Enjoy Upto 50% OFF on Assignment Solutions!
Network System Design and Security for Modern Airline Services Case Study By Native Assignment Help.
Ph.D. Writers For Best Assistance
Plagiarism Free
No AI Generated Content
The modern world depends on networks and communication because they connect individuals, groups, and data in novel ways that were previously unthinkable. They have completely changed how people transact business, get information, and pass the time. Here people can rapidly exchange messages, transmit data, and access information from anywhere in the world thanks to networks and communication. After that they allow people to communicate with loved ones no matter how far away people are and work together in real-time with coworkers.
Therefore, several industries, including transportation, healthcare, and finance, depend on networks and communication to operate safely, and effective networks and communication are crucial for keeping us informed, connected, and productive in a world that is becoming more and more globalized and digital. Here in this study there are mainly developing a network system for the airline service where some subdivided section is added. Therefore the network basically develops in the “Cisco Packet Tracer” software and also provides a compact network structure for the airline system.
On Each Order!
A physical network diagram is a sort of diagram used to visually convey a computer network's physical configuration and connections. The actual connections between networked devices, including computers, routers, switches, and other hardware parts, are often represented by it. A physical network diagram often comprises a number of graphical depictions of actual hardware components, such as computers, routers, switches, and other devices, connected by lines to show the relationships between them. These connections might be wired or wireless and can have physical information like IP addresses, cable lengths, and connector kinds (Gwangwava et al. 2021).
Figure 1: Physical Network Diagram
The different sites and the appropriate connections between them can be included in the physical network diagram for the airport extension. Therefore the main switch, which can be connected to the check-in area, security clearance area, stores, gaming area, and passenger waiting room, should be at the top of the schematicc (Almalki et al. 2020). There can be six counters at the check-in area, and each one can have two fixed connections to the main switch. After that, there can be four lines in the area for security clearance, with each queue having two fixed connections to the main switch. There can be four permanent connections between the stores and the main switch. Hereafter there can be twelve gaming PCs linked to the main switch at the gaming center. Therefore 1000 people can be wired into the main switch in the passengers' waiting area.
Connect with us ASAP and get the same Paper!
Order AI-FREE ContentThe wired connection network for all check-in desks, security officer PCs, stores, and gaming PCs are then linked to the main switch. Lastly, a safe Wi-Fi network that can serve all visitors should be established. After that, the logical topology of the network may also be determined using the physical network diagram. In other words, one may find the location of network resources and the signal flow between network devices from the physical network diagram. Overall, the locations and connections between them should be included in the physical network diagram for the airport extension. The main switch can be connected to the passenger waiting area, stores, gaming center, and security clearance area. Also, it can have both a safe Wi-Fi network and wired network connectivity for all check-in desks, security officer computers, stores, and gaming PCs (Rashid et al. 2019).
Figure 2: Game Center Network
This figure gives description of a network of game centers where are total of twelve gaming computers are placed and connected with two switches (Islami et al. 2020).
Figure 3: Shop Network
Figure 4: Security Clearance Area Network
The above two figure shows the security clearance area and the shop section network of the airline network service. Here in the network two sections basically implement the network connection with the help of the pc, switch, and router each router is connected to an individual server, and the particular server is also connected to a cloud which provides internet connectivity (Reddy et al. 2021).
Figure 5: Logical network diagram
In the airport extension's logical network diagram, there can be a switch or router with several ports at the center. The other switches or routers in the building will be linked to this. Therefore this central switch can be connected to all of the registration desks, computers for security personnel, retail locations, and gaming PCs. After that, give guests wifi access and a number of entry points can be linked to the core switch. These access points can be wired specifically to the core switch (Gaudet et al. 2020).
The security officers' computers, retail locations, and gaming PCs can all be hooked into the core switch. The security officers' Computers, stores, and gaming PCs can each have one wired connection, while there can be two distinct wired connections at each check-in counter. This guarantees that every device is linked to the core switch and has internet connectivity with the help of the cloud and server.
Figure 6: IP configuration of Security System PC
This figure mainly shows the IP configuration of the security system officer’s PC where the IP4V address and the subnet mask are implemented with the help of the DHCP server (Kurniawan et al. 2019).
Figure 7: Packet Tracing
The precise technologies that are most appropriate will depend on the unique requirements of the network. There are several technologies that may be utilized to develop and manage a network. Yet, the following list of popular technologies is seen in contemporary networks (Hossain et al. 2019).
In local area networks (LANs) and metropolitan area networks, the Ethernet family of computer networking protocols is often employed (MANs). A local area network is created using this standardized way of affixing computers, printers, and other network hardware. Devices in a network are connected via Ethernet, which enables communication between them through a system of cables, hubs, and routers (Alfarsi et al. 2019).
Without the use of physical connections, Wi-fi enables the connection of computers, mobile phones, and other devices to the internet. It transmits and receives data over small distances, usually inside a house or office building, using radio waves. Wi-fi is useful for many things, including watching streaming movies, sending files, getting online, and placing phone and video conversations.
Remote users can connect securely and anonymously to a private network through the internet using a VPN.
A server may be found on the internet by using the DNS system, which converts domain s into IP addresses.
Network infrastructure is managed and maintained by a third-party provider under a paradigm known as "cloud-based networking," usually on a contractual basis.
Figure 8: Implementation of Cloud and Server
Here the image displays the three different sections of the network that are connected through three servers which are attached to a cloud system to maintain intranet and internet among the network. Besides the data of this network is maintained with this procedure (Tyler et al. 2021).
Technologies for QoS assurance are employed to guarantee that communication services meet a predetermined standard of quality. With the use of these technologies, network administrators may manage the bandwidth and other resources made available to apps, prioritize traffic, and impose restrictions on how many people can use a given application or service. Moreover, they support reliable data delivery. Technologies for QoS assurance may include traffic shaping, packet marking, rate limitation, admission control, and packet queuing and scheduling (Muniasamy et al. 2019). Therefore, traffic shaping helps to restrict the amount of data that may be transferred at any given moment while packet queuing and scheduling are used to prioritize and manage the flow of data packets across the network. After that data packets are marked with priorities using packet marking, while data transmission rates are constrained by rate restriction. The amount of people who may access a certain service or application is managed by admission control.
A sort of data-carrying method for high-performance telecommunications networks is Multiprotocol Label Switching (MPLS). Therefore it is quicker and more effective since it does not rely on lengthy network addresses to forward packets, but rather employs brief path labels. At the network's edge, MPLS applies labels to packets, which are subsequently routed via the network's core depending on the labels. After that, the labels are used to specify the quality of service (QoS) criteria for the packet, including delay, jitter, and throughput. Hereafter this makes it possible to route the packet along the fastest route regardless of the topology of the underlying network. Traffic engineering, traffic optimization, and IP VPNs are just a few of the uses for MPLS.
It can be depicted that, to efficiently manage and keep track of an expanding network, a variety of network security methods can be applied. Hence, there is a requirement of using efficient sources of management after application of processes in this particular circumstance. One of the most fundamental network security solutions, firewalls also happen to be the most crucial.
Figure 9: Implementation of Firewall in Server
Firewall rules are able to stop unauthorized users from connecting to your network, as well as to stop data theft and network attack attempts. In order to keep an eye out for suspicious behavior on your network, IDS and IPS operate together. It can be depicted that, Although IPS tries to thwart attacks by restricting traffic that is deemed suspicious, IDS works to identify security vulnerabilities by analyzing network traffic. Remote employees can safely access the network using VPNs from any location in the world.
It can be derived that, to find potential security issues, systems of SIEM can gather and analyze data from numerous sources within your network. Moreover, they can automate reactions to these dangers, such as halting traffic or notifying security officers. Data is encoded through the process of encryption so that only authorized users can decode it. Preventing sensitive information, such as credentials or financial data, from becoming captured by hackers requires the use of encryption. There can be the management of devices permitted to connect to your network using NAC technology. In so doing, you may be able to stop unwanted devices from connecting to your network and perhaps introduce security flaws (Vakaliuk et al. 2020).
These are merely a few illustrations of the numerous network information security available to assist in controlling and watching an expanding network. The money, the scale of your system, and also the possible threats you are the most worried about will all influence which solutions are best for your network. There can be the incorporation of the best security plan for your business must be decided in cooperation with an expert IT security professional. A developing network can be controlled and maintained using a number of emerging technologies. It can be implemented that, by separating the network data plane and control plane, monitoring technology makes network control and oversight more effective.
It enables the centralized management and randomness of the net, which can ease network administration and boost performance. Services present in a network like firewalls, network equipment, and intrusion prevention systems may now be virtualized and operated on low-cost hardware thanks to virtualization. Consequently, less specialized hardware may be required, and network services may be simpler to scale and administer. IoT could be used to collect information about network consumption and track network performance. Hence, these are identified as appropriate procedures in this particular scenario. This can help with problem identification and resource management for the network. Network data can be analyzed using AI and ML to spot trends or anomalies that might point to problems or chances for improvement. There can be the assistance of managers in taking proactive measures to resolve problems and enhance network efficiency. Hence, efficiency can be controlled and these are evaluated as appropriate frameworks in this context. A safe and open record of network transactions and activity can be made using blockchain-based. This could aid in enhancing network accountability and security. Hence, there can be the implementation of approaches and these processes are implicated in this regard.
Network operations like firewalls, load balancers, and routers can now be deployed as software programmes that can run on virtualization infrastructure thanks to the technology known as virtualization. This technology is becoming more and more popular since it offers a more adaptable and callable method of maintaining and keeping an eye on an expanding network. Two networks can be expanded and deployed as needed using NFV without requiring changes in physical infrastructure. As resources may be flexibly allocated to suit changing demands, this improves resource use. New services and functionalities can be deployed more quickly thanks to NFV because the virtual equipment can be easily provided and set up. This enables network operators to react to shifting commercial needs and market situations more quickly.
Conclusion
In conclusion, networks and communication are crucial in today's society and have completely changed how we work and live. A fantastic illustration of how networks and communication may have a significant influence is the creation of an effective network system for airline service. The airline service may guarantee safety, dependability, and optimum efficiency by offering an effective and condensed network structure. The airline service may optimize its potential and give consumers better service by putting in place a high-quality network infrastructure.
References
Alfarsi, G., Jabbar, J., Tawafak, R.M., Malik, S.I., Alsidiri, A. and Alsinani, M., 2019. Using Cisco Packet Tracer to simulate smart home. International Journal of Engineering Research & Technology (IJERT), 8(12), pp.670-674.
Almalki, F.A., 2020. Implementation of 5G IoT based smart buildings using VLAN configuration via cisco packet tracer. International Journal of Electronics Communication and Computer Engineering, 11(4), pp.56-67.
Gaudet, N., Sahu, A., Goulart, A.E., Rogers, E. and Davis, K., 2020, May. Firewall configuration and path analysis for smartgrid networks. In 2020 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR) (pp. 1-6). IEEE.
Gwangwava, N. and Mubvirwi, T.B., 2021. Design and simulation of IoT systems using the Cisco packet tracer. Advances in Internet of Things, 11(02), p.59.
Hossain, M.A. and Zannat, M., 2019. Simulation and Design of University Area Network Scenario (UANS) using Cisco Packet Tracer. Global Journal of Computer Science and Technology, 19(G3), pp.7-11.
Islami, M.F., Musa, P. and Lamsani, M., 2020. Implementation of Network Automation using Ansible to Configure Routing Protocol in Cisco and Mikrotik Router with Raspberry PI. Jurnal Ilmiah KOMPUTASI, 19(2), pp.127-134.
Kurniawan, D.E., Arif, H., Nelmiawati, N., Tohari, A.H. and Fani, M., 2019, March. Implementation and analysis ipsec-vpn on cisco asa firewall using gns3 network simulator. In Journal of Physics: Conference Series (Vol. 1175, No. 1, p. 012031). IOP Publishing.
Muniasamy, V., Ejlani, I.M. and Anadhavalli, M., 2019. Student’s performance assessment and learning skill towards wireless network simulation tool–Cisco Packet Tracer. International Journal of Emerging Technologies in Learning (Online), 14(7), p.196.
Rashid, N.A., bin Othman, Z., bin Johan, R. and Sidek, S.B.H., 2019. Cisco packet tracer simulation as effective pedagogy in Computer Networking course.
Reddy, G.P. and Kumar, Y.P., 2021. Retrofitted IoT based communication network with hot standby router protocol and advanced features for smart buildings. International Journal of Renewable Energy Research, 11(3), pp.1354-1369.
Tyler, D. and Viana, T., 2021. Trust no one? a framework for assisting healthcare organisations in transitioning to a zero-trust network architecture. Applied Sciences, 11(16), p.7499.
Vakaliuk, T.A., Yefimenko, A., Bolotina, V., Bailiuk, Y., Pokotylo, O. and Didkivska, S., 2020. Using Massive Open Online Courses in Teaching the Subject" Computer Networks" to the Future IT Specialists. In ICTERI Workshops (pp. 665-676).
Go Through the Best and FREE Case Studies Written by Our Academic Experts!
Native Assignment Help. (2024). Retrieved from:
https://www.nativeassignmenthelp.co.uk/network-system-design-and-security-for-modern-airline-services-case-study-23074
Native Assignment Help, (2024),
https://www.nativeassignmenthelp.co.uk/network-system-design-and-security-for-modern-airline-services-case-study-23074
Native Assignment Help (2024) [Online]. Retrieved from:
https://www.nativeassignmenthelp.co.uk/network-system-design-and-security-for-modern-airline-services-case-study-23074
Native Assignment Help. (Native Assignment Help, 2024)
https://www.nativeassignmenthelp.co.uk/network-system-design-and-security-for-modern-airline-services-case-study-23074
Corporate Reporting Raynair Group Trust Native Assignment Help for all...View or download
Joint Forest Management in Tanzania's Udzungwa Nature Reserve Native...View or download
Introduction: Business Simulation Native Assignment Help provides...View or download
Ensure Responsibilities For Action To Reduce Risks To Health And Safety Trust...View or download
UK Intellectual Property Law for Software: Copyright and Patents If you want...View or download
Exploring Key Factors Behind M&S Retail Evolution During COVID-19...View or download
Get your doubts & queries resolved anytime, anywhere.
Receive your order within the given deadline.
Get original assignments written from scratch.
Highly-qualified writers with unmatched writing skills.
We utilize cookies to customize your experience. By remaining on our website, you accept our use of cookies. View Detail
Hi! We're here to answer your questions! Send us message, and we'll reply via WhatsApp
Please enter a messagePleae enter your phone number and we'll contact you shortly via Whatsapp
We will contact with you as soon as possible on whatsapp.
Ph.D. Writers For Best Assistance
Plagiarism Free
No AI Generated Content
offer valid for limited time only*