Network Design Proposal

Network Design Proposal

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

Each Classroom Computer Lab will be on a separate network (i.e., subnet).
The Library Computer Lab will be on a separate network
The Office / Admissions computers will also be on a separate network
Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).
There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet
service.
The network has been assigned the 199.1.2.0/24 network address for all computers and devices.
Your proposal will be submitted in three major parts:

Physical Network Design
In this section, address each of the following.
1. Define the topology that will be used.
2. Select the appropriate network media.
3. Select the appropriate network connecting devices, including network security devices.
4. Select the appropriate computer systems to use to support the network design.
5. Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram).
6. Provide justifications for each element of your network design (numbers 1–4 above).

Network Addressing
In this section, address each of the following.
1. Watch How to Subnet a Network Video provided in Content -> Project Instructions
2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 – 3
3. Complete the subnet chart provided at the end of the document.
Network Services Design

Requirements:
Include at least five scholarly references.
Use IEEE-style citations.
Use correct network terminology.
The use of diagrams is encouraged.
The 50-year-old, two-story building has the following layout:
Building dimensions: length: 240 feet, width: 95 feet, height: 30 feet
The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and
Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25
computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.
To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.
Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have
five computers. There will be two server rooms, one on the first floor and one on the second floor.

Network Design Proposal Template
Network Design Proposal

Prepared for:
University of Maryland University College
Prepared by:
Student Name

I. Physical Network Design
Introduction

Consider introducing the overall objective of the network design. Look into UMUC’s Strategic Plan, how would the network design help the stakeholders, the leadership
of the university, the students, and the instructors achieve their goals? How would a great network design contribute to students (your) experiences in learning? To
do this we look at five aspects of a network design herein to support the leadership to help meet the goals of the strategic plan.
A. Network Topology

Business Needs

In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment.
If you need more information, feel free to ask your instructor or make some assumptions. If you make some assumptions, be sure to list them. This section is not about
the actual infrastructure or equipment, but it should discuss the business needs of the company.

Example

ABS Enterprises believes that employees’ health, well­being, and morale have a significant impact on the productivity of the employees and thus the overall results or
output of the company. The company wants to invest in a facility that will provide the most return on investment while still providing a facility that employees will
use. The company has 20 employees and wants needs one or more servers and two printers. All computers should be able to communicate, but the HR staff of 5 needs to be
on a separate network due to the sensitive information on their PC’s.

Proposed Topology

Select one or more topologies to use for this design (star, bus, mesh, ring- Please note that the star topology is the most commonly used). This section should be used
to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. Below is an example topology. Topologies can be
created using Microsoft Visio, or you can create a free account at gliffy.com and create diagrams.

Justification

(Each section should contain the reasoning you present to justify the selection you made for your proposal. Look at it as your platform to tell finance and operations
personnel why this should be selected for the network design)
B. Network Media

Note: (Choose wired or wireless)Be aware that your solution needs to include support for the selected media. For example, if you choose wireless, ensure you have
wireless adapters for your desktops.

Business Needs

Assess the business needs.

Proposed Network Media (include network wiring diagrams)

Select one or more network media to use for this design.

Justification

Justify your determination that the selected media will meet the business needs.

C. Network Devices

Business Needs

Assess the business needs.

Proposed Network Devices

Select network devices to use to implement and support your design. Include setup and location information for the devices. Provide a comprehensive list of devices,
including the quantity of each device needed.

Justification

Justify your determination that the selected network devices will meet the business needs.

Example: I selected a Cisco 2621 Router in order to connect the HR users to the rest of the company’s employees

D. Network Security Devices

Business Needs

Assess the business needs.

Proposed Network Security Devices

Select network security devices to use to secure the network. Include setup and location information for the devices. Provide a comprehensive list of devices,
including the quantity of each device needed.

Justification

Justify your determination that the selected network security devices will meet the business needs.

Example: I selected a Cisco ASA 5510 Firewall in order to protect the company’s network.

E. Computer Systems

Business Needs

Assess the business needs.

Proposed Computer Systems

Select computer systems (servers) to use to implement the network design. Include setup and location information for the devices. Provide a comprehensive list of
devices, including the quantity of each system needed.

Justification

Justify your determination that the selected systems will meet the business needs.

Example: I selected Windows 10 Professional for the operating system, because it is the newest, most secure, and stable version of Windows for end users.

II. Network Addresses Design (in its entirety)

A. Subnetting

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask.
Basically we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address 199.1.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of
the IP address, which is 199. This octet falls in between 192 and 223.

Class Octet Decimal Range
A 1 – 126
B 128 – 191
C 192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to
work with.

Class Subnet Mask Format
A 255.0.0.0 Network.Host.Host.Host
B 255.255.0.0 Network.Network.Host.Host
C 255.255.255.0 Network.Network.Network.Host

CIDR (Classless Inter Domain Routing)

CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.

● Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation it would be written as /8, means
address has 8 bits on.

● Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation it would be written as /16,
means address has 16 bits on.

● Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation it would be written as /24,
means address has 24 bits on.

Scenario

The building will house four computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #2 and Classroom #4 on the
first floor and Classroom #1 and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, 1
instructor computer, and 1 server in the closet for instructional use.
In addition, there will be a Student Computer Lab that will provide computer access to students to do their homework. There will be 25 computers in this lab and a
server in the closet. To allow students access to library resources, the library will also have 20 computers for the general public to use and 5 computers for library
staff.
There needs to be separation between students, staff, and public access networks. The open Wi-Fi also needs to be separate from the other three groupings.
Finally, there are various offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will
have five computers. There will be two server rooms, one on the first floor and one on the second floor.

 

Methodology

Given the aforementioned scenario, we are going to use the 192.168.0.0/24 network and create a total of 8 subnets, with 25 hosts on each subnet. The chart below
describes structures the scenario to include each subnet and required hosts.

Subnet Description Required Hosts
Students in Classroom 1 Computer Lab 23Computers
Students in Classroom 2 Computer Lab 23Computers
Students in Classroom 3 Computer Lab 23Computers
Students in Classroom 4 Computer Lab 23Computers
Students in Student Computer Lab 24Computers
Public Access network 20 Computers
Equipment xx Network Peripherals (servers access points)Computers
Staff Office / Admissions Network xxComputers

(Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.)
Subnet Network Address Host Address Range Broadcast Address
Subnet Mask: 255.255.255._____
Classroom 1 192.168.0.0 192.168.0.1 – 192.168.0.30 192.168.0.31
Classroom 2 192.168.0.__ 192.168.0.__ – 192.168.0.__ 192.168.0.__
Classroom 3 192.168.0.__ 192.168.0.__ – 192.168.0.__ 192.168.0.__
Classroom 4 192.168.0.96 192.168.0.97 – 192.168.0.126 192.168.0.127
Student Computer Lab 192.168.0.128 192.168.0.129 – 192.168.0.158 192.168.0.127
Equipment 192.168.0.__ 192.168.0.__ – 192.168.0.__ 192.168.0.__
Library Lab (Public Access) 192.168.0.__ 192.168.0.__ – 192.168.0.__ 192.168.0.__
StaffNetwork 192.168.0.__ 192.168.0.__ – 192.168.0.__ 192.168.0.__
III. Network Services Design

A. Network Services

Business Needs

Assess the business needs

Proposed Network Services

Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).

Justification

Justify your determination that the network services are needed and will meet the business needs

Example: There needs to be a DHCP, DNS, File, and Active Directory Server on the network. Please give examples of why these servers are needed and what role they will
play. Cover policy and process such as configuration management, asset inventory, and baseline configuration.
.

B. Network Security Measures

Business Needs

Assess the business needs

Proposed Network Security Measures

Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these
measures.

Justification

Justify your determination that the network security measures are needed and will meet the business needs.
Example: Discuss Patching, Scanning, SIEM, Logging and other measures. How will the systems in this company’s network be updated? Discuss Firewall rules, for example
all traffic will be allowed out or just ports 80 and 443 traffic will be allowed out. What version of Anti-Virus should be used on machines?
Bibliography

Be sure to use references that are scholarly in nature and follow the formatting rules of the IEEE

Order from us and get better grades. We are the service you have been looking for.