In this part of W5 Assignment 2, you will complete the course project you started in Week 1.You will focus on network security based on your network topology andlogical network design. You will also consider physical security,information security, and appropriate security technologies.Using the South University Online Library or the Internet, research network security tools and network security diagrams.Continuing with the course project, on the basis of your research and reading, complete the following tasks this week:Choose a network management tool and a securitytool that can be used in your network design. There are many other toolsthat you can explore. Justify your selections. An example of a networkmonitoring tool is Paessler Router Traffic Grapher (PRTG). Click here to access the tool. Update the vendor and costs table from W4 Assignment 2 based on the updates you made to the proposed network design.Finally, add a networksecurity diagram using any of the tools that you have downloaded sofar. You may also look for examples of network security diagrams overthe Internet.Compile your answers to both parts of thisassignment in a 7- to 8-page Microsoft Word document. Include adiscussion in your response on how to utilize the knowledge/experiencegained from the hands-on labs of Weeks 1–5 in doing the course project assignment components.Support your responses with appropriate research, reasoning, and examples.Cite any sources in APA format.