Preview

Network Design

Powerful Essays
Open Document
Open Document
1434 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Design
UMUC’s new building in Adelphi, MD will have to provide networking connectivity to students, professors, and staff. In order to begin the process of planning the new network, we will begin by planning the network IP addressing scheme. It is very important that the network IP addressing scheme be clearly defined in order for IT administrators to locate computers promptly. Also, in order to make it easier for the administrators, DHCP (Dynamic Host Configuration Protocol) will be used to assign IP addresses. The organization of the subnet layout will assist the IT administrators as well as making effective use of IP addresses. In order to differentiate between students, staff, and instructors, we will place them on different subnets. Also, the instructors subnet will begin with a “1” in the third octet, the staff subnet will begin with a “3”, and the students subnet will begin with a “4” or “5” in the third octet of the IP addresses. Lastly, the second digit of the third octet will assign the floor for each subnet. An even number in the second digit will mean that the computer or device on the subnet is located on the first floor and an odd number means that it is located on the second floor.
Network IP Addresses
First Floor
Subnet mask: 255. 255. 240. 0
Lecture Instructors
Network address: 10. 110. 16. 0
Subnet and range: 10. 110. 16. 2 – 10. 110. 16. 6
Staff (Library)
Network address: 10. 110. 32. 0
Subnet and range: 10. 110. 32. 2 – 10. 110. 32. 6
Admissions Staff
Subnet and range: 10. 110. 34. 2 – 10. 110. 34. 6
Office Staff (3)
Subnet and range: 10. 110. 36. 2 – 10. 110. 36. 4
Students (Library)
Network address: 10. 110. 48. 0
Subnet and range: 10. 110. 48. 2 – 10. 110. 48. 11
Second Floor
Students
Computer Lab #1: 10. 110. 49. 1 – 10. 110. 49. 23
Computer Lab #2: 10. 110. 49. 25 – 10. 110. 49. 47
Computer Lab #3: 10. 110. 49. 50 – 10. 110. 49. 72
Computer Lab #4: 10. 110. 49. 75 – 10. 110. 49. 97
Computer Lab #5: 10. 110. 49.



References: 1000 Mbps Gigabit Multi Mode Fiber Ethernet Media Converter SC 550m. (n.d.). Retrieved October 4, 2014, from http://www.startech.com/Networking-IO/Media-Converters/Fiber/1000-Mbps-Gigabit-Multi-Mode-Fiber-Ethernet-Media-Converter-SC-550m~MCMGBSC055 Beal, V. (n.d.). Star Network. Retrieved October 3, 2014, from http://www.webopedia.com/TERM/S/star_network.html http://netsecurity.about.com/od/quicktip1/qt/qtwifistaticip.htm Brother MFC Series All-In-One Printer Retrieved October 4, 2014, from Dell OptiPlex. Retrieved October 5, 2014, from http://www.newegg.com/Product/Product.aspx?Item=N82E16883156048&cm_re=desktop-_-83-156-048-_-Product What 's New in Windows Server. (2013, June 24). Retrieved October 4, 2014, from http://technet.microsoft.com/library/dn250019 Wilkins, S. (2011, December 19). LAN Network Cable Media and Connectors. Retrieved October 4, 2014, from

You May Also Find These Documents Helpful

  • Good Essays

    • The XLS servers at the Delmar and Lajolla sites are running Office 97 – over 15 years old.…

    • 1191 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    Subnetting Lab 3 Unit 4 Lab 1. Connected Routes - Page 61 2. Configuring IP Addresses I - Page 64 3. Configuring IP Addresses II - Page 66 4. Static Routes I - Page 68 5.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Mis 589 Mini Case Week 4

    • 582 Words
    • 3 Pages

    Suppose you are the network manager for Central University, a medium-size university with 13,000 students. The university has 10 separate colleges (e.g., business, arts, journalism), 3 of which are relatively large (300 faculty and staff members, 2,000 students, and 3 buildings) and 7 of which are relatively small (200 faculty and staff, 1,000 students, and 1 building). In addition, there are another 2,000 staff members who work in various administration departments (e.g., library, maintenance, finance) spread over another 10 buildings. There are 4 residence halls that house a total of 2,000 students. Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Detailed Lab Step Answers

    • 2810 Words
    • 12 Pages

    Conventional subnet masking replaces the two-level IP addressing scheme with a more flexible three-level method; it lets network administrators assign IP addresses to hosts based on how they are connected in physical networks, subnetting is a real breakthrough for those maintaining large IP networks. It has its own weaknesses though, and still has room for improvement. The main weakness of conventional subnetting is in fact that the subnet ID represents only one additional hierarchical level in how IP addresses are interpreted and used for routing.…

    • 2810 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Design

    • 534 Words
    • 2 Pages

    Each subnet will have a maximum of 253 IP addresses, which is more than enough for each section. The instructional and administrative networks will use assigned IP addresses to keep all traffic segmented. The public network will use DHCP beginning with 10.11.3.2 through 10.11.3.254. This network is a Star Network as all computers will have the ability to communicate with each other. By using a star topology we avoid a situation where if a machine goes down then the whole network goes down. The Admin computers and will be on a separate network to keep the students from access to higher functions on the network, and the IT Staff computer will be given the highest access based on their job.…

    • 534 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8.3.1.2 Packet Tracer PDF

    • 626 Words
    • 8 Pages

    In this activity, you are tasked with implementing EIGRP for IPv4 and IPv6 on two separate networks. Your…

    • 626 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Logical Network Design

    • 719 Words
    • 3 Pages

    When a network is being designed, the architect must first think about the logical layout and that should be enforced. When he figures out what devices need to communicate and how, a physical design of the network can be implemented. A logical design is the reasoning of a network, with no particular devices or locations chosen. The physical design of the network is when the devices are picked and their actual location determined.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    A company called Manufacturing Services has requested the design of a suitable infrastructure for a LAN together with an IP addressing scheme. The PCs are available but a network does not exist. The workstations use Windows XP operating systems and have all the necessary software installed. The organization has 3 main departments, Manufacturing, Sales and Administration.…

    • 5721 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Network Architecture

    • 2272 Words
    • 10 Pages

    Recent developments in information technology have enabled collection and processing of vast amounts of personal data, business data and spatial data. It has been widely recognized that spatial data analysis capabilities have not kept up with the need for analyzing the increasingly large volumes of geographic data of various themes that are currently being collected and archived. Our study is carried out on the way to provide the mission-goal strategy (requirements) to predict the disaster. The co-location rules of spatial data mining are proved to be appropriate to design nuggets for disaster identification and the state-of-the-art and emerging scientific applications require fast access of large quantities of data. Here both resources and data are often distributed in a wide area networks with components administrated locally and independently, a framework has been suggested for the above. Our contribution in this paper is to design network architecture for disaster identification.…

    • 2272 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    College and university initiatives in enhanced networking connectivity and in advanced applications development are the fundamental for building more knowledge communities. Application areas include digital libraries, remote medical diagnosis, and others. For reasons of security, licensing, etc., people and resources will require unique identities that are properly authenticated and authorized for access. Since application users will connect with people and resources at both local and remote campuses, both campus wide infrastructures and inter-campus communication mechanisms will be needed.…

    • 1944 Words
    • 8 Pages
    Powerful Essays