logo

Network Design with Enhanced Security

   

Added on  2023-03-31

21 Pages2437 Words494 Views
NETWORKING
Network Design with Enhanced Security_1
Executive Summary
One small organization with 100 users got a out dated network infrastructure. New network
design with many security features are proposed. Cisco pocket tracer is used for designing and
testing the new network design. Proper IP design is done and applied. Secured network devices
are selected for the design. Firewall is used for better security. The application of IPS and IDS
are discussed. Network connections are verified using PING tests between network devices.
1
Network Design with Enhanced Security_2
Contents
1. Introduction.......................................................................................................................................2
2. Requirements.....................................................................................................................................3
3. Solution Design..................................................................................................................................4
4. Analysis and Evaluation..................................................................................................................14
5. Conclusion........................................................................................................................................15
2
Network Design with Enhanced Security_3
1. Introduction
A typical service oriented company is selected for the analysis. The present network got
lot of disadvantages. The network is not secured. It doesn’t have any security measures to protect
data. The company with the 100+ users, 3 branches and supported with 2 routers and one
firewalls. A new well secured network design will be done. Network design is the important part
of technical activity. The network with the three layered viewpoint is excellent. The number of
department and other information are the same for the new design. The network design will be
done using Cisco packet tracer. The design is tested by Cisco packet tracer. IP address settings is
proceeded. The network design is will be verified.
In the requirement, it also explains the need of thinking wireless network. The
network design is explained in this process. In the implementation process, it explains about the
major role of the wireless network. The advantages of using this simulator will be investigated.
2. Requirements
The requirements are given below.
1. Network Design needs to be done.
2. Security needs to be improved in the network design.
3. Network design should be simulated using suitable simulation software.
4. Network design needs to be tested.
5. IDS and IPS needs to be discussed.
6. Firewall should be included in the design.
3
Network Design with Enhanced Security_4
Network design:
The network design is executed by the administrators, engineers, and other network staff.
The network design is used in technical works (Beasley., 2008). It is a key for the success of
business in computer network designing. 24 hours networking is provided for the people. The
speed of the network is considered as most important. (Hallberg, 2013).
The network is nothing but computers. It is used for sending data and information.
They are classified into 7 types.
LAN, WAN, PAN, WLAN, CAN, MAN and SAN
Metropolitan area networks (MANs).
Storage area networks (SANs).
Wide area networks (WANs).
Personal area networks (PANs).
Wireless local area networks (WLANs).
Local area networks (LANs).
Campus area networks (CANs).
Most of the people are using LANs. They are used in schools, offices, and homes.
Networking is good for sharing internet access and files and databases. As you may have been
read in books and movies they used for network designing. The firewalls can be used to filter
unwanted network traffic. Virtual private networks are used to connect remote controlled
security. The VPNs is used for strong data encryption to hide data moving the router.
Networking in very easy to learn which can be learned in a month. The network is a two
or more computer systems linked together. Most important that is often used are network design
and technical work. The good network is necessary for the network verification. The description
of the test plan website is said to be accepted. The plan will be created by the project. The
network designs are modified easily for business improvement. It recognizes goals for the
4
Network Design with Enhanced Security_5
business and technical requirements. The web server of DNS is improved and it changes the
major applications. The network design will be improved and represents the routing process and
performs addressing in design.
The network design is important to use based on the router and switch, servers. Network
security is based on the overall process and IP addressing is seated. Traffic is controlled by using
the wireless connection. Switch, router and servers and a computer are wireless network.
Antenna, remote are considered as a wireless connection. It also uses the internet connectivity in
a wireless connection. Many connections to connect the same time in to connect the access point
without wire. The network uses people have used the cable connection .wireless connections are
used in radio waves to connect.
Wireless networks are not connected by cables. The use of a wireless network enables
to use of radio waves and make phone calls from many locations worldwide.
There are three major of wireless:
1. Wireless clients or wireless station.
2. Access points
3. Ad-Hoc node.
It is used to connect distant buildings or areas. The long-distance connection is said to be
point-to-point.
The wireless communication system has been a necessary part of various types of
wireless communication devices. The licenses of the user to communicate from telnet operated
areas. They are many devices is used for wireless network communication. It is also used for
cordless telephones, Zigbee wireless technology, Global Positioning System, Wi-Fi, satellite
television, and wireless computer parts. This current technology used for 3G and 4G networks,
Bluetooth and Wi-Fi technologies. Ethical implementation is enforced by the computer which is
used for computing devices The computer ethics plays a major role which used It also
approaches the other devices. Ethical implication is important in WLAN. Wireless area network
is used in educational institutions, business and etc.it is mostly used in corporate environment.
5
Network Design with Enhanced Security_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Simulation of Hierarchical Network Design Model using Cisco Packet Tracer
|17
|1921
|277

Wireless LAN Design and Implementation for Organizations
|7
|1077
|457

Designing a Secure Virtual Private Network for Campus Environment
|25
|6319
|163

Project: Design Virtual Private Network Within Campus Environment
|25
|6320
|602

NIT1104 - Computer Networks Assignment
|6
|475
|44

Adaptive Network Design for the Cisco Pocket Tracer
|9
|868
|275