You are on page 1of 22

INDUSTRIAL TRAINING REPORT

On
Network Infrastructure of a Company
Submitted in Partial Fulfillment of the Requirements

For the Degree of


Bachelor of Technology
In
Information Technology
By

Student Roll 16303013074


Number
Student Name Rishabh Maurya
Company Name Netcamp Solution Pvt.
Ltd
Mentor Name Mr. Santu Pukait
Email of Mentor Santu@netcamp.in
Mobile of 9331090003
Mentor

KRISHNA ENGINEERING COLLEGE


GHAZIABAD, UTTAR PRADESH
AFFILIATED TO DR. A.P.J. ABDUL KALAM TECHNICAL
UNIVERSITY
LUCKNOW, UTTAR PRADESH (SESSION: 2019-2020)
DECLARATION

I Rishabh Maurya hereby declare that this submission is my own work


and that, to the best of my knowledge and belief, it contains no material
previously published or written by another person nor material which to
a substantial extent has been accepted for the award of any other degree
of the university or other institute of higher learning, except where due
acknowledgment has been made in the text.

Signature:

Name:

Roll No.:

Date:
Attach Certificate here issued by the company for your
industrial training
ACKNOWLEDGEMENT

It gives me a great sense of pleasure to present the report of the industrial


training during B.Tech. third Year. I owe special debt of gratitude to
Rishabh Maurya for his/her constant support and guidance throughout the
my training. his sincerity, thoroughness and perseverance have been a
constant source of inspiration for me. It is only his/her cognizant efforts
that my endeavors have seen light of the day.

I also take the opportunity to acknowledge the contribution of


Mr.Santu Purkait for his full support and assistance during the my
industrial training.

I also do not like to miss the opportunity to acknowledge the


contribution of all faculty members of the department for their kind
assistance. Last but not the least, I acknowledge my friends for their
contribution in the completion of the Industrial training.

Signature:

Name:

Roll No.:

Date:
ABSTRACT

Computer networks are a system of interconnected computers for the purpose


of sharing digital information. The concept of a network began in 1962 when a
server at the Massachusetts Institute of Technology was connected to a server
in Santa Monica, California.

Since that time the proliferation of computers and computer networks has
increased significantly. One of the most significant challenges to networks is
attacks on their resources caused by inadequate network security. The purpose
of this research project was to evaluate open source, free, intrusion detection
systems and how easily they can integrate into an existing network. Research
was conducted for this study through a review of existing literature pertaining
to intrusion detection systems and how they function. The literature also
highlighted previous studies conducted on intrusion detection systems, both
commercial and open source. In addition to the review of existing literature,
the author conducted independent testing on three open source intrusion
detection systems.

The open source programs, Snort, OSSEC, and Prelude, were selected due to
being highly rated in professional publications. The author created a secure
simulated computer network, to ensure that each of the programs was tested in
a controlled and equitable manner. The findings of this study determined that
the three open source intrusion detection systems tested are as capable as
commercial programs in securing a computer network.
TABLEOFCONTENTS
Page

DECLARATION ................................................................................................... ii
CERTIFICATE ISSUED BY THE COMPANY ................................................... iii
ACKNOWLEDGEMENTS.................................................................................. iv
ABSTRACT ........................................................................................................... v
LIST OF ABBREVIATIONS ................................................................................ ix
CHAPTER 1: INTRODUCTION OF THE COMPANY............................................... 1
1.1. ................................................................................................................. 3
1.2. ................................................................................................................. 5
CHAPTER 2: PROBLEM STATEMENT AND OBJECTIVE.................... 7
2.1. ................................................................................................................. 8
2.2. ................................................................................................................. 10
CHAPTER 3: LITRATURE SURVEY ………………………………………… 17
3.1 ………………………………………………………………………..
3.2 ………………………………………………………………………
CHAPTER 4:METHODOLOGY AND TECHNOLOGY ................................... .
4.1. ................................................................................................................ 19
4.2. ................................................................................................................ 20
CHAPTER 5:RESULT ANALYSIS AND DISCUSSION .................................. 24
5.1. ................................................................................................................ 25
5.2. ................................................................................................................ 27
CHAPTER 6:CONCLUSIONS AND FUTURE WORK ................................. 30
6.1. ................................................................................................................ 36
6.2. ................................................................................................................ 37
REFERENCES... .................................................................................................... 38
LIST OF FIGURES

Figure. No. Caption of the Figure


Fig-1.1 Block Diagram of the Process
LIST OF ABBREVIATIONS [16 Pts]

S. No Abbreviations Description
1 DNS Domain Name Server
2 DHCP Dynamic Host Control Protocol
3 IPv4 Internet Protocol Version 4
4 NFS Network File Sharing
5 POP Post Office Protocol
CHAPTER -1
Introduction of the Company

Netcamp is a technology consulting and training-based firm specializing in IT


networking domain to provide solutions and services to our clients across the
industry.

