secure Hybrid Cloud Extension

Firewall Architecture

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

V310 Support Note Version 1.0 November, 2011

Configuring a VPN for Dynamic IP Address Connections

Expert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

For extra services running behind your router. What to do after IP change

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007

RAP Installation - Updated

Mobile SCTP Transport Layer Mobility Management for the Internet

What would you like to protect?

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Transcription:

5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1

5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business: mostly always-on connections Plus: academic networks (part of the Internet) Structure Large ISPs have their own world-wide backbone networks (leased lines interconnecting routers) Smaller ISPs have peering agreements with large ISPs to transport wide area traffic Most traffic to or from outside networks Efforts (e.g. Portals) to keep more traffic within own network 2

5.2The Intranet Internal IP networks (e.g. of a company) Full internal IP connectivity Often with internal DNS name space, DNS servers etc Often interconnecting multiple sites in the world External connectivity to Internet Via NAT, application proxies, firewalls, gateways often with private address range (e.g. 10.0.0.00 0 0 network) Or duplicate of a valid Internet address range (connectivity problems!) Problems with company mergers! Internal services Usually not exported to external world Exported services with access limitation Extranets 3

Extranet Different from Intranet Some resources may be accessed by specific groups of users outside the organization under the control of the network administrator. Example: on line ordering, distance learning. 4

Address for private network Three choices available Network apply for the set of address from the Internet authority (fixed IP) Use any set of address without registering (E.g., Dynamic IP, DHCP). This is ok because the network is isolated. Used the reserved addresses. 5

Reserved addresses 2 24 10.0.0.0 to 10.255.255.255 2 20 172.16.0.0 to 172.31.255.255 2 16 192.168.0.0 to192.168.255.255 These addresses are unique inside the organization but they are not unique globally 6

5.2.2 Virtual Private Network (VPN) Provide a private network using public IP network infrastructure IP tunneling Encryption VPN applications Between different sites of an enterprise Site-to-site VPN Private network addresses can be tunneled over a public network Tunnel works just like a leased line For remote access Allows remote access to the Intranet For providing an Extranet t Allows outside access to a part of an Intranet Three strategies: Private network Hybrid network VPN 7

Private Network Small organization with one single LAN can use private network Transaction between the people in the organization totally remain inside, secure from outsiders. Different sides can be connected using routers and leased lines. 8

Hybrid Network Privacy in intra-organization data exchange. At the same time needs Internet for the data exchange with other organizations. The organization have both global and private addresses. 9

Virtual private network Both private and hybrid networks are costly. VPN is private but virtual Uses IPsec and Tunneling 10

5.2.1Network Address Translation (NAT) Whole private address space hides behind one public IP address Translation of port numbers allows multiple internal hosts to communicate Savings in global IP addresses Issues with application layer protocols If they talk about IP addresses or port numbers E.g. FTP, H.323 Resolved by proxy servers or application awareness 11

5.2.3 Remote LAN Access (RLA) Dial-up access to an Intranet for teleworking Private modem pool and access server within Intranet long-distance dial-up connections information security relies on telephone network VPN based access use IP tunnel over the Internet or from a VPN provider encryption of data in tunnel ensures information security world-wide ISP presence allows local calls for dialup connections 12

5.5 Mobile Networks Mobile IP RFCs 2002, 2005, 2006 Difference between wireless technology and mobility! Wireless technology: communicate while moving Wire bound technology: plug into a new network and continue working Mobile IP specifies mobility support (More or less) independent of access technology Transparent support (independent of communication partners) for IPv4 Mobility across the internet (scalable in terms of distance) Advertisement / broadcast based forwarding management For infrequent changes of location 13

Address in mobile IP Home address A permanent address It associates the host to its home network Care-of-address A temporary address It associates with foreign network. 14

5.5.1 Mobile IP Mobility of mobile node MN supported No need for communication partner (Correspondent Node, CN) to know about this CN still sends packets to home address of MN Minimum requirement: Home Agent (HA) MN can act as Foreign Agent (FA) 15

Mobile IP (2) Mobile node connects to foreign network MN obtains IP address in foreign network (e.g. via DHCP) MN locates foreign agent IPsec tunnel established from Home Agent (HA) to Foreign Agent (FA) IP address of FA is called care-of of address Packets to the mobile node Reach the home network via standard IP routing Are intercepted by the home agent Home agent forwards packet to care-of address within tunnel Foreign agent forwards packet to mobile node (no tunnel) Packets from the mobile node Are sent via standard IP routing to the corresponding node ( triangular routing ), HA as source, sent by FA Are sent to the foreign agent Forwarded within reverse tunnel to home agent Sent to correspondent node by home agent This is when gateway routers have ingress filters 16

5.5.2 GPRS General Packet Radio Service provide a packet service extension to GSM mobile networks Protocol Stack: BSSGP Base Station System GPRS Protocol GGSN Gateway GPRS Support Node GPRS General Packet Radio Service GSM Global System for Mobile Communication GTP GPRS Tunneling Protocol LLC Logical Link Control MAC Media Access Control RLC Radio Link Control SGSN Serving GPRS Support Node SNDCP Subnetwork Dependent Convergence Prot 17

GSM/GPRS Coverage in Malaysia (Maxis) 18