Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room Temperature Monitoring
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
References
[1]
Wei, L., Zeng, X. and Shen, T. (2015) A Wireless Solution for Train Switchgear Contact Temperature Monitoring and Alarming System Based on Wireless Communication Technology. International Journal of Communications, Network and System Sciences, 8, 79-84. https://doi.org/10.4236/ijcns.2015.84010
[2]
Selwyn, N., Nemorin, S. and Johnson, N. (2016) High-Tech, Hard Work: An Investigation of Teachers’ Work in the Digital Age. Learning, Media and Technology, 42, 390-405. https://doi.org/10.1080/17439884.2016.1252770
[3]
Choi, B., Song, S., Koffler, G. and Medhi, D. (2007). Outage Analysis of a University Campus Network. 2007 16thInternational Conference on Computer Communications and Networks, Honolulu, 13-16 August 2007, 675-680. https://doi.org/10.1109/icccn.2007.4317895
[4]
Srivastava, B., Krithikaivasan, S., Beard, C., Medhi, D., Alanqar, W. and Nagarajan, A. (2002) Benefits of Traffic Engineering Using QoS Routing Schemes and Network Controls. Computer Communication, 27, 271-275.
[5]
Al-Shammari, B.K.J., Al-Aboody, N. and Al-Raweshidy, H.S. (2018) Iot Traffic Management and Integration in the Qos Supported Network. IEEE Internet of Things Journal, 5, 352-370. https://doi.org/10.1109/jiot.2017.2785219
[6]
LiveAction, Inc. (2020) Cisco QoS Handbook. 2nd Edition, LiveAction, Inc. https://www.liveaction.com/wp-content/uploads/2021/04/Cisco-QoS-Handbook-92620.pdf
[7]
Chawla, B., Gupta, O.P. and Sawhney, B.K. (2014) A Review on IPsec and SSL VPN. International Journal of Scientific Engineering and Research, 5, 21-24.
[8]
Frankel, S., Kent, K., Lewkowski, R., Orebaugh, A.D., Ritchey, R.W. and Sharma, S.R. (2005) Guide to IPsec VPNs.
[9]
Qbal, M. (2019) Analysis of Security Virtual Private Network (VPN) Using Openvpn. International Journal of Cyber-Security and Digital Forensics, 8, 58-65. https://doi.org/10.17781/p002557
[10]
Jones, B. and Bejtlich, R. (2019) The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press.
[11]
Hernandez, J.M. (2018) Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: (CCNP SWITCH 300-115). Cisco Press.
[12]
Liu, A.X., Torng, E. and Meiners, C.R. (2011) Compressing Network Access Control Lists. IEEE Transactions on Parallel and Distributed Systems, 22, 1969-1977. https://doi.org/10.1109/tpds.2011.114
[13]
Lutkevich, B. (2023) What is Access Control List (ACL)? https://www.techtarget.com/searchnetworking/definition/access-control-list-ACL
[14]
Knipp, E., Browne, B., Weaver, W., Baumrucker, C.T., Chaffin, L., Caesar, J., et al. (2002) Network Security Management. In: Knipp, E., et al., Eds., Managing Cisco Network Security, Elsevier, 593-648. https://doi.org/10.1016/b978-193183656-2/50018-0
[15]
Homan, P. and Bester, J. (2001) Enabling Quality of Service in Input-Queued Packet Switches. EUROCON’2001. International Conference on Trends in Communications, Technical Program, Proceedings (Cat. No.01EX439), Bratislava, 04-07 July 2001, 496-499. https://doi.org/10.1109/eurcon.2001.938170
[16]
Rastogi, R., Breitbart, Y., Garofalakis, M. and Kumar, A. (2002) Optimal Configuration of OSPF Aggregates. Proceedings of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, 23-27 June 2002, 874-882. https://doi.org/10.1109/infcom.2002.1019334
[17]
Mellouk, A., Hoceini, S. and Zeadally, S. (2011) A Bio-Inspired Quality of Service (QoS) Routing Algorithm. IEEE Communications Letters, 15, 1016-1018. https://doi.org/10.1109/lcomm.2011.071211.110741
[18]
V̄inod Chandra, S.S. and Anand Hareendran, S. (2024) Modified Smell Detection Algorithm for Optimal Paths Engineering in Hybrid SDN. Journal of Parallel and Distributed Computing, 187, Article 104834. https://doi.org/10.1016/j.jpdc.2023.104834
[19]
John, R. and Ying, S. (2015) A Comparison of OSPFv3 and EIGRPv6 in a Small IPv6 Enterprise Network. International Journal of Advanced Computer Science and Applications, 6, 162-167. https://doi.org/10.14569/ijacsa.2015.060123
[20]
Jourjon, G., Lochin, E. and Sénac, P. (2008) Design, Implementation and Evaluation of a QoS-Aware Transport Protocol. Computer Communications, 31, 1713-1722. https://doi.org/10.1016/j.comcom.2007.11.015
[21]
Ferretti, S., Ghini, V., Turrini, E., Pellegrini, M. and Panzieri, F. (2010) “QoS” in 2013 IEEE Sixth International Conference on Cloud Computing, 321-328. http://doi.ieeecomputersociety.org/10.1109/CLOUD.2010.17
[22]
Dangwal, K. and Kumar, V. (2014) Comparative Study of Eigrp and Rip Using Cisco Packet Tracer. International Journal of Engineering Sciences and Emerging Technologies, 6, 475-480.
[23]
Sizemore, B., Snook, T., and Neumeister, W. (2010) Cisco Data Center Energy Efficiency. Bachelor’s Thesis, Senior Project, California Polytechnic State University, 1-23. https://digitalcommons.calpoly.edu/do/search/?q=B.%20Sizemore%2C%20T.%20Snook%2C%20and%20W.%20Neumeister&start=0&context=374206&facet=
[24]
Pavithra, D. and Balakrishnan, R. (2015) IoT Based Monitoring and Control System for Home Automation. 2015 Global Conference on Communication Technologies, Thuckalay, 23-24 April 2015, 169-173. https://doi.org/10.1109/gcct.2015.7342646
[25]
Louis, L. (2016) Working Principle of Arduino and Using It as a Tool for Study and Research. International Journal of Control, Automation, Communication and Systems, 1, 21-29. https://doi.org/10.5121/ijcacs.2016.1203
[26]
Wairisal, M. and Surantha, N. (2018) Design and Evaluation of Efficient Bandwidth Management for a Corporate Network. 2018 International Conference on Information Management and Technology, Jakarta, 3-5 September 2018, 98-102. https://doi.org/10.1109/icimtech.2018.8528162
[27]
Sim, K.M. and Sun, W.H. (2003) Ant Colony Optimization for Routing and Load-Balancing: Survey and New Directions. IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, 33, 560-572. https://doi.org/10.1109/tsmca.2003.817391
[28]
Sedayao, J. (2001) Cisco IOS Access Lists. O’Reilly Media.