Network Design Proposal Part I Michael Anderson CMIT 265 Professor Francis Bena!in
Introd"ction A new wing of the UMUC school campus has been created. It will consist of a Classroom Computer Lab, an Admissions office, and a Wi-Fi hotspot for studentstaff use. !ach of these components of the new wing will ha"e a separate networ#, therefore a subnet will ha"e to be established. $here will be a minimum internet connection of %&Mbps with a plan for alternate networ#ing options. 'art one of the proposal will co"er the 'h(sical )etwor# design.
Part I# Ph$sical Network Design Network Topology A *us topolog( +Fig will be used in the new wing. In this topolog(, a there will a main networ# cable that will run through the building and computers or networ#ing de"ices will be branched from this cable. $he networ# for the rest of the Admissions office, office, Computer Lab, and Wi-Fi will will branch from this central networ#ing bus that is con nected to the ser"er located on each floor of the new office. o ffice. $he main wire will be terminated at the furthest opposing end of the ser"er room.
A tar topolog( will be used to connect the computers to the respecti"e switches.
This topology topology has been used before before to create student student lab networks. networks. Here Here is an excerpt of their ndings. Historically, we have accomplished this using a series of hubs and switches to connect many small networks into one large one. When reuired, we unplug the small networks from the switch separating them from the school, the !nternet and"or each other. This process has several inherent drawbacks. This report documents our experiences using #$%N and router technology to congure the network topology of our multi&use computer lab, allowing us to have more control over the network conguration. %dvantages include reduced administration administration and maintenance maintenance costs, allowing the demonstration of router and switch functionality, and allowing students to be exposed to the functionality of di'erent network congurations and euipment ()*. This network network will allow for for a functional functional network for improvement, improvement, training, training, and ease of maintenance. maintenance.
Network +edia )etwor# media is t(pe of cable that an electrical signal passes through. $he new networ# will use fiber optic cables to meet the re/uired internet connection speeds. $here are multiple choices for networ# media such as coa0ial, twisted pair, and fiber optic cables that can be used for establishing this networ#. Cables need connectors which will be used to terminate the connections between networ# de"ices and computer s(stems. !ach cable has properties that ma ( determine its use in different topologies, but for the purpose of the n ew wing, we will determine the best networ# media, connectors, and estimated distances for the la(out. Fiber optic cables are e0pensi"e but the e0pandabilit( of networ# si1e, securit(, and capabilit( is a worthwhile in"estment for the school2s new AdmissionsComputer AdmissionsComputer wing. $hese cables are immune to electromagnetic interference and data interception. *eing that this school is touted as one of the best c(bersecurit( schools in the United tates of America, the functions of the schools networ# should protect and demonstrate its scholastic prowess. Fiber optic cables consist of two fiber strands which carr( data light signals encased multiple stages of material with different purposes +Fig 345. $he first stage is cladding which maintains the data signal in the cable. $he second stage is a protecti"e coat for the fiber optic cladding. $he ne0t stage is a strengthening la(er pro"iding structure to the cable. $he final outer coat is a durable weather protecti"e coating.
roposed network media6ur new networ# will use fiber optic cables +Fig to meet the re/uired internet connection speeds and be prepared for e0pansion 375. UMUC2s networ# will re/uire %&Mbps networ# speed and fiber optic cables cab les are more than enough to facilitate these needs. !thernet cables with 89%: connectors +Fig ; will be used to connect the switch to the computers in the respecti"e rooms.
ig /-
ig 0-
Network 1evices UMUC2s new computer lab re/uires a networ# for a learning and wor#ing en"ironment. $he
re/uire a router, ser"er, and switch as well. 6 ur Wi-Fi networ# will onl( re/uire a ser"er and WiFi router to operate. )etwor# de"ices are hardware that connect computers and other digital e/uipment for interdependent use. $he hardware used for networ#ing includes, but is not limited to, hubs, bridges, switches, and wireless routers. A hub is the central point for dissemination of data within a chosen topolog(. A bridge is the ne0t step in e0pansion where networ# traffic can be b e filtered and ph(sical connection ports can be increased. For more ad"anced functionalit(, a switch will offer the same capabilit( as a bridge and include e"en bandwidth latenc( across ports p orts and customi1able port configuration options. >i"en this fact, we will not be using bridges or hubs in our networ#. A wireless wireless router functions as a hub and an d bridge but pro"ides wireless functions which is unri"aled for fle0ible networ# connection, but re/uires much more strategic planning for a consistent and secure connection. $wo wireless access networ#s will be established, one in the librar( and one in the computer lab on the second floor. !ach computer enabled classroom will ha"e a training ser"er rac#. $hese ser"ers will be connected to the networ#, but will be able to operate independentl( as the bus topolog( can be configured to use the respecti"e classroom switches as a pass-through medium in the case of classroom instruction.
roposed network device$he networ# de"ices needed for the new wing are a wired router, switches, and wireless routers. !nsuring that these de"ices ha"e the a ppropriate securit( utilit( is as paramount as their functionalit(. With With current technolog(, I am able to get a combined fiber optic switch that will be able to disseminate networ# bandwidth across the campus. A Cisco Catal(st W-C;?@&-%$C- %-port switch +Fig 7 will be located on the ser"er rac# in each networ#ed classroom. !ach ser"er room will house a B' 'roLiant *lade er"er +Fig % that will handle the data sharing, cloud computing, and the processing power re/uired to manage the ser"ices re/uired for networ#ing. I chose this ser"er for its modular e0pandabilit( that will adapt to the needs of the new networ#. As for the wireless router being used in the
building, the FortiWifi FortiWifi @& +Fig : will be used for its enterprise enterprise le"el functionalit( and redundant securit( features.
ig 2-
ig 3-
ig 4-
Network 5ecurity 1evices ecurit( de"ices are "er( significant and basic re/uirement of establishing a modern networ#. As a web of data transmissions is established, protection of that same data re/uires monitoring and encr(ption that can be pro"ided at different le"els of networ# de"ices. ecurit(
appliances ha"e been engineered that ha"e the specific purpose of protecting computer networ#s. $hese de"ices are a hub for a m(riad of securit( function such as D') +Dirtual 'ri"ate )etwor#, firewall control, and web filtering.
roposed network security devices A securit( appliance such as the Fortinet FortiWiFi @& can pro"ide an all in one solution for protecting data. As mentioned, functions such as a D'), Firewall, and web filtering can be controlled from a securit( appliance and e"en though these features can be implemented at a software and hardware le"el in "arious stages of the networ#, a securit( appliance pro"ides central fortified functionalit(. A D') allows secure access to the new networ# without being ph(sicall( connected which impro"es remote access for the admissions and I$ staff staff 3@5. A firewall can be implemented from the operating s(stem or switch le"el to restrict access to certain websites and web content and with a redundant firewall in a securit( appliance there is assured real time updates to protect against networ# threats and compromises. A web filter is similar to a firewall, but instead combs accessible website content for unwanted content that ma( not be recogni1ed b( a firewall. oftware such as sp(ware and ad bloc#ers will pro"ide similar features, but our I$ staff will be able to modif( and adapt n ew policies to networ# data rules of access. 6ur securit( appliance will be installed in a ph(sicall( secured networ# closet in the Admissions office to pre"ent unauthori1ed tampering. A hubswitch will be installed here as well and will pro"ide securit( features as well. $he settings and policies on the switch and securit( appliance will be mirrored with the securit( appliance utili1ing functionalit( that can2t be found in other hardware. Access to the networ# closet will onl( be gi"en to I$ staff to ensure concise data securit(.
6omputer 5ystems In this fast growing era, computer s(stems are a basic re/uirement that no organi1ation can wor# without. Almost e"er( business and organi1ation needs a computer s(stem to carr( out their dail( wor# as well as attach with a networ#. Computers allows businesses and organi1ation to function more efficientl( and successfull(. successfull(. Communication is "er( important in business and organi1ations to maintain their customers thus, Computer s(stems are "er( important and a basic
necessit( 35. In order to ma#e a networ# design, the proposed computer s(stems are described below. Li#e other technologies, there are a "arious forms of Computer (stems such as es#tops, ser"ers, tablets, laptops, and smart phones. A ser"er is a computer that distributes wor# and resources to clients across a networ#. es#tops are a personal computer that is a data processing point for users. $ablets, $ablets, laptops, and smartphones smartphones are more mobile "ersions of des#tops, but will not be used for our ou r networ#. es#tops with office-le"el capabilit( will be implemented in the Admissions office. 6ffice-le"el capabilit( is a computer with sufficient processor, graphics, and networ#ing functionalit( to efficientl( perform the tas#s re/uired of the operating s(stem s (stem and Admissions staff. ata can onl( be transferred to and from the Admissions des#tops "ia the cloud for securit( chec#s. ata transfers "ia ph(sical media will not be allowed to maintain a standard for file sharing.
roposed computer systemsCo!ponent
Model Na!e
+onit +onitor or with with 5peak 5peakers ers +ouse ;eyboard +icrotower 6 rinter
u7itsu u7itsu 802T 802T&9 $ogitech 8/:: $ogitech ;0):e H 0): <0 H $aser=et >nterprise +4421N Trust #ecco /34@/ H roliant +icroserver
?58 Hub 5erver
$hese components will be used to create a computer s(stem for the use of the students and staff. 'rinters will be located in the librar( and computer lab. A ser"er will be located on the second floor ser"er room.
Aeferences (/ >. H. 1. Harper and %. .Wherret, Bnetwork topologies for businesses,B in * Nonlinear Optics, vol. 6 , NC, New Cork, %cademic, 0:::. (0 %. . a. <. 8ell, in computer networks , 6ambridge, +!T ress, 0::/. * (2 . W. 8. T. 6. Aouges, B6asual designs,B in Network design , NC. New Cork, Wiley, * /@@), pp. 23&49. (3 >. $. aulkner and 6. 8. 5tegun, B. . 1. >. #ogues and D. +c6arthy, B