Take only if u can do. Dont waste any time Network Design Documentation for Trine University’s Indiana Campus

Take only if u can do. Dont waste any time


Network Design Documentation for Trine University’s Indiana Campus

1. Overview

This report gives an exhaustive network plan to Trine University’s Indiana Campus, zeroing in on versatility, security, and proficient information correspondence across different divisions including Engineering, Nursing, IT, Finance, Staffing, and Management.

2. Network Infrastructure

· Core Network Components:

· Internet Service Provider (ISP): Primary source of internet connectivity.

· Core Router: Cisco 4451-X Integrated Services Router, responsible for routing traffic between the ISP and the campus network.

· Firewall: Cisco ASA 5506-X with FirePOWER services, placed between the core router and the internal network for security.

Departmental Network Setup:

· Departmental Core Switch: Central hub for departmental connections, facilitating inter-departmental communication and access to shared resources.

· Departmental Switches: Cisco Catalyst 9300 Series Switches, providing localized network connections within departments.

3. IP Addressing and VLAN Configuration

IP Address Scheme: Designed to segment network traffic and increase security through VLANs.

· Engineering: VLAN 10, 192.168.10.0/24

· Nursing: VLAN 20, 192.168.20.0/24

· IT: VLAN 30, 192.168.30.0/24

· Finance: VLAN 40, 192.168.40.0/24

· Staffing: VLAN 50, 192.168.50.0/24

· Management: VLAN 60, 192.168.60.0/24

· Network Management & Monitoring: VLAN 99, 192.168.99.0/24

VLAN Configuration:

VLANs are designed on the Departmental Core Switch and engendered to Departmental Switches to guarantee traffic disengagement and security.

4. Wireless Network

·
Wireless Access Points (WAPs): Aruba 300 Series Remote APs conveyed across the grounds to give Wi-Fi access, associated with departmental switches.

·
Coverage: Guarantees far reaching inclusion in homerooms, workplaces, and normal regions.

5. Network Security

·
Firewall: Implements policies for traffic filtering, intrusion prevention, and VPN access.

·
Network Security Appliances: Additional security layers with IDS/IPS capabilities for threat detection and prevention.

·
Security Policies: Regular updates and strict access control policies to protect sensitive data.

6. Servers and Applications

· Domain Controllers: For user authentication and domain services.

· File and Application Servers: Hosting department-specific applications, file storage, and shared resources.

· Backup and Recovery Systems: Centralized backup solutions for data redundancy and disaster recovery.

7. VoIP and Communication

IP Telephone 7800 Series for voice correspondence inside the grounds network, coordinated with the center network framework.

8. Implementation Considerations

· Scalability: Infrastructure designed to accommodate future growth in student numbers and technological advancements.

· Redundancy: Critical components like routers and switches include redundancy to ensure network uptime.

· Compliance and Security: Network designed to comply with relevant regulations and standards, with strong security measures in place.

9. Conclusion

This network configuration gives a strong, versatile, and secure foundation customized to meet the different requirements of Ternary College’s Indiana Grounds. By dividing the network through VLANs, carrying serious areas of strength for out measures, and giving complete remote inclusion, the college can guarantee effective and secure information correspondence across all divisions.

image1.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially focusing on executing, monitoring, and controlling projects. This assessment is the first component of your course project.   In this assessment, you will write a topic definition statement for your

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of

  For this discussion, compare and contrast the characteristics of quantitative and qualitative research, addressing the philosophical assumptions of both. Based on your review of the assigned readings, identify and describe what you believe to be meaningful about the qualitative research design and methodology. Define and describe the context in

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their

  this week, explore scholarly literature on critical success factors and project management success. Specifically, focus on complex projects and their success or failures, which may include tools, templates, processes, procedures, and metrics, and their relationship to the five process groups: initiating, planning, executing, monitoring and controlling, and closing. Post

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: ·

IT 226 Project Two Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competencies: · Determine appropriate ways to communicate information to internal and external stakeholders · Apply communication techniques to effectively negotiate and manage conflict Scenario You are the manager of a team of 10 software developers working on a new application for your company, Optimum Way Development, which is based out of Raleigh, North Carolina. Your organization recently acquired a smaller software company based in San Jose, California. You have been informed that your team will be bringing on five people from this newly acquired company; all five people will be moving to Raleigh to join your team. You schedule a phone call with the five new team members and discover that they are upset about the recent impersonal message they received from human resources informing them that they would have to relocate to Raleigh in order to stay employed; no one expressed excitement about joining the team. During this conversation, you also discover that many of the new team members have more education and experience than the people currently on your team. Based on the conversation, you notice that most of these team members are likely older than you, whereas all of the current Raleigh team members are younger than you. After the call, one of your current senior team members approaches you about rumors that are circulating concerning the Raleigh team being required to train the new team members from San Jose. They heard that there are plans to eliminate positions and are concerned the new hires will ultimately be taking their positions. The director who oversees your division has requested that you create and present a recommendation report that documents your plans for managing the conflicts that currently exist or may arise on your team. The director has an advanced degree in a computer science-related field and has worked in technology for over a decade. Directions In order to identify and resolve existing and future conflicts, you have been asked to compose and present your plan for managing conflict for this project. In addition to identifying and resolving the conflicts, you are also responsible for keeping the development of the new application moving forward by continuing to meet scheduled milestones. To do this, you will create a recommendation report and corresponding presentation. The audience for both deliverables is your director. As you create your report and presentation, remember to  use communication techniques and platforms that are appropriate for your audience’s preferences and motivations. Both deliverables should be based on the above scenario and include the following: 1. To start,  explain the major elements of the software application, including background, audience, functions, and features. 2. Next,  explain the areas of conflict for the team. Make sure to include contributing factors and the possible impacts. 3. Articulate the desired outcome of any conflict resolution activities. · How would you like to see this conflict resolved? · What is the “best-case” scenario? 4. Recommend action steps for managing areas of possible conflict with a detailed explanation on how the action steps contribute to conflict resolution. 5. In the presentation only,  use dialogue to communicate the appropriate main ideas to the audience. Although you will not give this presentation over video, you should use the speaker’s notes section in PowerPoint to write the accompanying speech. What to Submit To complete this project, you must submit the following: Recommendation Report Your report should be at least 2 full pages in length (not including a title page), single-spaced and submitted as either a Word document or PDF. Outside resources are not required, but any resources used must be appropriately cited using APA style. You may use the  Recommendation Report Template Word Document for this submission. Presentation Your presentation should be in a presentation format (such as PowerPoint) and  provide an overview of the main ideas from the recommendation report. Using the speaker’s notes section of PowerPoint, include the speech that would accompany the presentation. Outside resources are not required, but any resources used must be appropriately cited using APA style. Supporting Materials The following resource(s) may help support your work on the project: Resource:  Software Design Documents Use one of these software design documents to summarize the application in your report and presentation. Shapiro Library Resource:  Shapiro Library APA Style Guide This Shapiro Library guide goes over the basics of APA-style formatting and citations.

STUDENT COVER SHEET- Student and Trainer/Trainer Details

STUDENT COVER SHEET- Student and Trainer/Trainer Details Student ID Student name Contact number Email address Trainer name Jason Chu Course and Unit Details Course code ICT50118/ICT60115 Course name Diploma/Advanced Diploma of IT Unit code ICTICT608 Unit name Interact with a client on a business level Assessment Title Assessment 1 –