I. Physical Network Design
Introduction
A. Network Topology
Business Needs
In order to complete the needed full-time assignment efficiently and effectively, the University of Maryland University College will need a system in addition to tools to help the student attain their objectives. This entails new office space, a library, classrooms and computer labs will be able to achieve this capacity and optimize student learning potential
Proposed Topology
In order to plan for the facility of the network, I am proposing a star network topology for the facilities networking. This kind of network infrastructure is considered expensive due to numerous network devices that need to implement its functionalities. However, this type of network infrastructure allows easy installation of new devices, expansion in addition to configuration, and removal of the device without tampering the existing network devices in the infrastructure. In order to implement the network infrastructure for the institution, the following devices will be used.
Cisco C1914-SEC-SRE/K9 at a price of US dollar 1, 600
Fortinet FortiGate -100D security appliance at a price of US dollars 1, 5000
Cisco Catalyst 6500 Series Switches at price of US dollar 1,000
Fortinet FortiGate -100D at a price of US dollar 1,000
Cisco WAP4410N Wireless-N Access Point at a price of US dollar 900
Justification
According to my review based on the facility infrastructure and the business need of the university, I have come to conclude that the star network topology will efficiently satisfy the needs of the organization [2]. The advantage of using this network topology is the ability to configure individual network separate from each other in addition to its flexibility, which allows for easier expansion of the network devices. Considering the size of the infrastructure of the university, star topology was the best fit for the organization's needs and facilities [4]. Star topology is widely embraced network topologies globally due to its numerous advantages and flexibility over other topologies. For instance, the bus and ring network topologies are very inefficient in the process of data transmission added to their complex and intricate implementation process especially in a vast infrastructure
Figure 1: An illustration of star network topology. Retrieved from http://www.conceptdraw.com/examples/star-network
B. Network Media
Business Needs
According to the institution analysis and their needs, the university will need a network with a minimum speed of 40Mbps in addition to a backbone, which can manage to browse, and classroom tailored instructions [3]. In order for the infrastructure to fully function and to be operational, the institution will need at least 200 computer connected to seven servers within the network infrastructure.
Proposed Network Media (include network wiring diagrams)
The network media and connection will be done using Cat-6A cable with a frequency band of 250Mz together with a fiber optic cable to connect various building within the institution.
Justification
Cat-6A uses a frequency that can support a lot user and can operate with a 40Mbps speed of a router without difficulty or creating a traffic jam. More importantly, it is the latest rolled out technology in the production of cabling wire for the network [3]. Therefore, that means, the university networking cable will be up with the current technology minimizing the cost of rolling out the older technology in the near future [4]. This cable, Cat-6a, is more efficient in the transmission of data over networks especially communicating with the servers and the switches minimizing the latency of the back end users because it is able to eliminate crosstalk expeditiously.
C. Network Devices
Business Needs
The infrastructure of the university will require a lot of devices to connect all the workstation within the university. Therefore, the length of the building will play a bigger role in determining the amount of cabling device need to implement the networking infrastructure in the university.
Proposed Network Devices
The networking device proposed for the implementation and installation of the network infrastructure capable of handling huge amount of traffic and data include the following
Cisco C1914-SEC-SRE/K9 router will be able to supply all the building data connection efficiently at a higher speed of data transmission [3]. It is also Wi-Fi enable suitable for mobile device users within the university proximity. This router supports all the network protocols such as the IPv6 Version of network connection [3]. Cisco router will be primary device that will connect all the workstation within the university college. The first flow of the university will contain one cisco this device in the primary server room.
Cisco Catalyst 6500 Series Switches is designed with multiple layers that are able to connect various workstations within the university by separating them into subnets. In order to run cable within the office and give allowance to increase classroom seats, port 24 and 48 switches will be used in the cisco catalyst to allow expansion of users within the network [2]. To implement this effectively, nine 6500 Series switches will be required within the university to make the network operational in addition to being efficient. Every class will contain one switch and server room as well as the student computer laboratory. One 24-port switch will be contained in the office number 5.
Cisco WAP4410N Wireless-N Access Point will enable the institution set up a wireless network connection within the university serving all the workstation within the university and the entire population of the institution. The device is capable of grouping devices in addition to allowing movement of the device using the 802.11 WLAN protocol for a secure connection and browsing 9 [3]. This device can allow access up to 40 users with an upload speed of up to 300Mbps. This device will be installed on every floor of the institution more specifically in the floor of office number 3 and number 4.
Justification
These devices will be used in the implementation of the network infrastructure are able to transmit and handle a huge amount of traffic data in addition to numerous user with the institution. Above all, these devices have an allowance for expansion in case of an added workstation within the institution.
D. Network Security Devices
Business Needs
The institution will have an enormous amount of data flowing in and out of the institution. As such, there will be a need to implement security measures within the institution to safeguard important file and documents as well as the vast database that will be in place in the institution.
Proposed Network Security Devices
The best security device that I propose to be used in the institution is the commercial-based type that is efficient in monitoring network behaviors and traffic within the institution preventing intrusion software and malware threats, which can damage institution data consequently leading high financial losses in the process of reclaiming the system back to the initial phase.
The best security device in this case that the institution can use is the Fortinet FortiGate -100D. It has an inbuilt firewall, VPN, Intrusion Detection and prevention software, and web monitoring program that can provide efficient and effective security measure for the university workstation and protect vast amount of data generated from this institution [3]. With an output of up to 3.5Gps, the device can optimize the university network improving processes within the institution
Justification
This device will protect the university from external attacks and intrude software from causing damage to the files and documents and minimize the cost of restoring their systems back to normal.
E. Computer Systems
Business Needs
Based on the analysis of the university infrastructure and business needs, a workstation such as a student's lab, computer lab, faculty offices, library, and the classroom will need to be installed with various systems. Each lab in the institution including the library will need their own servers to be installed [5]. The success of the university will greatly depend on the implementation of these systems.
Proposed Computer Systems
The university will need at least six servers to be installed on various workstations. The best type of server, Dell PowerEdge T430 server resembles a desktop hence can easily be fitted into various workstation within the university without consuming huge space.
Dell OptiPlex 9030 can accommodate a maximum of up to 201 computer workstation within all the faculties in the university in addition to supplying power to various workstations.
Justification
The server proposed for the institution will ensure limited space within the workstations is maximized to deliver the needed technological needed with the institution in a more effective way.
II. Network Addresses Design
Sub-netting
Subnetting is crucial for the operation and management of large networks. It entails the process of sub-dividing a large network into different small networks which can be managed easily. These small networks are known as subnets. This process occurs when the default boundary if the subnet mask is extended. It is imperative to identify the class to which the assigned network address belongs. The organization has been allocated the network address 199.1.2.0. According to the universal chart of network addressing, this network address belongs to the Class C address.
The following table indicates the subnet mask of each class of network address. It also shows the format of the network address.
Scenario
According to the description of the organization, the building to be networked will contain four different computer laboratories. These computer labs will be used by the teachers to instruct the students. The computer labs which will be used to teach the students are marked as follows; Classroom 2 and Classroom 4 on the first floor and Classroom 5 and Classroom 1 on the second floor. Each computer lab will contain a total of 25 computers. One computer will be used as a server; another computer will be used by the instructor, and remaining 23 computers will be used by the students. Apart from the computer labs, there will be an additional Student Computer lab which will be dedicated to the students. This lab will be used by the student to complete their academic assignments. This computer lab will house one server and 25 computers. Furthermore, the library will be fitted with a total of 25 computers: 20 computers for student access and five computers for library staff. It is crucial to separate the different networks used by the different user groups within the organization; students, staff, and public. Lastly, each of the offices in the building will be equipped with a single computer for staff use. Each of the floors in the building will have different servers. The first floor will have a separate server from the second floor. The following floor plan indicates the configuration of the network within the building.
Methodology
According to the description of the organization, the 192.168.0.0/24 network will be used to generate an overall of eight subnets. It is crucial to point out that each of the subnets will have a total of 25 hosts.
According to the networking rules of Class C network with eight subnets, there will be an increment of 32 hosts per subnet. The following table indicates a completed networking table.
III. Network services Design
Network Services
Business needs
The university will need domain services in order to improve their functionalities such as file storage, e-mail capabilities, and print service, which will enable an apt environment for faculty and student optimum performance.
Proposed network services
For the faculties and students, the following services are proposed to be implemented;
Domain window 2013 will enable multiple user logs to share a resource from their domain server. This domain window server is able to use active directory service that is able to create user registry logs similar to phone directories [2] The domain window 2013 is also able to be designed to allow different user access levels such as the such the administrator and the normal users.
The e-mail services in the university can be tailored to the Microsoft Exchange 2013 application, which is both secured and efficient in e-mail service delivery. A user within the institution can also be installed Microsoft Lync 2013 which will enable them to chat on a different level within the institution. A lot of paperwork will also a factor to look for in the organization, therefore proposing Microsoft File and Print will enable the organization to deliver printing service in addition to easy file access.
Justification
This service will provide all in one go environ for all users to work together in an efficient manner minimizing the need for a third party use. This will enable all the student communicates efficiently as one block within the institution by tracking their conversation threads.
Network security Measures
Business needs
The implementation of networking system entails that a larger proportion of the university data will be contained online in a central database. Consequently, security measure should be put in place to prevent data damage, which can be costly to organization operation as well as outcomes.
Proposed Network security measures
Training
The institution should implement a policy that will ensure its workforce are regularly trained on the importance upholding security measure through threat identification and important steps that can be taken restore their system fully. They should be trained in the proper procedure to take to ensure appropriate authorities are informed and the alert incident that would lead to a security breach.
Monitoring
Network administrators will be mandated with the role of ensuring that device logs are monitored and intrusion detection and prevention software are utilized to monitor network behavior and traffic within the organization.
Maintenance
The system administrators will be required update their systems regularly to minimize security threats within the organization.
Justification
The proposed measures will minimize the cost of operating the network of the institution in addition to ensuring maximum data protection in the organization.
Reference
[1]B. Graham, D. Dodd, and S. Cottle, Security analysis, 1st ed. New York: McGraw-Hill, 1962.
[2]J. Biskup, Security in computing systems, 1st ed. Berlin: Springer, 2009.
[3]S. McQuerry, Interconnecting Cisco network devices, 1st ed. Indianapolis, Ind.: Cisco Press, 2008.
[4]S. Shinde, Computer network, 1st ed. New Delhi: New Age International Ltd., 2009.
[5]T. Norman, Integrated security systems design, 1st ed. Amsterdam: Elsevier Butterworth-Heinemann, 2007.