A: Identify network services needed.
Network services overview and requirement:
In the area of computer networks and networking, networking services refer to those applications running at the application layer of the network. In both the OSI model and the TCP/IP model we have the application layer, in both the TCP/IP model and the OSI model. In this application layer, there is the provision of storage of data, alteration or operation on data, production of data, and communication of devices in addition to other capabilities that are realized with different argumentation of the application layer protocols.
The networking services that the University of Maryland University College is likely to require in the set-up of the interconnectivity of the campus includes but not limited to the few listed below; most importantly the World Wide Web (www.), that is an application layer protocol that aids the representation of HTML document that can be retrieved via the HTTP.
The second most vital networking service that ought to be in place is the file sharing service which is a service aids in the distribution of digital content like computer software’s, audio content, images, video content and can be performed via a number of ways that may include retrieval from a centralized computer. This service would be essential since instructors may want to share information with the student and vice versa; by this fact, the need for file sharing service can be justified.
The other important service that requires being present is the voice over IP [VoIP], this service facilitates the communication over the internet. Departments may require communicating it would be easier to give an office call rather than walk in [person to an office to deliver some message.
Another service that needs to be present is the telnet and the SSH, for the administration purposes. These tools are vital as they allow remote controlling of machines as for the administrator thereby eliminating the need to walk right to the location of a machine but he or she can perform any task from the comfort of his chair.
The next necessary service is the email; ideally, the email is a form of communication that aid in exchanging emails electronically between people. The essence of an email, more so a customized email (Maryland Specific email domain like firstname.lastname@example.org) give the recipient and sender more authenticity as there is the association with an institution. Secondly, submission of school work or project ought to be submitted via such customized emails, thirdly it would be easier to disburse or issues notifications to students and staffs as emails are managed centrally and they are unison in domain terms.
On this network there must be a DHCP; a Dynamic Host Configuration Protocol service that will be responsible for allocating IP Addresses dynamically. Given a large number of devices that are to be fitted within the network allocation of the IP addresses can be tedious however the DHCP simplifies the tasks.
The other necessary service that needs to be on the list is the FTP; the file transfer protocol that is a method for exchanging files over the network. This will facilitate the transfer of files between individuals also the file sizes are not an issue to this protocol as it can handle even large files.
The DNS is another important service that must be availed. The domain name server aids in mapping domain names to their corresponding IP addresses like www.umuc.edu can be mapped to [126.96.36.199]
Wireless network sensor services typically these are sets of strategically dispersed sensors that gather information to a centralized location. This service can be used to gather vital data of the surroundings of the campus.
B: Devices and other additional devices to implement the network
To implement a functioning network the following requirements must be in place
a) Ethernet cables.
There will be required adequate cabling to interconnect all the devices that will be on the network. The cables required ought to be efficient and should provide value for money. The suitable cabling is the category 6. The next consideration is the bandwidth capacity that can be moved via these cables with the ideal speed capability being 100Mbps. The length consideration is also vital as the distance between nodes may vary. The coloring on the cable is ideal as it makes works easier when the color scheme for different nodes are used. For Example, for the servers, we use color black, in workstations we use green for ordinary PCs we use red cables.
A bridging hub or the switch on a network is basically a device that is used to interconnect devices together. It applies a technique known as packet switching to process data, receive data and forwarding of data to the prescribed destination node. In the case scenario with 190 devices that ought to be connected, I’d opt for the 50-port Ethernet switch.
Routers are networking gadgets that are used for forwarding packet data between nodes on a computer network. Data packet is ideally moved from one router to another via a network that makes up a path till it hits the destination node.
d) Jack field or Patch bay.
In the bigger setting like the case for University of Maryland University Collage, the cabling usually runs from Ethernet jacks to a patch bay secluded in a separate room. Independently labeled for good usability, the jack field comprise of a solitary Ethernet for each termination. In offering connectivity to the jack field, pass Ethernet cable form a router or a switch to the corresponding jack in the bay; these bays make presentable work, neat, easy to follow and troubleshoot when connection is lost.
This is a class of computers that are designed to handle and process requests and present data to users of another computer. Basically, there is a variety of servers; these servers can be located locally or remotely.
Any computer can be a server ideally although, the usual reference of a server is conceptualized as super large, high powered machine that siphons data to and from the internet, however, this is not the case at all.
Classically speaking “server” is generally the software package that is running on the machine itself, the hardware component part of it per say. Nonetheless, the power of the hardware is immensely required for optimal functioning of the machines as a server as there is the involvement of multitasking and multiprocessing of thousands requests at any given time.
The servers can be categorized into two generally; those that are dedicated whilst others are a single function only. A big, all-purpose networking organization like a University, in this case, will likely deploy a variety of servers, these servers may include:
a) Email servers.
These are the class of servers that will facilitate the sending and receiving of emails from one person or department to the other. These servers utilize the following protocols IMAP[instant messaging Access Protocol], POP/POP3 [Post Office Protocol] for the facilitation of message downloading and lastly the SMTP [Simple mail Transfer Protocol] for the easy message sending via the mail server.
b) FTP server
This type of server facilitates the moving of files through a protocol known as the file transfer protocol tool. These servers can be readily accessed via the client program of the FTP
c) Authorization and Identity Servers.
This class of server is considered as a supportive server on a network. They aid in the area of securing the network, supporting logins and the general authorization of users to a network. In the case scenario of the University, this class of server is indeed a must as there is need to secure the network and clear users. Additionally, they are used to determine the privileges that a user has been granted.
d) Web server
The web servers aid in serving the web pages to a web browser. Ideally, the server a user agent (web browser) connects to access web pages that a web server that delivers those website pages. The web servers are used for storing and delivering readable text and pictures by the machine. The browser, on the other hand, delivers human-readable content to users.
C: Security measures
The security measures that are to be implemented in this case should be all-inclusive. This implies that they should be wide and diverse to incorporate each and every actor that is involved in the network and the environs. The security measures will be as follows:
1. Policy formulation
They could also be the incorporation of bylaws and sub-policies too for the effective implementation of these policies.
2. System and Network Management
As a figure involved in the networking of the University, I would develop and encourage practices that maintain the integrity of the systems and the network in general. This would be attained via formulation of a wide range of security control mechanisms such as access control, correct configurations and regular backups. The issue of encryption would also be a vital and noble thing to enforce on the network.
3. Authenticating and Authorizing of Users
Ever user in need of accessing the internet and other vital resources on the network ought to be thoroughly scrutinized before being granted access to any kind of resource within the network. For those working remotely, they would be required to use a virtual private network (VPN) while accessing the network.
Lastly is that everyone ought to have a strong and secure pass-code that they use to access network resources and the liability of damage or malicious activities or abuse of resource falls on the linked user at the time of damage.
4. Progressive Auditing and monitoring
Applying the wide range of available tools to progressively audit, monitor and inspect all activities and events on the network from time to time. When this practice is applied it would be easier to point out an unusual event or activity on the network or a particular machine.
5. Management of risks
This is by identifying the critical and vital infrastructure on the network and accessing the risks they may face at any point when a successful attack occurs or vulnerability has been exploited successfully. Here I’d do the risk evaluation and be aware of the impact it may have.
6. Users concerns
Most of the time network security measures are implemented and tend to leave out the user and are a vital part of the network. I’d conduct awareness now and then to every class of the network users ranging from the employee, students and staff and enlighten the on matters security. Users are major propagators of malware across machines and network though they are innocent what they indeed lack is the information.
They also ought to be enlightened on patching, updating and backing up of information regularly. Software piracy and their dangers etc.
7. The general Physical Security
In most scenarios theft and burglary are left to the law enforcement agent s, however, the thing of the situation whereby a server has been stolen containing all the university records. In such case, I’d urge proper security to the asset and the environs to mitigate the risk of loss.
D: Network and Cloud-Based Storage
In the university scenario I’d be of the idea that the data and information should be locally stored in servers within the campus. The cloud storage might offer another best alternative and may be used as a means of cost reduction. All that’s needed in this situation is the installation of a file server that would allow central usage of the resources, additionally for all the offices and classes there needs to a file server.
E: Data protection
The process of safeguarding important information from corruption says by virii, malware, ransomware and the rest. I would deploy a strategy that can situate that data can be restored or recovered quickly that by having a regular backup. Using malware scanners like antiviruses and intrusion detectors.
The backing up process refers to a practice by which system data is copied, encrypted and archived that it may be used for restoration in case of perils like deletion or corruption. In this case, the online backing up would be ideal as the only needed task is to configure the servers when to update and they do that automatically. By default, all systems offer the back up option in them I’d utilize this for an offline means.
G: Network Monitoring
In this case, the only required things are tools and knowledge of analyzing network traffic, basically, an open source tool like the Wireshark is excellent for performing this task. This tool has the ability to capture packet, follow a stream of the packet that is needed to monitor and analyze network traffic.
H: Storing of Logs
In the scenario of the storage of the user and event logs is dependent on the value of the logs and the time the management would like to keep them, for instance, those that touch matter finances they ought to be preserved as long as they can as they are critical. The logs storage needs a server to be set up to cater for that and also have a backup plan too.
This basically is the methodology that is applied when failure issues occur in a networked environment or that concerns the usability of systems. There is no a definite path to troubleshooting since at times it may involve trial and error. As an admin, I’d create a help desk so that I may review each and every issue holistically
 L. Dostálek and A. Kabelová, Understanding TCP/IP: a clear and comprehensive guide to TCP/IP protocols. Birmingham: Packt Publ, 2006.
 M. Bickerstaff, L. Davis, C. Thomas, D. Garrett, and C. Nicol, “A 24Mb/s radix-4 logMAP turbo decoder for 3GPP-HSDPA mobile wireless,” in Solid-State Circuits Conference, 2003. Digest of Technical Papers. ISSCC. 2003 IEEE International, 2003, pp. 150–484.
 T. Rooney, IP address management: principles and practice. Hoboken, N.J: IEEE Press/Wiley, 2011.
 K. Lance, Easy IPv6: the lookup book. Chelsea, Vic.: Lancewood Research, 2011.
 C. Easttom, Computer security fundamentals, 2nd ed. Indianapolis, Ind: Pearson, 2012.
 R. Clarke and F. U. C. Tsar, “Network Attack and Defense.” M. Bishop, Introduction to computer security. Boston: Addison-Wesley, 2005.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more