AAP Part I Deliverable:
Here is the assignment to be completed in your group. The tasks are organized in no particular order.
Highlevel drawing of proposed upgrades
Drawing of existing network
WAN links bandwidth for the network
Inventory and IP scheme
Scope of work or design requirements
The first task in a network design or an upgrading of the network is defining the scope of work. This
scope of work is outlined in the client’s Request for Proposal. This is your base line for developing the
scope of work. Here you will start gathering information about the client’s business goals and technical
requirements. To identify the business goals, interview upper management, focusing on technical
requirements. The IT department can then provide you with the specifications. In the real world, this step
is necessary to validate the information provided by the client’s RFP. In this assignment, however, this
part of the scope of work is optional. Either you can role play and interview each other to come up with
the information or you can skip it. If you skip it, your scope of work is the client’s RFP
Example: Identifying the scope of work:
The scope of this project consists of major modifications to the existing network, along with the
implementation of many new network devices and protocols. The main intent of this redesign is to: improve
network availability, network reliability, and network security; create a centralized network backbone;
implement the use of wireless access, and migrate from a PBX telephony system to an IP based telephony
solution.
The proposed design will affect all areas of the current network. Implementing a centralized backbone and
upgrading the speed of current links (from 10Mbs to 100Mbs) will greatly improve the entire network. The
implementation of a new IP schema, the introduction of VLAN’s, and implementation of new routing
protocols and security protocols will improve the network layer. Just as the implementation of wireless,
redundant switches, along with the design of a network edge area will improve the data link layer of the
network.
Ultimately, the redesign of the network needs to meet the customer’s intent for the redesign. During the
implementation phase of the redesign, the entire network will be affected in some way – that is, some
improvements will have an immediate impact, while other improvements are going to take more time to
implement and may cause some network disruption for a short time. However upon the conclusion of the
design implementation, the customer will have a greatly improved network, which will fulfill their company’s
IT needs, at present, and for many years to come.
The second task is to prepare the existing drawings, if not provided by the client.
The third task is to prepare an inventory list. This can be done by using software or physically verifying
the existing equipment. Your inventory list should include currently operable equipment and new
equipment (You can use the inventory t.
Background Information for the Campus Network Design ProjectXUMU.docxikirkton
Background Information for the Campus Network Design Project
XUMUC is large online university in the Eastern United States. The university has an enrollment of 90,000 students, mostly online. The students do not live on campus and are scattered around the globe. XUMUC offer courses in the fields of arts and humanities, business, social sciences, mathematics, computer science, the physical sciences, and health sciences. Many of the professors are working professionals with jobs in the business community, and only 5% of the 3000 faculty have offices on main campus. Due to opening of new online universities in the DC metropolitan area, the university has had difficult time attracting new students. The college wishes to attract and retain more students, many of whom leave the state to attend more prestigious colleges. Because of these reasons and others, the State advisory board expanded the Shady Grove campus of XUMUC. Nine states colleges open their branches at Shady Grove location. XUMUC’s management board now wishes to consolidate management functions at its Shady Grove location.
The president of XUMUC formed an Advisory Group whose mission was to consolidate IT functions and implement state of the art network to attract prospective students. The
Advisory Group was also to determine why prospective students do not select XUMUC. The group determined that many prospective students do not select XUMUC because they perceive the computer facilities at XUMUC to be inadequate. In addition to the computer applications used by the students and professors, the college administration personnel use the College Management System, which is a Novell NetWare client/server application that keeps track of class registrations and student records.
The Current Network at Shady Grove Campus:
The Shady Grove campus hosts 9 independent universities working independently. The campus has three main buildings and fiber optic cable is used for backbone connections. The campus diagram is shown below.
U N I V E R S I T Y
Building-2Building-1Building-3
XUMUC Shady Grove Campus
Towson
UB
Bowe
UMCP
Class Rooms
Labs
SE
UMES
UMBC
Class Rooms
UMUC
Library
Class Rooms
UMB
Labs
Each building is connected by fiber optic cable. Because most of the students that attend XUMUC do so on a part-time basis, and because much of the faculty have other jobs, the assumption in the past has been that many of the students and professors use computing resources at home or at work and do not depend on the XUMUC network. The current network is shown in Figure -1.
Fig:-1
Internet
Internet
Internet
Internet
Towson 4WS
UB 5WS
Bowe 5WS
UMCP 8WS
Class Rooms
and Labs
ES 4WS
UMES 8WS
UMBC 12WS
UMUC20WS
Library 25 WS
Class Rooms
UMB 15WS
Current Network Topology ShadyGrove
All the LANs at this site use 10-Mbps Ethernet although they can be upgraded to 100 Mbps. Every building is equipped with Category-5 cabling and wall plates in the various offices, classrooms, and labs, though the cablin ...
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxnoel23456789
COMP1609(2022/23)
Network and Internet Technology
and Design
Faculty Header ID:
11562
Contribution:100% of thecourse
Course Leader:
Jason Parke
NetSim Coursework
Deadline Date:
Monday 04/12/2022
This coursework should take an average student who is up to date with tutorial workapproximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadline
Learning Outcomes:
A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.D. Be competent in the use of tools designed to analyse and simulate network functionality.
Plagiarism is presenting somebody else's work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student's coursework; stealing coursework from
another student and submitting it as your work. Suspected plagiarism will be investigated and,
if
found
to
have
occurred,
will
be
dealt
withaccording
to
the
university's
procedures.
Please
see
yourstudent
handbook for
further details
of
what
is/isn't plagiarism.
All material copied or amended from any source (e.g., internet, books) must be referenced correctly accordingto the reference style you are using.
Your work will be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection systems will be treated as a severe Assessment Offence.
The
coursework
detailed
specification:
This
is
an
individual
assessment.
Your
investigation
shouldnot
be
shared
among
other
students.
The objective of the coursework is to simulate a client-server model communication over an IP network and to investigatean application and network performance in multiple providedscenarios.
This
assessment
requires
to use
NetSim
simulator.
The network architecture overview:
The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by theheadquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with anadditional call centre.
Greenwich HQ LAN:
The network is undefined and needs to be designed by the student with justifications,this implies justification of several nodes, users, andapplications.
New York office LAN:
It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications .
Case
1
Network
Design
Abstract
The
company
in
this
case
is
a
small
consulting
firm
whose
specialty
is
providing
their
customers
with
Microsoft
Windows
and
Citrix
networked
business
solutions.
They
believed
their
internal
servers
are
secure
due
to
their
diligence
in
keeping
the
Operating
Systems
up
to
date
with
the
latest
service
packs,
hotfixes
and
patches.
Virus
signatures
and
scanning
software
is
also
kept
current.
Your
security
company
has
been
given
the
task
of
evaluating
the
security
of
the
network
perimeter
and
to
make
recommendations
for
securing
our
network
perimeter
and
Internet
connection.
Examination
of
the
perimeter
infrastructure
showed
the
network
to
be
virtually
defenseless.
There
is
no
Firewall
installed
and
very
little
filtering
of
inbound
or
outbound
Internet
traffic
on
either
the
router
at
the
corporate
office
or
the
router
at
the
branch
office.
The
Linux,
Help
Desk,
Mail
server
and
the
two
Active
Directory
servers
had
direct
network
links
to
both
the
internal
network
and
the
Internet
making
them
prime
targets
for
intruders.
Your
proposal
is
to
completely
redesign
the
network
perimeter
to
provide
a
layered
Defense
in
Depth.
Current
Network
design
The
original
perimeter
network
design
included
two
Cisco
routers
and
five
publicly
addressed
servers,
four
of
which
were
Windows
based
and
the
fifth,
RedHat
Linux.
As
stated,
the
network
did
not
have
a
Firewall
device
and
the
perimeter
routers
performed
extremely
limited
inbound
packet
filtering.
The
corporate
router
is
configured
with
a
serial
interface
for
connection
to
the
Internet,
an
Ethernet
interface
for
the
public
network,
and
an
Ethernet
interface
for
the
internal
(private)
network.
The
branch
office
router
had
a
serial
interface
to
the
Internet
and
an
Ethernet
interface
to
their
internal
network
(diagram
1).
The
branch
and
corporate
routers
were
connected
by
VPN
tunnel
over
the
Internet.
The
various
network
devices
at
the
corporate
office,
both
internal
and
external,
were
connected
via
three
casc ...
Abdullah Faris Alkhaldi is seeking a technical role involving network projects, cyber security, or e-commerce development. He has a BS in Computer Network and Systems Administration from Michigan Technological University and experience managing networks and security for the Medical Services Department of the Saudi Ministry of Defense and other organizations. His skills include network engineering, security, VoIP, administration, and technical operations management.
COMP1609 (202223)Network and Internet Technologyand DesignF.docxrobert345678
COMP1609 (2022/23)
Network and Internet Technology
and Design
Faculty Header ID:
11562
Contribution: 100% of the course
Course Leader:
Jason Parke
NetSim Coursework
Deadline Date:
Monday 04/12/2022
This coursework should take an average student who is up to date with tutorial work approximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadline
Learning Outcomes:
A. Demonstrate knowledge of network communication, OSI and TCP/IP model.
B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.
C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.
D. Be competent in the use of tools designed to analyse and simulate network functionality.
(
Plagiarism is presenting somebody else's work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student's coursework; stealing coursework from
another student and submitting it as your work. Suspected plagiarism will be investigated and,
if
found
to
have
occurred,
will
be
dealt
with
according
to
the
university's
procedures.
Please
see
your
student
handbook for
further details
of
what
is/isn't plagiarism.
All material copied or amended from any source (e.g., internet, books) must be referenced
correctly
according
to
the
reference
style
you
are
using.
Your
work will
be
submitted
for
plagiarism
checking.
Any
attempt
to
bypass
our
plagiarism
detection
systems will be treated
as a
severe
Assessment Offence.
)
The coursework detailed specification:
This is an individual assessment. Your investigation should not be shared among other students.
The objective of the coursework is to simulate a client-server model communication over an IP network and to investigate an application and network performance in multiple provided scenarios.
This assessment requires to use NetSim simulator.
The network architecture overview:
The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by the headquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with an additional call centre.
Greenwich HQ LAN:The network is undefined and needs to be designed by the student with justifications, this implies justification of several nodes, users, and applications.
New York office LAN:It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some application.
This document provides a survey of machine and deep learning techniques for resource allocation in multi-access edge computing (MEC). It first presents tutorials on applying machine learning (ML) and deep learning (DL) in MEC to address its challenges. It then discusses enabling technologies for running ML/DL training and inference quickly in MEC. It provides an in-depth survey of ML/DL methods for task offloading, scheduling, and joint resource allocation in MEC. Finally, it discusses key challenges and future research directions of applying ML/DL for resource allocation in MEC networks.
Background Information for the Campus Network Design ProjectXUMU.docxikirkton
Background Information for the Campus Network Design Project
XUMUC is large online university in the Eastern United States. The university has an enrollment of 90,000 students, mostly online. The students do not live on campus and are scattered around the globe. XUMUC offer courses in the fields of arts and humanities, business, social sciences, mathematics, computer science, the physical sciences, and health sciences. Many of the professors are working professionals with jobs in the business community, and only 5% of the 3000 faculty have offices on main campus. Due to opening of new online universities in the DC metropolitan area, the university has had difficult time attracting new students. The college wishes to attract and retain more students, many of whom leave the state to attend more prestigious colleges. Because of these reasons and others, the State advisory board expanded the Shady Grove campus of XUMUC. Nine states colleges open their branches at Shady Grove location. XUMUC’s management board now wishes to consolidate management functions at its Shady Grove location.
