Sunday, December 8, 2019

Design and Evaluation of Network Architecture - MyAssignmenthelp

Question: Discuss about the Design and Evaluation of Network Architecture. Answer: Introduction The New Jersey Police and the New Jersey State Association are looking to implement a Virtual Private Network. They are looking to reach down to the members of their community. In addition to this, they are looking to set up a network that would provide them with the information about the various type of issues such as the terrorists activities, interagency drug and gang interdiction [1]. The NJ State police are looking to collaborate with Cisco for this situation. They are looking to integrate the latest technologies so that they can have real time data and have much improved level of decision making. In addition to this, they are looking to integrate the Cisco DX/SX/MX Series endpoints within their networks. This involves the products of cisco such as the Cisco Jabber, Cisco Webex, Cisco Spark and collaboration of these solutions within the network. This report provides the details of the VPN design and implementation. The Assumptions, justifications and the requirements for the ne twork have also been provided in this report. Virtual Private Network Design The main security objectives of the New Jersey State Police are: To increase the community safety To increase the real time safety for the people To increase the data safety for the network The main business objectives of the New Jersey State Police are: To promote and enhance the highest ethical and professional standards in law enforcement through New Jersey To have commitment for continuous improvement To create an affordable, common collaboration platform by which all safety agencies could collaborate on issues including emergency responses, terrorist activity, training, interagency drug and gang interdiction. To drive decision making This section of the report is concerned with the assumptions that were taken during the designing of the network. In addition to this the criteria that were stated by the New Jersey Police were also taken into account before the designing of the network [2]. The main criteria of the New Jersey State police were to increase the efficiency in the communication in between the different departments of the State police. In addition to this, the organization also requires the 3,080 sheriffs in their network to communicated freely among themselves. The network is also going to accommodate the Cisco Jabber, Cisco Spark and the Cisco end points so that the communication in between the different centers for the organization are efficiently performed. In addition to this, it is assumed that the network would have a central server that is going to perform all the functionalities in the network. In addition to this, the network should also be able to accommodate a large number of workstations so the major functions can be performed efficiently. The main routers are going to distribute the network in the different centers for the network. In addition to this, the law enforcement agencies in the other states are going to connected to the network by the use of the MAN hub [3]. The network would also be providing wireless access to the different users of the network. Hence each of the branches in the network has WIFI routers connected to them. Description of the Virtual Private Network Design The network is designed by use of a series of VPN routers. The main router is connected to three routers that would help in spreading the network in further divisions. The network is connected both to the WAN and the MAN services. The WAN services would provide the network with the internet connectivity and the MAN services would provide the network with the ability to distribute the network in to different states of the country. The network would provide the organization the ability to perform efficient routing although keep the network private. The sub networks within the network are basically guarded by the firewalls [4]. The networks are then sub divided into further sub networks with the help of the hubs. The network is being used for the private communications and for the real time connection among the different sectors of the New jersey police department. The network data and the private data for the organization are secured and also the collaboration of the cisco endpoint wit hin the organization can be done very easily by the network. The design of the network has been done according to the need of the organization. The designed network would be providing all the necessities that were mentioned by the organization. The network has been designed keeping in mind the security and the business objectives of the New Jersey Police. The network is designed in a way so that the connection in between the different components within the network are possible and the communications within the network are also performed efficiently [6]. The network is being used for the communication in real time with the components of the different sectors of the network. In addition to this, the network firewalls are also installed in the network this would provide the security to the different divisions within the network. The VPN network would also restrict the accessibility within the network. This would stop the intruders from connecting to the network and also risks of data being stolen or hampered within the network would be restricted aptly. The network also comprises of the wireless devices that would allow the rem ote access to the network. The network has support around 3080 wireless devices for the nationwide sheriffs as mentioned by the National Sheriffs Association. Hence, the availability of remote access to the network is very necessary and this increase the efficiency of the network. The network also provides the huge amount of affordability as the network is implemented using the optimal components and hence the cost of implementation of the network is optimizable to a great extent. The network design also allows the organization to maintain it very easily. For the proposed network architecture, the optical fiber cables are to be used as the network stretches over a large area. The VPN routers are to be used for the network as they are efficient in implementing the VPN Tunneling for the Network [8]. The switches are used for the dividing the network connections into further subdivisions. The hubs are also used in the network that would serve the function of the repeaters in the Wide Area Network. In addition to this NetGear switches and wireless routers are used in the network that would help in the expansion of the network. VPN Tunneling and encapsulation protocols To interface whole network together by means of a VPN (normally called site-to-site associations) it's best to influence the association at every area's principle to arrange switch or door, which requires a switch or a passage with worked in VPN usefulness. You'll discover most VPN arrangements likewise bolster remote access to clients outside of the association. For the most part the slightest secure strategy [9]. However, to provide remote access to clients outside of your workplaces, PPTP is locally bolstered on Windows and most other working frameworks and cell phones. In any case, there can be association issues when workers interface from systems that don't permit VPN go through. The L2T/IP provides a better security than the PPTP, although setup of the protocol is much harder than that of the PPTP. For the remote access to the systems this protocol is very efficient and also the protocol helps in connecting the wireless devices to the network. Normally intended for giving remote VPN access to clients outside of your workplaces, not interfacing whole systems. The association is made through a Web program and doesn't require a VPN customer on the PC or gadget. The IPSec Protocol is also used in the system for the improvement of the security and the flexibility of the system. The protocol has five contents incorporated within it. The encapsulation protocol, the Encapsulation mode, the encryption algorithm, the hash function and the key validation. The MD5 and the SHA-1 encryption algorithms are used in this protocol. The center innovation of IPSec-VPN is IPSec convention suite primarily including Authentication Header (AH)[3], Encapsulating Security Play load (ESP)[4], Internet Security Association and Key Management Protocol (ISAKMP)[5] and Internet Key Exchange (IKE)[6]. ESP convention is predominantly to provide privacy assurance and honesty check to security frameworks, in which encryption and verification calculations are required; AH convention is primarily to give integrity verification and it just includes validation calculation. Both ESP and AH have passed the corresponding Security Association (SA) consulted in ISAKMP to portray h ow to protect communications, which sorts of information floods of interchanges ought to be ensured and which modes ought to be utilized to ensure correspondences, and so forth by SA. IKE convention is to control the process of arranging SA by ISAKMP, and with a specific end goal to enhance the effectiveness of arrangement, IKE divides the procedure of arranging SA by ISAKMP into two phases that are separately IKE SA negotiation and IPSec SA transaction. Conclusion For conclusion it can be said that the VPN is very important for any kind of organization to maintain the privacy and the encapsulation within the network. The organization is also benefited from these techniques as the authentication at different level is provided within the network and also the privacy with the network is maintained while, on the other hand the efficiency in the communication also improved. The New Jersey Police and the New Jersey State Association are looking to implement a Virtual Private Network. They are looking to set up a network that would provide them with the information about the various type of issues such as the terrorists activities, interagency drug and gang interdiction. The NJ State police are looking to collaborate with Cisco for this situation. They are looking to integrate the latest technologies so that they can have real time data and have much improved level of decision making. This report provides the details of the VPN design and implementat ion. The Assumptions, justifications and the requirements for the network have also been provided in this report. The network design and the logical design of the network has been provided in this report. In addition to this the different type of protocol suites available for the network has also been provided in this report. The assumptions were made based on the security and the business objectives of the organization. The network has also been designed according to the criteria mentioned by the organization and the network designed is aptly justified. References Theodoro, L.C., Leite, P.M., de Freitas, H.P., Passos, A.C.S., de Souza Pereira, J.H., de Oliveira Silva, F., Rosa, P.F. and Cardoso, A., 2015. Revisiting Virtual Private Network Service at Carrier Networks: Taking Advantage of Software Defined Networking and Network Function Virtualisation.ICN 2015, p.84. Qureshi, K.N., Abdullah, A.H., Hassan, A.N., Sheet, D.K. and Anwar, R.W., 2014. Mechanism of Multiprotocol Label Switching for Forwarding Packets Performance in Virtual Private Network.Middle-East Journal of Scientific Research,20(12), pp.2117-2127. Liyanage, M., Ylianttila, M. and Gurtov, A., 2014. IP-based virtual private network implementations in future cellular networks.Handbook of Research on Progressive Trends in Wireless Communications and Networking,1(44), p.18. Bhat, A.Z., Al Shuaibi, D.K. and Singh, A.V., 2016, September. Virtual private network as a serviceA need for discrete cloud architecture. InReliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016 5th International Conference on(pp. 526-532). IEEE. Hoeft, B. and Petzold, A., 2016. 100 Gbps connection to the Large Hadron Collider Open Network Exchange (LHCONE), a virtual private network of the LHC Community for example the German collaborator DE-KIT.PoS, p.019. Lpez, G. and Moreno, J.I., 2014. On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids.Network Protocols and Algorithms,6(3), pp.35-55. Raeespour, A.K. and Patel, A.M., 2016. Design and Evaluation of a Virtual Private Network Architecture for Collaborating Specialist Users.Asia-Pacific Journal of Information Technology and Multimedia,5(1). Das, S.K., 2014.Quality of service estimation techniques for an optical virtual private network over wdm/dwdm network(Doctoral dissertation). Sharma, T. and Yadav, R., 2015. Security in virtual private network.International Journal of Innovations Advancement in Computer Science,4, pp.669-675. Bahnasse, A. and El Kamoun, N., 2015. Study and Analysis of a Dynamic Routing Protocols' Scalability over a Dynamic Multi-point Virtual Private Network.International Journal of Computer Applications,123(2). Kumar, N.M. and Senthilkumar, K., 2013. Proposed Architecture For Implementing Privacy In Cloud Computing Using Grids And Virtual Private Network.International Journal of Technology Enhancements and emerging Engineering Research,1(3).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.