Routing protocol for a banking network, Computer Network Security

You have been asked to design a Banking Network with two primary types of locations. 

  • Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 subnet for the security system. All subnets can be summarized to one /24 network.
  • Campus location with multiple /24 subnets in each location, locations vary in size from 60 users to 3000 users in large campuses.
  • There are 1120 branch locations and 75 Campus locations.

What routing protocol(s) would you recommend for this network?  Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

Posted Date: 2/25/2013 1:05:10 AM | Location : United States







Related Discussions:- Routing protocol for a banking network, Assignment Help, Ask Question on Routing protocol for a banking network, Get Answer, Expert's Help, Routing protocol for a banking network Discussions

Write discussion on Routing protocol for a banking network
Your posts are moderated
Related Questions
Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment


PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

TRAP AND TRACE SYSTEMS Trap and Trace Systems use techniques to detect an intrusion and trace it back to its source. Trap comprises of honey pot or padded cell and alarm. The dr

Normal 0 false false false EN-US X-NONE X-NONE

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data