Network design paper

Assignment Help Computer Network Security
Reference no: EM13819739

Network Design Paper

 The University has recently leased a building in Adelphi, Maryland.  The building will house some offices, classrooms, library, and computer labs.

 Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

 The 50-year-old two-story building has the following layout:

 There will be six computer labs (in the building diagram above, these labs are the classroom with closet in them) that will be used for instruction.  Each of these labs will have 21 computers (20 student computers and 1 instructor computer).  Each of these labs will also have a server in the closet located inside the lab.

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework.  There will be 30 computers in this lab and a server in the closet.

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student’s use in the library, and 3 computers for Library staff.

There are five lecture classrooms in the building.  Each of this room will have a computer for instructor’s use.

Finally, there are various offices in the building.  Each of these offices will have one computer for staff use, with the exception of the Admission office that will have 5 computers for staff use.

Equipment Inventory

Workstation

Placement

Number of

Computers

Users

Total Computers

6 Instructional

Computer labs

21

Student and

Faculty

126

Student Computer Lab

30

Student

30

6 various offices

6

Staff/Faculty

6

Admission office

5

Staff

5

Library

10

Student

10

Library

3

Staff

3

5 classrooms

1

Faculty

5

Server

 

Staff

To be determined by students

Network Connecting Devices

 

IT Staff

To be determined by students

Printers

 

 

To be determined by student

 Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

·         Student-accessed computers should be on separate network from the staff-accessed computers.

·         The whole building will share one Internet access connection (T-1 link from Verizon).  This connection will come into the Server Room on the first floor.

·         Security is very important for UMUC as we have to protect students and employee’s data as well as any intellectual property that UMUC has on the servers and computers.

·         The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

·         The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

1.      Define the subnet (based on: rooms, floor, department, or other criteria).

2.      For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

 

Network Design:

1.      Define the topology that will be used. 

2.      Select the appropriate network media to use.

3.      Select the appropriate network connecting devices to use.

4.      Physical layout of the computers on the floor plan.

5.      List of additional servers, network devices, or network services needed to implement the network.

6.      Justifications for your network design (number 1 – 5 above)

 

You will be evaluated on your ability to

·         Implement appropriate IP addressing scheme (LabSim 5.0)

·         select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment (LabSim 2.0)

·         select and justify appropriate topology such as star, bus, or ring for your network (LabSim 1.0)

·         select and justify of your selected network equipments (LabSim 2.0, 3.0, 4.0, 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify appropriate network services to meet network requirements (LabSim 5.0, 6.0, 7.0, 8.0, 9.0)

·         select and justify security implementation for the network (LabSim 8.0)

·         use proper grammar, formatting, network terminology, and reference citations

 

Reference no: EM13819739

Questions Cloud

In computer science define denial of service : Denial of Service
Sales to a large corporate customer in austria : NPV and Financing. Louisville Co. is a U.S. firm considering a project in Austria which it has an initial cash outlay of $7 million. Louisville will accept the project only if it can satisfy its required rate of return of 18 percent. The project woul..
Which aspects of your personality have changed over time : Reflect on your life history and discuss which aspects of your personality have changed over time and which aspects have stayed consistent.
Sensitivity of npv to conditions : Sensitivity of NPV to Conditions. Burton Co., based in the U.S., considers a project in which it has an initial outlay of $3 million and expects to receive 10 million Swiss francs (SF) in one year. The spot rate of the franc is $.80. Burton Co. decid..
Network design paper : Network Design Paper
Values for a lump sum assuming annual compounding : 1 A. Find the following values for a lump sum assuming annual compounding: a. The future value of $500 invested at 8 percent for one year b. The future value of $500 invested at 8 percent for five years c. The present value of $500 to be received in ..
Discuss risk methodologies used in capital budgeting : Was there further financial information that you required that was not provided to you? What financial figure do you believe was the determinant to your decision and why? How would you be able to apply this particular financial information to other s..
What cause people perceptions regarding literature to change : What causes people's perceptions regarding the value of literature to change? How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?
Underlying principles or ideas for theory : Summarize the underlying principles or ideas for theory/approach - Explain why this theory/approach is important to understand and how it will benefit your work with children.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

  How does a password or authentication relate to cia triad

In these weeks readings, we learned about the CIA Triad and how each exhibits dependance on the other. Give examples of how failure of one security property

  Identify hardware and software needed to secure network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies

  Poor cybersecurity policy can disrupt business continuity

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

  Which of the following values is the maximum end-to-end

which of the following values is the maximum end-to-end transit time that can adequately support voice traffic on a

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  Security logic to specific forms in the web application

You will add additional security features to make the web application more secure. You will also add security logic to specific forms in the web application.

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Effectiveness of the physical and environmental security

Evaluate the effectiveness of the physical and environmental security measures that the organization you researched used in regard to protecting its assets

  Role of information security

Role of Information Security.

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd