Preview

Network Consultation For DesignIT

Powerful Essays
Open Document
Open Document
768 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Consultation For DesignIT
Network Consultation for DesignIT

Bernard Mincey
Strayer University
Professor: Dr. Ntinglet-Davis
CIS 175 (Intro to Networking)
12/13/2014

SCOPE OF WORK
The work that will be performed will include the design and installation of a fully switched star network. This includes the installation and setup of all the network devices, cabling and interfaces but may be limited to workstations, devices, servers, switches, routers, racks and all related software.
NETWORK SCOPE
The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.
OBJECTIVES
Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.
Scalability: The network design is scalable so that more network cable equipment can be added if needed and as funding becomes available without having to redo the installed network
Intended users: The users of the network will be 1 administrator, 2 full time employees and a receptionist.
DESIGN FEATURES
Server Room
The server room shall be a locked room, properly vented and air conditioned where the servers’ switches, firewalls, and an un-interruptible power supply will be housed along with any other electronic interfaces such as telephone systems, cable tv, internet access point of entry.
1. Link to an internet connection
a. Modem
b. Firewall
2. 2 -12 port switches will allow for growth and provide adequate levels of security and speed
3. 1 Server – server 2008 Small Business Server
4. 1 Web Server – Microsoft lls Server
5. 1 File Server – Microsoft Server 2008
6. Wireless Access Point
7. Cable management system to keep cables neat and organized
8. Un-interruptible power supply allowing for a controlled shut down in the event of a power failure
9.



References: Toigo, W. (n.d.). Retrieved from http://www.uniforum.org/publications/ufm/jul96/security.html Wallace, K. (2012). Securing a Network. (4th ed.) USA, CompTIA Network (pg.385) http://www.comparebusinessproducts.com/briefs/8-benefits-implementing-lan http://anti-virus-software-review.toptenreviews.com/the-benefits-of-having-anti-virus-protection.html

You May Also Find These Documents Helpful

  • Good Essays

    When establishing a home network it is important that you evaluate the needs you have for all of the users in your household as well as backup options and how we will connect to the network and the security of your network. I will be looking at developing such a network for my home using the given budget of $1,000 and explain why my choices will meet my networking needs as well as looking to see what changes could be made over time if given a larger budget to work with.…

    • 1002 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    For this network, I initially projected that one server would be sufficient to perform all the tasks, however, in order to make the network work more efficiently and reduce occasions for system downtime it would be more conducive to use multiple servers. I recommend that we use 3 servers. The main server would be the DHCP server. The second would be the email server, and the third for file sharing and printing.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    7) When granting access to LAN systems for GUESTS (i.e. auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented in order to maximize CIA of production systems and data?…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    building a new structure

    • 1808 Words
    • 8 Pages

    (a) The purpose of the “CS/EE Lab Building RFP” is to provide a functional specification for a comprehensive technology network system, including required network cabling and components and required network devices. The purpose of this is also to provide adequate details and criteria for the design of this technology network system.…

    • 1808 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    Designing and implementing a proper network design is an essential and yet critical step in building a reliable, top notch, network infrastructure. Developing the proper infrastructure can ensure performance at a level needed for growth and for stability all the while providing crucial time savings by minimizing the administrative workload. When designing a network you really want to implement scalability and future growth while ensuring minimal downtime and disruptions. Implementing scalability will ensure the network can grow with the organization. The network design I have implemented for UMUC which is depicted below provides scalability, security, and longevity.…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Better Essays

    The network IP addressing scheme for the Frederick MD building should be designed to ease network management. A well thought out network subnet design enables administrators to quickly locate computers by IP address by building floor and room, and whether the computer is a server, a student computer, staff computer or instructor’s computer. A proper subnet design will also minimize broadcast traffic that decreases network performance, by reducing the total number of computers allowed in each broadcast domain. A proper subnet design will also provide for efficient use of IP addresses by including only the number of IP addresses in each subnet necessary to support current computers plus a few additional IP addresses for immediate expansion when required. To differentiate subnets by IP address, student subnets start with a “1” in the third octet, staff subnets start with a “2” in the third octet where “10” in the second and third digits designates the location to be floor 1, “12” designates the location to be floors 1 and 2, “10” designates the location to be floor 1, “20” designates the location to be floor 2, and a second digit of “4” designates office staff and a second digit of “5” designates Admissions staff. The broadcast and network numbers have been removed from the IP address ranges below.…

    • 1166 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    A) There are no limitations on WANs so they can be custom built for the size of the organization. For the purpose of organizational expansion.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Also the network would be server based because connection will be coming from one central point for all computers allowing for information to be shared between users.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The computer system for ABC Healthcare is a unified network containing multiple elements. It consists of multiple computers connected a single Internet access point. The wireless access point allows for external and internal connections but does not distinguish between employees and customers. There is only one server for the entire company and there are no security separations within the network. The network does not have any firewall to prevent access from outside and a single switch moderates all internal connections. The use of personal computers is allowed with unmonitored connections to the system. The printer is connected directly to the network.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As far as the network goes I would first suggest switching it to a LAN or local area network. This type of network is far more beneficial than the current setup as it gives you room to expand without too much of a hassle. By upgrading to this type of network you will also save money as you will be able to share hardware such as printers through multiple stations. As far as security goes, all computers will be more secure, as they will be a client of a main host on the server which will be hard to break through its firewalls. Communication will very time efficient through an Instant Messaging program through the network, your co-workers will be able to chat quickly through this. The system monitor will be able to monitor the chat to make sure its appropriate for work as well. Storage back up is another great thing on this network, from the main computer you will be able to back up all computers on the network with a click of the mouse. This makes it easy for the System Administrator to keep all the systems running efficiently. Now let’s talk about the wiring (Dean, 2010).…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    We would like to take this time to introduce our company Interchange Network Design (IND). We are a multi-million dollar network design company that has the capabilities of handling small to large size network build outs and our specialty is Internetworking of networks on a medium to large scale. We have just finished the merging networks between (XOBNI, 2013) and (Yahoo, 2013). The interconnecting of the networks made it easier for the two companies to communicate via use of Intranet and Instant Real-time Messaging. Xobni also has a strong platform when it comes to using its email service and merging Yahoo networks with this was a very huge challenge for us to accomplish.…

    • 1032 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Also, after completing the lab, you must show your work by copying and pasting a screenshot of the following configurations/verification:…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Upgrade letter

    • 297 Words
    • 2 Pages

    Valerie I hope this information helps you in making a good business decision and improves your network performance greatly. If you have any more questions or technicalities you may need advice on, please don’t hesitate in contacting me. I will be more than happy to help you or visit the office for a more in depth analysis.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Network Topology Design

    • 696 Words
    • 3 Pages

    "Network addresses should be carefully planned managed and documented (Oppenheimer, p. 168)". All of the address names should make sense and should be easily understood. As Oppenhiemer states, I would begin planning by designing a model. Design the model without assigning any addresses (p.168). Once the model is designed, the network engineer will begin to assign blocks of addresses in a hierarchical fashion to allow scalability, and an easy level of understanding. Also important is developing policies and procedures for addressing and naming. This would involve plans for distributing authority for addressing and naming to avoid one department having to manage all addresses and names.…

    • 696 Words
    • 3 Pages
    Good Essays