0% Plagiarism Guaranteed & Custom Written

a. Traffic generated by the hosts: clients, servers and backup devices.

18 / 01 / 2019 Networking

This paper circulates around the core theme of a. Traffic generated by the hosts: clients, servers and backup devices. together with its essential aspects. It has been reviewed and purchased by the majority of students thus, this paper is rated 4.8 out of 5 points by the students. In addition to this, the price of this paper commences from £ 360. To get this paper written from the scratch, order this assignment now. 100% confidential, 100% plagiarism-free.

For this part you are required to design and implement a secure information and network infrastructure that ensures high availability, reliability, scalability, performance and security to support CC services. This requires [1] the redesign of the network to meet the current and future demands; [2] the delivery of a comprehensive network security plan; and [3] Security technology implementation and proof of concept.
The following is a breakdown of the tasks for part A.
Network Redesign
1. Network redesign. In this redesign, the IP address allocation should use the CIDR format (x.y.z.t/n).
8
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
2. Each design should be justified in terms of traffic, reliability, performance, availability, scalability and security. To do this you need to make a number of assumptions (discuss this with your mentor / facilitator / teacher). For example, assume that a great number of College services operate 24/7. Other services are to operate from 6:00am to 8:00pm daily, Monday to Friday. Other aspects to take into account are user’s behaviour, applications, bandwidth requirements and the like.
Specifically for this redesign, take into account the following:
a. Traffic generated by the hosts: clients, servers and backup devices.
b. Appropriateness of WAN links to support current traffic and forecasted growth.
c. Appropriateness of WANs (Frame Relay). Are there better WAN protocols to use?
d. Appropriateness of wired LANs and Wireless LANs to support future growth.
e. Would you use VPNs? Why?
f. The specifications of networking devices including routers and switches at each site or location (wired and wireless)
g. IP address allocation of each network and main network devices
h. Sub-netting to separate traffic including IP address allocation
i. Firewalls positioning and strategy. Would you use separate packet filtering and routing?
j. Proxy servers
k. DMZ configuration
l. Firewalls Access Control Lists
m. Network diagram of the logical topology and allocation of devices; and IP addresses for the main network devices
n. Provision data encryption to secure data travelling between internal and external networks


100% Plagiarism Free & Custom Written


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

Company # 11483120

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

Benefits You Get

  • Free Turnitin Report
  • Unlimited Revisions
  • Installment Plan
  • 24/7 Customer Support
  • Plagiarism Free Guarantee
  • 100% Confidentiality
  • 100% Satisfaction Guarantee
  • 100% Money-Back Guarantee
  • On-Time Delivery Guarantee
FLAT 25% OFF ON EVERY ORDER. Use "FLAT25" as your promo code during checkout