StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Application Architecture and Private Networks - Case Study Example

Cite this document
Summary
For making the payroll application accessible from head office to all remote offices, the author of the paper "Application Architecture and Private Networks" will incorporate technologies to ensure a secure delivery channel and propose secure technological application architecture for the company. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Application Architecture and Private Networks
Read Text Preview

Extract of sample "Application Architecture and Private Networks"

? Full Paper Contents Current Application Architecture 3 2 Network Address Translation (NAT) 3 3 Tunneling 4 4 Access ControlList 4 5 Sub Netting 5 6 Virtual Local Area Network (VLAN) 5 7 Suspicious File Types 6 8 Virtual Private Network 6 9 Conclusion 7 10 References 9 1 Current Application Architecture For making the payroll application accessible from head office to all remote offices, we will incorporate new technologies to ensure a secure delivery channel. We will propose secure technological application architecture of the company. Figure 1.1 shows the physical design of the proposed application infrastructure. Figure 1.1(Physical Design) 2 Network Address Translation (NAT) In network dictionary, Network Address Translation delineates as “An Internet protocol that allows individual sites to support more IP hosts than the number of IP addresses assigned to it. This is done using special Internet addresses that have been reserved for this purpose. These special addresses are invalid in the Internet itself. The hosts using these addresses may communicate among themselves, but they cannot access the Internet directly”. NAT In order to make it easy for the network administrator, the NAT translates all the personal and confidential IP addresses into inclusive IP addresses. This will require an incremental change devoid of host and routers modification. Furthermore, the NAT has its own drawbacks for instance; its performance is slow since each packet is processed before translating it. Therefore the ‘IP traceability’ also becomes complicated because data packets are hard to trace. 3 Tunneling Tunneling is also referred as port forwarding. Port forwarding is often used for establishing a secure data channel from head office to the remote office corporate network by utilizing the Internet. One of the methods for deploying a tunneling protocol is to configure the WAN connection with port number along with allocation of the required service. For example, for accessing remote desktop for a payroll application, port number 3389 will be used with the service named as ‘RDP service’ along with the specific IP address of the computer. As discussed earlier, PPTP developed by Microsoft. Likewise, PPTP is required for transmitting encrypted data over the VPN. Besides, no data encryption is available on port forwarding configuration as compare to tunneling because every tunneling route needs to be defined. This may create complex configurations that are difficult to manage. 4 Access Control List In a router, firewall, multi-layer switches etc.; the Access Control List is characterized. If a data packet attempts to pass through a router, it will take in security rules and policies. In the same way, the user’s rights on the files and directories are identified related to the ACL operating system. In order to check quality, the files and folders are read, write and executed. Thus, the ACL offers security for the network data administration, system files and folders. 5 Sub Netting Sub netting is described in “document RFC 950, originally referred to the subdivision of a class-based network into sub networks, but now refers more generally to the subdivision of a CIDR block into smaller CIDR blocks” (Subnetting, n.d). In IPv4, a single subnet only encloses 254 assignable IP addresses. The issues related to the broadcast are always triggered, generating network congestion and disruption in services. Therefore, these IP addresses should be managed properly in order to control congestion. However, o overcome the above mentioned issues, the IP addresses are divided into smaller class C networks for better performance related to network management and security. In addition, to operate a corporate network, sub netting is needed in order to allocate private IP addresses to inbound networks as the global IP addresses are limited. The global IP addresses can be configured on the bases of WAN (Wide Area Network) devices. 6 Virtual Local Area Network (VLAN) The Virtual Local Area Networks (VLAN) is suggested in order to supply security to the internal data communication. Inside any organization, the VLAN divides the domain of the departments. In addition, the VLAN utilizes encryption procedures regarding data broadcast over the network. For defining the routers, the APL (Access policy list) also configured in the VLAN. Furthermore, VLAN is believed as a broadcast domain. It conclude that the broadcast generates from one computer can only be received to the destination which is defined by some criteria in the broadcast domain. The advantage of VLAN implementation includes an efficient way of bandwidth utilization and eliminating the network from possible broadcast storms, which results in denial of service. Furthermore, by implementing VLANs, the capacity of switching technology is utilized to its full potential. VLAN also supports ‘VLAN trunking protocol’. The ‘VLAN trunking protocol’ will significantly reduce administration for the switched network. 7 Suspicious File Types ‘Exe files’ ‘Com Files’ ‘Bat Files’ ‘SCR files’ ‘MP3’ and other executable files For the Microsoft Windows environment, Exe file types are executable files. In order to initiate any program, these files are utilized. In addition, the hackers can create virus by using these executable files. For example, these virus executable files can be developed in the form of folder. This virus executable file works by installing virus on a user’s system if the user clicks on it. This will take full control on all the personal data and resources available on affect system. The Com files are used as a command prompt for Microsoft Windows environment and are the extension of Command. The old ‘DOS’ based game files can transmit viruses to the system. (Understand common virus attacks before they strike your apps, n.d). 8 Virtual Private Network VPN is considered to be a most cost effective and secure channel for exchanging information with long distant or remote offices (Ben-Ameur & Kerivin, 2003). VPN incorporates data encryption and uses point to point tunneling protocol to transmit data over Public Switched Telephone Networks (PSTN). Our newly proposed application architecture will utilize VPN for making the payroll system assessable to all remote offices. However, Internet access is mandatory, as a stable Internet connection is required to establish connectivity of payroll application hosted at the head office. A VPN dialer is used for dialing in and user credentials are mandatory for authentication and authorization of the user. As shown in Fig 1.2, overall application architecture is illustrated along with network components. Head office is hosting the payroll application with VLAN, NAT, PPTP and ACL enabled configuration. Similarly, remote offices are also configured to the same configuration, as demonstrated in fig 1.2. Figure 1.2 (Logical Design) 9 Conclusion For proposing the application infrastructure, we have discussed new technologies that will be integrated. For instance, NAT will be used for hiding the private IP addressed of the organization Tunneling will be used for accessing the payroll application from head office to the remote offices Access Control List will be used for allowing only the authorized employees for accessing the payroll system VPN and VLAN will be used for adding an extra layer of security for exchanging data over the WAN and for LAN; ACL will protect the local data transmission within the organization. 10 References Ben-Ameur, W., & Kerivin, H. (2003). New economical virtual private networks. Communications of the ACM, 46(6), 69-73. Network address translation. (2007). Network Dictionary, , 334-334. Subnetting Retrieved 3/4/2013, 2013, from http://www.cotse.com/CIE/Topics/24.htm Understand common virus attacks before they strike your apps Retrieved 3/4/2013, 2013, from http://msdn.microsoft.com/en-us/magazine/cc164146.aspx Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Application Architecture Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Application Architecture Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1469573-application-architecture
(Application Architecture Case Study Example | Topics and Well Written Essays - 1000 Words)
Application Architecture Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1469573-application-architecture.
“Application Architecture Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1469573-application-architecture.
  • Cited: 0 times

CHECK THESE SAMPLES OF Application Architecture and Private Networks

Network Architectures for Data Centers

This research will offer a comprehensive analysis of some of the major aspects required for the development and application of data center architecture application and their possible implication for better corporate management.... This paper "Network Architectures for Data Centers" presents a detailed analysis of network architectures for data centers....
11 Pages (2750 words) Term Paper

Annual Potential Loss Application Attack Threat

hough some firewalls in networks have application firewall capabilities, most are considered to be underpowered by experts, providing less protection than the available firewalls that are single purpose.... The paper "Annual Potential Loss Application Attack Threat" gives advice on how to increase the security level given by the base level proposed architecture.... These enhancements will add even more layers of security to the basic proposed network architecture with greater concern for security....
10 Pages (2500 words) Case Study

Virtual Private Network Tools

For a smooth establishment and maintenance of a virtual private network, one is required to have appropriate networking software and hardware installed in their computers and the local network.... VPN software enables a client to join a private network as if they are at a local computer within the network despite the physical distance the client might be away from the network.... This software ensures the security of the private network through the use of cryptographic tunneling protocols to ensure confidentiality and message integrity....
18 Pages (4500 words) Term Paper

Virtual Private Network Architecture

The basic purpose of this research is to analyze the process whereby virtual clouds (tangible machines) are used to link to virtual private networks (VPNs) that interacts with virtual enterprise architectures or enterprise resource planning systems architectures.... Thus, in order to deal with these challenges, there is a need to improve the cloud computing architecture to flawlessly put together virtual private networks (VPNs) (Wood, Shenoy, Gerber, Ramakrishnan, & Merwe, 2009; Rittinghouse & Ransome, 2009)....
3 Pages (750 words) Essay

Evaluation of Cloud Networking Design, Security, and Architecture Infrastructure

The paper "Evaluation of Cloud Networking Design, Security, and architecture Infrastructure" explains the challenges, solutions, and needs associated with cloud networking.... The emergence of cloud networking has eliminated the concept of 'silo computing' where an application or software was of restricted use and available to only selected systems.... A cloud networking system creates multiple layers and multi-tiered systems inside a cloud server, allowing for enhancement of cloud protection and security and application of complex software [2]....
12 Pages (3000 words) Coursework

Internet of Things - Features, Challenges, and Weaknesses

Kortuem et al (2010) believe that context-aware computation via network resources and smart connectivity via existing networks will be critical elements of the Internet of Things.... It was found that, in the distributed form of architecture in IoT, attackers could hijack unsecured network devices, converting them into bots to attack third parties.... The perceptual layer in distributed IoT architecture was also found to be vulnerable to node capture attacks, including physical capture, brute force attack, DDoS attacks, and node privacy leaks....
24 Pages (6000 words) Research Paper

Privacy in Mobile Social Networks

IntroductionInformation from the social networks has found its use in many ways which was not expected in the beginning.... IntroductionInformation from the social networks has found its use in many ways which was not expected in the beginning.... This paper will give these issues that come with the use mobile networks.... The main focus of this paper will be on privacy on the social networks.... The social networks that are online are used by many people around the world today....
7 Pages (1750 words) Essay

System and Network Security

Network security is tackled in a multifaceted manner, which seeks to curb network vulnerabilities arising from internet architecture and security methods that are prone to manipulation as well as end-user interaction with internet services in which data processing methods can be compromised (Fry & Nystrom, 2009).... In the current architecture of networks that is, data networks and synchronous switched networks; internet security is substantially prudent....
13 Pages (3250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us