Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)

ilustraciones, gráficas, tablas

Autores:
Ramírez Galvis, Elkin Yezith
Tipo de recurso:
Fecha de publicación:
2021
Institución:
Universidad Nacional de Colombia
Repositorio:
Universidad Nacional de Colombia
Idioma:
spa
OAI Identifier:
oai:repositorio.unal.edu.co:unal/80413
Acceso en línea:
https://repositorio.unal.edu.co/handle/unal/80413
https://repositorio.unal.edu.co/
Palabra clave:
000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadores
scalable
Telecommunications
TIC
TCP/IP (Transmission Control Protocol/Internet Protocol)
Network and data models
OSI (Open Systems Interconnection)
Data Networks
Modelos de red y datos
TCP/IP (Protocolo de Control de Transmisión/Protocolo de Internet)
escalable
Telecomunicaciones
TIC
OSI ( Interconexión de Sistemas Abiertos)
Redes de datos
Redes de información
Análisis de redes
Information networks
Network analysis
Rights
openAccess
License
Atribución-NoComercial 4.0 Internacional
id UNACIONAL2_27e61a9a08339b03256fa60440818164
oai_identifier_str oai:repositorio.unal.edu.co:unal/80413
network_acronym_str UNACIONAL2
network_name_str Universidad Nacional de Colombia
repository_id_str
dc.title.spa.fl_str_mv Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
dc.title.translated.eng.fl_str_mv Highly available hybrid network architecture and security model for the data channel, faculty of engineering (Bta)
title Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
spellingShingle Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadores
scalable
Telecommunications
TIC
TCP/IP (Transmission Control Protocol/Internet Protocol)
Network and data models
OSI (Open Systems Interconnection)
Data Networks
Modelos de red y datos
TCP/IP (Protocolo de Control de Transmisión/Protocolo de Internet)
escalable
Telecomunicaciones
TIC
OSI ( Interconexión de Sistemas Abiertos)
Redes de datos
Redes de información
Análisis de redes
Information networks
Network analysis
title_short Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
title_full Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
title_fullStr Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
title_full_unstemmed Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
title_sort Modelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)
dc.creator.fl_str_mv Ramírez Galvis, Elkin Yezith
dc.contributor.advisor.none.fl_str_mv Tovar Rache, Jesús Guillermo
dc.contributor.author.none.fl_str_mv Ramírez Galvis, Elkin Yezith
dc.contributor.researchgroup.spa.fl_str_mv UNeT (Universidad Nacional\'s Networking and Telecommunications Research Team)
dc.subject.ddc.spa.fl_str_mv 000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadores
topic 000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadores
scalable
Telecommunications
TIC
TCP/IP (Transmission Control Protocol/Internet Protocol)
Network and data models
OSI (Open Systems Interconnection)
Data Networks
Modelos de red y datos
TCP/IP (Protocolo de Control de Transmisión/Protocolo de Internet)
escalable
Telecomunicaciones
TIC
OSI ( Interconexión de Sistemas Abiertos)
Redes de datos
Redes de información
Análisis de redes
Information networks
Network analysis
dc.subject.proposal.eng.fl_str_mv scalable
Telecommunications
TIC
TCP/IP (Transmission Control Protocol/Internet Protocol)
Network and data models
OSI (Open Systems Interconnection)
Data Networks
dc.subject.proposal.spa.fl_str_mv Modelos de red y datos
TCP/IP (Protocolo de Control de Transmisión/Protocolo de Internet)
escalable
Telecomunicaciones
TIC
OSI ( Interconexión de Sistemas Abiertos)
Redes de datos
dc.subject.spines.spa.fl_str_mv Redes de información
Análisis de redes
dc.subject.spines.eng.fl_str_mv Information networks
Network analysis
description ilustraciones, gráficas, tablas
publishDate 2021
dc.date.accessioned.none.fl_str_mv 2021-10-07T15:23:17Z
dc.date.available.none.fl_str_mv 2021-10-07T15:23:17Z
dc.date.issued.none.fl_str_mv 2021-10-05
dc.type.spa.fl_str_mv Trabajo de grado - Maestría
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/masterThesis
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
dc.type.content.spa.fl_str_mv Text
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/TM
status_str acceptedVersion
dc.identifier.uri.none.fl_str_mv https://repositorio.unal.edu.co/handle/unal/80413
dc.identifier.instname.spa.fl_str_mv Universidad Nacional de Colombia
dc.identifier.reponame.spa.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
dc.identifier.repourl.spa.fl_str_mv https://repositorio.unal.edu.co/
url https://repositorio.unal.edu.co/handle/unal/80413
https://repositorio.unal.edu.co/
identifier_str_mv Universidad Nacional de Colombia
Repositorio Institucional Universidad Nacional de Colombia
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.references.spa.fl_str_mv [1]M. Zareei, E. Mahmoud Mohamed, M. H. Anisi, C. Vargas Rosales, K. Tsukamoto y M. Khurram Khan, «On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network,» IEEE Access, vol. 4, pp. 8294-8302, 2016.
[2]X. Yu, H. Xu, H. Gu y H. Lan, «Thor: A scalable hybrid switching architecture for data centers,» IEEE Transactions on Communications, vol. 66, nº 10, pp. 4653-4665, 1 10 2018.
[3]J.-B. Yang, C.-T. Wu y C.-H. Tsai, «Selection of an ERP system for a construction firm in Taiwan: A case study,» Automation in Construction, vol. 16, nº 6, pp. 787-796, 9 2007.
[4]Z. Wu y M. Xiao, «Performance evaluation of VPN with different network topologies,» de 2019 2nd International Conference on Electronics Technology, ICET 2019, 2019.
[5]L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen y A. V. Vasilakos, «Security and privacy for storage and computation in cloud computing,» Information Sciences, vol. 258, pp. 371-386, 2 2014.
[6]J. Wang y L. Cheng, «qSDS: A QoS-Aware I/O scheduling framework towards software defined storage,» de 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015.
[7]M. van Oosterhout, E. Waarts y J. van Hillegersberg, «Change factors requiring agility and implications for IT,» European Journal of Information Systems, vol. 15, nº 2, pp. 132-145, 19 4 2006.
[8]E. J. Umble, R. R. Haft y M. Umble, «Enterprise resource planning: Implementation procedures and critical success factors,» European Journal of Operational Research, vol. 146, nº 2, pp. 241-257, 4 2003.
[9]M. Suchara, D. Xu, R. Doverspike, D. Johnson y J. Rexford, «Network architecture for joint failure recovery and traffic engineering,» de Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems - SIGMETRICS '11, New York, New York, USA, 2011.
[10]M. Sookhak, H. Tang, Y. He y F. R. Yu, «Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges,» IEEE Communications Surveys & Tutorials, pp. 1-1, 2018.
[11]S. Shenbagavalli y S. Karthikeyan, «An efficient low power NoC router architecture design,» de 2015 Online International Conference on Green Engineering and Technologies (IC-GET), 2015.
[12]M. Sheghdara y J. Hassine, «Automatic retrieval and analysis of high availability scenarios from system execution traces: A case study on hot standby router protocol,» Journal of Systems and Software, vol. 161, 1 3 2020.
[13]F. Righetti, C. Vallati y G. Anastasi, «IoT Applications in Smart Cities: A Perspective Into Social and Ethical Issues,» de 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018.
[14]C. Rath, T. Niedermair y T. Zefferer, «Towards a Personal Security Device,» 2016, pp. 1-16.
[15]M. R. K. Naik y P. Samundiswary, «Wireless body area network security issues — Survey,» de 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016.
[16]B. Metcalfe, «The Next-Generation Internet,» IEEE Internet Computing, vol. 4, nº 1, pp. 58-59, 2000.
[17]N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker y J. Turner, «OpenFlow,» ACM SIGCOMM Computer Communication Review, vol. 38, nº 2, p. 69, 31 3 2008.
[18]MCB University Press., Journal of organizational change management., MCB University Press, 1988.
[19]J. Matejka, P. Podhradsky y J. Londak, «Security manager for hybrid broadcast broadband architecture evolution,» de 2016 International Symposium ELMAR, 2016.
[20]A. Manzoor, M. Hussain y S. Mehrban, «Performance Analysis and Route Optimization: Redistribution between EIGRP, OSPF & BGP Routing Protocols,» Computer Standards and Interfaces, vol. 68, 1 2 2020.
