Improving Network Topology

Powerful Essays
CMCN6103

Deric Law CGS00479903

1. Improving Network Topology Draw the topology of the network that you are currently using. Be sure to include addressing structures, network architecture, and include devices such as core switches, workgroup switches, firewalls, routers, and other network devices. Analyze the security of the topology and then draw a proposed new topology. Be sure to include security detection systems as well as security zones. Kazakhstan International School had implemented their network infrastructure since 2007. The school had around 100 computers and every computer is connected to Internet, serving more than 200 users. The school uses 3 subnets to divide the general administration, computer laboratory and Classrooms. Internet service provider (ISP) of the school is Corporate Telecommunication System (CTC), provided the Fibre Optic network connection for the school. The internal network IP addresses make up of 192.168.1.1 - 192.168.1.254, (General Administration) 192.168.2.1 – 192.168.2.254, (Classroom PC) 192.168.3.1 – 192.168.3.254 (Computer Laboratory) With the subnet 255.255.255.0 Majority of the network topology in the school are makeup of star topology. The figure below shows a section of the network topology (Star Topology) in Kazakhstan International School.

The school do not have managed switch, all of the switches in the school are of unmanaged switches. The number of ports of the switch range from 4 to 24. The models of the switches are D-Link DES-1024D, D-Link DES-1008D, and D-Link DES-1005D. They support the network speed up to 100 Mbps.

1

CMCN6103

Deric Law CGS00479903

As of the internet connection, the school had setup a proxy server with the firewall software in between the ISP and the user. The Router from the ISP provides two external connections for the school through its fibre optic network: 1. External IP address 172.25.146.1 Subnet Mask 225.225.0.0   Connection within



References: Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800-94). http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf. Retrieved 1 January 2010. Whitman, Michael E.; Mattord, Herbert J. (2008). Principles of Information Security. Course Technology. pp. 290–301. ISBN 9781423901778. Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. pp. 387–388. ISBN 9780471389224. Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980. Denning, Dorothy E., "An Intrusion Detection Model," Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131 Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22–23, 1990, pages 110–121. Lunt, Teresa F., "Detecting Intruders in Computer Systems," 1993 Conference on Auditing and Computer Technology, SRI International Sebring, Michael M., and Whitehurst, R. Alan., "Expert Systems in Intrusion Detection: A Case Study," The 11th National Computer Security Conference, October, 1988 Smaha, Stephen E., "Haystack: An Intrusion Detection System," The Fourth Aerospace Computer Security Applications Conference, Orlando, FL, December, 1988 Vaccaro, H.S., and Liepins, G.E., "Detection of Anomalous Computer Session Activity," The 1989 IEEE Symposium on Security and Privacy, May, 1989 Teng, Henry S., Chen, Kaihu, and Lu, Stephen C-Y, "Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns," 1990 IEEE Symposium on Security and Privacy 10      CMCN6103     Deric Law CGS00479903  Heberlein, L. Todd, Dias, Gihan V., Levitt, Karl N., Mukherjee, Biswanath, Wood, Jeff, and Wolber, David, "A Network Security Monitor," 1990 Symposium on Research in Security and Privacy, Oakland, CA, pages 296–304 Winkeler, J.R., "A UNIX Prototype for Intrusion and Anomaly Detection in Secure Networks," The Thirteenth National Computer Security Conference, Washington, DC., pages 115–124, 1990 Dowell, Cheri, and Ramstedt, Paul, "The ComputerWatch Data Reduction Tool," Proceedings of the 13th National Computer Security Conference, Washington, D.C., 1990 Snapp, Steven R, Brentano, James, Dias, Gihan V., Goan, Terrance L., Heberlein, L. Todd, Ho, Che-Lin, Levitt, Karl N., Mukherjee, Biswanath, Smaha, Stephen E., Grance, Tim, Teal, Daniel M. and Mansur, Doug, "DIDS (Distributed Intrusion Detection System) -- Motivation, Architecture, and An Early Prototype," The 14th National Computer Security Conference, October, 1991, pages 167– 176. Jackson, Kathleen, DuBois, David H., and Stallings, Cathy A., "A Phased Approach to Network Intrusion Detection," 14th National Computing Security Conference, 1991 Paxson, Vern, "Bro: A System for Detecting Network Intruders in Real-Time," Proceedings of The 7th USENIX Security Symposium, San Antonio, TX, 1998 Amoroso, Edward, "Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response," Intrusion.Net Books, Sparta, New Jersey, 1999, ISBN 0-9666700-7-8 Kohlenberg, Toby (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Esler, Joel., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, "Snort IDS and IPS Toolkit," Syngress, 2007, ISBN 978-1-59749-099-3 Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, and Wu, Ningning, "ADAM: Detecting Intrusions by Data Mining," Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY, June 5–6, 2001 Intrusion Detection Techniques for Mobile Wireless Networks, ACM WINET 2003 11

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Network Topologies

    • 1024 Words
    • 11 Pages

    NETWORK TOPOLOGIES PRESENTED BY Alex Daniel Manjula Sanjana NandaKumar Sher Mohammed Babul Sriram Vamsi Vinodhini © 2013 Maveric Systems Limited WHAT IS A TOPOLOGY ? © 2013 Maveric Systems Limited WHAT IS A TOPOLOGY ? ▸ In computer networking, topology refers to the layout of connected devices. ▸ Network topologies describe the ways in which the elements of a network are mapped. They describe the physical and logical arrangement of the network nodes. ▸ Topology can also be defined as the…

    • 1024 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Network Topology

    • 437 Words
    • 2 Pages

    The term “topology” in networking refers to the configuration of cables, computers, and peripherals. The six common used topologies in networking are: bus, star, ring, mesh, tree, and hybrid. The three major topologies that I will be discussing further in detail are: bus, star, and ring topology. Bus topology is probably considered the easiest of the network topologies. In a bus topology, the devices are connected to a central cable called the bus. The bus cable carries the transmitted message…

    • 437 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Topologies and Network

    • 1627 Words
    • 7 Pages

    Topologies and Network Technology NTC/361 Monday, August 8, 2011 Thomas Krawczyk Topologies and network technology In every project, it is important to have a goal, and that goal should be the foundation on which a project team spring into action. The foundation should involve an infrastructural plan, and the usability of the components of the infrastructure. A project plan, as in any other plan, should outline the premise of the project and answer some basic questions like why…

    • 1627 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Network Topologies

    • 1011 Words
    • 5 Pages

    Network Topologies Network topologies are an important part of the network. Without the proper topology, the network may not meet the needs of the organization. The layout of a network is referred to as the topology. How nodes in a network are connected to each other and communicate is determined by the topology. There are three basic topologies with several typical variations, or combinations. A description of four topologies follows. Mesh Topology Mesh topology is the first topology discussed…

    • 1011 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    network topology

    • 751 Words
    • 6 Pages

    FACULTY OF MEDIA, INFORMATION & COMMUNICATION TECHNOLOGY HIGHER CERTIFICATE IN INFORMATION TECHNOLOGY NETWORK ENGINEERING 511 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA MARK ALLOCATION EXAMINER MARKS MODERATOR MARKS QUESTION 1 INTRODUCTION Outlines the subject…

    • 751 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Network Topologies and Standards 3 ITINERARY • • • • • • Objective 3.01 Objective 3.02 Objective 3.03 Objective 3.04 Objective 3.05 Objective 3.06 The Bus Topology and Ethernet The Star Bus Topology Ring Topologies Wireless Networking Distributed Star Topology—ARCNet Mesh Topology NEWBIE 4 hours SOME EXPERIENCE 2 hours EXPERT 1 hour 1 2 MIKE MEYER’S NETWORK+ CERTIFICATION PASSPORT A network topology provides a general description of how the devices on the network…

    • 7941 Words
    • 32 Pages
    Good Essays
  • Better Essays

    NETWORK TOPOLOGY RAJ KUMAR GADAGOTTI 1632274 INTRODUVTION TO COMPUTER NETWORK SECURITY MADS 6701 V1 INSTRUCTOR’S NAME: DR. MOHAMAD SHARIFF FAIRLEIGH DICKINSON UNIVERSITY NOV 14TH 2014 TABLE OF CONTENTS: Introduction Network Computer network Topology Different types of topology Mesh topology Star topology Tree topology Bus topology Ring topology Case study Problems with the network Policy Conclusion References NETWORK A computer network or data network is an information transfers…

    • 1111 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Network Topology and Wiring Tiearia Fariss NTC/361 Professor: Larry Schreider December Network Topologies are the different arrangements that contain many different element such as links, nodes, etc. This helps with communication and network information processing. This is a major part of today’s technology and is used by big business as well as for home and personal use. There have been eight different network topologies that have been recognized though out a study.. Throughout this paper…

    • 1032 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Topology Paper

    • 260 Words
    • 2 Pages

    Hierarchical Star Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices usually connect to the hub with Unshielded Twisted Pair Strengths Easy to Install, Flexible IF single device or cable failure will not bring down the network Weakness If the centralize device fails the entire system is affected Bus Bus is the simplest network topology. All computers are connected to a single cable that…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Topology Design

    • 430 Words
    • 2 Pages

    1. Depict a network topology graphical model of the initial environment of 10 employees. [pic] 2. Depict a network topology graphical model of the current 100 employees. [pic] 3. Depict a network topology graphical model for future growth to 200 employees. [pic] 4. Create a two-paragraph executive summary The business IT network infrastructure must be upgraded to accommodate the current and future growth of the company. The initial company network infrastructure…

    • 430 Words
    • 2 Pages
    Good Essays