Define the topology that will be used

Assignment Help Computer Networking
Reference no: EM131436863

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

Each Classroom Computer Lab will be on a separate network (i.e., subnet).

 The Library Computer Lab will be on a separate network

The Office / Admissions computers will also be on a separate network

 Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).

There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.

The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

Physical Network Design

In this section, address each of the following.

1.    Define the topology that will be used.

2.    Select the appropriate network media.

3.    Select the appropriate network connecting devices, including network security devices.

4.    Select the appropriate computer systems to use to support the network design.

5.    Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).

6.    Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

1.    Watch How to Subnet a Network Video provided in Content -> Project Instructions

2.    Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 - 3

3.    Complete the subnet chart provided at the end of the document.

Network Services Design

Requirements:

Include at least five scholarly references.

Use IEEE-style citations.

Use correct network terminology.

The use of diagrams is encouraged.

Attachment:- network_design_requirements.rar

Reference no: EM131436863

Questions Cloud

Composition of aluminum in aluminum oxide : 1. A 3.53-gsample of aluminum completely reacts with oxygen to form 6.67gof aluminum oxide. Use this data to calculate the mass percent composition of aluminum in aluminum oxide.
Calculating the number of drops : The number of drops that equals 1 mL of one M HCL is 34, what is the volume of HCL added by calculating the number of drops that equals 1 mL?
Explain how the business deduces the cost of each suitcase : Kaplan plc makes a range of suitcases of various sizes and shapes. There are ten different models of suitcase produced by the business. In order to keep inventories of finished suitcases to a minimum, each model is made in a small batch.
Suggest there is difference in mean number of hours worked : Is there any evidence to suggest that there is a difference in the mean number of hours worked per week due to region?
Define the topology that will be used : Define the topology that will be used. Select the appropriate network media. Select the appropriate network connecting devices, including network security devices. Select the appropriate computer systems to use to support the network design. Determin..
Forces of adhesion and cohesion responsible for matric : Are attractive forces of adhesion and cohesion responsible for Matric, Gravitational, Osmotic ore Pressure potential?
Calculate the ph for buffer : A buffer consists of 0.33 M H3PO4 and 0.1 M NaH2PO4. Given that the K values for H3PO4 are, Ka1 = 7.2 x 10-3, Ka2 = 6.3 x 10-8, and Ka3 = 4.2 x 10-13, calculate the pH for this buffer.
What type of solution did kim make : However she dropped 25g of the sugar while transferring to the blender, so only 75g of sugar were actually added. it turns out that the solubility of sugar is 75g/L. Based on this information what type of solution did Kim make?
Prepare a table of two columns and show phrase sentence : In a job costing system, it is necessary to divide up the business into departments. Fixed costs (or overheads) will be collected for each department. Where a particular fixed cost relates to the business as a whole, it must be divided between the..

Reviews

Write a Review

Computer Networking Questions & Answers

  Bull an application on computer a in network 1 is sending a

bull an application on computer a in network 1 is sending a message to an application on computer b in network 2.nbsp

  Question 1which one of the following statements about

question 1which one of the following statements about lot-sizing rules is true? the periodic order quantity poq rule

  A rural medical centre in australia

A rural medical centre in Australia plans to improve its services to the community by providing telemedicine and healthcare. The centre has 4 doctors working at a given time and some patients travel over 100km to see a doctor.

  Internet connections between offices are becoming slow

Campus Travel has recently found that its Internet connections between offices are becoming slow, especially during certain periods of the day. Since all the online traffic is maintained by another company, an increase in capacity requires a form..

  What major risks behind implementing cloud computing program

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

  Examine the various techniques that are used

Examine the various techniques that are used and select two that you would recommend being used in your organization and two that you would not recommend. Provide a rationale for your response.

  Explain four periodic events for real-time system

Assume that four events need 35,20,10, and x me=sec of CPU time, respectively. Dtermine the largest value of x for which system is schedulable?

  Maximum size of file-tcp sequence numbers are not exhausted

Consider transferring a large file of L bytes from Host A to Host B. Assume a MSS of 1460 bytes. What is the maximum value of L such that the TCP sequence numbers are not exhausted?

  Hackers system

I believe the hackers were able to break into their systems online rather than the pos. It is probably more risky to go into a store and use some type of card or product to hack into the system.

  About network security

Network security

  What types of servers to support the business

What type, topology and cabling of the enterprise LAN and what types of server(s) to support the business?

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd