0% found this document useful (0 votes)
12 views30 pages

Optinet

The dissertation proposal outlines the OptiNet Business Network Infrastructure project, focusing on upgrading network infrastructure to enhance performance, security, and scalability in response to modern technological demands. It emphasizes the importance of Software-Defined Networking (SDN) solutions in addressing challenges like outdated systems and cyber threats, while also detailing project objectives and methodologies for implementation. The proposal aims to create a standardized blueprint for a resilient network architecture that supports future technological advancements and improves overall business operations.

Uploaded by

lolzdindy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views30 pages

Optinet

The dissertation proposal outlines the OptiNet Business Network Infrastructure project, focusing on upgrading network infrastructure to enhance performance, security, and scalability in response to modern technological demands. It emphasizes the importance of Software-Defined Networking (SDN) solutions in addressing challenges like outdated systems and cyber threats, while also detailing project objectives and methodologies for implementation. The proposal aims to create a standardized blueprint for a resilient network architecture that supports future technological advancements and improves overall business operations.

Uploaded by

lolzdindy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Dissertation Proposal

OptiNet Business Network Infrastructure

Catalog

ABSTRACT............................................................................................................................................................................2

PROBLEM STATEMENT....................................................................................................................................................2

PROJECT OBJECTIVES........................................................................................................................................................3

LITERATURE REVIEW......................................................................................................................................................4

OVERVIEW.............................................................................................................................................................................4

IMPORTANCE OF IMPROVING NETWORK INFRASTRUCTURE IN BUSINESS........................................................5

Key Findings from Software-Defined Networking Solutions..................................................................................................5

COMPONENTS OF SOFTWARE DEFINED NETWORKING SOLUTIONS.....................................................................6

FEATURES OD SDN AS A SOLUTION...............................................................................................................................6

TYPES OF EXISTING NETWORK INFRASTRUCTURE...................................................................................................7

Cradlepoint NetCloud..............................................................................................................................................................8

Challenges of the existing Network Infrastructure..................................................................................................................9

CHAPTER THREE: METHODOLOGY..........................................................................................................................10

OVERVIEW...........................................................................................................................................................................10

RESEARCH DESIGN...........................................................................................................................................................10

POPULATION AND SAMPLING........................................................................................................................................11

DATA COLLECTION METHODS......................................................................................................................................11

RESEARCH DESIGN AND DEVELOPMENT METHODOLOGY...................................................................................12

DATA PROCESSING AND ANALYSIS.............................................................................................................................12

ETHICAL CONSIDERATION.............................................................................................................................................13

Design, Implementation, and Testing of a Cisco Enterprise Network for Large Business Enterprise with Packet

Tracer Simulation Tool........................................................................................................................................................13


Scenario..................................................................................................................................................................................15

CONCLUSION.....................................................................................................................................................................23

ABSTRACT.

In a world where rapid data transfer and smooth communication are critical, the importance of a good

networking infrastructure cannot be overstated. Security concerns, scalability issues, and latency are

just a few of the challenges that networking faces today. OptiNet network solutions offer broadband

internet services, cloud connectivity services, and managed services such as network monitoring and

hardware maintenance and replacements. In the course of providing these services globally, they have

come across multiple challenges, such as frequent reports of corporate counterattacks, network

systems that are incompatible with the latest technologies, such as IoT devices, increased complaints

about slow data transfers, and increased latency. I understand the importance of staying ahead of

technological trends to improve efficiency, security, and scalability. This proposal offers a

comprehensive strategy for upgrading our corporate network infrastructure to meet current and future

technological demands.
PROBLEM STATEMENT

To begin, the Department for Digital, Culture, Media, and Sport indicated that among the businesses

reporting counterattacks, 31% of enterprises and 26% of charities declare they were attacked at least

once a week. One in every five businesses (20%) and charities (19%) report a poor outcome as a

direct result of a cyber assault, while one-third of businesses (35%) and nearly four-tenths of charities

(38%) report at least one negative impact. Outdated network systems are more vulnerable to security

flaws and counterattacks. Businesses that fail to update and patch regularly risk exposing critical data

to hackers. Outdated network architecture may be incompatible with current technologies like IoT

devices, cloud services, and virtualization. Aging network equipment or infrastructure may cause

performance bottlenecks, resulting in slow data transfer rates, increased latency, and a poor user

experience. This can stifle innovation and inhibit the adoption of innovative technology within the

organization. Zorzi, M., & Fischione, C. et al. (2018).

The importance of upgrading OptiNet network infrastructure cannot be overemphasized in an era

where the heart of business beats in sync with the flow of connections. The OptiNet project is more

than just an upgrade; it is a bold step forward into a future in which our network catalyzes

unparalleled growth and resilience. It is a strategic response to the changing needs of the digital

landscape to improve our organization's performance, strengthen security measures, and put us at the

forefront of technological innovation. Adaptable Architecture Mastery will be the blueprint for

OptiNet drawings, an adjustable network architecture that predicts and welcomes the future. It's not

just about scalability; it's about creating an infrastructure that can easily absorb tomorrow's

technological tides. This means that security reinforcement, performance enhancement, and low-

latency communication will be handled on a different level.

PROJECT OBJECTIVES

The main objective of this project is to develop a standardized blueprint for a network architecture

that focuses on improving network performance to maintain consistent connectivity and reduce
latency, enhancing network security to protect sensitive data and prevent cyber threats, increasing

scalability to allow for future development and technological advancements, streamlining network

administration processes to increase productivity and minimize downtime, and supporting new

technologies such as IoT devices and cloud-based services.

Detailed aims and objectives

1. Create a template

1.1. Establish research on the equipment that needs to be used.

1.2. Connect the equipment

1.3. Use the research to configure the equipment

1.4. Test the configured equipment

2. Modify the template

2.1. Install access points for easy access

2.2. Configure access points and create QR codes

2.3. Create transparency on access points, making them hidden

3. Configure an offline backup server

3.1. Configure a server for backup.

3.2. Configure the server to check errors in the backing-up process

3.3. Ensure that data uploaded to the cloud is concise

4. Configure cloud server

4.1. Configure cloud server to store data

4.2. Configure the server to check data on the cloud by offline storing data

5. Install Firewalls to keep data protected

6. Install Web Access Filters to keep any malicious website from accessing

7. Install Antivirus

8. Deploy network scalability software to ensure and measure performance.


9. Run tests on the network

LITERATURE REVIEW

OVERVIEW

In today's digital age, a company's network infrastructure must be efficient and resilient to ensure

long-term growth and competitiveness. OptiNet's decision to improve its network infrastructure is a

deliberate response to the changing needs of the digital ecosystem. To address these requirements,

this literature review surveys existing technologies and the wide range of recent and state-of-the-art

projects on Software Defined Networking (SDN), followed by an in-depth discussion of the features

of SDN solutions, major challenges in this area and best practices derived from previous research and

industry experiences. (Kreutz et al., 2014)

An organization's network infrastructure is a valuable asset for providing products and services to

customers. A network infrastructure consists of both hardware (servers and access points) and

software (ERP and CRM apps). Network infrastructure facilitates the efficient flow of data, which is

the fundamental drive for company success. For a long time, connecting a few PCs was about as

difficult as it got. The bandwidth requirements were low, and all of the PCs could be connected with a

single LAN switch. All the systems were built in the same building, and communication with the

outside world was typically done by a single T1-line connection.

Complex data networks in modern enterprises cannot support the inflexibility of old network

infrastructure. Complex equipment is distributed among several physical sites, and there are a lot of

remote workers. People are considering software as a service (SaaS), a subset of service-oriented

architecture (SOA), because eventually not every program will be housed on the company's servers,

and a large number of them might only be accessible online. Some businesses are finding that multi-
protocol label switching (MPLS) is not appropriate due to the variety of data flows. In consideration

of these developments, it's clear to see that the present and future needs of business today are no

longer adequately met using traditional networks.

IMPORTANCE OF IMPROVING NETWORK INFRASTRUCTURE IN BUSINESS

Increased network availability is a direct result of increased network dependability. SDNs can

increase availability by enabling networks to function even in the face of adversity. In the event of a

network outage, this can be accomplished via rerouting to alternative pathways. One significant

impact on availability is the capacity of SDNs to support smooth network-wide state transitions. If the

primary system fails, this might enable a network to switch to a backup system or alter its entire

configuration, and accomplishing this is quite challenging and frequently calls for unique techniques

on certain network devices. SDNs can enable worldwide high-availability systems by using network

overlays to build more straightforward virtual topologies that make rerouting and state management

simpler.

Key Findings from Software-Defined Networking Solutions

Software-defined networking (SDN) is a networking technique that communicates with underlying

hardware infrastructure and directs network traffic via software-based controllers or application

programming interfaces (APIs). This model is different from the traditional networks, which use

dedicated hardware devices such as routers and switches to control network traffic. SDN can create

and control a virtual network or control traditional hardware via software. (Benzekki, et al., (2016))

SDN has the potential to provide flexibility, scalability, and efficiency, all of which are necessary to

satisfy the organization's current and future networking requirements.

According to a survey report by Verizon Enterprise Solutions conducted in 2018, many companies

are looking for ways to speed up the adoption of software-defined networks. The report indicates that
SDN deployment is now well underway. In fact, 15% of firms polled are already piloting or

deploying SDN technology, and this figure is expected to climb to 57% within two years, with 12%

anticipating to have deployed SDN throughout their entire organization in that time frame. However,

31% anticipate slower SDN installations over the next three to five years. This means that firms who

are yet to adopt SDN risk falling behind in the battle for business agility even before they begin.

COMPONENTS OF SOFTWARE DEFINED NETWORKING SOLUTIONS

SDN decouples the software from the hardware. SDN separates the control plane, which selects

where to send traffic to software, from the data plane, which transfers the traffic to the hardware. This

enables network managers who use software-defined networking to program and control the entire

network from a single pane of glass, rather than device by device.

The main components of Software Defined Networking are applications, which convey resource

requests or information about the entire network, Controllers, which use the information from

applications to decide how to route a data packet, and Networking devices, which receive information

from the controller about where to move the data. Physical or virtual networking devices transmit data

over the network. In some circumstances, virtual switches, which can be integrated into either

software or hardware, take over the operations of physical switches and combine them into a single,

intelligent switch. The switch verifies the integrity of both the data packets and their virtual machine

destinations before moving them forward. (“The Overview of SDN Architecture and its practical

application with improving methods,” 2021)

FEATURES OD SDN AS A SOLUTION

Instead of physically manipulating hardware switches, gateways, firewalls, and other network

appliances, software-defined networking makes network operations more like cloud administration.
Unlike traditional networks, SDN provides several additional benefits tailored to the needs of current

digital settings.

Cloud compatibility, SDN's ability to effortlessly integrate with cloud services, IoT devices, and

remote access solutions is one of its main advantages. This allows for improved network efficiency

and lower operating costs. SDN is the ideal solution for network modernization since it centralizes

administration and automation capabilities, which helps enterprises increase resource usage and

streamline network operations. (Bonfim, et al., 2019)

Data and analytic, one of the most significant advantages of SDN is the ability to analyze network

performance data and gain analytical insights. SDN provides critical information on enterprise

resource utilization by connecting to your apps, network switches, and traffic gateways. You can also

identify network bottlenecks before they cause an issue. You can also study network anomalies to

detect attacks and gather security intelligence. As a result, your SDN system should be capable of

providing real-time dashboards as well as on-demand network reports.

Integration readiness, SDN solutions do not operate as separate tools or appliances. They must

communicate with the rest of your corporate stack, which includes network components, business

apps, and IT monitoring tools. The basic goal of SDN is to give you centralized visibility into

network operations and granular control over performance. As a result, the SDN solution you choose

should offer integration using application programming interfaces (APIs) and rebuilt connectors.

Network improbability, SDN allows network behavior to be controlled by software that exists outside

of the networking devices that offer physical connectivity. As a result, network operators can adapt

the behavior of their networks to support new services and even specific users. A programmable SDN

solution enables you to create automated workflows based on specified performance metrics.

Depending on your security settings, you can allow or deny traffic. The SDN solution should have a
command-line interface (CLI) or a graphical user interface (GUI) for writing the automation code.

(BasuMallick, 2022)

TYPES OF EXISTING NETWORK INFRASTRUCTURE

According to Statista, the global market for SDN is predicted to grow from $8 billion in 2020 to over

$43 billion by 2027. This is because there has been a greater investment in moving IT infrastructure

to the cloud, which means there is less dependency on networks and other hardware. (Lionel Sujay

Vailshery, 2024), Software-defined networking market revenue worldwide.

