educational offerings to non-traditional students | My Assignment Tutor

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the Institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture. Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design: Each of the facilities has three floors:The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devicesThe third floor of each building requires 75 network connections for the serversAll sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites) Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)A constant connection between the three locations, carrying at least 75 Mbps of dataAll servers at all locations must have redundancyProtection from intrusions is required and should be documentedA plan to verify security and failover measures is required Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or available at (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the ‘new network diagram’ dialog window:


Leave a Reply

Your email address will not be published. Required fields are marked *