ABSTRACT
This study aims to observe and improve design infrastructure of a mid-sized business focusing on the security and fault tolerant network architecture characteristics. The case site is a recruitment agency in the Philippines, categorized as a mid-sized company that needs improvement in its network design and the main requirement is to link all offices with the headquarters office for more secure file sharing and application sharing. Moreover, due to massive cyberattacks, the design will also consider the use of modern network security tools. The new network design allows secure file sharing between the headquarter office to the other five branches in the Philippines thru implementation of DNS Servers, FTP and Internal Web Server, Simplewall Firewall and NAS Setup, Cobian Backup & DMZ. Branch connectivity uses IPSEC DMVPN tunnels, dynamic routing and only permit authorized VPN connections to access HQ resources. The IPSec DMVPN allows ease and secure file sharing between branches with scalability in mind. In the test validation, the proposed network infrastructure achieved a 100% success rate in its functionality (using ping and tracert utility) based on the simulation conducted in the "GNS3" platform. Finally, based on the vulnerability assessments conducted, the proposed network design has protection from MAC Address Flooding, Ping of Death (DOS) and VPN sniffing.
- The SMSE Sector at a Glance. Retrieved from https://www.senate.gov.ph/publications/AG%202012-03%20-%20MSME.pdf. March 2012Google Scholar
- Techopedia. What is Network Design?-Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/30186/network-designGoogle Scholar
- Computer Sciences. Network Design. Retrieved July 10, 2019 from Encyclopedia.com: https://www.encyclopedia.com/computing/news-wires-white-papers-and-books/network-designGoogle Scholar
- Techopedia. What is Network Infrastructure? --- Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/16955/network-infrastructureGoogle Scholar
- Wang, Yanhong & Wang, Hanshi & Liu, Lizhen & Song, Wei & Lu, Jingli. (2015). Research and implementation of network planning and design for community. 847--850. 10.1109/ICCSNT.2015.7490873.Google Scholar
- Zhang, Q. & Liu, H. 2011. Research on the performance optimization of web server by software realization based cluster system. 2011 International Conference on Electronic & Mechanical Engineering and Information Technology, vol. 5, pp. 2366--2368.Google ScholarCross Ref
- M. Xifeng and F. Yuanyuan, "Network management system design and implementation," 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi'an, 2011, pp. 373--375. doi: 10.1109/ICCSN.2011.6013851Google Scholar
- H. Lin, Z. Yan, Y. Chen and L. Zhang, "A Survey on Network Security-Related Data Collection Technologies," in IEEE Access, vol. 6, pp. 18345--18365, 2018. doi: 10.1109/ACCESS.2018.2817921Google Scholar
- Shan, Z., & Liao, B. (2016). Design and Implementation of A Network Security Management System. ArXiv, abs/1609.00099.Google Scholar
Index Terms
- A Fault Tolerant and Secured Network Design for File and Application Sharing in a Mid-sized Business Environment
Recommendations
Laboratory experiments for network security instruction
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing ...
Improving cloud network security using the Tree-Rule firewall
This study proposes a new model of firewall called the 'Tree-Rule Firewall', which offers various benefits and is applicable for large networks such as 'cloud' networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their ...
Comments