Question

Your Business Case:You are an eager new networking consultant, and a school district has hired you...

Your Business Case:You are an eager new networking consultant, and a school district has hired you for your first consulting job.

Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together.

That district has a grade school, junior high, and high school. The grade school and the junior high are smaller buildings on the same plot of land but they are in separate buildings about 50 yards apart. The high school is newer and larger; it is several miles away on the other side of town.

The school district has thirty teachers, three principals, three administrative assistants, fifteen staff members, and 500 students.

Security is always an issue. The school offers courses in computer science at the high school. The principal is concerned that the students will be tempted to hack into the school management software. The superintendent requests a security plan to help prevent student hackers from accessing the school management software. Also, the superintendent has a vague worry about students accessing pornography on the Internet. The district would like to know if you can configure routers and/or switches to prevent this. Or, is extra equipment or software needed to prevent students from accessing pornography from school computers?

The school superintendent bought some equipment and then realized that no one knew how to make it work. The equipment includes one 2600 series router, two 2500 series routers, and six 1900 series switches.

Your mission: Design a network to connect the three buildings and recommend security features for this network. You will plan your solution step by step, and then present your overall design to your client.

Homework Answers

Answer #1

Network design for educational institutions:

The drivers, key capabilities and requirements of the education environment are evolving beyond the traditional enterprise network. The next generation network architecture for school environments must be built on a technical base that takes into consideration the current economic environment as well as other business factors influencing the education market as a whole. The inital basics of this next generation network must:

  • Permit many services to operate consistently over a common infrastructure.
  • Embeded service acknoeledment, awareness, and differentiation into all components.
  • Support or reenforce different voice, video, and data services while guaranteeing availability, scalability, and security.
  • Adapt to network technical innovations that permit for better flexibility and the implementation of new network services.
  • Combining these new services and technical innovations with existing network equipment, protocols, and methods of communication.

The Service Ready Architecture for Schools is a well designed and verified network architecture that is flexible, adaptive, and cost effective to support a wide range of educational services. This architecture provides the ability to deliver all of the services required of an increased learning environment, as well as the ability to collaborate with other schools, district headquarters, and entities beyond the district.

At the heart of the architecture is a strong routing and switching network. Operating over this network are all the services used within the school district area, such as safety and security systems, voice communications, video conferences, etc. The architecture has been designed around both school operations and technical study.

Design considerations of network:

This architecture uses key technologies that address the safety and security, connected real estate, and multi-service requirements of the modern educational network.

1. High availability: The high availability technologies used in the Service Ready Architecture for Schools allow network equipment to remove the effects of any unplanned link or network failures by understanding the typology of the infrastructure and using that information to immediately re route network traffic without the need to re learn the network. The use of this technology allows complex or critical services such as voice and video communications to remain unaffected by network disconnections.

2. Single fabric multi-service: This technology gives the network administrator the ability to have many different services or networks share the same infrastructure, So far maintain logically separate networks. As multiple services operate over a single architecture, it becomes important to manage traffic based on the service being used. In the education environment this is particularly important as schools problems with allowing student access to the same network used for grading systems, safety and security, and phone conversations.

3. Differentiated services: Certain network services request more from the network than others. For example such as, voice communications do not work if parts of the conversation drop out. Video conferencing is useless if the picture keeps cutting or freezing. Additionally, a teacher's use of the network to enter grades should take priority over a student surfing or searching on the Web. Finally, if there is more traffic demands than the network can handle, the network should be able to decide which traffic is most important. The ability to understand, mark, shape, and limit traffic implanted into the Service Ready Architecture for Schools.

4. Access layer flexibility: Engaging a hybrid access layer design allows the network administrator to influence an existing Layer 2 network while giving them the flexibility to implement a routed access layer. Moving the Layer 2/Layer 3 seperation point to the access switch allows the network administrator to prevent loops without requiring multiple complex Layer 2 technologies, such as spanning tree protocol. Additionally, it provides high availability and eases network troubleshooting and management by authorizing well known Layer-3 troubleshooting tools and technologies.

Sample network design:

Security features:

A good network security system found in schools will analyze other security measures such as anti virus protection, firewalls, encryption, password protection, and the latest upgrades and repairs. All of these permits or grants administrators to better monitor individual devices and authenticate them for use on the network.

1. Userlock: UserLock is a functional suite that provides educational organizations with a protective layer at the forefront of their Windows Active Directory network to help secure access for students, teachers and faculty. It makes the logon itself a surveyed and protected event.

2. Prevent simultaneous sessions and stop password sharing: In spite of the education and increased awareness, students continue to share credentials or sensitive information as there is no consequence on their own access to the network. Serious security defects can be stopped by preventing simultaneous sessions and limiting students to only one possible Windows connection at any one instance. This stops cheat users flawness using valid credentials at the same time as the legitimate owner.

3. Make authorized students accountable for any malicious activity: Preventing concurrent logins also makes legitimate users accountable for any illegitimate action they take whether that might be student pranks or more serious insider attacks. It ensures access to the institutions critical properties attributed to one individual avoiding situations concerning accountability and non repudiation. Policies and procedures can then be consistently drived to address violations that do occur.

4. Control & Restrict Access that support the Institution’s policies: Faculty, staff, and students should be provided differently onto the network so the level of access granted is appropriate for each person’s role inside the academic institution. Furthermore visiting professors, teachers and students should be provided separately to secure their access is discontinued upon their exit.

5. Empower IT with Remote session management: UserLock continuously monitors all login and session events, automatically applying custom policies to prevent or revoke logins, workstation access and usage or connection time.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You are an eager new networking consultant, and a school district has hired you for your...
You are an eager new networking consultant, and a school district has hired you for your first consulting job. Currently, the district has no links between its buildings. School personnel share files by transferring CDs and diskettes between the buildings. The district is putting in new school management software for student and financial records. The software requires that the buildings be networked together. That district has a grade school, junior high, and high school. The grade school and the junior...
4) The Cambridge School District is planning to operate a school lunch program in its new...
4) The Cambridge School District is planning to operate a school lunch program in its new high school, which will be opening this coming fall.  The school superintendent is attempting to prepare a budget (estimate of revenues and expenses) for the program.  The superintendent has developed this preliminary information on the lunch program: Revenues per lunch served:                                     $2.00 Variable costs per lunch served:             Food                                                               $1.18             Miscellaneous supplies                                                 .02                         Total variable cost per lunch                       $1.20 Fixed costs (per year) of lunch program:             Depreciation on kitchen equipment                                                            $ 5,000...
Scenario: Congrats! You've been hired as a networking technologist for OCDSB. Your first order of business...
Scenario: Congrats! You've been hired as a networking technologist for OCDSB. Your first order of business will be to evaluate the current status of OCDSB’s networks. OCDSB has three offices, one in Toronto, which is the corporate headquarters, one in Vancouver, and another in Montreal. You are aware that there are plans to open two additional offices in Ottawa and Quebec City. You have asked Brandyn, the Toronto office LAN administrator, for help in your analysis. However, Brandyn has told...
Clarence Cleaver is the budget director for the Harris County School District. Mr. Cleaver recently sent...
Clarence Cleaver is the budget director for the Harris County School District. Mr. Cleaver recently sent an urgent e-mail message to Sally Simmons, principal of West Harris County High. The message severely reprimanded Ms. Simmons for failing to spend the funds allocated to her to purchase computer equipment. Ms. Simmons responded that her school already has a sufficient supply of computers; indeed, the computer lab is never filled to capacity and usually is less than half filled. Ms. Simmons suggested...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
Case Study: Freeman-Brown Private School (FBPS), based in Illinois, was founded in 1944 by the Brown...
Case Study: Freeman-Brown Private School (FBPS), based in Illinois, was founded in 1944 by the Brown and Freeman families. Over the years, the school acquired a reputation as a leading academic institution with an advanced curriculum. Parents described the school as having a highly performing academic environment that provided a rigorous curriculum while fostering a safe, family-oriented atmosphere in a place where community was valued. Not surprisingly, the student population grew and the school opened multiple campuses in the metropolitan...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...
The ISO 9000 series of quality management systems standard has been widely applied all over the...
The ISO 9000 series of quality management systems standard has been widely applied all over the world since its introduction in 1987. By the end of 2013, ISO 9000 had been adopted by over 1,129,000 facilities in 189 countries. Both academics and practitioners are interested in understanding the relationship between adoption of ISO 9000, and other factors (Christmann & Taylor, 2006; Du, Yin, & Zhang, 2016; Fikru, 2014a, 2014b, 2016; Nakamura, Takahashi, & Vertinsky, 2001; Pekovic, 2010; Wu, Chu, &...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has added extra functionality to the project. There was no impact on the cost or schedule. What should be done as a result of this change? Make sure marketing is aware of the change. Implement change control processes to track the change. Inform the customer. Understand what functionality was added. You are having difficulty getting a project underway. You have not been able to get...
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT