Network Customization and Optimization Project

User Generated

pynfflpuvpfgber

Programming

Description

Unformatted Attachment Preview

You have been hired as part of the networking team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project. The university has recently leased a single building in Adelphi, Maryland. The building will house faculty and administrative offices, classrooms, a library, and computer labs. Security is important at UMUC, as the university has a responsibility to protect student and employee data as well as any intellectual property that UMUC maintains on its servers and computers. IT management would like to review multiple proposals to determine how best to address the university’s specific security issues. As a junior network engineer, you are asked to prepare a network proposal that addresses how best to establish a secure network infrastructure to support university operations in the newly-leased building. The proposal requires three submissions covering network design, network addressing and security, and network customization and optimization. After speaking to your manager, you are excited about the project, but you realize you will have a busy schedule. As you are writing your proposal, you will also have to prepare for tPhe CompTIA Network+ Certification exam. One of the conditions of your employment at this university is that you obtain this certification within 60 days of being hired. The network proposal represents a great opportunity to document your expertise. It is also an opportunity for you to gain an integrated view of the different aspects of networking that you will be asked about in the certification exam. In this section, address each of the following. A. B. C. D. E. F. Identify network services needed. List additional servers or network devices needed to implement the network. List network security measures to be implemented. Justify the need for the network services, security measures, and devices you've selected. Identify network storage and cloud based services that will be available for faculty and students • Students should be specific when discussing the configuration and implementation. Identify the proper data protection and backup method and implementation, and justify your decision. G. H. I. • Students should consider the needs of the administration, faculty, and students. Identify a network monitoring solution and describe how this will enable the optimization of the network, and justify your decision. • Students should be specific when describing protocol analyzers, network monitoring tools, and packet sniffers Identify how logs will be stored, managed, and how long the university will keep them, and justify your answer • Students should consider this in the context of the network or cloud based storage selected. Describe the troubleshooting methodology Information Technology (IT) personnel will use when troubleshooting issues across the proposed network implementation Network Design Proposal Template Network Design Proposal Prepared for: University of Maryland University College Prepared by: Student Name I. Network Design A. Network Topology Technical Requirements In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution). Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.) Secure Network Contractors believes that students and faculty health, well-being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements). Proposed Topology Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each. Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Furthermore, you must include a chart comparing and contrasting the different options available to meet the requirement. An example is provided below and should be used as a reference only. Remember to include references and cite your work according to IEEE-style format.) Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal). The following business case analysis show the three potential hardware solutions to the requirement provided. The visual presents the ability for the reader to understand the variables considered during the analysis of the three potential hardware solutions. [The requirements are on the top row. The green in the table shows options that meet requirements, red does not, and blue exceeds requirements. As you can see in the above table, not all requirements can be met. You will need to explain in your Justification why the selection you made gives the school the best available option for the cost. The options that meet or exceed the requirements may cost too much. Your job is to decide what the best option is and present it to management. So, based on the requirements, which phone would you select for meeting those requirements at the least cost?] Justification This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph. Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.) Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal). B. Cables and Connectors Note: (Students should consider the needs for both a wired and wireless implementation as your proposal should include both.) Technical Requirements In this section, you will assess UMUC’s technical requirements related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Cables and Connectors This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students C. Networking and Internetworking Hardware Technical Requirements In this section, you will assess UMUC’s technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Networking and Internetworking Devices This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. D. Wide Area Network (WAN) Design Technical Requirements In this section, you will assess UMUC’s technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Wide Area Network (WAN) Design This section should be used to provide the details of your proposed Internet Service Provider (ISP) solution. Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Students should connect to the ISP with two different technologies. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. E. Computer Systems Hardware Technical Requirements In this section, you will assess UMUC’s technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Computer Systems Hardware This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. II. Network Addressing and Security A. Subnetting Overview Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets). We have been assigned the network address 192.168.22.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223. Class Octet Decimal Range A 1 - 126 B 128 - 191 C 192 - 223 Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with. Class Subnet Mask Format A 255.0.0.0 Network.Host.Host.Host B 255.255.0.0 Network.Network.Host.Host C 255.255.255.0 Network.Network.Network.Host CIDR (Classless Inter Domain Routing) CIDR is a slash notation of the subnet mask. CIDR tells us the number of on bits in a network address. ● Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation, it would be written as /8, means address has 8 bits on. ● Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation, it would be written as /16, means address has 16 bits on. ● Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation, it would be written as /24, means address has 24 bits on. Technical Requirements UMUC has not decided how they will use all of the physical space within the newly leased building, but the diagrams below convey the proposed end state. However, they have decided to use some of the space in the short term. In doing so, we will proceed with the proposed plan. Initially, the building will house 5 classrooms, 1 student computer lab, 1 library, and 1 office. ● In the below building diagrams, we will use Office 5 (Admissions) on the first floor. Each office will have 1 computer for staff use, with the exception of the admissions office, which will have 5 computers. Based on the subnetting performed above, we may be able to add more devices in the future. ● The classrooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the first floor and Classroom #1 and Classroom #5 on the second floor; each classroom will have a closet. Each classroom will have 25 devices: 23 student computers, 1 instructor computer, and 1 server in the closet, for instructional use. ● Students should consider high traffic areas for Wi-Fi, such as the sitting areas and not the classrooms. The Wi-Fi network should be segregated from the wired network and implemented on a separate Class C network. What will the network address, range, and broadcast address for this separate Class C wireless address be? ● In addition, there will be a student computer lab that will provide computer access to students to do their homework. The student computer lab is located on the second floor. There will be 24 computers in this lab and 1 server in the closet. ● To allow students access to library resources, the library will also have 10 computers for the general public to use and 5 computers for library staff. ● There will be two server rooms, one on the first floor and one on the second floor. To be clear, the diagram below conveys the proposed end state. Given the aforementioned scenario, we are going to use the 192.168.3.0 network and create a total of 8 subnets, with 25 possible hosts on each subnet. The chart below describes structures the scenario to include each subnet and required hosts. Subnet Description Required Hosts Classroom 1 (First Floor) 25 Computers Classroom 2 (First Floor) 25 Computers Classroom 4 (First Floor) 25 Computers Classroom 1 (Second Floor) 25 Computers Classroom 5 (Second Floor) 25 Computers Office 5 – Admissions (Second Floor) 25 Computers Student Computer Lab 25 Computers Library 15 Computers Note: Using the How to Subnet a Network Video provided in CMIT 265 LEO - Content - UMUC Network Design Proposal, complete the following chart. Proposed Subnet Subnet Network Address Host Address Range Broadcast Address Subnet Mask: 255.255.255. ___ Classroom 1 (First Floor) 192.168.22.0 192.168.22.1 - 192.168.22.30 192.168.22.31 Classroom 2 (First Floor) 192.168.22. _ 192.168.22. _ - 192.168.22. _ 192.168.22. _ Classroom 4 (First Floor) 192.168.22. _ 192.168.22. _ - 192.168.22. _ 192.168.22. _ Classroom 1 (Second Floor) 192.168.22.96 192.168.22.97 - 192.168.22.126 192.168.22.127 Classroom 5 (Second Floor) 192.168.22.128 192.168.22.129 192.168.22.158 192.168.22.159 Office 5 – Admissions (Second Floor) 192.168.22. _ 192.168.22. _ - 192.168.22. _ 192.168.22. _ Student Computer Lab 192.168.22. _ 192.168.22. _ - 192.168.22. _ 192.168.22. _ Library 192.168.22. _ 192.168.22. _ - 192.168.22. _ 192.168.22. _ Wi-Fi Network 192.__. __.__ 192._._. _ - 192._._. _ 192._._. _ B. Firewall Implementation Technical Requirements In this section, you will assess UMUC’s technical requirements related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Firewall Implementation This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. C. Intrusion Detection System / Intrusion Protection System Technical Requirements In this section, you will assess UMUC’s technical requirements related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Intrusion Detection System / Intrusion Protection System This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won’t IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. D. DMZ Implementation Technical Requirements In this section, you will assess UMUC’s technical requirements related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed DMZ Implementation This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. E. Physical Security Measures Technical Requirements In this section, you will assess UMUC’s technical requirements related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Physical Security Measures This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. F. Additional Network Security Measures Technical Requirements In this section, you will assess UMUC’s technical requirements related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Network Security Measures This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. III. Network Customization and Optimization A. Network and Cloud Based Storage Technical Requirements In this section, you will assess UMUC’s technical requirements related to the network and cloud based storage. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Network and Cloud Based Storage This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. Is it worthwhile to consider outsourcing some or all of the classrooms? Have all the costs been considered? B. Data Protection and Backup Technical Requirements In this section, you will assess UMUC’s technical requirements related to the data protection and backup. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Data Protection and Backup This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Consider disaster recovery and options available for conducting classes, but also day to day operations of the offices. Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. C. Network Monitoring Technical Requirements In this section, you will assess UMUC’s technical requirements related to network monitoring. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Network Monitoring This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What monitoring systems are available and of them which would be the most advantageous for the UMUC to implement? Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. D. Log Storage and Management Technical Requirements In this section, you will assess UMUC’s technical requirements related to the log storage and management. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Log Storage and Management This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What aggregating and analysis solutions are there and which one is best to choose from for UMUC? Student should be specific when discussing the models, types, and costs. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions. E. Troubleshooting Methodology Technical Requirements In this section, you will assess UMUC’s technical requirements related to the troubleshooting methodology. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section. Proposed Troubleshooting Methodology This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Present the isolation method for equipment and how you could find one bad end point or a cable that is bad between classroom 1 and the IT server closet. Student should be specific when discussing the methods, test equipment, and results. Justification This section should be used to justify your proposed solution based on the technical requirements and assumptions.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

I have completed the paper and followed all the instructions. I look forward to working on more of your papers. Thank you. Don't forget to leave a positive review😊

Running Head: CLOUD NETWORK ATTACHED

Network Design 3
Student’s Name
Institutional Affiliation

1

CLOUD NETWORK ATTACHED

2

Network Service
Security forms an import part of UMUC. Various measures must thus be put in place to
ensure that UMUC meets its security standards. For instance, UMUC needs to put in place
various network services to help in the maintenance of their security standards. The network
services that are put in place by UMUC should be up to date with the required international
security standards. The selected network services must also provide a platform for the storage of
employee and student data and facilitation of communication. The most secure network services
required include Domain naming system and Dynamic Host Configuration Protocol.
Domain naming system: to help in the interpretation of the IP addresses.
Dynamic Host Configuration Protocols: to help in assigning and configuring information to the
required network hosts.
Proper coordination of these two network services will ensure that there is a smooth
channel of communication between the computers at the newly leased building and the rest of
the campus.
Servers and networking devices
Network Devices
Since we will be implementing a Local Area Network, we would require several
networking devices. For these networking devices to work, each computer in the network will
have to have network cards installed. A local Area Network will require routers, a hub,
networking cables, for this case, and a high speed modem for connection to the internet.
Ethernet cables are the most suitable cables for this job. This conclusion is attributed to the fact

CLOUD NETWORK ATTACHED

3

that Ethernet cables are full duplex as opposed to wireless networks. They thus create a platform
that gives room for simultaneous communication which is highly recommended for the UMUC
set-up. Cabled networks are also secure as compared to wireless networks. Using Ethernet
cables will thus cumulatively increase the security of UMUC.
Servers
Main server
For the main server we shall install Windows Server 2008. A single package provides the
user with twenty five Client Access Licenses thus it will prove to be very cheap to acquire and
install. However, it requires to be updated regularly. Authentication Servers will also be required
to validate logins of both the students and employees. This is to ensure that security of data is
achieved.
Authentication server
A D3 authentication server will be best suited to handle this large population of students
and employees. Although this server is expensive, it is highly suitable for a large number of
users.
Network security measures
Firewalls
Firewalls provide the first layer of security enhancement as they act as filters to
communication through the network. Installing antivirus into all the computers is also very
important as viruses and malware that can be easily spread through removable storage media.
The antivirus software installed must have its definitions updated regularly to ensure safety of

CLOUD NETWORK ATTACHED

4

the network system. This antivirus software has also to be installed in the mail servers as emails
are also ways of spreading viruses through attachments
Network and host based intrusion based system
Installing both network and host based intrusion based system may also come in handy
when the system is attacked. They have the capability of alerting the administrator whenever a
malicious piece of code or even application is detected in the network (Alpcan & Başar, 2010).
Newer versions are even able to update the available firewall rules to block the attacking IP
address from accessing the system. I would recommend the installation of such features.
Physical Protection
Firewalls and Network base intrusion systems only offer internal security of the systems.
It is thus important to come up with an effective external security mechanism. This prompts a
need for physical protection measures. For instance, all rooms should be locked at all times. All
windows should also be grilled to prevent physical theft of data. Security guards should be
available 24 hours a day. All rooms should be well ventilated. All these measures are to ensure
data integrity.
Network storage
Network Attached Storage
According to Rouse (2019), network Attached Storage is a special type of storage system
where users within a Local Area Network can store and receive data from a centralized disk.
This is achieved through Ethernet connections. They are configured and managed through utility
based browsers as they do not support displays or keyboards. They are advantageous in that, they

CLOUD NETWORK ATTACHED

5

cost low to set up and maintain while providing higher storage capacities (Rouse, 2019).
Network Attached Storage is also easy to access thus suitable for students and the faculty.
Cloud Network Attached
Cloud Network Attached storage on the other hand involves accessing data over the
internet in some remote storage as if it were available on the local disks. Cloud Network storage
are usually chargeable by a third party. They are thus prone to security issues since the users
have no control over their data. Network attached storage will also be expensive considering t...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags