Implementation and Testing of Proposed Campus Network

Author(s):  
Dhurgham AbdulRidha Kadhim ◽  
Abd Kadir Mahamad ◽  
Nik Shahidah Afifi Taujuddin ◽  
Sharifah Saon ◽  
Umi Fadlilah ◽  
...  
Keyword(s):  
Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


2021 ◽  
Vol 1865 (4) ◽  
pp. 042014
Author(s):  
Zhengchun Zhou ◽  
Tongcheng Huang
Keyword(s):  

2019 ◽  
Vol 16 (05) ◽  
pp. 1950029
Author(s):  
Mohammed Abdul Rahman AlShehri ◽  
Shailendra Mishra

Software defined network (SDN) controller selection in SDN is a key challenge to the network administrator. In SDN, control plane is an isolated process and operate on control layer. The controller provides a universal view of the entire network and support applications and services. The three focused parameters for controller selection are productivity, campus network and open source. In SDN, it is vital to have a good device for the efficient processing of all requests made by the switch and for good behavior of the network. For selecting best controller for the specified parameters, decision logic has to be developed that allow us to do comparison of the available controllers. Therefore, in this research we have suggested a methodology that uses analytic-hierarchy-process (AHP) to find a best controller. The approach has been studied and verified for a big organization network setup of Al-Majmaah University, Saudi Arabia. The approach is found to be more effective and increase the network performance significantly.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2014 ◽  
Vol 568-570 ◽  
pp. 1355-1359
Author(s):  
Rong Wang ◽  
Bo Ping Zhang ◽  
Ai Min Sun

Three common transitional technologies are analyzed ,that is, the tunnel technique, the dual protocol stack, and the translation technique (NAT-PT).An updating technology solution of IPv6 for the campus network are proposed,especially for the routing technology of IPv6 using the Cisco 7603 router, finally, the installation and configuration of IPv6 are introduced Briefly.


Sign in / Sign up

Export Citation Format

Share Document