Preview

CMIT265 Network Design Paper Finished P

Better Essays
Open Document
Open Document
2562 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CMIT265 Network Design Paper Finished P
The University has recently leased a building in Adelphi, Maryland to house offices, classrooms, library, and computer labs. The goal of this proposal is to design a network for these facilities. The Student computers are to be on a separate network from the staff computers. The facility will share one Internet connection (T-1 link from Verizon). With a T-1 link the network will be able to function with the speed of 1.544 mbps over 24 channels each running 64 kbps (Labsim). Security is always a big concern and has been taken into consideration. Additional considerations for each floor/classroom/lab/office include printing capabilities and the WiFi (Wireless Access) in the Student Lobby. The network design plan requested by UMUC for the newly acquired building in Adelphi, Maryland is required to deliver an IP addressing scheme for efficient IT administration and also allow for scalability for future expansion. The use of subnetting or breaking the network down into smaller subnets, will minimize the broadcast traffic that each network node must process and also increase the performance of the network. For the network infrastructure devices including switches, servers, router, and printers, a static IP address should be selected by the network administrator. The subnets that were chosen for the network proposal are broken down into five different subnets. One being used for the six instructional computer labs, one for the student computer lab, one for the six different offices, one for the library, and one for the five lecture class rooms. The network address given by UMUC of 10.11.0.0 is a class A network address that will be used in creating six total subnets for the network. The IP address ranges for the different subnets being used on this network are proposed below.
The subnets can be defined by the table below:
Location
Subnet
Subnet Mask
IP Address Range
Devices on Subnet
6 Instructional Computer Labs
10.11.0.0/16



References: Cisco. (2014, September). Cisco AnyConnect Secure Mobility Solution – Cisco AnyConnect Secure Mobility Client and Cisco ASA 5500 Series (SSL-IPsec VPN Edition) Datasheet. Retrieved September 28, 2014, http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/product_data_sheet0900aecd80402e3f.html Cisco. (2014, September). Cisco SLM2048 48-Port Gigabit Smart Switch. Retrieved September 28, 2014, from Cisco.com: http://www.cisco.com/c/en/us/products/collateral/switches/slm2048-48-port-gigabit-smart-switch-sfps/data_sheet_c78-500603.html Tyson, J. (2001, January 24). HowStuffWorks.com. Retrieved September 29, 2014, from How LAN Switches work: http://computer.howstuffworks.com/lan-switch16.htm Wikipedia. (2014, Sept 29). Retrieved Sept 29, 2014, from Wikipedia.com: http://en.wikipedia.org/wiki/Category_6_cable XMultiple. (n.d.). Retrieved Sept 29, 2014, from Xmultiple Technologies Inc: http://www.xmultiple.com/xwebsite-forum24.htm

You May Also Find These Documents Helpful

  • Good Essays

    This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh interlinked switches uses Spanning Tree Protocol (STP) to detect and prevent loops. A loop occurs when there are multiple active paths to the same switch and this causes the system to crash.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It273 Unit 3

    • 676 Words
    • 3 Pages

    | A switch is like an intelligent hub. A switch can create a record of all the hardware on a network and send data more efficiently. It operates higher up the OSI model than a hub.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    Ethernet LANs: collection of devices which use IEEE Ethernet standards at the physical and data link layers, so that the devices can send Ethernet frames to each other…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1330 unit 1

    • 565 Words
    • 3 Pages

    There are many factors involved in this scenario. For example, the building may lend itself to certain network designs. You may have multiple floors or a single floor, Multiple data closets or just one. You may have virtualized servers or desktops. You will want to accommodate all these into your design. 50% may seem like too much now, but realistically, 200 or 300% might be more accurate.…

    • 565 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Riordan needs an integrated communication platform to remain competitive and relevant in today’s business environment. Riordan’s current telephone and data systems are segregated and antiquated. The switch to Cisco’s Unified Communications Manager over the current VoIP configuration will allow Riordan to fully communicate within its own entities and create new opportunities for the company. Riordan’s bandwidth is slow compared to the current speed offered by telecom providers and will need to be improved upon. Riordan is also in need of new data management software that will make improvements to employee, customer, sales, and company data administration. Riordan is also in need of improved security protocols, software encryption, and procedures to protect against network security…

    • 4597 Words
    • 19 Pages
    Better Essays
  • Satisfactory Essays

    Switch/Router Security Lab Exam Subnet the IP Address 192.168.3.5 to provide 12 networks with 12 hosts. a. Subnet Mask: 255.255.255.224 b. CIDR value: /27 c. What is the first usable IP on the 6th usable network: 192.168.16.193: ERROR d. What is the last usable IP on the 7th usable network: 192.168.16.225:…

    • 246 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The storage area networking technology supported by Windows Server 2008 as a lower cost alternative to Fibre Channel is called…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    172.29.0.0/16 subnetted to 113 subnets and provide information for subnets #1, #10, #26, and #113.…

    • 180 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    San Marino FINAL

    • 1792 Words
    • 9 Pages

    needed high-speed Wireless Local Area Network (WLAN) connectivity, campuswide mobility, multi-user streaming multimedia capabilities and the need for a…

    • 1792 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Wide Area networking

    • 834 Words
    • 4 Pages

    4. An enterprise network has many routers that connect to both a LAN as well as the WAN. Which one of the following statements best describes how routers typically use and think about their WAN connections?…

    • 834 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    The acronym subnet refers to sub - networking. This is the process of logically dividing an IP network into various divisions or sections within a network. Therefore, sub-netting is the technique and practice of dividing a network into two or more logical networks (Narten, Nordmark, Simpson & Soliman 2007). Within a subnet, all computers connected to it are identifiable by their almost identical IP addresses. The use of IP addresses is in order to identify uniquely computers in a subnet by the use of a router or network IP prefix followed by a host or rest field identifier. This IP address composition makes it easy to trace the network within which the sub network is located. Additionally, the second part helps identify the computer on the host sub network. Normally the expression of the network or routing prefix is in a CIDR notation. This is whereby it is annotated as the first address within the network, followed by the slash character, and then ending in the form of the bit - length of the IP prefix. An example of this case would be such as the IPv4 address - 192.168.10.0/24, which is a prefix of the IP address. From it, we get to know that the first IP address in the network is 192.168.10.0 and that it has 24 bits for the network prefix allocated to it. The remaining 8 bits of the 32 are reserved for the host sub network addressing. It must be noted that the network or data traffic between all sub networks of a network are channeled via routers which act as gateways, as well as the logical boundaries, between the various sub networks within the entire network (Singh, Beebee, & Nordmark 2010)..…

    • 1956 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Essentials to Subnetworking

    • 3284 Words
    • 14 Pages

    The benefits of subnetting vary with each deployment scenario. In the address allocation architecture of the Internet using Classless Inter-Domain Routing (CIDR) and in large organizations, it is necessary to allocate address space efficiently. It may also enhance routing efficiency, or have advantages in network management when subnetworks are administratively controlled by different entities in a larger organization. Subnets may be…

    • 3284 Words
    • 14 Pages
    Powerful Essays

Related Topics