100% (1)
page:
2 pages/≈550 words
Sources:
-1
Style:
APA
Subject:
Technology
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.15
Topic:

A Network Diagram Based on the Given Bank Scenario. Technology Case Study

Case Study Instructions:

Using notes on the scope of the bank's parameters.and erd diagram of the locations and external service providers. Create a network diagram as a representation of the notes and ERD diagram

Using note submissions for case study create a network diagram  1 and diagram 

Case Study Sample Content Preview:

A Network Diagram
Student’s Name
Institutional Affiliation

A Network Diagram

Figure 1: A Network Diagram Based on the Given Bank Scenario.
The diagram above describes the network layout of a bank. The Internet Service Provider (ISP) connects the bank to the web through ta modem to secure the network. The system operates behind a firewall that filters any unwanted traffic to secure the system further. All the services offered by the bank are tunneled through a Virtual Private Network (VPN). Credit and debit card services are offered by third party companies and connected to the bank via the Internet. The bank network has four servers, which are listed below:
Online banking server.
Relational database server.
Email server.
Banking software server.
Network switches are used to connect all the computers and services together. The architecture allows services to be distributed easily. The router directs all the traffic to their respective Internet addresses. The banking software server handles all the transactions taking place, where all data is saved in the relational database. Additionally, the online banking server handles all online transactions and saves all the data in the relational database, allowing the synchronization between the banking software and online banking server. The network uses a gigabyte switch to allow faster intercommunication between services in the bank.
Automated Teller Machines (ATMs) are connected to the bank via a VPN. The data traffic within this network is encrypted to prevent unauthorized personnel from accessing sensitive banking information. When an account holder visits the ATM to check his or her balance, deposit, or withdraw some money, he or she must provide a debit card that contains all his or her information, such as the account number. The ATM embedded software checks the card to see if it is valid or not. If the card is valid, the account holder is prompted to enter his or her Personal Identification Number (PIN) before he or she is granted access. Only after the provision of the correct authorization and authentication details is the user giv...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!