Understanding Network Concepts
VerifiedAdded on 2020/05/11
|66
|9319
|59
AI Summary
This assignment delves into fundamental networking concepts. It requires understanding Local Area Networks (LANs), network disaster recovery plans, and the role of secure protocols in mitigating LAN attacks. Students will also explore topics like mobile IP address efficiency and router architectures used in Network-on-Chip systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
project 2-ssm network design
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract
The network will be designed for the Seven Star Motors Company for all the departments with
Virtual Local Area Network (VLAN) by following the access rules given. The network will be
designed in order to develop the company’s business. An advance security will be used for
designing the network. Each and every department of the company will control and manage the
network by giving access to all other departments. There are four branches and a head office for
the company connected via Wireless Local Area Network (WLAN).
1
The network will be designed for the Seven Star Motors Company for all the departments with
Virtual Local Area Network (VLAN) by following the access rules given. The network will be
designed in order to develop the company’s business. An advance security will be used for
designing the network. Each and every department of the company will control and manage the
network by giving access to all other departments. There are four branches and a head office for
the company connected via Wireless Local Area Network (WLAN).
1
Table of Contents
1. Introduction 3
2. Requirements 3
3. Design 3
3.1 Security Policies 8
3.2 Disaster Recovery Plan 12
3.3 Disaster Recovery Policies 12
4. Network diagram and implementation 17
5. Configurations 17
ACL Configuration 36
VLAN configuration 42
Ping test 46
6. Tables 51
7. Equipment used 53
8. Conclusions 60
References 61
2
1. Introduction 3
2. Requirements 3
3. Design 3
3.1 Security Policies 8
3.2 Disaster Recovery Plan 12
3.3 Disaster Recovery Policies 12
4. Network diagram and implementation 17
5. Configurations 17
ACL Configuration 36
VLAN configuration 42
Ping test 46
6. Tables 51
7. Equipment used 53
8. Conclusions 60
References 61
2
1. Introduction
Seven Star Motors company located in Australia and they have six branches in Melbourne,
Brisbane, Perth, Sydney and just started. The company has a head office located in Sydney and it
has two branches. The four branches and a head office of the company will be connected through
WLAN. All the branches will be designed by LAN network and WAN network will be used for
connecting all the departments. All the departments and branches will be designed by VLAN.
The security to all the branches of network will be provided by the device called Firewall. More
devices will be used for completing overall network design with the security. The network
configuration will be made by the following devices such as ISP, DHCP, Router, SSH server,
NAT server and switch etc.
2. Requirements
SSM Company spreads its branches all over the world and has six branches having many
departments. Six LAN configuration is provided to each branch of the network. WAN
configuration is provided for the connection between all the branches. One of the branch which
is in Sydney has two buildings named as Sydney-A and Sydney-B. Seventeen VLAN
connections are given since seventeen departments are there for whole branches. We need
seventeen printers for the branches since seventeen VLANs are present for seventeen
departments. Firewall is the security system used by all the systems for site security. An internet
standard named Network address translation (NAT) is the used for enabling LAN to use one set
of IP addresses for internal traffic and another set of IP addresses for external traffic used for
limiting the count of public IP addresses. All the system of the branches are provided with
technical support and a server is provided for all department each. Router, switch hub and more
required devices are used in the project as per the network requirement provided.
3. Design
Designing phase considers the development of lifecycle for designing large network.
Using this lifecycle, it is possible to design a network to improve the network security and
network maintenance. The development lifecycle contains the following phases:
i. Analysis requirement
3
Seven Star Motors company located in Australia and they have six branches in Melbourne,
Brisbane, Perth, Sydney and just started. The company has a head office located in Sydney and it
has two branches. The four branches and a head office of the company will be connected through
WLAN. All the branches will be designed by LAN network and WAN network will be used for
connecting all the departments. All the departments and branches will be designed by VLAN.
The security to all the branches of network will be provided by the device called Firewall. More
devices will be used for completing overall network design with the security. The network
configuration will be made by the following devices such as ISP, DHCP, Router, SSH server,
NAT server and switch etc.
2. Requirements
SSM Company spreads its branches all over the world and has six branches having many
departments. Six LAN configuration is provided to each branch of the network. WAN
configuration is provided for the connection between all the branches. One of the branch which
is in Sydney has two buildings named as Sydney-A and Sydney-B. Seventeen VLAN
connections are given since seventeen departments are there for whole branches. We need
seventeen printers for the branches since seventeen VLANs are present for seventeen
departments. Firewall is the security system used by all the systems for site security. An internet
standard named Network address translation (NAT) is the used for enabling LAN to use one set
of IP addresses for internal traffic and another set of IP addresses for external traffic used for
limiting the count of public IP addresses. All the system of the branches are provided with
technical support and a server is provided for all department each. Router, switch hub and more
required devices are used in the project as per the network requirement provided.
3. Design
Designing phase considers the development of lifecycle for designing large network.
Using this lifecycle, it is possible to design a network to improve the network security and
network maintenance. The development lifecycle contains the following phases:
i. Analysis requirement
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
ii. Plan
iii. Design
iv. Implementation
v. Test
vi. Maintenance
By using these phases, the network can be improved.
Phase 1: ANALYSIS-In analysis phase, analysis is about the problem and how to solve the
problem and how it takes place.
Phase 2: PLAN -In planning, the plan is made to rectify the problem and what is required to
solve the problem is checked subsequently.
Phase 3: DESIGN-In designing phase, the sample design for the network is designed where a
physical network is designed.
Phase 4: IMPLEMENTATION-In implementation phase, it configures the devices which are
used in the networks.
Phase 5: TEST-In testing phase, it tests the network connectivity and then the configuration Ping
command is used to check the connectivity of the devices. For checking the configuration “show
run” command is used.
Phase 6: MAINTENANCE-In maintenance phase, it shows how to maintain the network
security, service and data.
The Company’s PC Set-up and Internet Access Rule
Rider
4
iii. Design
iv. Implementation
v. Test
vi. Maintenance
By using these phases, the network can be improved.
Phase 1: ANALYSIS-In analysis phase, analysis is about the problem and how to solve the
problem and how it takes place.
Phase 2: PLAN -In planning, the plan is made to rectify the problem and what is required to
solve the problem is checked subsequently.
Phase 3: DESIGN-In designing phase, the sample design for the network is designed where a
physical network is designed.
Phase 4: IMPLEMENTATION-In implementation phase, it configures the devices which are
used in the networks.
Phase 5: TEST-In testing phase, it tests the network connectivity and then the configuration Ping
command is used to check the connectivity of the devices. For checking the configuration “show
run” command is used.
Phase 6: MAINTENANCE-In maintenance phase, it shows how to maintain the network
security, service and data.
The Company’s PC Set-up and Internet Access Rule
Rider
4
The internet is a universal system and it contains million pages. It is caused by offensive,
and inappropriate materials. It avoids some unwanted pages and materials. It provides internet
connection to company.
Use of Internet and Company Computer Network
It uses legitimate business purposes and it provides computer network jobs. It allows
internet through the computer network. It includes possible termination and criminal liability. It
uses company’s PC properties, internet, legal and moral mode.
PC Setup Usage Boundaries
Forbidden Usage
In the organization, previously the printed agreement was lagging, an organization’s PC
setup did not distribute, vision or collection personal and profitable information like virus, self-
replicating programs and political materials. Employees should not download games and
entertaining software using organization’s networks. Employee’s should not store or send
computer network materials through email or chat room. If employee is encountered doing such
things, the materials will alert their supervisor instantly.
Illegal Copying
People should not copy or make duplicate of protected material illegally. People are
responsible for making copyright law and apply license for software, graphics, message and
documents. Other thing user can download or copy it easily. User can download the file easily
which is a license free version.
Communication of Trade Secrets
Employees are banned from sending and transmitting or distributing other private
information of the organization, but there is an exception for certain authorized individual. If an
employee shares those banned information, it is taken as a disciplinary action or criminal penalty
under the “Economic Espionage laws”.
PC Resources
Make sure safety, so employees using setup via a PC connected through the
organization’s setup should compulsory switch on the firewall or other security software from
computer. Organizations restrict network connector devices like modem which belongs to
employees.
Frivolous Use
5
and inappropriate materials. It avoids some unwanted pages and materials. It provides internet
connection to company.
Use of Internet and Company Computer Network
It uses legitimate business purposes and it provides computer network jobs. It allows
internet through the computer network. It includes possible termination and criminal liability. It
uses company’s PC properties, internet, legal and moral mode.
PC Setup Usage Boundaries
Forbidden Usage
In the organization, previously the printed agreement was lagging, an organization’s PC
setup did not distribute, vision or collection personal and profitable information like virus, self-
replicating programs and political materials. Employees should not download games and
entertaining software using organization’s networks. Employee’s should not store or send
computer network materials through email or chat room. If employee is encountered doing such
things, the materials will alert their supervisor instantly.
Illegal Copying
People should not copy or make duplicate of protected material illegally. People are
responsible for making copyright law and apply license for software, graphics, message and
documents. Other thing user can download or copy it easily. User can download the file easily
which is a license free version.
Communication of Trade Secrets
Employees are banned from sending and transmitting or distributing other private
information of the organization, but there is an exception for certain authorized individual. If an
employee shares those banned information, it is taken as a disciplinary action or criminal penalty
under the “Economic Espionage laws”.
PC Resources
Make sure safety, so employees using setup via a PC connected through the
organization’s setup should compulsory switch on the firewall or other security software from
computer. Organizations restrict network connector devices like modem which belongs to
employees.
Frivolous Use
5
An organization provides limited resources. Network bandwidth and system storage
capacity are limited. Networks have responsibility to keep those resources. Some range of
resources are allocated to each employee, if employees are over using the resources then it will
notify the same to the network administrator.
Anticipation of Secrecy
Each organization provides computer and internet access to employees for improving the
presentation of their jobs. Workers would not take any secrecy to send, make or save any
information using organization’s equipment.
Relinquishment of Secrecy Privileges
Consumer particularly surrenders to claim some privileges of secrecy like share, save,
and make by organization’s tools. The users agree to allow organizations personal access, where
the materials created, shared or are saved through employee via any computer networks
otherwise through a setup construction.
Watching PC Setup Usage.
An organization has rights toward monitoring the computers including internet sites that
are visited by the employees. Monitoring employee activities like downloads newsgroup and
chat.
Delaying Places by Unsuitable Information
An organization takes rights toward using the software for identifying the employee’s
activity and blocks the internet access of particular employees.
Strategies Happening Worm Protection Events
The following events are recommended for stopping the worm difficulties:
Continuously track the organization’s rules and reinforce worm protection software
which is obtainable in the company websites. Take that software then track the latest
types.
NEVER open unknown or unauthorized source in company’s system. If macros files or
any other files are opened just close it immediately.
Delete junk file and spam and chain from Emails do not have promoting with the
Hospital’s message rule.
Never transfer records from unidentified, unauthorized websites and sources.
Avoid disk sharing with Read/Write rights directly.
6
capacity are limited. Networks have responsibility to keep those resources. Some range of
resources are allocated to each employee, if employees are over using the resources then it will
notify the same to the network administrator.
Anticipation of Secrecy
Each organization provides computer and internet access to employees for improving the
presentation of their jobs. Workers would not take any secrecy to send, make or save any
information using organization’s equipment.
Relinquishment of Secrecy Privileges
Consumer particularly surrenders to claim some privileges of secrecy like share, save,
and make by organization’s tools. The users agree to allow organizations personal access, where
the materials created, shared or are saved through employee via any computer networks
otherwise through a setup construction.
Watching PC Setup Usage.
An organization has rights toward monitoring the computers including internet sites that
are visited by the employees. Monitoring employee activities like downloads newsgroup and
chat.
Delaying Places by Unsuitable Information
An organization takes rights toward using the software for identifying the employee’s
activity and blocks the internet access of particular employees.
Strategies Happening Worm Protection Events
The following events are recommended for stopping the worm difficulties:
Continuously track the organization’s rules and reinforce worm protection software
which is obtainable in the company websites. Take that software then track the latest
types.
NEVER open unknown or unauthorized source in company’s system. If macros files or
any other files are opened just close it immediately.
Delete junk file and spam and chain from Emails do not have promoting with the
Hospital’s message rule.
Never transfer records from unidentified, unauthorized websites and sources.
Avoid disk sharing with Read/Write rights directly.
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Before using floppy disk from unknown source, ensure to scan always. After scanning
the disk employee can use it.
In regular basis, backup the critical information and system configuration files. Finally,
keep this in a safe location.
Doubt laboratory challenging differences with virus protection software, then track the
virus protection software and clean the machine or system. After that, stop the software
and perform the lab test. Permit virus protection software to function. If virus protection
software is not permitted, don’t run any applications. Because, it can transfer virus into
the system (Example: File sharing and Email).
Latest viruses are noticed in each diurnal. Check the Laboratory virus protection rule
regularly, then update the advised process.
Message Rule in Wireless
Outline
The determination of wireless communication rule stands to keep the data resources that
belong to the company. The company offers computers, nets then additional electric data system
toward see assignments, initiatives and its goals. This permits admission toward properties
upholds the privacy, honesty and obtainability of information. WC rule includes that the
circumstances of wireless substructure device should convince to join to the company.
Possibility
In the company, all the employees, consultants, temporary workers and contractors and
third party groups are connected, with a Wireless Infrastructure device and holds on this
Wireless Communication rule. The rule smears to every Wireless Substructure plans connected
in this l network. This network includes all types of wireless communication devices like cellular
phones, PDA, and desktops that are able to transfer the data packets.
Rule Statement
General Network Access Requirements
Every wireless device infrastructure devices located in company site and for providing
internet access company must deny the following:
1) An approved supported team must install and maintain the system.
2) Apply hospital accepted authentication protocols and infrastructure.
3) Apply encryption protocols which are approved by the company.
7
the disk employee can use it.
In regular basis, backup the critical information and system configuration files. Finally,
keep this in a safe location.
Doubt laboratory challenging differences with virus protection software, then track the
virus protection software and clean the machine or system. After that, stop the software
and perform the lab test. Permit virus protection software to function. If virus protection
software is not permitted, don’t run any applications. Because, it can transfer virus into
the system (Example: File sharing and Email).
Latest viruses are noticed in each diurnal. Check the Laboratory virus protection rule
regularly, then update the advised process.
Message Rule in Wireless
Outline
The determination of wireless communication rule stands to keep the data resources that
belong to the company. The company offers computers, nets then additional electric data system
toward see assignments, initiatives and its goals. This permits admission toward properties
upholds the privacy, honesty and obtainability of information. WC rule includes that the
circumstances of wireless substructure device should convince to join to the company.
Possibility
In the company, all the employees, consultants, temporary workers and contractors and
third party groups are connected, with a Wireless Infrastructure device and holds on this
Wireless Communication rule. The rule smears to every Wireless Substructure plans connected
in this l network. This network includes all types of wireless communication devices like cellular
phones, PDA, and desktops that are able to transfer the data packets.
Rule Statement
General Network Access Requirements
Every wireless device infrastructure devices located in company site and for providing
internet access company must deny the following:
1) An approved supported team must install and maintain the system.
2) Apply hospital accepted authentication protocols and infrastructure.
3) Apply encryption protocols which are approved by the company.
7
4) Manage MAC address of the devices for tracking.
Home Wireless Device Requirements
WI devices offers direct connection to the business network, and must match with the
home wireless devices requirements. WI device is not successful to follow the home-based
wireless scheme. So, it should be located in ways that provide straight connection toward the
business network.
Enforcement
A worker originates to break this rule, as it might be issued to punitive act and comprises
activation of worker. Abusing this rule through a short term employer, servicer will lose their
contract with the company.
Definitions
Company Network: Company network is a network that can be either wired or wireless
network, including interior, and the outside setups offer internet toward business facilities.
Business Construction: A construction gives admission toward the company setup.
Data Benefits: Data is met and generated from the fundamental hardware, software, facilities,
schemes, and knowledge. It is used for gaining, saving, spending, and safeguarding the
information and it identified to be significant and helpful for the group.
Physical Address – The physical address like the hardware address, it uses unique identification
of the devices.
3.1 Security Policies
The Company provides the huge range of information assert like systems, interconnected
nodes with regional connection, groupware databases and wireless devices for the normal usage
of the assists working there. All of these asserts are monitored by the administrative sector who
carry out the appropriate trade of the office related jobs in the care center. Legitimate trading of
the computerized resources includes scientific work and office related jobs. In acceptance with
the world wide range which provides interaction between the different facilities provided through
out. It manages the same way on the new technology. It is hard to believe that technology takes
care of all the amount of work carried out like taking care of databases and security of stored
data. The guidelines being followed by the system should be appropriate and the needs should be
satisfactory (Iyengar, 2011).
User Access
8
Home Wireless Device Requirements
WI devices offers direct connection to the business network, and must match with the
home wireless devices requirements. WI device is not successful to follow the home-based
wireless scheme. So, it should be located in ways that provide straight connection toward the
business network.
Enforcement
A worker originates to break this rule, as it might be issued to punitive act and comprises
activation of worker. Abusing this rule through a short term employer, servicer will lose their
contract with the company.
Definitions
Company Network: Company network is a network that can be either wired or wireless
network, including interior, and the outside setups offer internet toward business facilities.
Business Construction: A construction gives admission toward the company setup.
Data Benefits: Data is met and generated from the fundamental hardware, software, facilities,
schemes, and knowledge. It is used for gaining, saving, spending, and safeguarding the
information and it identified to be significant and helpful for the group.
Physical Address – The physical address like the hardware address, it uses unique identification
of the devices.
3.1 Security Policies
The Company provides the huge range of information assert like systems, interconnected
nodes with regional connection, groupware databases and wireless devices for the normal usage
of the assists working there. All of these asserts are monitored by the administrative sector who
carry out the appropriate trade of the office related jobs in the care center. Legitimate trading of
the computerized resources includes scientific work and office related jobs. In acceptance with
the world wide range which provides interaction between the different facilities provided through
out. It manages the same way on the new technology. It is hard to believe that technology takes
care of all the amount of work carried out like taking care of databases and security of stored
data. The guidelines being followed by the system should be appropriate and the needs should be
satisfactory (Iyengar, 2011).
User Access
8
The authorized users have all the rights to access the profiles from any units of Company.
The overview about this is to tell people about the new technologies being introduced. All these
resources of the center should be connected locally. This is one of most important policy.
Account Management
Few conditions are to be followed like only official account can be operated and no one
can do any type of editing in the particular files. Any electronic devices used by the staffs are
prohibited to stop the sting operations and it may also lead to degrade the name and fame of the
center. They should prohibit the excessive use of data from the organization (Sá Silva,
Krishnamachari & Boavida, 2010).
Identifying Protocols
The unique identification number will be generated and handed over to the staff, so that
only they can access it which comes under the facilities of the center. To maintain the password
follow the normal b asic rules like strong alphanumeric and symbols. At any condition, it should
not be exchanged through mails to anyone.
Interconnected Nodes
The regional field connection is established for the care center in such a way that all the
sectors interact within itself. For the higher securities make sure that personal devices are not
used for interacting with the management staffs.
Device Authorization
All the electronic devices being used should be authorized with legal contracts, licenses
and notices. Firewall is a groupware which provides high security inside the care center systems
and reduces the traffic and keeps track of all the connected nodes.
Firewall for Precaution
Always check the authorities for any alteration of data and stay updated.
Should be able to differentiate between the authorized and unauthorized connection on
the nodes.
Block the unwanted traffic while accessing the signals and hide the system’s names.
Inscription
Inscription is mainly done in order to encode the data into an unknown sequence so that it
is not utilized by anyone to decrease the name and fame of the CWM healthcare center.
9
The overview about this is to tell people about the new technologies being introduced. All these
resources of the center should be connected locally. This is one of most important policy.
Account Management
Few conditions are to be followed like only official account can be operated and no one
can do any type of editing in the particular files. Any electronic devices used by the staffs are
prohibited to stop the sting operations and it may also lead to degrade the name and fame of the
center. They should prohibit the excessive use of data from the organization (Sá Silva,
Krishnamachari & Boavida, 2010).
Identifying Protocols
The unique identification number will be generated and handed over to the staff, so that
only they can access it which comes under the facilities of the center. To maintain the password
follow the normal b asic rules like strong alphanumeric and symbols. At any condition, it should
not be exchanged through mails to anyone.
Interconnected Nodes
The regional field connection is established for the care center in such a way that all the
sectors interact within itself. For the higher securities make sure that personal devices are not
used for interacting with the management staffs.
Device Authorization
All the electronic devices being used should be authorized with legal contracts, licenses
and notices. Firewall is a groupware which provides high security inside the care center systems
and reduces the traffic and keeps track of all the connected nodes.
Firewall for Precaution
Always check the authorities for any alteration of data and stay updated.
Should be able to differentiate between the authorized and unauthorized connection on
the nodes.
Block the unwanted traffic while accessing the signals and hide the system’s names.
Inscription
Inscription is mainly done in order to encode the data into an unknown sequence so that it
is not utilized by anyone to decrease the name and fame of the CWM healthcare center.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
It is necessary to check the encrypted keys every now and then so that the intruder do not
make any kind of changes. The management should see that the secret keys are not
altered.
Each individual is responsible if any problem occurs.
Chunk Path
Almost all the files saved here can be used only for limited a purpose, after which it gets
expired. So all the old data which is not needed for the center will get deleted after the required
time period.
Uncertainty Estimation
Uncertainty is actually analytical and delicate to handle various resources. It may cause
problems in tracking the visual and interactive data which may lead to face loss of honesty from
the company. As a whole reliability is lost between the Company and employee. Thus,
assessment center should exist, who looks after the corresponding data. A group of people looks
after this problem and immediately answers if any complaints are made based on the Company
Regulatory Administrator
Once the websites beings to run, then the admin should know what type of malicious
groupware may affect the sites in different aspects. Thus, SSM may have separate login page
where authorities can post the details if any malfunction occurs. As a result, immediately
previous list will be checked and made sure that what type of changes are required. It should also
verify that the staffs who are using the sites are verified or not. So that, it will check the relevant
Email IDs, and corresponding passwords or the related birthdays.
Liability
Educating the staffs about the usage of their own credentials to login into the page.
It is always necessary to inform the staff about the new techniques involved.
Make sure that none of the staff share SSM's credentials to any outsider, which may lead
to future problems.
Instruct the staff to keep changing their password often, so that no one can make any
changes, especially if they think something is unusual in the login page.
Also tell them to correctly login to the page and then logout.
Event Broadcasting
10
make any kind of changes. The management should see that the secret keys are not
altered.
Each individual is responsible if any problem occurs.
Chunk Path
Almost all the files saved here can be used only for limited a purpose, after which it gets
expired. So all the old data which is not needed for the center will get deleted after the required
time period.
Uncertainty Estimation
Uncertainty is actually analytical and delicate to handle various resources. It may cause
problems in tracking the visual and interactive data which may lead to face loss of honesty from
the company. As a whole reliability is lost between the Company and employee. Thus,
assessment center should exist, who looks after the corresponding data. A group of people looks
after this problem and immediately answers if any complaints are made based on the Company
Regulatory Administrator
Once the websites beings to run, then the admin should know what type of malicious
groupware may affect the sites in different aspects. Thus, SSM may have separate login page
where authorities can post the details if any malfunction occurs. As a result, immediately
previous list will be checked and made sure that what type of changes are required. It should also
verify that the staffs who are using the sites are verified or not. So that, it will check the relevant
Email IDs, and corresponding passwords or the related birthdays.
Liability
Educating the staffs about the usage of their own credentials to login into the page.
It is always necessary to inform the staff about the new techniques involved.
Make sure that none of the staff share SSM's credentials to any outsider, which may lead
to future problems.
Instruct the staff to keep changing their password often, so that no one can make any
changes, especially if they think something is unusual in the login page.
Also tell them to correctly login to the page and then logout.
Event Broadcasting
10
One who is the administrator of the page keeps the record of all the breaches, spam and any
other unrelated things happening on to the site. Each sector should have its own security so that
they supervise their own work. If any such thing happens, then make sure that new ideas are
generated in which suspecting the files will be very easy and is helpful for the main
administrator. Thus, if any unusual thing happens, immediately it can be notified and corrected
from where it is generated.
Certification
Only if the technical sites and the scheme provided are satisfied, the SSM Company will
be awarded with good support and ethics. All the new technologies being used should be correct
to use and authorize. Anyone using the heavy equipment should have experience to use it, in the
specified connection. All outdated products should be replaced.
Wi-Fi Surveillance
Wireless connection is used in order to build the care center local field connection strong
enough to continue the services as long as possible. It contains the certification of the wireless
technologies being used in the center and the admin keeps track of the signal’s bandwidth.
Anyone who is using this facilities should make sure that all the give guidelines should be
strictly followed. Any devices used for personal usage and intentionally misused are strictly not
allowed. It should satisfy the rules belonging from all the states. As the internet services are
provided, it is must to ask the authentication number for permission to use it. The internet
protocol address should be encrypted so that no one can easily obtain it and miss use it. The
connection should be established in such a way that new technology equipment can easily be
connected. Since the connection is divided, if any part displays some uncertain data, then
immediately it should be eradicated from the server.
Negligence and Prosecution
If any staff is committing any unusual thing then the access will be denied for the
temporary purposes as per the mistake being committed. An additional payment can be asked to
be given as a penalty and all the authorized rights can be banned. Provided facilitates would be
stopped completely and it should be made sure that in future all the data are not let out to anyone.
Thus, if anything leads to decreasing the fame of healthcare center, then the organization may
also take extreme step, for the legal violations of the norms.
11
other unrelated things happening on to the site. Each sector should have its own security so that
they supervise their own work. If any such thing happens, then make sure that new ideas are
generated in which suspecting the files will be very easy and is helpful for the main
administrator. Thus, if any unusual thing happens, immediately it can be notified and corrected
from where it is generated.
Certification
Only if the technical sites and the scheme provided are satisfied, the SSM Company will
be awarded with good support and ethics. All the new technologies being used should be correct
to use and authorize. Anyone using the heavy equipment should have experience to use it, in the
specified connection. All outdated products should be replaced.
Wi-Fi Surveillance
Wireless connection is used in order to build the care center local field connection strong
enough to continue the services as long as possible. It contains the certification of the wireless
technologies being used in the center and the admin keeps track of the signal’s bandwidth.
Anyone who is using this facilities should make sure that all the give guidelines should be
strictly followed. Any devices used for personal usage and intentionally misused are strictly not
allowed. It should satisfy the rules belonging from all the states. As the internet services are
provided, it is must to ask the authentication number for permission to use it. The internet
protocol address should be encrypted so that no one can easily obtain it and miss use it. The
connection should be established in such a way that new technology equipment can easily be
connected. Since the connection is divided, if any part displays some uncertain data, then
immediately it should be eradicated from the server.
Negligence and Prosecution
If any staff is committing any unusual thing then the access will be denied for the
temporary purposes as per the mistake being committed. An additional payment can be asked to
be given as a penalty and all the authorized rights can be banned. Provided facilitates would be
stopped completely and it should be made sure that in future all the data are not let out to anyone.
Thus, if anything leads to decreasing the fame of healthcare center, then the organization may
also take extreme step, for the legal violations of the norms.
11
3.2 Disaster Recovery Plan
Disaster recovery planning process has special importance dealing with the Company.
Disaster and security are used for Company management, to carry out the mission and also for
operational functions ("What is network disaster recovery plan? - Definition from WhatIs.com",
2017). Manufacture industry deals with larger data sets than ever before and big data moves in
storing all the related company records along with the images electronically. It is mainly used to
increase the process efficiency also increases high security. Having data recovery process in the
company is crucial, it is also good in the paper process, and it can be used in the emergency
period (Domingue, 2011).Disaster recovery planning is also developed by a prevalence of mobile
devices being used in the Company. Creating a disaster recovery plan is neither easy nor a
speedy process. Here, the following steps are used for a successful disaster recovery plan in the
Company organization.
Some of the most disaster plans includes,
Disaster recovery and restore.
Emergency mode operation
Keep patients record properly
Data backup
Security incident response
Prevents disaster (NAKAMURA & OHSAKI, 2017).
Company database Recovery Time Objective (RTO) is very important for the day-to-day
activities. Company recognizes the information system’s disaster plan as a security incident, and
can utilize the released security incident response processes in addressing the disaster response
and recovery. Disaster Recovery Plan (DRP), is used in the Company when DRP is executed, it
will support a timely and effective resumption. Then, it recovers all the interrupted clinical
activities and also support the business operations (Galis & Gavras, 2013).
3.3 Disaster Recovery Policies
The disaster recovery plan has been developed by the healthcare sector to provide
guidance and other security measures. This also gives a lot of response to the information
technologies (hanfi , & rai, 2016).
Healthcare Center Policies and Preparations
12
Disaster recovery planning process has special importance dealing with the Company.
Disaster and security are used for Company management, to carry out the mission and also for
operational functions ("What is network disaster recovery plan? - Definition from WhatIs.com",
2017). Manufacture industry deals with larger data sets than ever before and big data moves in
storing all the related company records along with the images electronically. It is mainly used to
increase the process efficiency also increases high security. Having data recovery process in the
company is crucial, it is also good in the paper process, and it can be used in the emergency
period (Domingue, 2011).Disaster recovery planning is also developed by a prevalence of mobile
devices being used in the Company. Creating a disaster recovery plan is neither easy nor a
speedy process. Here, the following steps are used for a successful disaster recovery plan in the
Company organization.
Some of the most disaster plans includes,
Disaster recovery and restore.
Emergency mode operation
Keep patients record properly
Data backup
Security incident response
Prevents disaster (NAKAMURA & OHSAKI, 2017).
Company database Recovery Time Objective (RTO) is very important for the day-to-day
activities. Company recognizes the information system’s disaster plan as a security incident, and
can utilize the released security incident response processes in addressing the disaster response
and recovery. Disaster Recovery Plan (DRP), is used in the Company when DRP is executed, it
will support a timely and effective resumption. Then, it recovers all the interrupted clinical
activities and also support the business operations (Galis & Gavras, 2013).
3.3 Disaster Recovery Policies
The disaster recovery plan has been developed by the healthcare sector to provide
guidance and other security measures. This also gives a lot of response to the information
technologies (hanfi , & rai, 2016).
Healthcare Center Policies and Preparations
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Perform an initial risk assessment to show the current information about the
system vulnerability.
Keep track of the inventory information system asserts like software, hardware and
data.
Keep track the system emergency plan.
Critical service list.
Data backup and restoration plan (Berre, 2010).
Provide guidelines for appropriate information access ("Routing Protocols for
Wireless Sensor Networks", 2016).
Key supporting IT Policies Contains
Reporting security incident.
Data backup for information system.
Policy Compliance
Compliance measurement
Exceptions
Non compliance
Company Personally Follows this Disaster Recovery Policy
Always keep secure your critical application and data.
Provide security awareness and disaster recovery educations to all the team
members in the Company who are all involved.
Data recovery process is mainly used to reflect the overall system information
priorities (Younes, 2016).
Personnel
Salvage of existing ITS equipment and system
Reassembly process
Designate site (Zseby, Savola & Pistore, 2010)
Restoration of data and applications from backup
Develop testing plans.
Distribute the plans to the organization members, and also keep extra copies in
offsite and fireproof vault.
Clearly defines the roles and responsibilities to all the team members.
13
system vulnerability.
Keep track of the inventory information system asserts like software, hardware and
data.
Keep track the system emergency plan.
Critical service list.
Data backup and restoration plan (Berre, 2010).
Provide guidelines for appropriate information access ("Routing Protocols for
Wireless Sensor Networks", 2016).
Key supporting IT Policies Contains
Reporting security incident.
Data backup for information system.
Policy Compliance
Compliance measurement
Exceptions
Non compliance
Company Personally Follows this Disaster Recovery Policy
Always keep secure your critical application and data.
Provide security awareness and disaster recovery educations to all the team
members in the Company who are all involved.
Data recovery process is mainly used to reflect the overall system information
priorities (Younes, 2016).
Personnel
Salvage of existing ITS equipment and system
Reassembly process
Designate site (Zseby, Savola & Pistore, 2010)
Restoration of data and applications from backup
Develop testing plans.
Distribute the plans to the organization members, and also keep extra copies in
offsite and fireproof vault.
Clearly defines the roles and responsibilities to all the team members.
13
Continuously update the network structure and security information.
Update the plans as needed (Zhen & Sampalli, 2017).
Prioritize key business operations.
It is also believed that lack of resource, insufficient fund and also in coordination.
Disaster recovery policy should involve in long-term plan as well as in recovery program (Seo &
Schmidt, 2013).
Design topology
LAN a
LAN -a is used for building- in Sydney branch and has two virtual LANs. One for sales and
hiring another for site security departments.
VLAN - a-1 is sales and hiring department for building-c in Sydney branch. More than 100
employees are working in sales and hiring department of this branch. Business administration
department situated in Sydney branch is used is joined with the Virtual Private Network (VPN)
to Brisbane branch and it works for it (Akyildiz, 2011).
VLAN - a-2 is site security department for building-c in Sydney branch. In this site security
department only five employees are working. This department also has both Business
administration department and Brisbane branch which has right to procedure all network.
LAN b
LAN-b is connected for building-b in Sydney branch. It has four virtual LANs such as VLAN b-
1 that is Technical support department; VLAN b-2 which is Marketing department, VLAN b-3
which is vehicle maintenance department and VLAN b-4 which is Business administration
department.
14
Update the plans as needed (Zhen & Sampalli, 2017).
Prioritize key business operations.
It is also believed that lack of resource, insufficient fund and also in coordination.
Disaster recovery policy should involve in long-term plan as well as in recovery program (Seo &
Schmidt, 2013).
Design topology
LAN a
LAN -a is used for building- in Sydney branch and has two virtual LANs. One for sales and
hiring another for site security departments.
VLAN - a-1 is sales and hiring department for building-c in Sydney branch. More than 100
employees are working in sales and hiring department of this branch. Business administration
department situated in Sydney branch is used is joined with the Virtual Private Network (VPN)
to Brisbane branch and it works for it (Akyildiz, 2011).
VLAN - a-2 is site security department for building-c in Sydney branch. In this site security
department only five employees are working. This department also has both Business
administration department and Brisbane branch which has right to procedure all network.
LAN b
LAN-b is connected for building-b in Sydney branch. It has four virtual LANs such as VLAN b-
1 that is Technical support department; VLAN b-2 which is Marketing department, VLAN b-3
which is vehicle maintenance department and VLAN b-4 which is Business administration
department.
14
VLAN b-1 is Technical support department of building-d in Sydney branch and consists of 20
employees working. It is situated in Sydney branch. Technical support department has right to
procedure and control other department and devices.
VLAN b-2 is marketing department building-d in Sydney branch having 45 employees working.
It is also situated only in Sydney branch. It has right to access business administration
department and hire only department. Business administration department is situated in Sydney
branch. The hire only department is existing in Melbourne branch. Both are at startup branch.
VLAN b-3 is vehicle maintenance department building-c in Sydney branch having twenty
employees working. Simple VLAN helps in planning to perform connection between twenty
systems.
VLAN b-4 is Business administration department building-c in Sydney branch consisting of
twenty five employees working in Business administration department. The Business
administration department is just a startup division. This department has the right to access only
the internet and does not have any rights over all other VLANs.
LAN c
LAN-c is the network designed for Melbourne branch which has three virtual LANs. VLANs are
Hire only department, Vehicle maintenance department and Site security department
respectively.
15
employees working. It is situated in Sydney branch. Technical support department has right to
procedure and control other department and devices.
VLAN b-2 is marketing department building-d in Sydney branch having 45 employees working.
It is also situated only in Sydney branch. It has right to access business administration
department and hire only department. Business administration department is situated in Sydney
branch. The hire only department is existing in Melbourne branch. Both are at startup branch.
VLAN b-3 is vehicle maintenance department building-c in Sydney branch having twenty
employees working. Simple VLAN helps in planning to perform connection between twenty
systems.
VLAN b-4 is Business administration department building-c in Sydney branch consisting of
twenty five employees working in Business administration department. The Business
administration department is just a startup division. This department has the right to access only
the internet and does not have any rights over all other VLANs.
LAN c
LAN-c is the network designed for Melbourne branch which has three virtual LANs. VLANs are
Hire only department, Vehicle maintenance department and Site security department
respectively.
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
VLAN c-1 is Hire only department in Melbourne branch having two hundred and fifty six
employees working. It has the right to use VLAN a-1 and VLAN b-2.
VLAN c-2 is Vehicle maintenance department in Melbourne division having two hundred and
fifty six employees as same as the hire only department. This department is also in other
branches likes Brisbane and Perth city.
VLAN c-3 is Site security department in Melbourne branch having five employees working.
This department also has Brisbane and Perth branches. This department has right to access all
other departments.
LAN d
LAN-d is designed for Brisbane branch which has three virtual LANs. VLANs are Sales only
department, Vehicle maintenance department and Site security department respectively.
VLAN d-1 is Sales only department in Brisbane branch consisting of one hundred and sixty
employees working. This department is also located in Brisbane and Perth branch. Sales only
department has the right to access simply the marketing departments that exists in Sydney
branch.
VLAN d-2 is Vehicle maintenance department in Brisbane branch consisting of twenty
employees working. This department is also located in Brisbane branch, Melbourne branch and
Perth branch respectively.
VLAN d-3 is Site security department in Brisbane branch having fifty employees working. This
department is also located in Brisbane branch, Melbourne branch and Perth branch. Site security
department has the right to access all other departments.
LAN e
LAN-e is designed for Perth Branch. It has three virtual LANs. VLANs are Sales only
department, Vehicle maintenance department and Site security department.
VLAN e-1 is Sales only department in Perth Branch has hundred employees working. This
department is also in Brisbane and Perth branch. Sales only department has right to use simply
the marketing departments existing in Sydney branch.
VLAN e-2 is Vehicle maintenance department in Perth Branch having twenty employees
working. This department is also located in Brisbane branch, Melbourne branch and Perth branch
respectively.
16
employees working. It has the right to use VLAN a-1 and VLAN b-2.
VLAN c-2 is Vehicle maintenance department in Melbourne division having two hundred and
fifty six employees as same as the hire only department. This department is also in other
branches likes Brisbane and Perth city.
VLAN c-3 is Site security department in Melbourne branch having five employees working.
This department also has Brisbane and Perth branches. This department has right to access all
other departments.
LAN d
LAN-d is designed for Brisbane branch which has three virtual LANs. VLANs are Sales only
department, Vehicle maintenance department and Site security department respectively.
VLAN d-1 is Sales only department in Brisbane branch consisting of one hundred and sixty
employees working. This department is also located in Brisbane and Perth branch. Sales only
department has the right to access simply the marketing departments that exists in Sydney
branch.
VLAN d-2 is Vehicle maintenance department in Brisbane branch consisting of twenty
employees working. This department is also located in Brisbane branch, Melbourne branch and
Perth branch respectively.
VLAN d-3 is Site security department in Brisbane branch having fifty employees working. This
department is also located in Brisbane branch, Melbourne branch and Perth branch. Site security
department has the right to access all other departments.
LAN e
LAN-e is designed for Perth Branch. It has three virtual LANs. VLANs are Sales only
department, Vehicle maintenance department and Site security department.
VLAN e-1 is Sales only department in Perth Branch has hundred employees working. This
department is also in Brisbane and Perth branch. Sales only department has right to use simply
the marketing departments existing in Sydney branch.
VLAN e-2 is Vehicle maintenance department in Perth Branch having twenty employees
working. This department is also located in Brisbane branch, Melbourne branch and Perth branch
respectively.
16
VLAN e-3 is Site security department in Perth Branch consisting five employees working. This
department is also located in Brisbane branch, Sydney branch, Melbourne branch and Perth
branch respectively. Site security department has the right to access all other departments.
LAN f
LAN-f is a just started branch that has two virtual LANs. VLANs are hired only department and
Business administration department.
VLAN f-1 is hiring only department with five employees working. This branch only located in
Melbourne branch and it is in startup condition. This department has the right to access sales and
hire department and Marketing department. Both departments are in Sydney branch.
VLAN f-2 is Business administration department with two employees working. This only
located in Sydney branch and it is in startup condition. Business administration department has
right to access only the internet and does not have any rights over other VLANs.
4. Network diagram and implementation
Packet tracer simulation software used to simulate the sample VLAN setup. The software
is Cisco Packet Tracer Student version. Below is the screen short of Packet tracer application
where the simulation in setup. After implementing the configuration on all the device and server
up and running. If any of the devices not configured or interface done it will show the amber
signet in the simulator.
17
department is also located in Brisbane branch, Sydney branch, Melbourne branch and Perth
branch respectively. Site security department has the right to access all other departments.
LAN f
LAN-f is a just started branch that has two virtual LANs. VLANs are hired only department and
Business administration department.
VLAN f-1 is hiring only department with five employees working. This branch only located in
Melbourne branch and it is in startup condition. This department has the right to access sales and
hire department and Marketing department. Both departments are in Sydney branch.
VLAN f-2 is Business administration department with two employees working. This only
located in Sydney branch and it is in startup condition. Business administration department has
right to access only the internet and does not have any rights over other VLANs.
4. Network diagram and implementation
Packet tracer simulation software used to simulate the sample VLAN setup. The software
is Cisco Packet Tracer Student version. Below is the screen short of Packet tracer application
where the simulation in setup. After implementing the configuration on all the device and server
up and running. If any of the devices not configured or interface done it will show the amber
signet in the simulator.
17
5. Configurations
After designing a network, allot the IP address for all the end devices. For allocating IP
address, select IP configuration option. Here allocate IP address in the range of 28.54.10.10 and
set Default gateway as 28.54.10.1
18
After designing a network, allot the IP address for all the end devices. For allocating IP
address, select IP configuration option. Here allocate IP address in the range of 28.54.10.10 and
set Default gateway as 28.54.10.1
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
Now design the router and assign the IP address for the interfaces using the following
commands:
Interface interface-number
Ip address
20
commands:
Interface interface-number
Ip address
20
No shutdown
21
21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22
23
24
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
25
26
27
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
28
29
30
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
31
32
33
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
34
35
ACL Configuration
36
36
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
37
38
39
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
40
41
VLAN configuration
Then construct VLAN in all the switch offered on the network. Constructing VLAN using the
following commands:
1. Vlan 1
2. Interface fa0/1
3. Switchport access vlan 1
4. No shut
42
Then construct VLAN in all the switch offered on the network. Constructing VLAN using the
following commands:
1. Vlan 1
2. Interface fa0/1
3. Switchport access vlan 1
4. No shut
42
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
43
Firewall configuration
The Below screen shot shows the firewall output where the firewall allowed the request through
access control list. The Yellow mark specified show the hit count of the request which allowed
by Cisco ASA firewall.
44
The Below screen shot shows the firewall output where the firewall allowed the request through
access control list. The Yellow mark specified show the hit count of the request which allowed
by Cisco ASA firewall.
44
45
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Ping test
To test the ping connectivity using the command “ping 28.54.10.10”
46
To test the ping connectivity using the command “ping 28.54.10.10”
46
47
48
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ACL configuration
Let us apply the ACL and deny and permit the IP’s as needed. To deny and permit
particular hosts as follows. After that, we need to tell the interface that the ACL to follow.
ACL is uniquely identified with the help of number, in this event 1.
49
Let us apply the ACL and deny and permit the IP’s as needed. To deny and permit
particular hosts as follows. After that, we need to tell the interface that the ACL to follow.
ACL is uniquely identified with the help of number, in this event 1.
49
50
Here, you can realize that the denied IP will not send the files while those who permit can able to
send packet.
Likewise, in the bottommost right place you can see the status.
6. Tables
Table 1 Router Table
Interface/
Sub Interface
Type/Number
Description
and
Purpose
Network/
VLAN Name
Network
Address
Interface
IP
address
Subnet
Mask
/value
Fa0/0 Router 0 U 190 34.16.0.0 255.0.0.0
Fa0/1 Router 1 V 190 34.17.0.0 255.0.0.0
Fa0/2 Router 2 W 190 34.18.0.0 255.0.0.0
Fa0/3 Router 3 X 190 34.19.0.0 255.0.0.0
Fa0/4 Router 4 Y 190 34.20.0.0 255.0.0.0
Fa0/5 Router 5 Z 190 34.21.0.0 255.0.0.0
51
send packet.
Likewise, in the bottommost right place you can see the status.
6. Tables
Table 1 Router Table
Interface/
Sub Interface
Type/Number
Description
and
Purpose
Network/
VLAN Name
Network
Address
Interface
IP
address
Subnet
Mask
/value
Fa0/0 Router 0 U 190 34.16.0.0 255.0.0.0
Fa0/1 Router 1 V 190 34.17.0.0 255.0.0.0
Fa0/2 Router 2 W 190 34.18.0.0 255.0.0.0
Fa0/3 Router 3 X 190 34.19.0.0 255.0.0.0
Fa0/4 Router 4 Y 190 34.20.0.0 255.0.0.0
Fa0/5 Router 5 Z 190 34.21.0.0 255.0.0.0
51
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Table 2 switches
Switch no Assigned to VLAN Port Encapsulation
0 0-1 to 0-2 0-1 to 0-2 802.1q
1 1-1 to 1-4 1-1 to 1-4 802.1q
2 2-1 to 2-3 2-1 to 2-3 802.1q
3 3-1 to 3-3 3-1 to 3-3 802.1q
4 4-1 to 4-3 4-1 to 4-3 802.1q
5 5-1 to 5-2 5-1 to 5-2 802.1q
Name Model SSID Channel
U AC3200 Ultra Wi-Fi Router Ssnu123 2.4
V AC3200 Ultra Wi-Fi Router Ssnv123 5.0
W AC3200 Ultra Wi-Fi Router Ssnw123 5.0
X AC3200 Ultra Wi-Fi Router Ssnx123 2.4
Y AC3200 Ultra Wi-Fi Router Ssny123 2.4
Z AC3200 Ultra Wi-Fi Router Ssnz123 5.0
Table 1 Record of ACL Testing
Source Host Destination
Host/Server
Protocol Expected
Result
Achieved
Yes/No
Host on Hire Only Internet Web Server HTTP Success Yes
Site Security wireless Internet Web Server HTTP Success Yes
Business Administration Internet Web Server HTTP Success Yes
Business Administration File Server FTP Success Yes
52
Switch no Assigned to VLAN Port Encapsulation
0 0-1 to 0-2 0-1 to 0-2 802.1q
1 1-1 to 1-4 1-1 to 1-4 802.1q
2 2-1 to 2-3 2-1 to 2-3 802.1q
3 3-1 to 3-3 3-1 to 3-3 802.1q
4 4-1 to 4-3 4-1 to 4-3 802.1q
5 5-1 to 5-2 5-1 to 5-2 802.1q
Name Model SSID Channel
U AC3200 Ultra Wi-Fi Router Ssnu123 2.4
V AC3200 Ultra Wi-Fi Router Ssnv123 5.0
W AC3200 Ultra Wi-Fi Router Ssnw123 5.0
X AC3200 Ultra Wi-Fi Router Ssnx123 2.4
Y AC3200 Ultra Wi-Fi Router Ssny123 2.4
Z AC3200 Ultra Wi-Fi Router Ssnz123 5.0
Table 1 Record of ACL Testing
Source Host Destination
Host/Server
Protocol Expected
Result
Achieved
Yes/No
Host on Hire Only Internet Web Server HTTP Success Yes
Site Security wireless Internet Web Server HTTP Success Yes
Business Administration Internet Web Server HTTP Success Yes
Business Administration File Server FTP Success Yes
52
7. Equipment used
Router
Networking device is router. Between the computer networks the data packets are delivered.
Presentation of router is guiding internet movement (Zuo, 2010). By means of network, the data
packets are accelerated towards one another. Till it reaches its end point it creates the interwork.
Router has following components, they are given below (Simplot-Ryl & Stojmenovic, 2004)
Console
Flash memory (Anusree S, 2012)
Central Processing Unit ( CPU )
Non - volatile RAM
Network Interfaces
RAM
All types of packet protocols are helped by the LAN switch that works at network layer.
Flow of data and information can be controlled by switch.
For using more than one network mobile net switch can be used. It can switch between
configuration settings without needing restarting. It is high compatibility that may works
on all types of windows
Console
Console performs the Supervision and formation of a router. The commands on
troubleshooting and a segment of questions on the formation can be delivered from console
(Kim, Lee, Kang & Ś lęzak, 2010).
Flash memory
It is a kind of memory device that can be used to store the data and information. It can
perform as hard diskette drive in the computer. Operating system is stored in flash memory.
Flash memory is data storage medium. It can be remakes and deleted when it is running.
It can delete information in components is known as blocks. It can store data from long time.it is
made of floating gate, control gate and transistor. Hear the floating gate performs the storage
process of electrical charges (Erol-Kantarci, Kantarci & Mouftah, 2011). It controls electric
current flow. Flash memory is used in different applications like, mobile phones, personal
computer, digital camera, MP3 player etc. it can store data without any source of power.
53
Router
Networking device is router. Between the computer networks the data packets are delivered.
Presentation of router is guiding internet movement (Zuo, 2010). By means of network, the data
packets are accelerated towards one another. Till it reaches its end point it creates the interwork.
Router has following components, they are given below (Simplot-Ryl & Stojmenovic, 2004)
Console
Flash memory (Anusree S, 2012)
Central Processing Unit ( CPU )
Non - volatile RAM
Network Interfaces
RAM
All types of packet protocols are helped by the LAN switch that works at network layer.
Flow of data and information can be controlled by switch.
For using more than one network mobile net switch can be used. It can switch between
configuration settings without needing restarting. It is high compatibility that may works
on all types of windows
Console
Console performs the Supervision and formation of a router. The commands on
troubleshooting and a segment of questions on the formation can be delivered from console
(Kim, Lee, Kang & Ś lęzak, 2010).
Flash memory
It is a kind of memory device that can be used to store the data and information. It can
perform as hard diskette drive in the computer. Operating system is stored in flash memory.
Flash memory is data storage medium. It can be remakes and deleted when it is running.
It can delete information in components is known as blocks. It can store data from long time.it is
made of floating gate, control gate and transistor. Hear the floating gate performs the storage
process of electrical charges (Erol-Kantarci, Kantarci & Mouftah, 2011). It controls electric
current flow. Flash memory is used in different applications like, mobile phones, personal
computer, digital camera, MP3 player etc. it can store data without any source of power.
53
Flash memory has two types. They neither are NOR flash and NAND flash. High speed
random access is performed by NOR flash. It can be used for storing operating system in cell
phone. Where NAND flash is used in different application like audio and video players,
television set-top box, digital camera etc (Gentile, Griffith & Souryal, 2012).
EEPROM is kind of Flash memory. EEPROM stands for Electronically Erasable
Programmable Read Only Memory (Herbst & Jahn, 2011).
CPU
CPU is the abbreviation for central processing unit. Central Processing Unit is running
operating system to router. CPU provides all the logical networking functions of the router. CPU
is the part of the system in which operations are controlled and executed. It carries instruction of
the computer (Hinganikar, 2012). The CPU performs all mathematical operations ("HP PCs -
Creating a Wired Local Area Network (Windows 7) | HP® Customer Support", 2017). It speeds
up to billions of actions per second.
Non-volatile RAM
Non-volatile RAM is used as additional memory of operating systems starting version.
Non-volatile RAM is used for the storing the backup. Nonvolatile RAM used to define any type
of memory or storage that is protected anyway if the power to the computer is on or off (Kong,
Feng & Zhou, 2011).
Network Interfaces
Lots of interface is used by router ("What is local area network (LAN)? - Definition from
WhatIs.com", 2017). To use the hardware in the interface modules the operating system has a
driver. Network interface can be used to interconnect between computer and a network. It is
generally a Network interface card. It can be executed in software ("LAN Network Connections,
Inc. - Home", 2017). Network interfaces deliver tasks such as passing messages, connecting and
disconnecting, etc (Li, 2014).
RAM
RAM is expanded as Random Access Memory. RAM is a storage for computer. RAM
can be used to stores data and machine code. The operating system is full in the RAM during the
startup. For speeding up the advancing process of the data packets RAM is used for ARP tables,
routing tables and routing metrics ("Network Diagram - Learn What is a Network Diagram and
More", 2017).
54
random access is performed by NOR flash. It can be used for storing operating system in cell
phone. Where NAND flash is used in different application like audio and video players,
television set-top box, digital camera etc (Gentile, Griffith & Souryal, 2012).
EEPROM is kind of Flash memory. EEPROM stands for Electronically Erasable
Programmable Read Only Memory (Herbst & Jahn, 2011).
CPU
CPU is the abbreviation for central processing unit. Central Processing Unit is running
operating system to router. CPU provides all the logical networking functions of the router. CPU
is the part of the system in which operations are controlled and executed. It carries instruction of
the computer (Hinganikar, 2012). The CPU performs all mathematical operations ("HP PCs -
Creating a Wired Local Area Network (Windows 7) | HP® Customer Support", 2017). It speeds
up to billions of actions per second.
Non-volatile RAM
Non-volatile RAM is used as additional memory of operating systems starting version.
Non-volatile RAM is used for the storing the backup. Nonvolatile RAM used to define any type
of memory or storage that is protected anyway if the power to the computer is on or off (Kong,
Feng & Zhou, 2011).
Network Interfaces
Lots of interface is used by router ("What is local area network (LAN)? - Definition from
WhatIs.com", 2017). To use the hardware in the interface modules the operating system has a
driver. Network interface can be used to interconnect between computer and a network. It is
generally a Network interface card. It can be executed in software ("LAN Network Connections,
Inc. - Home", 2017). Network interfaces deliver tasks such as passing messages, connecting and
disconnecting, etc (Li, 2014).
RAM
RAM is expanded as Random Access Memory. RAM is a storage for computer. RAM
can be used to stores data and machine code. The operating system is full in the RAM during the
startup. For speeding up the advancing process of the data packets RAM is used for ARP tables,
routing tables and routing metrics ("Network Diagram - Learn What is a Network Diagram and
More", 2017).
54
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
It is an unstable memory and it needs power to keep the data. Random-access memory is
the one of the important portions of computer. The extra Random access memory does is permit
your computer to do more operation a, not really make it faster. Speed of the random access
memory was expressed in Nano seconds. Data and information can be processed in any manner
like, it can be erasable and we can read it and write. In operating system, the data can be stored
in anywhere that can be taken quickly taken by processor (Liyanage & Gurtov, 2013). Generally,
RAM is look like chips in computer.
Dynamic Host Configuration Protocol (DHCP)
DHCP is extended as Dynamic Host Configuration Protocol. It is an automatic method to
update and allocate IP address. And also additional shape on a network is provided by the
Dynamic Host Configuration Protocol. By transferring number of communication, the data can
be given to Dynamic Host Configuration Protocol client this is also called as DHCP conversation
or DHCP transaction. When DHCP clients and server are in different localities then the DHCP
agents are used. DHCP can be used in all type of the companies. When a device is moved from
one place to another then IP address is given by the DHCP. Further explanation about the DHCP
can be given in below figure ("Different Types of Network Diagrams - Basic Network Design
Topology", 2017).
Allocating of IP address
1. DISCOVER packet is defined as broadcast request is send by the client for observing
response for the server. When the computer is running.
55
the one of the important portions of computer. The extra Random access memory does is permit
your computer to do more operation a, not really make it faster. Speed of the random access
memory was expressed in Nano seconds. Data and information can be processed in any manner
like, it can be erasable and we can read it and write. In operating system, the data can be stored
in anywhere that can be taken quickly taken by processor (Liyanage & Gurtov, 2013). Generally,
RAM is look like chips in computer.
Dynamic Host Configuration Protocol (DHCP)
DHCP is extended as Dynamic Host Configuration Protocol. It is an automatic method to
update and allocate IP address. And also additional shape on a network is provided by the
Dynamic Host Configuration Protocol. By transferring number of communication, the data can
be given to Dynamic Host Configuration Protocol client this is also called as DHCP conversation
or DHCP transaction. When DHCP clients and server are in different localities then the DHCP
agents are used. DHCP can be used in all type of the companies. When a device is moved from
one place to another then IP address is given by the DHCP. Further explanation about the DHCP
can be given in below figure ("Different Types of Network Diagrams - Basic Network Design
Topology", 2017).
Allocating of IP address
1. DISCOVER packet is defined as broadcast request is send by the client for observing
response for the server. When the computer is running.
55
2. The DICOVER packet is directed to the respective Dynamic Host Configuration Protocol
server.
3. The server regulates suitable address to the client. That is based on procedure policy set
on the server. The client keeps the temporary address. And it also sends feedback.
4. To know the purpose of the usage of the address to server, the client sends the
REQUEST.
5. For the authorization, of acknowledge is send.
Benefits of DHCP
Reduced network administration
DHCP offers a centralized and an automated IP configuration. Dynamic Host Configuration
Protocol also offers the full range of additional IP configuration.
Reliable IP address configuration
Manual configuration of IP address causes the configuration error that can be minimized by the
Dynamic Host Configuration Protocol.
SSH Server
SSH is expanded as Secured Socket Shell. It is a network protocol. A secure way to run a
remote computer is provided by administration. It can be used to control the system and
application by remote. That can be allowed to login other device over the network. For execute
commands. To execute file from one device to other as Secured Socket Shell. That can be used
by network administrators. A SSH comprises of both suit of utilities for execution of protocols
and also for cryptographic network protocol. A as Secured Socket Shell has the network server
that is given in given diagram
56
server.
3. The server regulates suitable address to the client. That is based on procedure policy set
on the server. The client keeps the temporary address. And it also sends feedback.
4. To know the purpose of the usage of the address to server, the client sends the
REQUEST.
5. For the authorization, of acknowledge is send.
Benefits of DHCP
Reduced network administration
DHCP offers a centralized and an automated IP configuration. Dynamic Host Configuration
Protocol also offers the full range of additional IP configuration.
Reliable IP address configuration
Manual configuration of IP address causes the configuration error that can be minimized by the
Dynamic Host Configuration Protocol.
SSH Server
SSH is expanded as Secured Socket Shell. It is a network protocol. A secure way to run a
remote computer is provided by administration. It can be used to control the system and
application by remote. That can be allowed to login other device over the network. For execute
commands. To execute file from one device to other as Secured Socket Shell. That can be used
by network administrators. A SSH comprises of both suit of utilities for execution of protocols
and also for cryptographic network protocol. A as Secured Socket Shell has the network server
that is given in given diagram
56
A system is connected to shell by dropping into the shell session. A text based interface do the
interconnection between the servers. By using a client server model implementation of Secured
Socket Shell is performed. The remote machine is established by connecting a Secured Socket
Shell that performs software known as Secured Socket Shell daemon. Authentication request and
Connections o0n is being given by this software.
Encrypted network connection completes the communication between the Secured Socket Shell
server and Secured Socket Shell client is called as Secured Socket Shell tunnels. Network server
offered by a target server for creating a Secured Socket Shell tunnel. SSH client that is organized
the advancing the traffic from the local port to the target server Connection from the clients is
essentially given by Secured Socket Shell server.
NAT
Network Address Translation is the expansion of NAT. Virtualization of the internet
protocol address is known as Network Address Translation. It is important to minimize the
number of IP address which is essential by the organization. In order to increasing the security.
This is located in between two networks. The two networks are the inside and the outside
networks. Though the inside network are allocated with the IP address. External network cannot
be routed the internal networks. Consecutively the external networks are allocated to the
gateway.
Router to perform as an agent between the local network and the internet that can be permitted
by Network Address Translation. That is, for the demonstration of the complete systems simply a
unique IP address is needed it means outside the network. At least one interface on a router is
57
interconnection between the servers. By using a client server model implementation of Secured
Socket Shell is performed. The remote machine is established by connecting a Secured Socket
Shell that performs software known as Secured Socket Shell daemon. Authentication request and
Connections o0n is being given by this software.
Encrypted network connection completes the communication between the Secured Socket Shell
server and Secured Socket Shell client is called as Secured Socket Shell tunnels. Network server
offered by a target server for creating a Secured Socket Shell tunnel. SSH client that is organized
the advancing the traffic from the local port to the target server Connection from the clients is
essentially given by Secured Socket Shell server.
NAT
Network Address Translation is the expansion of NAT. Virtualization of the internet
protocol address is known as Network Address Translation. It is important to minimize the
number of IP address which is essential by the organization. In order to increasing the security.
This is located in between two networks. The two networks are the inside and the outside
networks. Though the inside network are allocated with the IP address. External network cannot
be routed the internal networks. Consecutively the external networks are allocated to the
gateway.
Router to perform as an agent between the local network and the internet that can be permitted
by Network Address Translation. That is, for the demonstration of the complete systems simply a
unique IP address is needed it means outside the network. At least one interface on a router is
57
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
essential in an outside NAT and additional interface on the router is essential in inside NAT for
the conformation purpose.
Firewall
Firewall system is designed for the inhibition of illegal performance in isolated network. It
can be executed in two types. They are hardware and software. Firewall uses definite rules for
controlling the web movement. It performs as block in between the trustworthy and untrusted
web. Types of firewalls are given below,
Stateful firewalls
Proxy firewalls
Application layer firewalls
Packet firewalls
For determination of controlling the traffic, in both traffic flow in and traffic flow out of
the network firewall consume serial policies. When a minor amount of data called packets run
over a filter and they are analyzed packet filtering is complete. Stateful inspection given as the
key parts of the packet are related to a database of trusted information that letting over the
packets that pass this test in its place of where the substances of individual packet are not
observed. It can be organized to filter numerous variables like IP address, port, protocol or even
specific words or phrases and domain name. While operating systems originate with a built-in
firewall, internet routers deliver very cheap firewall protection when the configuration is
completed in suitable process.
ISP
The term ISP is expanded as Internet Service Provider. ISP is defined as the corporation
which offers entities and extra organizations to right of use the web and other web providers like
web page building and other practical hosting. An ISP has the telecommunication line access
then apparatus that are mandatory which has point on the presence through the internet for the
topographical zone that is helped. Higher Internet Service Provider have high-speed rented lines
on their individual so that they may not reliant on more on the telecommunication providers this
leads to deliver a well service to their customers. There are 3 types of Internet Service Provider,
they are given below
Digital Line Subscribers (DLS) offered by phone companies.
broadband offered by cable companies
58
the conformation purpose.
Firewall
Firewall system is designed for the inhibition of illegal performance in isolated network. It
can be executed in two types. They are hardware and software. Firewall uses definite rules for
controlling the web movement. It performs as block in between the trustworthy and untrusted
web. Types of firewalls are given below,
Stateful firewalls
Proxy firewalls
Application layer firewalls
Packet firewalls
For determination of controlling the traffic, in both traffic flow in and traffic flow out of
the network firewall consume serial policies. When a minor amount of data called packets run
over a filter and they are analyzed packet filtering is complete. Stateful inspection given as the
key parts of the packet are related to a database of trusted information that letting over the
packets that pass this test in its place of where the substances of individual packet are not
observed. It can be organized to filter numerous variables like IP address, port, protocol or even
specific words or phrases and domain name. While operating systems originate with a built-in
firewall, internet routers deliver very cheap firewall protection when the configuration is
completed in suitable process.
ISP
The term ISP is expanded as Internet Service Provider. ISP is defined as the corporation
which offers entities and extra organizations to right of use the web and other web providers like
web page building and other practical hosting. An ISP has the telecommunication line access
then apparatus that are mandatory which has point on the presence through the internet for the
topographical zone that is helped. Higher Internet Service Provider have high-speed rented lines
on their individual so that they may not reliant on more on the telecommunication providers this
leads to deliver a well service to their customers. There are 3 types of Internet Service Provider,
they are given below
Digital Line Subscribers (DLS) offered by phone companies.
broadband offered by cable companies
58
Dial up services
For accessing internet business and separate customers pay Internet Service Provider.
Internet Service Provider is inter related to one another at network accessing point. Also, Internet
Service Provider pays extra, high Internet Service Provider for their internet access and in order
Internet Service Provider pays still other Internet Service Provider. Until the transmission
reaches a Tier 1 carrier this contracts many times. Without paying settlements or acquiring IP
transit Tier 1 carrier is an Internet Service Provider accomplished of reaching all network on the
Internet.
LAN
LAN is expansion of Local Area Network. LAN is defined as collection of device which
can be used to share data and information from one to another. LAN covers small area of
networks. That can be linked to a server inside different physical area such as a commercial
creation or an office or inside an institution. Using local area network that may use to share
resources like printer, computer network storage and other mobile devices.
A local area network can in the form of wired connection or wireless connection.
Sometimes it may be in two. Wired connection is made by Ethernet for connecting devices. In
other hand wireless local area network can by connecting the device through Wi-Fi signals. If the
router supports both Wi-Fi connections and Ethernet together, that can be used to make a both
wired and wireless device in Local Area Network.
To develop network in the residential Local Area Network and to achieve all connected systems
a router is used. Router is also connected to the DSL modem that gives right to use to link
devices. It is the central assembly point and it allows devices, like computers, smartphones and
tablets to interconnect one another (Marron, 2010).
VLAN
Virtual Private Network is defined as a logical group of servers, network devices and
workplaces that seem to continue on the identical LAN in spite of their different geographical
location. Additional exactly, Virtual LAN id to define ports, interfaces, direct a transmission
packet. Network devices like bridges, workstations, switches, hubs, and servers connected to
individually extra in the similar network at a definite location are usually known as LANs. A
LAN is also defined as a broadcast domain. A Virtual LAN permits numerous networks to work
59
For accessing internet business and separate customers pay Internet Service Provider.
Internet Service Provider is inter related to one another at network accessing point. Also, Internet
Service Provider pays extra, high Internet Service Provider for their internet access and in order
Internet Service Provider pays still other Internet Service Provider. Until the transmission
reaches a Tier 1 carrier this contracts many times. Without paying settlements or acquiring IP
transit Tier 1 carrier is an Internet Service Provider accomplished of reaching all network on the
Internet.
LAN
LAN is expansion of Local Area Network. LAN is defined as collection of device which
can be used to share data and information from one to another. LAN covers small area of
networks. That can be linked to a server inside different physical area such as a commercial
creation or an office or inside an institution. Using local area network that may use to share
resources like printer, computer network storage and other mobile devices.
A local area network can in the form of wired connection or wireless connection.
Sometimes it may be in two. Wired connection is made by Ethernet for connecting devices. In
other hand wireless local area network can by connecting the device through Wi-Fi signals. If the
router supports both Wi-Fi connections and Ethernet together, that can be used to make a both
wired and wireless device in Local Area Network.
To develop network in the residential Local Area Network and to achieve all connected systems
a router is used. Router is also connected to the DSL modem that gives right to use to link
devices. It is the central assembly point and it allows devices, like computers, smartphones and
tablets to interconnect one another (Marron, 2010).
VLAN
Virtual Private Network is defined as a logical group of servers, network devices and
workplaces that seem to continue on the identical LAN in spite of their different geographical
location. Additional exactly, Virtual LAN id to define ports, interfaces, direct a transmission
packet. Network devices like bridges, workstations, switches, hubs, and servers connected to
individually extra in the similar network at a definite location are usually known as LANs. A
LAN is also defined as a broadcast domain. A Virtual LAN permits numerous networks to work
59
virtually as one LAN. To raise the presentation of a network or for applying appropriate security
structures VLAN is implemented (Gaura, 2010).
The benefits of VLAN implementation are given below
For formation of moving and development of a network device or a network easier.
It decreases the traffic load and protential and on the network devices and the network
and suggestions an improved performance.
Permitting network administrators for put on an extra security to the network
communication.
Switch
The high-speed device that obtains external data packets and then sends data packets to their
destination on a local area network is called as Switch (Hu & Cao, 2010). All types of packet
protocols are helped by the LAN switch that works at network layer. Flow of data and
information can be controlled by switch. For using more than one network mobile net switch can
be used. It can switch between configuration settings without needing restarting. It is high
compatibility that may works on all types of windows
NPS
NSP is the expansion of Network Policy Server. It is implemented by Microsoft. It performance
as the heir of IAS.
Access List configuration
60
structures VLAN is implemented (Gaura, 2010).
The benefits of VLAN implementation are given below
For formation of moving and development of a network device or a network easier.
It decreases the traffic load and protential and on the network devices and the network
and suggestions an improved performance.
Permitting network administrators for put on an extra security to the network
communication.
Switch
The high-speed device that obtains external data packets and then sends data packets to their
destination on a local area network is called as Switch (Hu & Cao, 2010). All types of packet
protocols are helped by the LAN switch that works at network layer. Flow of data and
information can be controlled by switch. For using more than one network mobile net switch can
be used. It can switch between configuration settings without needing restarting. It is high
compatibility that may works on all types of windows
NPS
NSP is the expansion of Network Policy Server. It is implemented by Microsoft. It performance
as the heir of IAS.
Access List configuration
60
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8. Conclusions
The two networks such as LAN and WAN connection are designed for each branch and for
connecting whole network of SSM Company. All the departments of all the branches in the
company are designed by the VLAN network. For the security of all the network devices a
security device called Firewall is been used. The network design is completed by using many
devices with the security. ISP, DHCP, Router, SSH server, NAT server and switch, etc. are used
for the network configuration of the company.
References
Akyildiz, I. (2011). Wireless sensor networks. Chichester [u.a.]: Wiley.
Anusree S, A. (2012). Architectures of Fault-Tolerant Network Interfaces and Router For
Network-On-Chip. International Journal Of Scientific Research, 3(5), 190-194.
http://dx.doi.org/10.15373/22778179/may2014/58
Berre, A. (2010). Future internet - FIS 2010. Berlin: Springer.
Cui, X. (2012). Research on Enterprise Network Router Security Strategy. Advanced Materials
Research, 433-440, 1783-1786. http://dx.doi.org/10.4028/www.scientific.net/amr.433-
440.1783
Domingue, J. (2011). The future internet. Berlin: Springer.
61
The two networks such as LAN and WAN connection are designed for each branch and for
connecting whole network of SSM Company. All the departments of all the branches in the
company are designed by the VLAN network. For the security of all the network devices a
security device called Firewall is been used. The network design is completed by using many
devices with the security. ISP, DHCP, Router, SSH server, NAT server and switch, etc. are used
for the network configuration of the company.
References
Akyildiz, I. (2011). Wireless sensor networks. Chichester [u.a.]: Wiley.
Anusree S, A. (2012). Architectures of Fault-Tolerant Network Interfaces and Router For
Network-On-Chip. International Journal Of Scientific Research, 3(5), 190-194.
http://dx.doi.org/10.15373/22778179/may2014/58
Berre, A. (2010). Future internet - FIS 2010. Berlin: Springer.
Cui, X. (2012). Research on Enterprise Network Router Security Strategy. Advanced Materials
Research, 433-440, 1783-1786. http://dx.doi.org/10.4028/www.scientific.net/amr.433-
440.1783
Domingue, J. (2011). The future internet. Berlin: Springer.
61
Erol-Kantarci, M., Kantarci, B., & Mouftah, H. (2011). Reliable overlay topology design for the
smart microgrid network. IEEE Network, 25(5), 38-43.
http://dx.doi.org/10.1109/mnet.2011.6033034
Galis, A., & Gavras, A. (2013). The Future Internet. Berlin, Heidelberg: Springer.
Gaura, E. (2010). Wireless sensor networks. New York: Springer.
Gentile, C., Griffith, D., & Souryal, M. (2012). Wireless network deployment in the smart grid:
Design and evaluation issues. IEEE Network, 26(6), 48-53.
http://dx.doi.org/10.1109/mnet.2012.6375893
hanfi ,, R., & rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering
And Computer Science. http://dx.doi.org/10.18535/ijecs/v5i1.16
Herbst, P., & Jahn, E. (2011). IP-for-IP or Cash-for-IP? R&D Competition and the Market for
Technology. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.1010622
Hinganikar, A. (2012). Performance Evaluation of CDMA Router for Network-On-
Chip. International Journal Of VLSI Design & Communication Systems, 3(3), 71-81.
http://dx.doi.org/10.5121/vlsic.2012.3307
HP PCs - Creating a Wired Local Area Network (Windows 7) | HP® Customer Support.
(2017). Support.hp.com. Retrieved 10 October 2017, from
https://support.hp.com/in-en/document/c01894721
Hu, F., & Cao, X. (2010). Wireless sensor networks. Boca Raton, FL: CRC Press.
Iyengar, S. (2011). Fundamentals of sensor network programming. Hoboken N.J.: Wiley-IEEE.
Kim, T., Lee, Y., Kang, B., & Ś lęzak, D. (2010). Future Generation Information Technology.
Berlin, Heidelberg: Springer Berlin Heidelberg.
Kong, R., Feng, J., & Zhou, H. (2011). Route Optimization for Network Mobility Based
Aeronautical Network Using Correspondent Router. International Journal Of
Communications, Network And System Sciences, 04(10), 667-673.
http://dx.doi.org/10.4236/ijcns.2011.410082
LAN Network Connections, Inc. - Home. (2017). Lannetwork.com. Retrieved 10 October 2017,
from http://www.lannetwork.com/
62
smart microgrid network. IEEE Network, 25(5), 38-43.
http://dx.doi.org/10.1109/mnet.2011.6033034
Galis, A., & Gavras, A. (2013). The Future Internet. Berlin, Heidelberg: Springer.
Gaura, E. (2010). Wireless sensor networks. New York: Springer.
Gentile, C., Griffith, D., & Souryal, M. (2012). Wireless network deployment in the smart grid:
Design and evaluation issues. IEEE Network, 26(6), 48-53.
http://dx.doi.org/10.1109/mnet.2012.6375893
hanfi ,, R., & rai, Y. (2016). Wireless Sensor Network. International Journal Of Engineering
And Computer Science. http://dx.doi.org/10.18535/ijecs/v5i1.16
Herbst, P., & Jahn, E. (2011). IP-for-IP or Cash-for-IP? R&D Competition and the Market for
Technology. SSRN Electronic Journal. http://dx.doi.org/10.2139/ssrn.1010622
Hinganikar, A. (2012). Performance Evaluation of CDMA Router for Network-On-
Chip. International Journal Of VLSI Design & Communication Systems, 3(3), 71-81.
http://dx.doi.org/10.5121/vlsic.2012.3307
HP PCs - Creating a Wired Local Area Network (Windows 7) | HP® Customer Support.
(2017). Support.hp.com. Retrieved 10 October 2017, from
https://support.hp.com/in-en/document/c01894721
Hu, F., & Cao, X. (2010). Wireless sensor networks. Boca Raton, FL: CRC Press.
Iyengar, S. (2011). Fundamentals of sensor network programming. Hoboken N.J.: Wiley-IEEE.
Kim, T., Lee, Y., Kang, B., & Ś lęzak, D. (2010). Future Generation Information Technology.
Berlin, Heidelberg: Springer Berlin Heidelberg.
Kong, R., Feng, J., & Zhou, H. (2011). Route Optimization for Network Mobility Based
Aeronautical Network Using Correspondent Router. International Journal Of
Communications, Network And System Sciences, 04(10), 667-673.
http://dx.doi.org/10.4236/ijcns.2011.410082
LAN Network Connections, Inc. - Home. (2017). Lannetwork.com. Retrieved 10 October 2017,
from http://www.lannetwork.com/
62
Li, L. (2014). A Web-based Virtual Reality Simulation of Mounting Machine. Journal Of
Multimedia, 9(2). http://dx.doi.org/10.4304/jmm.9.2.318-324
Li, L. (2014). A Web-based Virtual Reality Simulation of Mounting Machine. Journal Of
Multimedia, 9(2). http://dx.doi.org/10.4304/jmm.9.2.318-324
Liyanage, M., & Gurtov, A. (2013). Securing virtual private LAN service by efficient key
management. Security And Communication Networks, 7(1), 1-13.
http://dx.doi.org/10.1002/sec.701
Marron, P. (2010). Real-world wireless sensor networks. Berlin: Springer.
Mirzaei, M., Merienne, F., & Oliver, J. (2014). New wireless connection between user and VE
using speech processing. Virtual Reality, 18(4), 235-243. http://dx.doi.org/10.1007/s10055-
014-0248-y
Mirzaei, M., Merienne, F., Oliver, J., & Chardonnet, J. (2015). Erratum to: New wireless
connection between user and VE using speech processing. Virtual Reality, 19(2), 145-145.
http://dx.doi.org/10.1007/s10055-015-0262-8
NAKAMURA, R., & OHSAKI, H. (2017). Performance Analysis of Content-Centric
Networking on an Arbitrary Network Topology. IEICE Transactions On Communications.
http://dx.doi.org/10.1587/transcom.2017itp0004
Natarajan, S., Bordas, S., & Ooi, E. (2015). Virtual and smoothed finite elements: A connection
and its application to polygonal/polyhedral finite element methods. International Journal
For Numerical Methods In Engineering, 104(13), 1173-1199.
http://dx.doi.org/10.1002/nme.4965
Network Diagram - Learn What is a Network Diagram and More. (2017). Smartdraw.com.
Retrieved 10 October 2017, from https://www.smartdraw.com/network-diagram/
Patil, S., & Chaudhari, B. (2011). Passive Micro-resonator based GMPLS Router for Optical
Network-on-Chip. Network Protocols And Algorithms, 3(2).
http://dx.doi.org/10.5296/npa.v3i2.704
63
Multimedia, 9(2). http://dx.doi.org/10.4304/jmm.9.2.318-324
Li, L. (2014). A Web-based Virtual Reality Simulation of Mounting Machine. Journal Of
Multimedia, 9(2). http://dx.doi.org/10.4304/jmm.9.2.318-324
Liyanage, M., & Gurtov, A. (2013). Securing virtual private LAN service by efficient key
management. Security And Communication Networks, 7(1), 1-13.
http://dx.doi.org/10.1002/sec.701
Marron, P. (2010). Real-world wireless sensor networks. Berlin: Springer.
Mirzaei, M., Merienne, F., & Oliver, J. (2014). New wireless connection between user and VE
using speech processing. Virtual Reality, 18(4), 235-243. http://dx.doi.org/10.1007/s10055-
014-0248-y
Mirzaei, M., Merienne, F., Oliver, J., & Chardonnet, J. (2015). Erratum to: New wireless
connection between user and VE using speech processing. Virtual Reality, 19(2), 145-145.
http://dx.doi.org/10.1007/s10055-015-0262-8
NAKAMURA, R., & OHSAKI, H. (2017). Performance Analysis of Content-Centric
Networking on an Arbitrary Network Topology. IEICE Transactions On Communications.
http://dx.doi.org/10.1587/transcom.2017itp0004
Natarajan, S., Bordas, S., & Ooi, E. (2015). Virtual and smoothed finite elements: A connection
and its application to polygonal/polyhedral finite element methods. International Journal
For Numerical Methods In Engineering, 104(13), 1173-1199.
http://dx.doi.org/10.1002/nme.4965
Network Diagram - Learn What is a Network Diagram and More. (2017). Smartdraw.com.
Retrieved 10 October 2017, from https://www.smartdraw.com/network-diagram/
Patil, S., & Chaudhari, B. (2011). Passive Micro-resonator based GMPLS Router for Optical
Network-on-Chip. Network Protocols And Algorithms, 3(2).
http://dx.doi.org/10.5296/npa.v3i2.704
63
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Reich, S., Black, R., & Korobkova, K. (2014). CONNECTIONS AND COMMUNITIES IN
VIRTUAL WORLDS DESIGNED FOR CHILDREN. Journal Of Community
Psychology, 42(3), 255-267. http://dx.doi.org/10.1002/jcop.21608
Routing Protocols for Wireless Sensor Networks. (2016). International Journal Of Science And
Research (IJSR), 5(1), 1069-1073. http://dx.doi.org/10.21275/v5i1.nov152983
Sá Silva, J., Krishnamachari, B., & Boavida, F. (2010). Wireless sensor networks. New York
[etc.]: Springer.
Seo, Y., & Schmidt, A. (2013). Network configuration and hydrograph sensitivity to storm
kinematics. Water Resources Research, 49(4), 1812-1827.
http://dx.doi.org/10.1002/wrcr.20115
Simplot-Ryl, D., & Stojmenovic, I. (2004). Guest editorial - Ad hoc networking: data
communications and topology control. IEEE Network, 18(4), 4-5.
http://dx.doi.org/10.1109/mnet.2004.1316753
Vinothkumar, M., & Senthil Kumar, M. (2014). Design and Implementation of Router
Arbitration in Network on Chip. SSRN Electronic Journal.
http://dx.doi.org/10.2139/ssrn.2407796
What is local area network (LAN)? - Definition from WhatIs.com. (2017). SearchNetworking.
Retrieved 10 October 2017, from http://searchnetworking.techtarget.com/definition/local-
area-network-LAN
What is network disaster recovery plan? - Definition from WhatIs.com.
(2017). SearchDisasterRecovery. Retrieved 10 October 2017, from
http://searchdisasterrecovery.techtarget.com/definition/Network-disaster-recovery-plan
Younes, O. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal Of Computer
And Communications, 04(01), 39-50. http://dx.doi.org/10.4236/jcc.2016.41005
Zhen, Z., & Sampalli, S. (2017). Mobile IP Address Efficiency. Journal Of Communications
Software And Systems, 2(1), 30. http://dx.doi.org/10.24138/jcomss.v2i1.303
Zheng, X., Gu, H., Yang, Y., & Huang, Z. (2014). Pre-allocated Path Based Low Latency Router
Architecture for Network-on-chip. Journal Of Electronics & Information Technology, 35(2),
341-346. http://dx.doi.org/10.3724/sp.j.1146.2012.00654
64
VIRTUAL WORLDS DESIGNED FOR CHILDREN. Journal Of Community
Psychology, 42(3), 255-267. http://dx.doi.org/10.1002/jcop.21608
Routing Protocols for Wireless Sensor Networks. (2016). International Journal Of Science And
Research (IJSR), 5(1), 1069-1073. http://dx.doi.org/10.21275/v5i1.nov152983
Sá Silva, J., Krishnamachari, B., & Boavida, F. (2010). Wireless sensor networks. New York
[etc.]: Springer.
Seo, Y., & Schmidt, A. (2013). Network configuration and hydrograph sensitivity to storm
kinematics. Water Resources Research, 49(4), 1812-1827.
http://dx.doi.org/10.1002/wrcr.20115
Simplot-Ryl, D., & Stojmenovic, I. (2004). Guest editorial - Ad hoc networking: data
communications and topology control. IEEE Network, 18(4), 4-5.
http://dx.doi.org/10.1109/mnet.2004.1316753
Vinothkumar, M., & Senthil Kumar, M. (2014). Design and Implementation of Router
Arbitration in Network on Chip. SSRN Electronic Journal.
http://dx.doi.org/10.2139/ssrn.2407796
What is local area network (LAN)? - Definition from WhatIs.com. (2017). SearchNetworking.
Retrieved 10 October 2017, from http://searchnetworking.techtarget.com/definition/local-
area-network-LAN
What is network disaster recovery plan? - Definition from WhatIs.com.
(2017). SearchDisasterRecovery. Retrieved 10 October 2017, from
http://searchdisasterrecovery.techtarget.com/definition/Network-disaster-recovery-plan
Younes, O. (2016). A Secure DHCP Protocol to Mitigate LAN Attacks. Journal Of Computer
And Communications, 04(01), 39-50. http://dx.doi.org/10.4236/jcc.2016.41005
Zhen, Z., & Sampalli, S. (2017). Mobile IP Address Efficiency. Journal Of Communications
Software And Systems, 2(1), 30. http://dx.doi.org/10.24138/jcomss.v2i1.303
Zheng, X., Gu, H., Yang, Y., & Huang, Z. (2014). Pre-allocated Path Based Low Latency Router
Architecture for Network-on-chip. Journal Of Electronics & Information Technology, 35(2),
341-346. http://dx.doi.org/10.3724/sp.j.1146.2012.00654
64
Zseby, T., Savola, R., & Pistore, M. (2010). Future internet-- FIS 2009. Berlin: Springer.
Different Types of Network Diagrams - Basic Network Design Topology.
(2017). Smartdraw.com. Retrieved 10 October 2017, from
https://www.smartdraw.com/network-diagram/network-diagram-topology-types.htm
Zuo, D. (2010). Frontier in functional manufacturing technologies. Stafa-Zurich, Switzerland:
Trans Tech Publications.
65
Different Types of Network Diagrams - Basic Network Design Topology.
(2017). Smartdraw.com. Retrieved 10 October 2017, from
https://www.smartdraw.com/network-diagram/network-diagram-topology-types.htm
Zuo, D. (2010). Frontier in functional manufacturing technologies. Stafa-Zurich, Switzerland:
Trans Tech Publications.
65
1 out of 66
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.