The president of XUMUC formed an Advisory Group whose mission was to consolidate IT functions and implement state of the art network to attract prospective students. The
Advisory Group was also to determine why prospective students do not select XUMUC. The group determined that many prospective students do not select XUMUC because they perceive the computer facilities at XUMUC to be inadequate. In addition to the computer applications used by the students and professors, the college administration personnel use the College Management System, which is a Novell NetWare client/server application that keeps track of class registrations and student records.
The Current Network at Shady Grove Campus:
The Shady Grove campus hosts 9 independent universities working independently. The campus has three main buildings and fiber optic cable is used for backbone connections. The campus diagram is shown below.
U N I V E R S I T Y
Building-2Building-1Building-3
XUMUC Shady Grove Campus
Towson
UB
Bowe
UMCP
Class Rooms
Labs
SE
UMES
UMBC
Class Rooms
UMUC
Library
Class Rooms
UMB
Labs
Each building is connected by fiber optic cable. Because most of the students that attend XUMUC do so on a part-time basis, and because much of the faculty have other jobs, the assumption in the past has been that many of the students and professors use computing resources at home or at work and do not depend on the XUMUC network. The current network is shown in Figure -1.
Fig:-1
Internet
Internet
Internet
Internet
Towson 4WS
UB 5WS
Bowe 5WS
UMCP 8WS
Class Rooms
and Labs
ES 4WS
UMES 8WS
UMBC 12WS
UMUC20WS
Library 25 WS
Class Rooms
UMB 15WS
Current Network Topology ShadyGrove
All the LANs at this site use 10-Mbps Ethernet although they can be upgraded to 100 Mbps. Every building is equipped with Category-5 cabling and wall plates in the various offices, classrooms, and labs, though the cablin ...
Case Study - After establishing a reputation in the Arts and Design Markets, the Singapore Arts Academy (SAA) considers expanding and investing into a new Multimedia department and courses by setting up campuses around Asia pacific region. - By Hansa Edirisinghe
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxnoel23456789
COMP1609(2022/23)
Network and Internet Technology
and Design
Faculty Header ID:
11562
Contribution:100% of thecourse
Course Leader:
Jason Parke
NetSim Coursework
Deadline Date:
Monday 04/12/2022
This coursework should take an average student who is up to date with tutorial workapproximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadline
Learning Outcomes:
A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.D. Be competent in the use of tools designed to analyse and simulate network functionality.
Plagiarism is presenting somebody else's work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student's coursework; stealing coursework from
another student and submitting it as your work. Suspected plagiarism will be investigated and,
if
found
to
have
occurred,
will
be
dealt
withaccording
to
the
university's
procedures.
Please
see
yourstudent
handbook for
further details
of
what
is/isn't plagiarism.
All material copied or amended from any source (e.g., internet, books) must be referenced correctly accordingto the reference style you are using.
Your work will be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection systems will be treated as a severe Assessment Offence.
The
coursework
detailed
specification:
This
is
an
individual
assessment.
Your
investigation
shouldnot
be
shared
among
other
students.
The objective of the coursework is to simulate a client-server model communication over an IP network and to investigatean application and network performance in multiple providedscenarios.
This
assessment
requires
to use
NetSim
simulator.
The network architecture overview:
The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by theheadquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with anadditional call centre.
Greenwich HQ LAN:
The network is undefined and needs to be designed by the student with justifications,this implies justification of several nodes, users, andapplications.
New York office LAN:
It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications .
Case
1
Network
Design
Abstract
The
company
in
this
case
is
a
small
consulting
firm
whose
specialty
is
providing
their
customers
with
Microsoft
Windows
and
Citrix
networked
business
solutions.
They
believed
their
internal
servers
are
secure
due
to
their
diligence
in
keeping
the
Operating
Systems
up
to
date
with
the
latest
service
packs,
hotfixes
and
patches.
Virus
signatures
and
scanning
software
is
also
kept
current.
Your
security
company
has
been
given
the
task
of
evaluating
the
security
of
the
network
perimeter
and
to
make
recommendations
for
securing
our
network
perimeter
and
Internet
connection.
Examination
of
the
perimeter
infrastructure
showed
the
network
to
be
virtually
defenseless.
There
is
no
Firewall
installed
and
very
little
filtering
of
inbound
or
outbound
Internet
traffic
on
either
the
router
at
the
corporate
office
or
the
router
at
the
branch
office.
The
Linux,
Help
Desk,
Mail
server
and
the
two
Active
Directory
servers
had
direct
network
links
to
both
the
internal
network
and
the
Internet
making
them
prime
targets
for
intruders.
Your
proposal
is
to
completely
redesign
the
network
perimeter
to
provide
a
layered
Defense
in
Depth.
Current
Network
design
The
original
perimeter
network
design
included
two
Cisco
routers
and
five
publicly
addressed
servers,
four
of
which
were
Windows
based
and
the
fifth,
RedHat
Linux.
As
stated,
the
network
did
not
have
a
Firewall
device
and
the
perimeter
routers
performed
extremely
limited
inbound
packet
filtering.
The
corporate
router
is
configured
with
a
serial
interface
for
connection
to
the
Internet,
an
Ethernet
interface
for
the
public
network,
and
an
Ethernet
interface
for
the
internal
(private)
network.
The
branch
office
router
had
a
serial
interface
to
the
Internet
and
an
Ethernet
interface
to
their
internal
network
(diagram
1).
The
branch
and
corporate
routers
were
connected
by
VPN
tunnel
over
the
Internet.
The
various
network
devices
at
the
corporate
office,
both
internal
and
external,
were
connected
via
three
casc ...
Abdullah Faris Alkhaldi is seeking a technical role involving network projects, cyber security, or e-commerce development. He has a BS in Computer Network and Systems Administration from Michigan Technological University and experience managing networks and security for the Medical Services Department of the Saudi Ministry of Defense and other organizations. His skills include network engineering, security, VoIP, administration, and technical operations management.
COMP1609 (202223)Network and Internet Technologyand DesignF.docxrobert345678
COMP1609 (2022/23)
Network and Internet Technology
and Design
Faculty Header ID:
11562
Contribution: 100% of the course
Course Leader:
Jason Parke
NetSim Coursework
Deadline Date:
Monday 04/12/2022
This coursework should take an average student who is up to date with tutorial work approximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadline
Learning Outcomes:
A. Demonstrate knowledge of network communication, OSI and TCP/IP model.
B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.
C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.
D. Be competent in the use of tools designed to analyse and simulate network functionality.
(
Plagiarism is presenting somebody else's work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student's coursework; stealing coursework from
another student and submitting it as your work. Suspected plagiarism will be investigated and,
if
found
to
have
occurred,
will
be
dealt
with
according
to
the
university's
procedures.
Please
see
your
student
handbook for
further details
of
what
is/isn't plagiarism.
All material copied or amended from any source (e.g., internet, books) must be referenced
correctly
according
to
the
reference
style
you
are
using.
Your
work will
be
submitted
for
plagiarism
checking.
Any
attempt
to
bypass
our
plagiarism
detection
systems will be treated
as a
severe
Assessment Offence.
)
The coursework detailed specification:
This is an individual assessment. Your investigation should not be shared among other students.
The objective of the coursework is to simulate a client-server model communication over an IP network and to investigate an application and network performance in multiple provided scenarios.
This assessment requires to use NetSim simulator.
The network architecture overview:
The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by the headquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with an additional call centre.
Greenwich HQ LAN:The network is undefined and needs to be designed by the student with justifications, this implies justification of several nodes, users, and applications.
New York office LAN:It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some application.
This document provides a survey of machine and deep learning techniques for resource allocation in multi-access edge computing (MEC). It first presents tutorials on applying machine learning (ML) and deep learning (DL) in MEC to address its challenges. It then discusses enabling technologies for running ML/DL training and inference quickly in MEC. It provides an in-depth survey of ML/DL methods for task offloading, scheduling, and joint resource allocation in MEC. Finally, it discusses key challenges and future research directions of applying ML/DL for resource allocation in MEC networks.
MITS5003 Wireless Networks & Communication – 2020 – S1 .docxroushhsiu
MITS5003 Wireless Networks & Communication –
2020 – S1
Case Study
Submission Guidelines:
This is a Case study, wherein you will be responding to a RFP Request for Proposal a design of WLAN
Wireless LAN and Wide Area Network WAN. This assessment task is group task and you will work in
group to apply your knowledge, to analyse, design the network in this case study. This will cover the first
two learning outcomes and parts of other remaining learning outcomes of the unit. All submissions are to
be submitted through turn-it-in. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle
account. Assignments not submitted through these drop- boxes will not be considered. Submissions must
be made by the due date week-5 and time is Friday 4:00 PM.
The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turn-it-in will
check conference web-sites, Journal articles, the Web and your own class group members submissions for
plagiarism. You can see your turn-it-in similarity score when you submit your assignment to the
appropriate drop-box. If this is a concern you will have a chance to change your assignment and re-
submit. However, re-submission is only allowed prior to the submission due date and time. After the due
date and time have elapsed you cannot make re-submissions and you will have to live with the similarity
score as there will be no chance for changing. Thus, plan early and submit early to take advantage of this
feature. Groups can make multiple submissions, but please remember we only see the last submission, and
the date and time you submitted will be taken from that submission.
Your document should be a single word or pdf document containing your report.
A Wireless network Infrastructure design for enterprise network:
A request for proposal (RFP) to design a new Wireless Local Area
Network LAN and Backbone wide area network (WAN) network design
report.
Group formation: In each tutorial please form a group of 3 to 4 students to work on the group
assignment. The assignment specifications are in a form of request for proposal (RFP) which is a
solicitation, often made through a bidding process, by a company interested in procurement of
an installation contract service to potential suppliers to submit a proposal. This group
assignment provides an opportunity for you to work in a project as a group member and apply
data communications and Computer networking concepts to a practical network design. You will
be required to analyse a case study and make networking recommendations based on the RFP
requirements. This assignment will also allow you to present your solutions in a formal reporting
format. Contributions from individual members of a project group will be described in the formal
report. Peer assessment component will be discussed; Forms such as Individual load factor and
Group load factor will be used to access individual and group .
This document discusses the testing and evaluation of a video transmission system using a wireless local area network (WLAN) access point for instructional video broadcasting at a university. The system was built using a computer server to store and transmit instructional videos to clients via a WLAN access point. Tests were conducted to analyze network performance parameters like throughput, packet loss, and delay. Results showed the system could successfully broadcast videos from the server to clients in different quality settings over the university's 100 Mbps local network via the access point. This research aims to understand how to implement a wireless network using an access point for instructional video broadcasting in a university setting.
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
This document summarizes a research paper on virtual network recognition and optimization in an SDN-enabled cloud environment. The paper proposes using SDN and cloud computing technologies to increase the functionality and capacity of wireless networks. It formulates an online routing problem to maximize traffic flow over time while meeting constraints. A fast approximation algorithm is developed based on time-dependent duals. Extensive simulations show the algorithm outperforms heuristics by enabling end-to-end optimization and awareness of congestion and budgets. The paper concludes SDN is still emerging but highlights areas of expanding its scope and applications.
Enterprise networking course work under NCC EducationMd. Mahbub Alam
The document outlines submission requirements for students, including attaching a statement confirming the work as their own and acknowledging assessment standards. Students must provide identification details and ensure assignments are submitted before the due date. Plagiarism is prohibited under the program's academic dishonesty policy.
Consider introducing the overall objective of the network design/tutorialoutletPittock
FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
This document provides an overview of designing basic campus and data center networks. It discusses key considerations for enterprise network design including network application characteristics, environmental characteristics, and infrastructure device characteristics. Specifically, it covers different network application types, campus network geography including intrabuilding and interbuilding structures, transmission media options, and the role of switches in campus network design. The goal is to enhance productivity by providing network services to users based on organizational requirements and application needs.
The university deployed a wireless broadband network from Motorola Solutions across its multiple campuses to provide high-speed internet access for students, staff, and visitors. The network uses RFS7000 wireless switches and access points to deliver speeds up to 54Mbps, allowing users to access the internet throughout the grounds. This is improving the learning experience by enabling easier research and more productive use of breaks. The university also plans to offer a library of video lectures and use the network for security cameras and potentially VoIP phones.
The university deployed a wireless broadband network from Motorola Solutions across its multiple campuses to provide high-speed internet access for students, staff, and visitors. The network uses RFS7000 wireless switches and access points to deliver speeds up to 54Mbps, allowing users to access the internet throughout the grounds. This is improving the learning experience by enabling easier research and more productive use of breaks. The university also plans to offer a library of video lectures and use the network for security cameras and potentially VoIP phones.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
TNS provides telecommunication and network services to support voice, video, and data connectivity across campus. Key projects for 2005 include replacing the campus telephone system, upgrading switches, expanding high-speed network access to university apartments, and refreshing aging network equipment to support faster speeds and new technologies. TNS aims to reliably deliver quality communication services while recovering costs through user fees and maintaining infrastructure with capital funding.
This document provides an outline for a course on intranets and internet. It includes topics to be covered each week such as computer networks, internet, intranets and more. It also outlines rules and regulations for the course including requirements for attendance, participation, assignments and exams. Finally, it introduces some key concepts that will be discussed such as the interconnectivity of computers through networking and the educational resources available on the internet.
Danville Community College was experiencing problems with their aging phone system and network infrastructure. Dimension Data designed and implemented a phased solution to upgrade the network with Cisco switches and firewalls, replace the phone system with Cisco CallManagers and voicemail, and integrate a new satellite campus onto the same system. The final solution accomplished the college's goals of upgrading their systems, enhancing security, and reducing support costs.
Network designers ensure that communication networks can adjust and scale to demands for new services by creating hierarchical network designs. The core layer of this design transports large amounts of data quickly and reliably between different parts of the network. Design considerations for the core layer include using routers or multilayer switches, redundant links in a partial- or full-mesh topology, fast and aggregated links, and routing protocols that converge quickly like EIGRP and OSPF to provide 100% uptime, maximize throughput, and facilitate network growth.
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...Juniper Networks UKI
The University of the Highlands and Islands is unusual in that it covers an
extended geographic region (about half of Scotland, or a sixth of the land
area of the UK). It has almost 100 campus locations supporting about 7,500
Higher Education students and 25,000 Further Education students, and is
based across a wide range and variety of sites, from large campuses supporting
thousands of students, down to single room locations in remote rural areas and
on remote islands.
These broad-ranging geographic variations leave the university with
some unique IT challenges. Available bandwidth can vary hugely between
locations—some close to fiber-optic infrastructure and others in remote
corners of the region where even broadband speeds are low. Resiliency of
those communication links can be another challenge, as diverse routes can
be impractical, and sub-sea cables or radio links are more exposed than
land-based communication systems. Not least, the university must provide a
consistent service across all of its locations, whether they support a handful of
students or thousands.
American Research Journal of Humanities & Social Science (ARJHSS) is a double blind peer reviewed, open access journal published by (ARJHSS).
The main objective of ARJHSS is to provide an intellectual platform for the international scholars. ARJHSS aims to promote interdisciplinary studies in Humanities & Social Science and become the leading journal in Humanities & Social Science in the world.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
A blueprint architectural design for the City of Weslaco's Multi-protocol Label Switching (MPSL) Fiber Network. A jjoint team project between the City of Weslaco Information Technology Department and SmartCom Internet of McAllen, TX. / PAFF Management of Government Information Systems
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
w
r
i
t
ea
5
0
0
-
w
ordd
e
f
i
n
i
t
i
one
ss
a
ya
b
o
uta What is a hero? APA format
Y
o
u
re
ss
a
yw
i
l
l
b
e
g
r
a
d
e
don
i
tsa
b
i
l
i
t
ytoa
d
h
eretot
h
e
d
e
f
i
n
i
t
i
one
ss
a
y
f
or
m
.Do
e
s
y
o
ure
ss
a
yat
t
e
m
ptto
d
e
f
i
nea prob
l
e
m
at
i
c
c
o
n
c
e
p
t?Does
i
t
a
dd
t
o
t
h
e
d
i
sc
u
ss
i
onofh
o
w
p
e
o
p
l
e
m
i
g
h
tu
n
d
er
s
t
a
ndt
h
e
t
o
p
i
c
?
W
h
a
t
i
s at
s
t
a
k
e
i
n
y
o
ur d
i
sc
u
ss
i
o
n
?Inot
h
erword
s
,
i
s t
h
ereag
r
o
u
pofp
e
o
p
l
ewho
m
i
g
h
t
b
e
vi
n
d
i
c
a
t
ed
b
y
y
o
urde
f
i
n
i
t
i
o
n
?Re
m
e
m
b
e
rt
h
atwh
i
l
e
y
o
uare
w
r
i
t
i
nga d
e
f
i
n
i
t
i
one
ss
a
y
,
y
ou
w
a
n
ttoa
v
o
i
d
us
i
ng
t
he
d
i
c
t
i
o
n
a
r
y
i
t
s
e
l
f
.
T
h
i
s
i
s
m
e
a
ntto
b
ea d
e
f
i
n
i
t
i
o
n
t
h
a
t
y
o
u
cr
e
a
te,
n
ot
o
ne
t
h
a
t
y
o
uc
op
y
f
r
om a
s
o
u
rc
e.Ina
d
d
i
t
i
o
n,t
h
e
d
i
c
t
i
o
n
a
r
y
i
s
n
e
v
er
c
o
n
s
i
d
e
r
e
da
s
tr
o
ngac
a
d
e
m
i
c
s
o
u
rc
e b
e
c
a
u
s
e
i
n
f
or
m
at
i
ont
h
at
c
o
m
es
f
r
o
m t
h
e
di
c
t
i
o
n
a
r
y
a
nd
e
n
c
y
c
l
o
p
e
d
i
as
i
s
c
o
n
s
i
d
ered“
c
o
m
m
on
k
n
o
w
l
e
d
g
e
.”
T
h
e
r
e
f
ore,
i
n
s
ert
i
nga
d
i
c
t
i
o
n
a
r
yd
e
f
i
n
i
t
i
on
i
n
t
o
y
o
u
rp
a
p
er
m
a
k
es
i
t
s
e
e
mast
h
o
u
gh
y
o
u
a
r
e
n
otastro
n
gre
s
e
a
rc
h
er.
.
Writea minimum 300 word reflection in which you compare and.docxannetnash8266
Write
a minimum 300 word reflection in which you compare and
contrast the Chinese Spiritual Worldview with the Indian Spiritual
Worldview based on the textbook readings.
Describe the early Daoist teachers.
Explain basic Daoist teachings.
Characterize the ideal society according to Confucius.
Illustrate the influence of the natural world on Shinto belief and practice
.
More Related Content
Similar to AAP Part I DeliverableHere is the assignment to be comple.docx
MITS5003 Wireless Networks & Communication – 2020 – S1 .docxroushhsiu
MITS5003 Wireless Networks & Communication –
2020 – S1
Case Study
Submission Guidelines:
This is a Case study, wherein you will be responding to a RFP Request for Proposal a design of WLAN
Wireless LAN and Wide Area Network WAN. This assessment task is group task and you will work in
group to apply your knowledge, to analyse, design the network in this case study. This will cover the first
two learning outcomes and parts of other remaining learning outcomes of the unit. All submissions are to
be submitted through turn-it-in. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle
account. Assignments not submitted through these drop- boxes will not be considered. Submissions must
be made by the due date week-5 and time is Friday 4:00 PM.
The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turn-it-in will
check conference web-sites, Journal articles, the Web and your own class group members submissions for
plagiarism. You can see your turn-it-in similarity score when you submit your assignment to the
appropriate drop-box. If this is a concern you will have a chance to change your assignment and re-
submit. However, re-submission is only allowed prior to the submission due date and time. After the due
date and time have elapsed you cannot make re-submissions and you will have to live with the similarity
score as there will be no chance for changing. Thus, plan early and submit early to take advantage of this
feature. Groups can make multiple submissions, but please remember we only see the last submission, and
the date and time you submitted will be taken from that submission.
Your document should be a single word or pdf document containing your report.
A Wireless network Infrastructure design for enterprise network:
A request for proposal (RFP) to design a new Wireless Local Area
Network LAN and Backbone wide area network (WAN) network design
report.
Group formation: In each tutorial please form a group of 3 to 4 students to work on the group
assignment. The assignment specifications are in a form of request for proposal (RFP) which is a
solicitation, often made through a bidding process, by a company interested in procurement of
an installation contract service to potential suppliers to submit a proposal. This group
assignment provides an opportunity for you to work in a project as a group member and apply
data communications and Computer networking concepts to a practical network design. You will
be required to analyse a case study and make networking recommendations based on the RFP
requirements. This assignment will also allow you to present your solutions in a formal reporting
format. Contributions from individual members of a project group will be described in the formal
report. Peer assessment component will be discussed; Forms such as Individual load factor and
Group load factor will be used to access individual and group .
This document discusses the testing and evaluation of a video transmission system using a wireless local area network (WLAN) access point for instructional video broadcasting at a university. The system was built using a computer server to store and transmit instructional videos to clients via a WLAN access point. Tests were conducted to analyze network performance parameters like throughput, packet loss, and delay. Results showed the system could successfully broadcast videos from the server to clients in different quality settings over the university's 100 Mbps local network via the access point. This research aims to understand how to implement a wireless network using an access point for instructional video broadcasting in a university setting.
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
This document summarizes a research paper on virtual network recognition and optimization in an SDN-enabled cloud environment. The paper proposes using SDN and cloud computing technologies to increase the functionality and capacity of wireless networks. It formulates an online routing problem to maximize traffic flow over time while meeting constraints. A fast approximation algorithm is developed based on time-dependent duals. Extensive simulations show the algorithm outperforms heuristics by enabling end-to-end optimization and awareness of congestion and budgets. The paper concludes SDN is still emerging but highlights areas of expanding its scope and applications.
Enterprise networking course work under NCC EducationMd. Mahbub Alam
The document outlines submission requirements for students, including attaching a statement confirming the work as their own and acknowledging assessment standards. Students must provide identification details and ensure assignments are submitted before the due date. Plagiarism is prohibited under the program's academic dishonesty policy.
Consider introducing the overall objective of the network design/tutorialoutletPittock
FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
This document provides an overview of designing basic campus and data center networks. It discusses key considerations for enterprise network design including network application characteristics, environmental characteristics, and infrastructure device characteristics. Specifically, it covers different network application types, campus network geography including intrabuilding and interbuilding structures, transmission media options, and the role of switches in campus network design. The goal is to enhance productivity by providing network services to users based on organizational requirements and application needs.
The university deployed a wireless broadband network from Motorola Solutions across its multiple campuses to provide high-speed internet access for students, staff, and visitors. The network uses RFS7000 wireless switches and access points to deliver speeds up to 54Mbps, allowing users to access the internet throughout the grounds. This is improving the learning experience by enabling easier research and more productive use of breaks. The university also plans to offer a library of video lectures and use the network for security cameras and potentially VoIP phones.
The university deployed a wireless broadband network from Motorola Solutions across its multiple campuses to provide high-speed internet access for students, staff, and visitors. The network uses RFS7000 wireless switches and access points to deliver speeds up to 54Mbps, allowing users to access the internet throughout the grounds. This is improving the learning experience by enabling easier research and more productive use of breaks. The university also plans to offer a library of video lectures and use the network for security cameras and potentially VoIP phones.
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
This study shows how the network performance of a flat switch network in the main library
complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A
survey of the flat switch network of the library complex was carried out to ascertain the physical and logical
topology of the network and the number of hosts and network devices available. The kind of traffic
transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to
simulate two replicas of the library network. One of the simulated networks was logically segmented by
implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic
received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both
simulations and the results were analyzed and compared. The results from the simulations showed that
the application of VLAN immensely enhanced the network performance by about 75%(depending on the
size of the network) because the logical segmentation increased the number of broadcast domain while
reducing each of the broadcast size. This further implied that poor network design and large broadcast
domain in a network, gravely affect the performance of a network.
TNS provides telecommunication and network services to support voice, video, and data connectivity across campus. Key projects for 2005 include replacing the campus telephone system, upgrading switches, expanding high-speed network access to university apartments, and refreshing aging network equipment to support faster speeds and new technologies. TNS aims to reliably deliver quality communication services while recovering costs through user fees and maintaining infrastructure with capital funding.
This document provides an outline for a course on intranets and internet. It includes topics to be covered each week such as computer networks, internet, intranets and more. It also outlines rules and regulations for the course including requirements for attendance, participation, assignments and exams. Finally, it introduces some key concepts that will be discussed such as the interconnectivity of computers through networking and the educational resources available on the internet.
Danville Community College was experiencing problems with their aging phone system and network infrastructure. Dimension Data designed and implemented a phased solution to upgrade the network with Cisco switches and firewalls, replace the phone system with Cisco CallManagers and voicemail, and integrate a new satellite campus onto the same system. The final solution accomplished the college's goals of upgrading their systems, enhancing security, and reducing support costs.
Network designers ensure that communication networks can adjust and scale to demands for new services by creating hierarchical network designs. The core layer of this design transports large amounts of data quickly and reliably between different parts of the network. Design considerations for the core layer include using routers or multilayer switches, redundant links in a partial- or full-mesh topology, fast and aggregated links, and routing protocols that converge quickly like EIGRP and OSPF to provide 100% uptime, maximize throughput, and facilitate network growth.
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...Juniper Networks UKI
The University of the Highlands and Islands is unusual in that it covers an
extended geographic region (about half of Scotland, or a sixth of the land
area of the UK). It has almost 100 campus locations supporting about 7,500
Higher Education students and 25,000 Further Education students, and is
based across a wide range and variety of sites, from large campuses supporting
thousands of students, down to single room locations in remote rural areas and
on remote islands.
These broad-ranging geographic variations leave the university with
some unique IT challenges. Available bandwidth can vary hugely between
locations—some close to fiber-optic infrastructure and others in remote
corners of the region where even broadband speeds are low. Resiliency of
those communication links can be another challenge, as diverse routes can
be impractical, and sub-sea cables or radio links are more exposed than
land-based communication systems. Not least, the university must provide a
consistent service across all of its locations, whether they support a handful of
students or thousands.
American Research Journal of Humanities & Social Science (ARJHSS) is a double blind peer reviewed, open access journal published by (ARJHSS).
The main objective of ARJHSS is to provide an intellectual platform for the international scholars. ARJHSS aims to promote interdisciplinary studies in Humanities & Social Science and become the leading journal in Humanities & Social Science in the world.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
A blueprint architectural design for the City of Weslaco's Multi-protocol Label Switching (MPSL) Fiber Network. A jjoint team project between the City of Weslaco Information Technology Department and SmartCom Internet of McAllen, TX. / PAFF Management of Government Information Systems
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
Similar to AAP Part I DeliverableHere is the assignment to be comple.docx (20)
w
r
i
t
ea
5
0
0
-
w
ordd
e
f
i
n
i
t
i
one
ss
a
ya
b
o
uta What is a hero? APA format
Y
o
u
re
ss
a
yw
i
l
l
b
e
g
r
a
d
e
don
i
tsa
b
i
l
i
t
ytoa
d
h
eretot
h
e
d
e
f
i
n
i
t
i
one
ss
a
y
f
or
m
.Do
e
s
y
o
ure
ss
a
yat
t
e
m
ptto
d
e
f
i
nea prob
l
e
m
at
i
c
c
o
n
c
e
p
t?Does
i
t
a
dd
t
o
t
h
e
d
i
sc
u
ss
i
onofh
o
w
p
e
o
p
l
e
m
i
g
h
tu
n
d
er
s
t
a
ndt
h
e
t
o
p
i
c
?
W
h
a
t
i
s at
s
t
a
k
e
i
n
y
o
ur d
i
sc
u
ss
i
o
n
?Inot
h
erword
s
,
i
s t
h
ereag
r
o
u
pofp
e
o
p
l
ewho
m
i
g
h
t
b
e
vi
n
d
i
c
a
t
ed
b
y
y
o
urde
f
i
n
i
t
i
o
n
?Re
m
e
m
b
e
rt
h
atwh
i
l
e
y
o
uare
w
r
i
t
i
nga d
e
f
i
n
i
t
i
one
ss
a
y
,
y
ou
w
a
n
ttoa
v
o
i
d
us
i
ng
t
he
d
i
c
t
i
o
n
a
r
y
i
t
s
e
l
f
.
T
h
i
s
i
s
m
e
a
ntto
b
ea d
e
f
i
n
i
t
i
o
n
t
h
a
t
y
o
u
cr
e
a
te,
n
ot
o
ne
t
h
a
t
y
o
uc
op
y
f
r
om a
s
o
u
rc
e.Ina
d
d
i
t
i
o
n,t
h
e
d
i
c
t
i
o
n
a
r
y
i
s
n
e
v
er
c
o
n
s
i
d
e
r
e
da
s
tr
o
ngac
a
d
e
m
i
c
s
o
u
rc
e b
e
c
a
u
s
e
i
n
f
or
m
at
i
ont
h
at
c
o
m
es
f
r
o
m t
h
e
di
c
t
i
o
n
a
r
y
a
nd
e
n
c
y
c
l
o
p
e
d
i
as
i
s
c
o
n
s
i
d
ered“
c
o
m
m
on
k
n
o
w
l
e
d
g
e
.”
T
h
e
r
e
f
ore,
i
n
s
ert
i
nga
d
i
c
t
i
o
n
a
r
yd
e
f
i
n
i
t
i
on
i
n
t
o
y
o
u
rp
a
p
er
m
a
k
es
i
t
s
e
e
mast
h
o
u
gh
y
o
u
a
r
e
n
otastro
n
gre
s
e
a
rc
h
er.
.
Writea minimum 300 word reflection in which you compare and.docxannetnash8266
Write
a minimum 300 word reflection in which you compare and
contrast the Chinese Spiritual Worldview with the Indian Spiritual
Worldview based on the textbook readings.
Describe the early Daoist teachers.
Explain basic Daoist teachings.
Characterize the ideal society according to Confucius.
Illustrate the influence of the natural world on Shinto belief and practice
.
Writea draft of the paper on case tools and include the followin.docxannetnash8266
Write
a draft of the paper on case tools and include the following:
·
Define the term
case tools
and provide at least three examples.
·
Describe how case tools are used in the design of a database.
·
Explain how three different case tools are used in database design, including their advantages and disadvantages.
Format
your paper consistent with APA guidelines.
.
Write To complete the assignment, open the OUTLINE ATTACHMENT fi.docxannetnash8266
Write:
To complete the assignment, open the OUTLINE ATTACHMENT fill it out entirely. Within the worksheet, you will state your thesis statement, provide an outline of your paper, and integrate the four sources (below),
and FIND two more sources being a (webpage and online magazine ONLY) on the topic “The Affordable Care Act 2010”, into your outline to showcase how these resources support your ideas. Provide a full APA references list with a minimum of six sources. Please be sure to utilize outline format and to support all statements with scholarly research. All references should be listed in full APA format and cited appropriately.
Source 1-
Burkhauser, R. V., Larrimore, J., & Simon, K. (2013). Measuring the impact of valuing health insurance on levels and trends in inequality and how the Affordable Care Act of 2010 could affect them.
Contemporary Economic Policy
,
31
(4), 779-794.
Source 2-
Cooper, R. W., & Gardner, L. A. (2016). Extensive Changes and Major Challenges Encountered in Health Insurance Markets under the Affordable Care Act.
Journal of Financial Service Professionals
,
70
(5).
Source 3-
Hester, R. D. (2017). The successful innovations of the affordable care act of 2010.
Journal of Innovation and Entrepreneurship
,
6
(1), 18
Source 4-
Martin, E. J. (2015). Healthcare policy legislation and administration: Patient Protection and Affordable Care Act of 2010.
Journal of health and human services administration
, 407-411.
Source 5-
Sparer, M. S. (2011). Federalism and the Patient Protection and Affordable Care Act of 2010: The founding fathers would not be surprised.
Journal of health politics, policy and law
,
36
(3), 461-468.
.
Write your proposal based on the criterias listed below Pr.docxannetnash8266
Write your proposal based on the criteria's listed below
P
r
o
j
e
ct
c
r
i
te
r
i
a
h
a
v
e
b
e
en
p
l
aced
i
n
to
f
o
u
r c
a
teg
o
r
ie
s.
P
o
i
n
ts
a
re
a
w
ar
d
ed
f
o
reachc
a
teg
o
ry.
C
omm
u
n
i
ty
Fi
n
a
n
c
i
a
l
B
e
n
e
f
i
ts(ma
x
i
m
u
m
o
f
25
p
o
i
n
t
s
)
F
i
nan
c
i
a
lb
e
ne
f
i
t
t
o
t
hec
o
m
m
un
it
y
t
hrou
g
h add
i
ti
o
n
a
l
j
o
b
s
o
r
i
n
cr
e
asedre
v
enue
P
o
t
e
n
t
i
alforp
r
i
m
ary
j
obs
d
ef
i
n
ed
a
s
j
o
bs
t
h
a
tb
r
i
ng“
n
e
w
”
m
oney
i
n
t
o
t
h
e co
m
m
un
it
y
P
o
t
e
n
t
i
al
t
o
g
ene
r
a
t
e
i
n
cr
ea
sed
r
e
v
enuesfor
t
he
C
it
y
A
rea c
u
r
r
en
t
l
yexp
e
r
i
e
nc
e
sdec
r
ea
s
i
ngre
v
enues
P
r
o
j
e
ctco
u
l
d
r
edu
c
e
C
i
t
ycos
t
sor
n
eedforser
v
i
c
es
C
omm
u
n
i
ty
En
v
i
r
o
n
m
e
n
t
al
B
e
n
e
f
i
ts(ma
x
i
m
u
m
o
f25
p
o
i
n
ts)
E
li
m
i
na
t
es
o
rp
r
e
v
en
t
sad
v
erse
p
h
y
s
i
c
a
l
, s
o
c
i
a
l
o
re
c
o
n
o
m
i
c c
o
nd
i
ti
o
n
s
Im
pro
v
es co
m
m
un
it
y
i
m
a
geor
n
e
i
g
hbor
h
ood a
m
en
i
ti
e
s
P
r
o
j
e
ct
i
s
ti
m
e
l
y
i
n
i
m
pro
v
i
ngcond
i
t
i
onsorre
d
e
v
e
l
o
p
m
ent
A
rea
i
s
t
ar
g
e
t
ed f
o
r
i
m
pro
v
e
m
en
t
, rede
v
e
l
op
m
en
t
, or
c
o
m
m
un
it
y
i
m
pro
v
e
m
entp
r
o
j
e
c
t
s
C
omm
u
n
i
tyI
n
v
e
s
t
me
n
t
B
e
n
e
f
i
ts
(
ma
x
i
m
u
m
o
f25
p
o
i
n
t
s)
A
E
DA
’s r
e
t
urnon
i
n
v
es
t
m
ent
i
s
h
i
g
her
t
han 1
0
0%
T
r
i
gg
ers s
p
i
no
f
fb
e
ne
f
i
t
s f
o
ro
t
h
er
p
ro
p
e
r
ti
e
s orbu
s
i
n
e
sses
T
heap
p
l
i
ca
n
tsup
p
o
r
t
s
A
r
v
ada c
o
n
t
a
c
t
o
rsand p
u
rc
h
a
s
es su
p
p
l
i
es
i
n
A
r
v
ada
L
i
k
e
l
yrequ
i
r
e
s pu
b
li
cse
c
t
o
rpa
rt
i
c
i
pa
t
i
onfor
t
h
e pr
o
j
e
ct
t
o oc
c
ur
C
omm
u
n
i
ty
L
o
n
ge
v
i
ty
B
e
n
e
f
i
ts(ma
x
i
m
u
m
o
f
2
5
p
o
i
n
t
s
)
T
hebu
s
i
n
e
ss h
a
s b
e
en
i
n
A
r
v
ada f
o
ra
l
ongpe
r
i
od
o
f
ti
m
e
•
1-3 y
e
ars –5
p
o
i
n
ts
3-7 y
e
ars –10
p
o
i
n
ts
8-14
y
ears– 17
p
o
i
n
t
s
15+years– 25
p
o
i
n
t
s
.
Write a 350- to no more than 700-word paper using APA format.D.docxannetnash8266
Write
a 350- to no more than 700-word paper using APA format.
Describe
the flow of information in your company, or in a company at which you have been employed. In your paper, discuss the following:
The intrapersonal, interpersonal, group, organizational, and intercultural levels of communication within your company
How information travels up, down, and across your organization, and how it relates to the basic communications model
The functions of the Y hierarchy of managerial communications. Does it apply to your organization's communication hierarchy?
A comparison of at least three managerial communication approaches you have observed in your organization
At least three potential barriers to effective communications that exist in your company
A minimum of one reference and one in-text citation is required.
First person is acceptable.
.
Write a 350- to 700-word paper in which you investigate the interr.docxannetnash8266
Write
a 350- to 700-word paper in which you investigate the interrelationship between culture and visual entertainment media, such as television and film. Include answers to the following questions:
·
In what ways have various forms of visual entertainment media shaped American culture and its values?
·
Are the social influences of visual entertainment media mostly positive or negative? Explain.
Illustrate
your answers with specific examples.
Conclude
your paper by summarizing how visual media either reflect or influence social behavior and attitudes.
Format
your paper consistent with APA guidelines.
.
Write a 350 word analysis about juvenile attitudes toward poli.docxannetnash8266
Write
a 350 word analysis about juvenile attitudes toward police. Consider recent cases in the media regarding juvenile interactions with police departments. Analyze the attitudes today's youth have toward police. Address the following:
Summary of current media piece you are analyzing
Evaluation of attitudes and factors influencing attitudes
Is remediation of these attitudes necessary?
.
Write a 350- to 700-word paper in which you do the followingExp.docxannetnash8266
Write
a 350- to 700-word paper in which you do the following:
Explain what database systems are and how they are used.
Define database architecture. Consider Microsoft
®
Access
®
, Microsoft
®
SQL Server
®
, Oracle
®
, and IBM DB2
®
software as possible examples.
Summarize your paper by describing the database systems in your workplace, identifying which database systems and architecture they fall under.
Include
2 to 4 references.
Format
your paper consistent with APA guidelines.
.
Write a 350- to 700- word response to the following questionsHo.docxannetnash8266
Write
a 350- to 700- word response to the following questions:
How did psychology evolve into a science?
What are some psychological perspectives that explain human behavior?
A long-standing debate in the field of psychology is the degree to which nature and nurture shape human behaviors and traits. How would you describe the interaction between genetic potential, environmental influences, and personal choice?
Format
your response consistent with APA guidelines.
Click
the Assignment Files tab to submit your assignment.
AND
Write
a 500- to 1000-word essay contrasting the roles of the temporal and frontal lobes on behavior. Include the types of behaviors for which each lobe is responsible, as well as the effects of heredity on the development of these behaviors. Additionally, include what may happen if there is damage to these lobes, including Broca's and Wernicke's aphasias.
Format
your essay consistent with APA guidelines.
Click
the Assignment Files tab to submit your assignment.
.
Write a 1,400- to 1,750 word APA format paper regarding a so.docxannetnash8266
Write
a 1,400- to 1,750 word
APA format paper
regarding a social networking interview.
Identify
whom you interviewed, their title, and years of working experience in the area of Operations Management.
Provide
insights into your subject's role and why Operations Management is vital to his/her organization.
Provide
the reason for selecting the individual you chose to interview.
List
the questions you asked.
Include
a summary of the organization.
Give
a summary of what you learned as a result of this interview.
Provide
a reflection of what is important about this assignment.
Discuss
any follow-up activities the person you interviewed suggested.
Provide
at least two peer reviewed academic references. Make sure that the in-text citations matched the reference list.
Format
your paper consistent with APA guidelines.
IMPORTANT:
Make sure to review your assignment submission for content similarity on Safe Assign before submission. Assignment is preferred to have no more than 10% content similarity.
.
Write a 350- to 500-word summary in which you answer the following.docxannetnash8266
Write
a 350- to 500-word summary in which you answer the following questions:
What were the major developments in the evolution of mass media during the last century?
How did each development influence American culture?
What is meant by the term
media convergence
, and how has it affected everyday life?
700 word max.
.
Write a 300- to 350-word response to the followingWhen thinki.docxannetnash8266
Write
a 300- to 350-word response to the following:
When thinking about all the types of diversity that can exist within a group, what is the most important thing for group members to keep in mind when interacting with each other? Explain.
APA format
Include 2 references
.
WRITE A 2-page paper on the following questions. Your answers must.docxannetnash8266
WRITE
A 2-page paper on the following questions. Your answers must be written in paragraph style after each question.
1. What personal interests do you have in regard to the field of social work?
2. What are your personal values? List three or more
3. How do your identified values influence what you believe about how people should be served?
4. What do you think you will be doing in 7 years?
5. What are the values/interests/beliefs of your selected state representative or state senator (name them and cite their website) and how are they reflected in the policies of your state? Give concrete examples of your state policy.
.
Write a 1- to 2-page report for the Director of IT describing .docxannetnash8266
Write
a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:
Design requirements that must be addressed
Justification to use different frequencies, channels, and antennae in the installation
Regulatory requirements to consider in implementation
Security requirements
Create
a 1/2- to 1-page table for your team. In the table, summarize possible frequency choices, including an explanation of the strength and weakness of each.
No plagiarism please use attached files for the scenario!!!!
.
Write a 1,400- to 2,100-word paper in which you assess criminal ju.docxannetnash8266
Write
a 1,400- to 2,100-word paper in which you assess criminal justice from a global perspective. In your paper be sure to analyze the following:
Assess the impact of globalization on the U.S. criminal justice system.
Compare and contrast international criminal justice systems (Civil Law, Common law, and Islamic Law and Socialist Law traditions).
Discuss the impact that cyber crime and technology have had on worldwide justice systems.
Differentiate the policing systems on a worldwide scale.
Identify major crimes and criminal issues that have a global impact on justice systems and processes (e.g., Somalia, Rwanda, Bosnia, Darfur, Congo, etc.).
Include
at least four peer reviewed references.
Format
your paper according to APA guidelines.
Submit
your assignment.
.
Write a 1,750-word paper that includes the following(UNITED.docxannetnash8266
Write
a 1,750-word paper that includes the following:
(UNITED STATES COAST GUARD)
The organizational overview.
Prioritized assessment of the strengths, weaknesses, threats and vulnerabilities of your selected organization's security system(s), including facilities, people, information systems, and other appropriate assets.
The influence of crime and criminology in your assessment, as well as applicable national and global issues.
Format
your assignment consistent with APA guidelines.
ATTACH TURN IT IN REPORT
.
Write a 1.400 to 1,700 word essay that summarizes your Week 4 .docxannetnash8266
Write
a 1.400 to 1,700 word essay that summarizes your Week 4 presentation and additionally includes the following:
Summary of each of the following from your Week 4 presentation:
What are cultural groups?
How can you work toward more effective intercultural communication?
How is globalization challenging traditional hierarchies of culture?
What are co-cultural groups?
What are the five belief domains and how do they influence intercultural communication? (Refer to Ch. 9)
Summary of the following Week 5 concepts:
Positive and negative examples of how the media acts as a cultural socialization agent
Discussion of one media theory as it relates to how you interact with mass media
How to develop media literacy
How technology has fostered global intercultural communication
The challenges and opportunities within intercultural communication for women and minority success in the future
.
Write a 1,400- to 1,750-word paper highlighting considerations for.docxannetnash8266
Write
a 1,400- to 1,750-word paper highlighting considerations for creating a security budget.
Include
the following:
Identify the key player involved in creating the budget.
Discuss liabilities a budget can create for an organization.
Consider how these liabilities can be addressed.
Determine the need for executive protection using a cost-benefit analysis.
Also Include
a
Created Tree Graph outlining the steps that make up the budgeting process.
Format
your assignment consistent with APA guidelines.
.
Write a 1,050-word minimum strategic implementation plan in wh.docxannetnash8266
Write
a 1,050-word minimum strategic implementation plan in which you include the following:
Create an implementation plan including:
Objectives
Functional tactics
Action items
Milestones and deadlines
Tasks and task ownership
Resource allocation
Recommend any organizational change management strategies that may enhance successful implementation.
Develop key success factors, budget, and forecasted financials, including a break-even chart.
Create a risk management plan including contingency plans for the identified risks.
Format
your paper according to APA guidelines.
.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
AAP Part I DeliverableHere is the assignment to be comple.docx
1. AAP Part I Deliverable:
Here is the assignment to be completed in your group. The tasks
are organized in no particular order.
High-level drawing of proposed upgrades
Drawing of existing network
WAN links bandwidth for the network
Inventory and IP scheme
Scope of work or design requirements
The first task in a network design or an upgrading of the networ
k is defining the scope of work. This
scope of work is outlined in the client’s Request for Proposal. T
his is your base line for developing the
scope of work. Here you will start gathering information about t
he client’s business goals and technical
requirements. To identify the business goals, interview upper m
anagement, focusing on technical
requirements. The IT department can then provide you with the
specifications. In the real world, this step
is necessary to validate the information provided by the client’s
RFP. In this assignment, however, this
part of the scope of work is optional. Either you can role play a
nd interview each other to come up with
the information or you can skip it. If you skip it, your scope of
work is the client’s RFP
Example: Identifying the scope of work:
The scope of this project consists of major modifications to the
existing network, along with the
implementation of many new network devices and protocols. Th
2. e main intent of this redesign is to: improve
network availability, network reliability, and network security;
create a centralized network backbone;
implement the use of wireless access, and migrate from a PBX t
elephony system to an IP based telephony
solution.
The proposed design will affect all areas of the current network.
Implementing a centralized backbone and
upgrading the speed of current links (from 10Mbs to 100Mbs) w
ill greatly improve the entire network. The
implementation of a new IP schema, the introduction of VLAN’
s, and implementation of new routing
protocols and security protocols will improve the network layer.
Just as the implementation of wireless,
redundant switches, along with the design of a network edge are
a will improve the data link layer of the
network.
Ultimately, the redesign of the network needs to meet the custo
mer’s intent for the redesign. During the
implementation phase of the redesign, the entire network will be
affected in some way – that is, some
improvements will have an immediate impact, while other impro
vements are going to take more time to
implement and may cause some network disruption for a short ti
me. However upon the conclusion of the
design implementation, the customer will have a greatly improv
ed network, which will fulfill their company’s
IT needs, at present, and for many years to come.
The second task is to prepare the existing drawings, if not provi
ded by the client.
The third task is to prepare an inventory list. This can be done b
y using software or physically verifying
3. the existing equipment. Your inventory list should include curre
ntly operable equipment and new
equipment (You can use the inventory template, found in the co
urse module for guidelines). In the
absence of any site visit, you can also assume that you will disc
ard all current network devices.
The fourth task is preparing the proposal for a highly detailed u
pgrade drawing. This drawing should
include all key components of your network, such as: connectin
g devices, security devices, wireless
devices, VLANs, and subnets of the network)
The fifth task is preparing the IP scheme of your network
The sixth, and final, task is to calculate WAN links bandwidth f
or your voice network.
You will be graded on your participation in your group, accordi
ng to the degree and accuracy of your
contribution and based on the rubrics assigned and posted for th
is project.
Background Information for the Campus Network Design
Project
XUMUC is a large online university in the Eastern United
States. The university has an enrollment of 90,000 students,
mostly online. The students do not live on campus and are
scattered around the globe. XUMUC offers courses in the fields
of arts and humanities, business, social sciences, mathematics,
computer science, the physical sciences, and health sciences.
4. Many of the professors are working professionals with jobs in
the business community, and only 5% of the 3,000 faculty have
offices on the main campus. Due to the opening of new online
universities in the DC metropolitan area, the university has had
a difficult time attracting new students. The college wishes to
attract and retain more students, many of whom leave the state
to attend more prestigious colleges. Because of these reasons
and others, the State advisory board expanded the Shady Grove
campus of XUMUC. Nine states colleges open their branches at
Shady Grove location. XUMUC’s management board now
wishes to consolidate management functions at its Shady Grove
location.
The president of XUMUC formed an Advisory Group whose
mission was to consolidate IT functions and implement a state
of the art network to attract prospective students. The
Advisory Group was also to determine why prospective students
do not select XUMUC. The group determined that many
prospective students do not select XUMUC because they
perceive the computer facilities at XUMUC to be inadequate. In
addition to the computer applications used by the students and
professors, the college administrative personnel use the College
Management System, which is a Novell NetWare client/server
application that keeps track of class registrations and student
records.
The Current Network at Shady Grove Campus:
The Shady Grove campus hosts 9 independent universities,
working independently. The campus has three main buildings
and fiber optic cable is used for backbone connections. The
campus diagram is shown below.
U N I V E R S I T Y
Building-2Building-1Building-3
XUMUC Shady Grove Campus
5. Towson
UB
Bowe
UMCP
Class Rooms
Labs
SE
UMES
UMBC
Class Rooms
UMUC
Library
Class Rooms
UMB
Labs
Each building is connected by fiber optic cable. Because most
of the students that attend XUMUC do so on a part-time basis,
and because many of the faculty members have other jobs, the
assumption in the past has been that many of the students and
professors use computing resources at home or at work and do
not depend on the XUMUC network. The current network is
shown in Figure -1.
Fig:-1
Internet
Internet
Internet
Internet
Towson 4WS
UB 5WS
Bowe 5WS
UMCP 8WS
Class Rooms
6. and Labs
ES 4WS
UMES 8WS
UMBC 12WS
UMUC20WS
Library 25 WS
Class Rooms
UMB 15WS
Current Network Topology ShadyGrove
All the LANs at this site use 10-Mbps Ethernet although they
can be upgraded to 100 Mbps. Every building is equipped with
Category-5 cabling and wall plates in the various offices,
classrooms, and labs, though the cabling and wall-plates are not
used in some of the buildings. To support users in Building-3,
multi-mode fiber-optic cabling was pulled through cabling
conduits to Building-1 and Building-2. At the Shady Grove
campus, XMUC uses the services of 4 ISPs for internet
connections.
The college provides 10 Macintoshes and 25 PCs in the
Computing Center (in Building-1) for student use. A LAN
switch in the Computing Center connects hubs, servers, printers,
and the router that connects to the Internet. Shady Grove
campus does not have its own web server. For security, packet
filtering firewall is used on some routers. The routers have
default routes to the Internet and do not run routing protocols.
Based on the advice of the Community Advisory Group, the
president started the “Upgrade XUMUC Project” with the goal
of upgrading the computer and networking facilities. The three
network administrators and the Director of Operations for
XUMUC formed the Project Task Force.
Table:-1 Shady Grove Inventories
Subnets
7. Devices
Comment
UMUC
20
Work Stations
UMES
8
Work Stations
UMCPTowson
8
Work Stations
Towson
4
Work Stations
UB
5
Work Stations
UMB
15
Work Stations
Eastern Shore
4
Work Stations
UMBC
12
Work Stations
Bowe
5
Work Stations
Class Rooms
150
Work Stations
Shady Grove Administrations
50
Application server, Data server, and SAN
Router
8. 4
2600 series, Slow processing power
Switches
10 switches
All switches are without port security. No technology to reduce
convergence time.
Patch Panel
4
Hubs
5
Printers
5
Commercial Type in Copy Centre
Network Printers and departments Printers
25
Voice Network:
Shady Grove campus has 200 telephones on a separate voice
network. IP telephony is used for internal purposes. PSTN (the
Phone Company) is used to dial out. The logical diagram is
shown below.
PBX Switch
200 Capaity
Call ManagerPSTN NetworkInternetIP Data NetworkIP Voice
Network
Shady Grove Voice Network
Security:
The site recently experienced an increase in network attacks
(DoS). The network was recently unavailable for a considerable
time because of an attack. IT staff suspect that these attacks are
coming from a broad range of spoofed IP addresses, but are
unable to prevent these attacks. They have suggested installing
9. a NID so that they can monitor the network more closely and
stop an attack while it is happening. Network availability is
crucial for the university because their revenue depends on
availability of network.
Web server:
The director of the site wants to host a web site to increase
revenue and share resources among all the universities located
at this location. His main concern is that a hacker can access the
internal network through a compromised web server.
RFP
The state government has funded this project on actual cost
basis to upgrade XUMUC’s computer labs and campus network.
Even though the project is funded on actual cost basis, the
challenge with the network design is that the school’s budget
does not call for more money to be spent on network
administration as needed, so the new design has to be
manageable and simple.The project task force issued the
following RFP to upgrade the network.
Business and Technical Goals
The University Advisory Group identified the following
business goals for the Project:
· Increase the enrollment from to 400 to 500 students by the
year 2011
· Reduce the attrition rate from 30 to 15 percent by the year
2011
· Attract students who leave the state to attend colleges with
more technological advantages
· Provide more and bigger computer labs on campus
10. · Allow students to attach their notebook computers to the
campus network to reach campus and Internet services
· Reduce telephone costs
· Provide faster services
· Maintain (or reduce, if possible) the level of funding spent on
network operations
The Project Task Force added the following technical goals:
· Centralize all services and servers to make the network easier
to manage and more cost-effective. (Distributed servers will be
tolerated but not managed, and traffic to and from these servers
will not be accounted for when planning capacity)
· Centralize the Internet connection and disallow distributed
departmental Internet connections
· Increase the bandwidth of the Internet connection to support
new applications and expanded use of current applications
· Standardize on TCP/IP protocols for the campus network.
Macintoshes will be tolerated but must use TCP/IP protocols or
the Apple Talk Filling Protocol (AFP) running on top of TCP
· Provide extra capacity at switches so users can attach their
notebook PCs to the network
· Install DHCP software to support notebook PCs
· Provide security to protect critical servers from intruders on
the Internet and internal network. Implement a technology to
stop DoS attack
11. · Provide a network that can scale to support future expanded
usage of multi-media applications
· Use VPN technology to securely connect the Shady Grove site
to the main campus of XUMUC at Adelphi. Assume 2MB
bandwidth available for data network to connect to remote sites
· Provide a network that uses state-of-the art technologies
· Provide wireless network access to network users and guest
users from any point in the buildings. In conference rooms,
users will get a minimum 284 kbps worth of bandwidth. Other
areas, such as the lobby or cafeteria, a minimum bandwidth of
512 kbps bandwidth is required. (You can assume that a site
survey is done and no sources of interference or RF discovered.)
· Provide provisions for video conference and multicast
services.
The network administrators on the Project Task Force have been
criticized in the past by the students and professors, and are
looking forward to proving that they can develop a better
network than the existing network. Getting support for this
Project from the users and professors is not easy, and the
administrators now need to deliver a network that performs well
and has little downtime.
Network applications:
The XUMUC network is currently used for the following
purposes:
· Writing papers and doing other homework, including printing
the homework and saving the work on file servers
· Sending and receiving e-mail
· Surfing the Web using Netscape or Microsoft’s Internet
Explorer applications to access information, participate in chat
12. rooms, play games, and use other typical Web services
· Accessing the library catalog
· Accessing WebTycho, where the online classes are located.
Students and professors in the School also use the following
applications:
· Weather modeling. Meteorology students and professors are
participating in a project to model weather patterns in
conjunction with other colleges and universities in the state.
· Telescope monitoring. Astronomy students and professors
have set up a PC to continually download graphical images from
a telescope located at the state university.
Two new applications are planned:
· Graphics upload. The Art Department wishes to upload large
graphics files to an off-campus print shop that can print large
scale images on a high speed laser printer. The print shop prints
artwork that is file transferred to the shop via the Internet.
· Distance learning. The Computer Science department wishes
to participate in a pilot distance-learning project with the state
university. The state university will let WVCC students sign up
to receive streaming video of a computer science lecture course
that is offered at the state university. The students can also
participate in a real-time “chat room” while attending the class.
As a consultant to the school you are required to:
1. Propose a campus upgrade design that solves the current
problems and meets business and technical goals
13. 2. Create a scalable network
3. Develop a campus upgrade design based on an Enterprise
Campus module. This module should compose of a Campus
Core layer, a Building distribution layer, and a Building access
layer.
4. Provide redundancy at the campus core layer and the building
distribution layer to avoid failure at one point. For the Building
Access layer provide a redundant uplinks connection to the
Building Distribution layer.
5. Select appropriate Cisco switch models for each part of your
enterprise campus model design from the Cisco Products Link,
listed below, and use the following assumptions in your
selection process.
Selecting the Access layers switches:
a. Provide one port to each device
b. Make provision for 100% growth
Server farm switches:
· Assume 6 NIC cards in each server and one NIC card uses one
port of switch
· Dual processors and dual power supply
http://www.ciscowebtools.com/ProductAdvisor/child/1.0/switch
es.asp
6. Propose an IP addressing redesign that optimizes IP
addressing and IP routing (including the use of route
summarization). Provide migration provision to IPv6 protocol in
future.
7. Propose a security plan to secure key applications and
servers. Note that encryption of all application is not
14. acceptable. Firewalls can be used as necessary. Develop
security policy to stop sniffing and man-in-the-middle attack.
Your security plan must be based on current industry standard
Multilayer security or defense-in-depth.
8. Integrate voice and data networking to reduce cost. Propose
and develop a plan for migration to voice network with in
XUMUC sites as shown below. For dialing out from XUMUC,
propose a plan for 100% connectivity with the minimum number
of outside lines.
9. Create a wireless network for students, faculty, and staff.
Building 2 and Building 3 have two conference rooms with
seating capacity of 200 each and sized approximately 40 feet by
60 feet. Building 3 has a cafeteria with an approximate size of
60x60 square feet and a survey report indicated that at no time
do more than 20 guests use network services. Your task is to
determine number of WLC and AP placements, including how
many of them to use and which model to use. For your ready
reference, the Cisco equipment guide is attached. In the
Reference Section, you will find a placement template and
product ordering table for your guidance in selecting equipment.
Link for Cisco Web Site Product selection
http://cisco.com/en/US/prod/collateral/wireless/ps5679/ps6548/
prod_brochure0900aecd80565e00_ps2706_Products_Brochure.h
tml)
10. Assume any information (with proper justification) which
you think is missing and critical to the development of the
design.
U N I V E R S I T YU N I V E R S I T Y
15. Shady Grove CampusBaltmore CampusEurope CampusXUMUC
Adelphi Main Campus
Adelphi Campus 1000 Phones
Shady Grove Campus 200 Phones
Baltimore Campus 100 Phones
Europe Campus 20 Phones
XUMUC Phones RequirementsHigh Level PSTN Diagram
Reference:
WLC and AP ordering Guide
Table 4. Ordering Information for Cisco Wireless LAN
Controllers
Product
Features
Customer Requirements
Part Number
Wireless LAN Controllers
Cisco 4400 Series Wireless LAN Controller
• Modular support of 12, 25, 50, or 100 Cisco Aironet access
points
• The Cisco 4402 with 2 Gigabit Ethernet ports supports
configurations for 12, 25, and 50 access points
• The Cisco 4404 with 4 Gigabit Ethernet ports supports
configurations for 100 access points
• IEEE 802.1D Spanning Tree Protocol for higher availability
• IPSec encryption
• Industrial-grade resistance to electromagnetic interferences
(EMI)
• For midsize to large deployments
16. • High availability
• AIR-WLC4402-12-K9
• AIR-WLC4402-25-K9
• AIR-WLC4402-50-K9
• AIR-WLC4404-100-K9
See the Cisco Wireless LAN Controllers Data Sheet for more
information.
Cisco 2100 Series Wireless LAN Controller
• Supports up to 6, 12 or 25 Cisco Aironet access points
• Eight Ethernet ports, two of which can provide power directly
to Cisco APs
• Desk mountable
• For retail, enterprise branch offices, or SMB deployments
• AIR-WLC2106-K9
• AIR-WLC2112-K9
• AIR-WLC2125-K9
See the Cisco 2106 Wireless LAN Controller Data Sheet for
more information.
Cisco Catalyst® 6500 Series /7600 Series Wireless Services
Module (WiSM)
• Wireless LAN Controller for Cisco Catalyst 6500 or Cisco
7600 Series Router
• Supports 300 Cisco Aironet access points
• IPSec encryption
17. • Industrial-grade resistance to electromagnetic interferences
(EMI)
• Intrachassis and interchassis failover
• Interoperable with Cisco Catalyst 6500 Series Firewall and
IDS services modules
• Embedded system for the Cisco Catalyst 6500 Series and
Cisco 7600 Series Router infrastructure
• For large-scale deployments
• High availability
• WS-SVC-WISM-1-K9
• WS-SVC-WISM-1-K9= (spare)
See the Cisco Catalyst Wireless Services Module Data Sheet for
more information.
Cisco Catalyst 3750G Integrated WLAN Controller
• Cisco Catalyst 3750G Series Switch with wireless LAN
controller capabilities
• Modular support of 25 or 50 Cisco Aironet access points per
switch (and up to 200 access points per stack*)
• IPSec encryption
• Industrial-grade resistance to electromagnetic interferences
(EMI)
• For midsize to large deployments
• High availability
• WS-C3750G-24WS-S25
18. • WS-C3750G-24WS-S50
See the Cisco Catalyst 3750G Integrated Wireless LAN
Controller Data Sheet for more information.
Cisco Wireless LAN Controller Module for Cisco Integrated
Services Routers
• Wireless LAN controller integrated into Cisco integrated
services routers
• Supports 6, 8, 12, or 25 Cisco Aironet access points
• Embedded system for Cisco 2800/3800 Series and Cisco 3700
Series routers
• For retail, small to medium-sized deployments or branch
offices
• NME-AIR-WLC6-K9
• NME-AIR-WLC6-K9= (spare)
• NME-AIR-WLC8-K9
• NME-AIR-WLC8-K9= (spare)
• NME-AIR-WLC12-K9
• NME-AIR-WLC12-K9= (spare)
• NME-AIR-WLC25-K9
• NME-AIR-WLC25-K9= (spare)
See the Cisco WLAN Controller Modules Data Sheet for more
information.
Please refer to the Cisco Wireless LAN Controller Ordering
Guide supplement to learn when to add the following SKUs to
track the deployment of voice and context-aware mobility
19. applications.
Table 2. Cisco Aironet Indoor Rugged, Indoor, Wireless Mesh,
and Outdoor Rugged Access Points
Product
Features
Customer Requirements
Part Number
Indoor Rugged Access Points
Cisco Aironet 1250 Series
• Industry's first business-class access point based on the IEEE
802.11n draft 2.0 standard
• Provides reliable and predictable WLAN coverage to improve
the end-user experience for both existing 802.11a/b/g clients
and new 802.11n clients
• Offers combined data rates of up to 600 Mbps to meet the
most rigorous bandwidth requirements
• Designed for both office and challenging RF environments
• Especially beneficial for environments with the following
characteristics:
• Challenging RF environments (for example, manufacturing
plants, warehouses, clinical environments)
• Bandwidth-intensive applications (for example, digital
imaging, file transfers, network backup)
• Real-time, latency-sensitive applications such as voice and
video
• Need to support existing 802.11a/b/g and new 802.11n
wireless clients
20. Access point platform with pre-installed radio modules:
• AIR-AP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Autonomous Access Point; 6 RP-TNC
• AIR-AP1252G-x-K9: 802.11g/n-draft 2.0 2.4-GHz Modular
Autonomous Access Point; 3 RP-TNC
• AIR-LAP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Unified Access Point; 6 RP-TNC
• AIR-LAP1252G-x-K9: 802.11g/n-draft 2.0 2.4-GHz Modular
Unified Access Point; 3 RP-TNC
See the Cisco Aironet 1250 Series Ordering Guide for more
information.
Cisco Aironet 1240AG Series
• Second-generation 802.11a/g dual-band indoor rugged access
point
• 2.4-GHz and 5-GHz antenna connectors for greater range or
coverage versatility and more flexible installation options using
the broad selection of Cisco antennas available
• Ideal for challenging indoor RF environments
• Recommended for offices and similar environments
• Ideal for deployments above suspended ceilings
• Recommended for outdoors when deployed in a weatherproof
NEMA-rated enclosure
• AIR-AP1242AG-x-K9: 802.11a/g Nonmodular Cisco IOS
Software- Based Access Point; RP-TNC
• AIR-LAP1242AG-x-K9: 802.11a/g Nonmodular LWAPP
Access Point; RP-TNC
21. See the Cisco Aironet 1240AG Series 802.11a/b/g Data Sheet
for more information.
Indoor Access Points
Cisco Aironet 1130AG Series
Low-profile, enterprise-class 802.11a/g access point with
integrated antennas for easy deployment in offices and similar
RF environments
Ideal for offices and similar environments
• AIR-AP1131AG-*X-K9
See the Cisco Aironet 1130AG Series Ordering Guide for more
information.
Wireless Mesh Access Points
Cisco Aironet 1520 Series
• Next-generation outdoor wireless mesh access point
• Integrated dual band 802.11 a/b/g radios, Ethernet, fiber and
cable modem interface
• Provides easy and flexible deployments for outdoor wireless
network
• Available in a lightweight version only
• Ideal for outdoors
• Recommended for industrial deployments and local
government, public safety, and transit agencies
• AIR-LAP1522AG-X*-K9:
See the Cisco Aironet 1520 Series Lightweight Outdoor Mesh
Access Point Ordering Guide for more information.
Cisco Aironet 1500 Series
• Mesh access point that enables cost-effective, scalable
deployment of secure outdoor wireless LANs for metropolitan
networks or enterprise campuses
22. • Available in a lightweight version only
• Ideal for outdoors
• Recommended for providing wireless services and applications
to local government, public safety, and transit agencies
• AIR-LAP1510AG-*X-K9:
• Cisco Aironet 1510AG Lightweight Outdoor Mesh Access
Point, FCC configuration
See the Cisco Aironet 1500 Series Ordering Guide for more
information.
Outdoor Rugged Access Points
Cisco Aironet 1400 Series
• High-speed, high-performance outdoor bridging solution for
line-of-sight applications
• Offers affordable alternative to leased-line services
• Available in a standalone version only
• High-speed building-to-building or campus connectivity
• Share LAN/Internet access between two or more sites
• Fast installation
• AIR-BR1410A-*X-K9: With integrated antenna
• AIR-BR1410A-A-K9-N: With N-Type connector for use with
external antennas
See the Cisco Aironet 1400 Series Bridge Data Sheet for more
information.
Cisco Aironet 1300 Series
Outdoor access point/bridge offers high-speed and cost-
effective wireless connectivity between multiple fixed or mobile
23. networks and clients
Ideal for outdoor areas, network connections within a campus
area, temporary networks for portable or military operations, or
outdoor infrastructure for mobile networks
● AIR-BR1310G-X-K9: With integrated antenna
● AIR-BR1310G-X-K9-R: With RP-TNC connector for use with
external antennas
● AIR-BR1310G-A-K9-T: For transportation applications
See the Cisco Aironet 1300 Series Ordering Guide for more
information.
*X = regulatory domain
(Source: Curtsy Cisco Web site
http://cisco.com/en/US/prod/collateral/wireless/ps5679/ps6548/
prod_brochure0900aecd80565e00_ps2706_Products_Brochure.h
tml)
WLC and AP Placement Templates
Suggested Placement Table Wireless Network
Building
Access Point
Requirements
Wireless LAN Controller
Requirements
Total AP
Total WLC
Building3
Lobby
25. Cost
Cisco 2100 Series Wireless LAN Controller
AIR-WLC2106-K9
2
Suggested Product Table (AP)
AP
Cisco Part Number
Quantity
Cost
Cisco Aironet 1250 Series
AIR-AP1252AG-x-K9: 802.11a/g/n-draft 2.0 2.4/5-GHz
Modular Autonomous Access Point; 6 RP-TNC
20
_1421613394.bin
26. U N I V E R S I T Y
Building-2Building-1Building-3
XUMUC Shady Grove Campus
Towson
UB
Bowe
UMCP
Class Rooms
Labs
SE
UMES
UMBC
Class Rooms
UMUC
Library
Class Rooms
UMB
Labs
PBX Switch
200 Capaity
Call ManagerPSTN NetworkInternetIP Data NetworkIP Voice
Network
Shady Grove Voice Network
Internet
Internet
Internet
Internet
Towson 4WS
UB 5WS
Bowe 5WS
UMCP 8WS
Class Rooms
and Labs
27. ES 4WS
UMES 8WS
UMBC 12WS
UMUC20WS
Library 25 WS
Class Rooms
UMB 15WS
Current Network Topology ShadyGrove
Scope of Work
Group Two
Eric Chickering / Joseph Indelicato / Dwight Nelson
XUMUC – Network RFP
Summary
Group Two is a group of students at UMUC that provides
network design and implementation plans for educational
institutions. Each individual in this group has their own unique
background and experience that will qualify us for your network
upgrade proposal request.
Our services rendered include:
· IT Management
· Network Design, Product Sales, Implementation and Support
· Equipment Implementation and Support
· VoIP Design, Sales, Implementation and Support
Proposal Overview
Our proposal is in response to XUMUC request for network
design overhaul of the Shady Grove campus and its related
buildings. Our services are in support of your eligible network
layout, network components, VoIP system and installation
services.
With this proposal, it will affect all your areas of the current
network. We will start by designing a centralized and secured
core location in Building-3. All subsequent buildings will have
redundant uplinks to Building-3 with server farm access, web
server access, VoIP services, WiFi services, and ultimately
28. internet access through this centralized location. With this
centralized approach, we will implement multiple VLANs for
network segmentation of traffic and utilize OSPF routing
protocol within the environment. Each building will have
redundant distribution layer’s connecting to the core site, as
well as redundant uplinks to access switches to the distribution
layer. Our network proposal includes bandwidth capabilities for
WiFi, Video Conferencing, and multiple data intense
applications utilized by Meteorology, Astronomy, Art
Department and Computer Science.
IP addressUMUC IP Address assignment
SchemeSubnetDeviceshostsvlan idnetworkmasksubnet
masknetwrok IDStart IPlast
ipBroadcast1UMUC2064101192.16.10192.16.1026255.255.255.
192192.16.10.0192.16.10.1192.16.10.62192.16.10.632UMES816
102192.16.10192.16.1028255.255.255.240192.16.10.64192.16.1
0.65192.16.10.78192.16.10.793UMCPTowson816103192.16.101
92.16.1028255.255.255.240192.16.10.80192.16.10.81192.16.10.
94192.16.10.954Towson48104192.16.10192.16.1029255.255.25
5.248192.16.10.96192.16.10.97192.16.10.102192.16.10.1035UB
516105192.16.10192.16.1028255.255.255.240192.16.10.104192
.16.10.105192.16.10.118192.16.10.1196UMB1532106192.16.10
192.16.1027255.255.255.224192.16.10.120192.16.10.121192.16
.10.150192.16.10.1517Eastern
Shore48107192.16.10192.16.1029255.255.255.248192.16.10.15
2192.16.10.153192.16.10.158192.16.10.1598UMBC1232108192
.16.10192.16.1027255.255.255.224192.16.10.160192.16.10.161
192.16.10.190192.16.10.1919Bowe516109192.16.10192.16.102
8255.255.255.240192.16.10.192192.16.10.193192.16.10.206192
.16.10.20710Class
Rooms150512110192.16.11192.16.1223255.255.254.0192.16.11
.0192.16.11.1192.16.12.253192.16.12.25411Shady Grove
Administrations50128111192.16.13192.16.1325255.255.255.128
192.16.13.0192.16.13.1192.16.13.126192.16.13.12712Router48
30. bandwidth calculationUMUC IP Address assignment SchemeS
noSubnetplanning numberper
device(kbps)total(kbps)total(mbps)1UMUC6451232,76832
Mbps2UMES165128,1928 Mbps3UMCPTowson165128,1928
Mbps4Towson85124,0964 Mbps5UB165128,1928
Mbps6UMB3251216,38416 Mbps7Eastern Shore85124,0964
Mbps8UMBC3251216,38416 Mbps9Bowe165128,1928
Mbps10Class Rooms512512262,144256 Mbps11Shady Grove
Administrations12851265,53664 Mbps12Router85124,0964
Mbps13Switches3251216,38416 Mbps14Patch Panel85124,0964
Mbps15Hubs165128,1928 Mbps16Printers165128,1928
Mbps17Network Printers and departments
Printers6451232,76832 Mbps18telephone512512262,144256
Mbps19wifi network512512262,144256 Mbps10LAN
servers165128,1928 Mbps21Public Servers165128,1928
MbpsTOTAL1,048,5761024 Mbps
WLC and AP PlacementWLC and AP Placement TableSuggested
Wireless LAN ControlerBuildingAccess PointWireless LAN
ControllerWLCCisco Part
NumberQuantityCostNotesRequirementsRequirementsCisco
2100 Series Wireless LAN ControllerAIR-WLC2125-K92One
Cisco 2125 and one Cisco 2112 placed in each
buildingBuilding31 x WLC2125; 1 x WLC2112Cisco 2100
Series Wireless LAN ControllerAIR-WLC2112-K92Cisco 2112
will provide room for expansion and backup in the event of
failure of 2125Lobby2Cafeteria10Suggested Wireless Access
PointConference room10APCisco Part
NumberQuantityCostNotesBuilding 21 x WLC2125; 1 x
WLC2112Cisco Aironet 1250 SeriesAIR-AP1252AG-x-K9:
802.11a/g/n-draft 2.0 2.4/5-GHz Modular Autonomous Access
Point; 6 RP-TNC40One extra in the event of failure until
replacement can be purchasedLobby2Conference
Room15TOTAL AP39TOTAL WLC0
31. AAP Part II Submittal
For this section you will write a paper in the form of a response
to the RFP which includes:
Executive Summary
Business goals for the project
Scope of the project
Information on existing network
Information on new applications
Technical requirements, including scalability, availability, netw
ork performance, security,
manageability, usability, adaptability, and affordability
Design solutions
Logical Diagram
Warranty requirements for products
Environmental or architectural constraints
Training and support requirements
Preliminary schedule with milestones and deliverables
Legal contractual terms and conditions
Estimated Cost
IP address Scheme
Your paper should include responses to all of the customer’s req
uest and should include logical and
physical component of the design, information on technologies
used in the design solution, and a
proposal for implementing the design. The following sections de
scribe the format of the paper:
A: Executive Summary (ES)
The executive summary briefly states and emphasizes the major
points of the customer’s requirements.
The ES should be no more than one page and should be directed
at a key decision maker of the project
32. who will decide whether to accept your design. The ES can cont
ain general technical information but NO
technical details. The technical information should be summariz
ed and organized in the order of the
customer’s highest-priority objectives for the design project. Th
e ES should be organized according to
the customer top requirements.
B: Project Goal
This section should state the primary goal for the network desig
n. The goal should be business oriented
and related to an overall objective that the company has identifi
ed in order to become more successful in
the core business. Your objective is to make it clear to the decis
ion maker that you understand the
primary purpose and importance of the network design project.
Below is an example of a project goal
that was written for an actual design.
“The goal of this project is to develop a wide area network (WA
N) that will support new high bandwidth
and low-delay multimedia applications. The new applications ar
e key to the successful implementation of
new training programs for the sales force. The new WAN will fa
cilitate an increase in sales in the USA
by 50% in the next fiscal year.”
C: Project Scope
The project scope section provides information on the extent of
the project, including a summary of
departments, and field office networks that will be affected by t
he project. The project scope section
33. specifies whether the project is a new network or modifications
to an existing network. It indicates
whether the design is for a single network segment, a set of LA
Ns, a building or campus network, or a set
of WAN or remote access network, VoIP, or for enhancing secur
ity. (Note: Here you can use your
group’s scope of work as it is or change it the way you want it t
o be).
D: Design Requirements
In this section, you provide major business and technical requir
ements of the network in priority order. In
the business goal, explain the role that the network design will
play in helping a company provide better
products and services.
In the technical requirement section, explain in general terms ho
w the proposed technical improvement is
better than or meets the customer’s requirement.
Network Application: This section lists and characterizes new a
nd existing network applications.
E: Current State of the Network:
This section briefly describes the structure and performance of t
he network. It should include a high-level
network map that identifies the locations of connecting devices,
server farm, storage systems, and
network segment
F: Design
34. Solution
This section includes:
Logical Network topology which includes one or more drawings
to illustrate logical architecture of
the proposed network
A plan of addressing network segments and devices
A plan of naming network devices which include routers, workst
ations, servers, and the network
segment.
A list of routing and switching protocols that have been selected
to implement the design
Recommended Voice over IP solution, and the mechanism for i
mplementation
Recommended security mechanisms and products, including a s
ummary of security policies.
Recommended network management processes and products
G: Implementation Plan:
35. The implementation plan includes your recommendations for de
ploying the network design. The design
implementation description should be detailed as possible. Impl
ementation of a network design consists
of several phases (buy and install hardware, configure system, t
est system and so forth). Each phase
consists of several steps, and documentation for each step shoul
d contain the following:
A project schedule
Plans with vendors or service providers for installation of links,
equipment or services
Plan or recommendations for outsourcing the implementation or
management of the network
A plan for communicating the design to end users, network adm
inistrators, and management
A training plan for network administrators and end users
A plan for measuring the effectiveness of the design after it has
been implemented
A list of known risks that could delay the project
A fallback plan if the network implementation fails
A pan for upgrading the network design as new application requ
irement goals arise
36. Below is a configuration sample and project schedule templates
Implementation and Tune HSRP:
Sample Project Schedule Template
Date of
Completion
Project Milestone
August 1
Design completed and a beta version of the design document dis
tributed
to key executives, managers, network administrators, and end us
ers (end
users depends on management)
August 15 Comments on the design document due
August 22 Final design document distributed
August 25
Installation of leased lines between all buildings completed by
37. WAN
service provider
August 28-29 Network administrators trained on new system
August 30-31 End users trained on new system
September 6
Pilot implementation completed in Building 1 or head office or
branch
office
September 20
Feedback received on pilot from network administrators and use
rs
September 27
Implementation completed on Buildings 2-5 or floors 1-6
October 10
Feedback received from buildings 2-5 from network administrat
ors and
users
October 17
38. Implementation completed in the rest of buildings or floors
Ongoing or
December 31
New system monitored to verify that it meets goals
H: Project Budget
This section should contain an estimate of the funds the custom
er will need for equipment purchases,
maintenance, and support agreements, service contracts, softwar
e licenses, training, and staffing. The
budget can also include consulting fees and outsourcing expense
s.
I: Design Document Appendix
Most design documents include one or more appendixes that pre
sent supplemental information about the
design and implementation. Supplemental information can inclu
de detailed topology drawings, device
configurations, network addressing and naming details and com
39. prehensive results from the testing of the
network design. You can include business information such as a
list of contact names, numbers and e-
mail addresses. The appendix can include warranty information
on devices, legal agreement, and any
information which is not critical for the design, but has been not
ed in your information gathering process.