Network design and analysis

Assignment Help Computer Network Security
Reference no: EM131099729

Data Communications: Network Design and Analysis

Individual Assignment 4: IP Routing and Security

Question 1 (10 Marks)

You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations.

Branch Location Type:
• These branches have 3 subnets:
1. One /25 subnet
2. One /26 subnet for ABMs (Automated Banking Machine) functions, and,
3. One /26 subnet for the security system.
• All the above subnets can be summarized into one /24 network.

Campus Location Type:
• Has multiple /24 subnets in each location, locations vary in size from 60 users to 3,000 users in large campuses.

What routing protocol(s) would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 2 - (10 Marks)

You are designing a network for a retail customer; they plan to have 7 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to another 4 locations. All locations will be located in Ontario.

Each store has four main application requirements:

1. Internet access via the central warehouse,
2. Inventory control,
3. Employee scheduling and time tracking and
4. Point of sale.

Each retail store will have 12-15 employees at most.

A. What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.
B. What bandwidth would you recommend at each location? Why? Explain your reason.
C. What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

 


Question 3 (10 Marks)

You are designing a Demilitarized Zone (DMZ) for a large corporation.

Using design best practice, and the information that you have learned so far, propose a design that will provide the following capabilities:

• Secure WEB server hosting environment,
• Provide Internet browsing capability for internal users,
• Internal users access to the WEB servers for maintenance,
• VPN access to internal system from the Internet,
• Identify the use and location of Firewalls where necessary, and
• Identify the use and location of IPS/IDS where necessary.

A. Provide a diagram showing, Internet, WAN and all security components with the flow of traffic for each.

B. Explain the functions of each component, why you selected them, and the why you selected that location in the data flow.

Reference no: EM131099729

Questions Cloud

Lacking in the diversity competency : Assume a leader is lacking in the diversity competency. How does this deficiency link to the severe workplace stress experienced by some or all employees?
Find out additional information about of laws : The Law of Large Numbers is a statistical theory that you read about in this chapter. In your own words, what does this law say about the probability of an event? Perhaps you have also heard of something called the Law of Averages (also called the..
Active and passive euthanasia : Question 1.1.According to Rachels' article "Active and Passive Euthanasia", passive euthanasia is:
Difference in broader term mosaic covenant and decalogue : Explain the difference between the broader term "Mosaic Covenant" and the narrower "Decalogue" with regard to how they are applicable to Christian morality today?
Network design and analysis : You have been asked to design a Banking Network with two primary types of locations: a Branch location and a Campus location. The bank has a total of 2,220 branch locations and 85 Campus locations. What routing protocol(s) would you recommend for thi..
Demonstrate skills required to interact with clients : Performance objective - To demonstrate the skills and ability required to interact with clients on a business level
Development of the hippocampal region in adolescents : Researchers want to measure the effect of alcohol on the development of the hippocampal region in adolescents. The researchers randomly selected 11 adolescents with alcohol use disorders. They wanted to determine whether the hippocampal volumes in..
Determining the favorable variance : At the end of the month, the total labor costs have a favorable variance. The labor rate is the reason for the variance. Is Shelly unethical in her actions? What could happen because of her actions?
Compute the test statistic : To test H: u = 20 versus H:u

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd