This paper circulates around the core theme of a. Traffic generated by the hosts: clients, servers and backup devices. together with its essential aspects. It has been reviewed and purchased by the majority of students thus, this paper is rated 4.8 out of 5 points by the students. In addition to this, the price of this paper commences from £ 360. To get this paper written from the scratch, order this assignment now. 100% confidential, 100% plagiarism-free.
For this part you are required to design and implement a secure information and network infrastructure that ensures high availability, reliability, scalability, performance and security to support CC services. This requires  the redesign of the network to meet the current and future demands;  the delivery of a comprehensive network security plan; and  Security technology implementation and proof of concept.
The following is a breakdown of the tasks for part A.
1. Network redesign. In this redesign, the IP address allocation should use the CIDR format (x.y.z.t/n).
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
2. Each design should be justified in terms of traffic, reliability, performance, availability, scalability and security. To do this you need to make a number of assumptions (discuss this with your mentor / facilitator / teacher). For example, assume that a great number of College services operate 24/7. Other services are to operate from 6:00am to 8:00pm daily, Monday to Friday. Other aspects to take into account are user’s behaviour, applications, bandwidth requirements and the like.
Specifically for this redesign, take into account the following:
a. Traffic generated by the hosts: clients, servers and backup devices.
b. Appropriateness of WAN links to support current traffic and forecasted growth.
c. Appropriateness of WANs (Frame Relay). Are there better WAN protocols to use?
d. Appropriateness of wired LANs and Wireless LANs to support future growth.
e. Would you use VPNs? Why?
f. The specifications of networking devices including routers and switches at each site or location (wired and wireless)
g. IP address allocation of each network and main network devices
h. Sub-netting to separate traffic including IP address allocation
i. Firewalls positioning and strategy. Would you use separate packet filtering and routing?
j. Proxy servers
k. DMZ configuration
l. Firewalls Access Control Lists
m. Network diagram of the logical topology and allocation of devices; and IP addresses for the main network devices
n. Provision data encryption to secure data travelling between internal and external networks