Designing A Network Corporate Writing

PAGES
4
WORDS
1209
Cite

Network Requirements With the acquisition of a newly leased building, UMUC requires a new network. The network includes coverage for the following places: six (6) instructional computer labs, a student computer lab, six (6) various offices, an admission office, library, and five (5) general classrooms. The network should encompass the following devices with respect to location:

Each computer lab should have 22 computers. The network should allocate 21 computers for students and one computer for each instructor. The network should allocate a collective total of 132 computers, given the requirement of six total instructional labs.

The student computer lab requires 31 computers.

The network should allocate one computer for each of the six various offices-six computers in total.

The admission office requires five computers.

The library requires 15 computers, 10 for students and 5 for faculty.

Five individual classrooms each require a computer.

Network IP Addresses

Each device of the network must have a unique IP address. Reese (2015) writes, "In a network, every device must have its own unique IP address. That is every network device (printer, server, router, etc.) must be identified with a separate IP address."Reese (2015) explains, "With IP addresses, an organization is assigned a unique IP network, such as 192.168.1.0, but a single IP address must be assigned for each network device." For example, Device 1 (router) and Device 2 (office printer) would respectively have IP addresses, 192.168.1.1 and 192.168.1.2 (Reese, 2015).

Network IP Address Schematic

The following table provides the IP address ranges for the 194 computers that comprise the network. This network design assigns a sequential IP address within the designated IP address range.

Device Location & Designation

Start of IP range

End of IP range

Sequential IP examples within range

Labs 1, 2,3,4,5 & 6 instructor

10.11.0.0.1

10.11.0.0.6

10.11.0.0.1, 10.11.0.0.2,10.11.0.0.3

Lab 1 students

10.11.0.0.7

10.11.0.0.27

10.11.0.0.7, 10.11.0.0.8, 10.11.0.0.9

Lab 2 students

10.11.0.0.28

10.11.0.0.48

10.11.0.0.28, 10.11.0.0.29, 10.11.0.0.30

Lab 3 students

10.11.0.0.49

10.11.0.0.69

10.11.0.0.49, 10.11.0.0.50, 10.11.0.0.51

Lab 4 students

10.11.0.0.70

10.11.0.0.90

10.11.0.0.70, 10.11.0.0.71, 10.11.0.0.72

Lab 5 students

10.11.0.0.91

...

The network design determines the selection of the subnet mask. For instance, class C addresses have "a number from 192 to 223 in the first octet." The corresponding subnet mask is 255.255.255.0. "The number 255 indicates that the corresponding section of the address is part of the network address. The 0 indicates that the corresponding section is the host portion of the address (Reese, 2015)."
For the Network and IP address of 10.11.0.0, the subnet mask is 255.255.0.0, over a IP class A (0.0.0.0 to 127.255.255.255). Following is a summary of the network address details.

IP Address: 10.11.0.0

Netmask: 255.255.0.0

Wildcard Mask: 0.0.255.255

CIDR Notation: / 16

Network Address: 10.11.0.0

Usable Host Range: 10.11.01-10.11.255.254

Broadcast Address: 10.11.255.255

Total Number of Hosts: 65,536

Number of Usable Hosts: 65,534

IP Class: A (0.0.0.0-127.255.255.255)

Table A, following, depicts the network and host portion of the IP address and corresponding subnet mask.

Table A: Subnet Mask

Network portion

Host Portion

10

11

0

0

0

0

Subnetting

Typography

The network design will incorporate the use of a bus, a rectangular ring, and tree typography to connect all the devices in the network. Since the classrooms are positioned across the floor and at opposite ends of the floor, a single bus line would not be ideal. A rectangular ring will form the base infrastructure for the network for each floor. However, within each of the sectioned rooms, the network design calls for parallel bus lines from opposite sides of room from a node of the larger ring. No bus line would be needed for at the opposite ends of the floor. The network design calls for the use…

Sources Used in Documents:

References

Freudenrich, C. (2015, March 3). How fiber optics work. Retrieved March 1, 2015, from http://computer.howstuffworks.com/fiber-optichtm

Geese. (2015, January 1). How to subnet a network. Retrieved March 1, 2015, from http://www.bradreese.com/how-to-subnet-a-network.pdf

Hilton, J. (2015, January 1). Network connections. Retrieved February 28, 2015, from http://www.geekinspired.com/networking/network-connection-devices/


Cite this Document:

"Designing A Network" (2015, March 03) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/designing-a-network-2149869

"Designing A Network" 03 March 2015. Web.26 April. 2024. <
https://www.paperdue.com/essay/designing-a-network-2149869>

"Designing A Network", 03 March 2015, Accessed.26 April. 2024,
https://www.paperdue.com/essay/designing-a-network-2149869

Related Documents

Network Design The process of gathering technical requirements for a network design project may differ from one organization to another, but the requirements themselves can be described using many of the concepts discussed in the lecture this week (i.e. Scalability, Availability, Network performance, Security, Manageability, and Affordability). Analyzing technical requirements for the customer is important in helping one best fulfill the customer's expectations. The various objectives that need to be fulfilled involve

During the PDIOO procedure one has to define main deliverables and related actions with a direct connection to the additional value and advantage for the customer network. For instance, understanding business objectives, usage features, and network necessitieshelps a person avoid pointlesselevations and network redesigns, thus reducing the time taken to introduce fresh services in the network. Planning Phase During the planning period one can test the significance of the design for future

Network Management and System Administration The aim of the paper is to establish the difference between a system administrator and a network administrator. The paper is thus divided into three sections. The first section deals with the basic definition and responsibilities of a system administrator; the second does the same for a network administrator and the third compares their responsibilities to clearly identify the differences between the two. System Administrator The maintenance of

" This approach would also help protect computer systems from unauthorized access by insiders as well, he says (3). In the spirit of "fight fire with fire," Rowe says that because computer hackers typically use deceptive practices (e.g., impersonation, viruses/worms, and denial of service attacks), it just makes good sense to turn the tables on the hackers by using honeypots and honeynets to collect the kinds of information required to do

Designing XML Databases
PAGES 20 WORDS 7877

Designing XML Databases What exactly is a 'web-enabled database? The World Wide Web, as everyone knows, provides the user with a host of tools with which he cane gain access to information and knowledge on the Internet and browse for information using web browsing technologies. Numerous people also use web browsing in order to deliver marketing messages, advertising information, promotional material for any products, and so on. However, what is most

Network Design Consultation Design recommended for the client The requirement of the client of the small billing business shall deserve a tailored system for his network design. This compels for network similar for a small office management process. Shall has a variety of the components suited in their places. The network shall facilitate the process of file sharing, internet access, connection to a networked printer, maintain a basic, secure environment and facilitate