Network Design Paper

Decent Essays
Network Design Paper

Background:
Your small business received a contract award to upgrade the network of the UMUC branch office located in Mannheim, Germany. Currently, each department has its own network with its own DSL connection. Students and faculty members have to access each department through the Internet to access resources. Also, each department has added computers by using switches and repeaters.

Some of the major problems of the networks are:
High rate of collisions
Slow speed due to a large broadcast domain
High administrative cost due to a lack of centralized network management
Lack of backup WAN connectivity
Lack of data backup on servers
Inadequate network security
Use of manually assigned IP addresses
Here is
…show more content…
| Staff | To be determined by students | Network ConnectingDevices | ? | IT Staff | To be determined by students | Printers | ? | Staff | To be determined by student | Printers | ? | Instructional | To be determined by student |

Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria: * Student-accessed computers should be on separate network from the staff-accessed computers. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the Administrative network. The computers in the instructional computer labs and classrooms that will be used for classes should be on the Instructional network. The wifi and the computers in the student lobby should be in the Public network. * The whole building will share one Internet access connection (T-1 link from Telekom). This connection will come into the Server Room on the first floor. The Public IP address for the router here is 191.1.15.1 * Security is very important for UMUC as we have to protect students and employees data as well as any intellectual property that UMUC has on the servers and

Related Documents

  • Improved Essays

    Employees who require privileged access to administer devices and services on the network, should be issued a second card with separate administrative credentials. b)…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    TWC will provide primary service and AT&T will provide backup service if TWC service is down, the routers are configured to automatically switch between the connections when down, to reduce the amount of time the IT staff must deal with this. TWC will connect to Cisco switch #3 in the network drawing and AT&T will connect to Cisco switch # 1. The internet modems will have a connection point to both Cisco switches in the network. At the West and East branch, a new network fiber Internet VPN link will give access to the main branch office as the backup connection in case of unplanned outages or regular maintenance performed on network equipment, to ensure the network is always up as the bank management requires. It will only be active if the main WAN connection goes offline or experience connectivity issues to reduce the financial cost of adding the network link to the branch offices.…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    1. I have completed my survey for the Information Technology Infrastructure Library Course and have received my passing score 26\40. 2. Kim Rymsha’s computer is back in her office and both her personal and network printers have been connected to her Pc. 3. Docsvault has been completely installed on Lisa Cabrera.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The main goal is to make this system as user friendly as possible, therefore investing in something costly but feasible now will hopefully pay off in the nearby future. Help and support will not be provided, however, we aim to avoid making this system complicated to use, so hopefully, employees will be able to pick up on it the first time round. In the developing world of technology, it is simply not good enough to do everything by hand, and to rely on humans to do certain tasks. We can increase productivity by allowing the computers to do the majority of the work. Different people will use the system for different things.…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The essential requirements of the organization is voice correspondence on which the whole business depends. In this way, the administration needs to pick the alternative which can improve the execution of the voice correspondence alongside the system versatility, cost adequacy and adaptability. As indicated by the given situation, the organization is offering for two alternatives, an exchanged Ethernet 100-Base – T network or Wi-Fi network. Both of these choices have their advantages and disadvantages and should be picked by the necessity. The organization can likewise concentrate on introducing voice only lines which may have better reliability and high performance for voice transfer.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Due to the fact that all of your communication systems will be unified under this secure network, you will be able to enjoy maintenance and operations savings on a monthly basis. BroadConnect’s phone systems provide portable connectivity through a private…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    AMT2 Service Line Development Task 4 Echo Breen A. Determine the feasibility of one of the proposed service lines in the attached “Service Line Development Case Study” by doing the following: A1. Evaluate the demand for the new service line in the market area defined in the case study. Trinity Community Hospital (TCH) has the opportunity to develop a new orthopedic service line. It is anticipated that there will be a huge increase in need for orthopedic services within the next 5 years; orthopedic cases will increase by 46%, joint and spine procedures will increase by 30% and outpatient joint and spine procedures will increase by 350%.…

    • 1461 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Bestvalue Case Study

    • 268 Words
    • 2 Pages

    Some dangers for BestValue in the new markets of Memphis and New Orleans include an inability to service customers as quickly and professionally. These two new markets are farther away and will require more travel time for service technicians. In addition, these new markets are relatively big. Consequently, if BestValue enjoys any success at all in selling its products in these areas, it may have to hire new service personnel.…

    • 268 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Inappropriate Violation

    • 556 Words
    • 3 Pages

    Inappropriate use as described below is a violation of the AUP. These violations may results in severe consequences. If you have questions regarding these violations of appropriate use please contact your school administrative team. INAPPROPRIATE/UNACCEPTABLE USE Tier 1: Inappropriate Use (includes but not limited to the following): Using any browser other than those approved by the district Making unapproved software installs to computers Using computers not assigned to you when not approved (Teachers may allow students to look on with another student for instructional purposes only) Videoing or recording on school property when not related to a school assignment Messaging or chatting during class when not expressly permitted by the teacher…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One of the most important pioneers for this concept was Arturo Soria y Mata; he was an urban planner from Spain. His concept first appearance was in an article in Madrid famous journal of the time, where Soria tackles the municipal policies of planning, advising a radical measure for the future planning of Madrid. The Linear City concept had as principal idea one strip of 500 meters wide, the long of the strip would be the necessary, by necessary we mean it could be as long as the city would require. In the center of this strip, the main actor would be the train line and tranvia. Main pipes for water, gas, sewage, electricity etc.…

    • 770 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays

Related Topics