Design a modern network for a private high school

Assignment Help Computer Network Security
Reference no: EM13850996

Data Communications and Networks

Assignment: Design a Modern Network for a Private High School

Background:

A private high school needs your expertise. Their network is old and will need to be replaced. The owner has asked for a "high school of the future, using the latest technologies with a network which can accommodate the load now and for another five years".

The present high school has two computer labs each with 20 old computers, 1 laser printer and a scanner (which is currently connected to a standalone computer). There are a further 20 computers in the Library as well as laser printer, a colour inkjet printer, a flatbed scanner, and a photocopier. Most of the computers are close to five years old, are very slow and have insufficient memory to meet the needs of the students. The network was installed five years ago. Network operating system is Windows Server 2003. The network is simple. The new high school will have all teachers issued with Laptops/iPads and all the desktop computers have been removed from the Staff Room.

The Administration Office computers and other peripheral devices such printer, photocopier, etc. have recently been replaced.

Important objectives of the Network:

The two main objectives for the proposed solution are:

- A modern network for the school and

- To ensure that the students in the high school have access to the best computer facilities.

The network is proposed to achieve the above objectives considering the school's following business and technical goals.

Business goals:

- Improved communications,

- Spare no expense,

- Protect school information,

- The classroom of the future will double enrolments,

- Be excellent in technology.

Technical goals:

- The current network, computer labs, and library are upgraded and/or redesigned to a modern network to meet student and teacher needs,

- Scalability - remember they plan to double in size,

- Availability - Wireless network access is available in all classrooms as well as some outdoor areas for teachers and students,

- Students have access to study resources from school and home,

- Performance - network performance must be high

- Reliability - no single point of failure

- Security - protection of school information and other IT assets.

- Multimedia classrooms and high speed videoconferencing facilities for the excellence classes.

What you need to do

You are required to design the network you would recommend and how it would be configured.

Remember the goal of building a new network is that it will support the schools needs for the next five years. Your recommendations are to be submitted as a formal report containing your analysis of the present situation, and your recommended network solution.

As part of your report, you are required to:

- Executive summary: Explain why your design meets the business and technical goals.

- Analysis of user requirements and assigning appropriate priorities.

- Description and analysis of the current network.

- Network Design Proposed: suggest a type of network architecture that is suitable for the organisation. You will need to identify all the circuits (cabling), network hardware necessary to build the network(s) you are proposing and to justify your choice, i.e., you will need to explain the function of the hardware and network choice in your solution.

- You will also need to include both logical and physical network diagrams for the current and proposed network.

- You will also need to provide a layout of your high school showing where your network devices are located.

Remember that it is a school and access to the Internet will need to be controlled and some sites blocked. You will need to make a number of assumptions regarding the school layout and organisational structure, existing software; hardware and circuit, user communities and network use patterns , etc. which will need to be documented in the appropriate sections of your report. Your report must also include explanations justifying the design decisions you have made.

You are strongly advised to adapt the suggested Report Template available on MySCU unit site. Please note presentation and referencing are also important.

To help make the various assumptions the following preferences are available from the client:

IT Platform: Server 2012 Microsoft Office/Adobe multimedia software Cisco hubs/switches/routers

School Hosted Messaging to contact students/teachers by School Management System (sms).

Number of students could be around between 500-700. Students form communities of users based on subjects. Some do multimedia design while others do less computer intensive subjects. Each lab needs a suite of software which matches the interests of these communities of students. Assume one computer lab is multimedia, one computer lab is programming and the third computer lab is business studies.

Size and layout of the school: make any assumption based on a school you are familiar with.

No real ceiling on network budget. However assumption should be reasonably justifiable.

Hint: work out the needs for each of the communities of users.

Reference no: EM13850996

Questions Cloud

Analyze and discuss the failure and apply the laws : Analyze and discuss the failure and apply the laws given in the text showing clearly how the application of the laws might have lessened or even prevented the failure.
Closing case- china limits exports of rare earth materials : Closing Case- China Limits Exports of Rare Earth Materials. Which group benefitted the most from China imposing an export quota on rare earth metals? Did it give the Chinese domestic manufacturers a significant cost advantage
The issue of the us government using technology to spy : Create your blog on the issue of the US government using technology to spy on US citizens and/or foreign nations. Remember, your article must contain an author and a date AND be from the past 12 months.
Program demonstrates simple symmetric-key encryption : This program demonstrates simple Symmetric-key Encryption using the XOR instruction with a multi-byte key entered by the user. Use this key to encrypt and decrypt the plain text
Design a modern network for a private high school : Design a Modern Network for a Private High School. The network is proposed to achieve the above objectives considering the school's following business and technical goals.
Implementing a new performance appraisal system : Topic: An integrative approach to managing people issues arising from implementing a new performance appraisal system. Question: You are the team leader of an organisational and development unit within a human resources department of a large univer..
Calculate the value of this estimate for the sample : What is the unbiased estimate of the difference in height between boys and girls? Provide a formula and check the unbiasedness. Calculate the value of this estimate for the given sample.
How does the magnitude of electric force : How does the magnitude of electric force compare between a pair of charged particles when they are brought to half their original distance of separation? To one-quarter their original distance? To 4 times their original distance? (What law guides you..
The football players at rutgers state university : During a workout, the football players at Rutgers State University ran up the stadium stairs at a steady pace in 48 s. The stairs are 90 m long and inclined at an angle of 31o. If a typical player has a mass of 90 kg, estimate the average power outpu..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Organizations security policies and procedures

Analyze the chosen organization's security policies and procedures, and provide an opinion of whether or not its policies and procedures are strong from an information security standpoint

  How can the trusted boot functions prevent the unauthorized

Why would IBM be an advocate for open standards? Why would it change its proprietary ESS 1.0 chip—which it had already sold in some ofits PL300 desktops and T23 ThinkPad notebooks,and which it had paid a Common Criteria Testing Laboratory to evaluate..

  Strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  Discuss the difference between hmac and mac

The Message Authentication Code (MAC) is a widely used technique for performing message authentication, and one MAC algorithm has emerged as the Internet standard for a wide variety of applications: Hash-Based Message Authentication Code (HMAC)

  Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Topographical layout of the current and planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Describe the crypto dilemma

AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore's requirements as stated above. How would a successful candidate respond?

  Computer security is not an issue for organizations alone

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Determine impact of at least five potential logical threats

Determine the impact of at least five (5) potential logical threats that require attention. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd