StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Big Switch Network Design - Report Example

Cite this document
Summary
This report "Big Switch Network Design" discusses network design for Bigswitch SME. The primary objective for the newly designed network is to minimize or prevent MAC layer attacks, Virtual LAN attacks, Spoofing attacks, securing network switches, and configuring Virtual LAN across the network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Big Switch Network Design
Read Text Preview

Extract of sample "Big Switch Network Design"

? Full Paper Big Switch Network Design Figure 1 illustrates the proposed enterprise network design for Bigswitch SME. The primary objective for the newly designed network is to minimize or prevent MAC layer attacks, Virtual LAN attacks, Spoofing attacks, securing network switches and configuring Virtual LAN across the network. For providing security mechanism to the internal data communication, Virtual local area networks (VLAN) are recommended. The VLAN separates the domain of the departments within the organization. VLAN uses encryption techniques for transmitting data over the network. Access policy list is also configured in the VLAN for defining the routes. Moreover, VLAN is considered as a broadcast domain. It concludes that the broadcast generates from one computer can only be received to the destination which is defined by some criteria in the broadcast domain. The advantage of VLAN implementation includes an efficient way of bandwidth utilization and eliminating the network from possible broadcast storms, which results in denial of service. Furthermore, by implementing VLANs, the capacity of switching technology is utilized to its full potential. VLAN also supports ‘VLAN trunking protocol’. The ‘VLAN trunking protocol’ will significantly reduce administration for the switched network. Addressing Security Issues and Deployment Approach for WAN A router is a core computing and packet processing devices in the Bigswitch computer network. Router connects two or more networks with different subnets, enabling the networks to expand on an enterprise level. Logically the router builds a routing table, where it stores all the route addresses. For example, the data packet source and destination is stored in the routing table. The network administrator can statically define the network addresses which are called as ‘static routes’. The dynamic routing protocol is used for the automation of exchanging data packets with other routers located in campuses of Bigswitch. The selection criterion of the router depends on the network requirements. The data transmission gauge, which is also called the maximum transmission unit (MTU), is also considered for optimal network efficiency. To support the current scenario, the router must support redundancy and security features for the Bigswitch enterprise network. As the current network design incorporates a core backbone, it is essential for the network to be operational and efficient. Cisco 3845 integrated service router will fulfill all the network requirements. The Cisco 3845 Integrated Services Router provides optimal performance for parallel services on the local area network including security, voice and enhanced services. Improved speculation is achievable by increased performance and modularity. The Cisco 3845 ISR consist of robust ‘WAN’ slots to improve density. The router supports over 90 modules for enhanced and latest network functionality. The router supports both copper and fiber interface. Keeping in mind that the cost must be kept to a minimum, the router supports power over Ethernet (POE). It is the revolutionary technology integrating data, voice and power on a standard CAT 5 Ethernet infrastructure. This technology provides power to the devices connected on the network in parallel. The security aspect is attractive as the router has built in features for data encryption. The router also supports up to 2500 Virtual Private Network tunnels for creating connectivity with campuses of Bigswitch enterprise network. However, the AIM-HPII-PLUS Module is required to support VPN capability in the router. VPN is further elaborates as it is created to improve security and productivity by combining Cisco VPN technology. Cisco VPN has proved to be a reliable name in the industry to connect remote offices, remote users and remote sites in a secure way. VPN is most widely used for remote connectivity solutions in all sizes of organizations. It is affordable due to the provision of public switched telephone networks (PSTN) (Tiso, n.d.). The deployment of router will be carried out by connecting the hot site initially with the current operational network. After establishing connectivity with the hot site, router will be replaced by the vendors or the staff available at big Switch. Moreover, cost savings and productivity is also supported encryption and authentication techniques that defend data in transportation from unauthorized access and attacks. The Cisco based VPN server uses highly secure communication mechanism with integrated access rights to specific users. The network administrator can quickly add remote sites and users without expanding the current infrastructure. It will improve productivity by extending the current network, applications and collaborative tools. These features enable to reduce the communication cost by a significant level along with improving the efficiency of administrative tasks and configuration. The Bigswitch can adopt VPN technologies. As per Fig. 1.1, VLAN configuration is carried out in data switches and it is also configured in the ports of the router. In order to secure the network from threats associated with VLAN, for instance, VLAN hopping is a type of network attack in which the workstation of the end user broadcast data packets to another VLAN instead of the legitimate VLAN. As VLAN do not allow data packets to be send at another VLAN, the traffic is marked with another VLAN ID that belongs to the end user workstation. Similarly, in this scenario, an attacker may act like a data switch and can convey trunking for sending and receiving data from other VLANs. In order to mitigate attacks associated with VLAN, configuration needs to be done in the router and the switch as well. The first primary objective is to dedicate VLAN identifications for all available trunk ports. Moreover, there is also a requirement of de activating all the unused switch ports and allocate port numbers in unused VLANs. Furthermore, all the ports already accessible by the users must be set to non-trunking mode by de activating DTP (Network security at the data link layer (layer 2) of LAN). For addressing Media Access Control (MAC) spoofing attacks, there is a requirement of analyzing the functionality and approach of the threat. MAC spoofing attack incorporates learning of a MAC address pertaining to another host for making an attempt to the target switch. The switch will forward the frames destined for the host connected remotely to the attacker. In process of sending frames with dissimilar source address, the attacker gets the chance to overwrite the Content Addressable Memory (CAM) table entry (Network security at the data link layer (layer 2) of LAN). The modification to the CAM table enables the attacker to forward destined data packets of the host to the attacker. As per Fig. 1.1, port security is incorporated to every layer 3 switch to eliminate or minimize MAC spoofing. Likewise, port security is capable of specifying the MAC address for workstations that are connected to a specific port. If there is any violation in terms of connecting other workstation other than the authentic one, logs are generated that can be viewed by the network administrators for rectification. The perimeter network shown in Fig 1.1 demonstrates interior router that is connected to the internal network and exterior router is connected to the external network, i.e. Internet, campuses, sale contractors. The perimeter network provides robust security by deploying a bastion host between the two routers. Bastion host is similar to intrusion detection system and reports immediate whenever anomalies are detected within the network. However, Demilitarize Zone (DMZ) is also ideally placed at the perimeter network, when operating on a domain based computer network. The demilitarized zone operates as a part of a firewall configuration in order to secure the local area networks. If a DMZ is configured on the whole network or on specific workstations, they are known to be in a DMZ. Moreover, the zone also facilitates workstations that are configured behind the firewall to initialize request that are considered as outbound traffic to the DMZ. The functionality of DMZ is similar to a proxy server, as the workstations configured in DMZ interact with the public networks. Furthermore, the most significant advantage for a DMZ is that it protects the local area network domains by segregating the network layer (RE: [FW1] DMZ advantages). Likewise, the disadvantages associated with DMZ are not significant, but one issue can be highlighted, as the segregation may create a hassle for the network administration because DMZ requires frequent updates and maintenance. Moreover, the hardware cost is high and requires dedicated hardware in order to implement DMZ within the network. Deployment includes a switch, separate firewall and IDS etc. In order to protect the computer network, organizations emphasize on implementing hardware and software application as well as a framework in terms of surveillance security. Network security issues can lead to many different aspects. For example, if the server containing customer data is breached, organization will lose its credibility and trust among the customer and that will result in business loss. Similarly, if a critical system storage device is stolen by internal or external sources, organization’s financial data along with goals and objectives can be revealed to other competitors. In the proposed network design for Bigswitch, surveillance security is incorporated for protecting unauthorized access to switches located at each department. The surveillance security will provide following features: It will track unauthorized access of employees to departments Monitor activities of employees related to physical interference with critical hardware components User activity on the network and unusual behaviors will be monitored User authentication and Authorization will be implemented IP cameras to monitor their critical information assets on the network. Addressing Deployment Approach for Departments Star topology is recommended for the wired local area network. It is the most widely adopted topology. The star topology supports the centralized provision of network resources and services. The support staff can manage the network administrative and troubleshooting tasks centrally. Star topology helps to implement centralized security architecture for improved and enhanced security of the network. The network implementation cost can be saved by provisioning the core systems located centrally. The security controls and backup systems are also located centrally for better troubleshooting and management. For deploying the local network for Bigswitch, CAT 5 cable is the best option. It supports both voice and data transmission. CAT-5 is in the form of twisted pairs. This cable consists of 4 copper wire pairs, connecting the network node with RJ 45 connectors.CAT-5 supports up to 100 to 1000 MHz speeds in a ‘full duplex’ mode (Category 5 cable.2007). The Bigswitch enterprise network will corresponds to request related to internet applications, online transactions, requests by sale contractors, file transfer protocol and Emails. CAT 5 can support these features with ease. However, CAT 5 cable can support up to 300 feet equal to 100 meters in distance. A requirement of the switch is mandatory for every 300 feet. Data switches perform packet distribution tasks within the local area network. Acting as a core backbone, Bigswitch network requires fast Ethernet switches to support the internet and external communication. The Cisco Catalyst 3750 v2 series switch is recommended to cater the requirements for the current scenario as well as for the future. The deployment of switches will be carried out by disconnecting one department at a time on a non-working day, as the installation will be conducted by the vendors or the staff available at Bigswitch. From each of these available departments, human resource department will be the first one to be replaced with the new switch supporting VLAN and addressing security issues. The next department will be the technology department itself for enabling compatibility with the human resource department switch, as proper configuration and testing is required. Each department follows the similar approach with finance department to be the last one. Cisco Catalyst 3750 is the OSI layer 3 stackable switch, supporting the energy efficiency factor. Stackable means that more switches can be added to the current switch configuration for providing more network nodes. This switch supports the Cisco Energy Wise technology, which assist in the provision of power management of the big switch network. At the same time, the Cisco energy wise technology reduces the cost and carbon foot prints. The latest invention to the energy wise technology is the ‘Cisco Energy Wise’ Orchestrator which is a dedicated turnkey power management solution for the network and information systems. The Cisco Energy Wise Orchestrator enables to administer the energy requirements of Power over Ethernet (POE) enabled devices. It also extends the enterprise power management to workstations and laptops (Newswire, 2012). Some of the enhanced features for the Cisco catalyst 3750 v2 series incorporate efficiency for remote sites environments. The switch consumes less power and enhances productivity for the local area network. It protects the network investment by supporting the unified network for data, voice and video streaming. The switch supports two software versions, which are also called the input / output system (IOS). One is the Internet Protocol IOS which includes enhanced quality of service (QoS), frame rate limiting, access control list (ACL), Open Shortest Path First (OSPF) to support the routing features and IP v6 support which will definitely support the future IP v6 compatible network devices in the future. The second IOS support the enterprise network level functionality. It includes hardware based Internet Protocol Unicast, Internet Protocol Multicast routing, and policy based routing (PBR) (Rist, 2003). Conclusion We have incorporated six layer 3 Cisco Catalyst 3750 v2 manageable switches for operational effectiveness and efficiency for the internal network functionality. Moreover, two Cisco 3845 Integrated Services routers that are connected to establish a perimeter network along with a bastion host for detecting anomalies. Furthermore, we have also proposed a surveillance framework that will record and main access logs for employees entering and exiting departments containing critical network appliances such as switches, routers and data storage devices. References Category 5 cable. (2007). Network Dictionary, 88-88. Newswire, P. (2012). Server technology's intelligent rack mount power distribution units now cisco® EnergyWise™ certified. PR Newswire US. Network security at the data link layer (layer 2) of LAN. Retrieved 7/15/2012, 2012, from http://www.javvin.com/networksecurity/NetworkSecurity.html Rist, O. (2003). Catalyst 3750 stacks up well. InfoWorld, 25(28), 34-34. Tiso, J. (n.d.). Designing Cisco network service architectures (ARCH) foundation learning guide: (CCDP ARCH 642-874) (3rd edition) (foundation learning guides) Cisco Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Big Switch Network Design Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1454179-big-switch-network-design
(Big Switch Network Design Essay Example | Topics and Well Written Essays - 2250 Words)
https://studentshare.org/information-technology/1454179-big-switch-network-design.
“Big Switch Network Design Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1454179-big-switch-network-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Big Switch Network Design

