Protect intellectual property that umuc has on the servers

Assignment Help Computer Networking
Reference no: EM13784895

The University has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, library, and computer labs.

Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

The 50-year-old two-story building has the following layout:

There will be six computer labs that will be used for instruction. Each of these labs will have 22 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student's use in the library, and 5 computers for Library staff.

There are five lecture classrooms in the building. Each of this room will have a computer for instructor's use.

Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use.

Equipment Inventory

Workstation

Placement Number of

Computers Users Total Computers

6 Instructional

Computer labs 22 Student and

Network Connecting Devices IT Staff To be determined by students

Printers To be determined by student

Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

• Student-accessed computers should be on separate network from the staff-accessed computers.

• The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor.

• Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.

• The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

• The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

1. Define the subnet (based on: rooms, floor, department, or other criteria).

2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

Physical Network Design:

1. Define the topology that will be used.

2. Select the appropriate network media to use.

3. Select the appropriate network connecting devices to use.

4. Physical layout of the computers on the floor plan.

5. List of additional servers or network devices needed to implement the network.

6. Justifications for your network design (number 1 - 5 above)

You will be evaluated on your ability to

o Implement appropriate IP addressing scheme

o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment

o select and justify appropriate topology such as star, bus, or ring for your network

o select and justify of your selected network equipments

o select and justify appropriate network services to meet network requirements

o select and justify security implementation for the network

o use proper grammar, formatting, network terminology, and reference citations

Reference no: EM13784895

Questions Cloud

Which is more important, acting morally or legally : 1. One top CEO says that "integrity is like oxygen. If you don't have it, nothing else matters." What does this mean? 2. Rev. Kevin Wildes of Georgetown University says humans rationalize their behavior. "We just have this view that nobody's really g..
Public perception of penalties for white-collar crime : Discuss your perception and the public perception of penalties for white-collar crime. Compare and contrast penalties for white collar and other forms of crimes. Discuss why you think the penalties should be similar or different for at least three (3..
Myers-briggs type indicator : Over the years, trait theory has been increasingly used by corporations in hiring and in career counseling. Research has shown that certain combinations of personality traits fit well with different career paths. Thus, personality trait tests for ..
Project management principles-processes : Assess the value in your experience as you have applied project management principles, processes, or techniques to a real-life situation in which you are currently involved. If any part of this experience has been problematic for you, ask your classm..
Protect intellectual property that umuc has on the servers : Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.
Fixed assets turnover ratio : Its sales for the year were $32,000,000. Its EBIT for 20XX was $1,500,000, and its accumulated depreciation on fixed assets was $4,000,000. What was its fixed assets turnover ratio.
About the round trip : A car rental company is located three miles from the airport. A shuttle bus runs every two minutes on average doing a round trip between the airport and the rental company. The average round trip is 20 minutes. How many buses are needed?
How could monie have protected himself : What arguments can be made to hold Owen Monie liable for any debt of the corporation arising from this death? Should the parents prevail? How could Monie have protected himself against such potential liability
Explain a problem in your community and how you solve this : Explain a problem in your community and how you might solve this problem if you were a police officer. Who might need to be involved in the process? What resources might be needed?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd