Optinet
Optinet
Catalog
ABSTRACT............................................................................................................................................................................2
PROBLEM STATEMENT....................................................................................................................................................2
PROJECT OBJECTIVES........................................................................................................................................................3
LITERATURE REVIEW......................................................................................................................................................4
OVERVIEW.............................................................................................................................................................................4
Cradlepoint NetCloud..............................................................................................................................................................8
OVERVIEW...........................................................................................................................................................................10
RESEARCH DESIGN...........................................................................................................................................................10
ETHICAL CONSIDERATION.............................................................................................................................................13
Design, Implementation, and Testing of a Cisco Enterprise Network for Large Business Enterprise with Packet
CONCLUSION.....................................................................................................................................................................23
ABSTRACT.
In a world where rapid data transfer and smooth communication are critical, the importance of a good
networking infrastructure cannot be overstated. Security concerns, scalability issues, and latency are
just a few of the challenges that networking faces today. OptiNet network solutions offer broadband
internet services, cloud connectivity services, and managed services such as network monitoring and
hardware maintenance and replacements. In the course of providing these services globally, they have
come across multiple challenges, such as frequent reports of corporate counterattacks, network
systems that are incompatible with the latest technologies, such as IoT devices, increased complaints
about slow data transfers, and increased latency. I understand the importance of staying ahead of
technological trends to improve efficiency, security, and scalability. This proposal offers a
comprehensive strategy for upgrading our corporate network infrastructure to meet current and future
technological demands.
PROBLEM STATEMENT
To begin, the Department for Digital, Culture, Media, and Sport indicated that among the businesses
reporting counterattacks, 31% of enterprises and 26% of charities declare they were attacked at least
once a week. One in every five businesses (20%) and charities (19%) report a poor outcome as a
direct result of a cyber assault, while one-third of businesses (35%) and nearly four-tenths of charities
(38%) report at least one negative impact. Outdated network systems are more vulnerable to security
flaws and counterattacks. Businesses that fail to update and patch regularly risk exposing critical data
to hackers. Outdated network architecture may be incompatible with current technologies like IoT
devices, cloud services, and virtualization. Aging network equipment or infrastructure may cause
performance bottlenecks, resulting in slow data transfer rates, increased latency, and a poor user
experience. This can stifle innovation and inhibit the adoption of innovative technology within the
where the heart of business beats in sync with the flow of connections. The OptiNet project is more
than just an upgrade; it is a bold step forward into a future in which our network catalyzes
unparalleled growth and resilience. It is a strategic response to the changing needs of the digital
landscape to improve our organization's performance, strengthen security measures, and put us at the
forefront of technological innovation. Adaptable Architecture Mastery will be the blueprint for
OptiNet drawings, an adjustable network architecture that predicts and welcomes the future. It's not
just about scalability; it's about creating an infrastructure that can easily absorb tomorrow's
technological tides. This means that security reinforcement, performance enhancement, and low-
PROJECT OBJECTIVES
The main objective of this project is to develop a standardized blueprint for a network architecture
that focuses on improving network performance to maintain consistent connectivity and reduce
latency, enhancing network security to protect sensitive data and prevent cyber threats, increasing
scalability to allow for future development and technological advancements, streamlining network
administration processes to increase productivity and minimize downtime, and supporting new
1. Create a template
4.2. Configure the server to check data on the cloud by offline storing data
6. Install Web Access Filters to keep any malicious website from accessing
7. Install Antivirus
LITERATURE REVIEW
OVERVIEW
In today's digital age, a company's network infrastructure must be efficient and resilient to ensure
long-term growth and competitiveness. OptiNet's decision to improve its network infrastructure is a
deliberate response to the changing needs of the digital ecosystem. To address these requirements,
this literature review surveys existing technologies and the wide range of recent and state-of-the-art
projects on Software Defined Networking (SDN), followed by an in-depth discussion of the features
of SDN solutions, major challenges in this area and best practices derived from previous research and
An organization's network infrastructure is a valuable asset for providing products and services to
customers. A network infrastructure consists of both hardware (servers and access points) and
software (ERP and CRM apps). Network infrastructure facilitates the efficient flow of data, which is
the fundamental drive for company success. For a long time, connecting a few PCs was about as
difficult as it got. The bandwidth requirements were low, and all of the PCs could be connected with a
single LAN switch. All the systems were built in the same building, and communication with the
Complex data networks in modern enterprises cannot support the inflexibility of old network
infrastructure. Complex equipment is distributed among several physical sites, and there are a lot of
remote workers. People are considering software as a service (SaaS), a subset of service-oriented
architecture (SOA), because eventually not every program will be housed on the company's servers,
and a large number of them might only be accessible online. Some businesses are finding that multi-
protocol label switching (MPLS) is not appropriate due to the variety of data flows. In consideration
of these developments, it's clear to see that the present and future needs of business today are no
Increased network availability is a direct result of increased network dependability. SDNs can
increase availability by enabling networks to function even in the face of adversity. In the event of a
network outage, this can be accomplished via rerouting to alternative pathways. One significant
impact on availability is the capacity of SDNs to support smooth network-wide state transitions. If the
primary system fails, this might enable a network to switch to a backup system or alter its entire
configuration, and accomplishing this is quite challenging and frequently calls for unique techniques
on certain network devices. SDNs can enable worldwide high-availability systems by using network
overlays to build more straightforward virtual topologies that make rerouting and state management
simpler.
hardware infrastructure and directs network traffic via software-based controllers or application
programming interfaces (APIs). This model is different from the traditional networks, which use
dedicated hardware devices such as routers and switches to control network traffic. SDN can create
and control a virtual network or control traditional hardware via software. (Benzekki, et al., (2016))
SDN has the potential to provide flexibility, scalability, and efficiency, all of which are necessary to
According to a survey report by Verizon Enterprise Solutions conducted in 2018, many companies
are looking for ways to speed up the adoption of software-defined networks. The report indicates that
SDN deployment is now well underway. In fact, 15% of firms polled are already piloting or
deploying SDN technology, and this figure is expected to climb to 57% within two years, with 12%
anticipating to have deployed SDN throughout their entire organization in that time frame. However,
31% anticipate slower SDN installations over the next three to five years. This means that firms who
are yet to adopt SDN risk falling behind in the battle for business agility even before they begin.
SDN decouples the software from the hardware. SDN separates the control plane, which selects
where to send traffic to software, from the data plane, which transfers the traffic to the hardware. This
enables network managers who use software-defined networking to program and control the entire
The main components of Software Defined Networking are applications, which convey resource
requests or information about the entire network, Controllers, which use the information from
applications to decide how to route a data packet, and Networking devices, which receive information
from the controller about where to move the data. Physical or virtual networking devices transmit data
over the network. In some circumstances, virtual switches, which can be integrated into either
software or hardware, take over the operations of physical switches and combine them into a single,
intelligent switch. The switch verifies the integrity of both the data packets and their virtual machine
destinations before moving them forward. (“The Overview of SDN Architecture and its practical
Instead of physically manipulating hardware switches, gateways, firewalls, and other network
appliances, software-defined networking makes network operations more like cloud administration.
Unlike traditional networks, SDN provides several additional benefits tailored to the needs of current
digital settings.
Cloud compatibility, SDN's ability to effortlessly integrate with cloud services, IoT devices, and
remote access solutions is one of its main advantages. This allows for improved network efficiency
and lower operating costs. SDN is the ideal solution for network modernization since it centralizes
administration and automation capabilities, which helps enterprises increase resource usage and
Data and analytic, one of the most significant advantages of SDN is the ability to analyze network
performance data and gain analytical insights. SDN provides critical information on enterprise
resource utilization by connecting to your apps, network switches, and traffic gateways. You can also
identify network bottlenecks before they cause an issue. You can also study network anomalies to
detect attacks and gather security intelligence. As a result, your SDN system should be capable of
Integration readiness, SDN solutions do not operate as separate tools or appliances. They must
communicate with the rest of your corporate stack, which includes network components, business
apps, and IT monitoring tools. The basic goal of SDN is to give you centralized visibility into
network operations and granular control over performance. As a result, the SDN solution you choose
should offer integration using application programming interfaces (APIs) and rebuilt connectors.
Network improbability, SDN allows network behavior to be controlled by software that exists outside
of the networking devices that offer physical connectivity. As a result, network operators can adapt
the behavior of their networks to support new services and even specific users. A programmable SDN
solution enables you to create automated workflows based on specified performance metrics.
Depending on your security settings, you can allow or deny traffic. The SDN solution should have a
command-line interface (CLI) or a graphical user interface (GUI) for writing the automation code.
(BasuMallick, 2022)
According to Statista, the global market for SDN is predicted to grow from $8 billion in 2020 to over
$43 billion by 2027. This is because there has been a greater investment in moving IT infrastructure
to the cloud, which means there is less dependency on networks and other hardware. (Lionel Sujay
Cisco Meraki
Founded in 2006, Meraki began as an IT business that managed the cloud. To exploit its technology
for Cisco's wireless network solutions, Cisco purchased it in 2012. Cisco Meraki offers software-
defined solutions including WAN, Wi-Fi, mobile device management, and Internet of Things, for
network administration.
Cisco Meraki is a fully cloud-based platform that provides solutions for migrating network operations
to the cloud. It offers open application programming interface (API) services for flexible integration,
as well as a marketplace with over 140 pre-built integration. Meraki is data and analytics-driven, the
Meraki Insight can provide analytic on your LAN, WAN, and SaaS traffic flows. It is programmable,
with an integrated design that facilitates a high level of automation. Cisco Meraki is recognized for
providing excellent assistance for its clients as well as comprehensive guidance and a peer-to-peer
network.
Cisco+ NaaS
Cisco unveiled network as a service (NaaS) solutions under the Cisco+ brand in 2021. Cisco+
delivers all of the tools, technologies, and service support you'll need to deploy, monitor, and manage
your SDN infrastructure. This contains features like secure access service edge (SASE), network
CISCO+ NaaS's features include cloud compatibility, Cisco+ is a fully cloud-enabled solution
designed for businesses aiming to reduce reliance on on-premises systems. Integration-ready, Cisco is
working together with a number of technology and original equipment manufacturer (OEM) partners
to power Cisco+ integration. Data and analytic-based, in addition to its built-in data dashboards for
network monitoring, firewall, packet inspection, security policy enforcement, and application
performance diagnostics, Cisco+ can link to third-party analytic providers. Cisco+ is also
programmable, Cisco+ NaaS allows for the automation of new user on-boarding, network
orchestration, and other critical tasks. Cisco's solution combines core network hardware, computation,
and storage capabilities with 'as a service' architecture to deliver a comprehensive, cost-effective SDN
solution.
Cradlepoint NetCloud
Cradlepoint, established in 2006, allows you to manage all enterprise connectivity technologies,
including LTE, 5G, WAN, and IoT, using a single SDN platform. Ericsson acquired the company in
2020, but it continues to function as a solo subsidiary. Cradlepoint NetCloud utilizes cloud-based,
NetCloud's features are, but not limited to, cloud compatibility; it is a cloud-based network
management software that supports WAN, LAN, and IoT. It consists of a variety of software
development kits (SDKs) to enable extension and integration. Data and analytic-driven, it provides
access to full-stack statistical analysis into network health, application performance, and network
security. NetCloud is programmable using policy-based controls, which enable automation based on
traffic routing policies. Cradlepoint is well supported by specialized teams in Asia-Pacific, North
1911. In addition to having its data centers and providing NaaS, it specializes in SDN strategy,
assessment, and consulting. Organizations that work with IBM stand to benefit from a comprehensive
portfolio with end-to-end support. IBM Software Defined Networking Virtual Environment is a
software solution that creates a visualized version of a physical network without requiring any
changes to the actual network. The IBM SDN design provides the virtual environment's underlying
network as a service or overlay network. IBM SDN virtual environment components enable network
virtualization within the SDN platform, regardless of the physical network. IBM SDN virtual
environments use a host-based overlay method to accomplish enhanced network abstraction and
system uses numerous hypervisors to overlay virtual networks on physical networks with IP
connectivity. IBM uses Red Hat's Expansible Automation Platform (owned by IBM) to power
An in-depth discussion of the major challenges in this area has highlighted key areas that need to be
addressed in the network infrastructure upgrade proposal. These issues include ensuring that new
technologies integrate seamlessly with current systems, reducing potential security threats, and
As we move forward with the OptiNet network infrastructure upgrading project, it is essential to take
the following into account: How to apply software-defined networking (SDN) in multiple networks to
meet different system requirements, how to trade off various SDN implementations to find the best
option for OptiNet network infrastructure upgrade, and how to maintain network security both during
and after the infrastructure upgrade considering the growing threat of counterattacks in today's digital
method would handle scalability issues and lower latency, while also offering more control and
flexibility in network administration. By adopting SDN, OptiNet can achieve the following benefits:
1. Improved network performance and efficiency: SDN allows for centralized control and
management of the network, enabling faster data transfer and better resource allocation.
2. Enhanced scalability: SDN enables the network to easily scale up or down based on demand,
allowing OptiNet to efficiently handle the increasing amount of data and traffic from IoT
3. Reduced latency: SDN can help minimize latency by optimizing network paths, ensuring
4. Improved security: SDN allows for better network visibility and control, facilitating enhanced
network monitoring and threat detection. This proposal also emphasizes the importance of
considering network security in the implementation of SDN. With the increasing prevalence
of corporate counterattacks and the growing complexity of network systems, security has
Related studies/Work
Published research has been conducted about utilizing Software-defined networking solutions to
improve network infrastructure. According to an article on improving Internet of Things security with
software-defined networking computers, the Internet of Things (IoT) has lately gained popularity
since it is widely used for a variety of applications and devices, including wireless sensors, medical
devices, sensitive home sensors, and other related IoT gadgets. Because of the need to quickly deploy
new IoT devices to the market, security concerns are sometimes disregarded because it takes time to
evaluate all potential vulnerabilities. Because IoT devices are internet-based and contain sensitive and
private information, security concerns have been raised, and various researchers are looking into ways
to improve the security of these devices. Software-defined networking (SDN) is a potential computer
network technology that offers a central application called the 'SDN Controller' that enables system-
wide control. As a result, utilizing SDN is a logical alternative for improving IoT networking
OVERVIEW
This part of the project describes the technique used to implement and integrate software-defined
networking systems. This comprises a complete examination of the research design, population and
sampling, data collection methods, system development methodology, system design, and data
RESEARCH DESIGN
The experimental research design will be used to conduct the study. According to (Maxwell, J.A.
(2012)) research design provides researchers with a user-friendly, step-by-step guide to planning
qualitative research. The experimental research design will be suitable for the research because it will
facilitate efficient and progressive sailing of various research operations during the study.
To collect relevant data for the research, both primary and secondary sources will be used. Primary
data will be gathered through interviews with IT experts and network engineers who have
implemented SDN systems. Secondary data will be gathered by a thorough evaluation of current
literature, which will include academic articles, industry reports, and case studies on the use of SDN
2009). The target population in this research will comprise IT experts, network engineers, and service
providers from enterprise companies that have adopted software-defined networking solutions. The
choice of this target population is influenced by the fact network experts have direct access to the
network infrastructure of a company and are the major decision-makers when it comes to network
larger population (AS Acharya, et al 2013). Random sampling will be used to establish equal
participation of the members in the population under study. Due to the unavailability of network
experts, and the difficulty and high costs of contacting them, a sample will be conducted on several
service providers and network experts. Random sampling technique is most preferable in this research
because it eliminates biases in terms of gender, skin color, tribe, ethnicity, or religion.
Mail Survey will be used to collect data from the prepared questionnaire. Mail surveys are a popular
data collection approach for gathering information from a large number of respondents. Duncan, W. J.
professionals, and decision-makers to gather quantitative data on their experiences, perceptions, and
improvement.
Semi-structured phone interviews will be conducted to enable us to delve into complicated topics
surrounding SDN adoption, including challenges, success factors, and best practices for upgrading
network infrastructure. These data collection methods will be used because they are cost-effective,
allow for an objective comparison of the various experts, and also allow the experts to ask for
clarification on responses and express their free flow of ideas, provision for respondent anonymity
The system will be developed using the Agile system development methodology. Agile system
encourages flexible responses to change (M. Rizwan Jameel Qureshi,2012). This methodology is
suitable for this research because of its adaptive approach and its ability to respond to the changing
requirements of the people using the system, the environment, and the system itself.
This methodology will focus on iterative development and continual feedback to improve the research
process and SDN implementation. The process will be grouped into different activities;
Analyze network traffic data and conduct interviews with network administrators.
Define key performance indicators (KPIs) for measuring network improvement (latency,
throughput, availability).
Investigate popular SDN controllers and vendors based on defined requirements; scalability,
Evaluate the different SDN solutions based on their performance, cost, and simplicity of
implementation.
Based on the findings, improve the research objectives, update SDN solution evaluation criteria, or
change KPIs for measuring network improvement. Organize regular stakeholder meetings to establish
This phase of research will encompass processing data as well as analyzing it. The processing
stage will involve collecting information from a variety of sources, including network monitoring
tools, performance measurements, surveys, interviews, and publications. Ensure data integrity,
accuracy, and completeness by following proper validation and verification methods. The analysis
stage will involve descriptive analysis, to identify patterns, trends, and anomalies in the data
collected, and visualize the information using charts, graphs, and histograms. performance evaluation
will be used to measure important performance measures such as throughput, latency, packet loss, and
ETHICAL CONSIDERATION
Ethics are standard norms of conduct that give a distinction between right and wrong (Noddings, N.
(2013)). The ethical specifications to be considered include: Data privacy and security, the SDN
solution will protect data against illegal access and data breaches by implementing encryption, access
restrictions and putting other security measures into place, and adhering to relevant data protection
laws and compliance standards. Transparency and accountability, OptiNet will be transparent about
the SDN solution's features, constraints, and potential hazards and provide stakeholders with clear
documentation and communication on how data is captured, processed, and used in the SDN
environment. Durability and reliability, ensure that the SDN solution can resist any disruptions,
malfunctions, and counterattacks, implement redundancy, backup mechanisms, and disaster recovery
strategies to provide network durability and reliability and reduce the risk of service disruptions and
In the modern business landscape, large enterprises heavily rely on robust and efficient networks to
ensure seamless communication, data transmission, and access to resources across different
departments and locations.The design, implementation, and testing of a Cisco enterprise network for a
large business enterprise is crucial to meet these requirements. To start the process, the first step is to
gather and analyze the network requirements of the organization. This involves understanding the
business goals, the number of users, their roles and responsibilities, the applications they will be
using, the expected network traffic volume and patterns, and any specific security or compliance
requirements.Once the network requirements have been identified, the next step is to design the
network topology. The network topology should be designed to meet the organization's requirements
in terms of scalability, redundancy, and performance. It should also take into account factors such as
the physical layout of the premises, the availability of network resources, and any existing
infrastructure that needs to be integrated. After the network topology has been designed, the next step
is to select and configure the appropriate Cisco networking devices. These devices may include
routers, switches, firewalls, and access points. Careful consideration should be given to the
specifications and capabilities of these devices to ensure they meet the requirements of the network
design. In addition to the hardware, the network design should also include the addressing and routing
scheme, VLAN configurations, security mechanisms such as firewalls and VPNs, and any necessary
Once the network design and device selection have been completed, the next step is the
implementation of the network.This involves physically setting up the network devices, connecting
them according to the design, and configuring them to match the network settings. During the
implementation phase, it is important to follow best practices and adhere to industry standards to
ensure the stability and security of the network. This includes properly configuring access control
lists, enabling strong encryption protocols, and implementing network monitoring and management
The final step in the process is testing and verification. During this step, the functionality and
performance of the network are evaluated to ensure that it meets the desired objectives. This includes
conducting various tests, such as connectivity tests, bandwidth tests, and security vulnerability
assessments.Once the testing phase is complete and any necessary adjustments or fixes have been
made, the network can be put into production. To ensure the security and stability of the network,
regular monitoring and maintenance should be conducted to detect and address any issues or
vulnerabilities that may arise.In order to secure the network architecture, it is important to implement
various measures such as routing protocols, encryption, firewalls, and virtual private networks. To
security. This includes implementing access controls at various levels, such as network segmentation
and micro-perimeters. This entails categorizing devices based on their type, function, and level of
data sensitivity.
Scenario.
IP - 192.168.1.0
Production VLAN
IP - 192.168.11.0
Internet VLAN
IP-
IP Assignments
Loopback - 10.1.1.1/32
VPN Tunnels
IP - 192.168.2.0
Production VLAN
IP - 192.168.22.0
Internet VLAN
IP-
IP Assignments
Loopback - 10.2.2.2/32
VPN Tunnels
IP - 192.168.3.0
Production VLAN
IP - 192.168.33.0
Internet VLAN
IP-
IP Assignments
Loopback - 10.3.3.3/32
VPN Tunnels
IP - 192.168.4.0
Production VLAN
IP - 192.168.44.0
Internet VLAN
IP-
IP Assignments
Loopback - 10.4.4.4/32
VPN Tunnels
Value
Value
192.168.11.254
192.168.11.0 192.168.11.255
255.255.255.255
Value
192.168.2.254
192.168.22.254
192.168.22.0
10.2.2.2 10.2.2.2 – 10.2.2.2 255.255.255.25 /32 192.168.3.255
192.168.33.254
Value
Value
0 192.168.44.254
organizations. It is the backbone of communication and data transfer within and between
network infrastructure solution that includes hardware, software, and services. In this essay,
we will explore the importance of Cisco enterprise network infrastructure, its key
Enterprise network infrastructure refers to the physical and virtual components that make up
a network. It includes hardware devices such as routers, switches, and firewalls, as well as
software services such as DHCP, DNS, and NAT. The primary function of enterprise network
infrastructure is to provide connectivity, security, and accessibility to users and devices within
an organization. In today's digital world, where remote access and collaboration are essential,
enterprise network infrastructure plays a critical role in the success of organizations. Cisco
sdn-solutions/
2. Buchegger, S., & Datta, A. (2009, February). A case for P2P infrastructure for social networks-opportunities
& challenges. In 2009 Sixth International Conference on Wireless On-Demand Network Systems and
3. Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2014).
4. Bonfim, M. S., Dias, K. L., & Fernandes, S. F. (2019). Integrated NFV/SDN architectures: A systematic
literature review. ACM Computing Surveys (CSUR), 51(6), 1-39.
5. Bereketab Birhanu Deneke, Asrat Mulatu Beyene, Endalew Ayenew Haile. (2024). Improving
https://doi.org/10.1016/j.heliyon.2024.
6. Ghasemshirazi, S., Shirvani, G. and Alipour, M.A. (2023) Zero trust: Applications,
Maxwell..
8. Gan, G.; Lu, Z.; Jiang, J. Internet of Things Security Analysis. In Proceedings of the 2011
International Conference on Internet Technology and Applications, Wuhan, China, 16–18 August
2011; IEEE: Piscataway, NJ, USA, 2011; pp. 1–4. [Google Scholar]
9. Software-Defined Networking: The New Norm for Networks. Available online:
https://www.opennetworking.org/images/stories/downloads/sdn-resources/white-papers/wp-sdn-
10. Tariq, J.; Riaz, T.; Rasheed, A. A Layer2 Firewall for Software Defined Network. In Proceedings
of the 2014 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi,
Pakistan, 12–13 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 39–42. [Google Scholar]
11. Michelle, S.; Park, S.H.; Lee, B.; Yang, S. Building Firewall over the Software-Defined Network
Technology, Chennal, India, 27–28 February 2013; IEEE: Piscataway, NJ, USA, 2014; pp. 744–748.
[Google Scholar]
12. Pena, J.G.V.; Yu, W.E. Development of a Distributed Firewall Using Software Defined
Information Science and Technology, Busab, Korea, 26 February–1 March 2014; IEEE: Piscataway,
13. Rolbin, M. Early Detection of Network Threats Using Software Defined Network (SDN) and
Virtualization. Master’s Thesis, Carleton University, Ottawa, OT, Canada, 2013. [Google Scholar]
14. Sood, K.; Yu, S.; Xiang, Y. Software-Defined Wireless Networking Opportunities and Challenges
for Internet-of-Things: A review. IEEE Int. Things J. 2015, 3, 453–463. [Google Scholar] [CrossRef]
15. Zhijing, Q.; Denker, G.; Giannelli, C.; Bellavista, P.; Venkatasubramanian, N. A Software Defined
Networking Architecture for the Internet-of-Things. In Proceedings of the 2014 IEEE Network
Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014; IEEE: