Bullusing microsoft visio or its open source alternative


• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

• Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected].

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

 Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.

Show user authentication when necessary.

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

• Local user, Jonny Hill, transfers file using ftp through the Internet to another company's site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.

Show user authentication when necessary.

• Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

• Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.

• Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.

• Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 

Words Limit: 3000

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Bullusing microsoft visio or its open source alternative
Reference No:- TGS01110836

Now Priced at $70 (50% Discount)

By using the given hardware and software in the network diagram, a network can be establish for the connection oriented payment system of the organization. There are various factors that can harm computer networks. Most common threats includecybercrime,malware,worms,adware, viruses, hacker attacks,data theft etc.These threats can damage unsecured websites,unsecured wireless networks,weak passwords,lost devices etc. So, for proper secured network firewalls and VPNs are used for secured communicat

Recommended (94%)

Rated (4.6/5)