high on Essays logo

Our Services

Get 15% Discount on your First Order

Take only if u can do. Dont waste any time Network Design Documentation for Trine University’s Indiana Campus

Take only if u can do. Dont waste any time


Network Design Documentation for Trine University’s Indiana Campus

1. Overview

This report gives an exhaustive network plan to Trine University’s Indiana Campus, zeroing in on versatility, security, and proficient information correspondence across different divisions including Engineering, Nursing, IT, Finance, Staffing, and Management.

2. Network Infrastructure

· Core Network Components:

· Internet Service Provider (ISP): Primary source of internet connectivity.

· Core Router: Cisco 4451-X Integrated Services Router, responsible for routing traffic between the ISP and the campus network.

· Firewall: Cisco ASA 5506-X with FirePOWER services, placed between the core router and the internal network for security.

Departmental Network Setup:

· Departmental Core Switch: Central hub for departmental connections, facilitating inter-departmental communication and access to shared resources.

· Departmental Switches: Cisco Catalyst 9300 Series Switches, providing localized network connections within departments.

3. IP Addressing and VLAN Configuration

IP Address Scheme: Designed to segment network traffic and increase security through VLANs.

· Engineering: VLAN 10, 192.168.10.0/24

· Nursing: VLAN 20, 192.168.20.0/24

· IT: VLAN 30, 192.168.30.0/24

· Finance: VLAN 40, 192.168.40.0/24

· Staffing: VLAN 50, 192.168.50.0/24

· Management: VLAN 60, 192.168.60.0/24

· Network Management & Monitoring: VLAN 99, 192.168.99.0/24

VLAN Configuration:

VLANs are designed on the Departmental Core Switch and engendered to Departmental Switches to guarantee traffic disengagement and security.

4. Wireless Network

·
Wireless Access Points (WAPs): Aruba 300 Series Remote APs conveyed across the grounds to give Wi-Fi access, associated with departmental switches.

·
Coverage: Guarantees far reaching inclusion in homerooms, workplaces, and normal regions.

5. Network Security

·
Firewall: Implements policies for traffic filtering, intrusion prevention, and VPN access.

·
Network Security Appliances: Additional security layers with IDS/IPS capabilities for threat detection and prevention.

·
Security Policies: Regular updates and strict access control policies to protect sensitive data.

6. Servers and Applications

· Domain Controllers: For user authentication and domain services.

· File and Application Servers: Hosting department-specific applications, file storage, and shared resources.

· Backup and Recovery Systems: Centralized backup solutions for data redundancy and disaster recovery.

7. VoIP and Communication

IP Telephone 7800 Series for voice correspondence inside the grounds network, coordinated with the center network framework.

8. Implementation Considerations

· Scalability: Infrastructure designed to accommodate future growth in student numbers and technological advancements.

· Redundancy: Critical components like routers and switches include redundancy to ensure network uptime.

· Compliance and Security: Network designed to comply with relevant regulations and standards, with strong security measures in place.

9. Conclusion

This network configuration gives a strong, versatile, and secure foundation customized to meet the different requirements of Ternary College’s Indiana Grounds. By dividing the network through VLANs, carrying serious areas of strength for out measures, and giving complete remote inclusion, the college can guarantee effective and secure information correspondence across all divisions.

image1.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit
Reviews

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

When selecting a [commodity trading platform](https://bitdelta.com/en), several key features are crucial to consider to ensure a seamless trading

When selecting a [commodity trading platform](https://bitdelta.com/en), several key features are crucial to consider to ensure a seamless trading experience. Here are some essential factors to evaluate: Security Measures: Prioritize platforms with robust security measures, including encryption protocols, two-factor authentication (2FA), and cold storage options for funds. Ensuring the safety of

Check in attach UU – MBA – 714 Summative Assessment Point 1

Check in attach UU – MBA – 714 Summative Assessment Point 1 1 | P a g e Summative Assessment Point 1 Brief, Guidelines and Marking Criteria For this assignment, you are required to produce a report on one international organization of your choice and address the following: 1. Provide

  There are five general methodological approaches for conducting qualitative research acceptable Ethnography. Case study. Phenomenology. Grounded

  There are five general methodological approaches for conducting qualitative research acceptable Ethnography. Case study. Phenomenology. Grounded theory. Generic qualitative inquiry.   Select two methodological approaches from the five introduced this week. Demonstrate your understanding of this methodological approach by describing each, comparing and contrasting key features, and explaining when

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially

 This week, explore the relationship between strategic goals and alignment with projects and best practices from the five process groups, especially focusing on executing, monitoring, and controlling projects. This assessment is the first component of your course project.   In this assessment, you will write a topic definition statement for your