Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security Concerns And Policy Enforcement: Patrician LLC

tag 1 Download9 Pages 2,092 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Describe about the Security Concerns and Policy Enforcement for Patrician LLC.

 

Answer:

Scenario:

Patrician LLC is working on developing wireless transmission technology. Now the company wants to transfer headquarter and operational unit to Tucson, Arizona and wants to shift in the new building in Cheyenne, Wyoming. The research and development department of Patrician LLC is working on secure microburst technology. The team members are not living in the Cheyenne, Wyoming. The company is located in two buildings of three floors. The design of the network connection has to be created to maintain the proper connection of 32 mbps throughput between the two buildings. The data-centre should be placed on the third floor in the connection of 100 computers. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. The members of the research and development who are not residing in the city can also be able to connect to the primary data centre. The network design should take file server, external sales server, corporate web servers, database web servers should be taken into consideration. In this paper, we will recommend the solution to convert the system into wireless

a. Topology of the network:

Topology of the network

Topology of the VPN setup:

Topology of the VPN setup:

Hardware Support for the network:

Transmission Media: Twisted pair cable and fiber optic cable is used for network connection

Repeaters: Repeaters works by receiving the electronic signals. The next step is to clean the signal and retransmit the signal to the higher level.

Hub: The multiple devices in the network are connected by using the Hub with the help of the cable.

Switches: Different devices are connected to switch by using the ports.

Bridges: Bridges divide the network into parts to manage the traffic which helps in controlling the congestion.

Routers: The communication device which is used to connect two different networks is known as Routers. The routers work by distributing the incoming data to its destination. Wireless routers are used for providing: wireless connection.

Gateway: The interface which uses different protocols to connect the network is known as gateway.

Modem: The modulation and demodulation of the signal is carried out by Modem.

a. Cabling Details:

The medium is required for communication between devices. The medium is classified as metallic wires within cables, fiber optic cable, and wireless transmission. The topology diagram gives the detail of cabling where it is needed in the proposed network.

Physical Topology: The physical topology diagram gives the clear perspective view of the physical location of the ports, intermediary devices, and installation of the cable.  The actual cabling and transmission of data is represented though the physical topology. It represents the physical layout of the network.

Logical Topology: The logical topology gives the detail view of devices, IP address scheme and ports. Logical topology gives the detail view of communication between the devices placed on the computer network. This topology also comprised of the network protocols which gives the clear perspective view of movement or flow of the data.

Logical Topology

  1. Type of Connection for 32 Mbps connection

Wired local area network is completely replaced by the wireless technology. The wireless radio frequency communication helps in connecting the research and development department of Patrician LLC with headquarter for exchanging relevant information. For the success of the project, the reliability should be maintained main database of the office. Wireless sensor technologies are should be applied within the firm to provide reliable connection with the main stream of the organization of Patrician LLC.  The Proposed solution is based on the principles of outdoor wireless networking technologies. It helps in providing links to the research department members with the primary data centre of the organization which is located in Cheyenne, Wyoming. It helps in providing the 32 mbps of the throughput and the data can be exchanged faster between the nodes. The staff of the main office can share resources among themselves. It is better than the traditional network because it provide connectivity with the members who are sited at a distance from the main office. For providing connection between two buildings which are 1000 miles apart involves the placement of bridges, access point, routers, and integrated directional antennas.

Wiring Closet

The main office and the research and development department are connected wirelessly.

The implementation of the wireless networking involves the placement of bridges, access point, routers, and integrated directional antennas.

Every nodes should have relevant distance between them

With the help of signal strength detector, the optimal position of the wireless devices can be measured.

The placement of the robotic cameras which have the capability of TCP/IP should be placed on the top of wireless devices to align the direction of the antennas.

The equipments which are needed to connect the two buildings are Alarm system, Ethernet router, patch panels, and wireless access points. These equipments are placed at the top of the building.

There will be one wiring closet on each floor of the building.

 

Wireless Technologies:

The proposed solution to Patrician LLC problem of converting the system into wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread. The signal can be forwarded in multiples of time to provide similar information to every site. Every node is capable of sending and receiving signals. This solution helps in overcoming the physical constraints which comes in the exchanging of message over the network.

VPN Setup for the servers:

Remote access VPN: This helps in connecting user with the corporate private network. The encrypted connections are maintained between the users and the private network.

Intranet VPN: The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network.

Extranet VPN: This will provide connection between research and development department with the primary data centre.

Logical security Measures:

Internet Protocol Security:

IPSec helps in securing the transfer of information between the layers of OSI. It provides the facility of authentication, integrity of data, and encryption services for modifying the data. Authentication header and encapsulated security payload are the part of the security mechanism of IPSec. The purpose of the authentication header protocol is to provide authentication of the source and IP packet integrity. The header of the authentication header protocol contains the information such as hash value of the data and sequence number. Encapsulated security payloads provide confidentiality to data, data privacy, authentication to the source and communication between the peers. Symmetric encryption algorithms are used for providing data privacy in encapsulated security payload.

Point to point tunneling protocol:

It is used by the remote user to access the virtual private network of the organization. The PPP session is maintained by using the non TCP/IP protocol. The PPTP uses protocols named as extensible authentication protocol, Handshake authentication protocol, password authentication protocol, and point to point encryption protocol.

Point to point tunneling protocol

Layer 2 tunneling protocol:

L2TP is used for encapsulating the point to point protocol. It is used for sending of the frame over the network. By using this protocol, one tunnel is capable of multiple connections.

Layer 2 tunneling protocol:

Security measures to stop attackers:

Hackers keep an eye on the client machine to take the control of the machine. The Man in the middle is focused on changing the information sent between the communicating devices. The firewalls should be used to strengthen the VPN connection. The intrusion detection and prevention system should be recommended to increase the efficiency of monitoring the system. Installation and updating of anti-virus should be done periodically. Without authentication VPN connection should not be established. Digital certification support should be provided for authentication into virtual private network. Transport layer security and secure socket layer are the cryptographic protocols which are used for providing security to the communication and data transfer on the internet. For ensuring the security to the transmission of data, Leak detection and prevention, information leak prevention, and content monitoring and filtering are used. The attack of virus can be stopped by installing the antivirus program on each computer system, use of firewalls, isolation from the affected drives, scanning of the system regularly, and updating of the virus definition. Penetration testing can be used to find the vulnerabilities. It should be used regularly for internal and external audits.

Physical Security

VPN hub and Spoke topology:

In this topology VPN routers are known as spokes which communicate securely with the primary data centre of the organization. A secured tunnel is maintained between spoke and the hub. In the case study of patrician LLC, the four departments are connected to the primary data centre so the VPN tunnel should be maintained between the departments and the data centre.

VPN hub and Spoke topology

By using this topology, the staff member can access the primary data center of the main office.

VPN Mesh topology:

The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The VPN mesh topology is relevant for connecting four different departments of the organization. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. Three VPN tunnels will be used for securing the communication between different sites. Direct transmission of the data can takes place between any two communication sites.

Connection of Remote user:

Access Point: The device which is used to link the wired LAN with wireless network is known as Access point.

PC card: The laptop user can connect to the wireless network by making use of PC card.

PCI adapter: The desktop user can connect to the wireless network by making use of PCI adapter.

It provides communication between the nodes even if they are widely spread.

The signal can be forwarded in multiples of time to provide similar information to every site.

Every node is capable of sending and receiving signals.

  1. Verification of the security measures:

In the initial phase, the compatibility of the resources is checked in the wired or wireless network. The next phase focuses on the limit of the equipments with respect to the distance and time. The final phase works in testing the bandwidth in different climatic condition.

  1. Justification:

Virtual Private Network is the secure mechanism for connectivity between different LANs and remote users. IPSec and PPTP protocols are used for securing the network. This paper focus on the secured communication which takes place between different departments of Patrician LLC and remote site which is named research and development department. The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network. The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The wireless transmission technology provides flexibility to the networking of the nodes. The result of the proposed solution helps in monitoring the traffic over the network, security, reduction in the interference, and integration of the data. The proposed solution to Patrician LLC problem of converting the system into wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread.

 

References:

Stines, M. (2014). Remote Access VPN - Security Concerns and Policy Enforcement (1st ed.). Retrieved from https://www.sans.org/reading-room/whitepapers/vpns/remote-access-vpn-security-concerns-policy-enforcement-881

Michael, A. (2013). Connecting Remote Offices by Setting Up VPN Tunnels (1st ed.). Retrieved from https://www.cisco.com/c/dam/en/us/td/docs/routers/csbr/app_notes/rv0xx_g2gvpn_an_OL-26286.pdf

Cader, Y. (2008). VPN SECURITY (1st ed.). Retrieved from https://www.infosec.gov.hk/english/technical/files/vpn.pdf

Brilakis, I. (2007). Long distance wireless networking for site office data communication (1st  ed.). Retrieved from https://www.itcon.org/data/works/att/2007_9.content.07653.pdf

Singh, A. (2014). Research Issues a nd Challenges of Wireless Networks A (1st ed.). Retrieved from https://www.ijarcsse.com/docs/papers/Volume_4/2_February2014/V4I2-0175.pdf

Abhinaya, V. (2014). Case Study on Comparison o f Wireless Technologies in Industrial Applications (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.9307&rep=rep1&type=pdf

Shourbaji, I. (2012). An Overview of Wireless Local Area Networks (1st ed.). Retrieved from https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf

Bisht, N. (2015). Analytical study of different network topologies (1st ed.). Retrieved from https://www.irjet.net/archives/V2/i1/Irjet-v2i120.pdf

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Security Concerns And Policy Enforcement: Patrician LLC. Retrieved from https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.

" Security Concerns And Policy Enforcement: Patrician LLC." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.

My Assignment Help (2017) Security Concerns And Policy Enforcement: Patrician LLC [Online]. Available from: https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc
[Accessed 11 December 2019].

My Assignment Help. ' Security Concerns And Policy Enforcement: Patrician LLC' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc> accessed 11 December 2019.

My Assignment Help. Security Concerns And Policy Enforcement: Patrician LLC [Internet]. My Assignment Help. 2017 [cited 11 December 2019]. Available from: https://myassignmenthelp.com/free-samples/security-concerns-and-policy-enforcement-patrician-llc.


MyAssignmenthelp.com houses experts from all possible disciplines to help students in the best possible manner. Owing to our experts' extensive knowledge in their respective field, we are capable of providing subject-wise quality academic assistance such as marketing assignment help, mechanical engineering assignment help, English assignment help, taxation assignment help, electrical assignment help, etc.

Latest Networking Samples

MN502 Overview Of Network Security 3

Download : 0 | Pages : 9

Answer: Introduction The purpose of this report is to discuss about the network of healthcare organisations. A detailed literature review discussing the network of a healthcare organisation is provided. The architecture of a healthcare network is provided in this report. A detailed discussion of the networking devices such as routers, firewalls, switches, and servers is provided in this report. The recent developments in the network of a heal...

Read More arrow

BN305 Virtual Private Network 2

Download : 0 | Pages : 6

Answer: Introduction After a detailed investigation of the infrastructure of the organization and identification of the needs of the network the report is prepared. The current needs of the organization is to establish a VPN connection between remote sites of the same organization and securely transmission of the data packets in the network. The success of the development of the network depends on the successful implementation of the VPN. The V...

Read More arrow

CITS5502 Software Processes

Download : 0 | Pages : 4
  • Course Code: CITS5502
  • University: University Of Western Australia
  • Country: Australia

Answer: Introduction: In this task the main objective is to perform task 1 and task 2 to have an insight about the time needed to write problems in different languages when written repeatedly. In particular at first 7 random students’ required time to write problem 1 in language A and B and problem 2 in language A is selected from a total of 14 students’ data. Then the average time is calculated for each attempt for the three task...

Read More arrow

MN621 Advanced Network Design1

Download : 0 | Pages : 5

Answer: Part 1 Set of Questionaries’ for gathering of requirement from various users What kind of software application are needed to be installed in the given workstation? How many users are needed for building a group and creating a proper network access? What are kind of network device and hardware needed for establishing proper kind of communication between several LAN in the given network? What are the present constraint encou...

Read More arrow Tags: Australia Melbourne Management University of Melbourne 

ICT703 Network Technology And Management

Download : 0 | Pages : 13

Answer: Introduction Every business requires a platform that will enable it to communicate and share resources. Having a good network design and infrastructure will enable the company to meet these objectives. A network increases company productivity by enhancing business processes though automation and resource sharing (Pop, 2012). Over the year, network technology has evolved to meet the ever-changing business operations that are become com...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,161,673

Orders

4.9/5

Overall Rating

5,051

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

234 Order Completed

100% Response Time

Samantha Ji

PhD in Chemistry with Specialization in Organic

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

THIS ASSIGNMENT WAS GOOD AND I GOT THE MAKE 66% OUT OF ONE HUNDRED. HOPE NEXT ASSSIGMENT WILL GET MORE

flag

User Id: 195464 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Quality formatting now, and easy to understand the values being added to balance and adjusted ledgers.

flag

User Id: 350523 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Great Job, Great Job, Great Job, No Plagio, Very Professional, I recommended. Great Job, Great Job

flag

User Id: 354366 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Hi thank you for helping out with mi assignment the content is good but after but the plagiarism is too high. Then among the internet sources there is ur site appearing.This then defeat s the purpose of using you guys as if the assignment can be tra...

flag

User Id: 257832 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?