Network+Plan

Hello, and welcome to my network plan. Please visit the links at the left to access various parts of the plan.

toc Kim Huett MEDT 7XXX Spring 2011

=Network Plan=

Preface
The following network plan is being completed as as assignment in MEDT 7471: Data Networks in the spring of 2011. Most of what follows, therefore, is fiction. However, in order to make my network as real as possible, I am pretending that I am an instructional technologist in a real county school system: Carroll County Schools in West Georgia. It is useful to use the county's Three-Year Technology Plan as the "philosophical basis" for the network.

I would like to add that as I understand it, our professor will not be imposing any budgetary limits on our network expenses. The good thing about not including a budgetary limit is that it allows me to focus on the details of delineating a network plan without having a censorious critic constantly saying "You don't have enough money for this!" In reality, there are budgetary limits, so eventually, one must learn to function and budget with these in mind. For novice network designers, however, I believe it is beneficial to not include this constraint. I would say let me learn the nuts and bolts of making protocols, hardware, and software work together first. With this in mind, I urge you to note that this may be one expensive network.

Finally, I am using two resources to guide my understanding of the way in which a network should be designed and implemented. These are //The School Network Handbook// from ISTE and //Guide to Networking Essentials// from Thomson.

Introduction
In the fall of 2011, Alta Belle Campbell Middle School (ABC) will open its doors to its first group of students, grades 4 and 5. Construction of the physical building site will be finished by May 1, 2011. At that time, the networking specialists will have six weeks to build the school network. Administrators would like to see the network infrastructure in place by June 15.

The school will have the following technology needs:
 * **Category** || **Place** || **Technology by Location** ||
 * //Teaching & Learning// || 20 classrooms || * teacher laptop computer per classroom
 * 1 networked printer in teacher's lounge
 * 5 student computers per classroom
 * 1 smartboard per classroom ||
 * //Teaching & Learning// || 1 Media Center || * 2 desktops for media center personnel
 * 25 desktops for library classes
 * 5 desktops for other visitors
 * 1 smartboard
 * 1 networked printer ||
 * //Teaching & Learning// || 2 computer labs || * 25 computers per lab
 * 1 smartboard per lab ||
 * //Administration// || 5 administrator offices (principals, counselors, etc.) || * 1 desktop per office
 * 1 laptop per office
 * 1 networked printer for office and tech services ||
 * //Administration// || 1 Technology Services office || * 2 desktop computers
 * 1 laptop computer
 * X number of servers, routers, hubs, etc. ||

Network Map
Map in Progress (using a Gliffy network template) Map of School (.pptx)

Acceptable Use Policy
//(original instructions)//

__Faculty and Staff Guidelines__

The school has provided computers for use by staff, offering access to a vast amount of information for use in studies, acting like an enormous extension to the school library and offering great potential to support the curriculum.

The computers are provided and maintained for the benefit of all staff, and you are encouraged to use and enjoy these resources, and help to ensure they remain available to all. Remember that access is a privilege, not a right and inappropriate use will result in that privilege being withdrawn.

__Equipment__ • Always get permission before installing, attempting to install or storing programs of any type on the computers. • Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk, and will cut short your time with the ICT equipment. • Only use the computers for educational purposes. Activities such as buying or selling goods are inappropriate. • Always check files brought in on removable media (such as floppy disks, CDs, flash drives etc.) with antivirus software and only use them if they are found to be clean of viruses. • Always check mobile equipment (e.g. laptops, tablet PCs, PDAs etc.) with antivirus software and ensure they have been found to be clean of viruses before connecting them to the network. • Protect the computers from spillages by eating or drinking well away from the ICT equipment.

__Security and Privacy__ • Protect your work by keeping your password to yourself; never use someone else’s logon name or password. • Always be wary about revealing your home address, telephone number, school name, or picture to people you meet on the Internet. • Other computer users should be respected and should not be harassed, harmed, offended or insulted. • To protect yourself and the systems, you should respect the security on the computers; attempting to bypass or alter the settings may put you or your work at risk. • Computer storage areas and floppy disks will be treated like school lockers. ICT staff may review your files and communications to ensure that you are using the system responsibly.

__Internet__ • You should access the Internet only for school activities. • Only access suitable material; using the Internet to obtain, download, send, print, display or otherwise transmit or gain access to materials which are unlawful, obscene or abusive is not permitted. • Respect the work and ownership rights of people outside the school, as well as other students or staff. This includes abiding by copyright laws. • ‘Chat’ activities take up valuable resources which could be used by others to benefit their studies, and you can never be sure who you are really talking to. For these reasons ‘chat’ rooms should be avoided.

__Email__ • Be polite and appreciate that other users might have different views from your own. The use of strong language, swearing or aggressive behaviour is as anti-social on the Internet as it is on the street. • Only open attachments to emails if they come from someone you already know and trust. Attachments can contain viruses or other programs that could destroy all the files and software on your computer. • If you receive an email containing material of a violent, dangerous, racist, or inappropriate content, always report such messages to a member of ICT staff. The sending or receiving of an email containing content likely to be unsuitable for schools is strictly forbidden.

Please read this document carefully. Only once it has been signed and returned will access to the Internet be permitted. If you violate these provisions, access to the Internet will be denied and you will be subject to disciplinary action. Additional action may be taken by the school in line with existing policy regarding staff behaviour. Where appropriate, police may be involved or other legal action taken.

I have read and understand the above and agree to use the school computer facilities within these guidelines.

(Faculty/Staff Member Signs)

This AUP is from the template for 'staff' found at @http://www.rm.com/Support/GeneralDownload.asp?cref=DWN200100. RM is a UK-based educational company, and I liked the format and wording of this policy more than most US AUPs. The second-person tone makes is more reader-friendly than, say, this AUP from Fayette County Schools: @https://eboard.eboardsolutions.com/ePolicy/policy.aspx?PC=IFBG&Sch=4067&S=4067&RevNo=1.22&C=I&Z=P

Network Hardware and Protocols
Network: The plan describes the hardware and protocols used in the network.

For this week I would like for you to take this point and come up with a description of a network. This can be your schools network or it can be your “perfect network” (just be sure to be realistic). Post this section to the discussion forum then later in the week return and find a classmate’s posting and provide them with constructive feedback that can help them improve their work.

Hardware/Software Standards
Hardware/Software Standards: The plan lays out minimal standards for hardware, operating system, and software.

For this week I would like for you to take this point and come up with a description of a network. This can be your schools network or it can be your “perfect network” (just be sure to be realistic). Post this section to the discussion forum then later in the week return and find a classmate’s posting and provide them with constructive feedback that can help them improve their work.

Hardware/Software Selection
Hardware/Software Selection, Purchase and Installation: Policies and procedures for hardware and software selection, purchase, and installation are covered.

For this week I would like for you to take this point and come up with a hardware/software policy. This can be your schools network or it can be a policy that you find on the internet. Again, if you use another plan be sure to cite your references.

Disposal/Repurposing Policy
This week is a continuation of last week’s discussion in that I would like for you to develop the network section of your plan. As you recall the network section of a network policy is about the following:

Disposal/Repurposing Policy: The plan lays out the policy for computer repurposing and disposal.

For this week I would like for you to take this point and come up with a description of a network. This can be your schools network or it can be your “perfect network” (just be sure to be realistic). Post this section to the discussion forum then later in the week return and find a classmate’s posting and provide them with constructive feedback that can help them improve their wo

Disaster Recovery
This week is a continuation of last week’s discussion in that I would like for you to develop the network section of your plan. As you recall the network section of a network policy is about the following:

Disaster Recovery: The plan includes documentation of policies and procedures such as disaster recovery.

For this week I would like for you to take this point and come up with a disaster recovery plan. This can be your schools network or it can be a disaster recover plan that you find on the internet. Again, if you use another plan be sure to cite your references. Post this section to the discussion forum then later in the week return and find a classmate’s posting and provide them with constructive feedback that can help them improve their work.

Professional Development
This week is a continuation of last week’s discussion in that I would like for you to develop the network section of your plan. As you recall the network section of a network policy is about the following:

Professional Development: Policies and procedures for staff and professional development are included.

For this week I would like for you to take this point and come up with a professional development policy. This can be your school’s or it can be one that you find on the internet. Again, if you use another plan be sure to cite your references. Post this section to the discussion forum then later in the week return and find a classmate’s posting and provide them with constructive feedback that can help them improve their work.

Security & Accessibility
add this? he had said in the original AUP post (see above) that we would need to include this info.