blog
media download page
Essay / Telecommunications Network Security Issues Faced by Organizations and Their Possible Solutions .Transport LayerSwitchesAccess PanelCore Network DesignInternet InfrastructureAccess Network DesignTechnologyTechnology RationaleNetwork ImplementationNetwork AnalysisTechnology AcceptanceTraining CriteriaConclusionComputer networks play an important role in the technological sphere. Ensuring network connectivity in an organization has become one of the most critical challenges in recent times. When we talk about computer networks, the simplest thing that comes to our mind is the connection between computers, which is increasing significantly day by day. Many governments and companies are taking rigorous measures when it comes to network security. Despite these measures, network security remains a major concern for many people. This document basically describes the network security problems faced by organizations and their possible solutions. Additionally, it focuses on the latest innovative network security procedures, trends and principles in network security. As such, security and performance should be highly considered when implementing a network. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayIntroductionCurrently, we are able to send and receive data including email, audio or video with the click of a push button. The Internet is the fastest growing infrastructure in recent times. Many innovative technological inventions are changing the way we do things. However, due to these increasing technological innovations, we tend to be unable to protect our data in any commendable manner. Lately, many transactions are done through the Internet, which is why an extraordinary quality computer network is mandatory for operational and safe transactions. Therefore, network security has proven to be a modern problem. The networking field is not only about information protection, but also about many diverse areas. New technologies, for example mobile telephony, financial technology, cloud storage and e-commerce, also require high telecommunications networks. Since these solutions store people's secret data, their network security has become mandatory. The development of next-generation networks and the protection of fundamental data are necessary for the security and economic well-being of every republic. Ensuring efficient next-generation telecommunications networks is critical to the regime's tasks and strategies.BackgroundThe communications sector is an important enabler of economic and social activity in Australia. Telecommunications plays a decisive role in everyone's life, while communications have always been necessary in business. The rapid adoption of telecommunications technologies is transforming business models and increasing business innovation in Australia. Telecommunications broadly includes the following activities: Telecommunications services, as well as the infrastructure necessary to implement these services, including free television and cable television. In addition, the production anddistribution of Australian content such as film, television and print. Although the direct contribution of telecommunications to the Australian economy and employment is quite negligible, telecommunications exerts a great influence on other socio-economic sectors as a catalyst for socio-economic development. growth. Several industries depend on the telecommunications sector and their functioning would be affected without it. For example, the common use of e-commerce and social media; most of its impact is felt in the information, media and telecommunications sectors. There is a need to implement a next generation telecommunications network in Australia to ensure the growth of the economy and other socio-economic sectors. Here are the objectives of the Telecommunications Network Project (NGN): implementation of a faster accessible telecommunications network. Ensure user acceptability. Integration of the telecommunications network with existing networks. Design Overview NGN captures a range of network designs, services, and properties in a layered architecture. Netflow/IPFIX flow records provide an integrated way to access data transmission from the next generation network. This transmission data is collected from the network using dedicated network tools supporting streams. Transmission data is retrieved by a transmission analysis system for billing, congestion detection and network security. The transmission data is retrieved from the provider side and sent to the intrusion detection system. The Provider-edge is a router connected to the network. The particular intrusion detection system evaluates the transmission information transmitted through the provider-edge and gives an alert if an unauthorized or malicious transmission is detected. Network LayersService Delivery LayerTechnologies used in the Service Delivery Layer: VOIPVODMMSIPTV.Service Layer is an abstract layer in a network. architecture. Its goal is to provide middleware that helps third-party advanced services and systems at an advanced application level. The service layer offers competent servers belonging to a telecommunications network service provider. This is retrieved through open APIs (Application Programming Interfaces) and protected through application layer servers owned by the third-party telecommunications network service provider. The service layer also allows interface with key networks at a minor resource level. Control Plane Layer Technologies used in the Control Panel Layer: RoutersThe control plane is the part of the network that transmits signals and is responsible for transmitting signals. Control packets are initiated at the router or sent to a router. The objectives of the control plane are management and configuration of the system. The control plane, the management plane and the data plane are the three simple constituents of a telecommunications design. The management plane and the control plane support the data plane. The data plane that contains the signals carried in the existing network. The management plan contains the administrative signals and constitutes a subdivision of the control plan. In standard telecommunication networks, the three mentioned plans are executed in the firmware of switches and routers. SDN (Software-Defined Networks) separates the control plane and the data. Extracts the control plan from the telecommunications network hardware and integrates it into its software. This allows programmatic access to thetelecommunications network. As such, it allows network management to be easier and more efficient. Transport Layer Technologies used in the control panel layer: Switches The transport layer is the level of the Open System Interconnection (OSI) model responsible for end-to-end communication over the telecommunications network. This provides consistent communication between application procedures running on different hosts in a layered design of additional protocols and network devices. The transport layer is also responsible for providing quality and reliability to the end user. Additionally, it is reliable for administering error correction. The transport layer allows the host to transmit and accept error-corrected information, messages, and packets over the network connection. It is the network module that facilitates multiplexing. Access PanelThe access panel, which is the lowest level of Cisco's three-tier network representation, ensures packets are forwarded to the user's computing devices final. The access panel layer is sometimes called the desktop layer because it focuses on connecting client nodes to the telecommunications network. Access panel devices include multi-station access units, switches and hubs. Core Network Design The core, aggregation, and access layers are the layers of the data center architecture. These layers are referred to generally throughout this document and are concisely defined as follows: The Core Layer: This layer provides the packet switching backplane for all transmissions throughout the data center. The core layer provides connection to a series of suit elements and provides a strong layer three material with no single point of failure. This core layer facilitates internal routing protocols, such as EIGRP or OSPF, and load balances traffic between the core aggregation and site layers using Cisco Express Forwarding hashing algorithms. •Aggregation layer modules — This layer performs vital tasks, such as embedding service modules, spanning-tree relief, default gateway repeating, and Layer 2 domain definitions. Multi-level server-to-server traffic is transmitted through the aggregation layer. It is able to use services, such as firewall and server load balancing, to improve and protect systems. The access layer — In this layer, the servers are physically connected to the telecommunications network. These server appliances contain blade servers with core switches, 1RU servers, blade servers with pass-through cabling, mainframes with OSA adapters, and cluster servers. The access layer telecommunication network configuration includes sectional switches, integrated blade server switches and 2RU switches. The switches also offer Layer 3 and Layer 2 fabrics, satisfying different server broadcast domains and administrative needs. Network RequirementsTo provide our buyers with more opportunities to obtain our services, we tend to want to provide e-commerce services. To try to do this, we would like to have a very secure network given the security level of our product. This technique can also facilitate the American harvest of staff and different prices that we can spread over different budgets or bonuses and even raises for our staff. We will implement our own security protocols on security levels. Our servers will beinternal for any security measures. Digital certificates, SSL enhancement and therefore vulnerability scanning must be taken into account once this network is installed. We will first check the DNS servers or name system servers. This interprets domain names into IP addresses. There are plenty to choose from, but we are going to have our own internal native DNS server for our secure network. We will use Century Link for our ISP and use their DNS for our unclassified network. We are going to run DHCP servers on an Internet application server. We will run network protocols through a mix of OSPF and BGP and static routes. (Bishop)We will create non-public IP addresses for host machines that go through a NAT once they leave the network. We will have a regional CA authority and whatever services are required for the client. All active hosts can have native CA authority. These certificates should be required to be updated often. Users will also use 2-issue authentication. This can be handled by the cyber team. Technical and commercial groups will be formed for customer support. They will also monitor the system and prevent any problems from