Table of Contents
Summary
Table of Figures
Introduction
About RJ Infotech Pvt Ltd
Company Data Centers
Data center Logic diagram
What is three tier architecture?
RJ Infotech Pvt Ltd. 3 Tier Architecture
Company’s services and Application design
Advantages of 3-tier Architecture:
Network Security& Connectivity
Virtual private network (VPN)
VPN PROTOCOLS
Multiprotocol Label Switching (MPLS)
Technical capabilities and features:
Network diagram
How a client demands applications/work on company servers:
1. Web Portal interface and GTM
Redundancy in Web portal
2. IVR Interface
3. API request processing
Interchange gateway service:
Application deployment in RJ Infotech Pvt Ltd:
Network devices
Network switch:
Router:
Firewall:
Load balancer:
Server:
Routing Protocols used
BGP
EIGRP
OSPF
Company future aspects
Analysis and Recommendation
Recommendation & Conclusion
References
Appendix
Figure 2: data center
Figure 1: data center
Figure 3: Data Center logical diagram
Figure 4: Three tier architecture
Figure 5: Request and response in 3-tier structure
Figure 6: Company’s services illustration
Figure 7 VPN
Figure 8: Company’s Network diagram
Figure 9: Web Portal URL request
Figure 10: Web portal URL Network flow
Figure 11 IVR network flow
Figure 12: API network Flow and redundancy
Figure 13: Interchange for VISA AMEX cards
Figure 14: Application services Deployment
Data Communication and networking are changing the arena of enterprise and each day lives. Before industrial revolution sharing and changing statistics are executed in a conventional manner.
A network is combination of computer systems, gadgets and printers. An internet which is most common thing in today’s world is nothing but just a combination of thousands of interconnected networks. At present time private sectors, government sectors and people, all are depending on the internet.
The organization about which we will discussed in this report has been working since last 10 years in India. When the company was started they have only staff of few people. As the new technologies started to come in the market, it also brings the threats too. So, the organization hired new technicians to provide the securities related to online attacks, frauds. As the time passes, they have expanded their business by providing security services to corporate banks. They have around 2000 of employees including all the branches.
About RJ Infotech Pvt Ltd
While we contacted one of the employees of this company for this assignment report, he was ready to help us by giving the information as much as he can but without reveal the name of the organization. So, we have used ‘RJ Infotech Pvt Ltd’ as company name instead of real name.
RJ Infotech Pvt Ltd provides explanation regarding to online transactions, banking solutions payment gateways for how to do transaction process, transaction authorization, providing front-end services.
The company’s main agenda is providing security for customer/clients. This includes:
E-Commerce Payment Gateways.
Internet based solutions.
Aiding and solution of transaction process.
Transaction Authorization.
Business solutions related to Smart/Debit/Credit card.
Design and develop online transaction processing systems.
Data Centers of RJ Infotech Pvt Ltd. are deployed and operated under GPX Global Data center and network distributor
Data Centers of GPX Global are present across the world and developed with the standard of 3 tier architecture.
All the Data Center are individual in nature, means if something happens to the data center then other data center can take over the load from that data center.
Live failover tests are being performed regularly on regular intervals on every data center. Report server/ IVR server (Redundant servers in active-passive mode) Active-active mode is applied for database storage for 100% redundancy.
“3-tier architecture is that in which presentation, logic and data layers along with user interface are deployed and maintained as separate modules for each platform”
The three tiers in a three-tier architecture are:
Presentation Tier: The presentation tier is the front-end layer in the 3-tier system and consists of the user interface. Web languages and scripts such as HTML, Java CSS and other development frameworks are used to build presentation layer.
Application Tier: Application tier contains the utilitarian logic that gives an application’s main strengths. It’s developed using C, java C++.
Data Tier: The data tier includes the data base and “data access layer”. This is written and functions on languages namely SQL, Oracle DBMS etc. (JReport, n.d.)
For all the 3 layers of 3 tier architecture and data managing activities of organization is uses one client/server architecture.
For physical structuring the tier system structure mechanism is used.
The structure is made upon 3 cluster:
A front-end server provides control & store dynamic data. In electronic application, front end content is published by internet browser.
Application server for main data computing and propagating.
A back-end database server has information sets as well as the database managing database management system software.
Data center application of the company has been planned, fabricated and positioned on 3 tier structure. All tiers are deployed for failover. And accessibility had been made across all the tiers for failover.
Advantages of 3-tier Architecture:
It makes the sensible distinguishing on between business layer and presentation layer and database layer.
Migration to new graphical condition at a quicker environment
As entry level tier is autonomous it is conceivable to empower parallel improvement of by utilizing diverse arrangements of designers.
Easy to keep up and see substantial undertaking and complex task.
Database security can be implemented at application layer.
Published information from the presentation layer can be checked at application layer before refreshing and relinquishing it to database.
Application layer can be a shield to the information database.
We can publish only vital techniques from business layer in the presentation layer.
We can conceal superfluous strategies from the business layer in the presentation layer.
.
In this model all server nodes are logically separated and linked through TCP/IP protocol. (programming tutorial place, 2014)
MPLS and VPN technology is being implemented for connection across all Data centers and operation centers.
A virtual private network (VPN) is that which carries forward a private network onto a public network, and defines clients to transmit information across public networks as if their connectivity appliances are directly disbursed onto the private network.
(VPN, n.d.)
“Open VPN is prolifically known as open source VPN protocol. This suggests that clients can explore its source code for security breaches. It is considered as one of the most important VPN services, and one of the most guarded protocols”.
“Layer 2 Tunnel Protocol known as L2TP Protocol it is developed after decline of PPTP protocol, deployed by Microsoft, designed and architecture by Cisco. However, no encryption is enabled on L2TP protocol.”
“Point-to-Point Tunneling Protocol is the earliest of all the VPN protocols. Though it’s been extinct since long but still some of clients still use it and is in force”. (VPN Protocols, n.d.)
A network packet is assigned as a unique character for MPLS to function. Information such as routing table host and destination IP addresses, bandwidth is contained in this label. Routing decision is taken by the router by looking in to the label but not having a total look onto the routing table. IP, Asynchronous Transfer Mode (ATM), frame relay, are supported by MPLS. MPLS works on packet switching as well as circuit switching.
Designed for security RJ Infotech Pvt Ltd run VPN services over a dedicated MPLS infrastructure that is physically separate from any internet backbone service provider network, to help and ensure that your business data is always protected and controlled while still offering you a cost effective MPLS based solution (MPLS , n.d.)
Dedicated carrier MPLS core for VPN offers network isolation from the internet for enhanced privacy and security.
Last mile Ethernet or fiber services offer you control of your routing and addressing environment, so you don’t risk exchanging sensitive or secure information on our network.
RJ Infotech Pvt Ltd support high levels of security regulations across government financial and other industries.
Reliable solutions
RJ Infotech carrier portal reports show extensive network details and services routinely exceeded SLA requirements.
They provide diverse network paths for redundancy and business continuity and offers multiple options on both levels of redundancy. (Last Mile, carrier POP, Provider)
1. Web Portal interface and GTM
• RJ Infotech offers Domain deployment Service the two clients.
• Register and manage Domains on behalf of client or under the name of RJ Infotech Pvt Ltd and assign to a specific client.
• Map the domains to RJ Infotech Pvt Ltd data centers through our Global Traffic Selector (GTM) solution. It enables domain to be routed to the available data center through the available ISP.
• Procure and manage SSL certificates
• Configure the same through Web Application Firewall (WAF) and Web Accelerator.
2. IVR Interface
Figure 10: Web portal URL Network flow
• RJ Infotech Pvt Ltd has IVR solution supported on both Chennai & Singapore Data Centre
• They have direct partnered IVR number providers and through them number’s will be procured for the clients
• Numbers can be procured country to country basis
• All type of numbers can be supported by our partner provider like DID, Toll Free & ITFS
• Customer can also provide or share their own numbers and we can integrate on our solution
• Call Centre call transfer is also a part of the entire IVR solution.
• RJ Infotech IVR Service Providers
Delacon & X-on
• From Delacon TFN, ITFN, DID numbers are obtained for all countries.
• They use X-on to support UK IVR number and routing requirements.
• Both Inbound/Outbound call routing are performed from RJ Infotech Pvt Ltd over Delacon Network
• 3rd Party call transfer options available
3. API request processing
RJ InfoTech Pvt Ltd provides banking solutions to more than 20 banks across the world. As a part of the service the company authenticates customer’s username and password for transactions. Database of RJ Infotech has of 1.7 crore products of customers.
For every attempt request made. Probing into client’s page for the search API request is created updates for merchant and network are automatically implemented each year
VitzVs is a patented interchange that enables to have gateway to financial transaction interchanges such as (MASTER CARD, AMEX, and VISA) and other national interchanges
A payment authorizer is a third-party application selected by a client to manage transactions from different sources such as credit and debit cards and online payment gateways
As the card association such as AMEX, VISA etc. receives any transaction from bank then a reply of approval or denial of transaction gateway is immediately sent as a part of the interchange service
The above figure represents the implementation of various services provided by the company on their patented service switching application and it is a core payment engine that financial transactions authorizing from different gateways such as ATM, point of sale (POS), internet banking, Telephonic etc.
The service has been differentiated into two segments
1. Authorization services:
ATM, POS and internet banking transactions service are being authorized in this
2. Web Services:
IVR, API, Email, SMS and mobile authorization are carried over web services.
A device in a network that connects all devices with one another. It monitors the transmission of information over communicating channel by sending and acquiring data to the devices that are meant to share the data with.
“A router is a device that is used for networking purpose. It sends data packets between computers and networks”. Routers perform traffic directing functions on the internet, such as a web page or email in the form of data packets from source node to destination node (Router, n.d.)
“A firewall is a network security device that scrutinizes traffic on coming and outgoing and decides whether to allow or block the traffic accordingly following the rules that are predefined. A proxy firewall acts as the gateway from an application or a communicating device to a specific network to give permission or denial”. (Firewall, n.d.)
“A load balancer is a device/ that acts as a reverse proxy and distributes network or application traffic across several servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications. They improve the overall performance of applications by decreasing the burden on servers associated with managing and maintaining application and network sessions, as well as by performing application-specific tasks”. (Load balance, n.d.)
A server is a computer program that provides a service to another computer programs. In a data center, the physical computer that a server program runs in is also frequently referred to as a server. That machine may be a dedicated server or it may be used for other purposes as well. (Server, n.d.)
Types of servers
• Application server
• Client server
• Webserver
• Proxy server
• Mail server
• File server
BGP, EIGRP and OSPF are the protocols that are being implemented in the company’s network configuration.
It is a dynamic routing protocol, the characteristics of BGP are it is complex and hard for the network administrator its complex configuration to understand & it is exterior routing protocol
“EIGRP is a considered as reciprocate to RIP. The latest introduced IGRP (EIGRP) made IGRP extinct. It is a classless IP addressing routing protocol and enhance the efficiency of the routing algorithms compared to previous IGRP”. It does not assist routing hierarchies, like RIP.
Called as Open shortest path first, it is introduced to subdue the restraints caused in other routing protocol strategies
‘OSPF-enabled routers determine the network by sending identification messages to each other tracked by messages that capture special routing items rather than the entire routing table’. It is the only link state routing protocol listed in this category. (Routing protocols, n.d.)
The company as of now provides employment to around two thousand individuals and has around 20 banks in their portfolio and as future aspects they are been in few more banking institutions to add to their company and to handle the requirement they are planning to upgrade the software architecture and incorporate few more data centers across various cities to handle client’s data.
Since the company is into operation from a decade back they are using PC to implement and backup financial transactions, this made the data vulnerable which happens to be most important data for each customer/client as there banking information is at risk. Though still there is no impeccable procedure to defend or protect information from security breaches day by day new tech comes into action, hackers have even more prolific ways to manipulate the data and abduct information.
The company implements MPLS to enable security across the connectivity, though MPLS has great efficiency, bandwidth utilization, and less network congestion, it has glitch which as a result makes companies data vulnerable and puts it at risk is that it doesn’t provide end-end encryption. Even though MPLS depends on VPN.
As the technology advances, more adaptation on the cloud technology to have access on their information. It is suggested to go cloud based security solutions
As a part our understanding about the organization connectivity and security we would like to suggest the company to implement SD-WAN sidelining MPLS, this allows operator to react ASAP to the enhancing technology according to the business demand. The prolific uses of implementing this method is, its functional, network virtualization and automation that becomes quite handy in a cloud base architecture.
Firewall. (n.d.). Retrieved from cisco: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
JReport. (n.d.). Retrieved from www.jinfonet.com: https://www.jinfonet.com/resources/bi-defined/3-tier-architecture-complete-overview/
Load balance. (n.d.). Retrieved from f5: https://www.f5.com/services/resources/glossary/load-balancer
MPLS . (n.d.). Retrieved from Techopedia: https://www.techopedia.com/definition/527/multiprotocol-label-switching-mpls
programming tutorial place. (2014, dec 6). Retrieved from asp-net-by-parijat.blogspot.com: http://asp-net-by-parijat.blogspot.com/2014/12/advantages-and-disadvantages-of-using-3.html
Router. (n.d.). Retrieved from Wikipedia: https://en.wikipedia.org/wiki/Router_(computing)
Routing protocols. (n.d.). Retrieved from lifewire: https://www.lifewire.com/top-network-routing-protocols-explained-817965
Server. (n.d.). Retrieved from techtarget: //whatis.techtarget.com/definition/server
VPN. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Virtual_private_network
VPN Protocols. (n.d.). Retrieved from makeuseof: https://www.makeuseof.com/tag/major-vpn-protocols-explained/
For this project report as a part of our second semester assignment we have contacted the company through a friend and accordingly we have gathered regularly to shape out the report in a way according to our understanding there were few hiccups in between but still we managed to complete on time and as a group of 2. We gathered at Akshit’s residence for working off days and on the day we had class we used to meet in library.
Meeting Schedule:
All the meetings were attended by Akshit & Raj.
Date: 26/8/2018
Location: Akshit house
Duration: 30 minutes
Purpose: Discussion about finding company, to whom we can contact.
Date: 8/9/2018
Location: Unitec library
Duration: 1 hour
Purpose: To which company we have applied & from whom we got reply. (None)
Date: 14/9/2018
Location: Unitec Library
Duration: 2 hours
Purpose: Raj found a company. We started discussion about the topics.
Date: 22/9/2018
Location: Akshit house
Duration: 4 hours
Purpose: The information gathered and shared. Tasks has been divided between group members.
Date: 6/10/2018
Location: Akshit house
Duration: 3 hours
Purpose: The follow ups on given task. Discussion about how much information we have covered.
Date: 14/10/2018
Location: Akshit house
Duration: 2 hours
Purpose: Compiled and discuss the given task. Assignment submitted.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download