Network Design and Setup
Added on 2022-11-26
16 Pages3097 Words289 Views
Running head: NETWORK DESIGN AND SETUP
Network Design and Setup
Name of the Student
Name of the University
Author Note
Network Design and Setup
Name of the Student
Name of the University
Author Note
NETWORK DESIGN AND SETUP1
Summary
Network design is an important part of setting up a network as it defines how efficient and
secure the implemented network turns out to be. First the report presents the requirements
summary and then provides the network design before discussing it and identifying the cost
of components involved. Then the report lays down the subnet calculation of the wired
network and later provides details of the wireless network. After that the report talks about
the installation of firewalls and setup of the perimeter network or DMZ and then ends with
observations in concluding notes.
Summary
Network design is an important part of setting up a network as it defines how efficient and
secure the implemented network turns out to be. First the report presents the requirements
summary and then provides the network design before discussing it and identifying the cost
of components involved. Then the report lays down the subnet calculation of the wired
network and later provides details of the wireless network. After that the report talks about
the installation of firewalls and setup of the perimeter network or DMZ and then ends with
observations in concluding notes.
NETWORK DESIGN AND SETUP2
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Summary of Requirements.....................................................................................................3
Network Design.....................................................................................................................4
Subnet calculation..................................................................................................................6
Firewall and DMZ..................................................................................................................8
Conclusion..................................................................................................................................8
References................................................................................................................................10
Table of Contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Summary of Requirements.....................................................................................................3
Network Design.....................................................................................................................4
Subnet calculation..................................................................................................................6
Firewall and DMZ..................................................................................................................8
Conclusion..................................................................................................................................8
References................................................................................................................................10
NETWORK DESIGN AND SETUP3
Introduction
The report highlights the importance of network design in setting up of networks as
they help define how efficient and secure the implemented network can end up being. The
report begins by presenting the requirements summary and then provides the network design
before discussing it and identifying the cost of components involved [7]. Then the report lays
down the subnet calculation of the wired network and later provides details of the wireless
network. After that the report talks about the installation of firewalls and setup of the
perimeter network or DMZ and then ends with observations in concluding notes.
I. Network Design
A. Network Topology
Technical Requirements
The various classrooms, offices, libraries and labs of the university must be served by the
proposed network.
The physical networking topologies used need to be explained with detail.
This network needs to serve university members over a wide area in both the building as well
as the campuses.
The addressing method for the network needs to be detailed.
The internal network of the university needs to be secured using a DMZ or perimeter network
Proposed Topology
Secure Network Contractors is of the opinion that by comparing the various types of
topologies available it is noted that a ring topology is best suited for connecting the individual
devices as per the requirements defined by University of Maryland University College
Introduction
The report highlights the importance of network design in setting up of networks as
they help define how efficient and secure the implemented network can end up being. The
report begins by presenting the requirements summary and then provides the network design
before discussing it and identifying the cost of components involved [7]. Then the report lays
down the subnet calculation of the wired network and later provides details of the wireless
network. After that the report talks about the installation of firewalls and setup of the
perimeter network or DMZ and then ends with observations in concluding notes.
I. Network Design
A. Network Topology
Technical Requirements
The various classrooms, offices, libraries and labs of the university must be served by the
proposed network.
The physical networking topologies used need to be explained with detail.
This network needs to serve university members over a wide area in both the building as well
as the campuses.
The addressing method for the network needs to be detailed.
The internal network of the university needs to be secured using a DMZ or perimeter network
Proposed Topology
Secure Network Contractors is of the opinion that by comparing the various types of
topologies available it is noted that a ring topology is best suited for connecting the individual
devices as per the requirements defined by University of Maryland University College
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Physical Network Designlg...
|7
|2006
|247
AgroXYZ Network & Communications Presentationlg...
|13
|902
|79
Network Infrastructure Designlg...
|10
|1597
|71
DATA COMMUNICATION AND NETWORKS - OVERVIEWlg...
|10
|1877
|18
Network Design Proposal Assignmentlg...
|20
|4908
|79
Network Security and Infrastructure Setup Report 2022lg...
|19
|2423
|25