SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Consider introducing the overall objective of the network design
FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
Consider introducing the overall objective of the network design. Look
into UMUC’s
Strategic Plan, how would the network design help the stakeholders, the
leadership of
the university, the students, and the instructors achieve their goals? How
would a great
network design contribute to students (your) experiences in learning? To
do this we
look at five aspects of a network design herein to support the leadership
to help meet
the goals of the strategic plan. A. Network Topology Business Needs
In this section, you will assess the business needs of the company. Use
the information
provided in the scenario to analyze the need for infrastructure or
equipment. If you need more
information, feel free to ask your instructor or make some assumptions.
If you make some
assumptions, be sure to list them. This section is not about the actual
infrastructure or
equipment, but it should discuss the business needs of the company.
Example
ABS Enterprises believes that employees’ health, wellbeing, and morale
have a
significant impact on the productivity of the employees and thus the
overall results
or output of the company. The company wants to invest in a facility that
will provide
the most return on investment while still providing a facility that
employees will use.
The company has 20 employees and wants needs one or more servers
and two
printers. All computers should be able to communicate, but the HR staff
of 5 needs
to be on a separate network due to the sensitive information on their
PC’s.
Proposed Topology
Select logical one or more topologies to use for this designstar topology
for this assignment.
(star, bus, mesh, ring- Please note that the star topology is the most
commonly used). This
section should be used to provide details of the selected infrastructure or
equipment.
Include the model, manufacturer, features, and cost. Below is an
example topology.
Topologies can be created using Microsoft Visio, or you can create a
free account at
gliffy.com and create diagrams. Justification
(Each section should contain the reasoning you present to justify the
selection you made for
your proposal. Look at it as your platform to tell finance and operations
personnel why this
should be selected for the network design) B. Network Media Note:
(Choose wired or wireless) Be aware that your solution needs to include
support for the
selected media. For example, if you choose wireless, ensure you have
wireless adapters for
your desktops.
Business Needs
Assess the business needs.
Proposed Network Media (include network wiring diagrams)
Select one or more network media to use for this design.
Justification
Justify your determination that the selected media will meet the business
needs. C. Network Devices Business Needs
Assess the business needs.
Proposed Network Devices Select network devices to use to implement
and support your design. Include setup and location
information for the devices. Provide a comprehensive list of devices,
including the quantity of
each device needed.
Justification
Justify your determination that the selected network devices will meet
the business needs.
Example: I selected a Cisco 2621 Router in order to connect the HR
users to the rest of
the company’s employees D. Network Security Devices Business Needs
Assess the business needs.
Proposed Network Security Devices
Select network security devices to use to secure the network. Include
setup and location
information for the devices. Provide a comprehensive list of devices,
including the quantity of
each device needed.
Justification
Justify your determination that the selected network security devices will
meet the business
needs.
Example: I selected a Cisco ASA 5510 Firewall in order to protect the
company’s
network. E. Computer Systems Business Needs
Assess the business needs.
Proposed Computer Systems
Select computer systems (servers) to use to implement the network
design. Include setup and
location information for the devices. Provide a comprehensive list of
devices, including the
quantity of each system needed. Justification
Justify your determination that the selected systems will meet the
business needs.
Example: I selected Windows 10 Professional for the operating system,
because it is the
newest, most secure, and stable version of Windows for end users. II.
Network Addresses Design (in its entirety)
A. Subnetting Subnetting is a process of breaking a large network into
small networks known as subnets.
Subnetting happens when we extend the default boundary of the subnet
mask. Basically we
borrow host bits to create networks (i.e., subnets).
We have been assigned the network address 199.1.2.0. Based on the
chart below, we know
this is a Class C address. This is determined by observing the first octet
of the IP address,
which is 199. This octet falls in between 192 and 223.
Class Octet Decimal Range A 1 - 126 B 128 - 191 C 192 - 223 Each
class has a predefined default subnet mask that tells us the octets, which
are already part
of the network portion, as well as how many bits we have available to
work with. Class Subnet Mask Format A 255.0.0.0
Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C
255.255.255.0 Network.Network.Network.Host CIDR (Classless Inter
Domain Routing)
CIDR is a slash notation of the subnet mask. CIDR tells us the number
of on bits in a network
address.
● Class A has default subnet mask 255.0.0.0. that means first octet of the
subnet mask has all on
bits. In slash notation it would be written as /8, means address has 8 bits
on. ● Class B has default subnet mask 255.255.0.0. that means first two
octets of the subnet mask
have all on bits. In slash notation it would be written as /16, means
address has 16 bits on. ● Class C has default subnet mask
255.255.255.0. that means first three octets of the subnet
mask have all on bits. In slash notation it would be written as /24, means
address has 24 bits
on.
Scenario The building will house four computer labs that will be used
for instruction. In the building
diagrams above, the labs are labeled Classroom #2 and Classroom #4 on
the first floor and
Classroom #1 and Classroom #5 on the second floor; each computer lab
will have a closet. Each
lab will have 25 computers: 23 student computers, 1 instructor
computer, and 1 server in the
closet for instructional use.
In addition, there will be a Student Computer Lab that will provide
computer access to students to
do their homework. There will be 25 computers in this lab and a server
in the closet. To allow
students access to library resources, the library will also have 20
computers for the general
public to use and 5 computers for library staff.
There needs to be separation between students, staff, and public access
networks. The open WiFi also needs to be separate from the other three
groupings.
Finally, there are various offices in the building. Each of these offices
will have one computer for
staff use, with the exception of the admissions office, which will have
five computers. There will
be two server rooms, one on the first floor and one on the second floor.
You have been hired as part of the networking team at UMUC. After
completing orientation and training,
your manager calls you into a meeting to discuss your first project. The
university has recently leased a building in Adelphi, Maryland. The
building will house offices,
classrooms, a library, and computer labs. Security is important for
UMUC, as the university must protect
students’ and employees’ data, as well as any intellectual property that
UMUC has on its servers and
computers. As a result, IT management would like to take the time to
review proposals on how best to
move forward on security issues. As a network engineer, you have been
asked to prepare a network
proposal on how to set up a secure network infrastructure in this
building to support university operations. Methodology
Given the aforementioned scenario, we are going to use the
192.168.0.0/24 network and create
a total of 8 subnets, with 25 hosts on each subnet. The chart below
describes structures the
scenario to include each subnet and required hosts.
Subnet Description Required Hosts Students in Classroom 1 Computer
Lab 23 Computers Students in Classroom 2 Computer Lab 23
Computers Students in Classroom 3 Computer Lab 23 Computers
Students in Classroom 4 Computer Lab 23 Computers Students in
Student Computer Lab 24 Computers Public Access network 20
Computers Equipment xx Network Peripherals (servers access
points) Computers Staff Office / Admissions Network xx Computers
(Using the How to Subnet a Network Video provided in CMIT 265 LEO
- Content - UMUC
Network Design Proposal, complete the following chart.) Subnet
Network Address Host Address Range Broadcast
Address Subnet Mask: 255.255.255._____
Classroom 1 192.168.0.0 192.168.0.1 – 192.168.0.30 192.168.0.31
Classroom 2 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Classroom 3 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Classroom 4 192.168.0.96 192.168.0.97 – 192.168.0.126 192.168.0.127
Student
Computer Lab 192.168.0.128 192.168.0.129 – 192.168.0.158
192.168.0.127 Equipment 192.168.0.__ 192.168.0.__ - 192.168.0.__
192.168.0.__ Library Lab
(Public Access) 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Staff Network 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
III. Network Services Design
A. Network Services Business Needs
Assess the business needs
Proposed Network Services
Determine and list the network services needed to implement the design.
Provide setup and
licensing information (as necessary).
Justification
Justify your determination that the network services are needed and will
meet the business
needs Example: There needs to be a DHCP, DNS, File, and Active
Directory Server on the
network. Please give examples of why these servers are needed and what
role they will
play. Cover policy and process such as configuration management, asset
inventory, and
baseline configuration.
. B. Network Security Measures Business Needs
Assess the business needs
Proposed Network Security Measures
Outline network security measures needed in the design. This includes
training, monitoring, and
maintenance procedures. Provide implementation details of these
measures.
Justification
Justify your determination that the network security measures are needed
and will meet the
business needs. Example: Discuss Patching, Scanning, SIEM, Logging
and other measures. How will the
systems in this company’s network be updated? Discuss Firewall rules,
for example all
traffic will be allowed out or just ports 80 and 443 traffic will be allowed
out. What version
of Anti-Virus should be used on machines? Bibliography
Be sure to use references that are scholarly in nature and follow the
formatting rules of
the IEEE
************************************************

Weitere ähnliche Inhalte

Ähnlich wie Consider introducing the overall objective of the network design/tutorialoutlet

UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
TakishaPeck109
 
I. Physical Network DesignIntroduction Consider introduc.docx
I. Physical Network DesignIntroduction Consider introduc.docxI. Physical Network DesignIntroduction Consider introduc.docx
I. Physical Network DesignIntroduction Consider introduc.docx
flonayrton46696
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docx
dohertyjoetta
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and Busine
VannaJoy20
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
philipnelson29183
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
freddysarabia1
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
toltonkendal
 

Ähnlich wie Consider introducing the overall objective of the network design/tutorialoutlet (20)

CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPER
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.com
 
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docxUMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
UMUC CMIT 265 Fundamentals of NetworkingHello there!  I have am lo.docx
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.com
 
Cmit 265 Enthusiastic Study / snaptutorial.com
Cmit 265 Enthusiastic Study / snaptutorial.comCmit 265 Enthusiastic Study / snaptutorial.com
Cmit 265 Enthusiastic Study / snaptutorial.com
 
Cmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.comCmit 265 Effective Communication / snaptutorial.com
Cmit 265 Effective Communication / snaptutorial.com
 
I. Physical Network DesignIntroduction Consider introduc.docx
I. Physical Network DesignIntroduction Consider introduc.docxI. Physical Network DesignIntroduction Consider introduc.docx
I. Physical Network DesignIntroduction Consider introduc.docx
 
Network Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docxNetwork Design Proposal TemplateNetwork Design Proposal.docx
Network Design Proposal TemplateNetwork Design Proposal.docx
 
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.com
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and Busine
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.com
 
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.Bangladesh Bank Assistant Maintenance Engineer Question Solution.
Bangladesh Bank Assistant Maintenance Engineer Question Solution.
 
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docxWest Consulting Modular Design ProposalMichael BoddieNetwork.docx
West Consulting Modular Design ProposalMichael BoddieNetwork.docx
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxRunning head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
 
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSALCMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
CMIT/265 FINAL PROJECT NETWORK DESIGN PROPOSAL
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Consider introducing the overall objective of the network design/tutorialoutlet

  • 1. Consider introducing the overall objective of the network design FOR MORE CLASSES VISIT tutorialoutletdotcom Network Design Proposal Template Network Design Proposal Prepared for: University of Maryland University College Prepared by: Student Name I. Physical Network Design Introduction Consider introducing the overall objective of the network design. Look into UMUC’s Strategic Plan, how would the network design help the stakeholders, the leadership of the university, the students, and the instructors achieve their goals? How would a great network design contribute to students (your) experiences in learning? To do this we look at five aspects of a network design herein to support the leadership to help meet the goals of the strategic plan. A. Network Topology Business Needs
  • 2. In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If you make some assumptions, be sure to list them. This section is not about the actual infrastructure or equipment, but it should discuss the business needs of the company. Example ABS Enterprises believes that employees’ health, wellbeing, and morale have a significant impact on the productivity of the employees and thus the overall results or output of the company. The company wants to invest in a facility that will provide the most return on investment while still providing a facility that employees will use. The company has 20 employees and wants needs one or more servers and two printers. All computers should be able to communicate, but the HR staff of 5 needs to be on a separate network due to the sensitive information on their PC’s. Proposed Topology
  • 3. Select logical one or more topologies to use for this designstar topology for this assignment. (star, bus, mesh, ring- Please note that the star topology is the most commonly used). This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. Below is an example topology. Topologies can be created using Microsoft Visio, or you can create a free account at gliffy.com and create diagrams. Justification (Each section should contain the reasoning you present to justify the selection you made for your proposal. Look at it as your platform to tell finance and operations personnel why this should be selected for the network design) B. Network Media Note: (Choose wired or wireless) Be aware that your solution needs to include support for the selected media. For example, if you choose wireless, ensure you have wireless adapters for your desktops. Business Needs Assess the business needs. Proposed Network Media (include network wiring diagrams)
  • 4. Select one or more network media to use for this design. Justification Justify your determination that the selected media will meet the business needs. C. Network Devices Business Needs Assess the business needs. Proposed Network Devices Select network devices to use to implement and support your design. Include setup and location information for the devices. Provide a comprehensive list of devices, including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. Example: I selected a Cisco 2621 Router in order to connect the HR users to the rest of the company’s employees D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for the devices. Provide a comprehensive list of devices, including the quantity of each device needed.
  • 5. Justification Justify your determination that the selected network security devices will meet the business needs. Example: I selected a Cisco ASA 5510 Firewall in order to protect the company’s network. E. Computer Systems Business Needs Assess the business needs. Proposed Computer Systems Select computer systems (servers) to use to implement the network design. Include setup and location information for the devices. Provide a comprehensive list of devices, including the quantity of each system needed. Justification Justify your determination that the selected systems will meet the business needs. Example: I selected Windows 10 Professional for the operating system, because it is the newest, most secure, and stable version of Windows for end users. II. Network Addresses Design (in its entirety) A. Subnetting Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically we
  • 6. borrow host bits to create networks (i.e., subnets). We have been assigned the network address 199.1.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 199. This octet falls in between 192 and 223. Class Octet Decimal Range A 1 - 126 B 128 - 191 C 192 - 223 Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with. Class Subnet Mask Format A 255.0.0.0 Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C 255.255.255.0 Network.Network.Network.Host CIDR (Classless Inter Domain Routing) CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address. ● Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation it would be written as /8, means address has 8 bits on. ● Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation it would be written as /16, means address has 16 bits on. ● Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet
  • 7. mask have all on bits. In slash notation it would be written as /24, means address has 24 bits on. Scenario The building will house four computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #2 and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, 1 instructor computer, and 1 server in the closet for instructional use. In addition, there will be a Student Computer Lab that will provide computer access to students to do their homework. There will be 25 computers in this lab and a server in the closet. To allow students access to library resources, the library will also have 20 computers for the general public to use and 5 computers for library staff. There needs to be separation between students, staff, and public access networks. The open WiFi also needs to be separate from the other three groupings. Finally, there are various offices in the building. Each of these offices will have one computer for
  • 8. staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor. You have been hired as part of the networking team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project. The university has recently leased a building in Adelphi, Maryland. The building will house offices, classrooms, a library, and computer labs. Security is important for UMUC, as the university must protect students’ and employees’ data, as well as any intellectual property that UMUC has on its servers and computers. As a result, IT management would like to take the time to review proposals on how best to move forward on security issues. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this building to support university operations. Methodology Given the aforementioned scenario, we are going to use the 192.168.0.0/24 network and create a total of 8 subnets, with 25 hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts. Subnet Description Required Hosts Students in Classroom 1 Computer Lab 23 Computers Students in Classroom 2 Computer Lab 23 Computers Students in Classroom 3 Computer Lab 23 Computers
  • 9. Students in Classroom 4 Computer Lab 23 Computers Students in Student Computer Lab 24 Computers Public Access network 20 Computers Equipment xx Network Peripherals (servers access points) Computers Staff Office / Admissions Network xx Computers (Using the How to Subnet a Network Video provided in CMIT 265 LEO - Content - UMUC Network Design Proposal, complete the following chart.) Subnet Network Address Host Address Range Broadcast Address Subnet Mask: 255.255.255._____ Classroom 1 192.168.0.0 192.168.0.1 – 192.168.0.30 192.168.0.31 Classroom 2 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__ Classroom 3 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__ Classroom 4 192.168.0.96 192.168.0.97 – 192.168.0.126 192.168.0.127 Student Computer Lab 192.168.0.128 192.168.0.129 – 192.168.0.158 192.168.0.127 Equipment 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__ Library Lab (Public Access) 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__ Staff Network 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__ III. Network Services Design A. Network Services Business Needs Assess the business needs Proposed Network Services Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).
  • 10. Justification Justify your determination that the network services are needed and will meet the business needs Example: There needs to be a DHCP, DNS, File, and Active Directory Server on the network. Please give examples of why these servers are needed and what role they will play. Cover policy and process such as configuration management, asset inventory, and baseline configuration. . B. Network Security Measures Business Needs Assess the business needs Proposed Network Security Measures Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures. Justification Justify your determination that the network security measures are needed and will meet the business needs. Example: Discuss Patching, Scanning, SIEM, Logging and other measures. How will the systems in this company’s network be updated? Discuss Firewall rules, for example all
  • 11. traffic will be allowed out or just ports 80 and 443 traffic will be allowed out. What version of Anti-Virus should be used on machines? Bibliography Be sure to use references that are scholarly in nature and follow the formatting rules of the IEEE ************************************************