CMIT265 Network Proposal Design Final Parts I-III

You enjoy been paid as keep-akeep-asever of the networking team at UMUC. After completing orientation and trailing, your superintendent calls you into a consultation to examine your earliest scheme. The university has recently leased a singular structure in Adelphi, Maryland. The structure gain progeny present and negotiative appointments, collocaterooms, a library, and computer labs. Safeguard is relevant for UMUC, as the university must save novices’ and employees’ facts, as polite as any psychical goods that UMUC has on its servers and computers. As a effect, IT skill would approve to receive the message to revisal tenders on how best to agitate presumptuous on safeguard issues. As a younger netcomposition engineer, you enjoy been asked to arcollocate a netcomposition tender on how to set up a close netcomposition infrastructure in the newly leased structure to patronage university operations. The netcomposition tender gain insist-upon three acquiescences sheltering netcomposition sketch, netcomposition discourseing and safeguard, and netcomposition customization and optimization. After suggestive to your superintendent, you are distracted encircling the scheme, but you accomplish you gain enjoy a industrious catalogue. As you are match your tender, you gain to-boot enjoy to arcollocate for the CompTIA Network+ Certification exam. One of the provisions of your tenure at this university is that you earn this certification among 60 days of substance paid. The netcomposition tender represents a comprehensive knowning to muniment your expertise. Additionally, it is to-boot a comprehensive knowning for you to constitute an integrated apprehension of the incongruous aspects of networking which are ordealed in the certification exam. In this letters demonstration, you gain use the TestOut Netcomposition Pro (LabSim) to imbibe encircling the topics insist-upond to close victory for each acquiescence (i.e., netcomposition sketch, netcomposition discourseing and safeguard, and netcomposition customization and optimization). Furthermore, these activities gain arcollocate you for the CompTIA Network+ Certification exam. In dispose to authenticate your strengths and weaknesses in the earliest week, you gain perfect the CompTIA Network+ Certification Habit exam. Revisal LEO - Content for how to mode the CompTIA Network+ Certification Habit exam. Then, duaccentuation the proximate view weeks, as you tread through each set of activities in TestOut LabSim, you gain to-boot be drafting minoritys of your netcomposition sketch tender. Use the effects of the Network+ Certification Habit exam you took duaccentuation the earliest week of collocate to acceleration influence you on which areas among TestOut LabSim you should expend further message studying. You must perfect all labs in TestOut LabSim; these are the activities after a conjuncture the computer mouse icon. The Netcomposition Sketch Tender gain be submitted in three acquiescences: netcomposition sketch, netcomposition discourseing and safeguard,and netcomposition customization and optimization.  Below, you gain ascertain 10 treads in this scheme that baccentuation you through each deliverable. Begin after a conjuncture Tread 1, enrolling in TestOut LabSim, and then live after a conjuncture Tread 2, taking the habit exam.   Netcomposition Sketch Tender Template Netcomposition Sketch Proposal Prepared for: University of Maryland University College Prepared by: Student Name I. Netcomposition Design A. Netcomposition Topology Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments. Use the understandledge granted in the scenario to stir the scarcity for netcomposition topology, cables and connectors, networking and internetworking artifices, distant area networking sketch, and computer classifications. If you scarcity further understandledge, reach loose to ask your schoolmaster or execute some assumptions. If you execute assumptions, be understanding to catalogue them. This minority should be used to depict the technical insist-uponments of the labor at compositionman. That is, you gain be making self-evident the insist-uponments as you apprehend them, which gain baccentuation to the proximate minority (your projected breach).  Example (Note: The member that follows is an illustration. It is expected that novices gain use this as a allusion solely. Mind to enclose allusions and summon your composition according to IEEE-style constituteat.) Secure Netcomposition Contractors affects that novices and present soundness, polite­being, and morale enjoy a expressive collision on the letters proof and productivity of the academic service. Close Netcomposition Contractors apprehends the aftercited technical insist-uponments. The university has invested in a new structure that gain present an academic ambience conjuncture providing novices and present a universe collocate exploration and letters environment. The university has hundreds of Present that educate and perconstitute exploration among the new academic structure. Present should be efficacious to seamlessly transition betwixt the newly leased structure, and other structures on the UMUC campus. Students gain be insist-upond to enjoy a resembling proof as collocatees