Report
The modern large networks are so having vastly complex infrastructure which need constant management and careful planning for supporting an ever evolving and complex rage of applications along with services which are being deployed (Al-Khraishi, 2020). The major step for this process is to understand how the modern networks can be composed as well as how they can be organized from the physical connections up to the subnets which are operational. In this paper a deployment plan will be created for the part of a university campus as well as a new solution will be also proposed for meeting both the usage requirements which are expected along with the security issues and organizational management.
As the campus based university needs to acquire a new building for 800 m^2 approx. on two floors that will be mixed for comprising Reception desk, Three teaching rooms each for 15 students, Student PC area with 25 desktop PCs and café for the ground floor. On the other side Open plan office space, three staff offices for 2 staff members each, and Three meeting rooms for the first floor.
An overwhelming undertaking is to keep an organization secure, and it has its own difficulties and furthermore challenges. At the point when the business or association included is a sort of University or school, the fundamental intricacy expands in network security. For all cyberattacks, the instruction area has turned into a principal focus on the digital crooks. In an instructive primary office, over 15% of the all gathered security breaks occurred by just a single security establishment. And furthermore the quantity of cyberattacks are expanding step by step. Beginning around 2006, 2012 had one of the greatest number of cyberattacks or information break of compromised significant data or records. The cyber attackers are more intrigued than some other opportunity to pursue all colleges and Schools, with the episodes on the ascent. The organization’s security for schooling can not be exaggerated (Gentile, Fazio and Miceli, 2021). Numerous colleges and furthermore schools manage an enormous number of issues that different organizations and furthermore organizations don’t need to confront. Be that as it may, the associations and organizations have their own workers and staff to screen and give the entrance, yet the colleges and schools just have educators and understudies who can be somewhere in the range of five years to full grown-ups. What’s more, understudies fail to really see how to forestall cyberattacks and furthermore have no fundamental information about network protection. Understudies doubtlessly utilize the unstable organization and furthermore download contaminated records and documents from the web that can cause information break or cyberattacks. Furthermore, the school system or design can be a major concern in light of the fact that advanced education utilizes a decentralized technique that makes a huge number of which need security or assurance. Colleges and schools are additionally managing all understudies who bring cell phones on the school grounds, and that is a colossal security disadvantage. For some colleges, network security is certainly not a simple choice, it is a need. Everybody is presently past when the homerooms just had one PC or not. Presently, every understudy brings brilliant gadgets like mobiles and PCs, so network security in colleges and universities is exceptionally fundamental.
Physical Connectivity And Assumptions
The devices needed for the network are:
Device name |
Price (£) |
Link to Buy |
NETGEAR Nighthawk WiFi 6 Router (RAX43) | AX4200 Wireless Speed (Up to 4.2 Gbps) |PS5 Gaming Router Compatible |
£ 173.99 |
Amazon.co.uk |
TP-Link 24-Port Gigabit Ethernet Switch, Rack-Mount/Desktop, Steel Case(TL-SG1024D) |
£ 59.99 |
Amazon.co.uk |
TP-Link AC5400 MU-MIMO Tri-Band Gaming Router, 8× Gigabit LAN Ports,1.8 GHz 64 Bit Quad-Core CPU, 2× USB 3.0 Ports, Ideal for Gaming Xbox/PS4/Steam and 4K, Compatible with Alexa (Archer C5400X) |
£ 249.39 |
Amazon.co.uk |
Dell Inspiron 5400 23.8″ FHD All-In-One Desktop, Intel Core i5-1135G7, 8GB RAM, 512GB SSD + 1TB HDD, Windows 10 Home (Silver) |
£ 692.85 |
Amazon.co.uk |
Norton 360 Deluxe 2022, Antivirus software for 5 Devices and 1-year subscription with automatic renewal, Includes Secure VPN and Password Manager, PC/Mac/iOS/Android, Activation Code by email |
£12.99 (5 devices) |
Amazon.co.uk |
The floor plan for the ground floor is given below:
Similarly the floor plan for the first floor is given as follows:
The network solution will be designed for satisfying the requirements like 1 desktop PC along with one IP phone per staff desk, one desktop PC in each of the teaching spaces, a Wireless access to internet for students as well as for the guests, 25 student desktop PCs will be also there as well. There will be a Wireless access to intranet for the staffs in the University and along with that there will be IP connectivity for building operations such as door entry, heating or ventilation controls/alarms, CCTV (Ahmed, and Al-Hamadani, 2021). For the network Local area network can be used as well as IPv4 subnetting will be done for the network. All the connections will be tested so that none of the devices can get unusable.
For the network local area network will play an important role, so LAN will be used there in the network for better connectivity and relevancy of the solution. The technical language of the local area network is called LAN. Local area networks are usually found in any corporate office. These local area networks are connected to computers in the vicinity of the campus or the building. In a word, it is a network of physical locations, such as a house or an office building that helps to connect the countries connected to it. Local area networks can be either large or small. Small local area networks are commonly used in the home environment. Large local area networks are commonly used for corporate offices or school-college because these large local area networks can easily connect to a network of thousands of users (Makeri et al., 2021). There are some special benefits to using a local area network. There is no cost to use this LAN and the hardware and software involved can be easily shared with each other. Any user can use the LAN for their own convenience, in which case no other person’s ownership is required. A central hub location is present in it, that will be able to store all user information. This line includes a security protocol that protects users from harm caused by hackers.
Along with that VLANs will be also there for providing benefits to the network and modernizing the network. VLANs physically spread across a network and complete logical grouping with end stations. It is often the case that users continue to perform the same task, but often repeat the task after leaving a new physical condition. In all cases, the last stations need to be reconfigured to the stations where users used to work. However, many times users do not need to be physically removed. Especially when users work on and modify a specific job function. To localize the last station to new users, change the VLAN membership of the last station. And the whole activity goes to the new team’s resources (Gardiner et al., 2019). In many cases, it is necessary to install special routers on the network to protect the network security. But replacing those routers on the network is replaced by VLANs. Different packets are placed within the VLAN, which are confined to the switch port and reduce the flood of packets. Traffic jams are a very important issue for a network’s best website. However, if the user can create broadcast domain restrictions on the network, then traffic can be reduced. VLAN must prevent the last stations from listening or receiving non-objective broadcasts. This will allow VLAN to restrict the broadcast domains.
Local Networking and VLANs
In the campus there should be wireless connectivity so that all the staffs and student can access the internet from their devices like laptop, mobile phones so that they can submit assignments, download lecture notes, send emails etc. So for that WLAN will be a beneficial solution for the organization. Basically, it is made by attaching various devices into the wireless communication to create a LAN. It also follows the standard named IEEE 802.11 (Shin, 2017). the wireless local area network attaches smartphones, laptops, desktop computer, personal digital assistants, printers and workstations. Also, the WLAN is very simple to install. The wireless local area network includes the AP that is used to attach to the internet. the access point receives and sends the radio frequency signal to attached the devices. also, the WLAN provides the high data transfer rate.
- It makes less the cost of the ownership
- WLAN is a reliable type of the communication
- It is simpler to remove or add workstation
- The WLAN is a flexible way of the communication, as it makes less the physical wires
- While maintaining the connectivity, the user can also move the workstation
- The WLAN gives a high data rate due to small area coverage
- Simple installation and the user don’t require additional cables for the installation
- Because of the small are access, the WLAN is economical
- The wireless connection still works, if there are any trees or buildings
- It can be useful in the disaster’s situation e.g. fire and earthquake
- The people can still communicate into the wireless network during the disaster.
Presently a lot of possibilities are offered by the internet and the deployment of WiFi in schools along with that the universities can also improve the way from that the students can learn as well as the way of communication of the teachers can also be changed. Setting up a wireless network t the University can be a huge challenge, a core infrastructure can be developed which can have the support for thousands of students, visitors and faculty for accessing the private network of the school simultaneously. So, before the configuration of the Wireless network, some major points should be considered such as:
- The budget for setting up and upgrading the network.
- Area of coverage
- Requirement of throughput and bandwidth.
- Security for the network (Awasthi, 2020).
- BYOD policy.
This is so much important that the precise area of coverage should be determined for understanding the required equipment for the bandwidth requirement and deployment. At the time of focusing on the major areas like main offices of school, computer lab, class rooms, library or other out door areas. For the university network WIFI network should be adapted for the characteristics of the environment. However, the admin should be careful about avoiding the dead spots and configuring the network so that the users can get the ability to seamlessly roam from one to another access point without any kind of disconnections.
For the network, to establish connections among the devices, IPv4 addressing will be used so that the devices can get connected securely and operations can be done smoothly. Developers have developed special protocols for data communication. An example of an unconnected protocol is ipv4. Ipv4 is an Internet Protocol which is the fourth version of all the Internet Protocols developed by the developers. These versions are used to maintain data communication systems on any type of network. The ipv4 protocol is typically used to set up and use packet switch layering on networks. Ethernet is an example of this. Such protocols provide logical connections. Providing identification for each device is a function of these protocols and completes the process by providing a connection between the network devices. The ipv4 connection depends on automatic configuration and manual configuration. The ipv4 protocol is used to encrypt data, in which case they use an address packet that provides complete security to the data. This means that the ipv4 protocol must be used to ensure data security (Al-Khraishi and Quwaider, 2019) The ipv4 security protocol is currently being improved to make the routing process more efficient. Because routing is managed within the ipv4 protocol, almost all devices will be able to enjoy the benefits of this protocol and adopt the ipv4 protocol. Another function of the ipv4 protocol is to deliver data to the destination and confirm the arrival news. Subnetting will be used in the network so that all the devices can get IP addresses separately so that the IP address can be pre planned for them as well. Basically, the subnetting is to make an efficient, quick and resilient computer network. The congestion and the bottlenecks would occur resulting in inefficient and sluggish backlogs, if every network traffic was traveling across the system at the same time. Also, making a subnet that permits the user to limit the number of the routers in network traffic which has to pass through.
- The subnet mask makes sure that the traffic contains the designated subnet. It also makes less the load imparted and a crucial congestion on the network. The less distance requires to be traveled by the data packets, improving the network performance.
- The subnetting traffic is routed efficiently that means it is a broadcast domain, and also enhancing the network performance and speed.
- The sound organization is vital within the big businesses. It extends to the routers and the networks. The companies have full control over the data packets and the traffic, with the subnetting.
- The user can be more aware of the route maps, with various subnets with the bigger network (KILINÇER, ERTAM and ?ENGÜR, 2020). It will assist the user to locate the potential threats. The devices will not be able to access the entire network, with the subnets, it means the companies can dictate the users and the hardware which have access more sensitive data.
Wireless Connectivity
The devices should be managed safely and securely so that none of the cyber threats can get the ability to attack the network by any chance for that a suitable network management plan and cyber security solution should be there. An organization is a gathering or group of at least two connected savvy PC gadgets. All gadgets in the center remote organization are connected to a solitary center. An organization may likewise be a subnetwork, or more modest development, of any remote organization. Sub-organizing is utilized by extremely enormous organizations that permit ISPs to deal with all IP addresses as well as many connected gadgets. Anything including the utilization of inward organization remote associations occupies room at the organization layer. The essential job of any organization layer is to move information or data starting with one remote organization then onto the next, which is set at layer three of the OSI or open framework interconnection model (Enoch, Orike and Ahiakwo, 2019). The organization layer conventions lay out the essential objective by bundling data or information with the right organization address data. Subsequently, the organization layer is fundamental for moving information or data across networks.
The role of cyber security is undeniable for an organization to ensure that the important and sensitive data contained in the important databases of various organizations is not passed on to any internal or external bad person and to provide security to that data. Advanced technology, advanced infrastructure, and proper processes, as well as proper practice, are required to protect a network or system. This process ensures that these data are accessible only by an authorized person. Maintaining the integrity of the data, ensuring its availability, and maintaining the complete confidentiality of the data are the main objectives of the cyber security policy. There should be once SSID for the tutors and admin of the system and another one will be there for the guest users and students. With the help of content filtering firewall the SSIDs can be configured in a different type of way. The teachers can also be enabled with surfing the internet freely however, for the students there should be restricted access.
