skip to main content
10.1145/3429523.3429528acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

A Fault Tolerant and Secured Network Design for File and Application Sharing in a Mid-sized Business Environment

Authors Info & Claims
Published:09 November 2020Publication History

ABSTRACT

This study aims to observe and improve design infrastructure of a mid-sized business focusing on the security and fault tolerant network architecture characteristics. The case site is a recruitment agency in the Philippines, categorized as a mid-sized company that needs improvement in its network design and the main requirement is to link all offices with the headquarters office for more secure file sharing and application sharing. Moreover, due to massive cyberattacks, the design will also consider the use of modern network security tools. The new network design allows secure file sharing between the headquarter office to the other five branches in the Philippines thru implementation of DNS Servers, FTP and Internal Web Server, Simplewall Firewall and NAS Setup, Cobian Backup & DMZ. Branch connectivity uses IPSEC DMVPN tunnels, dynamic routing and only permit authorized VPN connections to access HQ resources. The IPSec DMVPN allows ease and secure file sharing between branches with scalability in mind. In the test validation, the proposed network infrastructure achieved a 100% success rate in its functionality (using ping and tracert utility) based on the simulation conducted in the "GNS3" platform. Finally, based on the vulnerability assessments conducted, the proposed network design has protection from MAC Address Flooding, Ping of Death (DOS) and VPN sniffing.

References

  1. The SMSE Sector at a Glance. Retrieved from https://www.senate.gov.ph/publications/AG%202012-03%20-%20MSME.pdf. March 2012Google ScholarGoogle Scholar
  2. Techopedia. What is Network Design?-Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/30186/network-designGoogle ScholarGoogle Scholar
  3. Computer Sciences. Network Design. Retrieved July 10, 2019 from Encyclopedia.com: https://www.encyclopedia.com/computing/news-wires-white-papers-and-books/network-designGoogle ScholarGoogle Scholar
  4. Techopedia. What is Network Infrastructure? --- Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/16955/network-infrastructureGoogle ScholarGoogle Scholar
  5. Wang, Yanhong & Wang, Hanshi & Liu, Lizhen & Song, Wei & Lu, Jingli. (2015). Research and implementation of network planning and design for community. 847--850. 10.1109/ICCSNT.2015.7490873.Google ScholarGoogle Scholar
  6. Zhang, Q. & Liu, H. 2011. Research on the performance optimization of web server by software realization based cluster system. 2011 International Conference on Electronic & Mechanical Engineering and Information Technology, vol. 5, pp. 2366--2368.Google ScholarGoogle ScholarCross RefCross Ref
  7. M. Xifeng and F. Yuanyuan, "Network management system design and implementation," 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi'an, 2011, pp. 373--375. doi: 10.1109/ICCSN.2011.6013851Google ScholarGoogle Scholar
  8. H. Lin, Z. Yan, Y. Chen and L. Zhang, "A Survey on Network Security-Related Data Collection Technologies," in IEEE Access, vol. 6, pp. 18345--18365, 2018. doi: 10.1109/ACCESS.2018.2817921Google ScholarGoogle Scholar
  9. Shan, Z., & Liao, B. (2016). Design and Implementation of A Network Security Management System. ArXiv, abs/1609.00099.Google ScholarGoogle Scholar

Index Terms

  1. A Fault Tolerant and Secured Network Design for File and Application Sharing in a Mid-sized Business Environment

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CCIOT '20: Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things
      September 2020
      93 pages
      ISBN:9781450375276
      DOI:10.1145/3429523

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 November 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader