Write a paper in which you complete the following:
Overall network diagram
Datapath diagrams (one for each of the steps in the scenarios below)
Part 1
1a. create a diagram showing the overall network you’ve designed, from the user or endpoint device to the Internet cloud, and everything in between, in which you:
Follow the access, core, distribution layer model.
Include at a minimum:
The authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and/or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)
1b. Explain each network device’s function and your specific configuration of each networking device.
1c. Design and label the bandwidth availability or capacity for each wired connection.
Part 2
2a. create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@ sends an email to user534@.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions.
2b.create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to .
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions.
2c. create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to , she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
2d. Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
2e. Explain how your layered design compensates for possible device failures or breaches in network security.
2f. Determine whether any possible bottlenecks exist in your design.
2g. Explain how to make the file transfer process more secure.