Network Design Paper: assess UMUC’s technical requirements.
UMUC CMIT 265 Network Design Paper | Part 1 Part 2 Part 3
Paper , Order, or Assignment Requirements
I. Network Design
A. Network Topology
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowTechnical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, well¬being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).
Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).
Justification
This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).
B. Cables and Connectors
Note: (Students shouldconsider the needs for both a wired and wireless implementation as your proposal should include both.)
Technical Requirements
In this section, you will assess UMUC’s technical requirements related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Cables and Connectors
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students
C. Networking and Internetworking Hardware
Technical Requirements
In this section, you will assess UMUC’s technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Networking and Internetworking Devices
This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
D. Wide Area Network (WAN) Design
Technical Requirements
In this section, you will assess UMUC’s technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Wide Area Network (WAN) Design
This section should be used to provide the details of your proposed ISP solution, Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
E. Computer Systems Hardware
Technical Requirements
In this section, you will assess UMUC’s technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Computer Systems Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
II. Network Addressing and Security
A. Subnetting
Overview
Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).
We have been assigned the network address 192.168.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.
Class
Octet Decimal Range
A
1 – 126
B
128 – 191
C
192 – 223
Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