At Netcamp, we focus on delivering value to our clients through leading edge


technologies that are future-oriented and meet the challenging requirements of
industry with a view to enable clients take advantage of the growing technology
market.

Through a range of practical training sessions and techniques by leveraging


information technologies we aim to enable our clients solve complex problems with a
strong commitment to achieve client satisfaction.

We implement hands on practical exposure in networking technologies including


Linux, Microsoft Windows 2003, Internet, TCP/IP, Ethical Hacking and
Telecommunications through our meticulous & comprehensively designed structure
& courses that has a well defined interlink, with an aim to bridge the gap between
academics and industry.
CHAPTER -2
Problem Statement and Objective

Bought the following items to start your Company and plan to inaugurate the portal
by 9am 1st July 2019.
a) Rented a space to use it as office and keep your servers
b) 3 Red Hat Linux Enterprise server. With plenty of memory and stoage space
c) 3 live IP address
d) 32Mbps internet connection from reliance
e) A domain name as netcamp.in
CHAPTER -3
Literature Survey

Computer networks are comprised of a series of interconnected computers, and


were designed for the purpose of sharing information. Connected networks,
especially those connected to the Internet, are vulnerable to unauthorized
intrusions. Network intrusions can be in the form of viruses, worms, spyware, and
hackers. Securing a network includes monitoring and preventing all unauthorized
access to the network.
The purpose of this project was to evaluate open source IDSs and how they can
provide security in a network environment.

Computer Networks
A Local Area Network (LAN) and Wide Area Network (WAN) are two types of
computer networks. A LAN is a network that is confined to a relatively small area,
generally limited to a geographic area such as an office building, school or home. A
WAN connects smaller LAN networks together, such as a company’s headquarters in
New York City to a remote office in Florida. A network facilitates electronic
communication, file sharing or calibration, such as a video conference.

Main Results of the Literature Review


The review revealed that the demand and need for research on the topic of SDN
combined with challenges and effects increased since the year 2011. With no relevant
article found in 2010 and one relevant article found in 2011 the first increase was
evident in the year 2012 with seven relevant articles. Already 22 articles deal with
challenges and effects of SDN in the year 2013 and in the first half of the year 2014
there were again 14 articles on that topic. The temporal analysis shows that SDN is
gaining relevance with further research and analytical approaches being expected
within the following years.
Most papers address the implementation as a challenge. Factors, like vendor-lock-in
effects and the high risk of changing traditional network architectures, are included in
this category, and discussed and researched most often. The second highest in terms
of attention given is the category of demand. Included in this category are security
issues arising with software defined networking and the permanent high demand from
the end-user combined with the fear of changing traditional networks. The third
category describes the topic of know-how existing for software defined networking.
Administrating and controlling software defined networks with the existing staff and
the overload arising from this were subsumed in this category.

Fig. 1. Overview of number of papers dealing with challenges and effects of


SDN.

Network Vulnerabilities
The average time a new system, which is un-patched and un-defended, can be
connected to the Internet before it is attacked is approximately twenty to thirty
minutes, yet more than thirty percent of those polled by the National Cyber Security
Alliance (NCSA) think they will be struck by a bolt of lightning before they see their
computers violated in an Internet attack. In 2004, the computer worm My Doom was
released. 9
CHAPTER -4
Methodology and Technology
 Create one web server which will host all the web sites for the Company
(netcamp.in)
 Create one DNS server .
 Create one mailing server which will provide the email service for the
Institution / Company (mail.netcamp.in – and should be able to access
from web). Mail server should have POP3 support so user can download
email in their own laptop/desktop. (Please customize the mail page with
your own company logo and company name)
 The mail server will be the file server which will have file storage space
for the user.
 File server will also have a dhcp server (range of ips =192.168.1.150 to
192.168.1.190 gateway=192.168.1.1 and dns server = give your dns
server) so that it can give ip address to all client machines.
 You were 4/5 in your group you decided that you will be the Chairman
of the company and will have access to all the files / folders in your
company. You created three departments – Sales, RandD and Accounts.
Please divide the group members in all these groups. For the file
management you decided about the following points.

Email address - username@netcamp.in

company.in (should also open as www.netcamp.in)

sales.company.in

research.company.in

accounts.company.in

mail.company.in

 Common data folder for user (only departmental access – only the
department people can read and write on the same)(samba share)
/departmentname/data

 Common driver folder for the user (only departmental access –


only access (r-x) but they can’t write on the same)(samba share)

/departmentname/driver

 Please make a note, chairman will have full access on these folder called
data and driver (samba share);
 You should also view others domain and send mail to them Please design
and implement the same.
 Please note Reliance will give the public ip address only after a week so,
all job has to be done with private ip address only for the same.

