Telecommunication Network Security Issues Faced by Organizations and Their Possible Solutions

About this sample

About this sample


Words: 3450 |

Pages: 8|

18 min read

Published: Jul 15, 2020

Words: 3450|Pages: 8|18 min read

Published: Jul 15, 2020

Table of contents

  1. Introduction
  2. Background
  3. Design Overview
  4. Network Layers
  5. Service Provision Layer
  6. Control Plane Layer
  7. Routers
    SDN (Software-defined networks) separates the control plane and the data.
    Transport Layer
    Access Panel
  8. Core Network Design
  9. Internet Infrastructure
    Access Networks DesignTechnology
    Justification of Technology
    Network Implementation
    Network analysis
    Technology Acceptance
    Training Criteria
  10. Conclusion

Computer Networks has an important role in the technological sphere. Ensuring network connection in an organization has become one of the most critical challenges lately. When we mention computer networks, the simplest thing that comes to our mind connection between computers that are increasing widely day by day. Several governments and companies are taking keen measures in network security. In spite of these measures network security remains a very big concern to several people. This paper essentially outlines the network security issues faced by organizations and their possible solutions. Furthermore, it centers on latest network security procedures, tendencies and principles innovated in network security. As such, security and performance should be highly considered in a network implementation.

'Why Violent Video Games Shouldn't Be Banned'?


Currently we are able to send and receive data comprising electronic mail, audio or video merely through the click of a push button. The internet is the fastest developing infrastructure recently. Numerous innovative technological inventions are changing how we do stuff. However, because of these rising technological innovations we have a tendency to be incapable of safeguarding our data commendably. Lately, many dealings are through the internet, therefore extraordinary quality computer network is obligatory for operative and safe transactions. Consequently, network security has turned out to be a modern distress. The field of networking is not only controlled to safeguarding the information but also to plentiful diverse fields.

New technologies, for instance mobile, fin-tech, cloud storage and E-commerce also needs elevated telecommunication networks. Since these solutions store persons’ secret data, their network security has become obligatory. Growing next generation networks and protecting fundamental data is necessary to every republic’s security and economic wellbeing. Guaranteeing efficient next generation telecommunication networks is essential for the régime’s tasks and strategies.


The communications sector is an important enabler of economic and social activity in Australia. Telecommunication is instrumental in everyone’s life while communications has always been necessary in business, the fast adoption of telecommunications technologies is transforming business models and growing business innovation in Australia. Telecommunications broadly consists of the following activities: Telecommunications services, together with the infrastructure needed to implement these services, including free TV and cable TV. Also, the Australian content production and distribution like film, TV and print media.

Although telecommunications direct contribution to the Australian economy and employment is quite negligible, the telecommunications exerts have a big influence on other socio-economic sectors as an enabler of socio-economic growth. Several industries depend on the telecommunication sector that their ongoing operation would be affected without it. For instance, the commonplace use of e-commerce, and social media; most of its impact is through the information, media and telecommunications industries.

There is a need for the implementation of a Next Generation Telecommunication Network in Australia to ensure growth of the economy and other socio-economic sectors. The following are the objectives of the Telecommunication Network (NGN) project:

  • Implementation of an accessible faster telecommunication network.
  • Ensure user acceptability
  • Integration of the telecommunication network with the existing networks.

Design Overview

NGN captures a range of network designs, services, and proprieties in a layered architecture. The Netflow /IPFIX flow records deliver an integrated way to access transmission of data from the next-generation network. This transmission data is collected from the network by means of dedicated flow-enabled network tools. The transmission data is retrieved by a transmission analysis system for billing, congestion-detection and network-security. The transmission data is retrieved at the provider edge and sent to the intrusion-detection system. The Provider-edge is a router connected to the network. The particular intrusion detection system evaluates the transmission information transmitted through the Provider-edge and gives an alert if unauthorized or malicious transmission is detected.

Network Layers

Service Provision Layer

Technologies used in the Service Provision Layer:

  • VOIP
  • VOD
  • MMS
  • IPTV.

The Service Layer is an abstract layer in a network architecture. Its purpose is to provide a middleware which aids third-party advanced services and systems at an advanced application level. The service-layer offers competent servers possessed by a telecommunication network service provider. This is retrieved over open and protected APIs (Application Programming Interfaces) through application-layer servers belonging to the third-party telecommunication network service provider. The service-layer equally allows an interface to key networks at a minor resource level.

Control Plane Layer

Technologies used in Control Panel Layer:


Control Plane is the portion of the network that transmits signals and is liable for transmission of signals. Control packets are initiated at router or sent to a router. Purposes of the control plane are system management and configuration.

The control plane the management plane and the data plane are the three simple constituents of a telecommunications design. The management plane and control plane aid the data plane. The data plane which holds the signals carried in the existing network. The management plane, holds the administrative signals and regarded a subdivision of the control plane. In standard telecommunication networks, the three mentioned planes are executed in the firmware of switches and routers.

SDN (Software-defined networks) separates the control plane and the data.

Extracting the control plane from the telecommunication network hardware and integrates it into its software. This allows programmatic access to the telecommunication network. As such, it enables network management to be easier and efficient.

Transport Layer

Technologies used in Control Panel Layer:


The transport-layer is the level in the OSI (Open System Interconnection) model liable for end-to-end communication through the telecommunication network. This offers consistent communication among application procedures running on various hosts in a layered design of protocols and additional network apparatuses. The transport-layer is equally accountable for providing quality and reliability to the end user. Also, it is reliable for the administration of error-correction. The transport-layer allows the host to transmit and accept error-corrected information, messages and packets through the network connection. It is the network module which facilitates multiplexing.

Access Panel

The access panel, which is the lowermost level of the Cisco three-tier-network representation, guarantees the transmission of the packets to end-user computer devices. The Access Panel layer is occasionally denoted as the desktop layer, since it emphases on joining the client nodes to the telecommunication network. The Access Panel devices include multi-station access units, switches and hubs.

Core Network Design

Core, Aggregation, and access layers are the layers of the data center architecture. These layers are denoted broadly all through this paper and are concisely defined as follows:

The Core layer — This layer offers the packet-switching back-plane for all transmission throughout the data center. The core-layer offers connection to a series of combination elements and delivers a tough Layer three directed material with no point of failure. This core-layer facilitates interior routing protocols, like EIGRP or OSPF and load-balances traffic amongst the aggregation and site core layers by means of Cisco Express Forwarding-hashing algorithms. •

The Aggregation layer modules — This layer runs vital tasks, like service module incorporation, the spanning-tree dispensation, default gateway repetition and Layer 2 domain definitions. Server-to-server multi-tier traffic is transmitted over the aggregation-layer. It is capable of utilizing services, such as the firewall and server load balancing, to improve and protect the systems.

The Access layer — In this layer, the servers are physically joined to the telecommunication network. These server apparatuses contain blade servers with fundamental switches, 1RU servers, blade servers with pass-through cabling, mainframes with OSA adapters and grouped servers. Access layer telecommunication network setup comprises sectional switches, integral blade server switches and 2RU switches. Switches offer equally Layer 3 and Layer 2 structures, satisfying the different server broadcast domain and administrative needs. Network RequirementsTo provide our purchasers further opportunities for getting our services we have a tendency to square measure wanting to supply ecommerce services. so as to try and do this, we'd like a very secure network given the safety level of our product. This technique also can facilitate America crop on personnel and different prices that we are able to portion to different budgets or bonuses and even raises for our staff. We will implement our own security protocols on security levels. Our servers are going to be in house for any security measures. Digital certificates, SSL improvement and therefore the scanning for vulnerabilities have to be compelled to be taken into thought once fitting this network.

First we are going to check up on DNS servers or name System servers. This interprets domain names into IP addresses. There square measure many to decide on from however we are going to have our own internal native DNS server for our secure net. We are going to use Century link for our ISP and use their DNS for our unclassified net. We are going to have DHCP servers ran on a internet app server. We are going to run network protocols through a mixture OSPF and BGP and static routes. (Bishop)We will do non-public IP addresses for host machines that goes through a NAT once it leaves the network. We will have an area CA authority and no matter services are required for the client. All actives hosts can have native CA authority. These certs have to be compelled to updated often. Users also will use 2 issue authentication. This may be handled by the cyber team. Technical and Sales groups are going to be assembled for client support. They will additionally monitor the system and keep any problems from arising, still as update and push those updates. For any security, we are going to have all support in house. Once a budget is approved we are able to begin selecting and building these items. As for the planning we are going to have in house servers for security measures. They would like external firewall and demilitarized zone, or zone, and active and passive IDS, or Intrusion Detection System, like the Cisco 7030. There conjointly must be a firewall put in that contains AN ACL, or Access management List, as a part of statement, express deny traffic to deny sure traffic on ports. The department can use Splunk as computer code. It'll actively monitor traffic and automates alerts for American state personnel. It'll conjointly monitor for cyber-attacks. They'll conjointly place in HBSS (Host based mostly Security System) this can cowl all antivirus and firewalls. The Network can have got to connect with the net. The network got to be web filtered, in addition because it got to be American state, or data Assurance, compliant and auditable for legal and security reasons. All traffic across the system should be DISA, or Defense data system Agency, on category compliant and therefore the telecommunication network proprietary compliant. OSPF and BGP square measure used along for a lot of dynamic routing. the advantages for OSPF as a routing protocol is, it’s open supply and universal across all devices. It conjointly mechanically discovers Next Hop devices. The down aspect to OSPF is once their network list starts obtaining giant you begin obtaining a bog down because it is making an attempt to stay it updated. (OSPF)BGP is mostly used as a trunk between giant networks however it can even be used on the server backplane on numerous servers. Its main profit is you'll have as giant network list as you wish. OSPF you may use in a very native network and BGP you'd use for larger WAN routing to attach the nodes along, therefore you may wish to use these 2 along.

Static routing is you virtually tell each single begin and destination purpose. You tell it wherever you would like it to travel. The good thing about that you simply have consistency. The drawback is it creates growl terribly tough as a result of you perpetually have to be compelled to make changes to stay up. It's terribly easy once coping with a couple of devices however after you get a lot of devices it gets tough to use. It will produce a bottleneck and you can’t to Quality of Service Checks. OSPF can mechanically conjointly in OSPF if you've got a tool go down it'll be to succeeding network path, in Static once it’s down it’s down. We will be victimization cisco routers for our science routing. We are going to be victimization all cisco instrumentality to stay things uniform and ensure everything are going to be compatible. Routers use routing tables to see a next hop address to that the packet ought to be forwarded. The routers maintain a routing table and stores it within the RAM. this is often wont to confirm a path to a destination network. (CCNA)Microsoft permits you to issue and revoke digital certificates. These are often wont to modify SSL sessions and to demonstrate the identity of your computer network, extranet, or an online web site. Certificate Services runs on a chosen certificate server. These servers are often organized mutually of 4 styles of certification authorities. Enterprise root CA is that the server at the basis of the hierarchy for a Windows domain.

Internet Infrastructure

The internet may be an international network of pc devices with distinctive network addresses; science address. pc devices among the telecommunication network connect with the web through an online Service supplier. A pc is assigned a short lived net Protocol once it gets connected to the web directly through an online Service supplier. However, the pc devices do have a permanent net Protocol connected to the web through an area space Network. The TCP/IP stack includes:Applications Protocol Layer: this allows computers to access the globe Wide net, emails and therefore the File Transfer Protocols. TCP Layer: Transmission management protocol forwards frames to destination Media Access management address (MAC address) employing a pc device’s specific port variety. IP Layer: This directs packets to a particular pc device exploitation its science Address. Hardware Layer: during this layer, frames area unit reborn from binary type into network signals. They embody local area network cables, modems, and Wi-Fi routers.

Access Networks DesignTechnology

The telecommunication network needs the subsequent infrastructure to attach to dedicated line internet:

Backup Server: The network needs a backup server, thus users will access shared data just in case of any net period of time. This backup server ought to be strategically connected to the switch in order that its accessible to all or any the licensed computers within the network.

Firewall: the web association software system ought to have its firewall enabled to secure the devices connected with malicious intrusion through the web. Also, antivirus, antispyware and antimalware ought to be put in to confirm the web access is secure.

Operating System: laptop devices would like operational systems for dial-up access sessions. Also, the browser software system like net soul is needed as AN interface to access net by users.

Ethernet: Computers have to be compelled to be connected to the router and backup server through an area space Network. This association is created through LAN cables.

Switch: A switch is a controller, facultative networked devices to speak to every different with efficiency. Through data sharing and resource allocation, switches save businesses cash and increase worker productivity.

Justification of Technology

The proposed telecommunication network is a Wide Area Network. Therefore, it requires both wireless and cable computer network to function efficiently. Some of the main resources used to implement this telecommunication network so it can fully and efficiently serve the target demographics include:

Cloud Computing: Cloud computing ensures that the large number of users can back up their information in the cloud storage. Also, these users can share resources on the go. It allows faster access of information and sharing of information among the target demographic.

Firewall: Firewalls use various methods to protect against intrusion. For proxy servers, firewalls mask the IP-address and inhibit intrusion. External computers systems communicate with firewalls before communicating to the intended computer in a network. Therefore, firewalls limit connections to verified reliable networks only. Also, packet-filtering firewalls evaluate each packet, rejecting any that doesn’t meet the security test requirements.

Wireless Modems: Since the telecommunication network is implemented over a wide area, wireless telecommunication network is very instrumental. First, a wireless network is readily accessible to users with mobile devices. Also, a wireless network can be used in geographic locations where fiber optic cables cannot be place

Network Implementation

The implementation of the planned telecommunication network project may be a terribly important part of the full project. The implementation part has some major tasks to be completed for a triple-crown implementation of the project. Also, these major tasks need to be completed to make sure user acceptance of the planned electronic network. The following area unit a number of the key tasks to be completed within the implementation phase:

• The organization and coordination of implementation.

• Training of users.

• Documentation of the planned telecommunication network.

• Creation of a support network support team.

• Schedule special electronic network process required for the implementation.

• Carry out a network web site survey before implementation.

• Purchase all the wants for the implementation; hardware and computer code.

• Convert needed information into the planned network’s decipherable kind.

• Provide and prepare the positioning for the implementation of the planned network.

The following square measure the resources needed to finish the implementation phase:

• Hardware – a number of the hardware needed for the implementation part include: LAN cables, routers, computers, switches and a backup server.

• Software – The package needed for the implementation of the planned telecommunication network include: Antivirus, anti-malware, network automation package and network observation package.

• Data necessities - These embrace the datasets needed for the implementation part. For example personnel IDs may well be needed to form personnel authentication accounts. These would modify licensed personnel to access the planned telecommunication electronic network.

• Physical Facilities – A web site ought to be allotted for the birth down of the planned electronic network.

Some of the main risks to the implementation of this project include:

• Break down of network Specifications – throughout implementation, some network necessities would possibly conflict. The network engineers would possibly notice that a number of the network specifications square measure unclear or incomplete. This could be solved by doing an entire network analysis throughout the initial stages.

• Estimation risks – These square measure as a results of underreckoning of the timeline or budget. Network engineers have to be compelled to monitor previous comes for a decent estimation and programing of the planned electronic network.

• Procedural risks – this is often caused by inadequate method implementation. this could be solved by clear assignment of responsibilities within the implementation part.

• Technical risks – The telecommunication network’s management would possibly purchase cheaper package so as to stay to the allotted budget of the project. However, this could create the pc network not win its most practicality.

• Uncontrollable risks – These embrace package period of time, government policies and alternative risks that don't seem to be at intervals the network engineers’ management.

Network analysis

The project analysis method begins at development and is split into verification, validation, assessment of human factors and clinical assessment. Verification assesses the merchandise development per its specified functionalities. It confirms the product consistency, completeness and its correctness. Validation checks that the system performs the tasks that it has been designed at intervals the $64000 operational setting. Analysis of human factors is that succeeding a part of system analysis.

Technology Acceptance

Resistance by the telecommunication network’s users comes up once they can not adopt the new telecommunication network. Therefore, the challenge in style is to incorporate coaching within the network development. The users square measure usually afraid to be told new technological trends.

Training Criteria

To train the users, the system supplier ought to introduce some coaching materials, a coaching procedure and lead the proper program for the users, i. e. perform annual workshops to extend the IT information of the users. The network development department have to be compelled to assist the supplier in guaranteeing the coaching sessions square measure all comprehensive.

Advantages and Limitations of the Project

After implementation of the telecommunication network, some blessings and limitations may arise compared to the paper-based documentation.

The advantages are:

• It reduces users stress.

• It allows timely access of shared resources.

• Its economical and allows accessibility to info

• Increases the user’s productivity.

The limitations include:

• It changes communication processes with users.

• Training of users is variety of long.

Get a custom paper now from our expert writers.


In conclusion, an honest telecommunication network ought to target providing information and services to confirm the best outcome for the users. there is nice demand for users with information in pc networks to supervise this development method and to confirm high standards in management a region of the telecommunication network since the users play an important role among the merchandise style, implementation and analysis.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Telecommunication Network Security Issues Faced by Organizations and Their Possible Solutions. (2020, July 14). GradesFixer. Retrieved May 25, 2024, from
“Telecommunication Network Security Issues Faced by Organizations and Their Possible Solutions.” GradesFixer, 14 Jul. 2020,
Telecommunication Network Security Issues Faced by Organizations and Their Possible Solutions. [online]. Available at: <> [Accessed 25 May 2024].
Telecommunication Network Security Issues Faced by Organizations and Their Possible Solutions [Internet]. GradesFixer. 2020 Jul 14 [cited 2024 May 25]. Available from:
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled


Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.


    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts


    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!


    Get Your
    Personalized Essay in 3 Hours or Less!

    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now