Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of u..4@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a fifteen to twenty (15-20) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: ten-fifteen (10-15) pages


Part 1
1a. Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
i. Follow the access, core, distribution layer model.
ii. Include at a minimum:

  • Authentication server (i.e. Microsoft Active Directory)
  • Routers
  • Switches (and / or hubs)
  • Local users
  • Remote users
  • Workstations
  • Files share (i.e. CIFS)
  • Mail server
  • Web servers (both internal and external)
  • Firewalls
  • Internet cloud
  • Web proxy
  • Email proxy
  • FTP server (for internal-to-external transport)

1b. Explain each network device's function and your specific configuration of each networking device.
1c. Design and label the bandwidth availability or capacity for each wired connection.

Part 2
2a. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address j..l@Corp534.com sends an email to u..4@yahoo.com.
i. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
iii. Show user authentication when necessary.
2b. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
i. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
iii. Show user authentication when necessary.
2c. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
i. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
iii. Show user authentication when necessary.
2d. Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
2e. Explain how your layered design compensates for possible device failures or breaches in network security.
2f. Determine whether any possible bottlenecks exist in your design.
2g. Explain how to make the file transfer process more secure.

Part 3
3. Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must have:
• Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91224166
  • Price:- $140

Guranteed 48 Hours Delivery, In Price:- $140

Have any Question?


Related Questions in Computer Engineering

Any help will be appreciatedscenarionbspyou are a

Any help will be appreciated Scenario: You are a networking and communications consultant working for HoustonComm Services, Inc, further referred to as HCS. HCS is a company providing technology consulting services to st ...

Suppose you take out a loan for 9000 at 12 ordinary

Suppose you take out a loan for $9,000, at 12% ordinary interest. If the amount of interest is $762.00, what is the time period? (Round any fraction to the next higherday)

Question use the information in the video and this weeks

Question: Use the information in the video and this week's in-class presentation to write a 250-300 word short essay describing the purpose of a browser, browser wars, and your favorite browser. Video: Tip 3: Know & Use ...

Salariestask compute the weekly pay for each employee at

Salaries Task: Compute the weekly pay for each employee at the Wahoo Widget Company. For each employee, you will calculate the base pay according to the appropriate salary category, and then subtract taxes and deductions ...

Each student will create classes methods and design icons

Each student will create classes, methods, and design icons for their mobile device application using OOP language and GUI. The following must be included. Your instructor may add additional requirements, if any, in a se ...

Give an example of a merger or acquisition where technology

Give an example of a merger or acquisition where technology contributed to its failure to produce desired outcomes. What reasons caused the failure? What actions might have helped ensure success?

Given a list of numbers l a value x is said to be a

Given a list of numbers L, a value x is said to be a majority value if the value of over half the elements in L is x; in other words, if L has n elements and nx is the number of elements in L with value x, then x is a ma ...

The equation of regression line for sons heighty in inches

The equation of regression line for son's height(y) in inches versus father's height in inches is y = 35 + 0.5x. For a 72 inch tall father, what would we predict for the son's height?

How do you make a java program that reads two diagonal

How do you make a Java program that reads two diagonal points, say p1 and p2, of an up-right rectangle and finds both the smallest circle containing the rectangle and the largest circle that can be contained in the recta ...

Question summary of what is legal and regulatory

Question : Summary of what is legal and regulatory obligations regarding data and information security. Summary of project initiation in the technology world.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As