Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Term Paper Project: Designing a Secure Network

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three different services. Once you have fully designed your network, you will need to provide three workflow diagrams explaining how your designed network handles the three different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a ten to fifteen page paper in which you complete the following three Parts. Note: Please use the following page breakdown to complete your assignment:

• Overall network diagram: One page
• Datapath diagrams: Three pages (one for each diagram)
• Write-up: six to ten pages

Part 1

• Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

o Follow the access, core, distribution layer model.
o Include at a minimum:

- Authentication server (i.e. Microsoft Active Directory)
- Routers
- Switches (and / or hubs)
- Local users
- Remote users
- Workstations
- Files share (i.e. CIFS)
- Mail server
- Web servers (both internal and external)
- Firewalls
- Internet cloud
- Web proxy
- Email proxy
- FTP server (for internal-to-external transport)

• Explain each network device's function and your specific configuration of each networking device.
• Design and label the bandwidth availability or capacity for each wired connection.

Part 2

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

o Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.com sends an email to user534@yahoo.com.

- Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

- Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.

- Show user authentication when necessary.

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

o Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.

- Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

- Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.

- Show user authentication when necessary.

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

o Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.

• Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

• Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.

• Show user authentication when necessary.

• Explain how your overall design protects the organization from both inside and outside attacks. Give examples.

• Explain how your layered design compensates for possible device failures or breaches in network security.

• Determine whether any possible bottlenecks exist in your design.

• Explain how to make the file transfer process more secure.

Part 3

• Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

• Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
• Identify network security tools and discuss techniques for network protection
• Describe the foundational concepts of VPNs.
• Design a secure network to address a business problem.
• Use technology and information resources to research issues in network security design.
• Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92228198
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Suppose there is no inflation and an insurance company

Suppose there is no inflation and an insurance company offers a contract that would pay $500,000 with certainty 50 years from now. What is the most that this contract would be worth today if: 1. The rate of interest is 7 ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As