Research Article
BibTex RIS Cite

Determination of optimum network topology with the consideration of firewall security policies

Year 2025, Volume: 6 Issue: 1, 69 - 81, 30.06.2025
https://doi.org/10.53501/rteufemud.1505777

Abstract

The rapid development of network technologies and the growing number of interconnected devices have introduced significant challenges in optimizing the efficiency of computer networks. Misconfigurations in network devices such as manageable switches, routers, modems, and firewalls may lead to performance degradation and security vulnerabilities. Moreover, complex and poorly designed network architectures may exacerbate these issues by creating inefficiencies and increasing the risk of information security breaches. To address these challenges, this study focuses on designing and evaluating network topologies that segment physical networks into logical structures. By assessing various network designs, VLAN structures, and firewall security policies, the study aims to identify configurations that achieve an optimal balance between speed, security, and cost. The research evaluates key performance metrics, including round-trip time delays, jitter, download, and upload speeds, under different firewall policies. The findings provide actionable insights into how network configurations impact local network performance, highlighting best practices for creating high-performing, secure, and cost-effective network topologies. The findings also underscore the inherent trade-off between security and performance. While firewall security policies and VLAN configurations enhance network security, they also introduce processing overhead, particularly when additional switches and routing are involved, leading to increased local network delays.

References

  • Al-ofeishat, H., Alshorman, R. (2024), Build a secure network using segmentation and micro-segmentation techniques. International Journal of Computing and Digital Systems, 16(1), 1499-508, http://dx.doi.org/10.12785/ijcds/1601111.
  • Arpacı, S., Şentürk, A. (2024). Performance analysis of firewall and virtual private network (VPN) usage in video conferencing applications. Düzce University Journal of Science & Technology, 12, 1879-1894 https://doi.org/10.29130/dubited.1462133.
  • Deepak, I., Varun, D. (2019). A survey on: Network security and management, threats and firewalls. Journal of Emerging Technologies and Innovative Research, 6(3), 199-203.
  • Eldem, T. (2020). The governance of Turkey’s cyberspace: Between cyber security and information security. International Journal of Public Administration, 43(5), 452-465. https://doi.org/10.1080/01900692.2019.1680689
  • Gezer, A. (2019). Large-scale round-trip delay time analysis of IPv4 hosts around the globe. Turkish Journal of Electrical Engineering and Computer Sciences, 27(3), 1998-2009. https://doi.org/10.3906/elk-1803-137 -12
  • Gezer, A. (2022). The delay measurement and analysis of unreachable hosts of internet. The International Arab Journal of Information Technology, 19(1), 63-71. 1 https://doi.org/10.34028/iajit/19/1/8 -13
  • Hautamaki, J., Hamalainen, T. (2021). A model of Cyber Threat Information Sharing with the Novel Network Topology, 12th International Conference on Advances in Information Technology, 07/2021, 1-10. https://doi.org/10.1145/3468784.34688 -2
  • Hossain, M.A., Harun M., Rana. A., Anower, S. (2023), Secure Inter-VLAN routing in multi branches Office network. International Journal of Communication and Information Technology, 4(2), 01-11 https://doi.org/10.33545/2707661X.2023.v4.i2a.65.
  • Ikuomola, A.J., Owoputi, K.S. and Johnson-Rokosu, S.O. (2023), Design and Implementation of a Network Security Model within a Local Area Network (1st Edition). In: Intelligent Data Analytics, IoT, and Blockchain, eBook ISBN: 9781003371380 Auerbach Publications, 14p.
  • Khelf, R., Ghoualmi-Zine, N. (2018). Ipsec/firewall security policy analysis: A survey. In 2018 International Conference on Signal, Image, Vision and their Applications (SIVA). 26-27/11/2018, Guelma, Algeria ,1-7. https://doi.org/10.1109/SIVA.2018.8660973 -5
  • Kim, D., Solomon, M. G. (2013). Fundamentals of information systems security. Jones and Bartlett Publishers. ISBN:978-0-7637-9025-7, USA.
  • Manukonda, K.M.R (2023). Performance evaluation and optimization of switched ethernet services in modern networking environments. Journal of Technological Innovations, 4(2).
  • Rajaravivarma, V. (1997). Virtual local area network technology and applications. Proceedings The Twenty-Ninth Southeastern Symposium on System Theory. 9-11/3/1997, Cookeville, TN, USA, 49-52. https://doi.org/10.1109/SSST.1997.581577
  • Taşkın, C. (2009). Ağ Teknolojileri ve Telekomünikasyon. Pusula, ISBN:978-9944-711-25-8, Beşiktaş İstanbul. -8
  • Tekerek, M. (2008). Bilgi güvenliği yönetimi. KSÜ Doğa Bilimleri Dergisi, 11(1), 132-137.
  • Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
  • Voronkov, A., Martucci, L. A., Lindskog, S. (2020). Measuring the usability of firewall rule sets. IEEE Access, 8, 27106-27121. https://doi.org/10.1109/ACCESS.2020.2971093
  • Wang, S. S. (2019). Integrated framework for information security investment and cyber insurance. Pacific-Basin Finance Journal, 57, 1-12 https://doi.org/10.1016/j.pacfin.2019.101173 -3.

Güvenlik Politikaları ve VLAN Yapılandırmaları Perspektifinde Bilgisayar Ağ Optimizasyonu

Year 2025, Volume: 6 Issue: 1, 69 - 81, 30.06.2025
https://doi.org/10.53501/rteufemud.1505777

Abstract

Ağ teknolojilerinin hızla gelişmesi ve birbirine bağlı cihazların sayısının artması, bilgisayar ağlarının verimliliğini optimize etme konusunda önemli zorlukları da beraberinde getirmiştir. Yönetilebilir anahtarlar, yönlendiriciler, modemler ve güvenlik duvarları gibi ağ cihazlarındaki yanlış yapılandırmalar, performans düşüşlerine ve güvenlik açıklarına yol açabilir. Ayrıca, karmaşık ve kötü tasarlanmış ağ mimarileri bu sorunları daha da kötüleştirerek verimsizliklere ve bilgi güvenliği ihlallerine neden olabilir. Bu zorlukların üstesinden gelmek amacıyla, bu çalışma fiziksel ağları mantıksal yapılar halinde segmentlere ayırarak ağ topolojilerinin tasarımı ve değerlendirilmesine odaklanmaktadır. Çalışmada, çeşitli ağ tasarımları, VLAN yapıları ve güvenlik duvarı politikaları incelenerek hız, güvenlik ve maliyet arasında optimal bir denge sağlayan yapılandırmalar belirlenmeye çalışılmıştır. Araştırma, farklı güvenlik duvarı politikaları altında gidiş-dönüş gecikme süresi, gecikme değişkenliği (jitter), indirme ve yükleme hızları gibi temel performans metriklerini değerlendirmiştir. Bulgular, yerel ağ performansını etkileyen ağ yapılandırmalarının etkilerine dair uygulanabilir bilgiler sunmakta ve yüksek performanslı, güvenli ve maliyet açısından etkili ağ topolojileri oluşturmak için en iyi uygulamaları vurgulamaktadır. Ayrıca, bulgular güvenlik ve performans arasındaki doğal dengeyi de ortaya koymaktadır. Güvenlik duvarı politikaları ve VLAN yapılandırmaları ağ güvenliğini artırırken, ek anahtarlar ve yönlendirme eklendiğinde işleme yükü artarak yerel ağ gecikmelerinin yükselmesine neden olmaktadır.

References

  • Al-ofeishat, H., Alshorman, R. (2024), Build a secure network using segmentation and micro-segmentation techniques. International Journal of Computing and Digital Systems, 16(1), 1499-508, http://dx.doi.org/10.12785/ijcds/1601111.
  • Arpacı, S., Şentürk, A. (2024). Performance analysis of firewall and virtual private network (VPN) usage in video conferencing applications. Düzce University Journal of Science & Technology, 12, 1879-1894 https://doi.org/10.29130/dubited.1462133.
  • Deepak, I., Varun, D. (2019). A survey on: Network security and management, threats and firewalls. Journal of Emerging Technologies and Innovative Research, 6(3), 199-203.
  • Eldem, T. (2020). The governance of Turkey’s cyberspace: Between cyber security and information security. International Journal of Public Administration, 43(5), 452-465. https://doi.org/10.1080/01900692.2019.1680689
  • Gezer, A. (2019). Large-scale round-trip delay time analysis of IPv4 hosts around the globe. Turkish Journal of Electrical Engineering and Computer Sciences, 27(3), 1998-2009. https://doi.org/10.3906/elk-1803-137 -12
  • Gezer, A. (2022). The delay measurement and analysis of unreachable hosts of internet. The International Arab Journal of Information Technology, 19(1), 63-71. 1 https://doi.org/10.34028/iajit/19/1/8 -13
  • Hautamaki, J., Hamalainen, T. (2021). A model of Cyber Threat Information Sharing with the Novel Network Topology, 12th International Conference on Advances in Information Technology, 07/2021, 1-10. https://doi.org/10.1145/3468784.34688 -2
  • Hossain, M.A., Harun M., Rana. A., Anower, S. (2023), Secure Inter-VLAN routing in multi branches Office network. International Journal of Communication and Information Technology, 4(2), 01-11 https://doi.org/10.33545/2707661X.2023.v4.i2a.65.
  • Ikuomola, A.J., Owoputi, K.S. and Johnson-Rokosu, S.O. (2023), Design and Implementation of a Network Security Model within a Local Area Network (1st Edition). In: Intelligent Data Analytics, IoT, and Blockchain, eBook ISBN: 9781003371380 Auerbach Publications, 14p.
  • Khelf, R., Ghoualmi-Zine, N. (2018). Ipsec/firewall security policy analysis: A survey. In 2018 International Conference on Signal, Image, Vision and their Applications (SIVA). 26-27/11/2018, Guelma, Algeria ,1-7. https://doi.org/10.1109/SIVA.2018.8660973 -5
  • Kim, D., Solomon, M. G. (2013). Fundamentals of information systems security. Jones and Bartlett Publishers. ISBN:978-0-7637-9025-7, USA.
  • Manukonda, K.M.R (2023). Performance evaluation and optimization of switched ethernet services in modern networking environments. Journal of Technological Innovations, 4(2).
  • Rajaravivarma, V. (1997). Virtual local area network technology and applications. Proceedings The Twenty-Ninth Southeastern Symposium on System Theory. 9-11/3/1997, Cookeville, TN, USA, 49-52. https://doi.org/10.1109/SSST.1997.581577
  • Taşkın, C. (2009). Ağ Teknolojileri ve Telekomünikasyon. Pusula, ISBN:978-9944-711-25-8, Beşiktaş İstanbul. -8
  • Tekerek, M. (2008). Bilgi güvenliği yönetimi. KSÜ Doğa Bilimleri Dergisi, 11(1), 132-137.
  • Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
  • Voronkov, A., Martucci, L. A., Lindskog, S. (2020). Measuring the usability of firewall rule sets. IEEE Access, 8, 27106-27121. https://doi.org/10.1109/ACCESS.2020.2971093
  • Wang, S. S. (2019). Integrated framework for information security investment and cyber insurance. Pacific-Basin Finance Journal, 57, 1-12 https://doi.org/10.1016/j.pacfin.2019.101173 -3.
There are 18 citations in total.

Details

Primary Language English
Subjects Network Engineering
Journal Section Research Articles
Authors

Umut Babayiğit 0000-0002-6053-6961

Ali Gezer 0000-0001-8265-1736

Publication Date June 30, 2025
Submission Date June 27, 2024
Acceptance Date January 9, 2025
Published in Issue Year 2025 Volume: 6 Issue: 1

Cite

APA Babayiğit, U., & Gezer, A. (2025). Determination of optimum network topology with the consideration of firewall security policies. Recep Tayyip Erdogan University Journal of Science and Engineering, 6(1), 69-81. https://doi.org/10.53501/rteufemud.1505777

Indexing

22936   22937   22938  22939     22941  23010   23011  23019  23025