In the Network Design Paper I will explain how the University has recently leased a building in Adelphi, Maryland. The measurements of the University is 240 feet long, 95 feet wide and 30 feet tall and broken down to two different floors. This University will be used for education purposes of course, the facility will be made of six instructional labs, seven offices, library, five classrooms, a student lobby and a computer lab. There will be a server room on each floor. The purpose of this paper is to explain the design of the networks in this building. The student accessed computers will be set up on a separate network than the network that they staff will be using. The entire building will share one internet access connection, which is a T-1 link from Verizon. A T1 link is one of the most common Internet access connections used by small businesses. T-1 Link is very fast, consistent and protected. It runs with a bandwidth speeds of 1.5Mb (WordPress.com). That speed is enough to achieve and complete essential business functions. Security is definitely a must and big concern that has to be taken into consideration when design networks, whether it is a business or a home network. Building a network in a university, we have to protect students and employee’s data as well as any intellectual property that college has on the servers and computers. Additional, there are other considerations for each lab, classroom, office, and the library including the capability to print and
Routers and switches will be utilized to route network signals to all areas of this large network. Telephony systems will be introduced to serve the VOIP located at each location to assist with communication needs. Wireless technologies will also be needed to assist with mobility and other devices such as printers, laptops, fax machines, etc. Lastly, a physical firewall will be enforced at each location to protect the network from internal and external intruders.
The global permission acceptance breaks the policy of least privilege due to the fact that it allows access to items that a user believes to be protected and are not due to the fact that it is placed in an open environment. The open environment is out there and is available to all who happen to be connected. The concept of the least privilege is that it limits who is able to access an item. The item is able to be accessed only after permission have been granted by the owner. When the global acceptance is utilized there is really no control over who is able to see the information due to the fact that the security has been removed to make it easier to be used. Although there are instances where an application has to be granted permission
There are various types of equipment that the company should look for when considering this network. The first item to look at when considering equipment is the Operating system and software that we would need. Next, the group took into consideration the type of server the company needs to make this network a reality. Another thing that we looked at is the possibility of having ThinClients over regular desktops for all workstations. Of course, it was taken into consideration that some employees would not want ThinClients. So, we show the type of tower we plan to place into those spaces, along with any peripheral device for both. Then, we will look at the network devices that will go into each building that include switches, routers, repeaters, hubs, and wireless access points. Finally, the group will note guidelines for choosing a local ISP at each site. Each Item outlined helps to build a network based on the specifications given by the company.
Team “C” was hired by Riordan Manufacturing management to overhaul the security features currently employed by the company. Management outlined a comprehensive plan that included a complete hardware refresh, security best practices and end user training. Team “C” will devote resources to assess the physical and network security issues and concerns at each Riordan plant. Once those have been identified, Team “C” will identify the data security issues and concerns present at each Riordan plant. Finally, Team “C” will address web security issues and concerns present at each Riordan plant and recommend a way forward for the company.
For a school the convenient server topology is a centralized server farm design . Due to this design the Network traffic enters and leaves the server farm at a defined point which makes it easier to secure, filter, and if needed to prioritize traffic. The essential server types are the following for any network.
In the transport topology, each advanced PC is joined with a primary link alluded to as the transport. Hence, as a result, each computerized PC is specifically associated with each distinctive advanced PC inside of the system.
This assignment will be mainly about network components and how do they operate, what are their functions and what are their flaws.
A join is one and all of two or in superior way personal digital assistant systems of the same opinion as one. There is copious kind of computer networks, as well as the following: LAN: The mechanics are physically end as one.
The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.
Main Building – will require 7 computer stations with the most recent version of Operating System to ensure compatibility and networking capabilities between each stations and the ability to communicate between the two locations. They will require three servers, one for web hosting, one for database management and one for emergency failure of any one server. These stations should be networked to communicate with one another for proper data connection especially in the event of any one computer station crashing. Each work station will need to be linked to each server for web hosting and data backup. The cabling used for inside the main building should be 100Base TX cat 5 UTP, for Wi-Fi and WLAN with guest access that is highly secure and reliable, we recommend a device that is capable of supporting up to 15 different users with 450 Mbps. There needs to be 4 printer services in this building. Printer 1 should have
4. The rest of college buildings 4 through 10 have one LAN and one router. LAN IP’s will be respectively as follows: College 4 (128.100.10.x), College 5 (128.100.11.x), College 6 (128.100.12.x), College 7 (128.100.13.x), College 8 (128.100.14.x), College 9 (128.100.15.x), and College 10 (128.100.16.x). Router IP’s will be respectively as follows: (128.100.255.4), (128.100.254.5), (128.100.255.6), (128.100.255.7), (128.100.255.8), (128.100.255.9), and (128.100.255.10).
DesignIT is a graphic arts company that is expanding business and has recently purchased a new building 56’*36’ space for the purpose of housing two full time designers and a receptionist. The new building has four cubicles, one office, one server room, one reception desk, and a conference room. DesignIT has already relocated one Web Server (Microsoft IIS Server), one File Server (Microsoft Server 2008), and one more Server 2008 (Small Business Server). As a network design consultant, I have been charged with the task of designing and configuring the network for DesignIT. The small company has informed me that the network should
Since one office is in the center of the WAN, it would be the most logical location for the main server headquarters. This main location would be home to six servers, two of them being print servers and the other four each hosting their own specific applications to all of the workstations in the network. The first of the four servers would hold the business management applications needed by any of the accountants or human resource teams. The second would hold the medical managing software that would hold all patient information, insurance, and bills that could be accessed from any of the 5 office locations in the network for both doctor and patient convenience. The third will be used to host a web server and the final system will be used as a domain controller that will manage the users and groups on the network.
Material in this section is based on material from Computer Networks: Principles, Technologies and Protocols for Network Design by Natalia Olifer and Victor Olifer (pub. John Wiley & Sons 2005).
The proposed network is designed for the UMUC new building in Rockville. This new building will have some administrative offices, lecture rooms, library, and computer labs with an open Wi-Fi. This new building will have total six computer labs that will be used for instruction. Each of these labs will have 25 computers, 23 student computers and one instructor computer, one server in the closet and in addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students for doing their own purpose like homework. In Student Computer Lab there will be 30 computers and a server in the closet. There will be 10 computers for student’s use and 5 computers for Library staff in the library so they can access to the library resources for staff use, with the exception of the admissions office, which will have five computers. There will be six class room which will have a computer for instructor’s use. Finally, there will be 7 offices in the building and each of these offices will have one computer. There will be two server rooms, one on the first floor and another one on the second floor. There should be at least 3 separate networks: Administrative, Instructional, and Public. All staff-accessed computers will be on the