Preview

Network Design

Powerful Essays
Open Document
Open Document
1434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Design
UMUC’s new building in Adelphi, MD will have to provide networking connectivity to students, professors, and staff. In order to begin the process of planning the new network, we will begin by planning the network IP addressing scheme. It is very important that the network IP addressing scheme be clearly defined in order for IT administrators to locate computers promptly. Also, in order to make it easier for the administrators, DHCP (Dynamic Host Configuration Protocol) will be used to assign IP addresses. The organization of the subnet layout will assist the IT administrators as well as making effective use of IP addresses. In order to differentiate between students, staff, and instructors, we will place them on different subnets. Also, the instructors subnet will begin with a “1” in the third octet, the staff subnet will begin with a “3”, and the students subnet will begin with a “4” or “5” in the third octet of the IP addresses. Lastly, the second digit of the third octet will assign the floor for each subnet. An even number in the second digit will mean that the computer or device on the subnet is located on the first floor and an odd number means that it is located on the second floor.
Network IP Addresses
First Floor
Subnet mask: 255. 255. 240. 0
Lecture Instructors
Network address: 10. 110. 16. 0
Subnet and range: 10. 110. 16. 2 – 10. 110. 16. 6
Staff (Library)
Network address: 10. 110. 32. 0
Subnet and range: 10. 110. 32. 2 – 10. 110. 32. 6
Admissions Staff
Subnet and range: 10. 110. 34. 2 – 10. 110. 34. 6
Office Staff (3)
Subnet and range: 10. 110. 36. 2 – 10. 110. 36. 4
Students (Library)
Network address: 10. 110. 48. 0
Subnet and range: 10. 110. 48. 2 – 10. 110. 48. 11
Second Floor
Students
Computer Lab #1: 10. 110. 49. 1 – 10. 110. 49. 23
Computer Lab #2: 10. 110. 49. 25 – 10. 110. 49. 47
Computer Lab #3: 10. 110. 49. 50 – 10. 110. 49. 72
Computer Lab #4: 10. 110. 49. 75 – 10. 110. 49. 97
Computer Lab #5: 10. 110. 49.



References: 1000 Mbps Gigabit Multi Mode Fiber Ethernet Media Converter SC 550m. (n.d.). Retrieved October 4, 2014, from http://www.startech.com/Networking-IO/Media-Converters/Fiber/1000-Mbps-Gigabit-Multi-Mode-Fiber-Ethernet-Media-Converter-SC-550m~MCMGBSC055 Beal, V. (n.d.). Star Network. Retrieved October 3, 2014, from http://www.webopedia.com/TERM/S/star_network.html http://netsecurity.about.com/od/quicktip1/qt/qtwifistaticip.htm Brother MFC Series All-In-One Printer Retrieved October 4, 2014, from Dell OptiPlex. Retrieved October 5, 2014, from http://www.newegg.com/Product/Product.aspx?Item=N82E16883156048&cm_re=desktop-_-83-156-048-_-Product What 's New in Windows Server. (2013, June 24). Retrieved October 4, 2014, from http://technet.microsoft.com/library/dn250019 Wilkins, S. (2011, December 19). LAN Network Cable Media and Connectors. Retrieved October 4, 2014, from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Subnetting Lab 3 Unit 4 Lab 1. Connected Routes - Page 61 2. Configuring IP Addresses I - Page 64 3. Configuring IP Addresses II - Page 66 4. Static Routes I - Page 68 5.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 5. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    Detailed Lab Step Answers

    • 2810 Words
    • 12 Pages

    Conventional subnet masking replaces the two-level IP addressing scheme with a more flexible three-level method; it lets network administrators assign IP addresses to hosts based on how they are connected in physical networks, subnetting is a real breakthrough for those maintaining large IP networks. It has its own weaknesses though, and still has room for improvement. The main weakness of conventional subnetting is in fact that the subnet ID represents only one additional hierarchical level in how IP addresses are interpreted and used for routing.…

    • 2810 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    Designing and implementing a proper network design is an essential and yet critical step in building a reliable, top notch, network infrastructure. Developing the proper infrastructure can ensure performance at a level needed for growth and for stability all the while providing crucial time savings by minimizing the administrative workload. When designing a network you really want to implement scalability and future growth while ensuring minimal downtime and disruptions. Implementing scalability will ensure the network can grow with the organization. The network design I have implemented for UMUC which is depicted below provides scalability, security, and longevity.…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Network Design

    • 534 Words
    • 2 Pages

    In this paper I will be going over a network design proposal for a building on the UMUC campus in Adelphi, Maryland. I would plan to run a fiber optic network to ensure the fastest speeds possible and fiber optics are notorious for not having any signal loss compared to a Cat5e. Using a star topology throughout the building with the servers in each classroom connected to the server room on the respective floor. Equipment used to build the network will consist of servers, routers, hubs and computers. There will be a physical firewall installed on each server and an IDS (Snort) for the network as well as AVG firewall and virus scanner.…

    • 534 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8.3.1.2 Packet Tracer PDF

    • 626 Words
    • 8 Pages

    In this activity, you are tasked with implementing EIGRP for IPv4 and IPv6 on two separate networks. Your…

    • 626 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Logical Network Design

    • 719 Words
    • 3 Pages

    When a network is being designed, the architect must first think about the logical layout and that should be enforced. When he figures out what devices need to communicate and how, a physical design of the network can be implemented. A logical design is the reasoning of a network, with no particular devices or locations chosen. The physical design of the network is when the devices are picked and their actual location determined.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A company called Manufacturing Services has requested the design of a suitable infrastructure for a LAN together with an IP addressing scheme. The PCs are available but a network does not exist. The workstations use Windows XP operating systems and have all the necessary software installed. The organization has 3 main departments, Manufacturing, Sales and Administration.…

    • 5721 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Network Architecture

    • 2272 Words
    • 10 Pages

    Recent developments in information technology have enabled collection and processing of vast amounts of personal data, business data and spatial data. It has been widely recognized that spatial data analysis capabilities have not kept up with the need for analyzing the increasingly large volumes of geographic data of various themes that are currently being collected and archived. Our study is carried out on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-location rules of spatial data mining are proved to be appropriate to design nuggets for disaster identification and the state-of-the-art and emerging scientific applications require fast access of large quantities of data. Here both resources and data are often distributed in a wide area networks with components administrated locally and independently, a framework has been suggested for the above. Our contribution in this paper is to design network architecture for disaster identification.…

    • 2272 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    College and university initiatives in enhanced networking connectivity and in advanced applications development are the fundamental for building more knowledge communities. Application areas include digital libraries, remote medical diagnosis, and others. For reasons of security, licensing, etc., people and resources will require unique identities that are properly authenticated and authorized for access. Since application users will connect with people and resources at both local and remote campuses, both campus wide infrastructures and inter-campus communication mechanisms will be needed.…

    • 1944 Words
    • 8 Pages
    Powerful Essays