Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
There will be six computer labs that will be used for instruction. Each of these labs will have 26 computers (24 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab. In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet. The library will also have some computers to allow students access to the library resources. There will be 10 computers for student's use in the library, and 5 computers for Library staff. There are five lecture classrooms in the building. Each of this room will have a computer for instructor's use. Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use. Equipment Inventory
Workstation
Placement
Number of
Computers
Users
Total Computers
6 Instructional
Computer labs
26
Student and
Faculty
156
Student Computer Lab
31
Student
6 various offices
6
Staff/Faculty
Admission office
5
Staff
Library
10
5 classrooms
1
Server
To be determined by students
Network Connecting Devices
IT Staff
Printers
To be determined by student
Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: Student-accessed computers should be on separate network from the staff-accessed computers.The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor.Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.The network has been assigned the 10.11.0.0 network address for all computers and devices. For Internet routing use 151.1.1.1 network address.The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area. Submission should include (in no more than three pages, excluding diagrams and references): Network Addressing: Define the subnet (based on: rooms, floor, department, or other criteria).For each subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices. Physical Network Design: Define the topology that will be used.Select the appropriate network media to use.Select the appropriate network connecting devices to use.Physical layout of the computers on the floor plan.List of additional servers or network devices needed to implement the network.Justifications for your network design (number 1 - 5 above) You will be evaluated on your ability to: Implement appropriate IP addressing schemeselect and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segmentselect and justify appropriate topology such as star, bus, or ring for your networkselect and justify of your selected network equipmentsselect and justify appropriate network services to meet network requirementsselect and justify security implementation for the networkuse proper grammar, formatting, network terminology, and reference citations.
This assignment explains the networking features, different kinds of networks and also how they are arranged.
While working in an economy, it has a separate identity but cannot operate insolently.
Write about SSH or OpenSSH server services discussion questions
Network simulation on Hierarchical Network Rerouting against wormhole attacks
Prepare a network simulation
One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.
Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.
Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.
Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?
safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..
problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack
Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd