Project Instructions
You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:
Your proposal will be submitted in three major parts:
To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:
Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name
In this section, address each of the following.
Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically we borrow host bits to create networks (i.e., subnets).
We have been assigned the network address 199.1.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 199. This octet falls in between 192 and 223.
Class | Octet Decimal Range |
A | 1 – 126 |
B | 128 – 191 |
C | 192 – 223 |
Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.
Class | Subnet Mask | Format |
A | 255.0.0.0 | Network.Host.Host.Host |
B | 255.255.0.0 | Network.Network.Host.Host |
C | 255.255.255.0 | Network.Network.Network.Host |
CIDR (Classless Inter Domain Routing)
CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address.
Scenario
The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.
To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.
Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.
Methodology
Given the aforementioned scenario, we are going to use the 199.1.2.0 network and create a total of 8 subnets, with 25 hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts.
Subnet Description | Required Hosts |
Classroom 1 Computer Lab | 25 Computers |
Classroom 2 Computer Lab | 25 Computers |
Classroom 3 Computer Lab | 25 Computers |
Classroom 4 Computer Lab | 25 Computers |
Classroom 5 Computer Lab | 25 Computers |
Classroom 6 Computer Lab | 25 Computers |
Library Computer Lab | 25 Computers |
Office / Admissions Network | 14 Computers |
Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.
Subnet | Network Address | Host Address Range | Broadcast Address |
Subnet Mask: 255.255.255._____ | |||
Classroom 1 | 199.1.2.0 | 199.1.2.1 – 199.1.2.30 | 199.1.2.31 |
Classroom 2 | 199.1.2._ | 199.1.2._ – 199.1.2._ | 199.1.2._ |
Classroom 3 | 199.1.2._ | 199.1.2._ – 199.1.2._ | 199.1.2._ |
Classroom 4 | 199.1.2.96 | 199.1.2.97 – 199.1.2.126 | 199.1.2.127 |
Classroom 5 | 199.1.2.128 | 199.1.2.129 – 199.1.2.158 | 199.1.2.159 |
Classroom 6 | 199.1.2._ | 199.1.2._ – 199.1.2._ | 199.1.2._ |
Library Lab | 199.1.2._ | 199.1.2._ – 199.1.2._ | 199.1.2._ |
Office Network | 199.1.2._ | 199.1.2._ – 199.1.2._ | 199.1.2._ |
In this section, address each of the following.
Business Needs
Assess the business needs
Proposed Network Services
Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).
Justification
Justify your determination that the network services are needed and will meet the business needs
Example: There needs to be a DHCP, DNS, File, and Active Directory Server on the network. Please example why these servers are needed and what role they will play.
.
Business Needs
Assess the business needs
Proposed Network Security Measures
Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures.
Justification
Justify your determination that the network security measures are needed and will meet the business needs.
Example: Discuss Patching. How will the systems in this company’s network be updates? Discuss Firewall rules, for example all traffic will be allowed out or just 80 and 443 traffic will be allowed out. What version of Anti-Virus should be used on machines?