FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulationinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
Automation of Sub-Netting Problems Using Mathematical Modeling and Simulationinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for as the university must protect students’ and employees’ data, as well as any intellectual property that has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this new building to support university operations.
UMUC CMIT 265 Fundamentals of NetworkingHello there! I have am lo.docxTakishaPeck109
UMUC CMIT 265 Fundamentals of Networking
Hello there! I have am lost. My rough draft is due Sunday, December 13. I'm not looking for a stellar proposal to be written but help on
what
Computer Components to use
and why
and
where
they should be placed (see diagram)
and why
. Same thing for the IP/subnetting, and Network devices. I really need to see the setup of the devices and wiring schematics. If you have time to write a design proposal by Saturday, that would be a bonus.
Here are the assignment details. There are two attachments: one includes what you see below plus a diagram of the building design and the template we are to use for the paper.
ASSIGNMENT SCENARIO:
You have been hired as part of the networking team at UMUC. After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for UMUC, as the university must protect students’ and employees’ data, as well as any intellectual property that UMUC has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this new building to support university operations.
After speaking to your manager, you are excited about the project, but you realize you will have a busy schedule. As you write your proposal, you will also have to prepare for the Network+ Certification exam. One of the conditions of your employment at this company is that you obtain this certification within 60 days of being hired. You will have to manage your time wisely, because you will have to take a practice certification test just as you are completing your final project.
To get started, follow the steps below.
OVERVIEW
You will provide detailed network design proposal. Your task is to design the network for this new building with the following criteria:
·
Student-accessed computers should be on separate network from the staff-accessed computers. Computers for public use should be on a separate network.
·
There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
·
The network should use physical cable, not wireless. But do provide wireless access in the Student Lobby area (second-floor hallway). Set the maximum simultaneous wireless users to 254.
·
The network has been assigned the 10.11.12.0/23 network address for all computers and devices
Your proposal should have three major sections:
1.
Physical Network Design
2.
Network Addressing
3.
Network Services Design
To learn how you will be assessed on this assignment, please take a.
For more classes visit
www.snaptutorial.com
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some
Cmit 265 Enthusiastic Study / snaptutorial.comStephenson033
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
Cmit 265 Effective Communication / snaptutorial.comStokesCope37
For more classes visit
www.snaptutorial.com
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for as the university must protect students’ and employees’ data, as well as any intellectual property that has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As
I. Physical Network DesignIntroduction Consider introduc.docxflonayrton46696
I. Physical Network Design
Introduction
Consider introducing the overall objective of the network design.
Look into UMUC’s Strategic Plan, how would the network design help the stakeholders, the leadership of the university, the students, and the instructors achieve their goals?
How would a great network design contribute to students (your) experiences in learning?
To do this we look at five aspects of a network design herein to support the leadership to help meet the goals of the strategic plan.
A.
Network Topology
Business Needs
In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If you make some assumptions, be sure to list them. This section is not about the actual infrastructure or equipment, but it should discuss the business needs of the company.
Example
ABS Enterprises believes that employees’ health, wellbeing, and morale have a significant impact on the productivity of the employees and thus the overall results or output of the company. The company wants to invest in a facility that will provide the most return on investment while still providing a facility that employees will use. The company has 20 employees and wants needs one or more servers and two printers. All computers should be able to communicate, but the HR staff of 5 needs to be on a separate network due to the sensitive information on their PC’s.
Proposed Topology
Select one or more topologies to use for this design (star, bus, mesh, ring- Please note that the star topology is the most commonly used). This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. Below is an example topology. Topologies can be created using Microsoft Visio, or you can create a free account at gliffy.com and create diagrams.
Justification
(Each section should contain the reasoning you present to justify the selection you made for your proposal.
Look at it as your platform to tell finance and operations personnel why this should be selected for the network design)
B.
Network Media
Note: (Choose wired or wireless)
Be aware that your solution needs to include support for the selected media.
For example, if you choose wireless, ensure you have wireless adapters for your desktops.
Business Needs
Assess the business needs.
Proposed Network Media (include network wiring diagrams)
Select one or more network media to use for this design.
Justification
Justify your determination that the selected media will meet the business needs.
C.
Network Devices
Business Needs
Assess the business needs.
Proposed Network Devices
Select network devices to use to implement and support your design. Include setup a.
Network Design Proposal Template
Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name
I. Network Design
A. Network Topology
Technical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, wellbeing, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).
Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. .
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
West Consulting Modular Design Proposal
Michael Boddie
Network Design Associate
NTC/320
January 29, 2018
-Welcome-
1
Introduction
West Consulting Firm is a large company with 1000+ devices
The best Network design for West Consulting Firm is Hierarchical structure as proposed in the network summary document
Hierarchical network design is a three layer model.
West Consulting is a large organization as it currently have 1000 users and it intends to increase the number of users to 1500
The reason as to why the organization should opt for a hierarchical network design due to:
Better scalability
Better redundancy
Better performance
Batter management and troubleshooting
Better policy creating and scalability
2
Hierarchical Network Design
In each layer in the hierarchy provides specific functions which helps the network designer to select and optimize the right network hardware , features and software
The access layer provides user access to the organization network
The distribution layer provides policy-based connectivity
Core layer provides fast transport between the distribution switches
Access layer is where the switches are located which are then connected to the end users or computers
The distribution layer separates the access and the core layer. It in this layer where the policy of the network is defined
The core layer consists of the layer with the fastest, biggest, and the most expensive routers. This layer is considered to be the backbone of the organizational network. It is in this layer that routers are used to merge geographically separated network of the organization
3
Cisco Design Principles of a Hierarchical Structure
When designing hierarchical network structure there four design principles to consider which are:
Network diameter: This term is used to measure the number of devices
Bandwidth aggregation: This is the art of considering the specific bandwidth requirements
Redundancy: This is the practice of duplicating critical elements so as to achieve reliability (Thomadsen, 2005).
Network diameter is the first thing to consider when designing a hierarchical network structure. Network diameter is the number of gadgets or devices that a certain packet have to cross before it reaches its destination. This means that when designing west consulting network structure, the network designer must keep network diameter low.
Bandwidth aggregation: The designers of West Consulting firm network structure they must consider the bandwidth requirement for every party of the hierarchy. Link aggregation is said to allow multiple switch ports links to be combined. This in turn achieves a high throughput between the organizational switches
To ensure redundancy the network designer can double the network links
4
How Design a Hierarchical Network .
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
Module name is Networks 512
As the demand for faster and more efficient high-performance computers grows, so do the
dimensions of the form factors that house them. Computer engineers have been tasked for years
with the difficult task of incorporating increasingly powerful computers into and onto
increasingly smaller chassis and printed circuit boards (PCBs), primarily to meet a growing
demand for more reliable, affordable, size-conscious, energy-efficient, and cost-effective
computer systems. This is why the world of embedded systems continues to see boundary-
pushing size, weight, power, and cost developments. 2.1 Use your knowledge of embedded
systems and devices to answer the question below. 2.1.1 What are embedded systems? 2.1.2
What are the various kinds of embedded systems? 2.1.3 What is the difference between soft and
hard real-time embedded systems?
device may require on both the serial and network sides of a connection. Should the device
always be connected to a specific host or PC? Is it possible that multiple hosts or network
devices will want or need to connect to the newly networked serial device? Are there any
specific requirements for an application that requires the serial device to reject a network
connection under certain conditions? The bottom line is that a server must be able to service a
wide range of application requirements while also meeting all of the demands of those
applications. Discuss how device servers are used to improve the usability of various
applications such as: Data Collection, Factory/Industrial Automation, Security Systems, Bar
Code Readers and Point-of-Sale Scanners, Medical Applications, M2M Wireless
Communication/Networking. (30)
1. An extensive telecommunications infrastructure is provided by a structured cabling system,
which is a complete system of cabling and related components. This infrastructure is used for a
variety of purposes, including phone service provision and data transmission across computer
networks. It shouldn't be hardware-reliant. A structured cabling system is further defined in
terms of ownership. At the termination of the service provider (SP), the structured cabling
system starts. The demarcation point (demarc) or network interface device is at this location
(NID). For instance, in the establishment of a telephone system, the SP provides one or more
service lines (per customer requirements). At the line of demarcation, the SP joins the service
lines. 1.1 Explain the significance of structured cabling and the advantages of structured cabling.
(10) 1.2 As a network architecture, you are tasked with designing a network for a six-story office
building, with each floor connecting 5 computers in 5 offices and having a wireless access point
to connect wireless devices. Design a network plan for the building using your knowledge of
structured cabling and various network devices, labeling all the hardware in devices and cabling.
(20)
A specialized network-based hardware device designe.
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
Running head: NETWORK DESIGN PROPOSAL
NETWORK DESIGN PROPOSAL15
NETWORK DESIGN PROPOSAL
Student’s Name
Professor’s Name
UNIVERSITY OF MARYLAND
Course Title
Physical Network Design
1. Network Topology
The purpose of this paper is to present a proposal of network architectural system; it explains analysis of a detailed network arrangement with the networking infrastructure. This paper includes the study of physical topology according to the business needs for establishing a network layout such as premises of campus of “University of Maryland” is connected along with the departments, library, rooms, laboratory, and grounds with the network connections. The data must be secured for the campus teachers as well as students through all network arrangements. The new network system should also take into consideration the future development of the campus with more labs, library, computer, classrooms other offices in the building locations. So the proposed layout of the network layout is worthwhile for University (Stewart, 2008).
A general layout of a network that is topological with a protected system linking within the campus of the college:
Business Needs
The Cisco Enterprise Specialist of the IT Business association is for IT professionals to help them provide their business with innovation to improve their business output. The IT experts will groom their skills as part of this association such as:
· Assessing the technological alternatives within a business connection
· Evaluating and meeting the business needs.
· Behaving and talking courteously with business peers.
· Getting knowledge about an aggregate expense of proprietorship and an arrival on speculation IT arrangement's (Eernet, (n.d)).
Proposed topology
It is important to keep the system documentation brief and comprehensive. Initially, at the establishment of a system, the system documentation is generally concise, but when the system changes or develops more, the documentation needs to be redesign. System topology maps usually present a unique floor arrangement. When there are changes in the floor arrangements, the necessary steps are taken to change the Diagrams or redline are created to demonstrate the alterations. The changed layout is organized and well presented. An outline that is as-assembled represents how actually a system was created, which can be further altered. It is guaranteed that the existing records reflect the all systems topology changes and arrangement of the as-manufactured floor.
(Cisco.com)
Justification for proposed network topology
The Cisco Services – is a global level organization having more than 9,500 workers in more than 120 countries with more than 380 locations – Cisco Enterprise Architecture Services has a trustworthy public image due to best practices, industry based technological developments, and brilliance. Cisco maintains various network emergency response vehicles (NERV)’s that are deployed by the Cisco employees in case of natural disa ...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
More Related Content
Similar to Consider introducing the overall objective of the network design/tutorialoutlet
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for as the university must protect students’ and employees’ data, as well as any intellectual property that has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this new building to support university operations.
UMUC CMIT 265 Fundamentals of NetworkingHello there! I have am lo.docxTakishaPeck109
UMUC CMIT 265 Fundamentals of Networking
Hello there! I have am lost. My rough draft is due Sunday, December 13. I'm not looking for a stellar proposal to be written but help on
what
Computer Components to use
and why
and
where
they should be placed (see diagram)
and why
. Same thing for the IP/subnetting, and Network devices. I really need to see the setup of the devices and wiring schematics. If you have time to write a design proposal by Saturday, that would be a bonus.
Here are the assignment details. There are two attachments: one includes what you see below plus a diagram of the building design and the template we are to use for the paper.
ASSIGNMENT SCENARIO:
You have been hired as part of the networking team at UMUC. After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for UMUC, as the university must protect students’ and employees’ data, as well as any intellectual property that UMUC has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this new building to support university operations.
After speaking to your manager, you are excited about the project, but you realize you will have a busy schedule. As you write your proposal, you will also have to prepare for the Network+ Certification exam. One of the conditions of your employment at this company is that you obtain this certification within 60 days of being hired. You will have to manage your time wisely, because you will have to take a practice certification test just as you are completing your final project.
To get started, follow the steps below.
OVERVIEW
You will provide detailed network design proposal. Your task is to design the network for this new building with the following criteria:
·
Student-accessed computers should be on separate network from the staff-accessed computers. Computers for public use should be on a separate network.
·
There must be a minimum of 40 Mbps Internet connection, with a backup line capable of at least 20Mbps. Cable, DSL, or FIOS should not be used for primary Internet service.
·
The network should use physical cable, not wireless. But do provide wireless access in the Student Lobby area (second-floor hallway). Set the maximum simultaneous wireless users to 254.
·
The network has been assigned the 10.11.12.0/23 network address for all computers and devices
Your proposal should have three major sections:
1.
Physical Network Design
2.
Network Addressing
3.
Network Services Design
To learn how you will be assessed on this assignment, please take a.
For more classes visit
www.snaptutorial.com
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some
Cmit 265 Enthusiastic Study / snaptutorial.comStephenson033
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
Cmit 265 Effective Communication / snaptutorial.comStokesCope37
For more classes visit
www.snaptutorial.com
You have been hired as part of the networking team After completing orientation and training in your first week, your manager calls you into a meeting to discuss your first project.
The university has recently leased a building in Adelphi, Maryland. The building will house some offices, classrooms, a library, and computer labs. Security is very important for as the university must protect students’ and employees’ data, as well as any intellectual property that has on its servers and computers. As a result, IT management would like to take the time to review some proposals on how best to move forward. As
I. Physical Network DesignIntroduction Consider introduc.docxflonayrton46696
I. Physical Network Design
Introduction
Consider introducing the overall objective of the network design.
Look into UMUC’s Strategic Plan, how would the network design help the stakeholders, the leadership of the university, the students, and the instructors achieve their goals?
How would a great network design contribute to students (your) experiences in learning?
To do this we look at five aspects of a network design herein to support the leadership to help meet the goals of the strategic plan.
A.
Network Topology
Business Needs
In this section, you will assess the business needs of the company. Use the information provided in the scenario to analyze the need for infrastructure or equipment. If you need more information, feel free to ask your instructor or make some assumptions. If you make some assumptions, be sure to list them. This section is not about the actual infrastructure or equipment, but it should discuss the business needs of the company.
Example
ABS Enterprises believes that employees’ health, wellbeing, and morale have a significant impact on the productivity of the employees and thus the overall results or output of the company. The company wants to invest in a facility that will provide the most return on investment while still providing a facility that employees will use. The company has 20 employees and wants needs one or more servers and two printers. All computers should be able to communicate, but the HR staff of 5 needs to be on a separate network due to the sensitive information on their PC’s.
Proposed Topology
Select one or more topologies to use for this design (star, bus, mesh, ring- Please note that the star topology is the most commonly used). This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. Below is an example topology. Topologies can be created using Microsoft Visio, or you can create a free account at gliffy.com and create diagrams.
Justification
(Each section should contain the reasoning you present to justify the selection you made for your proposal.
Look at it as your platform to tell finance and operations personnel why this should be selected for the network design)
B.
Network Media
Note: (Choose wired or wireless)
Be aware that your solution needs to include support for the selected media.
For example, if you choose wireless, ensure you have wireless adapters for your desktops.
Business Needs
Assess the business needs.
Proposed Network Media (include network wiring diagrams)
Select one or more network media to use for this design.
Justification
Justify your determination that the selected media will meet the business needs.
C.
Network Devices
Business Needs
Assess the business needs.
Proposed Network Devices
Select network devices to use to implement and support your design. Include setup a.
Network Design Proposal Template
Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name
I. Network Design
A. Network Topology
Technical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, wellbeing, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).
Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. .
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on
West Consulting Modular Design ProposalMichael BoddieNetwork.docxphilipnelson29183
West Consulting Modular Design Proposal
Michael Boddie
Network Design Associate
NTC/320
January 29, 2018
-Welcome-
1
Introduction
West Consulting Firm is a large company with 1000+ devices
The best Network design for West Consulting Firm is Hierarchical structure as proposed in the network summary document
Hierarchical network design is a three layer model.
West Consulting is a large organization as it currently have 1000 users and it intends to increase the number of users to 1500
The reason as to why the organization should opt for a hierarchical network design due to:
Better scalability
Better redundancy
Better performance
Batter management and troubleshooting
Better policy creating and scalability
2
Hierarchical Network Design
In each layer in the hierarchy provides specific functions which helps the network designer to select and optimize the right network hardware , features and software
The access layer provides user access to the organization network
The distribution layer provides policy-based connectivity
Core layer provides fast transport between the distribution switches
Access layer is where the switches are located which are then connected to the end users or computers
The distribution layer separates the access and the core layer. It in this layer where the policy of the network is defined
The core layer consists of the layer with the fastest, biggest, and the most expensive routers. This layer is considered to be the backbone of the organizational network. It is in this layer that routers are used to merge geographically separated network of the organization
3
Cisco Design Principles of a Hierarchical Structure
When designing hierarchical network structure there four design principles to consider which are:
Network diameter: This term is used to measure the number of devices
Bandwidth aggregation: This is the art of considering the specific bandwidth requirements
Redundancy: This is the practice of duplicating critical elements so as to achieve reliability (Thomadsen, 2005).
Network diameter is the first thing to consider when designing a hierarchical network structure. Network diameter is the number of gadgets or devices that a certain packet have to cross before it reaches its destination. This means that when designing west consulting network structure, the network designer must keep network diameter low.
Bandwidth aggregation: The designers of West Consulting firm network structure they must consider the bandwidth requirement for every party of the hierarchy. Link aggregation is said to allow multiple switch ports links to be combined. This in turn achieves a high throughput between the organizational switches
To ensure redundancy the network designer can double the network links
4
How Design a Hierarchical Network .
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
Module name is Networks 512
As the demand for faster and more efficient high-performance computers grows, so do the
dimensions of the form factors that house them. Computer engineers have been tasked for years
with the difficult task of incorporating increasingly powerful computers into and onto
increasingly smaller chassis and printed circuit boards (PCBs), primarily to meet a growing
demand for more reliable, affordable, size-conscious, energy-efficient, and cost-effective
computer systems. This is why the world of embedded systems continues to see boundary-
pushing size, weight, power, and cost developments. 2.1 Use your knowledge of embedded
systems and devices to answer the question below. 2.1.1 What are embedded systems? 2.1.2
What are the various kinds of embedded systems? 2.1.3 What is the difference between soft and
hard real-time embedded systems?
device may require on both the serial and network sides of a connection. Should the device
always be connected to a specific host or PC? Is it possible that multiple hosts or network
devices will want or need to connect to the newly networked serial device? Are there any
specific requirements for an application that requires the serial device to reject a network
connection under certain conditions? The bottom line is that a server must be able to service a
wide range of application requirements while also meeting all of the demands of those
applications. Discuss how device servers are used to improve the usability of various
applications such as: Data Collection, Factory/Industrial Automation, Security Systems, Bar
Code Readers and Point-of-Sale Scanners, Medical Applications, M2M Wireless
Communication/Networking. (30)
1. An extensive telecommunications infrastructure is provided by a structured cabling system,
which is a complete system of cabling and related components. This infrastructure is used for a
variety of purposes, including phone service provision and data transmission across computer
networks. It shouldn't be hardware-reliant. A structured cabling system is further defined in
terms of ownership. At the termination of the service provider (SP), the structured cabling
system starts. The demarcation point (demarc) or network interface device is at this location
(NID). For instance, in the establishment of a telephone system, the SP provides one or more
service lines (per customer requirements). At the line of demarcation, the SP joins the service
lines. 1.1 Explain the significance of structured cabling and the advantages of structured cabling.
(10) 1.2 As a network architecture, you are tasked with designing a network for a six-story office
building, with each floor connecting 5 computers in 5 offices and having a wireless access point
to connect wireless devices. Design a network plan for the building using your knowledge of
structured cabling and various network devices, labeling all the hardware in devices and cabling.
(20)
A specialized network-based hardware device designe.
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docxtoltonkendal
Running head: NETWORK DESIGN PROPOSAL
NETWORK DESIGN PROPOSAL15
NETWORK DESIGN PROPOSAL
Student’s Name
Professor’s Name
UNIVERSITY OF MARYLAND
Course Title
Physical Network Design
1. Network Topology
The purpose of this paper is to present a proposal of network architectural system; it explains analysis of a detailed network arrangement with the networking infrastructure. This paper includes the study of physical topology according to the business needs for establishing a network layout such as premises of campus of “University of Maryland” is connected along with the departments, library, rooms, laboratory, and grounds with the network connections. The data must be secured for the campus teachers as well as students through all network arrangements. The new network system should also take into consideration the future development of the campus with more labs, library, computer, classrooms other offices in the building locations. So the proposed layout of the network layout is worthwhile for University (Stewart, 2008).
A general layout of a network that is topological with a protected system linking within the campus of the college:
Business Needs
The Cisco Enterprise Specialist of the IT Business association is for IT professionals to help them provide their business with innovation to improve their business output. The IT experts will groom their skills as part of this association such as:
· Assessing the technological alternatives within a business connection
· Evaluating and meeting the business needs.
· Behaving and talking courteously with business peers.
· Getting knowledge about an aggregate expense of proprietorship and an arrival on speculation IT arrangement's (Eernet, (n.d)).
Proposed topology
It is important to keep the system documentation brief and comprehensive. Initially, at the establishment of a system, the system documentation is generally concise, but when the system changes or develops more, the documentation needs to be redesign. System topology maps usually present a unique floor arrangement. When there are changes in the floor arrangements, the necessary steps are taken to change the Diagrams or redline are created to demonstrate the alterations. The changed layout is organized and well presented. An outline that is as-assembled represents how actually a system was created, which can be further altered. It is guaranteed that the existing records reflect the all systems topology changes and arrangement of the as-manufactured floor.
(Cisco.com)
Justification for proposed network topology
The Cisco Services – is a global level organization having more than 9,500 workers in more than 120 countries with more than 380 locations – Cisco Enterprise Architecture Services has a trustworthy public image due to best practices, industry based technological developments, and brilliance. Cisco maintains various network emergency response vehicles (NERV)’s that are deployed by the Cisco employees in case of natural disa ...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Consider introducing the overall objective of the network design/tutorialoutlet
1. Consider introducing the overall objective of the network design
FOR MORE CLASSES VISIT
tutorialoutletdotcom
Network Design Proposal Template Network Design Proposal
Prepared for:
University of Maryland University College
Prepared by:
Student Name I. Physical Network Design
Introduction
Consider introducing the overall objective of the network design. Look
into UMUC’s
Strategic Plan, how would the network design help the stakeholders, the
leadership of
the university, the students, and the instructors achieve their goals? How
would a great
network design contribute to students (your) experiences in learning? To
do this we
look at five aspects of a network design herein to support the leadership
to help meet
the goals of the strategic plan. A. Network Topology Business Needs
2. In this section, you will assess the business needs of the company. Use
the information
provided in the scenario to analyze the need for infrastructure or
equipment. If you need more
information, feel free to ask your instructor or make some assumptions.
If you make some
assumptions, be sure to list them. This section is not about the actual
infrastructure or
equipment, but it should discuss the business needs of the company.
Example
ABS Enterprises believes that employees’ health, wellbeing, and morale
have a
significant impact on the productivity of the employees and thus the
overall results
or output of the company. The company wants to invest in a facility that
will provide
the most return on investment while still providing a facility that
employees will use.
The company has 20 employees and wants needs one or more servers
and two
printers. All computers should be able to communicate, but the HR staff
of 5 needs
to be on a separate network due to the sensitive information on their
PC’s.
Proposed Topology
3. Select logical one or more topologies to use for this designstar topology
for this assignment.
(star, bus, mesh, ring- Please note that the star topology is the most
commonly used). This
section should be used to provide details of the selected infrastructure or
equipment.
Include the model, manufacturer, features, and cost. Below is an
example topology.
Topologies can be created using Microsoft Visio, or you can create a
free account at
gliffy.com and create diagrams. Justification
(Each section should contain the reasoning you present to justify the
selection you made for
your proposal. Look at it as your platform to tell finance and operations
personnel why this
should be selected for the network design) B. Network Media Note:
(Choose wired or wireless) Be aware that your solution needs to include
support for the
selected media. For example, if you choose wireless, ensure you have
wireless adapters for
your desktops.
Business Needs
Assess the business needs.
Proposed Network Media (include network wiring diagrams)
4. Select one or more network media to use for this design.
Justification
Justify your determination that the selected media will meet the business
needs. C. Network Devices Business Needs
Assess the business needs.
Proposed Network Devices Select network devices to use to implement
and support your design. Include setup and location
information for the devices. Provide a comprehensive list of devices,
including the quantity of
each device needed.
Justification
Justify your determination that the selected network devices will meet
the business needs.
Example: I selected a Cisco 2621 Router in order to connect the HR
users to the rest of
the company’s employees D. Network Security Devices Business Needs
Assess the business needs.
Proposed Network Security Devices
Select network security devices to use to secure the network. Include
setup and location
information for the devices. Provide a comprehensive list of devices,
including the quantity of
each device needed.
5. Justification
Justify your determination that the selected network security devices will
meet the business
needs.
Example: I selected a Cisco ASA 5510 Firewall in order to protect the
company’s
network. E. Computer Systems Business Needs
Assess the business needs.
Proposed Computer Systems
Select computer systems (servers) to use to implement the network
design. Include setup and
location information for the devices. Provide a comprehensive list of
devices, including the
quantity of each system needed. Justification
Justify your determination that the selected systems will meet the
business needs.
Example: I selected Windows 10 Professional for the operating system,
because it is the
newest, most secure, and stable version of Windows for end users. II.
Network Addresses Design (in its entirety)
A. Subnetting Subnetting is a process of breaking a large network into
small networks known as subnets.
Subnetting happens when we extend the default boundary of the subnet
mask. Basically we
6. borrow host bits to create networks (i.e., subnets).
We have been assigned the network address 199.1.2.0. Based on the
chart below, we know
this is a Class C address. This is determined by observing the first octet
of the IP address,
which is 199. This octet falls in between 192 and 223.
Class Octet Decimal Range A 1 - 126 B 128 - 191 C 192 - 223 Each
class has a predefined default subnet mask that tells us the octets, which
are already part
of the network portion, as well as how many bits we have available to
work with. Class Subnet Mask Format A 255.0.0.0
Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C
255.255.255.0 Network.Network.Network.Host CIDR (Classless Inter
Domain Routing)
CIDR is a slash notation of the subnet mask. CIDR tells us the number
of on bits in a network
address.
● Class A has default subnet mask 255.0.0.0. that means first octet of the
subnet mask has all on
bits. In slash notation it would be written as /8, means address has 8 bits
on. ● Class B has default subnet mask 255.255.0.0. that means first two
octets of the subnet mask
have all on bits. In slash notation it would be written as /16, means
address has 16 bits on. ● Class C has default subnet mask
255.255.255.0. that means first three octets of the subnet
7. mask have all on bits. In slash notation it would be written as /24, means
address has 24 bits
on.
Scenario The building will house four computer labs that will be used
for instruction. In the building
diagrams above, the labs are labeled Classroom #2 and Classroom #4 on
the first floor and
Classroom #1 and Classroom #5 on the second floor; each computer lab
will have a closet. Each
lab will have 25 computers: 23 student computers, 1 instructor
computer, and 1 server in the
closet for instructional use.
In addition, there will be a Student Computer Lab that will provide
computer access to students to
do their homework. There will be 25 computers in this lab and a server
in the closet. To allow
students access to library resources, the library will also have 20
computers for the general
public to use and 5 computers for library staff.
There needs to be separation between students, staff, and public access
networks. The open WiFi also needs to be separate from the other three
groupings.
Finally, there are various offices in the building. Each of these offices
will have one computer for
8. staff use, with the exception of the admissions office, which will have
five computers. There will
be two server rooms, one on the first floor and one on the second floor.
You have been hired as part of the networking team at UMUC. After
completing orientation and training,
your manager calls you into a meeting to discuss your first project. The
university has recently leased a building in Adelphi, Maryland. The
building will house offices,
classrooms, a library, and computer labs. Security is important for
UMUC, as the university must protect
students’ and employees’ data, as well as any intellectual property that
UMUC has on its servers and
computers. As a result, IT management would like to take the time to
review proposals on how best to
move forward on security issues. As a network engineer, you have been
asked to prepare a network
proposal on how to set up a secure network infrastructure in this
building to support university operations. Methodology
Given the aforementioned scenario, we are going to use the
192.168.0.0/24 network and create
a total of 8 subnets, with 25 hosts on each subnet. The chart below
describes structures the
scenario to include each subnet and required hosts.
Subnet Description Required Hosts Students in Classroom 1 Computer
Lab 23 Computers Students in Classroom 2 Computer Lab 23
Computers Students in Classroom 3 Computer Lab 23 Computers
9. Students in Classroom 4 Computer Lab 23 Computers Students in
Student Computer Lab 24 Computers Public Access network 20
Computers Equipment xx Network Peripherals (servers access
points) Computers Staff Office / Admissions Network xx Computers
(Using the How to Subnet a Network Video provided in CMIT 265 LEO
- Content - UMUC
Network Design Proposal, complete the following chart.) Subnet
Network Address Host Address Range Broadcast
Address Subnet Mask: 255.255.255._____
Classroom 1 192.168.0.0 192.168.0.1 – 192.168.0.30 192.168.0.31
Classroom 2 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Classroom 3 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Classroom 4 192.168.0.96 192.168.0.97 – 192.168.0.126 192.168.0.127
Student
Computer Lab 192.168.0.128 192.168.0.129 – 192.168.0.158
192.168.0.127 Equipment 192.168.0.__ 192.168.0.__ - 192.168.0.__
192.168.0.__ Library Lab
(Public Access) 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
Staff Network 192.168.0.__ 192.168.0.__ - 192.168.0.__ 192.168.0.__
III. Network Services Design
A. Network Services Business Needs
Assess the business needs
Proposed Network Services
Determine and list the network services needed to implement the design.
Provide setup and
licensing information (as necessary).
10. Justification
Justify your determination that the network services are needed and will
meet the business
needs Example: There needs to be a DHCP, DNS, File, and Active
Directory Server on the
network. Please give examples of why these servers are needed and what
role they will
play. Cover policy and process such as configuration management, asset
inventory, and
baseline configuration.
. B. Network Security Measures Business Needs
Assess the business needs
Proposed Network Security Measures
Outline network security measures needed in the design. This includes
training, monitoring, and
maintenance procedures. Provide implementation details of these
measures.
Justification
Justify your determination that the network security measures are needed
and will meet the
business needs. Example: Discuss Patching, Scanning, SIEM, Logging
and other measures. How will the
systems in this company’s network be updated? Discuss Firewall rules,
for example all
11. traffic will be allowed out or just ports 80 and 443 traffic will be allowed
out. What version
of Anti-Virus should be used on machines? Bibliography
Be sure to use references that are scholarly in nature and follow the
formatting rules of
the IEEE
************************************************