Define the topology that will be used

Assignment Help Computer Networking
Reference no: EM131201354

Assignment

Overview

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

• Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).

• There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.

• The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

• Physical Network Design
• Network Addressing
• Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

• Include at least five scholarly references.
• Use IEEE-style citations.
• Use correct network terminology.
• The use of diagrams is encouraged.

Use this template as a guide while creating your Network Design Proposal (Parts 1-3).

Physical Network Design

In this section, address each of the following.

1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

1. Watch How to Subnet a Network Video provided in Content -> Project Instructions

2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 - 3

3. Complete the subnet chart provided at the end of the document.

Network Services Design

In this section, address each of the following.

1. Identify network services needed.
2. List additional servers or network devices needed to implement the network.
3. List network security measures to be implemented.
4. Justify the need for the network services, security measures, and devices you've selected.

Building Details

The 50-year-old, two-story building has the following layout:

(FOR LAYOUT OF BUILDING, SEE THE WORD DOCUMENT TITLED "BUILDING LAYOUT").

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

Reference no: EM131201354

Questions Cloud

Discuss the types of insurance available for the van : The high rates of malpractice suits raise the question, "Should healthcare professionals not be allowed to make any mistakes?" Consider the following case. In your estimation, is failing to pursue further testing simply a mistake? Consider this fr..
Compute the real power consumed by the circuit f : The real power consumed by the circuit f. The reactive power consumed by the circuit g. The impedance of the circuit
Benefits to engaging in a computer science : What are the benefits to engaging in a Computer Science major and what fields will allow me to branch out to?
Which structure do you think would be most effective : Risk can be minimized, but not eliminated. Give an example of a risk management solution being taken too far, and explain how you would judge how far is too far. Give another example of a situation where you must accept a certain level of risk bec..
Define the topology that will be used : Define the topology that will be used. Select the appropriate network media. Select the appropriate network connecting devices, including network security devices.
Derive a subnet mask for a point to point connection : In this assignment you will design a small network. Instructions Derive a subnet mask for a point to point connection. You have the following address 10.0.1.32/27
Find the steady-state of the economic system : ECON 4001 Assignment. Assume that b 0; γ > 0; F > 0;G > 0; c- > 0: Find the steady-state of the economic system. Examine the stability of the economic system
Calculate the phase shift in degrees : The waveform of an ac voltage can be expressed by V=180 sin(300t + 3)
Using adam smiths canon evaluate federal income tax : How does the pay-as-you-go procedure apply to wage earners? -To persons who have income from sources other than wages?

Reviews

Write a Review

Computer Networking Questions & Answers

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

  Tasks write the following protocols - protocol 1 a and b do

tasks write the following protocols - protocol 1 a and b do not share any secret. write a key exchange protocol for a

  Assignment on network reconfiguration

Suppose the image below is your company's network diagram after a merger and you have recently added access controls to your network. The CSO would like to:Change the internal network address to incorporate variable length subnet mask (VLSM) with E..

  Specifics type and explain dell pentium

The office has 4 separate rooms, each one with its own set up of dental equipment and 1 X-ray room

  Write paper about effects of mobile devices on cybersecurity

Write a paper about The effects of mobile devices on cybersecurity.

  Network consultation for designit

Network Consultation for DesignIT The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted w..

  1identify which are the weak spots for mas in its

1.identify which are the weak spots for mas in its relationship with buyers. how can mas improve its collaboration with

  Which option is closest to the average rate of data transfer

if each uncompressed image is sent back to the control centre for processing, which option is closest to the average rate of data transfer?

  Discuss frequency sets that are used for wi-fi networks

What other devices in a business or home might cause interference with these frequencies. How does 802.11ac utilize these frequencies

  You are the network engineer contracted to established a

you are the network engineer contracted to established a wan connectivity between two office locations for a local

  Which is physical and which is the data link layer device

Which is the physical and which is the data link layer device? What difference in the two results in them operating at different layers of the Internet model?

  Explain the basics of networking and security issues

The project text needs to be grammatically correct with correct spelling and sentence structure when applicable. Remember to cite ideas that are not your own - Explain the basics of networking and security issues to other people.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd