Preview

Network design

Good Essays
Open Document
Open Document
753 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network design
The network IP addressing scheme for the MD building is designed to ease network management. It have to protect students and employees data as well as any intellectual property that UMUC has on the servers and computers.
The IPS with Application Level Gateway Firewall security appliance will be installed to secure the private network from the Internet and provide IPSec VPN connectivity to the main UMUC office. The Intrusion Protection System (IPS) is able to inspect network traffic, examine and filter based on information contained within the data portion of a packet. It help the IT personnel monitor, log, and detect security breaches. It could use to send security breach alerts, terminate security breaches, and terminate or restart processes.
The network will use the Ethernet, 24 RJ-45 ports, Power over Ethernet (P0E) switch series because of their high performance. The switches are can support up to 144 gigabit network connections (10/100/1000baseT Ethernet) and one will be installed on each floor in the Server Room. The switches will be configured with a tagged VLAN (Virtual Local Area Networks) for each subnet. The network will be secured using Active Directory single sign-on and IP addresses centrally managed using DHCP with DHCP relay enabled on the switches to forward DHCP broadcast traffic as unicast transmissions across VLAN boundaries. The switches also will be installed in each office or room which have more than four workstations. The switches will be connected in a partial mesh that ensures no single point of network failure.
A Wireless Access Point, 802.11b/g/n Wireless, 100Base TX Ethernet series will integrate seamlessly into the network with VLAN support and provide 104 Mbps network access speed. Wireless media access will be protected using WPA2 security with AES 256 encryption and authentication using user credentials and 802.1x integrated into Active Directory via Radius(ACLs applied to the VLAN for security).
The servers in server

You May Also Find These Documents Helpful

  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    • The XLS servers at the Delmar and Lajolla sites are running Office 97 – over 15 years old.…

    • 1191 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Kudler Fine Foods was first founded by Kathy Kudler in La Jolla, California. It has expanded to two more locations, Del Mar, California, and Encinitas, California. The stores are generally spaced, about 8,000 sq ft, and have imported and domestic foods, including Fresh Bakery & Pastries, Fresh Produce, Fresh Meat & Seafood, Condiments & Packaged foods as well as Cheese and other dairy products. Kudler wants to see their company grow by upgrading their communications systems and making it wireless. The wireless technology upgrade will allow the company to have a better way of communicating between the stores as well as to the employees and customers .…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the given network diagram, several domains need to be considered. This diagram includes the User, Workstation, LAN, and LAN-to-WAN domains. Security controls and their implementation are discussed below.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    I will also implement a wireless media utilizing the 802.11g/n standards. However, unlike physical media, wireless media is susceptible to security…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Network is the mediator between client computer and server. It connects client computers to the server and allows the sharing of information stored in server computers. A local business (EROS) hair me to design Network for the third and fifth floors, so that After carefully considering the requirements I and my team have prepared the following network design for third and fifth floors. The network design is given above. The goal of the designed is to the provide the best performance, avilability, speed and over all, maximun security to serve groing adjacent for two floors of orgaization’s needs.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The accounting firm presented with the possibility of moving to a newly constructed office site. The best time to make changes to any network architecture is when planning to deconstruct in one location and start anew in another. There are many different networking and security solutions available for a business interested in starting from scratch. The architectural design of a small business network requires assessments, feasibility and project planning several months in advance. The most important part of a network is the end user and their requirements of its use. Taking into account the pre-requisite of 10Gbps speeds and the location of each office from the wiring closet Twisted Pair Cat 5e Ethernet Cable was the cable that fulfilled the demands.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Network Design

    • 378 Words
    • 2 Pages

    You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays