Network Design

8720 words - 35 pages
UMUC’s new building in Adelphi, MD will have to provide networking connectivity to students, professors, and staff. In order to begin the process of planning the new network, we will begin by planning the network IP addressing scheme. It is very important that the network IP addressing scheme be clearly defined in order for IT administrators to locate computers promptly. Also, in order to make it easier for the administrators, DHCP (Dynamic Host Configuration Protocol) will be used to assign IP addresses. The organization of the subnet layout will assist the IT administrators as well as making effective use of IP addresses.

In order to differentiate between students, staff, and instructors, we will place them on different subnets. Also, the instructors subnet will begin with a “1” in the third octet, the staff subnet will begin with a “3”, and the students subnet will begin with a “4” or “5” in the third octet of the IP addresses. Lastly, the second digit of the third octet will assign the floor for each subnet. An even number in the second digit will mean that the computer or device on the subnet is located on the first floor and an odd number means that it is located on the second floor. Network IP Addresses

First Floor

Subnet mask: 255. 255. 240. 0

Lecture Instructors

Network address: 10. 110. 16. 0

Subnet and range: 10. 110. 16. 2 – 10. 110. 16. 6

Staff (Library)

Network address: 10. 110. 32. 0

Subnet and range: 10. 110. 32. 2 – 10. 110. 32. 6

Admissions Staff

Subnet and range: 10. 110. 34. 2 – 10. 110. 34. 6

Office Staff (3)

Subnet and range: 10. 110. 36. 2 – 10. 1 ...

Read More

Similar Essays

Cycling Tourism

77081 words - 309 pages

Cycling tourism by Peter Saabye Simonsen Birgitte Jørgensen Derek Robbins Unit of Tourism Research at Recearch Centre of Bornholm December 1998 Trykt udgave ISBN: 87-90144-43-0 Elektronisk udgave ISBN: 87-90881-20-6 Preface In 1996, The Research Centre of Bornholm had the pleasure of having two guest researchers - both with a high interest in bicycle tourism. Not only did they have an interest in the subject, but they were also active cyclists, with an enthusiasm for promoting this mode of transport as part of the green agenda for local development. Combining two reports in d

View Document

Nothing Can Be

12676 words - 51 pages

REVISED SYLLABUS of B.TECH. ELECTRONICS & COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGG. NATIONAL INSTITUTE OF TECHNOLOGY, HAMIRPUR-177 005 (HP) Effective from July - 2007 ES-104 (ID) BASIC ELECTRONICS L T P 3 1 0 1. SEMICONDUCTORS, DIODES AND DIODE CIRCUITS: Insulators, semiconductors and metals, Mobility and conductivity, Intrinsic and extrinsic semiconductors and charge densities in semiconductors, current components in semiconductors, continuity equation. PN Junction diode – characteristic and analysis, Types of diodes – Zener diodes, Photodiodes

View Document

Test Bank Managerial Accounting Garrison Noreen

179633 words - 719 pages

Chapter 1 Managerial Accounting and the Business Environment True/False Questions 1. Although financial and managerial accounting differ in many ways, they are similar in that both rely on the same underlying financial data. Answer: True Level: Medium LO: 1 2. Managerial accounting is a branch of financial accounting and serves essentially the same purposes as financial accounting. Answer: False Level: Medium LO: 1 3. Managerial accounting places greater emphasis on the future than financial accounting, which is primarily concerned with the past. Answer: True Level: Easy LO: 1 4. Managerial a

View Document

Related Essays on Network Design

  • Routing

    14157 words - 57 pages

    This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: Routing Protocols and Concepts course as part of an official Cisco Networking Academy Program. Lab 1.5.1: Cabling a Network and Basic Router Configuration (Instructor Version) Topology Diagram Addressing Table Device R1 Interface Fa0/0 S0/0/0 Fa0/0 S0/0/0 N/A N/A IP Address 192.168.1.1 192.168.2.1 192.168.3.1 192.168.2.2 192.168.1.10 192.168.3.10 Subnet Mask 255.255.255.0 255.255.255.0

    View Document

    Java Questions

    21394 words - 86 pages

    Question: How could Java classes direct program messages to the system console, but error messages, say to a file? Answer: The class System has a variable out that represents the standard output, and the variable errthat represents the standard error device. By default, they both point at the system console. This how the standard output could be re-directed: Stream st = new Stream(new FileOutputStream("output.txt")); System.setErr(st); System.setOut(st);   Question: What's the difference between an interface and an abstract class? Answer: An abstract class may contain code in method bodies

    View Document

    Economics

    2476 words - 10 pages

    Analysis of Riordan's Manufacturing IT Systems I. History: Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. Connected via a Wide Area Network (WAN) it maintains facilities in Albany, Georgia, Pontiac, Michigan, and Hang Zhou, China. The company's research and development is done at the corporate h

    View Document

    Commnet

    2160 words - 9 pages

    INTRODUCTION: COMNET III is a performance analysis tool for computer and communication networks. Based on a description of a network, its control algorithms and workload, COMNET III simulates the operation of the network and provides measures of network performance. No programming is required. Network descriptions are created graphically through a highly intuitive interface that speeds model formulation and experimentation. COMNET III is integrated into a single windowed package which performs all functions of model design, model execution and presentation of results. A model is built an

    View Document

    Computer Network Security

    1183 words - 5 pages

    Computer Network access has developed rapidly in recent years. In the course of the rapid development of network, network Technology matures makes network connections easier, and people enjoy the convenience of the same network, Network Security is increasingly under threat. Network Security has become a potentially huge problem, safety situation should be cause for concern. Keywords: Computer Networks, security, Technology Now, Computer communication networks and Internet has become the fabric of our society a fundamental component. Networks are used in various aspects, including elec

    View Document

    The Universe Of Organic Chemistry

    5272 words - 22 pages

    The universe of organic chemistry The millions of reactions performed and compounds synthesized by organic chemists over the past two centuries connect to form a network larger than the metabolic networks of higher organisms and rivalling the complexity of the World Wide Web. Despite its apparent randomness, the network of chemistry has a well-defined, modular architecture. The network evolves in time according to trends that have not changed since the inception of the discipline, and thus project into chemistry's future. Analysis of organic chemistry using the tools of network theory enables

    View Document

    Linux In 24 Hours

    111296 words - 446 pages

    Teach Yourself Sams’ LINUX in 24 Hours ii Teach Yourself Linux in 24 Hours Teach Yourself Sams’ LINUX in 24 Hours Bill Ball Stephen Smoogen 201 West 103rd Street Indianapolis, Indiana 46290 iv Teach Yourself Linux in 24 Hours To Cathy and Nat for their kindness, love, and warm fuzzies.—Bill Ball Acquisitions Editor Kim Spilker Development Editor Mark Cierzniak Technical Editor Steve Burnett Project Editors Andrew Cupp Colleen Williams Copy Editors Margaret Berson Howard Jones Software Specialist Jack Belbot Team Coordinator Tracy Williams Cover Designe

    View Document

    Business Start Ups

    90057 words - 361 pages

    101 Small Business Ideas for Under $5,000 Corey Sandler Janice Keefe John Wiley & Sons, Inc. 101 Small Business Ideas for Under $5,000 Corey Sandler Janice Keefe John Wiley & Sons, Inc. This book is printed on acid-free paper. ? ? Copyright © 2005 by Word Association, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise,

    View Document

    Urdu Voice

    6758 words - 28 pages

    Cohesive Modeling, Analysis and Simulation for Spoken Urdu Language Numbers with Fourier Descriptors and Neural Networks Engr. S K Hasnain, Member IET, Assistant Professor, Pakistan Navy Engineering College, Karachi National University of Engineering & Technology, Pakistan [email protected] Dr. Azam Beg, Member IEEE, Assistant Professor College of Information Technology, UAE University Al-Ain, United Arab Emirate [email protected].ac.ae ABSTRACT This unified research describes spoken Urdu numbers investigative analysis from ‘siffar’ (zero) to ‘nau’ (nine) for making a concrete foundation in reco

    View Document

    Change

    2636 words - 11 pages

    Running Head: Network Security Solutions: Solutions for Aircraft Solutions Inc. Potential Network Weaknesses: Name: Tutor: Course: Date: Solutions for Aircraft Solutions Inc. Potential Network Weaknesses: A network Security Solution describe tools and policies employed by an organisation to track and thwart illegal admittance, abuse, alteration, or denial of the computer network service and network available resources. Network security entails safeguarding the network’s internal resources by establishing protective boundaries immediately outside the organisation’s ne

    View Document

    Computer Networking

    1232 words - 5 pages

    Network Topology Topology refers to the way in which the network of computers is connected. Each topology is suited to specific tasks and has its own advantages and disadvantages. The choice of topology is dependent upon · Type and number of equipment being used · Planned applications and rate of data transfers · Required response times · Cost Network topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes. A local area network (LAN) is one exampl

    View Document

    Cybercrime

    6396 words - 26 pages

    Sponsored by LOG MANAGEMENT IN A CYBERWORLD As the world becomes increasingly digitized, we’ve witnessed the rise of myriad cyber attacks aimed at private and public sector organizations. Cybercrime, increasingly operated under well-muscled organized crime syndicates, has become a huge threat. With so many potential cyber villains poking around the gates, enterprises must have strong protections and pristine visibility into what’s happening on the network. In these articles, CSO and its sister publications CIO, Computerworld and Network World explore the increasing importance of log manage

    View Document

    Music

    11374 words - 46 pages

    A Sample Quantitative Thesis Proposal Prepared by Mary Hayes NOTE: This proposal is included in the ancillary materials of Research Design with permission of the author. If you would like to learn more about this research project, you can examine the following thesis that resulted from this work: Hayes, M. M. (2007). Design and analysis of the student strengths index (SSI) for nontraditional graduate students. Unpublished master's thesis. University of Nebraska, Lincoln, NE. Design and Analysis 1 Running Head: DESIGN AND ANALYSIS OF THE STUDENT STRENGTHS INDEX (SSI) FOR NONTRADITIONA

    View Document

    Tnt Case Study

    2031 words - 9 pages

    Case S TNT Centrally Manages Global IP Network with VitalQIP® Network Management Software A well-managed IP network, capable of handling tens of IN BRIEF • Goal: For TNT, the world’s leading provider of express delivery services and supply chain solutions, to centrally manage IP on an expanding global network which was being administered on a country-bycountry basis. TNT also wanted to gain visibility and control over IP, DNS and DHCP for its network so that it could deliver new IP-based productivity solutions, including Voice over IP (VoIP) and Webbased enterprise applications. • Solut

    View Document

    Wireless Security

    5425 words - 22 pages

    Abstract Wireless Networking technology is now one of most popular networking and convenient technology but still the security issue is big concern for this technology. This research assignment will explore the wireless networking focusing on its security protocols and its development. Overview of wireless networking Computer users are getting more and more interested in accessing the Internet wirelessly because of its convenience and mobility. Nowadays, business travellers use wireless laptops to stay in touch with the home office; vacationers beam snapshots to friends while still on hol

    View Document

Other Popular Essays

Thousands of quality examples at your fingertips!

Writing doesn’t have to be hard. Essays, guides, research papers, and case studies will help you get the inspiration and competitive edge you need for your studies!