Computer Advanced Network Security

  You are tasked after a while intentioning the most fasten netcomposition feasible, maintenance in remembrance your motive of supported three (3) IT services: email, polish give (centralized), and VPN. Your earliest tread is to intention a one netcomposition worthy of supported three (3) unanalogous services. Once you entertain easily intentioned your network, you allure scarcity to agree three (3) compositionglide diagrams explaining how your intentioned netcomposition handles the three (3) unanalogous transactions. The earliest is an internallyly user sending an email using his / her urbane email harangue to a user on the Yahoo inclosure after a while an domineering harangue of [email protected] The assist compositionglide diagram should pretence a user initiating an FTP assemblage from internallyly your netcomposition to the domineering seat of ftp.netneering.com. The third compositionglide is an outerly located employee initiating a VPN assemblage to urbane in enjoin to approximation polishs on the Windows desktop computer, DT-Corp534-HellenS, at composition. Write a pamphlet in which you total the aftercited three (3) compressiveness. Note: Please use the aftercited breakdown to total your assignment: Overall netcomposition diagram Datatrack diagrams (one for each of the treads in the scenarios beneath) Write-up Part 1 1a. Using Microsoft Visio or its notorious rise opinion, educe a diagram pretenceing the overall netcomposition you've intentioned, from the user or endpoint emblem to the Internet outdo, and anything in among, in which you: Follow the approximation, nucleus, division layer example. Include at a minimum: The verification server (i.e. Microsoft Locomotive Directory) Routers Switches (and/or hubs) Local users Remote users Workstations Files portion-out (i.e. CIFS) Mail server Web servers (twain internallyly and outer) Firewalls Internet outdo Web proxy Email proxy FTP server (for internallyly-to-outer enravishment) 1b. Explain each netcomposition emblem's exercise and your peculiar form of each networking emblem. 1c. Intention and letter the bandwidth availability or accommodation for each wired unarm-an. Part 2 2a. Using Microsoft Visio or its notorious rise opinion, educe a Datatrack Diagram for the aftercited scenario: Local user sends email to a Yahoo berth. Local (corporate) user having email harangue [email protected]sends an email to [email protected] Document and letter the diagram pretenceing protocols and track of the axioms glide as axioms traverses through your netcomposition from rise to consignment. Include track lines after a while arrows pretenceing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each glide. Show user verification when compulsory. 2b. Using Microsoft Visio or its notorious rise opinion, educe a Datatrack Diagram for the aftercited scenario: Local user, Jonny Hill, gives polish using ftp through the Internet to another company's seat (ftp.netneering.com). He has to approximation the fasten shell using his locomotive directory credentials to verify to the ftp server (Linux vulgar Redhat) on the DMZ. He scarcitys to give polishs from his desktop opposing the Internet toftp.netneering.com. Document and letter the diagram pretenceing protocols and track of the axioms glide as axioms traverses through your netcomposition from rise to consignment. Include track lines after a while arrows pretenceing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each glide. Show user verification when compulsory. 2c. Using Microsoft Visio or its notorious rise opinion, educe a Datatrack Diagram for the aftercited scenario: Remote user, Hellen Stover, connects via VPN from abode through the Internet to her urbane desktop, DT-Corp534-HellenS. Hellen uses a browser to start her VPN unarm-an. By browsing tohttps://VPNaccess.corp534.com, she arrives at a login page where she scarcitys to verify using her Locomotive Directory credentials anteriorly the VPN tunnel is built. Document and letter the diagram pretenceing protocols and track of the axioms glide as axioms traverses through your netcomposition from rise to consignment. Include track lines after a while arrows pretenceing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each glide. Show user verification when compulsory. 2d. Explain how your overall intention protects the form from twain internallyly and beyond attacks. Give examples. 2e. Explain how your layered intention compensates for feasible emblem failures or breaches in netcomposition carelessness. 2f. Determine whether any feasible bottlenecks insist in your intention. 2g. Explain how to frame the polish give manner more fasten. Part 3 1. Use at lowest five (5) condition media in this assignment. (Note: Wikipedia and homogeneous websites do not limit as condition media.) 2. Include charts or diagrams educed in Visio or an equipollent such as Dia. The totald diagrams/charts must be vital into the Word instrument anteriorly the pamphlet is submitted. 3. Your assignment must thrive these formatting requirements: