Protect intellectual property that umuc has on the servers

Assignment Help Computer Networking
Reference no: EM13784895

The University has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, library, and computer labs.

Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet

The 50-year-old two-story building has the following layout:

There will be six computer labs that will be used for instruction. Each of these labs will have 22 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.

In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.

The library will also have some computers to allow students access to the library resources. There will be 10 computers for student's use in the library, and 5 computers for Library staff.

There are five lecture classrooms in the building. Each of this room will have a computer for instructor's use.

Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use.

Equipment Inventory

Workstation

Placement Number of

Computers Users Total Computers

6 Instructional

Computer labs 22 Student and

Network Connecting Devices IT Staff To be determined by students

Printers To be determined by student

Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

• Student-accessed computers should be on separate network from the staff-accessed computers.

• The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor.

• Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.

• The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

• The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):

Network Addressing:

1. Define the subnet (based on: rooms, floor, department, or other criteria).

2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

Physical Network Design:

1. Define the topology that will be used.

2. Select the appropriate network media to use.

3. Select the appropriate network connecting devices to use.

4. Physical layout of the computers on the floor plan.

5. List of additional servers or network devices needed to implement the network.

6. Justifications for your network design (number 1 - 5 above)

You will be evaluated on your ability to

o Implement appropriate IP addressing scheme

o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment

o select and justify appropriate topology such as star, bus, or ring for your network

o select and justify of your selected network equipments

o select and justify appropriate network services to meet network requirements

o select and justify security implementation for the network

o use proper grammar, formatting, network terminology, and reference citations

Reference no: EM13784895

Questions Cloud

Which is more important, acting morally or legally : 1. One top CEO says that "integrity is like oxygen. If you don't have it, nothing else matters." What does this mean? 2. Rev. Kevin Wildes of Georgetown University says humans rationalize their behavior. "We just have this view that nobody's really g..
Public perception of penalties for white-collar crime : Discuss your perception and the public perception of penalties for white-collar crime. Compare and contrast penalties for white collar and other forms of crimes. Discuss why you think the penalties should be similar or different for at least three (3..
Myers-briggs type indicator : Over the years, trait theory has been increasingly used by corporations in hiring and in career counseling. Research has shown that certain combinations of personality traits fit well with different career paths. Thus, personality trait tests for ..
Project management principles-processes : Assess the value in your experience as you have applied project management principles, processes, or techniques to a real-life situation in which you are currently involved. If any part of this experience has been problematic for you, ask your classm..
Protect intellectual property that umuc has on the servers : Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.
Fixed assets turnover ratio : Its sales for the year were $32,000,000. Its EBIT for 20XX was $1,500,000, and its accumulated depreciation on fixed assets was $4,000,000. What was its fixed assets turnover ratio.
About the round trip : A car rental company is located three miles from the airport. A shuttle bus runs every two minutes on average doing a round trip between the airport and the rental company. The average round trip is 20 minutes. How many buses are needed?
How could monie have protected himself : What arguments can be made to hold Owen Monie liable for any debt of the corporation arising from this death? Should the parents prevail? How could Monie have protected himself against such potential liability
Explain a problem in your community and how you solve this : Explain a problem in your community and how you might solve this problem if you were a police officer. Who might need to be involved in the process? What resources might be needed?

Reviews

Write a Review

Computer Networking Questions & Answers

  How web caching can reduce delay in receiving object

Describe how Web caching can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested by a user

  Technique to create tcp connection without nat configuration

Try to devise a technique that will allow Arnold to establish a TCP connection with Bernard without application-specific NAT configuration. If you have difficulty devising such a technique, discuss why.

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

  The interconnections between network devices

The interconnections between network devices and The Internet cloud, generically, to represent your network's interface to the Internet

  What version of http is the server running

List and discuss the four broad classes of services that a transport protocol can provide. For each of the service classes, indicate if either UDP or TCP (or both) provides such a service.

  Describe the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface and explain the elements and capabilities of a fault, configuration, accounting, performance, and security server

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  What is the minimum size of an icmpv4 packet

What is the minimum size of an ICMPv4 packet? What is the maximum size of an ICMPv4 packet?

  Choose one of the kinds of network processors such as hubs

select one of the types of network processors such as hubs switches routers and gateways? what are the advantages and

  What are the five areas of network management

Generalize the basic approaches we used for making the best out of best effort service for real-time interactive multimedia applications and why RTSP is called an out of band control protocol? Find out another protocol that also uses out of band c..

  Wireless networks are becoming increasingly popular but

wireless networks are becoming increasingly popular but many organisations fear that they are a large security risk.

  Explain ftp and tftp and main differences

Explain what "DHCP client", "DHCP server", and "Relay agent" are and how they work together.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd