Server an Network Infrastructure
Network and Server Infrastructure includes the logical design of network topology and the physical implementation of networking devices, servers, and other auxiliaries such power supply, cabling and racking.
Our business operations require our network to support the following connectivities:
- For internal user connectivity
Internet - internal users need to connect to the Internet
Intranet - internal users need to connect to other part of the company's intranet, e.g. branch offices
Wireless - internal users need to connect to the company's network using wireless devices
- For external user connectivity
Extranet - external users need to connect to company's Internet facing servers, e.g. company WWW server
VPN - external users need to connect to the company's intranet (layer 3 connection)
SSL VPN - external users need to connect to the company's server through SSL VPN gateway (layer 4 connection)
- For inter-site connectivity
Two-way VPN Tunnelling - intranets of different sites need to be connected by using two-way VPN tunnelling so that they can form a single corporate intranet. Other example is inter-site storage replication
One-way VPN Tunnelling - the management site may need one way connection into the management/service VLAN of other sites
Based on these requirements, we implemented the following subnets:
- DMZ - the subnet that separate the Internet and the corporate network
- Service - the subnet that hardware monitoring, e.g. HP iLO, and management connections resides
- Intranet - the subnet for the corporate servers, e.g. Exchange servers
Sites with IP SANs (iSCSI) require a dedicated storage subnet for security isolation and inter-site data replication. And for security reason, we have a user subnet separated with the servers. In addition, a default Guest subnet with special access policy is used to contain the guest users, and a default Staging subnet is used for staging.
Sites and Topology
DigiCompass currently has two sites - the main office and data centre in Sydney, and an offshore development centre in China. We are planning to open another DR (disaster recovery) site as our business grows. The following diagram shows the network topology of these sites.
File Server ¥500,000
In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.
VPN ¥50,000
A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.
A VPN can connect multiple sites over a large distance just like a Wide Area Network (WAN). VPNs are often used to extend intranets worldwide to disseminate information and news to a wide user base. Educational institutions use VPNs to connect campuses that can be distributed across the country or around the world.
In order to gain access to the private network, a user must be authenticated using a unique identification and a password. An authentication token is often used to gain access to a private network through a personal identification number (PIN) that a user must enter. The PIN is a unique authentication code that changes according to a specific frequency, usually every 30 seconds or so.
Protocols
There are a number of VPN protocols in use that secure the transport of data traffic over a public network infrastructure. Each protocol varies slightly in the way that data is kept secure.
IP security (IPSec) is used to secure communications over the Internet. IPSec traffic can use either transport mode or tunneling to encrypt data traffic in a VPN. The difference between the two modes is that transport mode encrypts only the message within the data packet (also known as the payload) while tunneling encrypts the entire data packet. IPSec is often referred to as a "security overlay" because of its use as a security layer for other protocols.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use cryptography to secure communications over the Internet. Both protocols use a "handshake" method of authentication that involves a negotiation of network parameters between the client and server machines. To successfully initiate a connection, an authentication process involving certificates is used. Certificates are cryptographic keys that are stored on both the server and client.
Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a remote client to a private server over the Internet. PPTP is one of the most widely used VPN protocols because of it's straightforward configuration and maintenance and also because it is included with the Windows operating system.
Layer 2 Tunneling Protocol (L2TP) is a protocol used to tunnel data communications traffic between two sites over the Internet. L2TP is often used in tandem with IPSec (which acts as a security layer) to secure the transfer of L2TP data packets over the Internet. Unlike PPTP, a VPN implementation using L2TP/IPSec requires a shared key or the use of certificates.
VPN technology employs sophisticated encryption to ensure security and prevent any unintentional interception of data between private sites. All traffic over a VPN is encrypted using algorithms to secure data integrity and privacy. VPN architecture is governed by a strict set of rules and standards to ensure a private communication channel between sites. Corporate network administrators are responsible for deciding the scope of a VPN, implementing and deploying a VPN, and ongoing monitoring of network traffic across the network firewall. A VPN requires administrators to be continually be aware of the overall architecture and scope of the VPN to ensure communications are kept private.
Advantages & Disadvantages
A VPN is a inexpensive effective way of building a private network. The use of the Internet as the main communications channel between sites is a cost effective alternative to expensive leased private lines. The costs to a corporation include the network authentication hardware and software used to authenticate users and any additional mechanisms such as authentication tokens or other secure devices. The relative ease, speed, and flexibility of VPN provisioning in comparison to leased lines makes VPNs an ideal choice for corporations who require flexibility. For example, a company can adjust the number of sites in the VPN according to changing requirements.
There are several potential disadvantages with VPN use. The lack of Quality of Service (QoS) management over the Internet can cause packet loss and other performance issues. Adverse network conditions that occur outside of the private network is beyond the control of the VPN administrator. For this reason, many large corporations pay for the use of trusted VPNs that use a private network to guarantee QoS. Vendor interoperability is another potential disadvantage as VPN technologies from one vendor may not be compatible with VPN technologies from another vendor. Neither of these disadvantages have prevented the widespread acceptance and deployment of VPN technology.
LAN Wiring ¥50,000 〜
PC and Server troubleshooting ¥30,000 〜
Troubleshooting is the process or identifying and fixing problems. Computer troubleshooting may involve hardware or software and can sometimes involve both at the same time. The basic process of troubleshooting is to check the most general possible problems first, and then gradually check for more specific problems.