Network Design

1484 words - 6 pages

Intro Sample

UMUC’s new building in Adelphi, MD will have to provide networking connectivity to students, professors, and staff. In order to begin the process of planning the new network, we will begin by planning the network IP addressing scheme. It is very important that the network IP addressing scheme be clearly defined in order for IT administrators to locate computers promptly. Also, in order to make it easier for the administrators, DHCP (Dynamic Host Configuration Protocol) will be used to assign IP addresses. The organization of the subnet layout will assist the IT administrators as well as making effective use of IP addresses.

In order to differentiate between students, staff, and instructors, we will place them on different subnets. Also, the instructors subnet will begin with a “1” in the third octet, the staff subnet will begin with a “3”, and the students subnet will begin with a “4” or “5” in the third octet of the IP addresses. Lastly, the second digit of the third octet will assign the floor for each subnet. An even number in the second digit will mean that the computer or device on the subnet is located on the first floor and an odd number means that it is located on the second floor. Network IP Addresses

First Floor

Subnet mask: 255. 255. 240. 0

Lecture Instructors

Network address: 10. 110. 16. 0

Subnet and range: 10. 110. 16. 2 – 10. 110. 16. 6

Staff (Library)

Network address: 10. 110. 32. 0

Subnet and range: 10. 110. 32. 2 – 10. 110. 32. 6

Admissions Staff

Subnet and range: 10. 110. 34. 2 – 10. 110. 34. 6

Office Staff (3)

Subnet and range: 10. 110. 36. 2 – 10. 1

Read More

As Seen On:

Similar Essays

It Cis

17158 words - 69 pages

|INSTRUCTIONAL MATERIAL – Supporting | | | |The following resources provide additional background and supporting information for this course. There is no need to purchase these items for the course. | |

View Document

Bcg Matrix For Walt Disney

15514 words - 63 pages

On System Design Jim Waldo On System Design Jim Waldo Perspectives 2006-6 In an Essay Series Published by Sun Labs December 2006 This work ?rst appeared as part of the OOPSLA 2006 Essays track, October 22-26, Portland, Oregon, USA. Copyright © 2006 Sun Microsystems, Inc. All rights reserved. The SML Technical Report Series is published by Sun Microsystems Laboratories, of Sun Microsystems, Inc. Printed in U.S.A. Unlimited copying without fee is permitted provided that the copies are not made nor distributed for direct commercial advantage, and credit to the source is given. Othe

View Document

23343254325432

12781 words - 52 pages

C H A P TER 12 Designing Switched LAN Internetworks This chapter describes the following three technologies that network designers can use to design switched LAN internetworks: • • • LAN switching Virtual LANs (VLANs) ATM switching Evolution from Shared to Switched Networks In the past, network designers had only a limited number of hardware options when purchasing a technology for their campus networks. Hubs were for wiring closets and routers were for the data center or main telecommunications operations. The increasing power of desktop processors and the requirements of cli

View Document

Related Essays on Network Design

  • Ccna 2

    10909 words - 44 pages

    CCNA EXPLOARTION 2 ANSWERS BY abhishek kunal Unit1: 1. If a router cannot find a valid configuration file during the startup sequence, what will occur? • The startup sequence will reset. • The router will prompt the user for a response to enter setup mode. • The startup sequence will halt until a valid configuration file is acquired. • The router will generate a default configuration file based on the last valid configuration. • The router will monitor local traffic to determine routing protocol configuration requirements. 2. Refer to the exhibit. The network administrator has configured the

    View Document

    Networking Technologhy

    11778 words - 48 pages

    Table of Contents Introduction 4 1. The Network Architectures 5 1.1. Peer to Peer Network 5 1.2. Client/Server Network 6 1.3. Client/Server Network for the Travel Global Company 7 2. The function of Client and Server Computers 8 2.1. Client Computers 8 2.1.1. Functions of Client 8 2.2. Server Computers 8 2.2.1. Functions of Server 8 2.3. Interaction between Client and Server computer 9 2.3.1. Requesting a Web Page 9 3. Advantages of the Client/Server and Roles of Server OS 10 3.1. Advantages of Client/Server Network 10 3.2. Roles of Server OS 10 4

    View Document

    Distributed Embedded Firewall

    18071 words - 73 pages

    CHAPTER ONE 1.0 INTRODUCTION 1.1 Background to the Study Firewalls are important tools in data and computer system protection. A firewall is a computer system that sits between a protected network area and the rest of the network and attempts to stop malicious traffic from entering the protected network, while allowing legitimate traffic to pass in or out. In other words, firewalls are an effective security mechanism for protecting a local computer system or network of systems from network-based security threats and vulnerabilities while at the same time supporting access to the outside

    View Document

    Network Design

    3866 words - 16 pages

    kk TRUE/FALSE The following are possible True/False questions for tests. The statement is given and the answer is provided in square brackets. The level of difficulty (easy, moderate, or difficult) and the page(s) relevant to the topic are also furnished. 1. A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. [True; p. 273] Easy 2. The traditional network design approach works very well for rapidly changing networks. [False, it is best for static or slowly evolving networks; p. 273] Easy

    View Document

    Policy Network

    13932 words - 56 pages

    90 Reihe Politikwissenschaft Political Science Series ‘Policy Networks’ John Peterson 90 Reihe Politikwissenschaft Political Science Series ‘Policy Networks’ John Peterson July 2003 Institut für Höhere Studien (IHS), Wien Institute for Advanced Studies, Vienna Contact: John Peterson University of Glasgow Jean Monnet Professor of European Studies (: +44(0)141 330 5076 email: [email protected] Founded in 1963 by two prominent Austrians living in exile – the sociologist Paul F. Lazarsfeld and the economist Oskar Morgenstern – with the financial support from the

    View Document

    Networking

    7132 words - 29 pages

    Development stage – initial development Function of routers The routers in the network provide a gateway between the networks. Router 1 will provide a gateway between the college network and the Internet, Router 2 will provide a gateway between the teaching network and the Isolation LAN and Router 3 will connect the administration network and the isolation LAN. The routers will select the best path using a metric which can be calculated on Hop count, bandwidth, delay, reliability and Load. The metric hop count is used by OSPF (Open Shortest Path First) and RIP (Router Information Protocol),

    View Document

    Computer Networking And Management

    14064 words - 57 pages

    MODULE 4 COMPUTER NETWORKING & MANAGEMENT Document Publication Details Area Award Module Title Assignment Title Examination Cycle Version Status Prepared by NCC ID Detail NCC Postgraduate Diploma in Strategic Business IT Computer Networking and Management Computer Networking and Management June 2009 1.3 Final Tan Hwa Seong, PMP 310973 Contact Details: Contact Person Address Mr. Tan Hwa Seong 3 Jalan Datuk Sulaiman 2, TTDI, 6000 Kuala Lumpur Malaysia +60 122862816 +60 377107300 [email protected] Telephone No. Fax No. Email MODULE 4 COMPUTER NETWORKING & MANAGEMENT Table

    View Document

    Matt Essay

    18342 words - 74 pages

    rethinking design Appro-tech: Design of heating, cooking and/or cooling systems. Maree Leppard What/Why: Appro-tech is short for appropriate technology, which is being mindful of what we're doing and aware of the consequences. Appro-tech changes with every situation, and every different environment. For example; it is not appropriate to install solar modules in a place with very little sun. Appro-Tech: - Meets peoples needs - Helps protect the environment - Uses local skills and materials - Helps people earn a living - Affordable - Paves the way for a better future Therefore Appro-Tech is in

    View Document

    Final Ccna 4 Doc

    5211 words - 21 pages

    1 Refer to the exhibit. A pre-sales system engineer receives a diagram of the current network WAN connectivity from a customer. EIGRP is the routing protocol used on the WAN. Based on the default operation of EIGRP, which statement is true about the routing table on router R1? There is a single route to the 192.168.16.0/28 LAN via the use of the T1 connection. There is a single route to the 192.168.16.0/28 LAN via the use of the DSL connection. There is a single route to the 192.168.16.0/28 LAN via the use of the Metro Ethernet connection. EIGRP installs all three route

    View Document

    Mtech Cse Syllabus

    14712 words - 59 pages

    S.R.M UNIVERSITY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING M.Tech. (COMPUTER SCIENCE AND ENGINEERING) – 2008-2009 CURRICULUM I SEMESTER COURSE COURSE NAME L CODE Theory MA0533 Mathematical Foundations of 3 Computer Science CS0505 Data structures & Algorithms 3 CS0513 Parallel Computer Architecture 3 CS0517 Object Oriented Software Engineering 3 Elective – I 3 Total 15 T P C 0 2 2 0 0 4 0 0 0 3 0 3 3 4 4 4 3 18 II SEMESTER COURSE COURSE NAME L T P CODE Theory CS0502 Database Technology 3 2 0 CS0504 Computer Communication 3 2 0 CS0518 Internet Programming and Tools 3 0

    View Document

    Layer 3 Vlan

    9274 words - 38 pages

    1.0 OVERVIEWS OF LAYER 2-OPERATION In Layers 2 switches meaning is where switches which using the Media Access Control also recognized in MAC address which are create inside the Network Interface Card near ahead the frame into a different node. Apart from that layer 2 switch also builds MAC address table using for the forward result and simply performs in the Data Link Layer of layer 2 switch inside an OSI. Currently the switch contains ASIC which are uses near control with highest speeds switch of data. Only a switch determines on receiving the data frames beginning a nodes until desti

    View Document

    Heera

    14416 words - 58 pages

    User Guide EM001 Copyright © 2010. All Rights Reserved. eMachines User Guide Original Issue: 02/2010 Model number: __________________________________ Serial number: ___________________________________ Purchase date: ___________________________________ Place of purchase: ________________________________ Visit http://registration.emachines.com and discover the benefits of being an eMachines customer. Information for your safety and comfort Safety instructions Read these instructions carefully. Keep this document for future reference. Follow all warnings and instructions marked o

    View Document

    Nothing Can Be

    15001 words - 61 pages

    REVISED SYLLABUS of B.TECH. ELECTRONICS & COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGG. NATIONAL INSTITUTE OF TECHNOLOGY, HAMIRPUR-177 005 (HP) Effective from July - 2007 ES-104 (ID) BASIC ELECTRONICS L T P 3 1 0 1. SEMICONDUCTORS, DIODES AND DIODE CIRCUITS: Insulators, semiconductors and metals, Mobility and conductivity, Intrinsic and extrinsic semiconductors and charge densities in semiconductors, current components in semiconductors, continuity equation. PN Junction diode – characteristic and analysis, Types of diodes – Zener diodes, Photodiodes

    View Document

    Wireless Mesh Networks

    8764 words - 36 pages

    A Survey on Wireless Mesh Networks IAN F. AKYILDIZ, GEORGIA INSTITUTE XUDONG WANG, KIYON, INC. OF TECHNOLOGY Abstract Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. However, many technical issues still exist in this field. In order to provide a better understanding of the research challenges of WMNs, this article presents a detailed investigation of current state-of-the-art protocols and algorithms fo

    View Document

    Computer Networking

    5257 words - 22 pages

    [pic] Student Name: SHEILA KOOMSON Student ID: UB7339SIT13927 SECOND PHASE SUBMISSION OF ASSIGNMENT INFORMATION TECHNOLOGY COURSE (COMPUTER NETWORKING) ATLANTIC INTERNATIONAL UNIVERSITY TABLE OF CONTENT ➢ COVER PAGE OF COMPUTER NETWORKING …………………………… PAGE 1 ➢ HISTORY OF COMPUTER NETWORKING……………………………………PAGE2 ➢ WHAT IS COMPUTER NETWORKING……&hel

    View Document

Other Popular Essays

Thousands of quality examples at your fingertips!