Question
---- IT 3600 Networks and Internetworking ---- Design a secure network for an organization that has three campuses. Campus A has about 250 users and
---- IT 3600 Networks and Internetworking ----
Design a secure network for an organization that has three campuses. Campus A has about 250
users and is located 125 miles from Campus B and 370 miles from Campus C. Campus B has
about 100 users and is located 390 miles from Campus C. Campus C has 75 users. A user
should be able to login to any workstation and have access to his or her network resources
(printers, network storage, etc.). The organization performs regular business functions and does
not have any special requirements for privacy or secure transmission that exceed regular business
practices but data transmission between campuses should be considered reasonably secure
from inspection. At least two paths should exist from each campus to each other campus to
provide redundancy and a backup in the case that a link fails.
You should deliver a plan that describes the architecture and equipment used to interconnect the
LANs at each campus. List any assumptions that you are making (for example, Windows
Domain Controllers will be used). For each service or hardware component, you must provide a
price, good estimates are acceptable where exact prices cannot be determined. You must provide
estimates for a total amount required to implement the system and also the amount per month to
operate the system. Extra points will be awarded for lower total prices as long as the proposed
equipment and services seem adequate. You must also provide an estimated amount of time
required for implementation and testing.
Remember, you are only concerned with the services, equipment, and costs of securely
connecting the three campuses. You do not need to worry about workstations, printers,
storage, webservers, etc.
The instructor will answer any further questions that you have. Please send your questions by
email to
Paul.Morrey@uvu.edu
.
You will be graded based on how well you demonstrate the following:
1- Identification of Problem or Definition of Project
2- Stakeholder Research and Analysis
3- Impact Analysis Research (economic, cultural, ethical, social, legal)
4- Timeframe Analysis
5- Alternatives Evaluation
6- Hardware Requirements
7- System and Application Software Selected for Use
8- Proposed Solution Objectives
I have found this the best way to explain how private and public keys are exchanged securely. It uses color to explain.
https://www.youtube.com/watch?v=YEBfamv-_do
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started