logo

Wide Area Networking Technologies Assignment

13 Pages4149 Words230 Views
   

Added on  2019-12-03

Wide Area Networking Technologies Assignment

   Added on 2019-12-03

ShareRelated Documents
Evaluation of the WAN security issues andperformance
Wide Area Networking Technologies Assignment_1
TABLE OF CONTENTS1. ABSTRACT.................................................................................................................................12. INTRODUCTION.......................................................................................................................1Background of the study..............................................................................................................23. AIM AND OBJECTIVES............................................................................................................34. TECHNOLOGIES AND STRATEGIES FOR SECURING WIDE AREA NETWORKS.........45. METHOD AND WORK PLAN..................................................................................................6Milestone.....................................................................................................................................7Prototype approach:.....................................................................................................................7Research ethics............................................................................................................................8Significance of the research.........................................................................................................9Limitations...................................................................................................................................9REFERENCES..............................................................................................................................10
Wide Area Networking Technologies Assignment_2
1. ABSTRACT Wide Area Network (WAN) plays an important role in terms of providing support to awide range of applications within wide geographical area. However, along with severaladvantages some security and performance related issues are also associated with theimplementation and used of WAN technologies such as, Dynamic Multipoint Virtual PrivateNetwork (DMVN). The main aim of the research proposal is to explore the wide area networksecurity issues and policies to overcome those issues effectively. In the context of carrying outthe present study, researcher will need both primary and secondary data collection techniques.Primary data will be collected from 100 IT employees of HP, Defcon and Cisco organizations inorder to know their perceptions about wide area network security issues and ways through whichsuch kinds of issues can be controlled and overcome in an appropriate manner. On the other side, for collecting secondary data, researcher can be conducted review ofliterature method in which studies done by similar topic can be considered to better understandWAN concept and principles of its implementation. Along with this, prototyping model can beemployed to break down the entire project into smaller tasks and sub-tasks so that each andactivity of present project will be executed in stipulated time. At the end of the proposal,researcher will be able to identify security and performance measurement associates with DMVNtechnology and its implementation at workplace. Along with this, investigator would be able tomeasure impact of security factor on organizations and users who are using WAN technologies intheir day to day business operations.Keywords: Dynamic Multipoint Virtual Private Network (DMVN), WAN, security andperformance measures.2. INTRODUCTIONIn the modern era, most of the organizations are emphasizing on using wide area networkfor communicating large geographically area.This network may be privately owned or rentedbut generally it is used with public (shared user) networks. Today’s many employees are workingoutside from remote locations or different branches throughout the world. They are using WANbecause it provides facility of easy access of data and applications resources to a large corporateuser population in an appropriate manner (Alizadeh and et.al., 2015). However, along withseveral advantages several security issues such as unauthorized use, information theft, andmalicious damage to files etc. are also associated with its use. These kinds of network1
Wide Area Networking Technologies Assignment_3
optimization and security threats are creating challenges for organizations across the world. Insuch kind of critical situation, it is essential for network department of any firm to make rightbalance between WAN security and performance issues by using adequate security measures andstrategies. In this regard, companies must establish a good security system and develop a securitystrategy to overcome these types of security problems in a proper manner. Retailers spent asignificant ($25 million+) amount of money every year for the purpose of security their Widearea network. Along with this, cost of the WAN circuits, operational costs, centralizedadministration and traffic handling for different applications kinds of costs and challenges areassociated with the implementation of wide area network for different applications. For thepurpose of dynamic creation of virtual Private IP tunnels, enterprises are using DynamicMultipoint Virtual Private Network (Iskander, Trainor and Chrysanthis, 2014). For the storage oftheir data in a quick, secure and distributed manner, management of companies is emphasizingon use DMVN technology. For the purpose of attaining aim and objectives, researcher cancollect secondary data related to understand development and implementation of WAN securitymeasures. In this regard, study conducted by different authors will be considered (Liang, Qin andWan, 2014). By considering convergence duration, traffic sent, throughput and queuing factors,performance of DMVN which is one type of WAN technology can be considered.Background of the studyWAN has a capability to capture multiple distance areas and multiple smaller networks.In addition, by using this network companies can grow as needed to cover multiple cities. Usingpacket switching and circuit switching technologies, a set of switches and routers areinterconnected to form a WAN to share resources among different branches of companies atdifferent locations effectively. Besides that, it provides facility of share application softwareresources (files, printers and modem) and allows electronic communication among users.In digital era, most of company's proprietary information traverses wide area network butmost of enterprises wrongly assumed that they do not need to address security and networkmanagement issues in order to protect their network. In the context of protecting information, itis necessary for companies to establish strong security system before an intruder or any kinds ofsecurity threats occur (Iskander, Trainor and Chrysanthis, 2014). For the purpose ofunderstanding WAN security threats and performance measurements, present study has beenconducted by the researcher. 2
Wide Area Networking Technologies Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Evaluation of WAN Security Issues and Performance
|13
|776
|241

The Use and Importance of Network Monitoring Tools
|25
|5245
|53

Towards Wide Area Networking Technologies
|18
|5262
|451

Designing a Secure Virtual Private Network for Campus Environment
|25
|6319
|163

Project: Design Virtual Private Network Within Campus Environment
|25
|6320
|602

BHIS 515: Biomedical and Health Information Sciences
|10
|2029
|40