Provide a physical layout of the computers on the floor plan

Assignment Help Computer Networking
Reference no: EM131207783

Network Assignment

Overview

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

• Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).

• There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.

• The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

• Physical Network Design
• Network Addressing
• Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

• Include at least five scholarly references.
• Use IEEE-style citations.
• Use correct network terminology.
• The use of diagrams is encouraged.

Use this template as a guide while creating your Network Design Proposal (Parts 1-3).

Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

1. Watch How to Subnet a Network Video provided in Content -> Project Instructions
2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 - 3
3. Complete the subnet chart provided at the end of the document.

Network Services Design

In this section, address each of the following.

1. Identify network services needed.
2. List additional servers or network devices needed to implement the network.
3. List network security measures to be implemented.
4. Justify the need for the network services, security measures, and devices you've selected.

Building Details

The 50-year-old, two-story building has the following layout:

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

Reference no: EM131207783

Questions Cloud

Journalize the adjusting entries : Journalize the adjusting entries. Add additional accounts as needed. - Determine the balances of the accounts affected by the adjusting entries and prepare an adjusted trial balance.
Invest capital resources to develop the product or service : In Week 3, you selected a product or service that you believe your organization should invest capital resources to develop the product or service for sale. To speed up the new product investment, you decide to write a memo proposing and advocating..
Describe the format of the meeting that you attended : Include the address, date, start time, and end time of meeting. Describe the format of the meeting that you attended. Describe the contents of the meeting.
Prepare in journal form the entry to record each transaction : Castle Consulting Agency began business in February.- Prepare in journal form the entry to record each transaction.
Provide a physical layout of the computers on the floor plan : Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above).
Facilitate consultation and participation : Q.1 What methods can be used to facilitate consultation and participation? Discuss in 100-120 words Q. 2 Explain (100-120 words) the barriers you think might prevent effective communication of health and safety information.
How the two countries are similar in terms of hofstede''s : Given a scenario where two organizations, one located in each country, are to do business with each other, provide recommendations that would be beneficial in helping management address communications in terms of the different cultural perspective..
Prepare a corrected balance sheet : Identify the assumptions that Millie has violated and explain how each event should have been handled. Prepare a corrected balance sheet.
How much influence should stakeholder interests exert : Current trends indicate that for-profit companies are paying close attention to stakeholder interests. How much influence should stakeholder interests exert over a for-profit company? Why?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine total end-to-end delay to send packet of length l

Suppose that switches user store-and forward packet switching, determine the total end-to-end delay to send packet of length L?

  Tcb subsets are said to leverage purely hierarchical

tcb subsets are said to leverage purely hierarchical domains ordered by privilege.explain the relation between these

  What are queues

What are queues? Explain in detail.

  Data mining by evolutionary computation

Data Mining by Evolutionary Computation and Genetic Learning, Write a brief report that summarizes your activities and results including at least (1) name and source of the evolutionary learning system used, and a brief description about the syste..

  Explain effect of tcp flow control

Host A can send application data into link at 100Mbps but Host B can read out of its TCP receive buffer at maximum rate of 50Mbps. Explain the effect of TCP flow control.

  What are all the protocol steps that take place

What are all the protocol steps that take place, starting from powering on your PC to getting the web page? Assume there is nothing in our DNS or browser caches when you power on your PC

  Word document that contains a print screen image

Managing switch operations requires a deep knowledge of the spanning tree protocol. Review LabSim modules 7.4, 7.5, and 7.9, which are related to the basic understanding, use, and troubleshooting of the spanning tree protocol.

  How does mimo differ from channel bonding

Devices that support the 802.11g standards are typically compatible with which other wireless standard? How does MIMO differ from channel bonding

  What would you offer as a network suggestion

they want the routing information of all four networks to be available at each site, so that any employee can go to any site, and work from them, and they are worried about passing traffic over the Internet. What would you offer as a network sugge..

  What is the application layer primarily concerned

With what is the Application layer primarily concerned and what is the broadcast address of the subnet address 178.55.20.88 255.255.0.0?

  Evaluate two network monitoring technologies

As a network manager in a medium-size corporation, it is your responsibility to use a proactive approach to providing security to your network. Evaluate 2 network monitoring technologies. These should be able to provide you with a graphical look at..

  Question 1aname five significant activities involved in a

question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd