StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Internetworking Design Issues - Research Paper Example

Cite this document
Summary
Full Paper Title Name University Internetworking Design Issues During conducting a security audit of the network to identify vulnerabilities, there is no sole application that will perform the overall task, as the combination of different applications will address specific functions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Internetworking Design Issues
Read Text Preview

Extract of sample "Internetworking Design Issues"

Full Paper Internetworking Design Issues During conducting a security audit of the network to identify vulnerabilities, thereis no sole application that will perform the overall task, as the combination of different applications will address specific functions. Likewise, the first task is to identify root causes that are creating issues on the network and degrading performance of network services along with bandwidth limitations. An open source tool (Chau, 2004) can be used for real time network monitoring called ‘nettest’.

Likewise, this tool is programmed to operate on LINUX operating systems for conducting different tests on various frameworks for identifying and detecting causes for network performance. Moreover, the tool is also compatible for multi-tasking and can monitor several hosts on the network. However, authorization is mandatory before installing it to multiple hosts. Likewise, after completing the network performance testing, network traffic analysis must be carried out, in order to analyze what type of traffic is flowing on the network.

However, to analyze live network traffic, ‘Wireshark’ that was, “previously called Ethereal, is an open source and popular network troubleshooting and packet snif?ng tool. Similar to tcpdump but with a well-designed GUI and many more information sorting and ?ltering options, Wireshark/Ethereal allows the user to see all traf?c being passed over the network by putting the network card into promiscuous mode” (Wireshark.2007). Likewise, ‘Wireshark’ or ‘ethereal’ will capture the packets and consolidate them into a file that can be analyzed at a later stage or at the current situation, it depends on organizational requirements.

The frequency of performing these tests is normally recommended every 24 hours, as this will highlight the peak hours and non-peak hours of business. The naming structure of network devices is essential for identifying or associating a device with relevant servers and its location. However, naming complete device names is not possible; instead abbreviated device names will be used. For instance, human resource can be identified as ‘hr’, administration ‘admin’, information technology ‘IT’, accounting ‘accounts’, sales can be used as it is, shipping ‘shp’ and corporate ‘cp’.

Moreover, network devices can be named as routers ‘R’, switches ‘Sw’, bridges ‘b’, workstation ‘ws’, and server ‘Sv’. If we combine all these named words together, the naming structure will look like HR-112-15-K-RII. The naming structure identifies a network device located in the human resource department that is residing in building 112, fifteenth floor in room ‘K’ and it is a router. For providing security mechanism to the internal data communication, Virtual local area network ‘VLAN’ will be implemented.

The ‘VLAN’ will separate the domain of the lecturers with the other. ‘VLAN’ uses encryption techniques for transmitting data over the network (Vlan.2011). Access policy list will be created in the ‘VLAN’ supported Cisco switches for defining the routes. The router processes the data packets on parameters. Internet protocol and subnet is the parameter for the router to process the routes on the destination. The ‘VLAN’ is considered as a broadcast domain. It concludes that the broadcast generates from one computer can only be received to the destination which is defined by some criteria in the broadcast domain.

The advantage of ‘VLAN’ implementation includes an efficient way of bandwidth utilization and eliminating the network from possible broadcast storms, which results in denial of service. By using VLANs, the capacity of switching technology is utilized to its full potential. VLAN also supports VLAN trunking protocol (Vlan.2011). The VLAN trunking protocol will significantly reduce administration for the switched network. Considering the future network expansion considerations of EOB Manufacturing, the requirement for creating new VLAN will be eliminated by using VLAN trunking protocol.

Moreover, firewall and Intrusion detection systems are also critical for securing the network to an extent. Firewall filters each packet that receives on the station, and decides whether to allow or deny the data packets as per criteria. Firewall analyzes headers of data packets associated with Internet protocol, Transmission Control Protocol and User Datagram Protocol. Firewall may use any combination of protocols in order to allow or deny packets. Moreover, IDS listens and monitor the network for any suspicious activity.

As mentioned before, IDS protects from software exploits and buffer overflows. IDS implements ‘intrusion signatures’ consisting of ping sweeps, port scanning, operating system fingerprinting, DoS endeavor, web server indexing and port scanning. 50 workstations are on the 36th floor, 150 workstations on the 35th floor, and 40 workstations are on both the 32nd and 33rd floors. 35th floor having 150 workstations have high bandwidth requirements as compared to other floors. For addressing network latency and security issues, separate VLAN’s can be created for each department with required bandwidth and to make the transmission secure for each department.

References Chau, F. (2004). NetTest's performance monitoring solutions. Telecom Asia, 15(7), 39. Vlan.(2011). Computer Desktop Encyclopedia, , 1. Wireshark.(2007). Network Dictionary, , 531-531.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internetworking Design Issues Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Internetworking Design Issues Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1443508-internetworking-design-issues
(Internetworking Design Issues Research Paper Example | Topics and Well Written Essays - 750 Words)
Internetworking Design Issues Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1443508-internetworking-design-issues.
“Internetworking Design Issues Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1443508-internetworking-design-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Internetworking Design Issues

ACE Network Design

Network design problems are one of the important issues in the building and expansion of computer networks and have attracted many related researchers' attention.... These limitations have given birth to a range from logical to physical issues in network implementation.... These issues include the issues of network scalability, convergence, security, high availability, stability and network traffic management.... 8) and the decision once made on topology and network media is seldom changed or it might be very expensive to change this decision at a later stage to cater network management or optimization issues....
9 Pages (2250 words) Essay

Routing Protocol Security

This would be done using authentication method to compare both of them in order to pinpoint the issues arising from it.... hellip; In order to achieve the set project objective, issues of concern included the history of OSPF, types of OSPF packet type, Authentication Mechanisms in OSPF v2, OSPF security, Authentication Mechanism in OSPF v2, Digital Signature of OSPF, methodology used, system design, hardware and software, testing scenarios, and analysis of data analysis....
3 Pages (750 words) Dissertation

Open System Interconnection (OSI)

hellip; The seven layers are: The application or 'upper layers' of the OSI model deal with application issues and generally are implemented only in software.... The data transport or 'lower layers' of the OSI model handle data transport issues and are implemented in hardware and software.... The OSI model is generic and is not a communication model -it makes no assumptions about programming language bindings, operating system bindings or application and user interface issues....
5 Pages (1250 words) Essay

Business Proposal for the Requirements of the TEEVO Corporation

The company's expansion plans and establishment of a new office at Brisbane has compelled the management to reflect on the communication issues that exist in the present set up.... Implementation of the proposed network design would accomplish a stable and secure communications system.... When the design and recommendations of the proposed plan are implemented, the internal and external communication processes of the company would faster and more reliable....
12 Pages (3000 words) Case Study

Transmission Control Protocol and Internet Protocol

Though, due to computerized processing, there was a chance that a wide variety of network issues can go uncorrected and unidentified for long periods of time.... In this scenario, this design facilitated them to construct a very large network with less central management....
4 Pages (1000 words) Essay

The Price of Products and the Volume of Commodities

The paper describes organizations in different quadrants.... They have a different emphasis on the use of IT.... Strategic firms find it important to use information technology in executing current strategies.... The firms ensure close coordination between the senior management and the technology group....
23 Pages (5750 words) Essay

CASE- 3 Computer technology and the networked organization

Moreover, LAN facilitates the file exchange, electronic mailing and other similar applications (internetworking Technology Handbook, 2012).... Moreover, the linkages between technological components and sociotechnical framework will be discussed through the case of Italian… Italian Food Restaurant is a new business which is going to be initiated by the end of April 2014....
4 Pages (1000 words) Essay

Inclusivity and Universality of Design and Technology

Inclusive design involves designing for all where it addresses a broad range of issues in making technology available and usable by all people irrespective of their ability, economic situation, age, education and language (Coleman, Clarkson, Dong & Cassim, n.... On the… Thus, this case study argues and unravels a better design between inclusivity and universality of design.... It is worth noting that every design has a meaning for Therefore, such diversity in design use inherently affects its inclusivity and universality during design decision as well as whether it will be relevant to a particular target use....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us