Define the topology that will be used

Assignment Help Computer Networking
Reference no: EM131201354

Assignment

Overview

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

• Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).

• There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.

• The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

• Physical Network Design
• Network Addressing
• Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

• Include at least five scholarly references.
• Use IEEE-style citations.
• Use correct network terminology.
• The use of diagrams is encouraged.

Use this template as a guide while creating your Network Design Proposal (Parts 1-3).

Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

1. Watch How to Subnet a Network Video provided in Content -> Project Instructions

2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 - 3

3. Complete the subnet chart provided at the end of the document.

Network Services Design

In this section, address each of the following.

1. Identify network services needed.
2. List additional servers or network devices needed to implement the network.
3. List network security measures to be implemented.
4. Justify the need for the network services, security measures, and devices you've selected.

Building Details

The 50-year-old, two-story building has the following layout:

(FOR LAYOUT OF BUILDING, SEE THE WORD DOCUMENT TITLED "BUILDING LAYOUT").

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

Reference no: EM131201354

Questions Cloud

Discuss the types of insurance available for the van : The high rates of malpractice suits raise the question, "Should healthcare professionals not be allowed to make any mistakes?" Consider the following case. In your estimation, is failing to pursue further testing simply a mistake? Consider this fr..
Compute the real power consumed by the circuit f : The real power consumed by the circuit f. The reactive power consumed by the circuit g. The impedance of the circuit
Benefits to engaging in a computer science : What are the benefits to engaging in a Computer Science major and what fields will allow me to branch out to?
Which structure do you think would be most effective : Risk can be minimized, but not eliminated. Give an example of a risk management solution being taken too far, and explain how you would judge how far is too far. Give another example of a situation where you must accept a certain level of risk bec..
Define the topology that will be used : Define the topology that will be used. Select the appropriate network media. Select the appropriate network connecting devices, including network security devices.
Derive a subnet mask for a point to point connection : In this assignment you will design a small network. Instructions Derive a subnet mask for a point to point connection. You have the following address 10.0.1.32/27
Find the steady-state of the economic system : ECON 4001 Assignment. Assume that b 0; γ > 0; F > 0;G > 0; c- > 0: Find the steady-state of the economic system. Examine the stability of the economic system
Calculate the phase shift in degrees : The waveform of an ac voltage can be expressed by V=180 sin(300t + 3)
Using adam smiths canon evaluate federal income tax : How does the pay-as-you-go procedure apply to wage earners? -To persons who have income from sources other than wages?

Reviews

Write a Review

Computer Networking Questions & Answers

  What are the predominant electronic and physical threats

Write a 200- to 300-word response to the following question: What are the predominant electronic and physical threats to communications networks

  Discuss a minimum of five event types found in a dhcp log

What plan will you follow to assign printers to all the users in the organization? Discuss a minimum of five event types found in a DHCP log and describe what they refer to

  Evaluating a web-based source for academic research

What information or topic in this course was most useful to you in either your professional, personal, or academic development?

  Describe the ip address classes and ranges

Describe the IP address classes and ranges. Provide examples of internal vs. external address ranges. What configuration changes would you make in a network wireless router to enable a base level of security

  What would you recommend for a wireless lan installation

COMP247 Data Communications. Boojum Enterprises intends letting their workers bring their own device (BYOD) to work, so that workers can use a device that they are personally comfortable with. The office measures 50 metres by 20 metres. It is alre..

  Explain the steps take to stop cybersquatter

You are a owner of the register trademark, and you just found that domain name is being held hostage for large sum of money. In around 300 words, Explain the steps which you would take to stop cybersquatter.

  Municipal wifi networks over the past few years

A number of U.S. cities have launched municipal WiFi networks over the past few years. Research three deployments, anywhere in the world, and compare the networks in terms of architecture, applications, cost to the consumer, and success.

  Mobile computing and wireless computing

Decide whether or not mobile computing and wireless computing are synonymous. Provide at least two (2) reasons to support your assertion and justify your response.

  Define network diagram data for a small project

Consider Table 6-2, Network Diagram Data for a Small Project. All duration estimates or estimates times are in days, and the network proceeds from Node 1 to Node 9.(Please answer the questions for Chapter 6, number 2 under Exercises, pp 246.)

  Explain the available security measures in general terms

Explain the available security measures in general terms. Please be sure to include your cited sources for the security plan.

  Difference between backup to disk and tape

Comparing the difference between backup to disk and tape. What is one reason the tape is preferred?

  How to set up a small network in hardware and software

Explain how you would set up a small network in hardware and software for a charity with six computers running Windows 7. The charity would like to share an Internet connection and buy a multifunction device

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd