List network security measures to be implemented

Assignment Help Management Information Sys
Reference no: EM131127585

You have been hired as part of the networking team at a university. After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has recently leased a building in Adelphi, Maryland. The building will house offices, classrooms, a library, and computer labs.

Security is important for the university, as the university must protect students' and employees' data, as well as any intellectual property that the university has on its servers and computers. As a result, IT management would like to take the time to review proposals on how best to move forward on security issues. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this building to support university operations.

Overview

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

· Student-accessed computers should be on a separate network from the staff-accessed computers. In addition, computers for public use should be on a separate network. The open-WiFi network should also be on a separate network.

· There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.

· The network has been assigned the 10.113.0.0/16 network address for all computers and devices.

Your proposal will be submitted in three major parts:

· Physical Network Design
· Network Addressing
· Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

· Include at least five scholarly references.
· Use IEEE-style citations.
· Use correct network terminology.
· The use of diagrams is encouraged.

Use this template as a guide while creating your Network Design Proposal (Parts 1-3).

Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.

2. Select the appropriate network media.

3. Select the appropriate network connecting devices, including network security devices.

4. Select the appropriate computer systems to use to support the network design.

5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).

6. Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

1. Define the subnets (based on rooms, floor, department, or other criteria).

2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, and define the network address, subnet mask, and available IP addresses to be used by computers or devices.

3. Show the calculations on how the subnet information is calculated.

Network Services Design

In this section, address each of the following.

1. Identify network services needed.

2. List additional servers or network devices needed to implement the network.

3. List network security measures to be implemented.

4. Justify the need for the network services, security measures, and devices you've selected.

Building Details

The 50-year-old, two-story building has the following layout:

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1,

Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 26 computers: 24 student computers, one instructor computer, and one server in the closet for instructional use.

In addition, there will be a student computer lab that will provide computer access to students to do their homework. There will be 25 computers in this lab and a server in the closet. To allow students access to library resources, the library will also have 10 computers for the general public to use and five computers for library staff.

Finally, there are offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

Reference no: EM131127585

Questions Cloud

Explain which is a better buy : A two-year $1,000 par zero-coupon bond is currently priced at $819.00. A two-year $1,000 annuity is currently priced at $1,712.52. If you want to invest $50,000 in one of the two securities, which is a better buy?
Compute the phase margin with the controller : An engineering laboratory has presented a plan to operate an Earth-orbiting satellite that is to be controlled from a ground station. A block diagram of the proposed system is shown in Figure CP9.7
What process is responsible for the surface mountains : What process is responsible for the surface mountains, oceanic trenches and other large-scale features on Earth's surface
Indicate with a yes or no whether or not each : 1. Indicate with a Yes or No whether or not each of the following accounts normally requires an adjusting entry.
List network security measures to be implemented : Define the subnets (based on rooms, floor, department, or other criteria). For each subnet, explain which devices/groups/users/rooms will be on this subnet, and define the network address, subnet mask, and available IP addresses to be used by compu..
Calculate for a sewing machine the rate of depreciation : Calculate for A sewing machine the rate of depreciation - the book value after 2 years
Determine the mass flow rate of the cooling water : Determine the (a) thermal efficiency and (b) the mass flow rate of the cooling water, in kg per kg of steam flowing.
What is the lowest cost schedule for this shortest time : Bay Community Hospital The staff of the Bay Community Hospital had committed itself to introduce a new diagnostic procedure in the clinic. This procedure required the acquisition, installation, and introduction of a new medical instrument. What is th..
Why do you suppose they do not have archaic names : Examine a list of the 88 constellations. Are there any constellations whose names obviously date from modern times? Where are these constellations located? Why do you suppose they do not have archaic names

Reviews

Write a Review

Management Information Sys Questions & Answers

  Approaches to solving business problems

AI systems are relatively new approaches to solving business problems. What are the difficulties with new IT approaches in general? For each of the systems we discussed, identify some advantages and disadvantages of AI systems over traditional busine..

  Determining vulnerabilities for a database server

Case Project: Determining Vulnerabilities for a Database Server, You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security resting of the Alexander Rocco Corporation. She informs you that the company is running..

  What data is being collected when a product is scanned

In a supermarket scanner system, what data is being collected when a product is scanned

  Supply chain questions for a beer wholesalerquestion 1

supply chain questions for a beer wholesalerquestion 1 focus on beer as an end item for the consumer. and you have to

  Qualities of data required for evaluating expenditure cycle

Explain the importance of three qualities of data required for evaluating expenditure cycle - Efficiency and Effectives of Expenditure Cycle Processes

  Advantages of a database management system

Classify advantages of a database management system and critique the role it plays in the storage, retrieval, and management of data in our world

  How business will be able to capitalize on the benefits

How business will be able to capitalize on the benefits - and how it can be used in different companies for different solutions

  Comparisons and functions of mdm software

Functions and Comparisons of MDM Software - Evaluate which of the three would work best for your organization and explain why you think it would be the best choice.

  Write paper comparing the scrum and kanban software process

Scrum vs. Kanban. Some developers have said that Scrum is like a baby carriage compared to Kanban. Write a paper comparing the Scrum and Kanban software process. More specifically, analyze the similarities and differences according to these five a..

  Computer fraud and abuse act of 1986

Research the following U.S. information-related laws. Computer Fraud and Abuse Act of 1986 (CFAA)

  Describe how e-commerce begin and what made it successful

Describe how e-commerce begin and what made it successful. As a member of an IT staff, how can you use social media to support e-commerce? You can search business websites to find good practices of using social media in e-commerce

  Internal accounting systemsyou are the manager of an

internal accounting systemsyou are the manager of an accounting department and would like to hire another managerial

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd