Develop suitable technologies, protocols, network management strategy and security mechanisms in relation to network design Interpret the evaluation of different network performance metrics using...

1 answer below »











Develop suitable technologies, protocols, network management strategy and security mechanisms in relation to network design



Interpret the evaluation of different network performance metrics using simulation tools


Net work would use star topology and sub research would be on Performance and Network Security.


The assignment need to follow problem solving pattern as mentioned below:



The assignment has five (5) chapters as follow:






Chapter 1:
Introduction



Chapter 2:
Literature review on (your chosen topic), and problem statement.



Chapter 3:
Methodology



Chapter 4:
Simulation of network (your chosen scenario)



Chapter 5:
Results and discussion



References






Asia Pacific Institute of Information Technology Asia Pacific University of Technology and Innovation Master Level Network Design and Performance Individual Assignment Weightage 60% Learning outcomes: On successful completion of this module, students should be able to: 1. Develop suitable technologies, protocols, network management strategies and security mechanisms in relation to network design. 2. Interpret the evaluation of different network performance metrics using simulation tools. Lecturer: Dr. Arun Intake: UCMF1808SE / UCMF1804SE Assessment summary: · Research work (30%): A research on any aspect of network (wired, wireless, mobile) communication technology like topology, routing, protocols, architecture, performance and security. · Simulation (30%): Network simulation and performance evaluation. ____________________________________________________________ The assignment has five (5) chapters as follow: Chapter 1: Introduction Chapter 2: Literature review on (your chosen topic) Chapter 3: Methodology Chapter 4: Simulation of (your chosen scenario) network Chapter 5: Results and discussion References Research work: It should contain a review of literature on at least 10 research papers (not older than 2012) within the same area that covers a topic or challenge in network communications. Simulation: Students should simulate any network topology in NS-2 and measure performance metrics for at least “throughput” and “delay”. Based on the above situation, you are required to provide a hardcopy and a softcopy of the documentation. You can make assumptions to support your solutions, but these assumptions MUST BE STATED in the document. Your hardcopy report must be typed using Microsoft Word and bound in A4 sheets. Expected length is 4,000 words plus diagrams and with all references clearly indicated and provided using Harvard Name Convention. Assessment Criteria Research work (30%): Must be completed on week 8 1. Introduction to the technology providing detail explanations: [2%] 2. Review of the related works: [15%] 3. Methodology: [3%] 4. Writing quality and documentation: [2%] 5. Referencing: [5%] 6. Presentation: [3%] Simulation (30%): 1. Explanation of the simulation scenario, including network diagram and simulation requirements. [6%] 2. Simulation configurations and parameters. [16%] 3. Interpretation and analysis of simulation results. [8%] CT070-3-M-NDPPage 1
Answered Same DayFeb 11, 2021

Answer To: Develop suitable technologies, protocols, network management strategy and security mechanisms in...

Ankit answered on Mar 03 2021
160 Votes
Student Id    
                    Student Name
Design of (Infrastructure WI-Fi) WPA and WPA2 wireless network and measure the impact on Security and performance of network
Chapter1: Introduction
1.1 Background
Companies rely on the volume to splitting information among the companies in a productive and efficient manner. Company’s network has taken into consideration this innovation and is presently separated of pretty much every firm. A company consists of various alternatives with regards to setting up a firm network system such as wireless network, mobile network and wired network. They are using a completely wired n
etwork system that use well managing connections to interface PCs, or they are using a wireless network system, that uses radio frequencies to connect PC. Wireless systems have enabled firms to end up increasingly portable; hence, associations are presently utilizing a mix of both wired and wireless systems. Organizations also use mobile network system that receives or connect network via a mobile site (base station), or transmitting tower. [Cisco]
There are various network security issues while security on internet and LAN (local area network). The development of networking and the Internet, risks to data and networks have grown drastically. Countless kind of dangers have ended up being definitely drilled attacks causing hurt or submitting information hack. The Internet continues growing exponentially. As near and dear, government and business-essential applications end up being progressively transcendent on the Internet, there are various brief preferences. Unless, the network based apps and services would provide security dangers to users as well as to the data assets of companies and government firm. Data is a thing that would be secured.
There are risks for many firms such as IT firms, government firms or other private business of losing the resources if there is no proper security mechanism. Network security is the technique by which network resources are secured with the purpose of maintaining integrity, confidentiality and availability of assets. In light of this, it is basic that all networks be shielded from dangers and vulnerabilities all together for a firm to accomplish their highest prospects.
Commonly, these threats are diligent because of vulnerabilities that can emerge from poor configured equipment or programming, bad network plan, innate innovation shortcomings, or end-client inconsiderateness. A router is like numerous PCs that contain different services empowered naturally. A large number of network services are pointless and might be utilized by hacker for data collection or for abuse. Every superfluous service ought to be incapacitated in the router design to keep the hacker from utilizing it to harm the system or to theft the essential data, or system gadgets setup. The document presents the attack on router and how can it be avoided. The router and firewall are basic parts of network tasks and their security. Watchful administration and persistent review of router and firewall tasks, can lessen network downtime, enhance security, lessen the hackers and threats, and help in the investigation of required security breaks.
1.2 Purpose of Report
The main purpose of this document is to present design of network security mechanism for company. The document focuses on network security weakness in network assets, different kind of vulnerabilities in network and techniques to secure networks from threats or vulnerabilities. The document also focuses on the thesis discusses the general technique to design the best security practices
There are different ways of preventing the network threats as listed below:
· Designing good Security policy.
· Employee training on well Internet usage.
· Deploying various security apps like Norton, MacAfee, ESSET, etc.
· Building of VLANs (Virtual LAN) etc.
Chapter 2: Literature Review of wireless Network Security and performance
Due to advancement of technology, everyone has requirement for wired, wireless and mobile networking. All kinds of these networking have their own merits and demerits as per privacy and performance. Wired networking system has various physical asset needs and the drawbacks / merits are alike. The networking systems such as wireless extracts into account the limit, mobility, and the various kinds of asset devices required to build a wireless system or network.
Network threats had been found to be as shifted as the framework that they endeavour to enter. Threats are called to be purposeful or accidental and in fact, skilful competent hackers would be keen in attacking the protocols utilized for protected communication among networking gadgets. This audit addresses how very refined attackers are entering networks despite great types of security. As the attackers get rise, the network professionals are determining various methodologies in preventing hackers from entering firm networks.
2.1 Design of wireless network using star topology
The star wireless network, a general increasingly distorted kind of topology consist of one central focus which connects with no less than at least three PCs and the ability to mastermind printers. This type would be utilized for autonomous organizations and even home frameworks. The star remote system is useful for softwares where some taking care of must be fused and some must be performed locally. The noteworthy fault is the star organizes is its defencelessness. The whole data on network may experience one central host PC and if that have misses the mark the whole network will crash and burn.
The basic hardware layout for wireless type of networks is like to wired network but for a firm to go wireless it need many more hardware assets. As wireless networks give comfort it does open the organization up to security and privacy threats. If there is security faced by company, then there are different alternates that they may fix and mitigate coming security threats.
2.2 categories of security threats
There are different kinds of security threats which show how threats occur on wireless network...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here