Technical Requirements
In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).
Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that students and faculty health, wellbeing, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements). Proposed Topology
Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.
This topology shows five hosts behind a pfSense router and firewall. The pfSense router and firewall is the egress point for the network and also provides a layer of security for the internal hosts
Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Furthermore, you must include a chart comparing and contrasting the different options available to meet the requirement. An example is provided below and should be used as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).
The following business case analysis show the three potential hardware solutions to the requirement provided. The visual presents the ability for the reader to understand the variables considered during the analysis of the three potential hardware solutions.
[The requirements are on the top row. The green in the table shows options that meet requirements, red does not, and blue exceeds requirements. As you can see in the above table, not all requirements can be met. You will need to explain in your Justification why the selection you made gives the school the best available option for the cost. The options that meet or exceed the requirements may cost too much. Your job is to decide what the best option is and present it to management. So, based on the requirements, which phone would you select for meeting those requirements at the least cost?]
Justification
This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.
Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)
Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).
B. Cables and Connectors
Note: (Students should consider the needs for both a wired and wireless implementation as your proposal should include both.)