[21]S. Lunawat y A. Patankar, «Efficient architecture for secure outsourcing of data and computation in hybrid cloud,» de 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), 2014.
[22]M. Ljubojević, A. Bajić y D. Mijić, «Implementation of High-Availability Server Cluster by Using Fencing Concept,» de 2019 18th International Symposium INFOTEH-JAHORINA, INFOTEH 2019 - Proceedings, 2019.
[23]H. Leitold, A. Hollosi y R. Posch, «Security architecture of the Austrian citizen card concept,» de 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[24]A. M. Khalaf, M. S. E. Salam y K. A. Ahmed, «Investigation of different ethernet wiring and different frame size to enhance the performance of LAN,» de International Conference on Advanced Communication Technology, ICACT, 2017.
[25]A. Kanungoe y G. Das, «A novel OLT protection for hybrid WDM-TDM optical access networks,» de 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), 2014.
[26]T. Janevski, NGN architectures, protocols, and services.
[27]Institute of Electrical and Electronics Engineers. y IEEE Computer Society., IEEE transactions on cloud computing..
[28]C.-T. Hsuan, «The research on “application of the third party policing to social security”,» de 2011 IEEE International Summer Conference of Asia Pacific Business Innovation and Technology Management, 2011.
[29]S. Hong, J. P. Jue, P. Park, H. Yoon, H. Ryu y S. Hong, «Survivable virtual topology design in multi-domain optical networks,» Journal of Optical Communications and Networking, vol. 8, nº 6, pp. 408-416, 1 6 2016.
[30]A. Hameed y M. Wasim, «On the study of SDN for emulating virtual lans,» de 2019 8th International Conference on Information and Communication Technologies, ICICT 2019, 2019.
[31]B. T. Haghighi, M. Othman y F. H. Hashim, «Internet addiction and dependency: A case study in UNITEN, Malaysia,» de 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 2011.
[32]S. Gupta, S. C. Misra, N. Kock y D. Roubaud, «Organizational, technological and extrinsic factors in the implementation of cloud ERP in SMEs,» Journal of Organizational Change Management, vol. 31, nº 1, pp. 83-102, 12 2 2018.
[33]P. Gill, N. Jain y N. Nagappan, «Understanding network failures in data centers,» ACM SIGCOMM Computer Communication Review, vol. 41, nº 4, p. 350, 22 10 2011.
[34]H. Emesowum, A. Paraskelidis y M. Adda, «Fault tolerance capability of cloud data center,» de 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), 2017.
[35]K. Chopra, K. Gupta y A. Lambora, «Future Internet: The Internet of Things-A Literature Review,» de Proceedings of the International Conference on Machine Learning, Big Data, Cloud and Parallel Computing: Trends, Prespectives and Prospects, COMITCon 2019, 2019.
[36]J. Bohn, V. Coroamă, M. Langheinrich, F. Mattern y M. Rohs, «Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing,» de Ambient Intelligence, Berlin/Heidelberg, Springer-Verlag, pp. 5-29.
[37]R. Amin, N. Shah y W. Mehmood, «Enforcing optimal [2] policies using K-partite graph in hybrid SDN,» Electronics (Switzerland), vol. 8, nº 6, 1 6 2019.
[38]R. Amin, N. Shah, B. Shah y O. Alfandi, «Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN,» IEEE Access, vol. 4, pp. 9437-9450, 2016.
[39]P. Amaral, P. F. Pinto, L. Bernardo y A. Mazandarani, «Application Aware SDN Architecture using Semi-supervised Traffic Classification,» de 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2018, 2018.
[40]L. Alouache, N. Nguyen, M. Aliouat y R. Chelouah, «Toward a hybrid SDN architecture for V2V communication in IoV environment,» de 2018 Fifth International Conference on Software Defined Systems (SDS), 2018.
[41]V. A. Almeida, D. Doneda y M. Monteiro, «Governance challenges for the internet of things,» IEEE Internet Computing, vol. 19, nº 4, pp. 56-59, 1 7 2015.
[42]A. K. Al Mhdawi y H. S. Al-Raweshidy, «IPRDR: Intelligent power reduction decision routing protocol for big traffic flood in hybrid-SDN architecture,» IEEE Access, vol. 6, pp. 10944-10955, 30 1 2018.
[43]A. Aguado, V. Lopez, J. Martinez-Mateo, T. Szyrkowiec, A. Autenrieth, M. Peev, D. Lopez y V. Martin, «Hybrid conventional and quantum security for software defined and virtualized networks,» Journal of Optical Communications and Networking, vol. 9, nº 10, pp. 819-825, 1 10 2017.
[44]«Transition to NGN and Future Evolution,» de NGN Architectures, Protocols and Services, Chichester, UK, John Wiley & Sons, Ltd, 2014, pp. 301-332.
[45]«SDNMS: A software defined network measurement system for NFV networks - IEEE Journals & Magazine,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/8695258.
[46]IEEE P802.3/D3.0, March 2015 (Revision of IEEE Std 802.3-2012).
[47]«Data Security in the Cloud,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/courses/details/EDP472.
[48]«Cloud Computing Definition, Reference Architecture, and General Use Cases,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/courses/details/EDP382.
[49]«A survey of ethernet LAN security,»[En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/6407456
[50]«A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends,»[En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/7467419
[51]T. Zhang, M. Chen, X. Wei, B. Chen and C. Hu, "SDNMS: A software defined network measurement system for NFV networks," in China Communications, vol. 16, no. 4, pp. 59-74, April 2019.
[52]A. K. Al Mhdawi and H. S. Al-Raweshidy, "iPRDR: Intelligent Power Reduction Decision Routing Protocol for Big Traffic Flood in Hybrid-SDN Architecture," in IEEE Access, vol. 6, pp. 10944-10955, 2018.
dc.rights.spa.fl_str_mv Derechos reservados al autor
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.license.spa.fl_str_mv Atribución-NoComercial 4.0 Internacional
dc.rights.uri.spa.fl_str_mv http://creativecommons.org/licenses/by-nc/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
rights_invalid_str_mv Atribución-NoComercial 4.0 Internacional
Derechos reservados al autor
http://creativecommons.org/licenses/by-nc/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 106 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.coverage.city.none.fl_str_mv Bogotá
dc.coverage.country.none.fl_str_mv Colombia
dc.publisher.spa.fl_str_mv Universidad Nacional de Colombia
dc.publisher.program.spa.fl_str_mv Bogotá - Ingeniería - Maestría en Ingeniería - Telecomunicaciones
dc.publisher.department.spa.fl_str_mv Departamento de Ingeniería de Sistemas e Industrial
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
dc.publisher.place.spa.fl_str_mv Bogotá, Colombia
dc.publisher.branch.spa.fl_str_mv Universidad Nacional de Colombia - Sede Bogotá
institution Universidad Nacional de Colombia
bitstream.url.fl_str_mv https://repositorio.unal.edu.co/bitstream/unal/80413/4/1016004990.2021.pdf
https://repositorio.unal.edu.co/bitstream/unal/80413/3/license.txt
https://repositorio.unal.edu.co/bitstream/unal/80413/5/1016004990.2021.pdf.jpg
bitstream.checksum.fl_str_mv 8b46723bdb6bb45c41da7c2c8a8b8aab
cccfe52f796b7c63423298c2d3365fc6
bec7850815d0370713ed3b9e91a3f5a8
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Nacional de Colombia
repository.mail.fl_str_mv repositorio_nal@unal.edu.co
_version_ 1814089185598898176
spelling Atribución-NoComercial 4.0 InternacionalDerechos reservados al autorhttp://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Tovar Rache, Jesús Guillermo349e96c11363234fe03549777e1e5f98Ramírez Galvis, Elkin Yezithb9e67b5afc6a747cd388d1b415313f56UNeT (Universidad Nacional\'s Networking and Telecommunications Research Team)2021-10-07T15:23:17Z2021-10-07T15:23:17Z2021-10-05https://repositorio.unal.edu.co/handle/unal/80413Universidad Nacional de ColombiaRepositorio Institucional Universidad Nacional de Colombiahttps://repositorio.unal.edu.co/ilustraciones, gráficas, tablasLas arquitecturas de red híbridas permiten desempeñar un mejor papel en la distribución de los recursos y de manera muy importante mejorar la eficiencia y robustez de las redes de datos ayudando a minimizar tanto fallas de conectividad como aislar incidentes de seguridad bien sea de tipo DDoS, TCP/IP, acceso remoto, etc. Para el caso de estudio, el objeto fue identificar fallas críticas en los servicios que la comunidad universitaria usa dentro de la red LAN por medio de servidores encargados de la distribución y almacenamiento de dichos servicios. Otro punto evaluado fue la verificación de la infraestructura networking y computacional, tomando la seguridad como otro de los elementos que bajo ciertas particularidades como políticas de tráfico, usuarios y direccionamiento dentro de la facultad de ingeniería se sumaron a la identificación de las incidencias sobre ciertos activos de la información. En primer lugar, se analizaron los protocolos actuales en la distribución de tráfico y disponibilidad de los equipos ante fallas no esperadas, lo cual nos dió una solución que minimiza la cantidad de fallas en los equipos activos, el estado actual de la red de la facultad de ingeniería y como plus la mejora de la conectividad entre los diferentes dispositivos de red. En segundo lugar, se identificó el mejor uso de las VLAN’s para la prestación de los servicios de red como medio aislado es la operación de servicios bajo entornos virtuales y la debida parametrización de la política de alta disponibilidad bajo el protocolo HSRP, con el fin de garantizar un servicio de calidad para los usuarios de la red y las acciones que estos realicen. Se identificaron adicionalmente, varias actividades que bajo la metodología PMP permitieron identificar los requerimientos, evaluación de la arquitectura de red actual, recolectar datos de incidentes de seguridad y posteriormente el diseño de la red que fue simulada en el modelador GNS3. Acto seguido se realizaron diferentes escenarios como la evaluación de control de acceso administrativo mediante el protocolo SSH hacia los equipos más críticos, también se evaluó el escenario de alta disponibilidad y conectividad de los usuarios hacia los servicios (servidor FTP) para el cargue y descargue de archivos. Finalmente se recolectaron diferentes estadísticas de respuesta para cada uno de los escenarios, identificando en especial en ambientes de alta disponibilidad tiempos de menos de 2mseg, en donde cualquier dispositivo de respaldo (Ej. R3 a R4) responde ante una falla de nodo o conexión sin impactar la operación y gestión de los servicios y/o equipos responsables de mantener el funcionamiento de la red de datos. En cuanto a comunicación se evaluó que entre nodos de diferente segmento a nivel de conectividad ping, la operación y respuesta obtenida fue entre 2 y 5mseg entre los dispositivos de comunicación como por ejemplo Switches y routers, en el canal de comunicación de la facultad de ingeniería (sede Bogotá), reflejando así que el protocolo de alta disponibilidad HSRP contribuyó con los mejores resultados esperados para el modelo diseñado.Hybrid network architectures can play a better role in the distribution of resources and very importantly improve the efficiency and robustness of data networks, helping to minimize both connectivity failures and isolate security incidents, whether DDoS, TCP/IP, remote access, etc. For the case study, the objective was to identify critical failures in the services that the university community uses within the LAN network through servers responsible for the distribution and storage of these services. Another point evaluated was the verification of the networking and computational infrastructure, taking security as another of the elements that under certain particularities such as traffic policies, users and addressing within the faculty of engineering were added to the identification of incidents on certain information assets. Firstly, we analyzed the current protocols in the distribution of traffic and availability of equipment in the event of unexpected failures, which gave us a solution that minimizes the number of failures in the active equipment, the current state of the network of the faculty of engineering and as a plus the improvement of connectivity between the different network devices. Secondly, the best use of VLAN's was identified for the provision of network services as an isolated medium is the operation of services under virtual environments and the proper parameterization of the high availability policy under the HSRP protocol, in order to ensure a quality service for network users and the actions they perform. In addition, several activities were identified that under the PMP methodology allowed to identify the requirements, evaluate the current network architecture. The network design was then simulated in the GNS3 modeler. Then, different scenarios were performed, such as the evaluation of administrative access control through the SSH protocol to the most critical equipment, as well as the evaluation of the high availability scenario and user connectivity to the services (FTP server) for uploading and downloading files. Finally, different response statistics were collected for each of the scenarios, identifying especially in high availability environments times of less than 2msec, where any backup device (e.g. R3 to R4) responds to a node or connection failure without impacting the operation and management of the services and/or equipment responsible for maintaining the operation of the data network. In terms of communication, it was evaluated that between nodes of different segments at ping connectivity level, the operation and response obtained was between 2 and 5msec between communication devices such as switches and routers, in the communication channel of the faculty of engineering (Bogotá headquarters), thus reflecting that the HSRP high availability protocol contributed with the best results expected for the designed model.MaestríaMagíster en Ingeniería - TelecomunicacionesRedes y sistemas de Telecomunicaciones106 páginasapplication/pdfspaUniversidad Nacional de ColombiaBogotá - Ingeniería - Maestría en Ingeniería - TelecomunicacionesDepartamento de Ingeniería de Sistemas e IndustrialFacultad de IngenieríaBogotá, ColombiaUniversidad Nacional de Colombia - Sede Bogotá000 - Ciencias de la computación, información y obras generales::004 - Procesamiento de datos Ciencia de los computadoresscalableTelecommunicationsTICTCP/IP (Transmission Control Protocol/Internet Protocol)Network and data modelsOSI (Open Systems Interconnection)Data NetworksModelos de red y datosTCP/IP (Protocolo de Control de Transmisión/Protocolo de Internet)escalableTelecomunicacionesTICOSI ( Interconexión de Sistemas Abiertos)Redes de datosRedes de informaciónAnálisis de redesInformation networksNetwork analysisModelo híbrido de arquitectura de red y seguridad altamente disponible para el canal de datos, facultad de ingeniería (Bta)Highly available hybrid network architecture and security model for the data channel, faculty of engineering (Bta)Trabajo de grado - Maestríainfo:eu-repo/semantics/masterThesisinfo:eu-repo/semantics/acceptedVersionTexthttp://purl.org/redcol/resource_type/TMBogotáColombia[1]M. Zareei, E. Mahmoud Mohamed, M. H. Anisi, C. Vargas Rosales, K. Tsukamoto y M. Khurram Khan, «On-Demand Hybrid Routing for Cognitive Radio Ad-Hoc Network,» IEEE Access, vol. 4, pp. 8294-8302, 2016.[2]X. Yu, H. Xu, H. Gu y H. Lan, «Thor: A scalable hybrid switching architecture for data centers,» IEEE Transactions on Communications, vol. 66, nº 10, pp. 4653-4665, 1 10 2018.[3]J.-B. Yang, C.-T. Wu y C.-H. Tsai, «Selection of an ERP system for a construction firm in Taiwan: A case study,» Automation in Construction, vol. 16, nº 6, pp. 787-796, 9 2007.[4]Z. Wu y M. Xiao, «Performance evaluation of VPN with different network topologies,» de 2019 2nd International Conference on Electronics Technology, ICET 2019, 2019.[5]L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen y A. V. Vasilakos, «Security and privacy for storage and computation in cloud computing,» Information Sciences, vol. 258, pp. 371-386, 2 2014.[6]J. Wang y L. Cheng, «qSDS: A QoS-Aware I/O scheduling framework towards software defined storage,» de 2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2015.[7]M. van Oosterhout, E. Waarts y J. van Hillegersberg, «Change factors requiring agility and implications for IT,» European Journal of Information Systems, vol. 15, nº 2, pp. 132-145, 19 4 2006.[8]E. J. Umble, R. R. Haft y M. Umble, «Enterprise resource planning: Implementation procedures and critical success factors,» European Journal of Operational Research, vol. 146, nº 2, pp. 241-257, 4 2003.[9]M. Suchara, D. Xu, R. Doverspike, D. Johnson y J. Rexford, «Network architecture for joint failure recovery and traffic engineering,» de Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems - SIGMETRICS '11, New York, New York, USA, 2011.[10]M. Sookhak, H. Tang, Y. He y F. R. Yu, «Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges,» IEEE Communications Surveys & Tutorials, pp. 1-1, 2018.[11]S. Shenbagavalli y S. Karthikeyan, «An efficient low power NoC router architecture design,» de 2015 Online International Conference on Green Engineering and Technologies (IC-GET), 2015.[12]M. Sheghdara y J. Hassine, «Automatic retrieval and analysis of high availability scenarios from system execution traces: A case study on hot standby router protocol,» Journal of Systems and Software, vol. 161, 1 3 2020.[13]F. Righetti, C. Vallati y G. Anastasi, «IoT Applications in Smart Cities: A Perspective Into Social and Ethical Issues,» de 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018.[14]C. Rath, T. Niedermair y T. Zefferer, «Towards a Personal Security Device,» 2016, pp. 1-16.[15]M. R. K. Naik y P. Samundiswary, «Wireless body area network security issues — Survey,» de 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016.[16]B. Metcalfe, «The Next-Generation Internet,» IEEE Internet Computing, vol. 4, nº 1, pp. 58-59, 2000.[17]N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker y J. Turner, «OpenFlow,» ACM SIGCOMM Computer Communication Review, vol. 38, nº 2, p. 69, 31 3 2008.[18]MCB University Press., Journal of organizational change management., MCB University Press, 1988.[19]J. Matejka, P. Podhradsky y J. Londak, «Security manager for hybrid broadcast broadband architecture evolution,» de 2016 International Symposium ELMAR, 2016.[20]A. Manzoor, M. Hussain y S. Mehrban, «Performance Analysis and Route Optimization: Redistribution between EIGRP, OSPF & BGP Routing Protocols,» Computer Standards and Interfaces, vol. 68, 1 2 2020.[21]S. Lunawat y A. Patankar, «Efficient architecture for secure outsourcing of data and computation in hybrid cloud,» de 2014 International Conference on Reliability Optimization and Information Technology (ICROIT), 2014.[22]M. Ljubojević, A. Bajić y D. Mijić, «Implementation of High-Availability Server Cluster by Using Fencing Concept,» de 2019 18th International Symposium INFOTEH-JAHORINA, INFOTEH 2019 - Proceedings, 2019.[23]H. Leitold, A. Hollosi y R. Posch, «Security architecture of the Austrian citizen card concept,» de 18th Annual Computer Security Applications Conference, 2002. Proceedings..[24]A. M. Khalaf, M. S. E. Salam y K. A. Ahmed, «Investigation of different ethernet wiring and different frame size to enhance the performance of LAN,» de International Conference on Advanced Communication Technology, ICACT, 2017.[25]A. Kanungoe y G. Das, «A novel OLT protection for hybrid WDM-TDM optical access networks,» de 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), 2014.[26]T. Janevski, NGN architectures, protocols, and services.[27]Institute of Electrical and Electronics Engineers. y IEEE Computer Society., IEEE transactions on cloud computing..[28]C.-T. Hsuan, «The research on “application of the third party policing to social security”,» de 2011 IEEE International Summer Conference of Asia Pacific Business Innovation and Technology Management, 2011.[29]S. Hong, J. P. Jue, P. Park, H. Yoon, H. Ryu y S. Hong, «Survivable virtual topology design in multi-domain optical networks,» Journal of Optical Communications and Networking, vol. 8, nº 6, pp. 408-416, 1 6 2016.[30]A. Hameed y M. Wasim, «On the study of SDN for emulating virtual lans,» de 2019 8th International Conference on Information and Communication Technologies, ICICT 2019, 2019.[31]B. T. Haghighi, M. Othman y F. H. Hashim, «Internet addiction and dependency: A case study in UNITEN, Malaysia,» de 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 2011.[32]S. Gupta, S. C. Misra, N. Kock y D. Roubaud, «Organizational, technological and extrinsic factors in the implementation of cloud ERP in SMEs,» Journal of Organizational Change Management, vol. 31, nº 1, pp. 83-102, 12 2 2018.[33]P. Gill, N. Jain y N. Nagappan, «Understanding network failures in data centers,» ACM SIGCOMM Computer Communication Review, vol. 41, nº 4, p. 350, 22 10 2011.[34]H. Emesowum, A. Paraskelidis y M. Adda, «Fault tolerance capability of cloud data center,» de 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), 2017.[35]K. Chopra, K. Gupta y A. Lambora, «Future Internet: The Internet of Things-A Literature Review,» de Proceedings of the International Conference on Machine Learning, Big Data, Cloud and Parallel Computing: Trends, Prespectives and Prospects, COMITCon 2019, 2019.[36]J. Bohn, V. Coroamă, M. Langheinrich, F. Mattern y M. Rohs, «Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing,» de Ambient Intelligence, Berlin/Heidelberg, Springer-Verlag, pp. 5-29.[37]R. Amin, N. Shah y W. Mehmood, «Enforcing optimal [2] policies using K-partite graph in hybrid SDN,» Electronics (Switzerland), vol. 8, nº 6, 1 6 2019.[38]R. Amin, N. Shah, B. Shah y O. Alfandi, «Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN,» IEEE Access, vol. 4, pp. 9437-9450, 2016.[39]P. Amaral, P. F. Pinto, L. Bernardo y A. Mazandarani, «Application Aware SDN Architecture using Semi-supervised Traffic Classification,» de 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2018, 2018.[40]L. Alouache, N. Nguyen, M. Aliouat y R. Chelouah, «Toward a hybrid SDN architecture for V2V communication in IoV environment,» de 2018 Fifth International Conference on Software Defined Systems (SDS), 2018.[41]V. A. Almeida, D. Doneda y M. Monteiro, «Governance challenges for the internet of things,» IEEE Internet Computing, vol. 19, nº 4, pp. 56-59, 1 7 2015.[42]A. K. Al Mhdawi y H. S. Al-Raweshidy, «IPRDR: Intelligent power reduction decision routing protocol for big traffic flood in hybrid-SDN architecture,» IEEE Access, vol. 6, pp. 10944-10955, 30 1 2018.[43]A. Aguado, V. Lopez, J. Martinez-Mateo, T. Szyrkowiec, A. Autenrieth, M. Peev, D. Lopez y V. Martin, «Hybrid conventional and quantum security for software defined and virtualized networks,» Journal of Optical Communications and Networking, vol. 9, nº 10, pp. 819-825, 1 10 2017.[44]«Transition to NGN and Future Evolution,» de NGN Architectures, Protocols and Services, Chichester, UK, John Wiley & Sons, Ltd, 2014, pp. 301-332.[45]«SDNMS: A software defined network measurement system for NFV networks - IEEE Journals & Magazine,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/8695258.[46]IEEE P802.3/D3.0, March 2015 (Revision of IEEE Std 802.3-2012).[47]«Data Security in the Cloud,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/courses/details/EDP472.[48]«Cloud Computing Definition, Reference Architecture, and General Use Cases,» [En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/courses/details/EDP382.[49]«A survey of ethernet LAN security,»[En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/6407456[50]«A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends,»[En línea]. Available: https://ieeexplore-ieee-org.ezproxy.unal.edu.co/document/7467419[51]T. Zhang, M. Chen, X. Wei, B. Chen and C. Hu, "SDNMS: A software defined network measurement system for NFV networks," in China Communications, vol. 16, no. 4, pp. 59-74, April 2019.[52]A. K. Al Mhdawi and H. S. Al-Raweshidy, "iPRDR: Intelligent Power Reduction Decision Routing Protocol for Big Traffic Flood in Hybrid-SDN Architecture," in IEEE Access, vol. 6, pp. 10944-10955, 2018.InvestigadoresPúblico generalORIGINAL1016004990.2021.pdf1016004990.2021.pdfTesis de Maestría en Ingeniería - Telecomunicacionesapplication/pdf4701493https://repositorio.unal.edu.co/bitstream/unal/80413/4/1016004990.2021.pdf8b46723bdb6bb45c41da7c2c8a8b8aabMD54LICENSElicense.txtlicense.txttext/plain; charset=utf-83964https://repositorio.unal.edu.co/bitstream/unal/80413/3/license.txtcccfe52f796b7c63423298c2d3365fc6MD53THUMBNAIL1016004990.2021.pdf.jpg1016004990.2021.pdf.jpgGenerated Thumbnailimage/jpeg4962https://repositorio.unal.edu.co/bitstream/unal/80413/5/1016004990.2021.pdf.jpgbec7850815d0370713ed3b9e91a3f5a8MD55unal/80413oai:repositorio.unal.edu.co:unal/804132024-07-31 23:10:36.477Repositorio Institucional Universidad Nacional de Colombiarepositorio_nal@unal.edu.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