occurring, always during updates and the release of these updates. For complete security, we will have all the support in-house. Once the budget is approved, we can begin selecting and building these items. Regarding planning, we will have internal servers for security measures. They want an external firewall and demilitarized zone, or zone, and active and passive IDS, or intrusion detection system, like the Cisco 7030. There should also be a firewall installed containing an ACL , or access management list, as part of declaration, express refusal traffic to refuse certain traffic on ports. The department can use Splunk as computer code. It will actively monitor traffic and automate alerts to US government personnel. It will also monitor for cyberattacks. They will also be placed in HBSS (host-based security system), which can cover all antiviruses and firewalls. The network may need to connect to the Internet. The network must also be web filtered, as it must be US state or data assurance compliant and auditable for legal and security reasons. All traffic through the system must be DISA, or Defense Data System Agency, category compliant, and therefore compliant with the proprietary telecommunications network. OSPF and BGP are used together for many dynamic routings. The advantages of OSPF as a routing protocol are that it is open source and universal across all devices. It also automatically discovers Next Hop devices. The downside to OSPF is that once their network list starts getting giant, you start to get bogged down as it tries to keep it up to date. (OSPF)BGP is primarily used as a link between giant networks, but it can even be used on the backplane of many servers. Its main advantage is that you will have a list of networks as giant as you want. OSPF which you can use in a very native network and BGP which you would use for wider WAN routing to attach the nodes, so you may want to use these 2 together. Static routing involves indicating virtually every start and destination goal. You say it wherever you want it to travel. The good thing is you just have consistency. The downside is that it creates a terribly difficult growlbecause you must constantly be forced to make changes to stay awake. It's awfully easy once you use a few devices, but once you have a lot of devices it becomes difficult to use. This will create a bottleneck and you will not be able to perform quality of service checks. OSPF can mechanically jointly in OSPF if you have a tool, it will be the next network path, statically, once it's down, it's down. We will use Cisco routers for our scientific routing. We will use all Cisco instruments to maintain uniformity and ensure everything will be compatible. Routers use routing tables to see a next hop address to which the packet should be forwarded. Routers maintain a routing table and store it in RAM. it is often the practice to confirm a path to a destination network. (CCNA)Microsoft allows you to issue and revoke digital certificates. These are often used to modify SSL sessions and demonstrate the identity of your computer network, extranet or an online website. Certificate services run on a chosen certificate server. These servers are often mutually organized with 4 styles of certificate authorities. The enterprise root CA is the server at the base of a Windows domain hierarchy. Internet Infrastructure The Internet can be an international network of PC devices with distinct network addresses; scientific discourse. PC devices in the telecommunications network connect to the web through an online service provider. A computer is assigned a short-lived Internet protocol once it is connected to the Web directly through an online service provider. However, PC devices have a permanent Internet protocol connected to the Web via a space network. The TCP/IP stack includes: The applications protocol layer: This allows computers to access the global network, emails and therefore file transfer protocols. TCP Layer: The transmission management protocol forwards frames to the destination media access management address (MAC address) using a PC device's specific port variety. IP Layer: This directs packets to a particular computer device using its scientific address. Hardware Layer: During this layer, the area unit of frames is reborn from binary type into network signals. They include LAN cables, modems and Wi-Fi routers. Access network design Technology The telecommunications network needs the following infrastructure to connect to a dedicated Internet line: Backup server: The network needs a backup server, so users will be able to access the shared data just in case of a clear period of time. This backup server should be strategically connected to the switch so that it is accessible to all or all licensed computers on the network. Firewall: The web association software system must have its firewall enabled to secure connected devices from malicious intrusion via the web. Additionally, antivirus, antispyware, and antimalware should be installed to confirm that web access is secure. Operating system: Laptops want operational systems for dial-up access sessions. In addition, the navigation software system such as Net Soul is required as an interface for users to access the network. Ethernet: Computers must be required to be connected to the router and backup server via a spatial network. This association is created via LAN cables.Switch: A switch is a..
Navigation
« Prev
1
2
3
4
5
Next »
Get In Touch