Network design paper

Assignment Help Computer Network Security
Reference no: EM13819739

Network Design Paper

 The University has recently leased a building in Adelphi, Maryland.  The building will house some offices, classrooms, library, and computer labs.

 Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

 The 50-year-old two-story building has the following layout:

 There will be six computer labs (in the building diagram above, these labs are the classroom with closet in them) that will be used for instruction.  Each of these labs will have 21 computers (20 student computers and 1 instructor computer).  Each of these labs will also have a server in the closet located inside the lab.

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework.  There will be 30 computers in this lab and a server in the closet.

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 3 computers for Library staff.

There are five lecture classrooms in the building.  Each of this room will have a computer for instructor’s use.

Finally, there are various offices in the building.  Each of these offices will have one computer for staff use, with the exception of the Admission office that will have 5 computers for staff use.

Equipment Inventory

Workstation

Placement

Number of

Computers

Users

Total Computers

6 Instructional

Computer labs

21

Student and

Faculty

126

Student Computer Lab

30

Student

30

6 various offices

6

Staff/Faculty

6

Admission office

5

Staff

5

Library

10

Student

10

Library

3

Staff

3

5 classrooms

1

Faculty

5

Server

 

Staff

To be determined by students

Network Connecting Devices

 

IT Staff

To be determined by students

Printers

 

 

To be determined by student

 Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

·         Student-accessed computers should be on separate network from the staff-accessed computers.

·         The whole building will share one Internet access connection (T-1 link from Verizon).  This connection will come into the Server Room on the first floor.

·         Security is very important for UMUC as we have to protect students and employee’s data as well as any intellectual property that UMUC has on the servers and computers.

·         The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

·         The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

1.      Define the subnet (based on: rooms, floor, department, or other criteria).

2.      For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

 

Network Design:

1.      Define the topology that will be used. 

2.      Select the appropriate network media to use.

3.      Select the appropriate network connecting devices to use.

4.      Physical layout of the computers on the floor plan.

5.      List of additional servers, network devices, or network services needed to implement the network.

6.      Justifications for your network design (number 1 – 5 above)

 

You will be evaluated on your ability to

·         Implement appropriate IP addressing scheme (LabSim 5.0)

·         select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment (LabSim 2.0)

·         select and justify appropriate topology such as star, bus, or ring for your network (LabSim 1.0)

·         select and justify of your selected network equipments (LabSim 2.0, 3.0, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify appropriate network services to meet network requirements (LabSim 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify security implementation for the network (LabSim 8.0)

·         use proper grammar, formatting, network terminology, and reference citations

 

Reference no: EM13819739

Questions Cloud

In computer science define denial of service : Denial of Service
Sales to a large corporate customer in austria : NPV and Financing. Louisville Co. is a U.S. firm considering a project in Austria which it has an initial cash outlay of $7 million. Louisville will accept the project only if it can satisfy its required rate of return of 18 percent. The project woul..
Which aspects of your personality have changed over time : Reflect on your life history and discuss which aspects of your personality have changed over time and which aspects have stayed consistent.
Sensitivity of npv to conditions : Sensitivity of NPV to Conditions. Burton Co., based in the U.S., considers a project in which it has an initial outlay of $3 million and expects to receive 10 million Swiss francs (SF) in one year. The spot rate of the franc is $.80. Burton Co. decid..
Network design paper : Network Design Paper
Values for a lump sum assuming annual compounding : 1 A. Find the following values for a lump sum assuming annual compounding: a. The future value of $500 invested at 8 percent for one year b. The future value of $500 invested at 8 percent for five years c. The present value of $500 to be received in ..
Discuss risk methodologies used in capital budgeting : Was there further financial information that you required that was not provided to you? What financial figure do you believe was the determinant to your decision and why? How would you be able to apply this particular financial information to other s..
What cause people perceptions regarding literature to change : What causes people's perceptions regarding the value of literature to change? How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?
Underlying principles or ideas for theory : Summarize the underlying principles or ideas for theory/approach - Explain why this theory/approach is important to understand and how it will benefit your work with children.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd