The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
i have attached an example if needed
Rubric Name: Network Design Proposal Part 2
|
Â
Â
Â
1 Network Design
Proposal
Part 2 Prepared for:
University of Maryland University College Prepared by: 2 II. Network Addresses Design
A. Subnetting
Business Needs
IP addressing and subnetting are extremely important foundations of creating
networks. Subnetting is the process of manipulating large networks into multiple
smaller networks as needed by the business. IP addresses are 32 bits long and made
up of four octets that are eight bits each. Subnetting ultimately saves the university
money by not having to purchase leases for multiple addresses. Subnetting allows
you to create multiple logical networks that exist within a single Class A, B, or C
network. If you do not subnet, you are only able to use one network, which is
impractical [1].
The new UMUC facility will require intricate subnetting techniques to have separate
networks for IT department, students on the first floor, students on the second floor,
faculty/staff, open-public, and open-WIFI. Separating the networks will ensure that
faculty information stays on the faculty network and student information stays on
the student networks with no crossover. The facility will require enough IP
addresses to maintain constant connectivity to the network and the Internet at all
times for all users. This will also separate network traffic by the specific group each
user is in. Therefore, student users will not have an affect on the faculty network or
the WIFI network and so on. This will also aid the network administrators if a
certain network were to have issues. Instead of the entire network going down, only
one subnet would potentially be affected and this will allow a much smaller area to
start troubleshooting in, vice the entire network [2]. Proposed Subnetting (include the calculations)
The new facility’s network will be assigned a Class A network address of
10.113.0.0/16. This address scheme will be used for all hardware devices on the
network and will be split up into six separate subnets based off of need and size of
each subnet. This subnet scheme will also allow for expansion in the future if UMUC
deems it necessary, and also allows for more hardware devices to be added such as
network printers, fax machines, or VoIP phones.
The assigned IP address of 10.113.0.0/16 is only one network and we need a
minimum of six subnets throughout the facility. The process of segmenting a
network into multiple subnets requires proper calculation and explanation. 3
The table below depicts the IP address range, subnet mask used, network address,
and broadcast address for each subnet that is to be used at the new facility.
Network IP Address Range
Start Subnet Mask Network
Address Broadcast
Address End IT 10.113.0.1 10.113.255.25
4 255.255.0.0 10.113.0.0 10.113.255.25
5 Students
(First Floor) 10.114.0.1 10.114.255.25
4 255.255.0.0 10.114.0.0 10.114.255.25
5 Students
(Second
Floor) 10.115.0.1 10.115.255.25
4 255.255.0.0 10.115.0.0 10.115.255.25
5 Public 10.116.0.1 10.116.255.25
4 255.255.0.0 10.116.0.0 10.116.255.25
5 WIFI 10.117.0.1 10.117.255.25
4 255.255.0.0 10.117.0.0 10.117.255.25
5 Faculty/Staff 10.118.0.1 10.118.255.25
4 255.255.0.0 10.118.0.0 10.118.255.25
5 To calculate network and broadcast addresses, the IP address and subnet mask must
first be converted to binary form. For the network address, write out the IP address
and then the subnet mask below that. In this case a subnet mask of 255.255.0.0 was
used. The ones (1) from the subnet mask essentially act as a cut off point from the
rest of the IP address. The value of the bits after the subnet mask cut off point is
translated to decimal form and is the first address on that subnet, or network
address [3].
Calculating the broadcast address essentially works opposite. After writing out the
IP address in binary, the subnet mask is written below it, but inverted. In this case
the inversion of the subnet mask above is 0.0.255.255. In this instance the ones in
the last 16 bits of the IP address activate making it essentially the highest number it
can possibly be because all the bits are ones in the last 16 bit positions. This
becomes your broadcast address and is the last address on that particular subnet
[3].
The example below shows the original IP address of 10.113.0.0 in binary as well as
the subnet mask, 255.255.0.0 and finally the network and broadcast IP address. 4
IP Address:……………00001010.01110001.00000000.00000000 = 10.113.0.0
Subnet Mask:…………11111111.11111111.00000000.00000000 = 255.255.0.0
Network Address:….00001010.01110001.00000000.00000000 = 10.113.0.0
IP Address:……………00001010.01110001.00000000.00000000 = 10.113.0.0
Subnet Inversion:…..00000000.00000000.11111111.11111111 = 0.0.255.255
Broadcast Address:..00001010.01110001.11111111.11111111 = 10.113.255.255
The IT subnet will contain all hardware devices in the networking closets on both
floors. This includes the two main servers, two switches, and the router. The
student network will be split up by floor to help mitigate network traffic because the
students will be the largest group of users on the network with 72 computers on the
first floor and 97 on the second floor. First floor classrooms 1, 2, and 4 will be on the
First Floor Students subnet and second floor classrooms 1, 2, 5, and student
computers in the computer lab will be on the Second Floor Students subnet. Next,
the public network will house the computers in the library that are designated for
public use. This was done so that anyone that walks in to use the library facility will
not have access to any other UMUC network. The WIFI network will be available for
the mobile users anywhere in the building. Finally, the faculty/staff network will
contain all hardware used by UMUC employees and keep them on their own network
so that they are the only ones with access to certain UMUC resources that only they
are privileged to access. Hardware by Subnet
Subnet Computers Servers Switches Routers Total IT 0 2 2 1 5 Students
(First Floor) 72 3 4 0 79 Students
(Second
Floor) 97 4 5 0 106 Public 10 0 2 0 12 22 0 1 0 23 WIFI
Faculty/Staff Justification
These subnets will be created ultimately for the protection of all users on the
network. Dividing the network into these six subnets ensures that only those with
specific approved access are allowed on each network. By having all the faculty and
staff on one subnet allows for easy transmittal of information between them without 5
having to deal with students or mobile users on the same subnet bogging down
transfer speeds [4]. This also prevents students or public users from either
accidentally or maliciously accessing faculty and staff files such as private student
information or class agenda items such as future assignments and tests. Although
everyone deserves to be trusted, it is better to be safe than sorry and remove any
chance of this type of occurrence to happen.
The number of subnets was carefully chosen to be six. Having too many unneeded
subnets can be a nightmare for IT personnel and could cost the university money by
having to hire more staff to administer the network. Not having enough subnets can
result in users obtaining access to data in which they are not authorized to view and
also increase network traffic, thereby lowering speeds. Separating the subnets as
they been allows for all subnets to expand in the future and ensures that all users
that want access to their specific network will never be denied due to a lack of IP
addresses available [5]. 6 Bibliography
[1] M. Yadav, M. Mittal, R. Patel and B. Singh, "Local-Area Based Traffic Splitter for Improving
Performance Using Subnetting", 2010. [Accessed 14-June-2016]
[2] J. Mogul and J. Postel, "Internet Standard Subnetting Procedure", 1985. [Accessed 14June-2016]
[3] M. Blanchet, IP addressing and subnetting, including IPv6. Rockland, MA: Syngress Media,
2000. [Accessed 15-June-2016]
[4] R. Weaver, D. Weaver and D. Farwood, Guide to network defense and countermeasures.
[Accessed 15-June-2016]
[5] P. Ford, Y. Rekhter and H. Braun, "Improving the routing and addressing of IP", IEEE
Network, vol. 7, no. 3, pp. 10-15, 1993. [Accessed 16-June-2016]
-----------