What Is The Effective VTP Model Enterprise VLAN Security?
The main reason for the preparation of this report by the SME is for creating a connection between several branches which are located at different geographical locations, with the headquarter. The report has been prepared after considering the various scopes and goals that the project is having. There exists various types of requirements for the purpose of meeting with the demands of the organization. The needs might include the analysis of the different voluntary services of a University. The later section of the report consist of the proposal in order to obtain solutions which would be very much helpful for organization to increase its efficiency. The adaptation of a methodology has been done in order to frame the network infrastructure. The network infrastructure for this particular case is the Top down Network Design Methodology [1]. The report has also been associated with providing the logical and the physical model. The report is also associated with providing a detailed information about the cost which is needed for the purpose of deploying the new solution for the network. After the completion of all this a test plan has also been proposed which has been provided for eth purpose of analyzing the working process of the network. Along with this the test plan also helps in analyzing the security aspects which are associated with the network. The last section of the report consist of the self-reflection about the technology.
The major scope of the project is the development of the network along with the different network constraints. Besides all this the scope also includes the increasing of the efficiency of the different processes which the business conducts. There exists different types of new technologies which are responsible for making the processes much easier. But selection of the right technology is needed in order to align the technology with the different requirements of the organizations. By selection of the right technology development of the efficient network design of the organization is possible [2]. Besides all this the network solution which would be provided would also be associated with working for the improvement of the communication which exists between the various branches of the offices that are situated in different geographical locations. The use of the VPN would also be associated with favoring the remote access of the various resources of the organization which would be initially responsible for the increase in the efficiency of the organization [24].
The goals of the business along with the various constraints have been identified in order to develop an appropriate solution for the SME and all this constraints and goals have been listed below:
The identified tradeoffs has been listed below which are responsible for the purpose of achieving the various goals of the business:
Making of an analysis ID is needed on the groups of the users. This is to be done by making use of the network. Besides this different services and the VLAN are also required. This would also be configured according to the various groups of peoples in order to secure the network from any type of unauthorized access. Small sized public and private universities or the collages are the major users of the infrastructure. The collages or the universities are associated with providing various types of services. Different methods have been adopted by them for the purpose of reducing the cost and this includes the supervising of the research projects for the students and teaching of different subjects [7]. In this way the students would be capable of availing eth various types of services by following simple steps. The steps includes the registration on the information system of the system. This is the initial step which needs to be done in order to use the various services. Once the shortlisting is completed by means of an interview which are generally conducted by the staffs of the university then they move on to the next step [8]. This initially give rise to the need of connecting to the network with the portal of the university besides the need of a registration model which would be followed by merging of this two and would help the students in getting the information they need.
The following assumptions has been made in order to design the network:
The routing protocols which are to be used in the network has been listed below:
Subnet – 1 |
|
Network Address |
172.18.55.0 |
Subnet Mask |
255.255.255.224 |
Broadcast Address |
172.18.55.31 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
172.18.55.1 – 172.18.55.30 |
Subnet – 2 |
|
Network Address |
172.18.55.32 |
Subnet Mask |
255.255.255.224 |
Broadcast Address |
172.18.55.63 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
172.18.55.33 – 172.18.55.62 |
Subnet – 3 |
|
Network Address |
172.18.55.64 |
Subnet Mask |
255.255.255.224 |
Broadcast Address |
172.18.55.95 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
172.18.55.65 – 172.18.55.94 |
Subnet – 4 |
|
Network Address |
172.18.55.96 |
Subnet Mask |
255.255.255.224 |
Broadcast Address |
172.18.55.127 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
172.18.55.97 – 172.18.55.126 |
Subnet – 5 |
|
Network Address |
172.18.55.128 |
Subnet Mask |
255.255.255.248 |
Broadcast Address |
172.18.55.135 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
172.18.55.129 – 172.18.55.134 |
Subnet – 1 |
|
Network Address |
0:0:0:0:0:ffff:ac12:3700 |
Subnet Mask |
0:0:0:0:0:ffff:ffff:ffe0 |
Broadcast Address |
0:0:0:0:0:ffff:ac12:371f |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
0:0:0:0:0:ffff:ac12:3701 – 0:0:0:0:0:ffff:ac12:371e |
Subnet – 2 |
|
Network Address |