receive establish in multiple structures athwart campus each day. Present and novices gain be insist-upond to stereotype incontrariant of residuum, and hence scarcitys shared stereotypeing media. All computers should be efficacious to adjoin, but the rational media function should produce on a disconnected netcomposition due to the sentient and personally identifiefficacious understandledge they compositionmanle. We apprehend that the newly leased structure gain scarcity to wirelessly adjoin after a conjuncture other structures on campus, and we gain discourse this in the Distant Area Netcomposition (WAN) minority that follows. Etc. (students should live to obvious-up the technical insist-uponments). Proposed Topology Select one or further topologies to use for this sketch (i.e., notability, bus, involution, accentuation, and delight silence that the notability topology is the most commsolely used). This minority should be used to get the details of your projected breach. Be favoaccentuation and enclose the intent, creator, features, and absorb of artifices where embezzle. Students should enclose a visual resemblance of the topology selected. Topologies can be constituted using Microsoft Visio, or you can constitute a loose redonation at pull.io (https://www.draw.io) and constitute diagrams. Be understanding to revisal the types of topologies and proudlight the benefits and pullbacks for each.   Example (Note: The member that follows is an illustration. It is expected that novices gain use this as a allusion solely. Mind to enclose allusions and summon your composition according to IEEE-style constituteat.) Secure Netcomposition Contractors affects that from a similitude of all the types availefficacious a accentuation topology is the best breach inveterate on the insist-uponments depictd by the University of Maryland University College (UMUC). We affect a accentuation topology satisfies the insist-uponments of constituteing a singular, consecutive course for facts to be epidemic through each node. A accentuation netcomposition topology in where each node connects to correspondently two other nodes. A node on a netcomposition can be deliberateed a computer, laptop, stereotypeer, or fickle artifice. Each node has a singular netcomposition discourse, which is referred to as the Media Mode Coerce (MAC) discourse. The MAC discourse gets… Etc. (students should live to obvious-up their tender). Justification This minority should be used to absolve your projected breach inveterate on the insist-uponment(s). That is, you are obvious-uping why you projected the breach in the aforementioned member, inveterate on the technical insist-uponment you made self-evident in aforementioned member.  Example (Note: The member that follows is an illustration. It is expected that novices gain use this as a allusion solely. Mind to enclose allusions and summon your composition according to IEEE-style constituteat.) Secure Netcomposition Contractors affects that a accentuation topology is the best breach inveterate on the insist-uponments depictd by the University of Maryland University College (UMUC). Specifically, the insist-uponment that facts flows in one order, reducing the fortune of packet collisions. The accentuation topology narrow the scarcity for netcomposition servers accordingly they are not scarcityed to coerce netcomposition connectivity betwixt each compositionstation. Etc. (students should live to obvious-up their tender). B. Cables and Connectors Note: (Students should deliberate the scarcitys for twain a wired and wireless utensilation as your tender should enclose twain.) Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to cables and connectors. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Cables and Connectors This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions., The maintenance should obvious-up why you chose what you did and how it meets the UMUC’s goals for trailing and donation to novices C. Networking and Internetworking Hardware Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to networking and internetworking hardware. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Networking and Internetworking Devices This minority should be used to get the details of your projected LAN breach, inveterate on the technical insist-uponments and assumptions. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. D. Distant Area Netcomposition (WAN) Design Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the Distant Area Netcomposition (WAN) sketch. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Distant Area Netcomposition (WAN) Design This minority should be used to get the details of your projected ISP breach, Be understanding to shelter what options are availefficacious through leased lines, metro Ethernet, and fond connections are inveterate on the technical insist-uponments and assumptions. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. E. Computer Systems Hardware Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the computer classifications hardware for twain collocateroom end objects and servers as polite as what would be scarcityed for fond IT use. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Computer Systems Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. II. Netcomposition Addressing and Security  A. Subnetting Overview Subnetting is a order of infringement a comprehensive netcomposition into inferior networks notorious as subnets. Subnetting happens when we augment the forfeit expression of the subnet belie. Basically, we hypothecate assemblage bits to constitute networks (i.e., subnets). We enjoy been assigned the netcomposition discourse 192.168.3.0. Inveterate on the chart beneath, we understand this is a Collocate C discourse. This is unshaken by observing the earliest octet of the IP discourse, which is 192. This octet falls in betwixt 192 and 223.    Class Octet Decimal Range   A 1 - 126   B 128 - 191    C 192 - 223 Each collocate has a predefined forfeit subnet belie that tells us the octets, which are already keep-akeep-asever of the netcomposition member, as polite as how multifarious bits we enjoy availefficacious to composition after a conjuncture.    Class Subnet Mask Format   A 255.0.0.0 Network.Host.Host.Host   B 255.255.0.0 Network.Network.Host.Host   C 255.255.255.0 Network.Network.Network.Host CIDR (Classless Inter Domain Routing) CIDR is a slash notation of the subnet belie. CIDR tells us the estimate of on bits in a netcomposition discourse. ● Collocate A has forfeit subnet belie 255.0.0.0. that media earliest octet of the subnet belie has all on bits. In slash notation, it would be written as /8, media discourse has 8 bits on. ● Collocate B has forfeit subnet belie 255.255.0.0. that media earliest two octets of the subnet belie enjoy all on bits. In slash notation, it would be written as /16, media discourse has 16 bits on. ● Collocate C has forfeit subnet belie 255.255.255.0. that media earliest three octets of the subnet belie enjoy all on bits. In slash notation, it would be written as /24, media discourse has 24 bits on. Technical Requirements UMUC has not ruled how they gain use all of the substantial boundlessness among the newly leased structure, but the diagrams beneath bear the projected end recite. However, they enjoy ruled to use some of the boundlessness in the inadequate message. In doing so, we gain returns after a conjuncture the projected artfulness. Initially, the structure gain progeny 5 collocaterooms, 1 novice computer lab, 1 library, and 1 appointment.   · In the beneath structure diagrams, we gain use Appointment 5 (Admissions) on the earliest base.  Each appointment gain enjoy 1 computer for staff use, after a conjuncture the qualification of the admissions appointment, which gain enjoy 5 computers. · The collocaterooms are labeled Classroom #1, Classroom #2, and Classroom #4 on the earliest base and Classroom #1 and Classroom #5 on the prevent base; each collocateroom gain enjoy a closet. Each collocateroom gain enjoy 25 artifices: 23 novice computers, 1 schoolmaster computer, and 1 server in the closet, for instructional use.  · Students should deliberate proud commerce areas for Wi-Fi, such as the sitting areas and not the collocaterooms. The Wi-Fi netcomposition should be segregated from the wired netcomposition and utensiled on a disconnected Collocate C network. What gain the netcomposition discourse, collocate, and unsparingly discourse for this disconnected Collocate C wireless discourse be? · In restoration, there gain be a novice computer lab that gain get computer mode to novices to do their homework. The novice computer lab is located on the prevent base. There gain be 24 computers in this lab and 1 server in the closet.  · To tolerate novices mode to library media, the library gain to-boot enjoy 10 computers for the known common to use and 5 computers for library staff.  · There gain be two server rooms, one on the earliest base and one on the prevent base. To be obvious, the diagram beneath bears the projected end recite. Per the aforementioned details, novices must subnet inveterate on what is scarcityed now. Given the aforementioned scenario, we are going to use the 192.168.3.0 netcomposition and constitute a completion of 8 subnets, after a conjuncture 25 assemblages on each subnet. The chart beneath depicts structures the scenario to enclose each subnet and insist-upond assemblages.    Subnet Description Required Hosts   Classroom 1 (First Floor) 25 Computers   Classroom 2 (First Floor) 25 Computers   Classroom 4 (First Floor)  25 Computers   Classroom 1 (Second Floor) 25 Computers   Classroom 5 (Second Floor) 25 Computers   Office 5 – Admissions (Second Floor) 25 Computers   Student Computer Lab 25 Computers   Library 15 Computers Note: Using the How to Subnet a Netcomposition Video granted in CMIT 265 LEO - Content - UMUC Netcomposition Sketch Proposal, perfect the aftercited chart. Proposed Subnet    Subnet Netcomposition Address Host Discourse Range Broadcast Address   Subnet Mask: 255.255.255. ___   Classroom 1 (First Floor) 192.168.3.0 192.168.3.1 - 192.168.3.30 192.168.3.31   Classroom 2 (First Floor) 192.168.3. _ 192.168.3. _ - 192.168.3. _ 192.168.3. _   Classroom 4 (First Floor) 192.168.3. _ 192.168.3. _ - 192.168.3. _ 192.168.3. _   Classroom 1 (Second Floor) 192.168.3.96 192.168.3.97 - 192.168.3.126 192.168.3.127   Classroom 5 (Second Floor) 192.168.3.128 192.168.3.129 - 192.168.3.158 192.168.3.159   Office 5 – Admissions (Second Floor) 192.168.3. _ 192.168.3. _ - 192.168.3. _ 192.168.3. _   Student Computer Lab 192.168.3. _ 192.168.3. _ - 192.168.3. _ 192.168.3. _   Library 192.168.3. _ 192.168.3. _ - 192.168.3. _ 192.168.3. _   Wi-Fi Network 192.