Define the subnet

Assignment Help Computer Networking
Reference no: EM13809088

There will be seven instructional computer labs that will be used for instruction. Each of these labs will have 30 computers (29 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.

 

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 50 computers in this lab and a server in the closet.

 

The library will also have some computers to allow students access to the library resources. There will be 20 computers for student's use in the library, and 3 computers for Library staff.

 

There are seven lecture classrooms in the building. Each of this room will have a computer for instructor's use.

 

Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 7 computers for staff use.

 

Equipment Inventory

 

Workstation

Placement

Number ofComputers

Users

Total Computers

7 Instructional Computer labs

30

Student and Faculty

210

Student Computer Lab

50

Student

50

10 various offices

10

Staff/Faculty

10

Admission office

7

Staff

7

Library

20

Student

20

Library

3

Staff

3

7 classrooms

1

Faculty

7

Server

 

Staff

To be determined by students

Network Connecting Devices

 

IT Staff

To be determined by students

Printers

 

 

To be determined by student

 

Two server rooms have been allocated, one on the first floor and one on the second floor.

 

Your task is to design the network for this new building with the following criteria:

 

  • Student-accessed computers should be on separate network from the staff-accessed computers.
  • The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor.
  • Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.
  • The network has been assigned the 172.30.0.0/16 network address for all computers and devices. For Internet routing use 64.24.1.1 IP address.
  • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

 

Submission should include (in no more than ten pages, excluding diagrams and references):

 

Network Addressing:

 

  1. Define the subnet (based on: rooms, floor, department, or other criteria).
  2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

 

Physical Network Design:

 

  1. Define the topology that will be used.
  2. Select the appropriate network media to use.
  3. Select the appropriate network connecting devices to use.
  4. Physical layout of the computers on the floor plan.
  5. List of additional servers or network devices needed to implement the network.
  6. Justifications for your network design (number 1 - 5 above)

 

You will be evaluated on your ability to

 

  • Implement appropriate IP addressing scheme
  • select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment
  • select and justify appropriate topology such as star, bus, or ring for your network
  • select and justify of your selected network equipments
  • select and justify appropriate network services to meet network requirements
  • select and justify security implementation for the network
  • use proper grammar, formatting, network terminology, and reference citations.

Reference no: EM13809088

Questions Cloud

Major capacity considerations in a hospital : What are some major capacity considerations in a hospital? How do they differ from those of a factor. Management may chose to build up capacity in anticipation of demand or in response to developing demand. Cite the advantages of both approaches.
Intensity of today global competition : What factors are contributing to the intensity of today's global competition? What are the advantages and disadvantages of direct investment in a foreign market?
Draw a gantt chart for this project : Draw a Gantt chart for this project? What is the project completion time? Draw a activity on node network for this project
Independent samples taken from two populations : The Following results are for two independent samples taken from two populations.
Define the subnet : Define the subnet (based on: rooms, floor, department, or other criteria). For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers o..
Importance of identifying norms within a team : Discuss the importance of identifying norms within a team? Why is clear communication considered an essential element during team development? Provide an example when you were a team member and the lack of communication caused significant problems..
Explain what was the cold war : What was the Cold War 1945-1991 and why was it given that title. Why was the United States seen as the "winner" in the Cold War. How was this accomplished without nuclear war
First checking for the cultural impact : Examines what the repercussions might be of applying a Western World theory in a non-Western area. Why would it be a risk to apply a Western theory without first checking for the cultural impact?
Write essay on racial profiling and stereotyping of african : Write a research essay on racial profiling and stereotyping of african americans. Main points are to describe the thesis in the intro. Brief history of the the start of racial profiling etc.

Reviews

Write a Review

Computer Networking Questions & Answers

  Create variant of kerberos in which workstation generate tgt

Create variant of Kerberos in which the workstation generates TGT. TGT will be encrypted with user's master key rather than KDC's master key.

  Explain the benefits of server-side software

Explain the benefits of server-side software and how it give mobile users with access to particular kinds of communications and information.

  Describe the company network and communication environment

Global Finance, Inc. Network Diagram-Describe the company network, interconnection, and communication environment

  Describe threats to information security

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

  Developed the 3gpp long-term evolution

The 3rd Generation Partnership Project (3GPP) developed the 3GPP Long-Term Evolution (LTE) standard for wireless communications technology

  Explain the concepts and building blocks of networks

Explain the concepts and building blocks of today's data communication networks, such as switches, routers, and cabling

  Implement cipher-combining ascii representation of plaintext

Particular cipher is implemented by combining ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using XOR function.

  Explain the networks fundamental characteristics and

write a 2- to 4-page paper that includes the following based on your organizationmiddot explain the networks

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

  Network consultation for designit

Network Consultation for DesignIT The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted w..

  Discuss the tcp and the udp application layer protocol

Discuss the TCP and the UDP application layer protocol. (the differences, advantages and disadvantages, services provided)

  Describe the use of tools for measuring quality of service

Determine appropriate protocols to ensure needed quality of service, which will allow for needed priorities in the organization and Identify and describe the use of tools for measuring quality of service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd