Routing protocol for a banking network, Computer Network Security

You have been asked to design a Banking Network with two primary types of locations. 

  • Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 subnet for the security system. All subnets can be summarized to one /24 network.
  • Campus location with multiple /24 subnets in each location, locations vary in size from 60 users to 3000 users in large campuses.
  • There are 1120 branch locations and 75 Campus locations.

What routing protocol(s) would you recommend for this network?  Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

Posted Date: 2/25/2013 1:05:10 AM | Location : United States

Related Discussions:- Routing protocol for a banking network, Assignment Help, Ask Question on Routing protocol for a banking network, Get Answer, Expert's Help, Routing protocol for a banking network Discussions

Write discussion on Routing protocol for a banking network
Your posts are moderated
Related Questions
FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

PROCESSING AN INCOMING ARP MESSAGE When an ARP message reaches, the protocol specifies that the receiver must operate two basic steps. First the receiver finds the sender's add

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Attacker's Motives behind the Cyber Attack Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation

Need Assignemnt help in Information security assignemnt

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p