Role of Virtual Networks in Hardware Networking Functions Thesis

Verified

Added on  2022/10/01

|16
|770
|20
Thesis and Dissertation
AI Summary
This thesis explores the role of virtual networks in hardware networking, focusing on security breaches and countermeasures. The study begins with an introduction to virtual networking, its advantages, and its growing importance. A literature review examines existing research on the subject, followed by the aims and objectives of the research, which include defining how virtual machines connect and communicate, identifying security risks, and developing solutions to protect connected devices. The research methodology, using the Agile method, involves qualitative and quantitative research, data collection from various sources, and experimental setups to analyze hardware functionalities. The thesis details the data analysis process, experimental design, and system testing, including the identification of vulnerabilities and the implementation of countermeasures. The results are presented, discussed, and used to formulate conclusions and recommendations. The research emphasizes the need for control measures, risk analysis, and the analysis of secure virtual network hardware devices. The thesis concludes with a discussion on data collection, analysis, and the importance of resolving research problems, fully testing systems, and implementing effective countermeasures to address threats and security breaches.
Document Page
ROLE OF VIRTUAL NETWORKS IN
HARDWARE NETWORKING
FUNCTIONS
(SECURITY BREACHES AND COUNTER MEASURES)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
Introduction
Due to constant change in technology it has contributed to the immense use of
virtual networking
Virtual networking helps two or more virtual machines to communicate together
and share computer resources
It works like the traditionally networked computers but through the use of VMs
Machines
VM machines enables the computers to be connected together on a virtual
environment. This means that you cannot be able to see the physical connection
between connected devices
Document Page
Literature Review
The research studies were done considering the peered reviewed journals written
by different authors
Documentaries were reviewed before the actual start of the project
Books of references were referred to analyze all the system requirements
Feasibility studies were carried out to get a hint about the new project research
Document Page
Aims and Objectives
The main aim why this project was carried out was to define how the virtual
machine works to connect and allow communication on network computers
To identify the possible risks in terms of security of connecting devices by use of
virtual machines
To come up with solution on how we can protect devices connected together over
virtual network connection
To identify the vulnerability capabilities between various networking devices
To identify the breaches which hackers may be using to sniff packets from the
virtual network
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Problem of the Research
VM machines consumes a lot of power
Networking devices requires a high powered servers which are very expensive
Virtual networking works hand in hand with networking software which may
include the Oracle VMs
The software used is very expensive to purchase
Requires knowledgeable and experienced Network Engineers
Document Page
Methodology use and selection process
The methodology chosen to carry out the research is the Agile method
Intend to conduct qualitative/ quantitative research
Questions were designed and relevant individuals were asked
The feedback are recorded and the data are taken for analysis
A number of experiments were carried out to clearly find out all the hardware
functionalities of virtual network connecting devices
Collection of data were retrieved from the internet, eBooks, articles and
interviewing of relevant authors
The data collected from the sources named above were then protected from
manipulation and were analyzed as they are
Document Page
Agile Methodology
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data Collection Process
The methods used to collect data includes;
Carrying out internet research
Reading books for references
Using articles
Generating questionnaires
Conducting direct interviews
Carrying out experimental setups
Document Page
Data analysis
The data collected were kept safe from any form of modifications
They were grouped together
They were analyzed and the results were produced
The results were used to make the final decision
Document Page
Experimental design
Experiment were done to give the actual figures and facts about the functionality
of the virtual network hardware components
Project requirements were listed and collected
These materials were used to carry out the experimental setup which was
conducted
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
System Testing
Project testing was carried out to identify possible defects on the hardware
components
Vulnerabilities which were retrieved were noted and the solution was put in place
Counter measures to prevent this system from being hacked were explained in
details
Users were trained on how they can overcome these challenges
Document Page
The strategic implications of the
research
Control measures of the hardware security breaches has to be achieved at the end
of the research
Possible breaches were identified and the solutions were provided
Risk analysis report was written and can be use when making policies
Secure virtual network hardware devices were analyzed and recorded
Document Page
Results and Presentation
The results has to be presented to the relevant people for implementation
The results were recorded in figures and were added to the report
The results obtain were presented to the project manager for implementation
It was discussed and concluded that the data collected were enough and the work
was to be implemented in due course
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Discussion
The research report was brought for discussion after the data collection and
analysis has been carried out
During the discussion, implementation procedures were put together
Testing team reported that the errors retrieved from the hardware tested were
corrected and the system is reduced to security risks and attacks
Budget for the implementation was discussed
Also the system was analyzed if it really meet the customer requirements
Document Page
Conclusion
Data collection procedures and analysis reports
Research problems need to be resolve
System must be fully tested
Counter measures must be provided at the end of the research
Threats and breaches has to be identified and control measures are put in place
The main goal of the project must be achieved
Document Page
Thank you
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]