__. __.__ 192._._. _ - 192._._. _ 192._._. _ B. Firewall Implementation Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the firewall utensilation. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Safeguard Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Be understanding to revisal incongruous types of firewalls profitable, what the firewall gain be doing, and the benefits and pullbacks of some intents are. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. C. Interception Conflict Classification / Interception Security System Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the interception conflict classification (IDS) and Interception Prevention Classification (IPS). You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Safeguard Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Depict how IDS and IPS produces and how gain or won’t IDS and or IPS be used in your breach? Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. D. DMZ Implementation Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the DMZ utensilation. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Safeguard Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. What uses would UMUC scarcity for a DMZ? What equipment should be establishd into the DMZ? Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. E. Substantial Safeguard Measures Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the substantial safeguard measures. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Safeguard Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Be skilled, as the collocaterooms and library are known for novices to use. Be understanding to discourse substantial mode of the computers in the collocateroom, mind law 3 of the 10 immutefficacious laws of understandledge safeguard. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. F. Affixed Netcomposition Safeguard Measures Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the restorational safeguard measures. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Safeguard Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. You should deliberate the carbon units utilizing the computers, what restorational measures are scarcityed when communication after a conjuncture nation? Novice should be favoaccentuation when examineing device, trailing, and awareness. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. III. Netcomposition Customization and Optimization A. Netcomposition and Outvie Inveterate Storage Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the netcomposition and outvie inveterate storage. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Computer Systems Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. Is it worthconjuncture to deliberate outsourcing some or all of the collocaterooms? Enjoy all the absorbs been deliberateed? B. Facts Security and Backup Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the facts saveion and backup. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Computer Systems Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Deliberate disturbance re-establishment and options availefficacious for conducting collocatees, but to-boot day to day operations of the appointments. Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. C. Netcomposition Monitoring Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to netcomposition monitoring. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Netcomposition Monitoaccentuation Solutions This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. What monitoaccentuation classifications are availefficacious and of them which would be the most indulgent for the UMUC to utensil? Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. D. Log Storage and Management Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the log storage and skill. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Logging Solution This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. What aggregating and redisconnection breachs are there and which one is best to pick-out from for UMUC? Novice should be favoaccentuation when examineing the intents, types, and absorbs. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions. E. Troubleshooting Methodology Technical Requirements In this minority, you gain assess UMUC’s technical insist-uponments kindred to the troubleshooting mannerology. You gain scarcity to execute assumptions where embezzle. When making assumptions, catalogue each and execute understanding to absolve the breach in the Maintenance minority. Proposed Computer Systems Hardware This minority should be used to get the details of your projected breach, inveterate on the technical insist-uponments and assumptions. Present the self-containedness manner for equipment and how you could ascertain one bad end object or a cefficacious that is bad betwixt collocateroom 1 and the IT server closet. Novice should be favoaccentuation when examineing the manners, ordeal equipment, and effects. Justification This minority should be used to absolve your projected breach inveterate on the technical insist-uponments and assumptions.