Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT
Data in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation struc...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-11-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/14/23/10968 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850107253451915264 |
|---|---|
| author | Caxton Okoh Waba Nasali Theophilus Paul Dawkins Sebamalai Paheerathan |
| author_facet | Caxton Okoh Waba Nasali Theophilus Paul Dawkins Sebamalai Paheerathan |
| author_sort | Caxton Okoh |
| collection | DOAJ |
| description | Data in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation structure. The components of the network locations are mix-vendor components. The focus is on how classless IP address allocation, routing protocols, hierarchical network topology, and the updated Transmission Control Protocol/Internet Protocol (TCP/IP) model are put together to enhance performance and security. The simulation is performed using Cisco Packet Tracer where the packet transfer and connections within the network are examined. <b>Methods:</b> The Variable Length Subnet Mask (VLSM) approach is applied to a network design to secure data and information. We provided and detailed the implementation of subnetting, routing protocols, the updated TCP/IP model, and simulation within Cisco Packet Tracer. Our paper demonstrates the applicability of a single IP address range (0-255) where only the fourth octet changes to serve to secure information across networks through creating subnets. <b>Results:</b> The results of the simulation are further analysed; the security protocols are summarised. <b>Conclusions:</b> Our work has potential to be applied to Supervisory Control and Data Acquisition (SCADA) networks, Internet of Things (IoT) and Cloud networks; a useful resource for academia and industry professionals. |
| format | Article |
| id | doaj-art-5deec0eef61847ba8406dcadbf9b541e |
| institution | OA Journals |
| issn | 2076-3417 |
| language | English |
| publishDate | 2024-11-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Applied Sciences |
| spelling | doaj-art-5deec0eef61847ba8406dcadbf9b541e2025-08-20T02:38:38ZengMDPI AGApplied Sciences2076-34172024-11-0114231096810.3390/app142310968Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENTCaxton Okoh0Waba Nasali Theophilus1Paul Dawkins2Sebamalai Paheerathan3Department of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKDepartment EEC, Centrum Południe Budynek D, Coventry University Wroclaw, Powstańców Śląskich 17, 53-332 Wrocław, PolandDepartment of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKDepartment of Information Technology, CU London, Coventry University Group, Dagenham RM10 7BN, UKData in-transit from an at-rest state can be securely transmitted and managed within a network. <b>Background:</b> This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of an imaginary organisation structure. The components of the network locations are mix-vendor components. The focus is on how classless IP address allocation, routing protocols, hierarchical network topology, and the updated Transmission Control Protocol/Internet Protocol (TCP/IP) model are put together to enhance performance and security. The simulation is performed using Cisco Packet Tracer where the packet transfer and connections within the network are examined. <b>Methods:</b> The Variable Length Subnet Mask (VLSM) approach is applied to a network design to secure data and information. We provided and detailed the implementation of subnetting, routing protocols, the updated TCP/IP model, and simulation within Cisco Packet Tracer. Our paper demonstrates the applicability of a single IP address range (0-255) where only the fourth octet changes to serve to secure information across networks through creating subnets. <b>Results:</b> The results of the simulation are further analysed; the security protocols are summarised. <b>Conclusions:</b> Our work has potential to be applied to Supervisory Control and Data Acquisition (SCADA) networks, Internet of Things (IoT) and Cloud networks; a useful resource for academia and industry professionals.https://www.mdpi.com/2076-3417/14/23/10968information securitycybersecuritycybercrimenetworkingsecurity protocolsVLSM |
| spellingShingle | Caxton Okoh Waba Nasali Theophilus Paul Dawkins Sebamalai Paheerathan Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT Applied Sciences information security cybersecurity cybercrime networking security protocols VLSM |
| title | Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT |
| title_full | Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT |
| title_fullStr | Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT |
| title_full_unstemmed | Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT |
| title_short | Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT |
| title_sort | enhancing data security through vlsm subnetting and tcp ip model in an ent |
| topic | information security cybersecurity cybercrime networking security protocols VLSM |
| url | https://www.mdpi.com/2076-3417/14/23/10968 |
| work_keys_str_mv | AT caxtonokoh enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent AT wabanasalitheophilus enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent AT pauldawkins enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent AT sebamalaipaheerathan enhancingdatasecuritythroughvlsmsubnettingandtcpipmodelinanent |