Network design paper

Assignment Help Computer Network Security
Reference no: EM13819739

Network Design Paper

 The University has recently leased a building in Adelphi, Maryland.  The building will house some offices, classrooms, library, and computer labs.

 Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

 The 50-year-old two-story building has the following layout:

 There will be six computer labs (in the building diagram above, these labs are the classroom with closet in them) that will be used for instruction.  Each of these labs will have 21 computers (20 student computers and 1 instructor computer).  Each of these labs will also have a server in the closet located inside the lab.

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework.  There will be 30 computers in this lab and a server in the closet.

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 3 computers for Library staff.

There are five lecture classrooms in the building.  Each of this room will have a computer for instructor’s use.

Finally, there are various offices in the building.  Each of these offices will have one computer for staff use, with the exception of the Admission office that will have 5 computers for staff use.

Equipment Inventory

Workstation

Placement

Number of

Computers

Users

Total Computers

6 Instructional

Computer labs

21

Student and

Faculty

126

Student Computer Lab

30

Student

30

6 various offices

6

Staff/Faculty

6

Admission office

5

Staff

5

Library

10

Student

10

Library

3

Staff

3

5 classrooms

1

Faculty

5

Server

 

Staff

To be determined by students

Network Connecting Devices

 

IT Staff

To be determined by students

Printers

 

 

To be determined by student

 Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

·         Student-accessed computers should be on separate network from the staff-accessed computers.

·         The whole building will share one Internet access connection (T-1 link from Verizon).  This connection will come into the Server Room on the first floor.

·         Security is very important for UMUC as we have to protect students and employee’s data as well as any intellectual property that UMUC has on the servers and computers.

·         The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

·         The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

1.      Define the subnet (based on: rooms, floor, department, or other criteria).

2.      For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

 

Network Design:

1.      Define the topology that will be used. 

2.      Select the appropriate network media to use.

3.      Select the appropriate network connecting devices to use.

4.      Physical layout of the computers on the floor plan.

5.      List of additional servers, network devices, or network services needed to implement the network.

6.      Justifications for your network design (number 1 – 5 above)

 

You will be evaluated on your ability to

·         Implement appropriate IP addressing scheme (LabSim 5.0)

·         select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment (LabSim 2.0)

·         select and justify appropriate topology such as star, bus, or ring for your network (LabSim 1.0)

·         select and justify of your selected network equipments (LabSim 2.0, 3.0, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify appropriate network services to meet network requirements (LabSim 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify security implementation for the network (LabSim 8.0)

·         use proper grammar, formatting, network terminology, and reference citations

 

Reference no: EM13819739

Questions Cloud

In computer science define denial of service : Denial of Service
Sales to a large corporate customer in austria : NPV and Financing. Louisville Co. is a U.S. firm considering a project in Austria which it has an initial cash outlay of $7 million. Louisville will accept the project only if it can satisfy its required rate of return of 18 percent. The project woul..
Which aspects of your personality have changed over time : Reflect on your life history and discuss which aspects of your personality have changed over time and which aspects have stayed consistent.
Sensitivity of npv to conditions : Sensitivity of NPV to Conditions. Burton Co., based in the U.S., considers a project in which it has an initial outlay of $3 million and expects to receive 10 million Swiss francs (SF) in one year. The spot rate of the franc is $.80. Burton Co. decid..
Network design paper : Network Design Paper
Values for a lump sum assuming annual compounding : 1 A. Find the following values for a lump sum assuming annual compounding: a. The future value of $500 invested at 8 percent for one year b. The future value of $500 invested at 8 percent for five years c. The present value of $500 to be received in ..
Discuss risk methodologies used in capital budgeting : Was there further financial information that you required that was not provided to you? What financial figure do you believe was the determinant to your decision and why? How would you be able to apply this particular financial information to other s..
What cause people perceptions regarding literature to change : What causes people's perceptions regarding the value of literature to change? How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?
Underlying principles or ideas for theory : Summarize the underlying principles or ideas for theory/approach - Explain why this theory/approach is important to understand and how it will benefit your work with children.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security awareness on the internet

Search for security awareness on the internet. Describe the available materials. Choose one of the web sites that might work for security awareness program at your school

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Select risk assessment methodology and give your rationale behind the one you chose.

  The classification is revealed by analyzing the information

The classified information is contained in the existing document and has been paraphrased in the new document. The SCG identifies the test firing dates as Secret information. No additional interpretation was needed to identify this information's c..

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Consider now the inheritance of properties of new processes

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

  Network security policy plan

Explain why you believe these are important, and include examples of security breaches that can occur if these items are not outlined and followed.

  What are the specific limitations of a computer system

1. what are the specific limitations of a computer system that provides no operating system? what must be done to load

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd