ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Network Design with Enhanced Security

Verified

Added on  2023/03/31

|21
|2437
|494
AI Summary
This document discusses the need for a new network design with enhanced security for a small organization. It explores the use of Cisco devices, firewall, IDS, and IPS for network security. The document also covers IP address settings and network verification using Cisco Packet Tracer.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
NETWORKING

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Executive Summary
One small organization with 100 users got a out dated network infrastructure. New network
design with many security features are proposed. Cisco pocket tracer is used for designing and
testing the new network design. Proper IP design is done and applied. Secured network devices
are selected for the design. Firewall is used for better security. The application of IPS and IDS
are discussed. Network connections are verified using PING tests between network devices.
1
Document Page
Contents
1. Introduction.......................................................................................................................................2
2. Requirements.....................................................................................................................................3
3. Solution Design..................................................................................................................................4
4. Analysis and Evaluation..................................................................................................................14
5. Conclusion........................................................................................................................................15
2
Document Page
1. Introduction
A typical service oriented company is selected for the analysis. The present network got
lot of disadvantages. The network is not secured. It doesn’t have any security measures to protect
data. The company with the 100+ users, 3 branches and supported with 2 routers and one
firewalls. A new well secured network design will be done. Network design is the important part
of technical activity. The network with the three layered viewpoint is excellent. The number of
department and other information are the same for the new design. The network design will be
done using Cisco packet tracer. The design is tested by Cisco packet tracer. IP address settings is
proceeded. The network design is will be verified.
In the requirement, it also explains the need of thinking wireless network. The
network design is explained in this process. In the implementation process, it explains about the
major role of the wireless network. The advantages of using this simulator will be investigated.
2. Requirements
The requirements are given below.
1. Network Design needs to be done.
2. Security needs to be improved in the network design.
3. Network design should be simulated using suitable simulation software.
4. Network design needs to be tested.
5. IDS and IPS needs to be discussed.
6. Firewall should be included in the design.
3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network design:
The network design is executed by the administrators, engineers, and other network staff.
The network design is used in technical works (Beasley., 2008). It is a key for the success of
business in computer network designing. 24 hours networking is provided for the people. The
speed of the network is considered as most important. (Hallberg, 2013).
The network is nothing but computers. It is used for sending data and information.
They are classified into 7 types.
LAN, WAN, PAN, WLAN, CAN, MAN and SAN
Metropolitan area networks (MANs).
Storage area networks (SANs).
Wide area networks (WANs).
Personal area networks (PANs).
Wireless local area networks (WLANs).
Local area networks (LANs).
Campus area networks (CANs).
Most of the people are using LANs. They are used in schools, offices, and homes.
Networking is good for sharing internet access and files and databases. As you may have been
read in books and movies they used for network designing. The firewalls can be used to filter
unwanted network traffic. Virtual private networks are used to connect remote controlled
security. The VPNs is used for strong data encryption to hide data moving the router.
Networking in very easy to learn which can be learned in a month. The network is a two
or more computer systems linked together. Most important that is often used are network design
and technical work. The good network is necessary for the network verification. The description
of the test plan website is said to be accepted. The plan will be created by the project. The
network designs are modified easily for business improvement. It recognizes goals for the
4
Document Page
business and technical requirements. The web server of DNS is improved and it changes the
major applications. The network design will be improved and represents the routing process and
performs addressing in design.
The network design is important to use based on the router and switch, servers. Network
security is based on the overall process and IP addressing is seated. Traffic is controlled by using
the wireless connection. Switch, router and servers and a computer are wireless network.
Antenna, remote are considered as a wireless connection. It also uses the internet connectivity in
a wireless connection. Many connections to connect the same time in to connect the access point
without wire. The network uses people have used the cable connection .wireless connections are
used in radio waves to connect.
Wireless networks are not connected by cables. The use of a wireless network enables
to use of radio waves and make phone calls from many locations worldwide.
There are three major of wireless:
1. Wireless clients or wireless station.
2. Access points
3. Ad-Hoc node.
It is used to connect distant buildings or areas. The long-distance connection is said to be
point-to-point.
The wireless communication system has been a necessary part of various types of
wireless communication devices. The licenses of the user to communicate from telnet operated
areas. They are many devices is used for wireless network communication. It is also used for
cordless telephones, Zigbee wireless technology, Global Positioning System, Wi-Fi, satellite
television, and wireless computer parts. This current technology used for 3G and 4G networks,
Bluetooth and Wi-Fi technologies. Ethical implementation is enforced by the computer which is
used for computing devices The computer ethics plays a major role which used It also
approaches the other devices. Ethical implication is important in WLAN. Wireless area network
is used in educational institutions, business and etc.it is mostly used in corporate environment.
5
Document Page
Wireless security does not control the communication medium. High scoring company’s mostly
use wireless network.
The wireless connection range is 80 to the 200.without wireless router can manage the
network. The additional computers can also connect the without wire connection. But the outside
attack is not safe in this wireless connection. Wired connection is very costly but the wireless
connection is not very much cost (Lammle, 2011).
Switch:
The switch is a hardware.it is the element of networking.it is used to connecting computer
and other devices. Other devices are connected by using Ethernet cables. Routers and adapter do
not communicate with each other devices without switches. The switch is sent to information
straightly for other devices. Switch configuration is very simple. Very easy to send the incoming
message with the help of a local area network.it is forwards the network for other devices.
Switch contains a multiport. Network performance is increased. The workload is decreased. The
switch connects the workstations directly (Lammle and Tedder, 2011). Ethernet switch link
Ethernet devices together. Ethernet is the main form of a network switch. The computer network
is a network switch. Open system interconnect model creates a data link layer separate collision
domain for each switch port.
Switch Advantages and Disadvantages:
Advantages of switch:
It is an electronic tool.it manually operated.
The switch utilizes the data link layer.
It accessible in a different configuration.
It data speed as 10/100 Gaps.
It working in full duplex mode.
It avoids the accident, the data transmission is to be port to port.
6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Disadvantages:
The switch is very expensive.
Transmit traffic concerning.
If switches are in fast mode the security will attacks.
Correct design and arrangements are needed in order to grasp multicast packets
Limiting transmit, not well to routers.
Router:
The router is a network device.it is hardware. Multiple networks are connected by using a
router. Main work of the router is given the information .it transfer the information from the one
computer to another computer (Lorenz and Dini, 2005). The router is secure.it well performed.
The router contains a more capability.it is used for network design. The wireless router gives Wi-
Fi. Wi-Fi is used for smartphones, laptop and etc. The router is another type of router. A virtual
router is another type of router. Many types of the router are used.it is used for virtual router
redundancy protocol. Router activates only about a thousand meters.
Two or more connections of different networks are connected with the router. Router
choose the shortest path between a computers. The pc sends the information to the router is
going to the default gateway to send the router. The default gateway is can send the information
from the computer to router. RAM, NVRAM, flash memory is two or more networks interfaces.
The core connects the large organization networks. LAN will is supported to the router. A
wireless router is another advanced. The router is two types.one is wired and another one is a
wireless router. Router main purpose is routing the device.it is also two types.one is static and
another one is dynamic. Static is a fixed way to given but dynamic way is the shortest path will
reach.
A router is most important in the network. The large distance computer can communicate
easily. Router is one only work with the routing protocol. The wireless router is very expensive
7
Document Page
to compare wired router. A wireless router is also the slowest router is compared wired router
wireless connection is not secure.
Wireless technology is also used in the future network. Wi-Fi connection is also called
wireless connection. Cable can connect the computers is called a wired connection.
Cisco packet tracer:
The network designs will create the Cisco packet tracer. Routers and switches will be
configured to use this packet tracer. The network device is added and removes the packet tracer
is allowed. This is based on the education tool is certified the network associate. The download
will be free for these tools. Most of the uses of Linux and Microsoft Windows in packet tracer. It
is also represented by cable in physical connection. It is supported by the layer protocols. Multi-
user system to supports this protocol. It is a small number of features will be used in these
applications.
This is not suitable for a modeling production network. The knowledge will be improved
the packet tracer is used. The assignments will be finished the students to use these applications.
The packet tracer will teach the user that application in it. Real-time knowledge will be getting.
The assignments will finish their student. The most visual is very clear. Network configuration is
used to network devices. Available for all the network devices.
This is mainly related to routing, switching, and networking. It is used to drag the visual.
Lab training also included the Cisco packet tracer. The modes of the operating system are two
types. Simulation is the first mode. Another one is the real-time mode (Stewart, 2009).
3. Solution Design
Typical network design is shown below. Two routers with one ASA firewall is used. Access
points will give wireless networking. Switch will give wired networking. IDS and IPS are used
for network security.
8
Document Page
Cisco Packet Tracer file is attached.
IP Address
IP Address details as shown below.
9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
For System 1, the IP address are set.
10
Document Page
For system 2, IP address are set.
11
Document Page
For system 3, IP address are set.
12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
For system 4, IP address are set.
For system 5, IP address are set.
13
Document Page
Pc1 is self-pinging.
Syatem2 is pinged.
14
Document Page
System 3 is pinged.
System 4 is pinged.
15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
System 5 is pinging with system 1.
System 1 is pinged with Router.
16
Document Page
System 1 is pinged up with Router.
System 1 is pinged up with Router1.
17
Document Page
System 1 is pinged with Router1.
4. Analysis and Evaluation
The requirements is a new network design with enhanced security. Network design is done using
cisco devices. Firewall is used to give security. DNS is used. DHCP is used for auto IP
assigning. Encryption can be used for sending the data securely. IDS and IPS can be used for
more secured environment. Web server can be used for offering web services. Certificates can be
used for offering secured web services. For centralized authentication Active directory services
should be used. Windows server 2012 R2 should introduced for offering ADS, DNS, DHCP,
WEB server roles.
IDS (Intrusion detection system)
An IDS is a device that shows a network or systems for malicious activity or policy violations. A
spiteful activity typically reported to an organizer or collected centrally using a SIEM system. It
ranges from the one single computer to the huge networks.
Different Capabilities of intrusion detection system:
18

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
It shows the network traffic in order to remove unwanted entities. It was done by the fiving some
or all of these functions to security professionals:
1. Identifying and reporting when the IDS removes that data files have been altered
2. Producing an alarm and notifying that security that has been delivered.
3. Reacting this by blocking the server.
Benefits of Intrusion Detection Systems
IDS offer the organization a huge number of benefits, introducing with the ability to identify
security incidents. It helps for the analyzation of the quality and types of attacks, an organization
can use this information to give the more effective controls.
IPS (Intrusion Prevention System)
An Intrusion Prevention System is a system that shows a network for spiteful activities such as
security threats or policy violations. Its main activity is to identify the undefined activity and
then enter information, it makes them try to block the activity, and it finally reports. This is also
called an Intrusion detection prevention system (IDPS).
It can either implemented as a hardware device and the software. But theoretically, it is based on
a simple rule of cleaning traffic. These are the extension of intrusion detection systems. Its main
activity is to actively block or prevents intrusions that are detected. For example, an IPS can drop
spiteful activity, blocking the traffic a defending IP address, etc.
Intrusion prevention system work by scanning all network traffic. IPS designed to prevent a
number of different threats which includes:
1. DOS attack
2. Worms
19
Document Page
3. Virus
IPS performs real-time packet inspection, deeply identifying every packet that travels across the
network.
5. Conclusion
Wired and Wireless local area network designs are done. The ethical involvement is
verified. The implication of mobile devices is also specified. Telecommunication networks and
business installations avoid the costly process of introducing cables and wireless networks. The
wireless network design is verified. The network design is done using Cisco packet tracer. The
three-layered outlook in network design is done. Cisco packet tracer is a transportable
application. It is very easy. Subscriber Identity Module mode is used for network simulation.
6. References
Beasley. (2008). Networking. Pearson India.
Hallberg, B. (2013). Networking. New York: McGraw-Hill Publishing.
Lammle, T. (2011). CCNA. Hoboken, N.J: Wiley.
Lammle, T. and Tedder, W. (2011). CCNA certification kit. [Hoboken, N.J.]: Sybex/Wiley.
Lorenz, P. and Dini, P. (2005). Networking -- ICN 2005: 4th International Conference on
Networking, Reunion Island, France, April 17-21, 2005, Proceedings, Part I. Berlin: Springer.
Stewart, E. (2009). CCNA security exam cram. [Indianapolis, Ind.?]: Que Certification.
20
1 out of 21
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]