Cisco Meraki

Founded in 2006, Meraki began as an IT business that managed the cloud. To exploit its technology

for Cisco's wireless network solutions, Cisco purchased it in 2012. Cisco Meraki offers software-

defined solutions including WAN, Wi-Fi, mobile device management, and Internet of Things, for

network administration.

Cisco Meraki is a fully cloud-based platform that provides solutions for migrating network operations

to the cloud. It offers open application programming interface (API) services for flexible integration,

as well as a marketplace with over 140 pre-built integration. Meraki is data and analytics-driven, the

Meraki Insight can provide analytic on your LAN, WAN, and SaaS traffic flows. It is programmable,

with an integrated design that facilitates a high level of automation. Cisco Meraki is recognized for

providing excellent assistance for its clients as well as comprehensive guidance and a peer-to-peer

network.

Cisco+ NaaS

Cisco unveiled network as a service (NaaS) solutions under the Cisco+ brand in 2021. Cisco+

delivers all of the tools, technologies, and service support you'll need to deploy, monitor, and manage
your SDN infrastructure. This contains features like secure access service edge (SASE), network

security, hybrid cloud compatibility, and much more.

CISCO+ NaaS's features include cloud compatibility, Cisco+ is a fully cloud-enabled solution

designed for businesses aiming to reduce reliance on on-premises systems. Integration-ready, Cisco is

working together with a number of technology and original equipment manufacturer (OEM) partners

to power Cisco+ integration. Data and analytic-based, in addition to its built-in data dashboards for

network monitoring, firewall, packet inspection, security policy enforcement, and application

performance diagnostics, Cisco+ can link to third-party analytic providers. Cisco+ is also

programmable, Cisco+ NaaS allows for the automation of new user on-boarding, network

orchestration, and other critical tasks. Cisco's solution combines core network hardware, computation,

and storage capabilities with 'as a service' architecture to deliver a comprehensive, cost-effective SDN

solution.

Cradlepoint NetCloud

Cradlepoint, established in 2006, allows you to manage all enterprise connectivity technologies,

including LTE, 5G, WAN, and IoT, using a single SDN platform. Ericsson acquired the company in

2020, but it continues to function as a solo subsidiary. Cradlepoint NetCloud utilizes cloud-based,

software-defined technologies to assist develop and managing wireless networks.

NetCloud's features are, but not limited to, cloud compatibility; it is a cloud-based network

management software that supports WAN, LAN, and IoT. It consists of a variety of software

development kits (SDKs) to enable extension and integration. Data and analytic-driven, it provides

access to full-stack statistical analysis into network health, application performance, and network

security. NetCloud is programmable using policy-based controls, which enable automation based on

traffic routing policies. Cradlepoint is well supported by specialized teams in Asia-Pacific, North

America, Latin America, Africa, and Europe to provide global assistance.

IBM SDN for virtual environments


IBM has been known for supporting governments and major corporations since it was established in

1911. In addition to having its data centers and providing NaaS, it specializes in SDN strategy,

assessment, and consulting. Organizations that work with IBM stand to benefit from a comprehensive

portfolio with end-to-end support. IBM Software Defined Networking Virtual Environment is a

software solution that creates a visualized version of a physical network without requiring any

changes to the actual network. The IBM SDN design provides the virtual environment's underlying

network as a service or overlay network. IBM SDN virtual environment components enable network

virtualization within the SDN platform, regardless of the physical network. IBM SDN virtual

environments use a host-based overlay method to accomplish enhanced network abstraction and

provide application-level network services in large-scale multi-tenant situations. This server-centric

system uses numerous hypervisors to overlay virtual networks on physical networks with IP

connectivity. IBM uses Red Hat's Expansible Automation Platform (owned by IBM) to power

automated network administration.

Challenges of the existing Network Infrastructure

An in-depth discussion of the major challenges in this area has highlighted key areas that need to be

addressed in the network infrastructure upgrade proposal. These issues include ensuring that new

technologies integrate seamlessly with current systems, reducing potential security threats, and

efficiently managing the transition process to minimize disruptions to continuing operations.

As we move forward with the OptiNet network infrastructure upgrading project, it is essential to take

the following into account: How to apply software-defined networking (SDN) in multiple networks to

meet different system requirements, how to trade off various SDN implementations to find the best

option for OptiNet network infrastructure upgrade, and how to maintain network security both during

and after the infrastructure upgrade considering the growing threat of counterattacks in today's digital

world. (Buchegger et al., 2009).


OptiNet might consider creating a software-defined networking solution to address these issues. This

method would handle scalability issues and lower latency, while also offering more control and

flexibility in network administration. By adopting SDN, OptiNet can achieve the following benefits:

1. Improved network performance and efficiency: SDN allows for centralized control and

management of the network, enabling faster data transfer and better resource allocation.

2. Enhanced scalability: SDN enables the network to easily scale up or down based on demand,

allowing OptiNet to efficiently handle the increasing amount of data and traffic from IoT

devices and other emerging technologies.

3. Reduced latency: SDN can help minimize latency by optimizing network paths, ensuring

faster data transfer, and reducing network congestion.

4. Improved security: SDN allows for better network visibility and control, facilitating enhanced

network monitoring and threat detection. This proposal also emphasizes the importance of

considering network security in the implementation of SDN. With the increasing prevalence

of corporate counterattacks and the growing complexity of network systems, security has

become a critical concern for organizations.

Related studies/Work

Published research has been conducted about utilizing Software-defined networking solutions to

improve network infrastructure. According to an article on improving Internet of Things security with

software-defined networking computers, the Internet of Things (IoT) has lately gained popularity

since it is widely used for a variety of applications and devices, including wireless sensors, medical

devices, sensitive home sensors, and other related IoT gadgets. Because of the need to quickly deploy

new IoT devices to the market, security concerns are sometimes disregarded because it takes time to

evaluate all potential vulnerabilities. Because IoT devices are internet-based and contain sensitive and

private information, security concerns have been raised, and various researchers are looking into ways
to improve the security of these devices. Software-defined networking (SDN) is a potential computer

network technology that offers a central application called the 'SDN Controller' that enables system-

wide control. As a result, utilizing SDN is a logical alternative for improving IoT networking

performance and addressing existing deficiencies. (Al Hayajneh et al., 2020)

CHAPTER THREE: METHODOLOGY

OVERVIEW

This part of the project describes the technique used to implement and integrate software-defined

networking systems. This comprises a complete examination of the research design, population and

sampling, data collection methods, system development methodology, system design, and data

processing and analysis.

RESEARCH DESIGN

The experimental research design will be used to conduct the study. According to (Maxwell, J.A.

(2012)) research design provides researchers with a user-friendly, step-by-step guide to planning

qualitative research. The experimental research design will be suitable for the research because it will

facilitate efficient and progressive sailing of various research operations during the study.

To collect relevant data for the research, both primary and secondary sources will be used. Primary

data will be gathered through interviews with IT experts and network engineers who have

implemented SDN systems. Secondary data will be gathered by a thorough evaluation of current

literature, which will include academic articles, industry reports, and case studies on the use of SDN

in network infrastructure improvement.

POPULATION AND SAMPLING


The target population often influences the determination of the sample size (Draugalis, et al

2009). The target population in this research will comprise IT experts, network engineers, and service

providers from enterprise companies that have adopted software-defined networking solutions. The

choice of this target population is influenced by the fact network experts have direct access to the

network infrastructure of a company and are the major decision-makers when it comes to network

infrastructure upgrades. A sample is a subset of the population selected to be a representative of the

larger population (AS Acharya, et al 2013). Random sampling will be used to establish equal

participation of the members in the population under study. Due to the unavailability of network

experts, and the difficulty and high costs of contacting them, a sample will be conducted on several

service providers and network experts. Random sampling technique is most preferable in this research

because it eliminates biases in terms of gender, skin color, tribe, ethnicity, or religion.

DATA COLLECTION METHODS

Mail Survey will be used to collect data from the prepared questionnaire. Mail surveys are a popular

data collection approach for gathering information from a large number of respondents. Duncan, W. J.

(1979). A well-designed survey questionnaire will be given to network administrators, IT

professionals, and decision-makers to gather quantitative data on their experiences, perceptions, and

opinions concerning SDN adoption, as well as specific elements of network infrastructure

improvement.

Semi-structured phone interviews will be conducted to enable us to delve into complicated topics

surrounding SDN adoption, including challenges, success factors, and best practices for upgrading

network infrastructure. These data collection methods will be used because they are cost-effective,

allow for an objective comparison of the various experts, and also allow the experts to ask for
clarification on responses and express their free flow of ideas, provision for respondent anonymity

and answers are equally as valid as face to face interview. (Smith,2019).

RESEARCH DESIGN AND DEVELOPMENT METHODOLOGY

The system will be developed using the Agile system development methodology. Agile system

development methodology is a software development approach that employs continual planning,

learning, improvement, team collaboration, evolutionary development, and early delivery. It

encourages flexible responses to change (M. Rizwan Jameel Qureshi,2012). This methodology is

suitable for this research because of its adaptive approach and its ability to respond to the changing

requirements of the people using the system, the environment, and the system itself.

This methodology will focus on iterative development and continual feedback to improve the research

process and SDN implementation. The process will be grouped into different activities;

ACTIVITY 1: Network Diagnosis and Specifications Gathering.

 Analyze network traffic data and conduct interviews with network administrators.

 Determine existing network issues and performance constraints.

 Define key performance indicators (KPIs) for measuring network improvement (latency,

throughput, availability).

ACTIVITY 2: SDN Solution Research & Evaluation

 Investigate popular SDN controllers and vendors based on defined requirements; scalability,

compatibility, and security features.

 Conduct proof-of-concept testing in a controlled environment.

 Evaluate the different SDN solutions based on their performance, cost, and simplicity of

implementation.
Based on the findings, improve the research objectives, update SDN solution evaluation criteria, or

change KPIs for measuring network improvement. Organize regular stakeholder meetings to establish

alignment with corporate objectives.

DATA PROCESSING AND ANALYSIS

This phase of research will encompass processing data as well as analyzing it. The processing

stage will involve collecting information from a variety of sources, including network monitoring

tools, performance measurements, surveys, interviews, and publications. Ensure data integrity,

accuracy, and completeness by following proper validation and verification methods. The analysis

stage will involve descriptive analysis, to identify patterns, trends, and anomalies in the data

collected, and visualize the information using charts, graphs, and histograms. performance evaluation

will be used to measure important performance measures such as throughput, latency, packet loss, and

network utilization before and after SDN deployment.

ETHICAL CONSIDERATION

Ethics are standard norms of conduct that give a distinction between right and wrong (Noddings, N.

(2013)). The ethical specifications to be considered include: Data privacy and security, the SDN

solution will protect data against illegal access and data breaches by implementing encryption, access

restrictions and putting other security measures into place, and adhering to relevant data protection

laws and compliance standards. Transparency and accountability, OptiNet will be transparent about

the SDN solution's features, constraints, and potential hazards and provide stakeholders with clear

documentation and communication on how data is captured, processed, and used in the SDN

environment. Durability and reliability, ensure that the SDN solution can resist any disruptions,

malfunctions, and counterattacks, implement redundancy, backup mechanisms, and disaster recovery
strategies to provide network durability and reliability and reduce the risk of service disruptions and

downtime by implementing proactive monitoring, troubleshooting, and incident response techniques.

Design, Implementation, and Testing of a Cisco Enterprise Network for

Large Business Enterprise with Packet Tracer Simulation Tool

In the modern business landscape, large enterprises heavily rely on robust and efficient networks to

ensure seamless communication, data transmission, and access to resources across different

departments and locations.The design, implementation, and testing of a Cisco enterprise network for a

large business enterprise is crucial to meet these requirements. To start the process, the first step is to

gather and analyze the network requirements of the organization. This involves understanding the

business goals, the number of users, their roles and responsibilities, the applications they will be

using, the expected network traffic volume and patterns, and any specific security or compliance

requirements.Once the network requirements have been identified, the next step is to design the

network topology. The network topology should be designed to meet the organization's requirements

in terms of scalability, redundancy, and performance. It should also take into account factors such as

the physical layout of the premises, the availability of network resources, and any existing

infrastructure that needs to be integrated. After the network topology has been designed, the next step

is to select and configure the appropriate Cisco networking devices. These devices may include

routers, switches, firewalls, and access points. Careful consideration should be given to the

specifications and capabilities of these devices to ensure they meet the requirements of the network

design. In addition to the hardware, the network design should also include the addressing and routing

scheme, VLAN configurations, security mechanisms such as firewalls and VPNs, and any necessary

network services such as DNS and DHCP.

Once the network design and device selection have been completed, the next step is the

implementation of the network.This involves physically setting up the network devices, connecting
them according to the design, and configuring them to match the network settings. During the

implementation phase, it is important to follow best practices and adhere to industry standards to

ensure the stability and security of the network. This includes properly configuring access control

lists, enabling strong encryption protocols, and implementing network monitoring and management

tools (Ghasemshirazi et al., 2023).

The final step in the process is testing and verification. During this step, the functionality and

performance of the network are evaluated to ensure that it meets the desired objectives. This includes

conducting various tests, such as connectivity tests, bandwidth tests, and security vulnerability

assessments.Once the testing phase is complete and any necessary adjustments or fixes have been

made, the network can be put into production. To ensure the security and stability of the network,

regular monitoring and maintenance should be conducted to detect and address any issues or

vulnerabilities that may arise.In order to secure the network architecture, it is important to implement

various measures such as routing protocols, encryption, firewalls, and virtual private networks. To

secure the network architecture, it is important to implement a multi-layered approach to network

security. This includes implementing access controls at various levels, such as network segmentation

and micro-perimeters. This entails categorizing devices based on their type, function, and level of

data sensitivity.

Scenario.

The Routing table that was used was

Table 1: Current Router Networking and Information


Site number

Orlando Site Router 1 Management VLAN

IP - 192.168.1.0

Production VLAN

IP - 192.168.11.0

Internet VLAN

IP-

IP Assignments

Loopback - 10.1.1.1/32

VPN Tunnels

TBD - based on requirements

Phoenix Site Router 1 2 Management VLAN

IP - 192.168.2.0

Production VLAN

IP - 192.168.22.0

Internet VLAN

IP-

IP Assignments

Loopback - 10.2.2.2/32
VPN Tunnels

TBD - based on requirements


Site number

Phoenix Site Router 2 3 Management VLAN

IP - 192.168.3.0

Production VLAN

IP - 192.168.33.0

Internet VLAN

IP-

IP Assignments

Loopback - 10.3.3.3/32

VPN Tunnels

TBD - based on requirements

Toronto Site Router 4 Management VLAN

IP - 192.168.4.0

Production VLAN

IP - 192.168.44.0

Internet VLAN

IP-
IP Assignments

Loopback - 10.4.4.4/32

VPN Tunnels

TBD - based on requirements

Table 2: Orlando Site

Net ID Usable Range Subnet Mask CIDR Broadcast

Value

192.168.1.0 192.168.1.1 – 192.168.1.254 255.255.255.0 /24 192.128.1.255


Net ID Usable Range Subnet Mask CIDR Broadcast

Value

192.168.11.1 – 255.255.255.0 /24

192.168.11.254
192.168.11.0 192.168.11.255

10.1.1.1 10.1.1.1 – 10.1.1.1 /32 10.1.1.1

255.255.255.255

Table 3: Phoenix Site

Net ID Usable Range Subnet Mask CIDR Broadcast

Value

192.168.2.0 192.168.2.1 – 255.255.255.0 /24 192.168.2.255

192.168.2.254

192.168.22.1 - 255.255.255.0 /24 192.168.22.255

192.168.22.254
192.168.22.0
10.2.2.2 10.2.2.2 – 10.2.2.2 255.255.255.25 /32 192.168.3.255

192.168.3.0 192.168.3.1 - 192.168.3.254 255.255.255.0 /24 192.168.3.255

192.168.33.0 192.168.33.1 - 255.255.255.0 /24 192.168.33.255

192.168.33.254

10.3.3.3 10.3.3.3 – 10.3.3.3 255.255.255.25 /32 10.3.3.3

Table 4: Toronto Site

Net ID Usable Range Subnet Mask CIDR Broadcast

Value

192.168.4.0 192.168.4.1 - 192.168.4.254 255.255.255.0 /24 192.168.4.255

192.168.44. 192.168.44.1 - 255.255.255.0 /24 192.168.44.255


Net ID Usable Range Subnet Mask CIDR Broadcast

Value

0 192.168.44.254

10.4.4.4 10.4.4.4 – 10.4.4.4 255.255.255.255 /32 10.4.4.4

Screenshots of Network in Cisco Packet Tracer

Figure 1: Design of the entire network


Figure 2: The network design of Orlando
Figure 3: The network design of Phoenix

Figure 4: The network design of Toronto


CONCLUSION.

In today's digital age, enterprise network infrastructure is critical to the success of

organizations. It is the backbone of communication and data transfer within and between

organizations. Cisco, a leading technology company, provides a comprehensive enterprise

network infrastructure solution that includes hardware, software, and services. In this essay,

we will explore the importance of Cisco enterprise network infrastructure, its key

components, and the benefits it provides to organizations.

Enterprise network infrastructure refers to the physical and virtual components that make up

a network. It includes hardware devices such as routers, switches, and firewalls, as well as

software services such as DHCP, DNS, and NAT. The primary function of enterprise network

infrastructure is to provide connectivity, security, and accessibility to users and devices within

an organization. In today's digital world, where remote access and collaboration are essential,

enterprise network infrastructure plays a critical role in the success of organizations. Cisco

enterprise network infrastructure is a comprehensive solution that provides organizations with

a complete range of network infrastructure products and services.


REFERENCES.

1. Benzekki, K., El Fergougui, A., & Elbelrhiti Elalaoui, A. (2016). Software-defined

networking (SDN): A survey. Security and Communication Networks.

1. BasuMallick, C. (2022, February 10). Top 10 Software-Defined Networking (SDN)

Solutions in 2022. Spiceworks. https://www.spiceworks.com/tech/networking/articles/best-

sdn-solutions/

2. Buchegger, S., & Datta, A. (2009, February). A case for P2P infrastructure for social networks-opportunities

& challenges. In 2009 Sixth International Conference on Wireless On-Demand Network Systems and

Services (pp. 161-168). IEEE.

3. Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2014).

Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.

4. Bonfim, M. S., Dias, K. L., & Fernandes, S. F. (2019). Integrated NFV/SDN architectures: A systematic
literature review. ACM Computing Surveys (CSUR), 51(6), 1-39.

5. Bereketab Birhanu Deneke, Asrat Mulatu Beyene, Endalew Ayenew Haile. (2024). Improving

Software Defined Network controllers in a multi-vendor environment. Heliyon,

https://doi.org/10.1016/j.heliyon.2024.

6. Ghasemshirazi, S., Shirvani, G. and Alipour, M.A. (2023) Zero trust: Applications,

challenges, and opportunities, arXiv.org. Available at: https://arxiv.org/abs/2309.03582

(Accessed: 11 April 2024).

7. Maxwell, Joseph. (2012). Qualitative Research Design : An Interactive Approach / J.A.

Maxwell..

8. Gan, G.; Lu, Z.; Jiang, J. Internet of Things Security Analysis. In Proceedings of the 2011

International Conference on Internet Technology and Applications, Wuhan, China, 16–18 August

2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–4. [Google Scholar]
9. Software-Defined Networking: The New Norm for Networks. Available online:

https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-

newnorm.pdf (accessed on 5 January 2020).

10. Tariq, J.; Riaz, T.; Rasheed, A. A Layer2 Firewall for Software Defined Network. In Proceedings

of the 2014 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi,

Pakistan, 12–13 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 39–42. [Google Scholar]

11. Michelle, S.; Park, S.H.; Lee, B.; Yang, S. Building Firewall over the Software-Defined Network

Controller. In Proceedings of the 16th International Conference on Advanced Communication

Technology, Chennal, India, 27–28 February 2013; IEEE: Piscataway, NJ, USA, 2014; pp. 744–748.

[Google Scholar]

12. Pena, J.G.V.; Yu, W.E. Development of a Distributed Firewall Using Software Defined

Networking Technology. In Proceedings of the 2014 4th IEEE International Conference on

Information Science and Technology, Busab, Korea, 26 February–1 March 2014; IEEE: Piscataway,

NJ, USA, 2014; pp. 449–452. [Google Scholar]

13. Rolbin, M. Early Detection of Network Threats Using Software Defined Network (SDN) and

Virtualization. Master’s Thesis, Carleton University, Ottawa, OT, Canada, 2013. [Google Scholar]

14. Sood, K.; Yu, S.; Xiang, Y. Software-Defined Wireless Networking Opportunities and Challenges

for Internet-of-Things: A review. IEEE Int. Things J. 2015, 3, 453–463. [Google Scholar] [CrossRef]

15. Zhijing, Q.; Denker, G.; Giannelli, C.; Bellavista, P.; Venkatasubramanian, N. A Software Defined

Networking Architecture for the Internet-of-Things. In Proceedings of the 2014 IEEE Network

Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014; IEEE:

Piscataway, NJ, USA, 2014; pp. 1–9. [Google Scholar].

You might also like