Traffic Management and Security in Wired Network

被引:1
|
作者
Dhaka, Shivali [1 ]
机构
[1] Amity Univ, Amity Inst Technol & Management, Dept Comp Sci, Gurgaon, India
关键词
ACL; VLANs; SSH; Port-Security; Traffic management;
D O I
10.1007/978-981-13-5992-7_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network is nowadays most comprehensible and keen user-friendly requirement of society. All gigantic organizations and institutions can work smartly, competently and proficiently because of this developing network. It has made life simple by doing all trades and transactions whether offline or online on just a click. As network is boon for life, its smooth functioning is necessity of time. Traffic Management and security is essential to deliver the data timely as well as reliably. Inferring filters on different ports, applying ACL's on connecting devices, creating private VLAN's and encapsulating them into secured shell can target both. In this paper, the author has controlled and secured traffic in a Corporate network by simulation of these special secured features. The configuration is done using cisco packet tracer.
引用
收藏
页码:17 / 30
页数:14
相关论文
共 50 条
  • [1] Network security management with traffic pattern clustering
    Chiou, Tao-Wei
    Tsai, Shi-Chun
    Lin, Yi-Bing
    [J]. SOFT COMPUTING, 2014, 18 (09) : 1757 - 1770
  • [2] Network security management with traffic pattern clustering
    Tao-Wei Chiou
    Shi-Chun Tsai
    Yi-Bing Lin
    [J]. Soft Computing, 2014, 18 : 1757 - 1770
  • [3] Study on security mode of capital traffic management network
    Wang, Shi-Hua
    Quan, Yu-Xiang
    [J]. Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University, 2007, 31 (06): : 18 - 21
  • [4] Model for Security in Wired and Wireless Network for Education
    Patel, Aditya
    Ghaghda, Sweta
    Nagecha, Payal
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 699 - 704
  • [5] Wireless mesh network security: A traffic engineering management approach
    Muogilim, Okechukwu E.
    Loo, Kok-Keong
    Comley, Richard
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 478 - 491
  • [6] An Analysis on Bandwidth Utilization and Traffic Pattern for Network Security Management
    Kassim, Murizah
    Kassim, Hafizoah
    [J]. FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 51 - 56
  • [7] A Two-Fold Traffic Flow Model for Network Security Management
    Bringhenti, Daniele
    Bussa, Simone
    Sisto, Riccardo
    Valenza, Fulvio
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 3740 - 3758
  • [8] Data Instrumentation From IoT Network Traffic as Support for Security Management
    Vergutz, Andressa
    dos Santos, Bruna V.
    Kantarci, Burak
    Nogueira, Michele
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 1392 - 1404
  • [9] Network traffic management
    Feldmeier, John
    [J]. Unix Review, 1997, 15 (12):
  • [10] Network Traffic Classification for Security Analysis
    Boger, Mark
    Liu, Tianyuan
    Ratliff, Jacqueline
    Nick, William
    Yuan, Xiaohong
    Esterline, Albert
    [J]. SOUTHEASTCON 2016, 2016,