Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

  • Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).
  • There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
  • The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

  • Physical Network Design
  • Network Addressing
  • Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the  rubric. The final deliverable should adhere to the following criteria:

  • Include at least five scholarly references.
  • Use  IEEE-style citations.
  • Use correct network terminology.
  • The use of diagrams is encouraged.

Use this  template as a guide while creating your Network Design Proposal (Parts 1-3).

Physical Network Design

In this section, address each of the following.

  1. Define the topology that will be used.
  2. Select the appropriate network media.
  3. Select the appropriate network connecting devices, including network security devices.
  4. Select the appropriate computer systems to use to support the network design.
  5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
  6. Provide justifications for each element of your network design (numbers 1-4 above).

Network Addressing

In this section, address each of the following.

  1. Watch How to Subnet a Network Video provided in Content -> Project Instructions
  2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 - 3
  3. Complete the subnet chart provided at the end of the document.

Network Services Design

In this section, address each of the following.

  1. Identify network services needed.
  2. List additional servers or network devices needed to implement the network.
  3. List network security measures to be implemented.
  4. Justify the need for the network services, security measures, and devices you've selected.

Building Details

The 50-year-old, two-story building has the following layout:

Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91956247
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Your task is to implement the simple elevator in python

Your task is to implement the simple elevator in Python using classes. The default strategy is the simple "start at the bottom, go to the top, then go to the bottom". Can you write a better strategy one that is more effi ...

Question why most of the researchers in the field of arabic

Question : Why most of the researchers in the field of Arabic text classification collected their own corpus and what is In-house Arabic corpus. The response must be typed, single spaced, must be in times new roman font ...

Question part 1 conflict within teamsthink of a conflict

Question: Part 1: Conflict within Teams Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of ...

Question this is a scholarly post and your responses should

Question: This is a scholarly post and your responses should have more depth than "I agree" and should demonstrate critical reflection of the problem in order to promote vigorous discussion of the topic within the forum. ...

One of the 5 halogens which are diatomic has the fastest

One of the 5 halogens (which are diatomic) has the fastest root mean square velocity at STP. Calculate this velocity in meters per second.

C programmingneed help with a c program arrayrearrangec

***C PROGRAMMING*** Need help with a C program array_rearrange.c that rearranges an integer array. The array will be split into two sets of integers one by one. A new array will be created by append the first set to the ...

Subnetting1 as system administrator you need to create 10

Subnetting 1) As system administrator, you need to create 10 subnets for the Network Address: 192.168.1.0 with a minimum of 10 hosts per subnet. Room for future expansion to more subnets is desirable. Create a table with ...

Scheme questionthe following program can be used to

Scheme Question The following program can be used to determine if a given interpreter is using applicative-order evaluations or normal-order evaluation: (define (p)(p)) (define (test x y) (if (= x 0) 0 y)) (test 0 (p)) ( ...

Explain that this threat represents a well-known and broad

Explain that this threat represents a well-known and broad category of electronic and human activities that breach the confidentiality of information.

String c is considered to be an interleaving of strings a

String C is considered to be an interleaving of strings A and B if it contains all (and only) the characters of both A and of B and their respective order is preserved in C. For example, C = aacabbaa is an interleaving o ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As