Routing protocol for a banking network, Computer Network Security

Assignment Help:

You have been asked to design a Banking Network with two primary types of locations. 

  • Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 subnet for the security system. All subnets can be summarized to one /24 network.
  • Campus location with multiple /24 subnets in each location, locations vary in size from 60 users to 3000 users in large campuses.
  • There are 1120 branch locations and 75 Campus locations.

What routing protocol(s) would you recommend for this network?  Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.


Related Discussions:- Routing protocol for a banking network

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

Address resolution with closed-form computation, ADDRESS RESOLUTION WITH CL...

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.

Which authorization model could be ideal, Question: (a) Your office ad...

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Protocols for secure communications-cryptography, Protocols for Secure Comm...

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

Explain the limitations of a firewall, Question: (a) Mention three lim...

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd