Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

The University has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, library, and computer labs.
Building dimensions: Length: 240 Feet, Width: 95 Feet, Height: 30 Feet
The 50-year-old two-story building has the following layout:



There will be six computer labs that will be used for instruction. Each of these labs will have 22 computers (20 student computers and 1 instructor computer). Each of these labs will also have a server in the closet located inside the lab.
In addition to the six computer labs, there will also be a Student Computer Lab that will provide computer access to students to do their homework. There will be 30 computers in this lab and a server in the closet.
The library will also have some computers to allow students access to the library resources. There will be 10 computers for student's use in the library, and 5 computers for Library staff.
There are five lecture classrooms in the building. Each of this room will have a computer for instructor's use.
Finally, there are various offices in the building. Each of these offices will have one computer for the staff use, with the exception of the Admission office that will have 5 computers for staff use.
Equipment Inventory
Workstation
Placement Number of
Computers Users Total Computers
6 Instructional
Computer labs 22 Student and
Faculty 132
Student Computer Lab 31 Student 31
6 various offices 6 Staff/Faculty 6
Admission office 5 Staff 5
Library 10 Student 10
Library 5 Staff 5
5 classrooms 1 Faculty 5
Server Staff To be determined by students
Network Connecting Devices IT Staff To be determined by students
Printers To be determined by student
Two server rooms have been allocated, one on the first floor and one on the second floor.

Your task is to design the network for this new building with the following criteria:

  • Student-accessed computers should be on separate network from the staff-accessed computers.

• The whole building will share one Internet access connection (T-1 link from Verizon). This connection will come into the Server Room on the first floor.
• Security is very important for UMUC as we have to protect students and employee's data as well as any intellectual property that UMUC has on the servers and computers.
• The network has been assigned the 10.11.0.0/16 network address for all computers and devices. For Internet routing use 151.1.1.1 IP address.

  • The network should use physical cable (not wireless), but do provide wireless access in the Student Lobby area.

Submission should include (in no more than ten pages, excluding diagrams and references):
Network Addressing:
1. Define the subnet (based on: rooms, floor, department, or other criteria).
2. For each subnet, explain which devices/groups/users/rooms will be on this subnet, define the network address, subnet mask, and available IP addresses to be used by computers or devices.

Physical Network Design:
1. Define the topology that will be used.
2. Select the appropriate network media to use.
3. Select the appropriate network connecting devices to use.
4. Physical layout of the computers on the floor plan.
5. List of additional servers or network devices needed to implement the network.
6. Justifications for your network design (number 1 - 5 above)

You will be evaluated on your ability to
o Implement appropriate IP addressing scheme
o select and justify appropriate cable media that includes the length of each cable segment and number of nodes on each segment
o select and justify appropriate topology such as star, bus, or ring for your network
o select and justify of your selected network equipments
o select and justify appropriate network services to meet network requirements
o select and justify security implementation for the network
o use proper grammar, formatting, network terminology, and reference citations

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9909944

Have any Question?


Related Questions in Computer Engineering

A summary of business activities of a course registration

A summary of business activities of a "Course Registration System" for enrolling courses for students and for enrolled class lists for faculty members at an online university is as follows: The Physics Department provide ...

1 what is the boolean expression for an and gate2 what is

1. What is the Boolean expression for an AND gate? 2. What is the Boolean expression for an OR gate? 3. What is the Boolean expression for a NOT gate?

Suppose that on your birthday you checked the balance on

Suppose that on your birthday you checked the balance on your retirement account and you decided to make a $1,000 payment at the end of every month until you retire at the specified age. If you disreagard the inflation ( ...

The toronto blue jays raises ticket prices from 100 to 120

The Toronto Blue Jays raises ticket prices from $100 to $120 per seat and experience a decline in ticket sales from 12000 to 10000 per game. i) What is the elasticity of demand for tickets? ii) Assuming the marginal cost ...

A different ethanol processing facility costs 800000 to

A different ethanol processing facility costs $800,000 to construct but will instead last forever. Every year (starting the year after  construction), it produces 10,000 barrels of ethanol and can charge a price of $4 pe ...

Question suppose that a remote transmitter sends a message

Question : Suppose that a remote transmitter sends a message at 2500 Baud and the receiver is expecting the data rate to be 2400 Baud. Calculate the accumulated sample error for one character. Give the answer in bits.

Need help with a java program that takes two arrays a and b

Need help with a Java program that takes two arrays a and b of length 5 storing int values, and returns the dot product of a and b. That is, it returns an array c of length n such that c[i]=a[i]*b[i].

From a security standpoint do you believe the apple

From a security standpoint, do you believe the Apple approach of hiding permissions or the Android approach of requiring the user to accept application permissions is a better approach? Why do you feel this way and do yo ...

You really need help with this assignment please provide

You really need help with this assignment. Please provide step by step instructions and screenshot of the steps and execution, so I can follow how to complete this assignment. Prof. Orlando Karam maintains an Ubuntu Linu ...

You have a deck of magic the gathering cards with 60 cards

You have a deck of Magic the Gathering cards with 60 cards total. In the deck you have 20 Mana cards, 18 Spells, 3 Artifacts, 12 Creatures, 6 Enchantments and 1 Planes Walker. What is the probability that you draw 2 arti ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As