0:0:0:0:0:ffff:ac12:3720 |
Subnet Mask |
0:0:0:0:0:ffff:ffff:ffe0 |
Broadcast Address |
0:0:0:0:0:ffff:ac12:373f |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
0:0:0:0:0:ffff:ac12:3721 – 0:0:0:0:0:ffff:ac12:373e |
Subnet – 3 |
|
Network Address |
0:0:0:0:0:ffff:ac12:3740 |
Subnet Mask |
0:0:0:0:0:ffff:ffff:ffe0 |
Broadcast Address |
0:0:0:0:0:ffff:ac12:375f |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
0:0:0:0:0:ffff:ac12:3741 – 0:0:0:0:0:ffff:ac12:375e |
Subnet – 4 |
|
Network Address |
0:0:0:0:0:ffff:ac12:3760 |
Subnet Mask |
0:0:0:0:0:ffff:ffff:ffe0 |
Broadcast Address |
0:0:0:0:0:ffff:ac12:377f |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
0:0:0:0:0:ffff:ac12:3761 – 0:0:0:0:0:ffff:ac12:377e |
Subnet – 5 |
|
Network Address |
0:0:0:0:0:ffff:ac12:3780 |
Subnet Mask |
0:0:0:0:0:ffff:ffff:fff8 |
Broadcast Address |
0:0:0:0:0:ffff:ac12:3787 |
Valid host address range (can be used to assign to PCs, servers, IP phones, etc.) |
0:0:0:0:0:ffff:ac12:3781 – 0:0:0:0:0:ffff:ac12:3786 |
The communication between two networks or two systems by making use of the basic form of network like the LAN. The construction of LAN is very easy with or without including the servers and this is also restricted by the physical location of the system. A system which has been taking part in the LAN requires a network adapter which needs to be installed in a proper way [13]. A WAN is mainly associated with covering a larger area and along with this the system in the WAN network is capable of saving data on a real time basis. After this it is also possible to sends the inputs in an easy way as an input for the central computers [14]. There exists four types of network communication and this includes the leased line connection, circuit-switching packet, packet switching or relay of the cell. The IS system is associated with providing a large range of the wireless communication in public domain and this is done by making use different resources along with the priorities. The population density which is related to the public services are mainly visited by numerous users and this is considered that it is in the top of the priority list.
One of the good security process includes the separation of the management and the traffic of the users. The VLAM management is mainly done by changing the default VLAN1 and distinction the VLA. For the purpose of contacting with the switch in a remotely manner, there must exist an IP address which is to be configured with the VLAN management [15]. This would initially lead to providing of restriction regarding the establishment of any kind of remote access to the sessions by any unauthorized user. This should done till they are routed to the VLAN management. This would help in providing an additional layer of security for the VLAN. Besides all this the switches are also to be configured in order to accept various SSH sessions which are encrypted [16].
LAN and WAN services design and analysis
The following services should be includes in the network solution for increasing the efficiency and scalability of the SME network.
The implementation of the LAN and WAN service is possible only by analyzing and designing the network infrastructure which is existing. Along with this there is also a need of analyzing the requirements of the infrastructure [17]. This would help in finding the new requirements of the current system and would also help in the designing of the new system. There is also a need of restricting the normal users and provide levels of authentication this would be initially responsible for increasing the security of the network. Different networking technologies should be evaluated for designing a successful local or wide area network and enabling voice and data communication for reducing the telecommunication cost of the network [18]. The risk of security threats arising from different points in the network should be eliminated. The network should be backed up for handling the emergency conditions and a risk response plan should be created for responding against any attacks.
Conclusion:
The above discussed report helps in concluding to the fact that there is a need of designing a high level network architecture for the SME. For this there is need of identifying the scopes and limitations of the project. There is also a need of analyzing the requirements of the business in order to design the total network. The report has also documented the user community and the network application which would be supported by the system. The security features and policies that should be followed for securing the network from external entities are discussed in the report. Besides this the failover and the redundancy plan has also been provided in this report for the purpose of avoiding the risk of link failure and responding during emergency conditions. A logical and a physical design has also been created in this report for the organization and different network topologies have been discussed for the purpose of development of the network.
References
Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-200.
Wang Y, Chi N, Wang Y, Tao L, Shi J. Network architecture of a high-speed visible light communication local area network. IEEE Photonics Technology Letters. 2015 Jan 15;27(2):197-200.
Sikdar B. A study of the environmental impact of wired and wireless local area network access. IEEE Transactions on Consumer Electronics. 2013 Feb;59(1):85-92.
Ghosh A, Thomas TA, Cudak MC, Ratasuk R, Moorut P, Vook FW, Rappaport TS, MacCartney GR, Sun S, Nie S. Millimeter-wave enhanced local area systems: A high-data-rate approach for future wireless networks. IEEE Journal on Selected Areas in Communications. 2014 Jun;32(6):1152-63.
Pang L, Li H, Pei Q. Improved multicast key management of Chinese wireless local area network security standard. IET communications. 2012 Jun 14;6(9):1126-30.
Kazemian P, Varghese G, McKeown N. Header Space Analysis: Static Checking for Networks. InNSDI 2012 Apr 25 (Vol. 12, pp. 113-126).
He K, Wang Y, Wang X, Meng W, Liu B. GreenVLAN: An energy-efficient approach for VLAN design. InComputing, Networking and Communications (ICNC), 2012 International Conference on 2012 Jan 30 (pp. 522-526). IEEE.
Rafel A, Parkin N, Farrow K, Wright P, Nesset D. Automatic restoration over a type B dual parented PON using VLAN switching. InOptical Communication (ECOC 2013), 39th European Conference and Exhibition on 2013 Sep 22 (pp. 1-3). IET.
Kim H, Feamster N. Improving network management with software defined networking. IEEE Communications Magazine. 2013 Feb;51(2):114-9.
Alimi IA, Mufutau AO. Enhancement of network performance of an enterprises network with VLAN. American Journal of Mobile Systems, Applications and Services. 2015 Jul;1(2):82-93.
Kim H, Schlansker M, Santos JR, Tourrilhes J, Turner Y, Feamster N. Coronet: Fault tolerance for software defined networks. InNetwork Protocols (ICNP), 2012 20th IEEE International Conference on 2012 Oct 30 (pp. 1-2). IEEE.
Nolan KE, Guibene W, Kelly MY. An evaluation of low power wide area network technologies for the Internet of Things. InWireless Communications and Mobile Computing Conference (IWCMC), 2016 International 2016 Sep 5 (pp. 439-444). IEEE.
Ban YL, Chen JH, Li JL, Wu Y. Small-size printed coupled-fed antenna for eight-band LTE/GSM/UMTS wireless wide area network operation in an internal mobile handset. IET microwaves, antennas & propagation. 2013 Apr 23;7(6):399-407.
Wang S, Chen W, Yin ZQ, Li HW, He DY, Li YH, Zhou Z, Song XT, Li FY, Wang D, Chen H. Field and long-term demonstration of a wide area quantum key distribution network. Optics express. 2014 Sep 8;22(18):21739-56.
Chu FH, Wong KL. Internal coupled?fed loop antenna integrated with notched ground plane for wireless wide area network operation in the mobile handset. Microwave and Optical Technology Letters. 2012 Mar 1;54(3):599-605.
Deng Y, Lin H, Phadke AG, Shukla S, Thorp JS, Mili L. Communication network modeling and simulation for wide area measurement applications. InInnovative Smart Grid Technologies (ISGT), 2012 IEEE PES 2012 Jan 16 (pp. 1-6). IEEE.
Henschel R, Simms S, Hancock D, Michael S, Johnson T, Heald N, William T, Berry D, Allen M, Knepper R, Davy M. Demonstrating Lustre over a 100Gbps wide area network of 3,500 km. InProceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis 2012 Nov 10 (p. 6). IEEE Computer Society Press.
Petäjäjärvi J, Mikhaylov K, Pettissalo M, Janhunen J, Iinatti J. Performance of a low-power wide-area network based on LoRa technology: Doppler robustness, scalability, and coverage. International Journal of Distributed Sensor Networks. 2017 Mar;13(3):1550147717699412.
Verma RO, Shriramwar SS. Effective VTP Model for Enterprise VLAN Security. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on 2013 Apr 6 (pp. 426-430). IEEE.
Kiravuo T, Sarela M, Manner J. A survey of Ethernet LAN security. IEEE Communications Surveys & Tutorials. 2013 Jul 31;15(3):1477-91.
Fischer K, Geßner J. Security architecture elements for IoT enabled automation networks. InEmerging Technologies & Factory Automation (ETFA), 2012 IEEE 17th Conference on 2012 Sep 17 (pp. 1-8). IEEE.
AlHarthy K, Shawkat W. Implement network security control solutions in BYOD environment. InControl System, Computing and Engineering (ICCSCE), 2013 IEEE International Conference on 2013 Nov 29 (pp. 7-11). IEEE.
Chen L, Chen X, Jiang J, Yin X, Shao G. Research and practice of dynamic network security architecture for IaaS platforms. Tsinghua Science and Technology. 2014 Oct;19(5):496-507.
Rauscher R, Acharya R. A network security architecture to reduce the risk of data leakage for health care organizations. Ine-Health Networking, Applications and Services (Healthcom), 2014 IEEE 16th International Conference on 2014 Oct 15 (pp. 231-236). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download