SlideShare a Scribd company logo
1 of 6
This paper involves putting together the various concepts
learned throughout this course. You are tasked with designing
the most secure network possible, keeping in mind your goal of
supporting three (3) IT services: email, file transfer
(centralized), and VPN. Your first step is to design a single
network capable of supporting three (3) different services.
Once you have fully designed your network, you will need to
provide three (3) workflow diagrams explaining how your
designed network handles the three (3) different transactions.
The first is an internal user sending an email using his / her
corporate email address to a user on the Yahoo domain with an
arbitrary address of
[email protected]
The second workflow diagram should show a user initiating an
FTP session from inside your network to the arbitrary site of
ftp.netneering.com. The third workflow is an externally located
employee initiating a VPN session to corporate in order to
access files on the Windows desktop computer, DT-Corp534-
HellenS, at work.
Write a paper in which you complete the following three (3)
parts.
Note:
Please use the following breakdown to complete your
assignment:
Overall network diagram
Datapath diagrams
(one for each of the steps in the scenarios below)
Write-up
Part 1
1a. Using Microsoft Visio or its open source alternative, create
a diagram showing the overall network you've designed, from
the user or endpoint device to the Internet cloud, and
everything in between, in which you:
Follow the access, core, distribution layer model.
Include at a minimum:
The authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and/or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)
1b. Explain each network device's function and your specific
configuration of each networking device.
1c. Design and label the bandwidth availability or capacity for
each wired connection.
Part 2
2a. Using Microsoft Visio or its open source alternative, create
a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate)
user having email address
[email protected]
sends an email to
[email protected]
Document and label the diagram showing protocols and path of
the data flow as data traverses through your network from
source to destination.
Include path lines with arrows showing directions and layer 1,
2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
2b. Using Microsoft Visio or its open source alternative, create
a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the
Internet to another company's site (ftp.netneering.com). He has
to access the secure shell using his active directory credentials
to authenticate to the ftp server (Linux running Redhat) on the
DMZ. He needs to transfer files from his desktop across the
Internet to
ftp.netneering.com.
Document and label the diagram showing protocols and path of
the data flow as data traverses through your network from
source to destination.
Include path lines with arrows showing directions and layer 1,
2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
2c. Using Microsoft Visio or its open source alternative, create
a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home
through the Internet to her corporate desktop, DT-Corp534-
HellenS. Hellen uses a browser to initiate her VPN connection.
By browsing to
https://VPNaccess.corp534.com
, she arrives at a login page where she needs to authenticate
using her Active Directory credentials before the VPN tunnel is
built.
Document and label the diagram showing protocols and path of
the data flow as data traverses through your network from
source to destination.
Include path lines with arrows showing directions and layer 1,
2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
Show user authentication when necessary.
2d. Explain how your overall design protects the organization
from both inside and outside attacks. Give examples.
2e. Explain how your layered design compensates for possible
device failures or breaches in network security.
2f. Determine whether any possible bottlenecks exist in your
design.
2g. Explain how to make the file transfer process more secure.
Part 3
1. Use at least five (5) quality resources in this assignment. (
Note:
Wikipedia and similar websites do not qualify as quality
resources.)
2. Include charts or diagrams created in Visio or an equivalent
such as Dia. The completed diagrams/charts must be imported
into the Word document before the paper is submitted.
3. Your assignment must follow these formatting requirements:
Use proper APA format.
Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page (if applicable) are
not included in the required assignment page length.

