Network design and analysis

Assignment Help Computer Network Security
Reference no: EM131099729

Data Communications: Network Design and Analysis

Individual Assignment 4: IP Routing and Security

Question 1 (10 Marks)

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations.

Branch Location Type:
• These branches have 3 subnets:
1. One /25 subnet
2. One /26 subnet for ABMs (Automated Banking Machine) functions, and,
3. One /26 subnet for the security system.
• All the above subnets can be summarized into one /24 network.

Campus Location Type:
• Has multiple /24 subnets in each location, locations vary in size from 60 users to 3,000 users in large campuses.

What routing protocol(s) would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 2 - (10 Marks)

You are designing a network for a retail customer; they plan to have 7 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to another 4 locations. All locations will be located in Ontario.

Each store has four main application requirements:

1. Internet access via the central warehouse,
2. Inventory control,
3. Employee scheduling and time tracking and
4. Point of sale.

Each retail store will have 12-15 employees at most.

A. What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.
B. What bandwidth would you recommend at each location? Why? Explain your reason.
C. What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 3 (10 Marks)

You are designing a Demilitarized Zone (DMZ) for a large corporation.

Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities:

• Secure WEB server hosting environment,
• Provide Internet browsing capability for internal users,
• Internal users access to the WEB servers for maintenance,
• VPN access to internal system from the Internet,
• Identify the use and location of Firewalls where necessary, and
• Identify the use and location of IPS/IDS where necessary.

A. Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each.

B. Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Reference no: EM131099729

Questions Cloud

Lacking in the diversity competency : Assume a leader is lacking in the diversity competency. How does this deficiency link to the severe workplace stress experienced by some or all employees?
Find out additional information about of laws : The Law of Large Numbers is a statistical theory that you read about in this chapter. In your own words, what does this law say about the probability of an event? Perhaps you have also heard of something called the Law of Averages (also called the..
Active and passive euthanasia : Question 1.1.According to Rachels' article "Active and Passive Euthanasia", passive euthanasia is:
Difference in broader term mosaic covenant and decalogue : Explain the difference between the broader term "Mosaic Covenant" and the narrower "Decalogue" with regard to how they are applicable to Christian morality today?
Network design and analysis : You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..
Demonstrate skills required to interact with clients : Performance objective - To demonstrate the skills and ability required to interact with clients on a business level
Development of the hippocampal region in adolescents : Researchers want to measure the effect of alcohol on the development of the hippocampal region in adolescents. The researchers randomly selected 11 adolescents with alcohol use disorders. They wanted to determine whether the hippocampal volumes in..
Determining the favorable variance : At the end of the month, the total labor costs have a favorable variance. The labor rate is the reason for the variance. Is Shelly unethical in her actions? What could happen because of her actions?
Compute the test statistic : To test H: u = 20 versus H:u

Reviews

Write a Review

Computer Network Security Questions & Answers

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? What sort of people would go after this information? Why would they want it

  Explain digital computing/networking in major organizations

Identify and discuss at least three major evolutionary steps in digital computing/networking experienced in major organizations. If possible, provide such insight regarding your current or former organization.

  Explain how you would go about decrypting a message that

explain how you would go about decrypting a message that was encrypted in blocks of length two using an affine

  Identity one specific control in physical security

Identity one specific control in each category and describe the control in details, including the asset that is being protected. Physical Security.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Identify the critical business functions

Identify the Critical Business Functions (CBFs) a midsized organization would need to restore after a catastrophic failure occurs, and suggest the ways the organization would determine the order in which it restores its CBFs.

  Determine the impact of five potential logical threats

Identify at least five (5) potential physical threats that require attention. Determine the impact of at least five (5) potential logical threats that require attention.

  Case study-the ethical hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and ..

  What could you do to protect the web server

What could you do to protect the web server, communication channels and databases? What company proprietary information needs to be protected?

  How system balanced security and usability

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Examine three cable maintenance tools

Examine three (3) cable maintenance tools that you would consider essential for a network team. Of the three (3) tools that you have examined, determine the one (1) that you believe is the most versatile. Provide one (1) scenario that demonstrates..

  Consider the information stored on your personal computer

information security1. look up the paper that started the study of computer security. prepare a summary of the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd