Upload
kumar-r-ranjan
View
220
Download
0
Embed Size (px)
Citation preview
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
1/15
Network Distribution in NIT Hamirpur:
Analysis and Future Prospects
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
2/15
Network Distribution in NIT Hamirpur:
Analysis and Future ProspectsBy :
Kumar Rajeev Ranjan (07438)
Nikhil Khullar (075
Abstract:We present a case study on thearchitecture of network distribution in our
campus through LANs, Wi-fi and VoIP
connections. We present how the proxy server isset up to distribute the internet coming from ISP
to the various users through intermediate
switches and routers. Owing to the bottleneck
created because of the constraints in the transfer
capacity of normal cables as opposed to the
connecting optical fibre cables, the network performance tends to get degraded. We suggest
alternative configurations by which the problem
can be countered.
2. Mobility.The former can be realised with optical fibresand the latter with various wireless links.
Following these trends, our case study aims tosuggest measures to counter the growing
network needs at National Institute of
Technology, Hamirpur.
II. Architecture
Firstly, the central inter-network line comes
from the Internet Service Provider (ISP) to therouter, which routes the incoming signals to the
core-switch, which is presently located in the old
t t D di th di t
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
3/15
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
4/15
the past few months is Address ResolutionProtocol (ARP) spoofing or ARP Poisoning.
This can be simply understood by the following
example:
Suppose we make an entry in /etc/hosts on a
Linux machine saying that google.com resolvesto 127.0.0.1, now whenever we will try to visit
google.com, we'll eventually end up at localhost.
Similar concept is followed for ARP Poisoning.
The attacker sends malicious packets which
force the domain names to be resolved in such away that all requests eventually end up on his
machine. The clients feel that the internetservice is not working, whereas the attacker is
not letting it work. The scenario becomes further
adverse when the attacker spoofs his identity
while attacking.
V. Statistics
From the statistics, it can be inferred that therehas been almost no usage between 25th
and 29th
January, 2010.Also, it shows that during thedays when people were facing internet problems,
bandwidth was being used. This clearly proves
that ARP and related attacks are being
attempted.
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
5/15
Network Distribution in NIT Hamirpur:Analysis and Future Prospects
By:
Kr. Rajeev Ranjan 07438
Nikhil Khullar 07527NIT Hamirpur (HP)
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
6/15
Introduction to Networks
Networks and their evolution.
Inter-Network.
Requirements of future.
High speed and reliability
Mobility
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
7/15
LA Networks at NIT Hamirpur
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
8/15
Networking at NIT Hamirpur (contd
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
9/15
Statistics as recorded today, 1:27 A.M
Courtesy: alumni.nith.ac.in Port
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
10/15
Statistics (Contd.)
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
11/15
Statistics (Contd.)
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
12/15
Statistics (Contd.)
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
13/15
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
14/15
Conclusion:
To enhance the speed and reliability, the transmission should be
done using optical fibre cables.
The following counter measures can be adopted for preventingattacks on the network and for ensuring optimal usage:
MAC to IP binding
Delay Pool Implementation (Bucket System)
Authenticated Access (Quota System)
8/14/2019 Distributution of Network @ NIT Hamirpur: Analysis and Future Prospects
15/15