Site icon Eminence Papers

Network Separation

Network Separation

Network separation can be executed in three major ways: segregation, segmentation, or isolation. Segregation is an aspect that guarantees the basic separation of data on a network; segmentation entails putting the data in separate segments, while isolation entails using completely different systems to access certain data from the network (Hantouti et al., 2019). In this case, I will implement segregation of the data on the network for the legal and HR departments. I will separate the data on the networks belonging to the legal and HR departments with the aid of a virtual local area network (VLAN). The VLAN uses the switch to group computers on the network (Hantouti et al., 2019). I will therefore, proceed to group computers for the HR department different from those of the legal department. Therefore, the traffic for these departments would only be shared among members of the respective departments without any risk of a data breach.

I will use an ah-hoc node to set up the sales department’s Wi-Fi network. This kind of Wi-Fi network will allow the Apple iPads used by the sales team to connect directly. The ad-hoc node setup will be effective as there will be no access point in between that controls the connection to the Wi-Fi (Zhang et al., 2019). The devices will be able to send and receive messages from other respective Apple iPad devices of colleagues. The hardware I will use will entail routers, adapters, and antennas. In addition, I will employ the one-way keychain method of encryption to reduce the need for public-key cryptography (Zhang et al., 2019). Upon receiving the messages, the member will proceed with setting up the cluster key and decrypting the encrypted message. The additional hardware needed will be access points and repeaters.

Are you interested in obtaining a unique version of this copy. Get in touch with us. Our team of experts is ready to help.

References

Hantouti, H., Benamar, N., & Taleb, T. (2019). VLAN-based Traffic Steering for Hierarchical Service Function Chaining. In 2019 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.

Zhang, D. G., Zhao, P. Z., Cui, Y. Y., Chen, L., Zhang, T., & Wu, H. (2019). A new method of mobile ad hoc network routing based on greed forwarding improvement strategy. IEEE Access7, 158514-158524.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Instructions
Assignment Instructions:

Uh-oh, the Legal department and the HR department are demanding their own network.
The departments feel that their data is sensitive enough that their data should be separated from the other departments.

Network Separation

In addition, the Outside Sales department has gotten brand new Apple iPads for all of their users. So there needs to be a Wireless network setup so they can go online.
So, you need to build out a change order for the network to account for these two curveball requests.
Your submission should be in a Word document and should cover the following (not a complete list)
How will you separate the networks, physically or virtually?
What type of WiFi network will you set up?
What hardware will you use?
What encryption method will you use?
Will you limit the WiFi signal via physical means?
What additional hardware is needed? Software? Etc?
Remember to justify your choices

Exit mobile version