For controlling the guest access in the wireless network as well as for preventing the unauthorized users for connecting smoothly and securely, an authentication splash page can be crated. There are some basic steps you can take to begin the process of preparation for mediation. All organizations have a credit card or bank account details for their employees and customers. Hackers can steal sensitive information from any organization, which could result in financial loss as well as many other kinds of damage to the organization’s survival.
The main purpose of a hacker is not only to steal information of company employees or customers but also to steal all kinds of business documents related to the organization. If an organization is attacked by a cyber attack, the information is stolen and the reputation of the organization is damaged. If the data is stolen, the data can be easily recovered, but if the reputation of the company is damaged, it is very difficult to overcome it for a small or large organization. Cyber ??security is important for any organization to avoid such problems.
The university can also consider Bring Your Own device policy, where they will need to apply a policy where the Wireless user must need to accept the policy before establishing any connection to the wireless network (Aye and Soe, 2019). However, this is responsibility of the student to filering the contents which they are accessing at the time of connecting the network. However, the policy must need to specify the liability of the wireless user for the cases of forbidden data transfer, which will be the conditions for accessing the network. The policy will be contained with scenario like:
- Tutors will access a wireless network which will be password protected.
- IT staff and admin will access a hidden SSID with password.
- The student will need to filer the contents which they are accessing at the time of connecting the network.
The connections within the university network should be secured as well as the devices should be connected with each other securely. In the campus there should be wireless connectivity so that all the staffs and student can access the internet from their devices like laptop, mobile phones so that they can submit assignments, download lecture notes, send emails etc. The organizational security for schooling can not be exaggerated. Numerous colleges and furthermore schools manage an enormous number of issues that different organizations and furthermore organizations don’t need to confront (Brilingait?, Bukauskas and Kutka, 2017). Be that as it may, the associations and organizations have their own workers and staff to screen and give the entrance, yet the colleges and schools just have educators and understudies who can be somewhere in the range of five years to full grown-ups.
Cost benefit analysis for the project:
Annual Benefits |
$ 690.00 |
|||||||
Annual Operational Costs |
$ 1,630.00 |
|||||||
One-Time Development Cost |
$ 2,440.00 |
|||||||
Year of Project |
||||||||
0 |
1 |
2 |
3 |
4 |
5 |
TOTALS |
||
Economic Benefit |
$0.00 |
$ 690.00 |
$ 690.00 |
$ 690.00 |
$ 690.00 |
$ 690.00 |
||
Discount Rate |
1.0000 |
0.9709 |
0.9426 |
0.9151 |
0.8885 |
0.8626 |
||
PV of Benefits |
$0.00 |
$669.90 |
$650.39 |
$631.45 |
$613.06 |
$595.20 |
||
One-Time COSTS |
$ (2,440.00) |
|||||||
Recurring Costs |
$0.00 |
$ (1,630.00) |
$ (1,630.00) |
$ (1,630.00) |
$ (1,630.00) |
$ (1,630.00) |
||
Discount Rate |
1.0000 |
0.9709 |
0.9426 |
0.9151 |
0.8885 |
0.8626 |
||
PV of Recurring Costs |
$0.00 |
$ (1,582.52) |
$ (1,536.43) |
$ (1,491.68) |
$ (1,448.23) |
$ (1,406.05) |
||
NPV of all COSTS |
$ (2,440.00) |
$ (4,022.52) |
$ (5,558.96) |
$ (7,050.64) |
$ (8,498.87) |
$ (9,904.92) |
$ (9,904.92) |
|
Overall NPV |
$ (6,744.92) |
|||||||
Overall ROI |
||||||||
Break-even Analysis |
||||||||
Yearly NPV Cash FLOW |
$ (2,440.00) |
$ (912.62) |
$ (886.04) |
$ (860.23) |
$ (835.18) |
$ (810.85) |
||
Overall NPV Cash FLOW |
$ (2,440.00) |
$ (3,352.62) |
$ (4,238.66) |
$ (5,098.89) |
$ (5,934.07) |
$ (6,744.92) |
For the network LAN and VLAN will play an important role as there is no cost to use this LAN and the hardware and software involved can be easily shared with each other. Any user can use the LAN for their own convenience, in which case no other person’s ownership is required. As so many times users do not need to be physically removed. Especially when users work on and modify a specific job function. To localize the last station to new users, change the VLAN membership of the last station. And the whole activity goes to the new team’s resources.
The network design in Cisco packet tracer:
DHCP configuration on Router:
DHCP successful:
For the network wireless connection will bring so many benefits such as:
- Easy installation – installing the wireless network is very simpler and quicker compared to a wired network. Also, it makes less the usage of the cables which are impose the risk of the safety and hard to set up. The users also have to update the wireless network to make contact with the new configurations.
- Accessibility – the wireless network does not need any cables or wires. The wireless network also permits the users to roam around without getting disconnected.
- Flexibility – setting up the wireless network that assists the user to do the work from home. The users also can have accessibility to the customer data and work more productively, due to this network.
- Wider reach – than the wired network, the wireless networks have the wider reach. The user can be simply extended to the places where the cables and the wires are not accessible.
- Cost-effective – since it is cheaper and simpler to install, the wireless networks are cost-effective (Miao et al., 2019). Also, the all over expenses become much lower, even into the initial investment is high with the time.
- Efficiency – the wireless network permits better and enhanced communication of the data. the transfer of the details into the user is much quicker, with the wireless network.
There should be different login flows enabled for the users, for that various SSIDs should be created with the flows of authentication which will be specific to the users. There should be once SSID for the tutors and admin of the system and another one will be there for the guest users and students. With the help of content filtering firewall the SSIDs can be configured in a different type of way. The teachers can also be enabled with surfing the internet freely however, for the students there should be restricted access.
For controlling the guest access in the wireless network as well as for preventing the unauthorized users for connecting smoothly and securely, an authentication splash page can be crated. Once it will be done the authentication can be created via social login through google+, facebook for the visitors. However the students and tutors can use their personal credentials.
Wireless router:
Connection with Laptop:
IP address table:
Major Network: 172.168.1.0/24
Available IP addresses in major network: 254
Number of IP addresses needed: 90
Available IP addresses in allocated subnets: 180
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Subnet A |
15 |
30 |
172.168.1.0 |
/27 |
255.255.255.224 |
172.168.1.1 – 172.168.1.30 |
172.168.1.31 |
Subnet B |
15 |
30 |
172.168.1.32 |
/27 |
255.255.255.224 |
172.168.1.33 – 172.168.1.62 |
172.168.1.63 |
Subnet C |
15 |
30 |
172.168.1.64 |
/27 |
255.255.255.224 |
172.168.1.65 – 172.168.1.94 |
172.168.1.95 |
Subnet D |
15 |
30 |
172.168.1.96 |
/27 |
255.255.255.224 |
172.168.1.97 – 172.168.1.126 |
172.168.1.127 |
Subnet E |
15 |
30 |
172.168.1.128 |
/27 |
255.255.255.224 |
172.168.1.129 – 172.168.1.158 |
172.168.1.159 |
Subnet F |
15 |
30 |
172.168.1.160 |
/27 |
255.255.255.224 |
172.168.1.161 – 172.168.1.190 |
172.168.1.191 |
For the University network security will play a major role, as there are numerous methods of safety in the network. Firewall was made to screen the entire organization traffic. Firewall essentially uses pre-laid out all principles and furthermore channels to keep the entire framework infections free by breaking down and observing the entire organization traffic. There are some basic steps you can take to begin the process of preparation for mediation. All organizations have a credit card or bank account details for their employees and customers. Hackers can steal sensitive information from any organization, which could result in financial loss as well as many other kinds of damage to the organization’s survival. The main purpose of a hacker is not only to steal information of company employees or customers but also to steal all kinds of business documents related to the organization. If an organization is attacked by a cyber attack, the information is stolen and the reputation of the organization is damaged. An infection assault can close the advanced activity in a negligible portion of a second. Also, in the client framework, the firewall works like a virtual divider. The client has some control over all, approaching things from the web. So, no outsider programming items, or infections, can enter the framework. A vital benefit of the firewall is that it stops the spyware in the client’s framework.
So, a firewall is vital to forestall all digital wrongdoings or cyberattacks. A web security weakness which permits a cybercriminal to obstruct the documents and data that an application makes to its own information base is known as SQL infusion. Fundamentally, the SQL infusion allows the assailant to watch the information or data which they are not permitted to see. In certain areas, the assailant can alter or erase the information or data, making persevering changes to the entire substance or conduct of the application or programming. An ideal SQL infusion assault can cause loss of information or data, for example, secret phrase, charge card, or any kind of private data or information like bank subtleties. To alleviate all security gambles, there are numerous systems present. Application whitelisting is one of them. It safeguards the framework against the malware executing on the PC, and furthermore ensures that main approved applications and bits of programming can be executed. Fix application process is additionally a vital system to forestall cyberattacks. To mechanize the normal errands, the Microsoft Office application can execute the macros. Furthermore, fundamentally, macros can remember the vindictive code that outcomes for the outsider admittance to the individual and exceptionally delicate data as a piece of a pointed digital interruption. Confine authoritative honours, multifaceted verification, fix the working frameworks are the vital techniques to relieve the network safety.
The network security is so much concerned with the protection to the resources of network that is against destruction, alteration and unauthorized usage along with encryption and cryptography. The networks can take any kind of confidential and sensitive information as well as the security also plays a major role there in any wireless or wired networking system. The encryption can provide confidentiality through hiding or changing the messages as well as it also can protect the confidential information from the hackers by using the encryption methods for protecting data critically. Only the authorized users can get access to the confidential data, the access should be possible for the individual people who are having access to the information as well as who are having the encryption keys.
The timeline for the network is given as follows:
Task Name |
Duration |
Start |
Finish |
Schedule for the project |
75 days |
Mon 4/11/22 |
Fri 7/22/22 |
Analysis of Requirement |
12 days |
Mon 4/11/22 |
Tue 4/26/22 |
Technical analysis for network implementation in university |
5 days |
Mon 4/11/22 |
Fri 4/15/22 |
Analysis of opportunity for network implementation in university |
4 days |
Mon 4/18/22 |
Thu 4/21/22 |
Profit loss analysis for network implementation in university |
3 days |
Fri 4/22/22 |
Tue 4/26/22 |
Network design and testing for network implementation in university |
27 days |
Wed 4/27/22 |
Thu 6/2/22 |
Layout of the network design for network implementation in university |
5 days |
Wed 4/27/22 |
Tue 5/3/22 |
Design of network for network implementation in university |
2 days |
Wed 5/4/22 |
Thu 5/5/22 |
Design of Floor plan for network implementation in university |
2 days |
Wed 5/4/22 |
Thu 5/5/22 |
Future design for network implementation in university |
2 days |
Fri 5/6/22 |
Mon 5/9/22 |
IP allocation for network implementation in university |
4 days |
Tue 5/10/22 |
Fri 5/13/22 |
Connect devices with routing for network implementation in university |
2 days |
Mon 5/16/22 |
Tue 5/17/22 |
Product and Category listing for network implementation in university |
3 days |
Wed 5/18/22 |
Fri 5/20/22 |
Testing of configured devices for network implementation in university |
4 days |
Mon 5/23/22 |
Thu 5/26/22 |
Testing connection between devices for network implementation in university |
2 days |
Fri 5/27/22 |
Mon 5/30/22 |
Deployment of network design for network implementation in university |
3 days |
Tue 5/31/22 |
Thu 6/2/22 |
Network design and testing all the devices |
36 days |
Fri 6/3/22 |
Fri 7/22/22 |
Layout of the network design for network implementation in university |
5 days |
Fri 6/3/22 |
Thu 6/9/22 |
Design of network for network implementation in university |
4 days |
Fri 6/10/22 |
Wed 6/15/22 |
Design of Floor plan for network implementation in university |
1 day |
Thu 6/16/22 |
Thu 6/16/22 |
Future design for network implementation in university |
2 days |
Fri 6/17/22 |
Mon 6/20/22 |
IP allocation for network implementation in university |
6 days |
Tue 6/21/22 |
Tue 6/28/22 |
Connect devices with routing for network implementation in university |
2 days |
Wed 6/29/22 |
Thu 6/30/22 |
Product and Category listing for network implementation in university |
3 days |
Fri 7/1/22 |
Tue 7/5/22 |
Testing of configured devices for network implementation in university |
4 days |
Wed 7/6/22 |
Mon 7/11/22 |
Testing connection between devices for network implementation in university |
4 days |
Tue 7/12/22 |
Fri 7/15/22 |
Deployment of network design for network implementation in university |
5 days |
Mon 7/18/22 |
Fri 7/22/22 |
Conclusion:
Thus, it can be concluded from the report that in this paper the scenario has been analyzed and the physical connectivity and assumptions have been made. Along with the local networking and VLANs requirements and benefits have also been discussed. For the University Wireless network connection has also been proposed and the IPv4 subnetting has also been done for the network. Most important the requirement security and network management plan has also been proposed for the University network.
References:
Al-Khraishi, T., 2020. Performance evaluation and enhancement of VLAN via wireless networks using OPNET modeler. International Journal of Wireless & Mobile Networks (IJWMN) Vol, 12.
Ahmed, A.H. and Al-Hamadani, M.N., 2021. Designing a secure campus network and simulating it using Cisco packet tracer. Indonesian Journal of Electrical Engineering and Computer Science, 23(1), pp.479-489.
Makeri, Y.A., Cirella, G.T., Galas, F.J., Jadah, H.M. and Adeniran, A.O., 2021. Network Performance through Virtual Local Area Network (VLAN) Implementation & Enforcement on Network Security for Enterprise. International Journal of Advanced Networking and Applications, 12(6), pp.4750-4762.
Gardiner, J., Craggs, B., Green, B. and Rashid, A., 2019, November. Oops I did it again: Further adventures in the land of ICS security testbeds. In Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy (pp. 75-86).
Shin, B., 2017. A Practical Introduction to Enterprise Network and Security Management. Auerbach Publications.
Awasthi, A., 2020. Network Classification for an Enterprise. Int J Sci Res, 9(2), pp.635-637.
KILINÇER, ?.F., ERTAM, F. and ?ENGÜR, A., 2020. Automated fake access point attack detection and prevention system with iot devices. Balkan Journal of Electrical and Computer Engineering, 8(1), pp.50-56.
Enoch, J.D., Orike, S. and Ahiakwo, C.O., 2019. Design and Simulation of a Secured Enterprise Network for Faculty of Engineering, Rivers State University. IISTE-Computer Engineering and Intelligent Systems, 10(5), pp.26-41.
Aye, M.M. and Soe, Z.C., 2019. Design and Simulation of Secure Network for University Campus.
Tareq, A.K., Implementation of VLAN via Wireless Networks using OPNET Modeler.
Miao, C., Wang, J., Ji, T., Wang, H., Xu, C., Li, F. and Ren, F., 2019, October. BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs. In 2019 IEEE 27th International Conference on Network Protocols (ICNP) (pp. 1-11). IEEE.
Brilingait?, A., Bukauskas, L. and Kutka, E., 2017, June. Development of an Educational Platform for Cyber Defence Training. In European Conference on Cyber Warfare and Security (pp. 73-81). Academic Conferences International Limited.
Al-Khraishi, T. and Quwaider, M., 2019, December. Implementation of vlan via wireless networks using opnet modeler. In CS & IT Conference Proceedings (Vol. 9, No. 18). CS & IT Conference Proceedings.
Gentile, A.F., Fazio, P. and Miceli, G., 2021, December. A Survey on the Implementation and Management of Secure Virtual Private Networks (VPNs) and Virtual LANs (VLANs) in Static and Mobile Scenarios. In Telecom (Vol. 2, No. 4, pp. 430-445). Multidisciplinary Digital Publishing Institute.