Routing protocol for a banking network, Computer Network Security

You have been asked to design a Banking Network with two primary types of locations. 

  • Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 subnet for the security system. All subnets can be summarized to one /24 network.
  • Campus location with multiple /24 subnets in each location, locations vary in size from 60 users to 3000 users in large campuses.
  • There are 1120 branch locations and 75 Campus locations.

What routing protocol(s) would you recommend for this network?  Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

Posted Date: 2/25/2013 1:05:10 AM | Location : United States







Related Discussions:- Routing protocol for a banking network, Assignment Help, Ask Question on Routing protocol for a banking network, Get Answer, Expert's Help, Routing protocol for a banking network Discussions

Write discussion on Routing protocol for a banking network
Your posts are moderated
Related Questions
Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

implementing password policy in organisation

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted