IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Recep Tayyip Erdoğan Üniversitesi Fen ve Mühendislik Bilimleri Dergisi
  • Cilt: 6 Sayı: 1
  • Determination of optimum network topology with the consideration of firewall security policies

Determination of optimum network topology with the consideration of firewall security policies

Authors : Umut Babayiğit, Ali Gezer
Pages : 69-81
Doi:10.53501/rteufemud.1505777
View : 42 | Download : 21
Publication Date : 2025-06-30
Article Type : Research Paper
Abstract :The rapid development of network technologies and the growing number of interconnected devices have introduced significant challenges in optimizing the efficiency of computer networks. Misconfigurations in network devices such as manageable switches, routers, modems, and firewalls may lead to performance degradation and security vulnerabilities. Moreover, complex and poorly designed network architectures may exacerbate these issues by creating inefficiencies and increasing the risk of information security breaches. To address these challenges, this study focuses on designing and evaluating network topologies that segment physical networks into logical structures. By assessing various network designs, VLAN structures, and firewall security policies, the study aims to identify configurations that achieve an optimal balance between speed, security, and cost. The research evaluates key performance metrics, including round-trip time delays, jitter, download, and upload speeds, under different firewall policies. The findings provide actionable insights into how network configurations impact local network performance, highlighting best practices for creating high-performing, secure, and cost-effective network topologies. The findings also underscore the inherent trade-off between security and performance. While firewall security policies and VLAN configurations enhance network security, they also introduce processing overhead, particularly when additional switches and routing are involved, leading to increased local network delays.
Keywords : Ağ teknolojileri, bilgi güvenliği, ağ topoloji, VLAN, gecikme, jitter

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026