Preview

Frederick MD UMUC Network Proposal

Better Essays
Open Document
Open Document
1166 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Frederick MD UMUC Network Proposal
UMUC Frederick MD Network Proposal

The network IP addressing scheme for the Frederick MD building should be designed to ease network management. A well thought out network subnet design enables administrators to quickly locate computers by IP address by building floor and room, and whether the computer is a server, a student computer, staff computer or instructor’s computer. A proper subnet design will also minimize broadcast traffic that decreases network performance, by reducing the total number of computers allowed in each broadcast domain. A proper subnet design will also provide for efficient use of IP addresses by including only the number of IP addresses in each subnet necessary to support current computers plus a few additional IP addresses for immediate expansion when required. To differentiate subnets by IP address, student subnets start with a “1” in the third octet, staff subnets start with a “2” in the third octet where “10” in the second and third digits designates the location to be floor 1, “12” designates the location to be floors 1 and 2, “10” designates the location to be floor 1, “20” designates the location to be floor 2, and a second digit of “4” designates office staff and a second digit of “5” designates Admissions staff. The broadcast and network numbers have been removed from the IP address ranges below.
UMUC IP Subnets

Computer Lab 1 student subnet and range – First Floor – 10.15.112.1- 30/27
Computer Lab 2 student subnet and range – First Floor – 10.15.112.33 – 63/27
Computer Lab 3 student subnet and range – First Floor – 10.15.112.66-96/27
Computer Lab 4 student subnet and range – First Floor – 10.15.112.99-129/27
Computer Lab 5 student subnet and range – First Floor – 10.1515.112.132-162/27
Computer Lab Instructors subnet and range – 10.15.212.1-14/28 (second floor assigned host addresses 10-15)
Student Computer Lab subnet and range – 10.15.120.1-62/26
Library Student computer subnet and



References: Cisco, 2010, Cisco ASA 5505 Data Sheet, http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/product_data_sheet0900aecd802930c5.html Dell, 2010, PowerEdge T310 Tower Server, http://www.dell.com/us/business/p/poweredge-t310/pd Hewlett Packard, 2011, HP Officejet Pro 8500 Premier All-in-One Printer - A909n http://h10025.www1.hp.com/ewfrf/wc/product?cc=us&lc=en&dlc=en&product=3752462 ioSafe R4: Product Specification, https://www.safesandsecurity.com/images/documents/iosafe-r4.pdf Medford, 2000, Network Design Best Practices, http://www.networkworld.com/best2000/best-design/best-design.html Wilson, 2003, Network Security: Best Practices, http://www.computerworld.com/s/article/77625/Network_Security_Best_Practices

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Unit 5 Questions

    • 821 Words
    • 3 Pages

    A campus LAN drawing shows hundreds of user devices cabled to LAN switches on various floors…

    • 821 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    • The XLS servers at the Delmar and Lajolla sites are running Office 97 – over 15 years old.…

    • 1191 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    network on the second floor with 15 computers to start, but would like to explore further…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    5. Large enterprise of 5000 employees that uses a Class A address with subnets for each department and for each subdivision within each department (e.g., many subnets). Subdivisions must be able to communicate with each other; some departments need to communicate with each other. This company is located on a campus in several buildings.…

    • 256 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IP SCHEMA KAMAZON

    • 1327 Words
    • 6 Pages

    In order to properly address the Infrastructure upgrade of the Kamazon Network our group decided that an appropriate ip address schema that will take into account the idea that people will be using more than just a desktop computer. They will have tablets, laptops, departmental printers, and smart phones. This is also based upon the understanding that every Department will have at least two printers for the staff and one for the Manager/Supervisor or VP of that Department. So with that being said, we estimated that could be at least three or more accurately four ip addresses per employee. So we multiplied the number of users per department by the number of estimated devices that each employee will be using.…

    • 1327 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Capstone Project It331

    • 3189 Words
    • 13 Pages

    Five doctor offices have decided to join each of their buildings to a network. With this, each office will have access to each of the other four offices’ information. This would greatly benefit them and their patients, allowing them to pull up a patient’s medical and billing information from a central server for easy access. However the central, east and west offices are each on their own LAN. The three LANs are similar in design for connecting each workstation and for hardware and software. The eastern and western offices have already been in a partnership with their own peer-to-peer with remote access network along with shared billing and insurance management software. The north and south locations are running standalone workstations that are various ages. Each office has no kind of network compatible hardware and runs the billing and insurance software on one dedicated computer, each with its own attached printer. Patient information is stored on several computers throughout the offices and patient records are filed manually on paper.…

    • 3189 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    A simple design you can consider is 1 floor with a single data closet serving 150 users. You need a core network, networks for your firewall, DMZ, remote VPN clients, switch MGMT network, server network, voice network, wireless network and networks for other services you have not yet identified, like security, cameras, fire, door and video. You should have multiple domain servers and DHCP servers. While you can get away with using high end switches for DHCP, a couple windows servers will do the trick and give more insight when you are troubleshooting. Most systems can get along with DHCP, so that is fine, (some older systems still need host files) but there are support benefits to statically assigned addresses. In any case, you will want reserved space in these networks for your network devices, in exception to VLANs, redundant or clustered systems. For design, you could use the 10.1.0.0 address space using /21 (10.1.0.1 - 10.1.7.254) and for your subnet masking on the devices will naturally be 255.255.255. Reserve the first and last 20 or so addresses in each DHCP scope for statically assigned addresses and network devices / gateway addresses. Some examples would be, 10.1.0.0/24 for servers-all static, 10.1.1.0/24 for pc's printers usable for DHCP 10.1.1.21 - 10.1.1.230, 10.1.2.0/24 for wireless usable for DHCP 10.1.2.21-10.1.2.230, 10.1.3.0/24 for VoIP usable for DHCP 10.1.3.21 - 10.1.3.230 and 10.1.4.0 - 10.1.7.254 for future use. While you can cut back each network to a /25 giving 126 hosts per network, you may find yourself changing this sooner than expected.…

    • 530 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mis 589 Mini Case Week 4

    • 582 Words
    • 3 Pages

    Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bus 210 Week 8 Appendix E

    • 381 Words
    • 2 Pages

    | With PC’s entering into the home and workplace, a network was created as a way of linking various PC’s together and to a server.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document.…

    • 6754 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The network utilization between the hospital and offices mainframe would be that the IBM’s technology offers considerably huge servers within a distinguishing strength conducting a large amount of transactions as well as input/output operations in parallel (Network Management, 2013). However, the mainframe is accomplished by serving a huge numbers of network nodes geographically separated across the world at the same time as conducting a elevated volume of input and output operation to disk storage, printers in addition to other attached computers (Network Management, 2013). Several the capabilities would be the IP communication among huge numbers of Linux as well as z/OS operating systems running as z/VM (Virtual Machine) guest machines (Network Management, 2013).…

    • 500 Words
    • 2 Pages
    Satisfactory Essays