Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

---- IT 3600 Networks and Internetworking ---- Design a secure network for an organization that has three campuses. Campus A has about 250 users and

---- IT 3600 Networks and Internetworking ----

Design a secure network for an organization that has three campuses. Campus A has about 250

users and is located 125 miles from Campus B and 370 miles from Campus C. Campus B has

about 100 users and is located 390 miles from Campus C. Campus C has 75 users. A user

should be able to login to any workstation and have access to his or her network resources

(printers, network storage, etc.). The organization performs regular business functions and does

not have any special requirements for privacy or secure transmission that exceed regular business

practices but data transmission between campuses should be considered reasonably secure

from inspection. At least two paths should exist from each campus to each other campus to

provide redundancy and a backup in the case that a link fails.

You should deliver a plan that describes the architecture and equipment used to interconnect the

LANs at each campus. List any assumptions that you are making (for example, Windows

Domain Controllers will be used). For each service or hardware component, you must provide a

price, good estimates are acceptable where exact prices cannot be determined. You must provide

estimates for a total amount required to implement the system and also the amount per month to

operate the system. Extra points will be awarded for lower total prices as long as the proposed

equipment and services seem adequate. You must also provide an estimated amount of time

required for implementation and testing.

Remember, you are only concerned with the services, equipment, and costs of securely

connecting the three campuses. You do not need to worry about workstations, printers,

storage, webservers, etc.

The instructor will answer any further questions that you have. Please send your questions by

email to

Paul.Morrey@uvu.edu

.

You will be graded based on how well you demonstrate the following:

1- Identification of Problem or Definition of Project

2- Stakeholder Research and Analysis

3- Impact Analysis Research (economic, cultural, ethical, social, legal)

4- Timeframe Analysis

5- Alternatives Evaluation

6- Hardware Requirements

7- System and Application Software Selected for Use

8- Proposed Solution Objectives

I have found this the best way to explain how private and public keys are exchanged securely. It uses color to explain.

https://www.youtube.com/watch?v=YEBfamv-_do

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David J. Auer David M. Kroenke

13th Edition

ISBN: B01366W6DS, 978-0133058352

More Books

Students also viewed these Databases questions