Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT

Data in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation struc...

Full description

Saved in:
Bibliographic Details
Main Authors: Caxton Okoh, Waba Nasali Theophilus, Paul Dawkins, Sebamalai Paheerathan
Format: Article
Language:English
Published: MDPI AG 2024-11-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/14/23/10968
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850107253451915264
author Caxton Okoh
Waba Nasali Theophilus
Paul Dawkins
Sebamalai Paheerathan
author_facet Caxton Okoh
Waba Nasali Theophilus
Paul Dawkins
Sebamalai Paheerathan
author_sort Caxton Okoh
collection DOAJ
description Data in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation structure. The components of the network locations are mix-vendor components. The focus is on how classless IP address allocation, routing protocols, hierarchical network topology, and the updated Transmission Control Protocol/Internet Protocol (TCP/IP) model are put together to enhance performance and security. The simulation is performed using Cisco Packet Tracer where the packet transfer and connections within the network are examined. <b>Methods:</b> The Variable Length Subnet Mask (VLSM) approach is applied to a network design to secure data and information. We provided and detailed the implementation of subnetting, routing protocols, the updated TCP/IP model, and simulation within Cisco Packet Tracer. Our paper demonstrates the applicability of a single IP address range (0-255) where only the fourth octet changes to serve to secure information across networks through creating subnets. <b>Results:</b> The results of the simulation are further analysed; the security protocols are summarised. <b>Conclusions:</b> Our work has potential to be applied to Supervisory Control and Data Acquisition (SCADA) networks, Internet of Things (IoT) and Cloud networks; a useful resource for academia and industry professionals.
format Article
id doaj-art-5deec0eef61847ba8406dcadbf9b541e
institution OA Journals
issn 2076-3417
language English
publishDate 2024-11-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj-art-5deec0eef61847ba8406dcadbf9b541e2025-08-20T02:38:38ZengMDPI AGApplied Sciences2076-34172024-11-0114231096810.3390/app142310968Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENTCaxton Okoh0Waba Nasali Theophilus1Paul Dawkins2Sebamalai Paheerathan3Department of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKDepartment EEC, Centrum Południe Budynek D, Coventry University Wroclaw, Powstańców Śląskich 17, 53-332 Wrocław, PolandDepartment of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKDepartment of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKData in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation structure. The components of the network locations are mix-vendor components. The focus is on how classless IP address allocation, routing protocols, hierarchical network topology, and the updated Transmission Control Protocol/Internet Protocol (TCP/IP) model are put together to enhance performance and security. The simulation is performed using Cisco Packet Tracer where the packet transfer and connections within the network are examined. <b>Methods:</b> The Variable Length Subnet Mask (VLSM) approach is applied to a network design to secure data and information. We provided and detailed the implementation of subnetting, routing protocols, the updated TCP/IP model, and simulation within Cisco Packet Tracer. Our paper demonstrates the applicability of a single IP address range (0-255) where only the fourth octet changes to serve to secure information across networks through creating subnets. <b>Results:</b> The results of the simulation are further analysed; the security protocols are summarised. <b>Conclusions:</b> Our work has potential to be applied to Supervisory Control and Data Acquisition (SCADA) networks, Internet of Things (IoT) and Cloud networks; a useful resource for academia and industry professionals.https://www.mdpi.com/2076-3417/14/23/10968information securitycybersecuritycybercrimenetworkingsecurity protocolsVLSM
spellingShingle Caxton Okoh
Waba Nasali Theophilus
Paul Dawkins
Sebamalai Paheerathan
Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
Applied Sciences
information security
cybersecurity
cybercrime
networking
security protocols
VLSM
title Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
title_full Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
title_fullStr Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
title_full_unstemmed Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
title_short Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
title_sort enhancing data security through vlsm subnetting and tcp ip model in an ent
topic information security
cybersecurity
cybercrime
networking
security protocols
VLSM
url https://www.mdpi.com/2076-3417/14/23/10968
work_keys_str_mv AT caxtonokoh enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent
AT wabanasalitheophilus enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent
AT pauldawkins enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent
AT sebamalaipaheerathan enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent