Switch Threats Assignment Help

UK Assignment Help

Switch Threats Assignment Help



For generating a high-speed connectivity across all the several end stations situated in the data link layer, the layer 2 form of switches are usually installed to allow such connections. Whereas the layer 3 switches are considered to a very new strategy or phenomenon. In this study, investigation will be done on the various kinds of security threats related to the layer 2 and layer 3 network switching and its associated mitigation techniques. The various types of layer 2 and layer 3 attacks will be discussed here and its prevention strategies will also be implemented.
The scope of the above project is to discuss the switches in layers 2 and 3 and then investigate the associated security threats linked with the given layers. The prevention strategies of those attacks or threats will also be implemented in order to overcome the risks of security. 
 In the recent days, it has been seen   that organisations are facing immense of problems   while transfer of data from one end server to another.   This is so because the sender of the data is not as   much efficient as required. This is creating a great   mishap hence, it is essential to nullify such   circumstances so that data transfer can occur   properly. This is the main issue that has led to the   growth of huge concern among the top management   of organisations. The following research sheds light   upon the several security threats that are imposed   upon layer 2 and layer 3 switch block mitigation   strategy.
  The aim of the study is to investigate the security   risks that are imposed upon the layer 2 and layer 3 switch blocks mitigation strategy.
To analyse the importance of security for the confidential data so that it can be safeguarded from wrong hands
To understand the ways by which threats to security can be removed from layer 2 and layer 3 switch blocks mitigation strategy
To identify the effectiveness of layer 2 and layer 3 switches for entities so that high speed connectivity can be assured between end stations
To recommend the ways of uplifting the hardware requirements of any virtual LAN so that switches can be efficiently used
Research questions
1. What is the importance of securing confidential data for any enterprise?
2. How can threats to security be removed from layer 2 and layer 3 switch block mitigation strategy?
3. How is the effectiveness of layer 2 and layer 3 switches determined in terms of high speed connectivity?
4. What are the ways by which hardware requirements of any virtual LAN be uplifted for enhancing the efficiency of the switches?
Literature review
Concept of Layer 2 and Layer 3 switches
Both this two kind of layer are connected with the network communication and with the help of this kind of network layer it is possible to communicate with the OSI model.
Basically the  layer 2 is  totally responsible  for physical addressing  and  preparing  any  kind  of  information and at the same  with the  help of this layer  it  is possible to  perform the error  correction.
According to the concept of layer 3 it is possible to logical addressing and IP routing. Apart from that some other routing is ARP, IGRP, RIP etc. 
From the concept of layer 2 it can be constructed that this network protocols forwards all the traffic and at the same time DHCP and ARP broadcasts.  According to this concepts or main advantage of this concept is that any packet data that are transmitted by one device is also forwarded on another device. According to the   concept it can  also be  constructed that  layer   2  required   lower   costs and at the same  time it  does  not  require  routing  gear (Nunes et al. 2014).
On  the other hand it can also be stated  that  layer 2 have  some  major  drawbacks and that  are  lack  of route hardware and  flat subnet  configuration  across the  multiple  sites.  Therefore  in case  of  layer  2 network protocol  when size of  network get two  large  then  it will reduces  the  efficiency of  the network. It is happen due to effect of broadcast traffic.
 From the concept of layer 3 network protocol it can be constructed that it basically restricts al the traffic such as DHCP and ARP.  With  the help of  this  kind of approaches it is possible to reduce  all  the  network  traffic by dividing the  particular network in sub- network (Jain, & Paul, 2013) .
On the other hand  it can also  be  suggested  that the most  vulnerability factor that are  present  in the layer 3 network protocols is  the IP address hacking and if  the IP  address  of  a particular  network get hacked then  it will creates major problems.
Layer 2 and layer 3 attacks and mitigation techniques
In case of OSI layer there is more possibility of lower level attack and if this kinds of attacks took place then upper or higher layer also get affected. According to the network layer protocols layer 2 is very weak link therefore level of security is very lower in comparison to other layer. If the security is not provided properly then data communication and data transfer get highly affected. In order to mitigate   this kind of problem the most important thing is reduced the network traffic that can create major problem and decreases the network efficiency. By  reducing  network  traffic  it  is  possible  to avoid  any  kind  network attacks. 
In case  of  layer 3  network protocol  basically  high  performance  network  routing  is  used  with a  specific IP address. Therefore the most  vulnerability factor that are  present  in the layer 3 network protocols is  the IP address hacking and if  the IP  address  of  a particular  network get hacked then  it will creates major problems(Yan et al. 2016) . 
In order to avoid this kind of security issue or to mitigate the technique the most important thing that needs to maintain is the proper protection of IP address. If  the IP address of  any  particular network get properly secured  then it is  very difficult  to  create any kind of  security issue  and with  the  help[-of this approaches  it is possible to  protect  the layer 3  network architecture. 
Countermeasures for the attacks
In order to counter measure the attacks especially the ARP attacks it requires some proper configuration. In order to counter measure the attacks the following steps need to be maintained DHCP snooping must need to configure because with the help of this binding table need to be build. After that most important that is required is the configuration is the DAI. This configuration must need to be performed by the VLAN (Nadeem & Howarth, 2013). After that in order to maintain all the varieties in between the entire platform DHCP need to be configured properly. In order countermeasure the attacks static and dynamic entries in a specific DHCP is mostly required.   
Research Gap
The entire study is focused completely upon OSI network model, which can be considered as a demerit for the articles. This is so because whenever question of other network model will arise, these articles will become inadequate supplier of information. Along with that, it is completely focused on layer 2 and layer 3 switches thereby, neglecting other layers of network.
The research will be conducted by using positivism philosophy because the researcher will be able to conduct the research by inclining realistic facts towards this research. Such steps would assist in executing the research in a systematic manner. This philosophy is accounted by numerous scientific views that would be a great help while conduction of research. 
Deductive approach will be used by the researcher because the researcher is not going to come up with any new theory rather existing theories will be reviewed. Such approach is where existing theories are tested is mentioned as deductive approach. Since the researcher will analyse the present theories or concepts related to IT, deductive approach will be undertaken by the researcher.
Exploratory design will be used by researcher because the researcher will identify such issues that have not been clearly focused on earlier. This mentioned design would assist in collecting secondary data in an appropriate manner. These criteria will aid the researcher to undertake such methodologies for the current research.
Secondary data collection method will be undertaken by the researcher as relevant data can be easily gathered from several books, journals and websites. Superior data regarding the research topic related to the security threats of layer 2 and layer 3 switches will be gathered from the online articles. This would help in finding out relevant data regarding the topic. Since thematic analysis will be undertaken by the researcher, proper emphasis will be laid upon examining the collected data, prioritising those and record proper patterns within the collected information. Such aspects would help in gaining a suitable insight regarding the data related to the topic.  Though this analysis is less acknowledged among researcher yet for this particular research, such analysis will provide the notable assistance.
The researcher will consider some ethics while collection of information. Researcher will not undertake any illegal means for gathering the data. As per the Data Protection Act of 1998, information collected will be safeguarded properly and will be not be lost.
The study showed the ways by which security threats can be removed from the different layers of switches. Such activity would help in protecting the data from being lost or being imparted into improper hands. It is essential that enterprises need to be much concerned regarding their security policies. This would help in safeguarding the privacy of the data. Moreover, concepts of both layer 2 and layer 3 models are clearly stated in the coursework along with its importance.  
accounting homework help, accounting homework, financial accounting assignment help, financial accounting assignment, management accounting assignment, cost accounting assignment help, accounting homework help online, accountancy assignment, managerial accounting assignment help, accounting assignment help online, management accounting assignment help, managerial accounting homework help, cost accounting assignment, business accounting assignment help, cost accounting homework help, financial accounting homework help, accounting homework solutions, college accounting homework help, accounting assignment solution, corporate accounting assignment help,


Submit Works

Drop File To Upload Or
Assignment Help Australia

Our Top Experts

Karen Betty

Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...

55 - Completed Orders

Daphne Lip

Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...

52 - Completed Orders

Mr Roberto Tuzii

Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...

102 - Completed Orders

Harsh Gupta

To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...

109 - Completed Orders


JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...

202 - Completed Orders


Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...

20 - Completed Orders

Tan Kumar Ali

Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...

100 - Completed Orders

Wesenu Irko

Personal Profile Dedicated and highly experienced private chauffeur. High energy, hardworking, punctua...

200 - Completed Orders