The Most Common Software-Defined Networks

According to capability and application definition SDN seeks to provide a standard based application development platform and commoditize network hardware.... In summary, the firmware of routers and network switches that has for a long time remained under the control of the companies that manufacture this equipment is been changed by making this remotely modifiable and remotely accessible through third party software clients, making use of open flow an example an open protocol....
4 Pages (1000 words) Essay

Steps in Network Designing

network design is an iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator.... network design isan iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new network or service meets the needs of the subscriber and operator.... Steps in Network Designing The best network design for a coffee shop according to a tight budget that Miss Becca is following would be decided by selecting a type of system, selecting a protocol and network switching device, type of cable used, type of communication device to use and the internet service to be used....
2 Pages (500 words) Essay

Basic Design Issues of an Ethernet Network

(‘IEEE Ethernet' 2011) defines all the configuration rules laying down a network and also defines the networked devices' interaction with one another. The distance between So, we use repeaters and hubs (as shown in Figure 1).... So, networks are designed to avoid collisions while ensuring efficient utilization of bandwidth, providing good network throughput.... For avoiding collisions, the network traffic needs to be isolated.... For each incoming frame the bridge/switch checks the destination MAC address....
4 Pages (1000 words) Essay

LAN Computer Platform

It explains how a LAN computer network can be organized and execute.... The paper analyzes the various aspects of the LAN and it compares various operating systems that can be implemented on the LAN … Everybody engaged with local area networking has a fundamental considerate of network wiring and cabling.... Personal cable runs are made from centralized dynamic hubs to every workstation, network printer, server, or router  The crucial individuality of LANs, in distinction to Wide Area Networks (WANs), comprise there greatly superior data transfer rates, lesser geographic range, and a shortage of require for telecommunication lines....
15 Pages (3750 words) Essay

High-Speed Network Switching

This work "High-Speed Network Switching" focuses on all aspects of computer networks, the main principle, and goals high-speed network switching design.... In this scenario, this research will discuss and analyze high-speed network switching design.... This research proposal will describe the main principle and goals of high-speed network switching design.... The author outlines the position of the majority of company networks, describes network Switching as one of the main techniques for the packet routing inside and outside of any network, demonstrates the problem statement....
15 Pages (3750 words) Research Proposal

Administrative Issues in Multihoming

Multihoming is a configuration technique that provides a number of network-based interfaces or Internet protocol addresses on a particular computer.... Multihoming is aimed at improving the consistency of network systems, however, it does not essentially enhance their capability.... Multihoming is a configuration technique that provides a number of network-based interfaces or Internet protocol addresses on a particular computer.... Multihoming is aimed at improving the consistency of network systems, however, it does not essentially enhance their capability....
13 Pages (3250 words) Assignment

Software-Defined Networking

In a bid to quickly reconfigure and design the way resources or data is handled within a network, developers, and network programmers have come up with Software-Defined Networking (SDN) which is one of the latest networking architecture using standardized application programming interfaces (API) [1].... With the use of API, it is possible to quickly interface and reconfigure the network, its components such as switches and pull data as instructed via network applications the likes of email systems....
6 Pages (1500 words) Literature review

Data Communication and Networks

design the prototype of the network using Packet Tracer and describe it in the report.... Solution As the Network Administrator, I was tasked to design a network topology that would support the 20 computers mentioned above with many users.... nbsp;You must install a network with 20 computers for a new business that wants to run TCP/IP and have access to the Internet.... Scenario 1: You must install a network with 20 computers for a new business that wants to run TCP/IP and have access to the Internet....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us