Lowest guaranteed price across the globe. Get upto 50% off ! Book Now

Network Segmentation and Security on Shared Infrastructure

University: University of Sunderland in London

  • Unit No: 7
  • Level: High school
  • Pages: 21 / Words 5159
  • Paper Type: Assignment
  • Course Code: N/A
  • Downloads: 337
Question :

This sample will let you know about:

  • What is Network Segmentation and Security ?
  • Discuss about the different theme of Network Segmentation and Security .
Answer :
Organization Selected : N/A

Introduction

Literature review is a kind of review in which previous work of various researchers that have been carried out in the research topic area is reviewed in order to gain understanding of the research topic and enhance their knowledge so that they can carry out the research in a much better manner (Hart, 2018). In order to conduct a literature review of peer reviewed articles, journals, books, websites and many more are reviewed in order to gain knowledge about the research topic. Review of literature also helps in understanding the research topic in a more appropriate manner so that further data collection and analysis can be done in a much more appropriate manner.

In this literature review various books, research article, journals and many more will be referred and reviewed in order to gain information or knowledge on Network Segmentation and Security on shared Infrastructure in order to answer the research question. Today most of the organization’s majorly lay emphasis on security of their data and various other security related equipment’s (Kurtz and et al., 2018). However, there are various issues that are faced by organizations that they face within shared network infrastructure. This literature review will help in gaining understanding of issues faced by companies on share network infrastructure that arises during transmission, ways to measure separated data traffic on shared network infrastructure. This literature review will further help in answering main research question in a better manner. This literature review will also focus on shared infrastructure, issues associated with it, benefits of shared infrastructure and ways in which it can be used to share data security to another location. It will also focus on measures that can be used to separate traffic on share infrastructure and ways in which it can increase overall quality of service for security data in transit to a centralized location. Order assignment help from our experts! 

Theme 1 : Determine that network traffic separation resolve security issues within shared network infrastructure.

According to Shaghaghi, Kaafar and Jha (2020) A network traffic separation is the best security practices that can use in different components which provide the network separation. The primary objective is to segregate the information. It mainly refers to putting more traffic on multiple segments within network infrastructure. In context of security, it is to be considered an effective technique in VLANS whereas it easily separates the logical data traffic and prevent data network problem. In most of cases, it will arise the issues which may affects on the data traffic. The Share network infrastructure is mainly creating a logical segmentation of broadcast and collision domain. It can span multiple physical network segments. This type of logical separation technique helps for identifying network issue or problem while operating the system aggressively to security community. It should be implementing the mandatory access control and underlying the system. it ensures that components were correct and could be verified.

As per Sultana, Chilamkurti and Alhadad (2019) in share network infrastructure, network traffic separation provides the better security while creating the logical separated subnets. It is helping for reducing the large amount of broadcast traffic, separated network can result in more effective way to utilise the bandwidth and minimize the processor burden on IP. Various type of management traffic can be segregated on network infrastructure so that traffic data don’t interface within system. It is beneficial for adding more security aspects within network infrastructure. Otherwise, the major consequences such as Dos attack mitigate by logical separating data segments into network infrastructure. Therefore, it will require for segregation in network traffic that easily pass from layer devices, thereby, it enabling to inspect the level of traffic at different level. The network traffic separation process will implement against DoS packets through segregation forces on the layer device. In this way. it useful for filtering the packet while firewall inspection at junctions. As a result, it prior to access user which will minimize the possibility of internal Denial of service attacks.

Jo and et.al. (2019) one of main security issue with sending all type of site security alter to centralised data centre, which increases from the shared infrastructure. If the entire network is not properly designed that may affects on the attacker and generate a lot of data traffic. In this way, it become difficult for designer for segregated data or information in proper manner.

Yu, Jin and Zheng (2019) in term of security, it encouraging the network infrastructure to utilise the firewall, which preferably ones managed through centralised group. It should be required to set up the signature that will be update and always fulfil security aspects. The network traffic infrastructure is integrated with the national assets that should have a form of DoS protection and other attackers. it must require to consider high capacity protection which automatically increase the capacity to handle security issue within network system. Traditionally, it is mainly used the different network devices such as LAN, router, firewall. It places within network infrastructure to create boundaries and increases large number of broadcast domain. It contains the security breaches by restricting the data traffic separate segments. Even, it automatically shut down the segments in the network during intrusion.

Theme 2 : Measure the separated data traffic on shared network infrastructure by using Simulation.

According to Luz and et.al. (2019) Network segregation involves enforcing and developing the standards for controlling the communication between host and service. While implementing the network segmentation process and maintain the level of access to sensitive data or information. It must ensure that data transmission continue to operate effectively and efficiently. Many network engineers are used the GNS3 simulator which performs different task such as testing, configuration, trouble shooting, emulating. It allows for consisting the hardware devices to host multiple servers. Therefore, it develops the connection between sender and receiver side.

By using GNS3 simulator, it can easily measure the segregated data traffic within shared network infrastructure. This tool provides a facility to make plan carefully, closely monitored and robustly enforced. It is also implementing the network segmentation in order to achieve the significant result or outcome.

As per Rasoulkhani, Mostafavi and Sharvelle (2019) An adversary compromises the shared network that attempt to establish connection directly from other sensitive host by using technique and tool. In this way, it will create a remote connection to server. so, as it requires to plan to implement network segmentation by using GNS3 simulator, which help in identifying the security measurement and assists to preventing multiple activities. It may include the explicitly that disallow remote desktop connection. through tool and technique, it should be measured the altering and audit capabilities. As these may prove to identify the intrusion and ensure that timely data packets receive. In additional, it provides the better way to isolate compromised host and network in proper manner.

Mishra, Tripathy and Mahanty (2019) argue that The Shared network infrastructure is based on the sensitivity and critically, which may include routers, Bridges, Firewall and other devices. It establish the connection between start node to end node. This is the best way to recognise the activities of different hardware in the shared network by using GNS3 Simulator. this type of platform will separate the data into relevant sources. The technique will be measured before data traffic separation and implemented with the multiple hardware. when the packets have been recorded and captured, segregated the network design into various network traffic. All network devices will be configured to send security data towards switched port analyser. in this way, it automatically moves the security data into layer2, layer3 segment. After segregation, GNS3 has successfully implemented and capture new network to verify their impact on data traffic.

Rasoulkhani, Mostafavi and Sharvelle (2019) stated that there is another simulator tool that can be used in simulation. The CISCO VIRL allows in network simulation and it do not require any physical hardware. The tool runs on IOSv, IOS XRv, etc and provides a flexible network design by using VM maestro front end. Also, it can be integrated with third party virtual machine like fortnite, citrix, arista, etc. Basically, there are two editions of VIRL that are personal and academic. CISCO VIRL is designed for individual users. it enables in providing training, TAC support, etc. VIRL is effective than other simulator as it runs on most computers. Furthermore, there are many options of installing VIRL such as mac OS, VMware, etc.

Theme 3 : To identify the security issues that arise during transmission within shared network infrastructure.

Sen and et.al. (2019) security issue is the most common problem in the shared network infrastructures during data transmission. There are various types of attacks which directly effects on the over network system. The aim is to damage all services from sender to receiver side. An authorised access person tries to prevent an authentication with the help of security. It is most common security issue in which compromised with system attack a single target and causing for user of targeted system. It can be identified that attack steal the authorised information and misuse. The networks and operating systems use IP address to determine specific identity of hardware. in this way, it can be validated the correct entry but it can possible for assuming incorrect identity spoofing. In certain cases, attacker may use multiple program to construct own IP packets and originate from valid address. It must gain the access to network with valid IP whereas unauthorised attacker can delete, modify and loss data for shared network infrastructure. Therefore, it can be determined the security issues that faced by other aspects.

According to Lewis (2019) The shared network infrastructure will be used the Peer to peer platform which help to establish connection between them. During transmission, data can send from centralise location that’s why, it has high chances of security issues. In shared network, Attacker must leverage in order to compromise peer to peer networks. It allows for capturing the application request and consider the responsibility of application components. Another way, the shared network connects with other computers, system which may develop user’s problem and affects on the entire network system. During data transmission, it will increase the potential of security problem or issue such as virus, malicious attacks, security breaches and data loss. It can implement measure to reduce the network vulnerability of the authorized access or damage. The network infrastructure refers to the resources that enable centralised network connectivity, operation, management and communication. Generally, it may include network software, hardware and other services. in case if network is not properly secure so that it representing vulnerabilities in the form of multiple attacks such as spam, denial of service, viruses, malware and unauthorised access. In shared network infrastructure, hacker must be aware about the old holes and creating havoc on public as well as private networks. During transmission, intruders may use the hole to loss large amount of data or information. Many cases, web server is a type of machine that provide the communication services by using hardware. sometimes, it also identifying essential resources. It is completely insecure for entire network infrastructure while face the challenges in term security aspects.

Ghosal and Conti (2019) Another problem occurs when user use system to enter information within specific format and intercepted. At that time, it is possible that security risk increases when someone use remote system interactively. This type of problem can occur within share network infrastructure because it is based on the centralised location to establish connect with other networks, computers and devices. Need example assignments, Talk to our experts! 

Theme 4 : Shared network

Jiang and et.al. (2019) Shared infrastructure can rapidly demand in data transmission which consists physical as well as virtual infrastructure. So it require the proper security requirements in different location during packet transmission. It is best practice which are similarly divided into both physical as well as virtual security. Furthermore, it must be ensured that availability, confidentiality and integrity with shared network system. various type of system integration as well as transition demand at the time of deployment. Sometimes, it is required to share network to integrated with existing environmental operations. Ideally, it is better way to build the independent monitoring system for single solution. So as it increases the overall operational cost and price of network system. Shared network must ensure that physical security contain multi-layers which easily monitoring and control center which possible to identify physical threat in network system. Shared network basically send packet data from particular location to another network. it is also known as distributed network which establish connection with one or more network. it helps in sharing large amount of data from different location at single time.

As stated by Zhang and et. al. (2019) sharing of network allows in effective distribution of data traffic in different networks. here, the data packets are sent and transported into different paths with their labels. the logical separation of data and traffic. the VLAN segment domains which span multiple physical network segment. the effective bandwidth is increased as latency is removed from router links. Besides that, VLAN allow in network mapping and separating domain name. there are various types of shared network that enable in separating traffic. the path is circulated in such a way that data traffic changes. the MLS system label files and directories that are going to be shared on network. VLAN function depend on type of network which is used. usually, there are two types of network separation that is used in computer network. here, router and firewall segment traffic with help of ACL. Also, sub netting is done to allocate IP address into smaller range. on other hand, firewall separate using packet filtering. this is possible in various network like LAN, WAN and many others.

When traffic is separated the data packets are sent quickly within network. this is because data packet find out various routes if there is high traffic. as each packet is having a label they can be directed to other traffic easily. the effective distribution of network allows in ease in sharing data and information.

Theme 5 : MPLS network and its working

As said by Varlashkin, Chen and Dataplane (2019) with technological development there has been many changes in way of communication and sharing of data and info. The technology has transformed telecommunication and data sharing. there are many new types of network which has emerged. it has ease process of sharing data. besides, complexities are reduced in designing a long-range network. alongside, new protocols are followed that has restricted flow of data in computer network. Multiprotocol label switching is technique that is used in telecommunication network. its direct data from one node to another by selecting a short path instead of long one. this enable in increasing flow of data and traffic. the protocol provides different types of application that is virtual private network (VPN), traffic engineering and quality of service.

As elucidated by Gandhi and Zigler (2019) MPLS works in a systematic way. the packets are assigned label and then directed via packets in network. the label consists of pre-determined path on which they go within the network. thus, there is high control as compared to packet switch. Moreover, in MPLS Qos features differ and then priorities are assigned in data flows. this allows operator to determine fall back path if case traffic is routed than data flow can be rerouted again. Now, each data packet use IP routing in packet switch network. it allows in determining their path in network with dynamic flow but it is not predicted. due to this, it is a cost-effective network. on contrary in circuit switch network the physical wires and T1 lines are used in carrying data and traffic. there is change in thing as routes are already predicted. so, it is expensive as it requires more infrastructure to be used. similarly, carrier ethernet is a network which allow to create path and establishing point to point connection. However, it is flexible and virtual.

In view of Yan and McBride (2019) MLPS network has many benefits which allow companies to use it instead of other network. it improves the up time that means by sending data on other path it reduces time. thus, WAN is created that decrease risk of human errors. Also, MLPS create scalable IP VPN. this means a VPN can be added and configure within network. Alongside, it improves user experience as quality of services is high. the user can do different setting on different traffic as per its types. other than this, it enhances bandwidth which allows user to borrow traffic from high stream to low stream in case it is required. According to () another benefit of MPLS is network complexity is hidden. so, it is easy to configure two MLPS network. the network congestion is reduced by selecting shortest path and sending traffic over non standard paths. this results in decreasing latency in network. with help of traffic engineering path are enhanced. there are different situation in which MPLS is used for example to share common data connection by using multiple types of traffic. another situation is to establish multiple connections and alternative paths. the main reason for which it is used where network congestion occurs. also, new sites require wide network connection for different location.

Theme 6 : Ways in which access control and other security equipment’s data can be securely transmitted to another location via a shared infrastructure

According to the view of Huangand et al., (2017) Share network infrastructure plays as vital role within business organization and can be used to fulfil business needs in a better manner. Commonly used shared IT infrastructure are network, data centers, storage, backup systems, logging and many more. These shared infrastructures set up a base line for organizations to bring improvement within their security systems. It is not a new concept but it is an old concept with new idea. It mainly focusses on operations of shared network infrastructure. It is one of the best reliable channel though which data can be transmitted from one place to another. It mainly uses devices such as switches and bridges. But is has some vulnerabilities associated with it such as bypassing VLAN configuration, flooding and spoofing, unauthorized access due to weak authentication, encryption in wireless environment. In order to share access control and other security equipment’s data securely to another location it is important for organizations to take some preventive control such as: MAC address filtering, strung wireless security, firewall with physical layer separation, intrusion detection system.

As per the view of Azizi and et al., (2018) Shared infrastructure’s main purpose is to increase scalability of business, enable them to share data security to another location and many more. It plays a vital role in organizations in sharing information to another location. However, for this it requires proper access control so that only authentic and authorized persons can access the data. Enterprises that operates shared infrastructure often have a security operation center which is managed centrally which further helps them to manage all security log, events, data, security equipment’s data and many to another location.

Rasoulkhani, Mostafavi and Sharvelle (2019) Argue that Access control and other equipment’s data must be controlled by using encryption technique. It mainly applied within shared network infrastructure which help for resolving any type of issues related data loss. It is basically used public key encryption that consists of series which automatically lock data when they are transmitted from one sender to receiver side. During transmission, it locates recipients public key which are directories to use as encrypt message.

The message is primarily sent in encrypted format from over internet through shared network. Access control is important in terms of security because it is based on the protocol and hardware devices that help for transmitting data from one place to another. So, as it has chances to delay large number of data due to heavy traffic. It also increased the situation of network equipment failure. In this way, it will require for managing and controlling data in terms of security. Network infrastructure refers to resources that enable network connectivity, operations, management and communication. Generally, it mainly including software, services and hardware. To secure data, it can be used electronic access control system which continue monitoring activities of data or information when it can be transmitted from shared network infrastructure. The system will help for generating track report for access control in multiple locations. In this way, it restricts and lockdown capabilities to prevent through unauthorized access or operations. In most of cases, Access control system performed as identification in authentication and authorization of users.

Theme 7 : Benefits of shared infrastructure

According to the view of Ali and et al., (2019) there are various benefits of shared infrastructure that can benefit an organization in many ways. It can help in using same applications, devices, networks world-wide without any kind of issue. It is one of an emerging topic which is being focused on and used by various organizations. One of the main benefits shared infrastructure provides is that it helps in reducing overall cost of the organization and provides proper and appropriate security to the network and data that is being shared through this infrastructure. One of the main and key benefit of shared infrastructure is its scalability. It helps in increasing scalability of business so that they can easily upscale or downscale their resources according to any kind of change in business or due to additional needs of a business. It also provides flexibility as files or data can be easily transferred to another location without any unauthorized access issues or any other issue and also provides high level security and because of its affordability and lower cost it can be used and accessed by almost everyone. As all the data is stored centrally it becomes much easier for organizations to back-up and restore data at any device from anywhere regardless of physical location of the data.

As per the view of Kliks and et al., (2018) says that Shared infrastructure involved shared segmentation that controls communication between server and host because of which access to sensitive information of data is maintained. It is one of the best ways to share data or information security because it helps in creating remote connection to the server and reduces total cost of ownership as well. Kliks and et al., (2018) further says that benefits of shared infrastructure are found in some areas such as power efficiency, cost efficiency and computing density. Each of these area helps in maintaining and transmission of data and security. It reduces the maintenance of different devices. It increases power efficiency because all the clustered systems draw little power as possible. It further helps in gaining competitive advantage.

As state by Jaballah, Conti and Lal (2019) that Share infrastructure is providing the benefits for reducing capex in terms of business communication and much as 40-60%. It can be utilized the setting for managing the overall infrastructure effectively and efficiently. While increasing the revenue tower as per declining over time and also sharing the tower. There are various types of operators that can be utilized their capex and focus on providing innovative services in business communications. It is long lasting shared infrastructure and always focused on providing innovative services. Sometimes, it will be differentiating them from the competition level.

Through outsourcing, day-to-day management should be transmitted by share infrastructure because it always helps for controlling large amount of data packets. It is useful for saving cost and also increase their data in right destination. It provides the better innovative services which may increase customer satisfaction level. On the other hand, Shared infrastructure uses for reducing time to market because it deployed in the telecommunication circles and new operator rapidly cut down the time taken. As a result, it easily saving in capex and diverted towards other promotional activities. This process must be crucial for initial months. The shared infrastructure always increased the connectivity between one or more circles. It mainly covered the large number of remote locations, which are characterized by an efficient power supply, adequate backup plan etc. these are important things that require for improving overall. Ask for online coursework help from our experts!    

According to the view of Mohamed, Meintz and Zhu (2019) Share Infrastructure is providing the benefits for reducing Capex in terms of business communication and much as 40-60%. It can be utilized the setting for managing the overall infrastructure effectively and efficiently. While increasing the revenue tower as per declining over time and also sharing the tower. There are various types of operators that can be utilized their capex and focus on providing innovative services in business communications. It is long lasting shared infrastructure and always focused on providing innovative services. Sometimes, it will be differentiating them from the competition level. Through outsourcing, day-to-day management should be transmitted by share infrastructure because it always helps for controlling large amount of data packets.

It is useful for saving cost and also increase their data in right destination. It provides the better innovative services which may increase customer satisfaction level. On the other hand, Shared infrastructure uses for reducing time to market because it deployed in the telecommunication circles and new operator rapidly cut down the time taken. As a result, it easily saving in capex and diverted towards other promotional activities. This process must be crucial for initial months. The shared infrastructure always increased the connectivity between one or more circles. It mainly covered the large number of remote locations, which are characterized by an efficient power supply, adequate backup plan etc. these are important things that require for improving overall functionality of entire network system.

The speed of shared infrastructure is higher than other services. It must ensure that commencement operations for handling overall performance and efficiency in proper manner. Subsequently, It is efficient way to use the process and monitoring the activities for reducing downtime. In another words, it will be hiring the operators that help for reducing massive and CapEx Expenses. In additional, it is increasingly the demand in global world and many organizations can be used as a shared infrastructure for purpose of communication. The shared infrastructure increases speed of opening new field which enable subscriber to provide the best network coverage in wide areas.

It only possible because of shared infrastructure. The most common benefits of shared infrastructure system that can identify the total cost and also focused on the power efficiency, system scaling efficiency and compute density. There are large number of benefits that lies outside of traditional calculation when it is to be considered the life time solution in terms of communication within network system. In shared infrastructure, it has ability to consolidate different nodes into single box cut down number of physical units. Even shared infrastructure which only share power to maintain the efficiency and performance. As a result, it can be saving the overall cost or price of data transmission from one node to another.

Summary

From the above literature review it has been summarized that data security is one of the most important factor that most of the organizations focuses on, many organizations are choosing shared infrastructure due to various kinds of benefits such as cost associated with it is quite low, data can be easily and security transferred from one location to another. But there are many issues associated with these shared infrastructures that can be faced by companies during data transmission and many other times (Rasoulkhani, Mostafavi and Sharvelle, 2019).

As per the literature review there are various kinds of security measures that can be taken by organizations for network separation. One of the best security practices is network traffic separation that can be used in different components. Its main and primary objective is to segregate the information and put more traffic on multiple segments within the network. Shared infrastructure creates collision domain and broadcast logical segmentation in order to identify network issue or problem when a system is operated aggressively to security community. In order to measure separate on data traffic on shared network infrastructure there are various kind of simulation tools that can be used to maintain access level to sensitive information. GNS3 is a kind of simulator that can be used to measure segmented data traffic with shared infrastructure. It can be used to directly establish connection between host and service.

However as per the literature review there might be various kinds of issues that can be faced by the organizations that might arise during transmission of data to another location within a shared infrastructure. One of the main and primary issue that might occur is attacking that can destroy all kinds of resources of services from sender to receiver or server side. In order to resolve this issue, it is important to identify IP of attacker but in some cases, attacker can construct their own IP using multiple programs suing which they can delete, modify any kind of data present on shared infrastructure (Rasoulkhani, Mostafavi and Sharvelle, 2019). Another issue that can arise is while transferring files or data from one location to another and if there is any kind of loophole in the network then it can increase chances for the attacker to attack complete network and create problem for users.

For this there are various ways through which these issues can be resolved and security of data transmission can be increased. Some of the most common ways through which security can be increased are firewall with physical layer separation, MAC address filtering, intrusion detection system and strung wireless security. These factors can help in increasing security of shared infrastructure because of which benefits of shared network infrastructure can be increased. It can also increase scalability benefit of the network so that whenever required business organizations can either upscale or downscale their resources according which further provides cost benefit to the business and make it affordable. Increased security can help organizations to successfully back up their data so that they can restore it from anywhere at any time.

Read more - Contemporary Developments in Business and Management

Download Full Sample
Boost Grades & Leave Stress

Share Your Requirements Now for Customized Solutions.

Lowest Price

USD6.27

    FOR FIRST ORDER GET EXTRA 25% OFF

    Seasonal seasonal-mobile

    Our unique Features

    24/7 Customer Support

    100% Customer Satisfaction

    No Privacy Infringement

    Quick Services

    Subject Experts

    Innovative Documents

    100+ Qualified Writers

    For Best (Accounting) Assignment Help

    Norman Gray
    489 - Completed Orders
    Norman GrayView Profile Hire Me
    Jacobs Gaugh
    2356 - Completed Orders
    Jacobs GaughView Profile Hire Me
    Rose Anderson
    1432 - Completed Orders
    Rose AndersonView Profile Hire Me
    Beat Olhede
    2017 - Completed Orders
    Beat OlhedeView Profile Hire Me
    View All Writers
     
    IAH whatsapp

    Limited Time Offer

    Exclusive Library Membership + FREE Wallet Balance