Académique Documents
Professionnel Documents
Culture Documents
Assignment 3
NTW275
DANIEL HOWELL
[COMPANY NAME]
Table of Contents
Summary ....................................................................................................................................................... 2
Section 1: Network Layout ............................................................................................................................ 2
1-A: Network Overview............................................................................................................................. 2
Figure 1: Network Diagram ................................................................................................................... 2
1-B: Servers ............................................................................................................................................... 3
Figure 2: Servers.................................................................................................................................... 4
1-C: Vlans .................................................................................................................................................. 5
Figure 3: Vlans ....................................................................................................................................... 5
1-D: Security .............................................................................................................................................. 5
Figure 4: Firewall ................................................................................................................................... 6
Figure 4: Monitoring Devices ................................................................................................................ 6
Section 2: Network Traffic ............................................................................................................................ 6
1-A: Possible Traffic................................................................................................................................... 6
Section 3: Additional Comment .................................................................................................................... 6
Summary
The Genome4U project is a large scale project being put forth by a large United states University. They
want to build a database that has genomic, traits, and medical data from 100,000 volunteers. The data
base well then be used to aid in the fields of computer science, mathematicians, physicists, social
science, and other research. The database is open to the other researchers to access as well. The
network needs to be able to support the database and the traffic related to the research being done.
1-B: Servers
The network has four clusters of servers. The first cluster of serves contains all the genome data that
was collected from the volunteers. The genome data is the only data that is kept on these servers. The
second cluster of servers contains the personal information of the volunteers. This information is not
related to the genome research. The third cluster is used to hold the research data from the genome
experiments. The fourth cluster is an onsite back up system for the network. Figure 2 shows a diagram
of the clusters.
Figure 2: Servers
1-C: Vlans
The local network connected to the database has 5 Vlans. Vlan1 is computer science, Vlan2 is
mathematicians, Vlan3 is physicists, Vlan4 is social science, and Vlan5 is for other researchers.
Figure 3: Vlans
1-D: Security
Do to the type of information that is stored in the on the data there is a number of security measures in
place to protect the servers. The main firewall is a check point firewall system. If the main firewall goes
down traffic is redirected to the secondary. Figure 4 shows the checkpoint firewall system. There are
multiple internal firewalls within the network. After the firewall there are multiple monitoring devices
connected to various points in the network. The device monitor the traffic for any unauthorized access
to restricted systems. Figure 5 shows the monitoring devices in the network.
Figure 4: Firewall