Tuesday, May 5, 2020

Design and Implementation of Security †Free Samples to Students

Question: Discuss about the Design and Implementation of Security. Answer: Introduction Inter networkingdeals with the data transfer in the communicated network with communication devices and the protocols. Internet is a set of collected communication networks with many inter connections of bridges, routers and switches. Bridge is the intermediate service used to connect two LANs with LAN protocols. Similarly, the WANs also can be connected with their respective protocols. Router is the device which connects two similar or different type networks [6]. Analyse and discuss the significance of internetworking for GITAM University. The plan is to analyse and address the star up issues with the University. It is related to their network design, inter networking and implementation process. Since the University is going to have highly distributed, heterogeneous and globalised set of branches across the area hence a comprehensive system of network is designed to maintain their connectivity without any interruption. The network topology is chosen initially and designed as per their requirements. Network is designed in order to provide 100% availability with time. Efforts are made to maintain the network availability in wide adverse situations of link failure, equipment failure and overload conditions. Network designed to support tremendous traffic loads with the time. Design is carried out with consistent application response time. Protection is provided against unexpected security incidents. The important necessity to build the network includes proper network topology, router, wireless adaptor through which all their systems are internally connected. In this model, there are two basic type of networks. One is unknown network and the other one is trusted network. The protocol of the trusted network is known but the untrusted network is not known. Hence we cannot communicate or initiate the network connection with them. There are two routers. One is an internal router and the external router [4]. To design, plan and develop IT network infrastructure for GITAM University. The purpose of the project is to design network in such a manner so that it can enable nearly thousands of users at the same time to access the internet. It is planned to design the network that will provide at the speed of 2Mbps down load and 1 Mbps upload. Main Basic hardware requirements to form a network Some of the hard ware requirements are given below Repeaters, Radio: 900 MHz to 925 MHz, Certification: FCC Certification. Range: 1 mile. LED is used for power. Bi-color is used for Power state. Green: AC Power, Red: No AC power, Off no power. LED-Status Bi-color, this is regarding network status and the quality of Link Green: Link Quality 64 Orange: LQ between 30 and 63 Red: LQ between 0 and 29 Internetworking Protocols The link should be established between the networks. The link may be wired or wireless network. The network may be of similar or different types. It should have the link layer and the minimum physical layer. Software model and analysis: The following three models are necessary for the above-selected case study. As the university is the private building large number of private networks are necessary. These private connections were distributed through out the university. The university may take the lease option and the rental basis of network allotment. The guest wifi is very important in the wifi model because it will create the impression on the university for the guests. So this has to be maintained and well connected throughout the university with high speed. This is an area where the most band width with higher traffic is observed. Hence it must be maintained properly. The huge number of student and the staff population were found in this region. Network diagram is shown including server, router, switches and PCs on Netsim. There are many updates that have been seen in the Netsim 9 parent application. There has been multiple monitor that can be used simultaneously [2]. NetSim has various libraries in which the necessary commands are used for the particular applications whenever necessary [3]. The print screen of the design layout of the university network design has been shown in this section after carrying out certain network interconnection trail session using this Netsim tool. The next step is to run the simulation. The output must be analysed at every level of the network. The errors must be checked and debugged. The delay must be reduced and the loss must be avoided without packet errors. Export the graphs and the data for analysis. Frame Relay switches The core switches are showing in the above. The main traffic that passes depends upon the switch from the server to PCs or ISP to PCs. Network Configuration Process During the installation of the operating system the network software installation takes place. A certain IP configuration parameters are used in the appropriate files tat are stored. They are stored in such a way that they can be read at the boot time [2]. After the completion of building the entire network, it is required to make sure for the testing of the equipment and the performance monitoring of the entire network for the specific range of duration. Before starting the complete set up, it is required to test the entire network performance [1]. This will have the best internet facility for all kind of people like the staff, visitors, guests and students. The virus attacks must be watched carefully with restricting the bad websites and providing the high data rates for the internet users. References A. Dingli and J. Mifsud, "Useful: A framework to mainstream web site usability through automated evaluation." International Journal of Human Computer Interaction (IJHCI), vol. 2, p. 10, 2011. F. Akyildiz, T. Melodia and R. Chowdhury, Wireless Multimedia Sensor Networks: Applications and Testbeds. Proceedings of the IEEE, vol. 96, no. 10, pp. 1588-1605, 2008. S. Alabady. Design and Implementation of a Network Security Model using Static VLAN and AAA Server. In Proceedings International Conference on Information Communication Technologies: from Theory to Applications, ICTTA, 2008. Q. Ali and S. Alabady. Design and Implementation of A Secured Remotely Administrated Network. In Proceedings International Arab Conference on Information Technology, ACIT, 2007. J. Janitor, F. Jakab and K. Kniewald, Visual Learning Tools for Teaching/Learning Computer Networks: Cisco Networking Academy and Packet Tracer. Networking and Services (ICNS), 2010 Sixth International Conference on , vol., no., pp.351,355, 7- 13 March 2010. D. Petcu, B. Iancu, A. Peculea, V. Dadarlat, and E. Cebuc, Integrating Cisco Packet Tracer with Moodle platform: Support for teaching and automatic evaluation, Networking in Education and Research. RoEduNet International Conference 12th Edition , vol., no., pp.1,6, 26-28 Sept. 2013

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.