Network design and analysis

Assignment Help Computer Network Security
Reference no: EM131099729

Data Communications: Network Design and Analysis

Individual Assignment 4: IP Routing and Security

Question 1 (10 Marks)

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations.

Branch Location Type:
• These branches have 3 subnets:
1. One /25 subnet
2. One /26 subnet for ABMs (Automated Banking Machine) functions, and,
3. One /26 subnet for the security system.
• All the above subnets can be summarized into one /24 network.

Campus Location Type:
• Has multiple /24 subnets in each location, locations vary in size from 60 users to 3,000 users in large campuses.

What routing protocol(s) would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 2 - (10 Marks)

You are designing a network for a retail customer; they plan to have 7 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to another 4 locations. All locations will be located in Ontario.

Each store has four main application requirements:

1. Internet access via the central warehouse,
2. Inventory control,
3. Employee scheduling and time tracking and
4. Point of sale.

Each retail store will have 12-15 employees at most.

A. What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.
B. What bandwidth would you recommend at each location? Why? Explain your reason.
C. What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 3 (10 Marks)

You are designing a Demilitarized Zone (DMZ) for a large corporation.

Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities:

• Secure WEB server hosting environment,
• Provide Internet browsing capability for internal users,
• Internal users access to the WEB servers for maintenance,
• VPN access to internal system from the Internet,
• Identify the use and location of Firewalls where necessary, and
• Identify the use and location of IPS/IDS where necessary.

A. Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each.

B. Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Reference no: EM131099729

Questions Cloud

Lacking in the diversity competency : Assume a leader is lacking in the diversity competency. How does this deficiency link to the severe workplace stress experienced by some or all employees?
Find out additional information about of laws : The Law of Large Numbers is a statistical theory that you read about in this chapter. In your own words, what does this law say about the probability of an event? Perhaps you have also heard of something called the Law of Averages (also called the..
Active and passive euthanasia : Question 1.1.According to Rachels' article "Active and Passive Euthanasia", passive euthanasia is:
Difference in broader term mosaic covenant and decalogue : Explain the difference between the broader term "Mosaic Covenant" and the narrower "Decalogue" with regard to how they are applicable to Christian morality today?
Network design and analysis : You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..
Demonstrate skills required to interact with clients : Performance objective - To demonstrate the skills and ability required to interact with clients on a business level
Development of the hippocampal region in adolescents : Researchers want to measure the effect of alcohol on the development of the hippocampal region in adolescents. The researchers randomly selected 11 adolescents with alcohol use disorders. They wanted to determine whether the hippocampal volumes in..
Determining the favorable variance : At the end of the month, the total labor costs have a favorable variance. The labor rate is the reason for the variance. Is Shelly unethical in her actions? What could happen because of her actions?
Compute the test statistic : To test H: u = 20 versus H:u

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implement skills and knowledge gained through course

To implement the skills and knowledge gained through the course and to achieve greater awareness of the latest security tools and techniques for computer systems security.

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  Selecting an expert for an expert witness opinion

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.  Research and provide details on the hourly estimates for using these types of professional witnesses.   Then, discuss the typical backgroun..

  Overview of information security fundamentals

This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software ..

  What issues can arise during admission of digital evidence

The DQ response should be between 500 words, and grammar and spelling are important. Please make sure to proofread carefully!

  Characteristics of information security

Select one of the three characteristics of information security (CIA) and explain its importance as related to the development of policy, education, OR technology

  Develop the issp for the organisation

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

  Describe identification and authentication and authorization

Assume you are a manager in a large international organization. You have been asked to assess the company's information systems and security controls. Describe identification, authentication, and authorization.

  Fraud and risk factors and enterprise systems

Review the Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order to counter the risk factor i..

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  What integration issues do merging companies face

What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences?

  Security mechanism for sensor network using xmpp

Security Mechanism For Sensor Network Using XMPP Based Communication - The XMPP communication security mechanism can deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd