Network Design Proposal

Project Instructions

 

You will provide a detailed network design proposal. Your task is to design the network for this new building with the following criteria:

  • Each Classroom Computer Lab will be on a separate network (i.e., subnet). The Library Computer Lab will be on a separate network, and the Office / Admissions computers will also be on a separate network. Finally, the open-WiFi network should be on a separate network, but can use a private IP address range (i.e., 192.168.0.0).
  • There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20 Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
  • The network has been assigned the 199.1.2.0/24 network address for all computers and devices.

Your proposal will be submitted in three major parts:

  • Physical Network Design
  • Network Addressing
  • Network Services Design

To learn how you will be assessed on this assignment, take a moment to review the rubric. The final deliverable should adhere to the following criteria:

  • Include at least five scholarly references.
  • Use IEEE-style citations.
  • Use correct network terminology.
  • The use of diagrams is encouraged.

Network Design Proposal Template

Network Design Proposal

 

 

 

 

 

Prepared for:

University of Maryland University College

 

 

Prepared by:

Student Name

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

In this section, address each of the following.

  1. Watch How to Subnet a Network Video provided in Content -> Project Instructions
  2. Review the Network Address Template provided in Content -> Project Instructions -> Project Templates for Parts 1 – 3
  3. Complete the subnet chart provided at the end of the document.

 

II. Network Addresses Design (in its entirety)

 

  1. Subnetting

 

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically we borrow host bits to create networks (i.e., subnets).

 

We have been assigned the network address 199.1.2.0.  Based on the chart below, we know this is a Class C address.  This is determined by observing the first octet of the IP address, which is 199.  This octet falls in between 192 and 223.

 

Class Octet Decimal Range
A 1 – 126
B 128 – 191
C 192 – 223

 

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.

 

Class Subnet Mask Format
A 255.0.0.0 Network.Host.Host.Host
B 255.255.0.0 Network.Network.Host.Host
C 255.255.255.0 Network.Network.Network.Host

 

CIDR (Classless Inter Domain Routing)

 

CIDR is a slash notation of the subnet mask.  CIDR tells us the number of on bits in a network address.

 

  • Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation it would be written as /8, means address has 8 bits on.

 

  • Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation it would be written as /16, means address has 16 bits on.

 

  • Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation it would be written as /24, means address has 24 bits on.

 

Scenario

 

The building will house six computer labs that will be used for instruction. In the building diagrams above, the labs are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1, Classroom #2, and Classroom #5 on the second floor; each computer lab will have a closet. Each lab will have 25 computers: 23 student computers, one instructor computer, and one server in the closet for instructional use.

 

To allow students access to library resources, the library will also have 20 computers for the general public to use and five computers for library staff.

 

Finally, there are 7 offices in the building. Each of these offices will have one computer for staff use, with the exception of the admissions office, which will have five computers. There will be two server rooms, one on the first floor and one on the second floor.

 

 

Methodology

 

Given the aforementioned scenario, we are going to use the 199.1.2.0 network and create a total of 8 subnets, with 25 hosts on each subnet.  The chart below describes structures the scenario to include each subnet and required hosts.

 

Subnet Description Required Hosts
Classroom 1 Computer Lab 25 Computers
Classroom 2 Computer Lab 25 Computers
Classroom 3 Computer Lab 25 Computers
Classroom 4 Computer Lab 25 Computers
Classroom 5 Computer Lab 25 Computers
Classroom 6 Computer Lab 25 Computers
Library Computer Lab 25 Computers
Office / Admissions Network 14 Computers

 

 

 

Using the How to Subnet a Network Video provided in CMIT 265 LEO – Content – UMUC Network Design Proposal, complete the following chart.

 

 

Subnet Network Address Host Address Range Broadcast Address
Subnet Mask: 255.255.255._____
Classroom 1 199.1.2.0 199.1.2.1 – 199.1.2.30 199.1.2.31
Classroom 2 199.1.2._ 199.1.2._ – 199.1.2._ 199.1.2._
Classroom 3 199.1.2._ 199.1.2._ – 199.1.2._ 199.1.2._
Classroom 4 199.1.2.96 199.1.2.97 – 199.1.2.126 199.1.2.127
Classroom 5 199.1.2.128 199.1.2.129 – 199.1.2.158 199.1.2.159
Classroom 6 199.1.2._ 199.1.2._ – 199.1.2._ 199.1.2._
Library Lab 199.1.2._ 199.1.2._ – 199.1.2._ 199.1.2._
Office Network 199.1.2._ 199.1.2._ – 199.1.2._ 199.1.2._

 

 

 

 

 

In this section, address each of the following.

  1. Identify network services needed.
  2. List additional servers or network devices needed to implement the network.
  3. List network security measures to be implemented.
  4. Justify the need for the network services, security measures, and devices you’ve selected.

III. Network Services Design

 

  1. Network Services

 

Business Needs

 

Assess the business needs

 

Proposed Network Services

 

Determine and list the network services needed to implement the design. Provide setup and licensing information (as necessary).

 

Justification

 

Justify your determination that the network services are needed and will meet the business needs

 

Example: There needs to be a DHCP, DNS, File, and Active Directory Server on the network. Please example why these servers are needed and what role they will play.

.

 

  1. Network Security Measures

 

Business Needs

 

Assess the business needs

 

Proposed Network Security Measures

 

Outline network security measures needed in the design. This includes training, monitoring, and maintenance procedures. Provide implementation details of these measures.

 

Justification

 

Justify your determination that the network security measures are needed and will meet the business needs.

 

 

Example: Discuss Patching.  How will the systems in this company’s network be updates? Discuss Firewall rules, for example all traffic will be allowed out or just 80 and 443 traffic will be allowed out. What version of Anti-Virus should be used on machines?

Order from us and get better grades. We are the service you have been looking for.