Firewall: Please use firewall in your server make sure that telnet, ftp
and ssh is not allowed from outside the network (allow only to your
group members ip only)
CHAPTER -6
Conclusions and Future Work
Networks have taken a significant number of major twists and turns since they began
to gain popularity in the early 1980s, with an amazing range of basic technologies,
protocols and configurations developed and deployed. With today's mobile-centric
wireless LANs now dominating the edge of the network, it seems a safe bet that Wi-
Fi will remain the preferred access for essentially all users, but underpinned by wired
Ethernet for backhaul and interconnect.

Wave 2 of IEEE 802.11ac- which has gained significant traction, will be a bit
long in the tooth in 2025, but it will still be in use -- not completely replaced by
802.11ax and its 10 Gbps of throughput. Wi-Fi will continue to dominate access. No
surprises there. But we did notice a few other interesting trends as we mull the future
of networking, including:

The demise of the WLAN controller. Controllers evolved from early


gateway appliances and specialized wireless switches -- both from the late 1990s --
as a vehicle to consolidate key WLAN functions, like traffic management and
security. That made sense at the time, as the required electronic components were
expensive, price and performance were relatively poor, and the experience base
limited. In 2025, high-performance microprocessors and a foundation of distributed
systems -- most notably, the internet itself -- make controllers unnecessary. WLANs
thus become another beneficiary of a key trend that will shortly be obvious: an
emphasis on simplicity.

Ethernet switches become transparent. The ubiquitous switch will remain,


providing interconnect and power for all of those access points, as well as transparent
policy implementation and traffic management at the edge of the network and in
intermediary switches where those are still required. The big debate today is whether
the next generation of switches deployed should go to per-port speeds of 10 Gbps, or
whether the current crop of 2.5/5 Gbps switches will remain adequate. I favor 10
Gbps, as I believe component costs and, thus, end-user prices will fall quickly. And
2.5 Gbps and 5 Gbps are really stopgap capacities that will require upgrades before
the equipment provisioning them is fully depreciated. Fiber will become more
common, but hybrid fiber-copper cables will be required for Power over Ethernet,
slowing deployments somewhat.

Routers live on -- sort of. The term router is increasingly inappropriate, as the
genesis of the router was in multiprotocol infrastructure elements supporting more
than one physical layer. Today's routers are really degenerate Layer 3 switches, with
additional security and management capabilities. They are really more of a WAN
access device than a router and, again, transparent in operation. Carrier-grade routers
remain, of course, but the enterprise router of 2025 also becomes transparent.

Everything else in the cloud. Network functions virtualization and software-


defined networking will play increasingly large roles the future of networking,
converting what used to be specialized hardware or local virtual machines into
software running in the cloud. All management functions, including analytics, will
reside in the cloud, providing full-function, extensible, manage-anywhere flexibility
and unprecedented resilience and reliability. We also expect managed services
providers to play a rapidly increasing role, especially with SMBs, turning the entire
network into an operating expense installed and managed by a third party. Even
some larger firms will move in this direction over time -- and for much more of IT
than just the network.

Software Defined Networking


Today's static architecture needs improvement. Gone are the days when we simply
sat at a desk with a static computer. We now travel with our devices, and demand to
be able to use applications at our whim. To keep up with the needed bandwidth and
flexibility, SDN has become a popular idea.
Software Defined Networking, or SDN, is cloud-based software that allows for
management of the network from one central point. The key is virtualization, which
makes it so software can run separately from hardware. It would be automatically
responsive, and information technology personnel could view all problems from one
location and have a much easier time troubleshooting.

Other Future Trends

4D
The 4D Network is an attempt to eliminate the need for Internet Protocol that we
know today. Internet Protocol is an old system that has some vulnerability and
inefficiency as more applications are added to it. A 4D Network would restructure
how packets of information are handled by following the 4 network planes:

 Decision plane - creating a network configuration


 Dissemination plane - getting information and sending out decision plane output
to routers
 Discovery plane - letting devices 'discover' their directly connected neighbors;
 Data plane - directing the forwarding of network traffic
References

 https://study-ccna.com.
 https://www.stackoverflow.com.
 https://www.github.com.
 https://www.linux.org.
 https://opensource.com/article/18/7/sysadmin-guide-networking-commands
 Peterson, L. L. and Davie, B. S. (1996) Computer Networks: A Systems
Approach, Morgan Kaufmann.

You might also like