Design the network for this new building

Assignment Help Computer Networking
Reference no: EM13801857

Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

  • Student-accessed computers should be on separate network from the staff-accessed computers.
  • The whole building will share one Internet access connection (T-1 link from Verizon).  This connection will come into the Server Room on the first floor.
  • Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.
  • The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.
  • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

  1. Define the subnet (based on: rooms, floor, department, or other criteria).
  2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

Physical Network Design:

  1. Define the topology that will be used.
  2. Select the appropriate network media to use.
  3. Select the appropriate network connecting devices to use.
  4. Physical layout of the computers on the floor plan.
  5. List of additional servers or network devices needed to implement the network.
  6. Justifications for your network design (number 1 - 5 above)

You will be evaluated on your ability to

  • Implement appropriate IP addressing scheme
  • select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment
  • select and justify appropriate topology such as star, bus, or ring for your network
  • select and justify of your selected network equipments
  • select and justify appropriate network services to meet network requirements
  • select and justify security implementation for the network
  • use proper grammar, formatting, network terminology, and reference citations.

Reference no: EM13801857

Questions Cloud

What will the exp days column contain : If expiration_date contains a value that's equivalent to November 2, 2008 and the SYSDATE function returns a value that's equivalent to December 17, 2008, what will the exp_days column contain when this code is executed
Analyze the main types of federalism : Analyze the main types of federalism. Debate two to three (2-3) advantages and two to three (2-3) disadvantages of federalism as it relates to intergovernmental relations. Provide a rationale to support your response. Only one page no specific wor..
Is anything still unclear that could be clarified : Review and reflect on the knowledge you have gained from this course. Based on your review and reflection - What approaches could have yielded additional valuable information?
Ive an example of an adjusting journal entry for each of the : Give an example of an adjusting journal entry for each of the following transactions. Provide three correct responses: Equal growth of an expense and a liability. Earning of revenue that was previously recorded as unearned revenue. Equal growth of an..
Design the network for this new building : Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: Student-accessed computers should be on separate network from the staff-ac..
Consider the pizza market in a small college town : Consider the pizza market in a small college town with the following assumptions: - The market is in long-run equilibrium. - Each pizza shop sells 100 pizzas per week. (For ease of exposition, suppose that each shop sells only pizza and only one size..
Explain differences between the public and private sector : Formulate two to three (2-3) reason(s) why the terms public sector and private sector are not interchangeable. Generate two to three (2-3) differences between the public and private sector, and determine the key organizational goals of each. Prov..
Neighborhoods and communities : Neighborhoods and Communities
Write a program that prompts the user to input three numbers : Write a program that prompts the user to input three numbers. This program should then output the numbers in nondescending order.

Reviews

Write a Review

Computer Networking Questions & Answers

  Design the datagram for next header fields

Design the datagram and illustrate what contents of each of Next Header fields would contain. You do not have to look up actual numeric value, just explain what it would be referencing next.

  Shows a cdma example that supports two senders

It shows a CDMA example that supports two senders. Suppose that the receiver wanted to receive the data being sent by sender

  Compare and contrast operating system forensics

Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you conside..

  Single dsl router

if an office had two computers connected via Ethernet layer 2 switch,  sharing a single dsl router connected to the internet, which error detection scheme would be more suitable for this scenario?

  Explain slave drive-sharing same data cable-computer system

If the CD drive and hard drive are sharing same data cable in computer system, what kind of connection is CD drive using? Which of the two drives must be set to master?

  A company with headquarters at 1 talavera rd north ryde

a company with headquarters at 1 talavera rd north ryde wishes to obtain internet access. they require unlimited data

  How does packet switching use the mac address

How does packet switching use the MAC address? Reference other material that aided you in your understanding

  Develop a strategy to ensure this compatibility by using

imagine you have been hired as a network technology consultant for a small business. the owner of the business sally

  From the second e-activity decide which you would select to

envision that you are a systems administrator managing five different web servers for your company. each web server

  Probability of collision in computer network

In CSMA/CD, after the 6th collision, what is the probability that a node chooses k=7? The result k=7 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

  Explain llc and mac

Explain two layers: LLC & MAC, and how are they different from what is available in TCP/IP protocol? Why do we require these two extra layers for LAN?

  What is the ethernet standard used in such a vlan

Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd