country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security Concerns And Policy Enforcement: Patrician LLC

tag 1 Download9 Pages / 2,092 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Describe about the Security Concerns and Policy Enforcement for Patrician LLC.

 

Answer:

Scenario:

Patrician LLC is working on developing wireless transmission technology. Now the company wants to transfer headquarter and operational unit to Tucson, Arizona and wants to shift in the new building in Cheyenne, Wyoming. The research and development department of Patrician LLC is working on secure microburst technology. The team members are not living in the Cheyenne, Wyoming. The company is located in two buildings of three floors. The design of the network connection has to be created to maintain the proper connection of 32 mbps throughput between the two buildings. The data-centre should be placed on the third floor in the connection of 100 computers. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. The members of the research and development who are not residing in the city can also be able to connect to the primary data centre. The network design should take file server, external sales server, corporate web servers, database web servers should be taken into consideration. In this paper, we will recommend the solution to convert the system into wireless

a. Topology of the network:

Topology of the network

Topology of the VPN setup:

Topology of the VPN setup:

Hardware Support for the network:

Transmission Media: Twisted pair cable and fiber optic cable is used for network connection

Repeaters: Repeaters works by receiving the electronic signals. The next step is to clean the signal and retransmit the signal to the higher level.

Hub: The multiple devices in the network are connected by using the Hub with the help of the cable.

Switches: Different devices are connected to switch by using the ports.

Bridges: Bridges divide the network into parts to manage the traffic which helps in controlling the congestion.

Routers: The communication device which is used to connect two different networks is known as Routers. The routers work by distributing the incoming data to its destination. Wireless routers are used for providing: wireless connection.

Gateway: The interface which uses different protocols to connect the network is known as gateway.

Modem: The modulation and demodulation of the signal is carried out by Modem.

a. Cabling Details:

The medium is required for communication between devices. The medium is classified as metallic wires within cables, fiber optic cable, and wireless transmission. The topology diagram gives the detail of cabling where it is needed in the proposed network.

Physical Topology: The physical topology diagram gives the clear perspective view of the physical location of the ports, intermediary devices, and installation of the cable.  The actual cabling and transmission of data is represented though the physical topology. It represents the physical layout of the network.

Logical Topology: The logical topology gives the detail view of devices, IP address scheme and ports. Logical topology gives the detail view of communication between the devices placed on the computer network. This topology also comprised of the network protocols which gives the clear perspective view of movement or flow of the data.

Logical Topology

  1. Type of Connection for 32 Mbps connection

Wired local area network is completely replaced by the wireless technology. The wireless radio frequency communication helps in connecting the research and development department of Patrician LLC with headquarter for exchanging relevant information. For the success of the project, the reliability should be maintained main database of the office. Wireless sensor technologies are should be applied within the firm to provide reliable connection with the main stream of the organization of Patrician LLC.  The Proposed solution is based on the principles of outdoor wireless networking technologies. It helps in providing links to the research department members with the primary data centre of the organization which is located in Cheyenne, Wyoming. It helps in providing the 32 mbps of the throughput and the data can be exchanged faster between the nodes. The staff of the main office can share resources among themselves. It is better than the traditional network because it provide connectivity with the members who are sited at a distance from the main office. For providing connection between two buildings which are 1000 miles apart involves the placement of bridges, access point, routers, and integrated directional antennas.

Wiring Closet

The main office and the research and development department are connected wirelessly.

The implementation of the wireless networking involves the placement of bridges, access point, routers, and integrated directional antennas.

Every nodes should have relevant distance between them

With the help of signal strength detector, the optimal position of the wireless devices can be measured.

The placement of the robotic cameras which have the capability of TCP/IP should be placed on the top of wireless devices to align the direction of the antennas.

The equipments which are needed to connect the two buildings are Alarm system, Ethernet router, patch panels, and wireless access points. These equipments are placed at the top of the building.

There will be one wiring closet on each floor of the building.

 

Wireless Technologies:

The proposed solution to Patrician LLC problem of converting the system into wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread. The signal can be forwarded in multiples of time to provide similar information to every site. Every node is capable of sending and receiving signals. This solution helps in overcoming the physical constraints which comes in the exchanging of message over the network.

VPN Setup for the servers:

Remote access VPN: This helps in connecting user with the corporate private network. The encrypted connections are maintained between the users and the private network.

Intranet VPN: The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network.

Extranet VPN: This will provide connection between research and development department with the primary data centre.

Logical security Measures:

Internet Protocol Security:

IPSec helps in securing the transfer of information between the layers of OSI. It provides the facility of authentication, integrity of data, and encryption services for modifying the data. Authentication header and encapsulated security payload are the part of the security mechanism of IPSec. The purpose of the authentication header protocol is to provide authentication of the source and IP packet integrity. The header of the authentication header protocol contains the information such as hash value of the data and sequence number. Encapsulated security payloads provide confidentiality to data, data privacy, authentication to the source and communication between the peers. Symmetric encryption algorithms are used for providing data privacy in encapsulated security payload.

Point to point tunneling protocol:

It is used by the remote user to access the virtual private network of the organization. The PPP session is maintained by using the non TCP/IP protocol. The PPTP uses protocols named as extensible authentication protocol, Handshake authentication protocol, password authentication protocol, and point to point encryption protocol.

Point to point tunneling protocol

Layer 2 tunneling protocol:

L2TP is used for encapsulating the point to point protocol. It is used for sending of the frame over the network. By using this protocol, one tunnel is capable of multiple connections.

Layer 2 tunneling protocol:

Security measures to stop attackers:

Hackers keep an eye on the client machine to take the control of the machine. The Man in the middle is focused on changing the information sent between the communicating devices. The firewalls should be used to strengthen the VPN connection. The intrusion detection and prevention system should be recommended to increase the efficiency of monitoring the system. Installation and updating of anti-virus should be done periodically. Without authentication VPN connection should not be established. Digital certification support should be provided for authentication into virtual private network. Transport layer security and secure socket layer are the cryptographic protocols which are used for providing security to the communication and data transfer on the internet. For ensuring the security to the transmission of data, Leak detection and prevention, information leak prevention, and content monitoring and filtering are used. The attack of virus can be stopped by installing the antivirus program on each computer system, use of firewalls, isolation from the affected drives, scanning of the system regularly, and updating of the virus definition. Penetration testing can be used to find the vulnerabilities. It should be used regularly for internal and external audits.

Physical Security

VPN hub and Spoke topology:

In this topology VPN routers are known as spokes which communicate securely with the primary data centre of the organization. A secured tunnel is maintained between spoke and the hub. In the case study of patrician LLC, the four departments are connected to the primary data centre so the VPN tunnel should be maintained between the departments and the data centre.

VPN hub and Spoke topology

By using this topology, the staff member can access the primary data center of the main office.

VPN Mesh topology:

The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The VPN mesh topology is relevant for connecting four different departments of the organization. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. Three VPN tunnels will be used for securing the communication between different sites. Direct transmission of the data can takes place between any two communication sites.

Connection of Remote user:

Access Point: The device which is used to link the wired LAN with wireless network is known as Access point.

PC card: The laptop user can connect to the wireless network by making use of PC card.

PCI adapter: The desktop user can connect to the wireless network by making use of PCI adapter.

It provides communication between the nodes even if they are widely spread.

The signal can be forwarded in multiples of time to provide similar information to every site.

Every node is capable of sending and receiving signals.

  1. Verification of the security measures:

In the initial phase, the compatibility of the resources is checked in the wired or wireless network. The next phase focuses on the limit of the equipments with respect to the distance and time. The final phase works in testing the bandwidth in different climatic condition.

  1. Justification:

Virtual Private Network is the secure mechanism for connectivity between different LANs and remote users. IPSec and PPTP protocols are used for securing the network. This paper focus on the secured communication which takes place between different departments of Patrician LLC and remote site which is named research and development department. The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network. The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The wireless transmission technology provides flexibility to the networking of the nodes. The result of the proposed solution helps in monitoring the traffic over the network, security, reduction in the interference, and integration of the data. The proposed solution to Patrician LLC problem of converting the system into wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread.

 

References:

Stines, M. (2014). Remote Access VPN - Security Concerns and Policy Enforcement (1st ed.). Retrieved from https://www.sans.org/reading-room/whitepapers/vpns/remote-access-vpn-security-concerns-policy-enforcement-881

Michael, A. (2013). Connecting Remote Offices by Setting Up VPN Tunnels (1st ed.). Retrieved from https://www.cisco.com/c/dam/en/us/td/docs/routers/csbr/app_notes/rv0xx_g2gvpn_an_OL-26286.pdf

Cader, Y. (2008). VPN SECURITY (1st ed.). Retrieved from https://www.infosec.gov.hk/english/technical/files/vpn.pdf

Brilakis, I. (2007). Long distance wireless networking for site office data communication (1st  ed.). Retrieved from https://www.itcon.org/data/works/att/2007_9.content.07653.pdf

Singh, A. (2014). Research Issues a nd Challenges of Wireless Networks A (1st ed.). Retrieved from https://www.ijarcsse.com/docs/papers/Volume_4/2_February2014/V4I2-0175.pdf

Abhinaya, V. (2014). Case Study on Comparison o f Wireless Technologies in Industrial Applications (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.9307&rep=rep1&type=pdf

Shourbaji, I. (2012). An Overview of Wireless Local Area Networks (1st ed.). Retrieved from https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf

Bisht, N. (2015). Analytical study of different network topologies (1st ed.). Retrieved from https://www.irjet.net/archives/V2/i1/Irjet-v2i120.pdf

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Security Concerns And Policy Enforcement: Patrician LLC. Retrieved from https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.

" Security Concerns And Policy Enforcement: Patrician LLC." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.

My Assignment Help (2017) Security Concerns And Policy Enforcement: Patrician LLC [Online]. Available from: https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc
[Accessed 15 August 2020].

My Assignment Help. ' Security Concerns And Policy Enforcement: Patrician LLC' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc> accessed 15 August 2020.

My Assignment Help. Security Concerns And Policy Enforcement: Patrician LLC [Internet]. My Assignment Help. 2017 [cited 15 August 2020]. Available from: https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.


MyAssignmenthelp.com houses experts from all possible disciplines to help students in the best possible manner. Owing to our experts' extensive knowledge in their respective field, we are capable of providing subject-wise quality academic assistance such as marketing assignment help, mechanical engineering assignment help, English assignment help, taxation assignment help, electrical assignment help, etc.

Latest Networking Samples

HIST 0824 Analysis Of Sumerian Temple

Download : 0 | Pages : 2

Answer: Introduction: The artwork that I intend to discuss and that is documented in the book of Sayre is Discovering Humanities is the Sumerian Ur, the Sum. The temple of Sumer is reflective of the love of temples by the Sumerians. The Sumerians inhabited along the region between Euphrates and Tigris. They had no building stone area and therefore, the Sumerians used clay to build their buildings (Sayre, 2016). Sumerian architects also used m...

Read More arrow

MITS5003 Wireless Networks And Communication 4

Download : 0 | Pages : 2
  • Course Code: MITS5003
  • University: Victorian Institute Of Technology
  • Country: Australia

Answer: A The value of free space path loss may be gathered using distance and frequency and in the given question there are two distances and frequencies which are given below: Distances= 8 km and 16 km Frequencies= 3.6 GHz and 4.2 GHz Therefore, the value of FPSL can be obtained using the above formula and the below table indicates free space path loss at different distance and frequency:       &n...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

BIT243 Network Security

Download : 0 | Pages : 7

Answer: Introduction Macros Computer Solutions is a company that specializes in the delivery of computer accessories to its clients. All the transactions are managed by a web application software which is hosted by the company. For smooth running of the company’s activities, the company set up a network which is made up the following: Cisco 1900 Series Router, Cyberoam Firewall, a server Computer, Telephony server, a Network Access Stor...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

COSC 2671 Social Media And Network Analytics

Download : 0 | Pages : 4

Answer: Introduction Social media platforms like Twitter generates massive amount of data at every second due to the posts by its users.  There are almost 7986 tweets/second are posted on the twitter by its users (while twitter only allows 140 characters for each tweet). For this sentiment analysis of the twitter data we selected the recent ball tampering event happened in between the Australia and South Africa test match. Data collecti...

Read More arrow Tags: Australia Melbourne Management University of Melbourne 

MITS5003 Wireless Networks And Communication 3

Download : 0 | Pages : 8
  • Course Code: MITS5003
  • University: University Of Victoria
  • Country: Canada

Answer: Introduction Wireless networks and communication is a broad topic that basically explains communication using wireless devices. It can mainly be subdivided into main bits. One is wireless communication and the other one is communication. Wireless communication is a type of communication that is performed and delivered wirelessly (Acemoglu, Malekian, & Ozdaglar, 2016). This terms broadly defined all procedures and forms of communic...

Read More arrow Tags: Australia Lakemba 45 wireless network and communication University of Victoria 
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,386,698

Orders

4.9/5

Overall Rating

5,086

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

440 Order Completed

99% Response Time

Jack Arens

MBA in HRM

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!

flag

User Id: 383727 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied

flag

User Id: 463334 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.

flag

User Id: 194216 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.

flag

User Id: 411395 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?