Network design and analysis

Assignment Help Computer Network Security
Reference no: EM131099729

Data Communications: Network Design and Analysis

Individual Assignment 4: IP Routing and Security

Question 1 (10 Marks)

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations.

Branch Location Type:
• These branches have 3 subnets:
1. One /25 subnet
2. One /26 subnet for ABMs (Automated Banking Machine) functions, and,
3. One /26 subnet for the security system.
• All the above subnets can be summarized into one /24 network.

Campus Location Type:
• Has multiple /24 subnets in each location, locations vary in size from 60 users to 3,000 users in large campuses.

What routing protocol(s) would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 2 - (10 Marks)

You are designing a network for a retail customer; they plan to have 7 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to another 4 locations. All locations will be located in Ontario.

Each store has four main application requirements:

1. Internet access via the central warehouse,
2. Inventory control,
3. Employee scheduling and time tracking and
4. Point of sale.

Each retail store will have 12-15 employees at most.

A. What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.
B. What bandwidth would you recommend at each location? Why? Explain your reason.
C. What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 3 (10 Marks)

You are designing a Demilitarized Zone (DMZ) for a large corporation.

Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities:

• Secure WEB server hosting environment,
• Provide Internet browsing capability for internal users,
• Internal users access to the WEB servers for maintenance,
• VPN access to internal system from the Internet,
• Identify the use and location of Firewalls where necessary, and
• Identify the use and location of IPS/IDS where necessary.

A. Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each.

B. Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Reference no: EM131099729

Questions Cloud

Lacking in the diversity competency : Assume a leader is lacking in the diversity competency. How does this deficiency link to the severe workplace stress experienced by some or all employees?
Find out additional information about of laws : The Law of Large Numbers is a statistical theory that you read about in this chapter. In your own words, what does this law say about the probability of an event? Perhaps you have also heard of something called the Law of Averages (also called the..
Active and passive euthanasia : Question 1.1.According to Rachels' article "Active and Passive Euthanasia", passive euthanasia is:
Difference in broader term mosaic covenant and decalogue : Explain the difference between the broader term "Mosaic Covenant" and the narrower "Decalogue" with regard to how they are applicable to Christian morality today?
Network design and analysis : You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..
Demonstrate skills required to interact with clients : Performance objective - To demonstrate the skills and ability required to interact with clients on a business level
Development of the hippocampal region in adolescents : Researchers want to measure the effect of alcohol on the development of the hippocampal region in adolescents. The researchers randomly selected 11 adolescents with alcohol use disorders. They wanted to determine whether the hippocampal volumes in..
Determining the favorable variance : At the end of the month, the total labor costs have a favorable variance. The labor rate is the reason for the variance. Is Shelly unethical in her actions? What could happen because of her actions?
Compute the test statistic : To test H: u = 20 versus H:u

Reviews

Write a Review

Computer Network Security Questions & Answers

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment requires

  What are the various threats to information security

What are the various threats to information security

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  Verify the correctness of your decryption

In a public-key system using RSA, you intercept the ciphertext C = 13 sent to a user whose public key is e = 23, n = 143. What is the plaintext M?

  Find information about threats and malware active today

From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today

  Describe key issues challenges risks from this case study

Describe the key issues/challenges/risks from this case study. Based on the information provided in the case study, describe and document the recommended security strategy to mitigate the issues/challenges identified

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Discuss the type of encryption

Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Various aspects of outsourcing the it function

Write a 3- to 5-page paper that discusses the various aspects of outsourcing the IT function from an organization. Address the following questions in your paper:

  Sensor network using xmpp based communication

Write a research paper on Security Mechanism for Sensor Network Using XMPP Based Communication

  Using network policy servers to increase network security

Using Network Policy Servers to Increase Network Security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd