Breaking the Kubernetes Kill Chain: Host Path Mount
Network developer company report
1. [Date]
1
CERTIFICATE
This is to certify that Network Developer Company embodies the
original work done by Zeeshan Alam Raza, Usman Javed, Ali Khan,
and Husnian Liaqat during this project submission as a partial
fulfillment of the requirement for the System Design Project of Network
Solution Company Final Semester, Of University of Central Punjab
Okara Campus.
Instructor’s Name:
________________
Prof. Khalid Rashid
University Of Central Punjab
2. [Date]
2
ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any
task would be incomplete without the mention of people whose
ceaseless cooperation made it possible, whose constant guidance and
encouragement crown all efforts with success.
We are grateful to our project guide Prof. Khalid Rashid for the
guidance, inspiration and constructive suggestions that helpful us in the
preparation of this project.
We also thank our colleagues who have helped in successful completion
of the project.
Team Nexus 4…..!
Zeeshan Alam Raza
Usman Javed
Ali Khan
Husnian Liaqat
3. [Date]
3
Special Thanks
This project consumed huge amount of work, research and dedication. Still,
implementation would not have been possible if we did not have a support of many
individuals and organizations. Therefore we would like to extend our sincere
gratitude to all of them.
First of all we are thankful to [Hammer Head Networks] for providing necessary
guidance concerning projects implementation.
We are also grateful to [Moazam Mahmood and Waqas Mustafa] for provision of
expertise, and technical support in the implementation. Without their superior
knowledge and experience, the Project would like in quality of outcomes, and thus
their support has been essential.
We would like to express our sincere thanks towards volunteer researchers who
devoted their time and knowledge in the implementation of this project.
Nevertheless, we express our gratitude toward our families and colleagues for
their kind co-operation and encouragement which help us in completion of this
project.
4. [Date]
4
Requirements of Network developing company:
Intranet based company
Service provider
Network developer
Hierarchy level of management
Network model
Design server room
Facilities
Cyber security
Define local server
Operating system
Software, Hardware requirement
Defined Terminal system
Distribution of services
5. [Date]
5
What is Company’s Intranet?
An intranet is a private network, accessible only to an organization's staff.
Generally a wide range of information and services from the organization's
internal IT systems are available from this that would not be available from the
outside, and one company-wide intranet can constitute an important focal point of
internal communication and collaboration, and provide a single starting point to
access internal and external resources.
Why organizations use this service?
o Increasingly, intranets are being used to deliver tools, e.g. collaboration (to
facilitate working in groups and teleconferencing) or sophisticated corporate
directories, sales and customer relationship management tools, project
management etc., to advance productivity.
o Intranets are also being used as corporate culture-change platforms.
o Intranet user-experience, editorial, and technology team’s work together to
produce in-house sites. Most commonly, intranets are managed by the
communications, HR or CIO departments of large organizations, or some
combination of these.
Intranet Software
Microsoft SharePoint is the dominant software used for creating intranets.
However other used software are
• Google Sites
• Igloo Software
• IBM Web sphere
• Hyper office
• Jive Software
• Oracle Fusion Middleware
6. [Date]
6
Service provider
At green tech, our strategy has empowered dozens of global service provider
to capture the opportunities made possible by the internet .we help enable
service providers to transform the experience, transform the business and
transform the architecture with cloud based capabilities. Service provider
with Green tech has more options to increase revenue and decreased
operating expense and enhanced agility.
7. [Date]
7
Network developer
Green Tech network developer provide access to Green tech technologies
and support resources that enables third party development of business
solutions that unified data , voice , video and mobile communication on
Green Tech development platform . The program also allows developer to
take advantages of Green tech brand, market leadership position and
installed based to help drive position business result for themselves and
their customers.
8. [Date]
8
Level of Management
The level of management is divided into three different level of hierarchy:
1. Top level management
2. Middle level management
3. Lower level management
11. [Date]
11
Developing a server room
Developing a secure and efficient server room is a top priority for IT
professionals. A server room should function as a carefully controlled
environment. Choice of location, the amount of space required and the related
power requirements are all important factors that need to be considered when
building or redesigning a server room. Green Tech team of experts is trained to
assess these factors and dozens more to design a server room perfectly suited to
your needs.
Business Requirements
12. [Date]
12
Internal Structured of Server room
A server room is a room, usually air-conditioned, and devoted to the continuous
operation of computer servers. An entire building or station devoted to this
purpose is a data center. The computers in a server rooms are usually headless
systems that can be operated remotely via KVM switch or remote administration
software, such as Secure Shell (Ssh), VNC, and remote desktop.
Design Consideration
• Location
Your first task in finding the best spot for the server room inside existing building
is to determine your server room size. These requirements should be based on
existing and expected future needs.
1. Equipment installed in server rooms may be quite heavy. Be aware of a floor
loading demands.
2. Internet discussions between IT professionals provide pages of detailed
advices regarding positioning of the facility.
3. Server room is best to be placed in a basement or on a lower ground floor
preferably in a central area of the building. If you decide to place the room below
groundwater line, flooding possibility should be addressed.
4. Floors, walls and roofs must be of adequately sound construction to prevent
unauthorized access to the server room.
• Space Requirements and Separate Rooms Solutions
1. Sever room must accommodate all of your equipment and have space for
growth.
2. Solution must allow enough space for cabling and maintenance access to the
side and back of server racks and other installed equipment.
3. The room size required by the power systems will be relative to the needed
capacity and required level of reliability and redundancy.
13. [Date]
13
4. In redundant installations dedicated room should be granted for each system
to allow physical disjointing.
• Objects typically installed in dedicated electrical space outside the
core server room area:
• Automatic transfer switches - ATS
• Switchgears of service entrance
• Unit substation transformers
• load banks
• tie breakers
• Generator with paralleling switchgears
• Uninterruptible power supplies - UPS
• UPS batteries
• Distribution boards.
• Objects typically installed within the server room area
• Power strips
• Remote power panels - RPPs
• Power distribution units – PDU. (ANSI/BICSI 2011, 21-22.)
Power Supply
Server room power systems are not to be taken lightly. Without robust solution
for a power supply, it would be impossible to operate the whole scale of
equipment that most organizations have.
1. Calculate maximum load ratings from all the hardware you will have
installed from the beginning.
2. When you install new power systems, check the quality of the power coming
into the building to make sure that it is within standards demanded by
hardware manufactures or the applicable Authority Having Jurisdiction
(AHJ).
3. Power strips attached to power hips are the best way of delivering power to
the server racks regardless of are you using raised floor or not.
4. Power strips are power outlets on the end of flexible power cables – power
whips - which can be attached to the rack.
14. [Date]
14
• Uninterruptable Power Supply
An Uninterruptible Power Supply (UPS) is a device that is assembled between
the mains and the ICT device to avoid undesired features of the mains from
unfavorably affecting the operation of the device. Such undesirable features to
be mentioned are: outages, surges, bad harmonics, etc.
• Lighting
Well-designed lighting in the server room is very important. Main task for
lighting in the server room is to provide a productive visual working
environment for ICT specialists. Adjustable task lighting can be a very good
solution especially for server installation work (Sustainable Computing).
1. Reacting to the need of energy consumption reduction many server rooms
operate an automated lighting system using motion sensors.
2. Using efficient LED lighting with automated lighting controls can contribute
greatly to energy savings.
3. LED lighting is especially suitable for server room lighting due to its low
heat output.
4. Emergency lighting is an essential part of safety installations.
5. Emergency lighting is used when the supply to the normal operational
lighting fails and should therefore be powered from an independent source of
that supplying the normal lighting.
6. Pay attention to emergency lighting implementation quality, because they
play a role in situations when human life might be in danger.
16. [Date]
16
Security
When it comes to information security, physical security is the foundation for your
overall strategy. Server room security enhancements protect your expensive ICT
equipment and your client’s business continuity. Succeeding in physical security
implementation will reduce downtime from accidents, interference or theft. Chosen
physical security systems should deliver advanced protection for server rooms.
Such security measures like access control systems or CCTV surveillance help
achieving high level of physical security and therefore improving information
security in general.
1. ANSI/BICSI Best Practices paper (2011) recommends following: server
room secured video monitoring and access control system database should be
provided.
2. Front end user interface of these systems should reside in secure operations
facility.
3. Chosen physical security systems should deliver advanced protection for
server rooms.
4. Such security measures like access control systems or CCTV surveillance
help achieving high level of physical security and therefore improving information
security in general.
5. Front end user interface of these systems should reside in secure operations
facility.
6. Surveillance is an important tool for fighting crime and protecting public
areas.
7. In combination with intruder alarms and access control systems, it enables
remote viewing of your server room from any place 24/7.
17. [Date]
17
Develop a local area network in a company
Working:
o Communication
o Router receive data from the internet
o Transmits towards the servers
o Then send data towards all the computer
For local server with Apache, php, my sql
o Apache 2.2.15 win 32 x 86
o PHP 5.3.2 vc x 86 thread safe installer
o My SQL 5.1.46.x86 32bit msl installer
o PHP my admin 3.2.2
18. [Date]
18
Facilities
Apache
The original version of Apache was written for UNIX, but there are now versions
that run under OS/2, Windows and other platforms.
Apache is the most popular web server available. The reasons behind its
popularity, to name a few, are:
1 It is free to download and install.
2 It is open source: the source code is visible to anyone and everyone, which
basically enables anyone (who can rise up to the challenge) to adjust the code,
optimize it, and fix errors and security holes. People can add new features and
write new modules.
3 It suits all needs: Apache can be used for small websites of one or two
pages, or huge websites of hundreds and thousands of pages, serving millions of
regular visitors each month. It can serve both static and dynamic content.
Apache's main role is all about communication over networks, and it uses the
TCP/IP protocol Transmission Control Protocol/Internet Protocol which allows
devices with IP addresses within the same network to communicate with one
another.
The Apache server is set up to run through configuration files, in which directives
are added to control its behavior. In its idle state, Apache listens to the IP
addresses identified in its config file (HTTPD. conf). Whenever it receives a
request, it analyzes the headers, applies the rules specified for it in the Config file,
and take action.
19. [Date]
19
SQL Server
SQL Server is a Microsoft product used to manage and store information.
Technically, SQL Server is a “relational database management system” (RDMS).
Broken apart, this term means two things. First, that data stored inside SQL Server
will be housed in a “relational database”, and second, that SQL Server is an
entire “management system”, not just a database. SQL itself stands for Structured
Query Language. This is the language used to manage and administer the
database server.
SQL Server is a Relational Database Management System. Data is stored is Tables
consisting of columns and rows. Tables can be linked, or “Related”, to one
another. Tables and objects that belong to the same family or require similar
security are collectively stored in a Database.
Telnet
Telnet is a simple, text-based network protocol that is used for accessing remote
computers over TCP/IP networks like the Internet. Telnet was created and
launched in 1969 and, historically speaking, you can say that it was the first
Internet.
Telnet brought extraordinary change. Using it meant you could simultaneously
connect multiple users to a single server. In order to connect to the server, people
only needed access to a terminal, which could be the simplest and cheapest
computer available. This computer didn't need to have powerful hardware, it only
needed a network connection and a text based interface. Basically, their Telnet
Client was like a Command Prompt that people could use in order to work with
their servers. This brought a huge boost in productivity.
In Windows, you can add two Telnet related features:
Telnet Server - if you install this feature, you will be able to configure your
Windows computer to run as a Telnet server. This means that your computer will
listen for incoming connections and allow others to use it. If you're not beneath a
firewall and you have a public IP address, anyone in the world will be able to
remote control your computer using a Telnet Client.
Telnet Client - this will enable you to connect through Telnet to any server of this
type, using just a Command Prompt window.
20. [Date]
20
Gopher
The Gopher protocol is a TCP/IP application layer protocol designed for
distributing, searching, and retrieving documents over the Internet. The Gopher
protocol was strongly oriented towards a menu-document design and presented an
alternative to the World Wide Web in its early stages, but ultimately HTTP became
the dominant protocol. The Gopher ecosystem is often regarded as the effective
predecessor of the World Wide Web.
Information accessible via Gopher is stored on many computers all over the
Internet. These computers are called Gopher servers. Information stored on many
kinds of non-gopher servers is also available via special gopher servers that act as
gateways (protocol translators). Virtually, any popular computer (Mac, UNIX box,
PC, or larger computer) can be used as a server.
Gopher clients for mobile devices
The bandwidth-sparing simple interface of Gopher would be a good match for
mobile phones and personal digital assistants (PDAs), but so far, mobile
adaptations of HTML and XML and other simplified content have proven more
popular. The PyGopherd server provides a built-in WML front-end to Gopher sites
served with it.
The early 2010s have seen a renewed interest in native Gopher clients for popular
smartphones. Overbite, an open source client for Android 1.5+ was released in
alpha stage in 2010.
Pocket Gopher was also released in 2010, along with its source code, for several
Java ME compatible devices. I Gopher was released in 2011 as a proprietary
client for iPhone and iPod devices.
Gopher's hierarchical structure provided a platform for the first large-scale
electronic library connections .Gopher has been described by some enthusiasts as
"faster and more efficient and so much more organized" than today's Web services
.The Gopher protocol is still in use by enthusiasts, and although it has been almost
entirely supplanted by the Web, a small population of actively maintained servers
remains.
22. [Date]
22
Distributed of services
An interrelated arrangement of people, storage facilities and transportation
systems that moves goods and services from producers to consumers. A
distribution network is the system a company uses to get products from the
manufacturer to the retailer. A fast and reliable distribution network is essential to
a successful business because customers must be able to get products and services
when they want them.
Diagrams
23. [Date]
23
Terminal server
Generally in information technology, a terminal server is a hardware device or
server that provides terminals (PCs, printers, and other devices) with a common
connection point to a local or wide area network. The terminals connect to the
terminal server from their RS-232C or RS-423 serial port. The other side of the
terminal server connects through network interface cards (NIC) to a local area
network (LAN) (usually an Ethernet or token ring LAN) through modems to the
dial-in/out wide area network, or to an X.25 network or a 3270 gateway.
24. [Date]
24
Description
Terminal servers are centralized systems that can be logged into and on which
software can be run. There is a Terminal Server on which Linus and Linus
software is installed. UNIX and MAC OS users can make use of MS-Windows
applications via the terminal server. On these servers, data fields are available
that are provided centrally.
34. [Date]
34
CONCLUSION
This project has been a rewarding experience in more than one way. The entire
project work has enlightened us in the following areas.
We have gained an insight into the working of the Networking
coming. This represents a typical real world situation.
Our understanding of network developer company has been
strengthened this is because in order to generate the final reports
of requirement analysis designing has to be properly followed.
Scheduling a project and adhering to that schedule creates a
strong sense of time management.
Sense of teamwork has developed and confidence of handling real
life project has increased to a great extent.
Initially, there were problem with the validation but with
discussions, we were to implement validations.