Thursday, December 12, 2019

Multimodal Transport Network For Advanced -Myassignmenthelp.Com

Question: Discuss About The Multimodal Transport Network For Advanced? Answer: Introduction VSU has 4000 students and 400 faculty those are connected via a wireless network system and it is necessary to implement a network access control that is capable of restricting and securing the authorization and authentication to the resources within the network. It is an attempt to implement a system that is feasible within the existing system of the VSU and a cost effective measure for ensuring the security of the wireless network. It has three component to perform the authentication and authorization of the physical devices such as router and switches and other network devices. The goal of this implementation is to define the authorization and authentication control for the devices and the users those are connected with the wireless network within the VSU campus. Security Requirements for Wireless Network of VSU-Vancouver VSU needs to protect the sensitive data in manner to detect the temper data and add limitations to the authorization and authentication to the network and data or information being transferred or stored in the network. The very first requirement is the encryption that is being travelled in the public network through using certified algorithms. Another requirement for securing this wireless network is two-authentication that is combination of a security token and something that the user knows. In this section biometric approaches can be recommended as the best option. WPA, WEP, and WPA2 are the necessary security requirements for establishment of the secured network within the wireless network facility of the VSU [6]. Regardless of the fact of encryption and other physical securities, wireless network cannot be completely secured with the wired connections. These three protocols are capable of protecting the wireless network and the systems needs to be upgraded after the implementatio n of this protocol within the WLAN of the VSU. However, intrusion could not be completely stopped with this protocol and thus similar protocol with inheritance properties WPA can also be implemented to the network in manner to provide safe passage and exchange of the information [11]. WPS could be helpful in enhancing the presented network and will also allow the devices to be linked with the modern access point. 802.1x Authentication Mechanism The presented network access has three components that includes core in the centre including routers, network access that includes switches, access point and others and the third component is the distribution that includes switches and PCs. The latter feature of the 802.1x is helpful in providing authentication manageable in the installation of this network [4]. The architecture presented in the network provides leverage to the decentralized access device in manner to provide scalable and cost effective encryption, at this mean time access control centralization can be implemented to some of the authentication servers. While running EAP over LAN, the encapsulation of EAP occurs over the message of LAN (EAPOL). The EAPOL packets format has been defined in the specification of the 802.1x. This led to the occurrence of the EAPOL communication between the authenticator (wireless access point) and the supplicant (user station) [8]. Thereafter the RADIUS protocol has been applied for the communication between the RADIUS server and the authenticator. When the end user tries to connect with the WLAN the authentication process gets started. After receiving the request, the virtual port gets created with the supplicant and during this situation, for the end user, the authenticator will be acting as the proxy to pass the authentication server on the behalf of the proxy [5]. The authentication data to the server will be limited by the authenticator and thereafter the negotiation takes place. Step-by-Step Procedure of Implementing 802.1x The core centralized system will be required including the routers that will be a radius server on the management stations as it is not supported with the TACACS+ authentication protocol. Thereafter, supplicant accounts will be created on the RADIUS server that will include the following considerations: The users of the VSU account will be connected to the authenticator port including the user name and password of the students and faculties while establishing 802.1x authentication mode [1]. MAC address of the node will be needed for the accounts connected to the authenticator port for both the username and the password. Every user and the system within the campus will have 802.1x client software for the connections established for the 802.1x authentication port. Third step will be Configuration of the Core system including the RADIUS client through configuring encryption key and IP address of the authentication servers on the VSU network. Forth step will be to configure the port access control on the switches that include the configuration of 802.1x port parameters, specifying the port roles, and enabling the 802.1x port-based network access control. Ethical Implication on VSU Secured Wireless LAN design There are many ethical issues in the implication of wireless LAN design for the VSU as if proper authorization and authentication is not implemented to the network it could be misused by any unauthorized individual [3]. The network need to be password protected as keeping the network open could be the easiest path for the intruders to enter the network and thus, access to the data or information saved in the network and could allow the intruder to access, manipulate or delete the data. This could also lead to privacy and security issues of the individuals connected to the network. There are the possibilities that any internal unauthorized user could get access to the data or information of other individual connected via the same network. Evaluate / Justification The presented network design has been created the required data points that need to be established at each points of the connectivity. In manner to enhance the efficiency and providing continuous flow of the network, access points have been installed at the layers of the network [7]. A three layer switch has been also implemented within the ground floor router in manner to manage the network and eliminate the risk of the network downtime while using the network. The voice packets and the data packets have been sent to the network through using different VLAN in manner to reduce the risk related to the communication delay and congestions in the risk. The routers those have been installed in the network are configured with the DHCP protocol in manner to allocate the IP to the connected network at its nodes [12]. For the configuration of the network, TDM, HDLC, and frame Relay has been used in which the frame relay has been implemented for the packet switching and high level data linkag e control in manner to establish the transmission of the data packets in the network. In manner to avoid the deadlock situation in the network, time division multiplexing has been established in the network in manner to enhance the security standard and efficiency of the developed system [2]. For the configuration of the VOIP devices within the network, RTP (Real Time Transfer Protocol) and SDP (Session Description Protocol) has been established. Conclusion Based on the above report it can be concluded that and established system has been presented for the implementation of the 802.1x based wireless network for the authorization and authentication at the Vancouver State University and related aspects of this implementation. This report explains the requirements needed for the security of the wireless network within the campus of the VSU and presented 802.1x as the solution for enhancing the security of the wireless network. This report emphasize on the enhancement of the security of the wireless network established within the existing system of the VSU. A diagram has been presented in this report that is a complete description of the network in manner to establish then secured network and establish the authorization and authentication of the users connected via the network. 802.1x authorization mechanism has been also proposed in this report that is being applied to the network and this mechanism is helpful in understanding the procedur es involved in the protection of the network. This ;implementation can be a helpful measure for the enhancement of the security of the wireless network established within the VSU however,, there are several ethical implications within the network that are the crucial factors while configuring the network with 802.1x authorization and authentication. References J. Xu, Z. Zhang, and J. Rong, The Campus Road Planning and Design Research, Procedia - Soc. Behav. Sci., vol. 43, pp. 579586, 2012. J. Wang, X. Bai, and J. She, Wireless Campus Network Design and Optimization Based on OPNET, Proc. - 2015 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2015, pp. 525528, 2015. M. Guo and J. Guo, Constructing smart campus network based on ubiquitous sensor technology, in 2015 5th International Conference on Information Science and Technology, ICIST 2015, 2015, pp. 265268. M. C. Chan, C. Chen, J. X. Huang, T. Kuo, L. H. Yen, and C. C. Tseng, OpenNet: A simulator for software-defined wireless local area network, in IEEE Wireless Communications and Networking Conference, WCNC, 2014, pp. 33323336. Z. Du, Y. Liu, and Y. Wang, Relation based access control in campus social network system, in Procedia Computer Science, 2013, vol. 17, pp. 1420. A. Masiero and A. Cenedese, On triangulation algorithms in large scale camera network systems, in Proceedings of the American Control Conference, 2012. R. Balakrishna, H. Koutsopoulos, M. Ben-Akiva, B. Fernandez Ruiz, M. Mehta, J. Barcelo, S. Zhang, H. Yang, and L. Singh, Simulation-Based Evaluation of Advanced Traveler Information Systems, Transp. Res. Rec., vol. 1225, no. February, pp. 9098, 2014. G. N. Bifulco, G. E. Cantarella, and F. Simonelli, Design of signal setting and advanced traveler information systems, in Journal of Intelligent Transportation Systems: Technology, Planning, and Operations, 2014, vol. 18, no. 1, pp. 3040. J. Zhang, T. Arentze, and H. Timmermans, A multimodal transport network model for advanced traveler information systems, J. Ubiquitous Syst. Pervasive Networks, vol. 4, no. 1, pp. 2127, 2012. A. Ben Ahmed, M. Meyer, Y. Okuyama, and A. Ben Abdallah, Adaptive error- and traffic-aware router architecture for 3D network-on-chip systems, in Proceedings - 2014 IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, MCSoC 2014, 2014, pp. 197204. A. Higgins, C. Begley, J. Lalor, I. Coyne, K. Murphy, and N. Elliott, Factors influencing advanced practitioners ability to enact leadership: A case study within Irish healthcare, J. Nurs. Manag., vol. 22, no. 7, pp. 894905, 2014. R. O. Topaloglu, ICCAD-2014 CAD contest in design for manufacturability flow for advanced semiconductor nodes and benchmark suite, in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, 2015, vol. 2015January, no. January, pp. 367368.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.