More Related Content

Similar to This paper involves putting together the various concepts  learn

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
manningchassidy
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
divinapavey
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docx
laurieellan
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docx
darwinming1
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
mehek4
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
sheronlewthwaite
 
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docxTerm Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
SANSKAR20
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
BapanKar2
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
rdtraders2007
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
webhostingguy
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
trayyoo
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
trayyoo
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
LinaCovington707
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
Monique Jones
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 

Similar to This paper involves putting together the various concepts  learn (20)

Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
 
reposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docxreposting due to tutor not being able to complete.,This term .docx
reposting due to tutor not being able to complete.,This term .docx
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docx
 
Term Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docxTerm Paper Project Designing a Secure NetworkThis term paper .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
 
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docxWeek 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
 
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docxTerm Paper Project Designing a Secure Network Due Week 10 and wor.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
 
BAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptxBAPANKAR15800121011 SOFT.pptx
BAPANKAR15800121011 SOFT.pptx
 
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdfThe OSI Reference Model layers, in order from top to bottomD. Appl.pdf
The OSI Reference Model layers, in order from top to bottomD. Appl.pdf
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.OSI Model and TCP/IP Model.
OSI Model and TCP/IP Model.
 

More from trappiteboni

Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docxHi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
trappiteboni
 
Hi, can someone answer these questions for me please Please let it .docx
Hi, can someone answer these questions for me please Please let it .docxHi, can someone answer these questions for me please Please let it .docx
Hi, can someone answer these questions for me please Please let it .docx
trappiteboni
 

More from trappiteboni (20)

HI, Im taking a speach class and this assingment is an essay and th.docx
HI, Im taking a speach class and this assingment is an essay and th.docxHI, Im taking a speach class and this assingment is an essay and th.docx
HI, Im taking a speach class and this assingment is an essay and th.docx
 
Hi,Hope all is well.  Can you please complete questions send via.docx
Hi,Hope all is well.  Can you please complete questions send via.docxHi,Hope all is well.  Can you please complete questions send via.docx
Hi,Hope all is well.  Can you please complete questions send via.docx
 
Hi,can you please do essay for me,,the essay is going to be.docx
Hi,can you please do essay for me,,the essay is going to be.docxHi,can you please do essay for me,,the essay is going to be.docx
Hi,can you please do essay for me,,the essay is going to be.docx
 
Hi,I have a project in smart energy grid which is due December 2.docx
Hi,I have a project in smart energy grid which is due December 2.docxHi,I have a project in smart energy grid which is due December 2.docx
Hi,I have a project in smart energy grid which is due December 2.docx
 
Hi,I am taking Java II and I have a project about a restuarant s.docx
Hi,I am taking Java II and I have a project about a restuarant s.docxHi,I am taking Java II and I have a project about a restuarant s.docx
Hi,I am taking Java II and I have a project about a restuarant s.docx
 
Hi, i need to write a introduction part of my research paper.1-It .docx
Hi, i need to write a introduction part of my research paper.1-It .docxHi, i need to write a introduction part of my research paper.1-It .docx
Hi, i need to write a introduction part of my research paper.1-It .docx
 
Hi,Actually I want to make a conclusion for my presentation. Attac.docx
Hi,Actually I want to make a conclusion for my presentation. Attac.docxHi,Actually I want to make a conclusion for my presentation. Attac.docx
Hi,Actually I want to make a conclusion for my presentation. Attac.docx
 
Hi, I need someone to write me a code that would read in the two att.docx
Hi, I need someone to write me a code that would read in the two att.docxHi, I need someone to write me a code that would read in the two att.docx
Hi, I need someone to write me a code that would read in the two att.docx
 
Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docxHi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
Hi, I need help with my Sociology ETHNOGRAPHIC project.here is the.docx
 
Hi, The assignment is to write a brief case for these cases listed b.docx
Hi, The assignment is to write a brief case for these cases listed b.docxHi, The assignment is to write a brief case for these cases listed b.docx
Hi, The assignment is to write a brief case for these cases listed b.docx
 
Hi, I have an Anthropology Culture and Medicine Healers and Healin.docx
Hi, I have an Anthropology Culture and Medicine Healers and Healin.docxHi, I have an Anthropology Culture and Medicine Healers and Healin.docx
Hi, I have an Anthropology Culture and Medicine Healers and Healin.docx
 
Hi, can someone please help me with these questions thanks.1- Eq.docx
Hi, can someone please help me with these questions thanks.1- Eq.docxHi, can someone please help me with these questions thanks.1- Eq.docx
Hi, can someone please help me with these questions thanks.1- Eq.docx
 
Hi, can someone answer these questions for me please Please let it .docx
Hi, can someone answer these questions for me please Please let it .docxHi, can someone answer these questions for me please Please let it .docx
Hi, can someone answer these questions for me please Please let it .docx
 
Hi there.I have a final presentation that can cover any of a .docx
Hi there.I have a final presentation that can cover any of a .docxHi there.I have a final presentation that can cover any of a .docx
Hi there.I have a final presentation that can cover any of a .docx
 
hi there im looking for someone to help me out with this homework.docx
hi there im looking for someone to help me out with this homework.docxhi there im looking for someone to help me out with this homework.docx
hi there im looking for someone to help me out with this homework.docx
 
hi there,I need a harvard reference with this assignment.My co.docx
hi there,I need a harvard reference with this assignment.My co.docxhi there,I need a harvard reference with this assignment.My co.docx
hi there,I need a harvard reference with this assignment.My co.docx
 
Hi I will attach the course project that I have started working on a.docx
Hi I will attach the course project that I have started working on a.docxHi I will attach the course project that I have started working on a.docx
Hi I will attach the course project that I have started working on a.docx
 
Hi there, I need only these thing ( Strategic AlignmentCost B.docx
Hi there, I need only these thing ( Strategic AlignmentCost B.docxHi there, I need only these thing ( Strategic AlignmentCost B.docx
Hi there, I need only these thing ( Strategic AlignmentCost B.docx
 
Hi there!I have a discussion to finish as soon as possible today f.docx
Hi there!I have a discussion to finish as soon as possible today f.docxHi there!I have a discussion to finish as soon as possible today f.docx
Hi there!I have a discussion to finish as soon as possible today f.docx
 
Hi Laura,Thank you for this great information on radioactive isoto.docx
Hi Laura,Thank you for this great information on radioactive isoto.docxHi Laura,Thank you for this great information on radioactive isoto.docx
Hi Laura,Thank you for this great information on radioactive isoto.docx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

This paper involves putting together the various concepts  learn

  • 1. This paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of [email protected] The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534- HellenS, at work. Write a paper in which you complete the following three (3) parts. Note: Please use the following breakdown to complete your assignment: Overall network diagram Datapath diagrams (one for each of the steps in the scenarios below)
  • 2. Write-up Part 1 1a. Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you've designed, from the user or endpoint device to the Internet cloud, and everything in between, in which you: Follow the access, core, distribution layer model. Include at a minimum: The authentication server (i.e. Microsoft Active Directory) Routers Switches (and/or hubs) Local users Remote users Workstations Files share (i.e. CIFS) Mail server Web servers (both internal and external)
  • 3. Firewalls Internet cloud Web proxy Email proxy FTP server (for internal-to-external transport) 1b. Explain each network device's function and your specific configuration of each networking device. 1c. Design and label the bandwidth availability or capacity for each wired connection. Part 2 2a. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected] Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
  • 4. Show user authentication when necessary. 2b. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. Show user authentication when necessary. 2c. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario: Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534- HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to
  • 5. https://VPNaccess.corp534.com , she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. Show user authentication when necessary. 2d. Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 2e. Explain how your layered design compensates for possible device failures or breaches in network security. 2f. Determine whether any possible bottlenecks exist in your design. 2g. Explain how to make the file transfer process more secure. Part 3 1. Use at least five (5) quality resources in this assignment. ( Note: Wikipedia and similar websites do not qualify as quality resources.) 2. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams/charts must be imported
  • 6. into the Word document before the paper is submitted. 3. Your assignment must follow these formatting requirements: Use proper APA format. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page (if applicable) are not included in the required assignment page length.