Provide a detailed network design proposal. Your task is to design the network f
ID: 3769813 • Letter: P
Question
Provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:
Student-accessed computers should be on separate network from the staff-accessed computers. Computers for public use should be on a separate network.
There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
The network should use physical cable, not wireless. But do provide wireless access in the Student Lobby area (second-floor hallway). Set the maximum simultaneous wireless users to 254.
The network has been assigned the 10.11.12.0/23 network address for all computers and devices
The 50-year-old, two-story building has the following layout:
Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet
The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 32 computers: 30 student computers, 1 instructor computer, and 1 server in the closet for instructional use.
In addition, there will be a Student Computer Lab that will provide computer access to students to do their homework. There will be 50 computers in this lab and a server in the closet. To allow students access to library resources, the library will also have 10 computers for students and 5 computers for library staff.
Finally, there are various offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.
Your proposal should have three major sections:
Physical Network Design
In this section, address each of the following.
Define the topology that will be used.
Select the appropriate network media.
Select the appropriate network connecting devices, including network security devices.
Select the appropriate computer systems to use to support the network design.
Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
Provide justifications for each element of your network design (numbers 1–4 above).
Network Addressing
In this section, address each of the following.
Define the subnets (based on rooms, floor, department, or other criteria).
For each subnet, explain which devices/?groups/?users/?rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.
Network Services Design
In this section, address each of the following.
Identify network services needed.
List additional servers or network devices needed to implement the network.
List network security measures to be implemented.
Justify the need for the network services, security measures, and devices you’ve selected.
Please use correct network terminology and diagrams. Thank you so much for your help.
First Floor Layout omce #1 Senuer Senet Cbs room # 2 Room cloett Cloeet Closet LDraNExplanation / Answer
Here 23 network gives you total of 512 network addresses. Divide them in blocks of 16/32/64/128 between the groups, then start writing down the numbers.
Physical Network Design
1) he topology used for this design is a star topology, the computers in each classroom/office are connected to a central device (switch). The reason for this topology is because it allows for the network to be expanded without disruption, it is easy to implement troubleshooting and a break in any single cable does not cause the entire network to fail . The only downside to this topology is cost. It requires more cable than most other topologies as well as networking devices
Justification - Justify that the selected topologies will meet the business needs. Use the information provided in the scenario to make the appropriate assumptions. Be sure to also provide an analysis of the justification for the infrastructure or equipment.ecause of the topology selected, the best media to support it would be CAT6 STP because it is very easy to build, it is very reliable, allows for very high speeds, it is easy to conceal and manage (it is flexible) and it shields interference effectively. The caveat for this type of media is that its maximum length is limited to 328 feet (100 meters) for any single patch.
2) Switch x11 – For each room that requires more than one computer and the server rooms. The reason for this is so that ports can be allocated accordingly to staff or students as well.
Patch Panel x11 – For each room that has a switch so that multiple computers can access the ports on the switch. The patch panel will provide the network with a connection point between network equipment and the ports to which the PCs are connected.
Router x1 – This is where the default gateway for the network will be and is located at the demarcation point. It is used to route information obtained by the network and deliver packets returned by the Internet.
Wireless Access Point x1 – The WAP will be located in the Library and is used to grant wireless access to the internet via the router to those who need it.
Justification -The routers allow for a fully routed network. Since we are using different subnets, we need to have means to route packets from/to the correct networks.
3) Select network devices to use to implement the design. Include setup and location information for the devices.Select network security devices to use to secure the network. Include setup and location information for the devices.
Justification - Justify your determination that the selected network devices will meet the business needs.
4) Select network security devices to use to secure the network. Include setup and location information for the devices. Provide comprehensive list of devices including the quantity of each device needed.
Shielded Cat5 Twisted pair cabling that are plenum-rated. These cables will be used within the drop ceiling of the building when connecting computers to the switch
Justification - he network devices proposed will allow the network to be fast, reliable and secure. The switches allow for intelligent packet distribution which minimizes unnecessary traffic between subnets while also providing local connectivity in case of a connectivity interruption in some other segment.
The firewalls allow for security against threats both coming from the internet and from the local subnets. With two firewalls we create a DMZ for the servers to operate with minimized exposure.
5) Select computer systems to use to implement the network design. Include setup and location information for the devices. Provide comprehensive list of devices including the quantity of each system needed.
Justification - Justify your determination that the selected systems will meet the business needs.
6) Subnetting -
Proposed Subnetting
List the quantity of subnets needed. For each subnet, provide the IP addressing info (network address, broadcast address, range of available IP addresses) and the systems, devices, or equipment that will be on that network. Also provide the calculations on how those IP addressing information are determined.
Justification
Justify your determination that the network address design will meet the business needs why the design needs to have x number of subnets? What are the implications if they have more or less subnets.The reason for the sub-netting address scheme selected is ideal for this scenario because it logically separates the computers between students, staff members and servers. It also is designed to allow for future expansions
Network Addressing
Subnets:
One per lab = 6 subnets
One for the student computer lab = 1 subnet
One for all staff members in all offices = 1 subnet
One for the students in the library = 1 subnet
One for all instructor’s on the 5 lecture rooms = 1 subnet
One for the servers on first and second floor = 1 subnet
Total 11 subnets.
Network Address: 10.11.0.0
Network Mask: 255.255.0.0
There will be AT LEAST 11 subnets.
That would put us in a situation where we need at least 31 addresses per subnet.
The closest number of addresses provided by a subnet would be 32. However, as all subnets need an address for network and an address for broadcast, the effective number of IP addresses in those subnets is 30.
As the Student computer lab needs at least 31 addresses, we need to move to a 64 addresses subnet.
As we have a full class B network (a Class A address with a class B mask), we can project some growth on the number of devices in each classroom / office and use a full Class C network for each subnet. That will put each subnet in 256 addresses where 0 would be the network address and 255 the broadcast address giving us 254 available IPs on each subnet.
Instructional Computer labs:
10.11.0.0/24 Addresses: 10.11.0.1 to 10.11.0.254
10.11.1.0/24 Addresses: 10.11.1.1 to 10.11.1.254
10.11.2.0/24 Addresses: 10.11.2.1 to 10.11.2.254
10.11.3.0/24 Addresses: 10.11.3.1 to 10.11.3.254
10.11.4.0/24 Addresses: 10.11.4.1 to 10.11.4.254
10.11.5.0/24 Addresses: 10.11.5.1 to 10.11.5.254
Student Computer Lab
10.11.10.0/24 Addresses: 10.11.10.1 to 10.11.10.254
Staff members in all offices
10.11.20.0/24 Addresses: 10.11.20.1 to 10.11.20.254
Students in the library
10.11.30.0/24 Addresses: 10.11.30.1 to 10.11.30.254
Instructor’s on the 5 lecture rooms
10.11.40.0/24 Addresses: 10.11.40.1 to 10.11.40.254
Servers on first and second floor (DMZ):
10.11.100.0/24 Addresses: 10.11.100.1 to 10.11.100.254
Network Services Design
1- Implement networking services such as DNS server to easily find and access network services, and DHCP server for automatic, centralized IP address management
2-
Routers
Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks
Bridges
A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments.
Ethernet Hubs
An Ethernet hub is also called a multiport repeater. A repeater is a device that amplifies a signal as it passes through it, to counteract the effects of attenuation
Routing tables
Routers contain internal tables of information called routing tables that keep track of all known network addresses and possible paths throughout the internetwork, along with cost of reaching each network.
3)Firewalls
By far the most common security measure these days is a firewall.
Antivirus systems
Everyone is familiar with the desktop version of antivirus packages like Norton Antivirus and McAfee.
There are basically two types of intrusion-detection systems (IDS):
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.