Routing protocol for a banking network, Computer Network Security

You have been asked to design a Banking Network with two primary types of locations. 

  • Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 subnet for the security system. All subnets can be summarized to one /24 network.
  • Campus location with multiple /24 subnets in each location, locations vary in size from 60 users to 3000 users in large campuses.
  • There are 1120 branch locations and 75 Campus locations.

What routing protocol(s) would you recommend for this network?  Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

Posted Date: 2/25/2013 1:05:10 AM | Location : United States







Related Discussions:- Routing protocol for a banking network, Assignment Help, Ask Question on Routing protocol for a banking network, Get Answer, Expert's Help, Routing protocol for a banking network Discussions

Write discussion on Routing protocol for a banking network
Your posts are moderated
Related Questions
Question: a) How many bits per second can be sent on a noiseless 4 MHz channel if four-level digital signals are used? b) If a binary signal is sent over a 3 KHz channel who

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

With explain the encryption model the help of diagram. Symmetric cipher model uses the secret-key or a single-key for encryption/decryption purposes. It employs a symmetric encr

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details