New section, Starts on New page. Page numbering starts from 1.
The aims of your report (what you intend to cover) – goals, purpose, background & scope
May have sub sections
1.1 Aim of the report: Aim of the project is to develop a logical and physical network
1.2 Goal: To improve the communication in wireless, VoIP
1.3 Purpose: Increase the scalability, remote access, performance, security, flexibility and availability of system functioning
1.4 Background: uSoft HQ is located in a 6 storey building with proper floor planning. The company has different sections in different floors and also has 2 different branches that is controlled by the HQ itself.
1.5 Scope: Scope of the report is to develop an efficient network planning
This section contains a general description of the organisation, including your assumption about the business activities and future growth.
2.1 uSoft.com is a private biomedical software organization that has its own branches all over the Gold Coast Region. The company’s local area network will be performed with the help of the topology that is initially set. The company has been ever developing and this is the main reason that the projection of redeveloping of the HQ’s existing LAN must be done in order to support the functioning of the project in a better manner.
2.2 The HQ has a total of 6 departments, namely the software development section, solution design is also a sector of the HQ. Customer support, Sales, Finance, Human resources are the departments that are functional in the commencement of the project.
As per business and technical goals, this section describes and organises user requirements (make any assumption needed if you wish about the user groups, location, application, etc.)
May have sub sections such as:
3.1 Mobility Requirements: due to the fact that the uSoft.com has 2 different branches and 1 HQ, mobility is very important. This leads to the fact that the management of the undertaken project will require wireless technology in completion of the tasks
3.2 Security requirements: Implementation of the control access and firewall will be enacting beneficial for the uSoft.com. With the help of these security techniques uSoft.com can perform their functionality in an efficient manner
3.3 Bandwidth requirement: The Ethernet bandwidth must range from 25 Mbps to 1000 Mbps
3.4 Application requirement: the application that will be setup must be having high robustness as per the security cooncern
3.5 Remote access requirement: Remote access requirements are one of the main aspect of uSoft.com. The fact that the functioning of uSoft.com will be performed with the help of the data management from the HQ. This management of the entire data system is performed from a single office.
This section contains all aspect of the proposed solution in details with justification.
Implementation of the Tunneled Connections in the uSoft.com will help in sending data in a private manner over the digital platform. With the help of the VPN service encapsulation, data transaction is performed. This leads to the fact that the data that are transferred do not leak the personal data of the sender. This helps in increasing robustness in the security of the uSoft.com
With the help of proper implementation of the firewall in uSoft.com, the main advantage that is received includes isolation of the computing system. Firewall helps in selection of the ports. This ensures the fact that the management of the project will be better performed. uSoft.com will also gain benefits in this section as the usage of internet will get more secure.
Access control is the technique that decides the permissibility of the data access. Access Control ensures the fact that the risk assessment can be performed in a better manner. This leads to the fact that the data that are stored in the data base of uSoft.com will stay protected and accessing of unauthorized personnel will not be allowed. This security system uses the personification of identity of the personnel who can approach the data, this will help uSoft.com to realise the imposters who are present and function accordingly
With the help of the Antimalware system, the min advantage that will be enjoyed by uSoft.com is that they can stay protected from the viruses that might be present. With the help of the antimalware system, with different branches and several computing system introduction of Malware can harm the functioning of the uSoft.cm. This might affect the processing of beneficially conducting of the business. This is the main reason that the management of the uSoft.com requires better management of the system.
With the help of the implementation of the DMZ, uSoft.com gets benefitted as the DMZ isolates the public server of the organization from the other LAN services. In case unauthorized access to the organization is checked in and the issues that are present are discarded. With the help of DMZ, easy route to the LAN system is closed and this is the main reason that the processing of the entire system is performed with compromised server setting. These are the main reasons that uSoft.com will be benefitted on using the terminology of the DMZ.
4.2 Wireless Networks: this sub-section describes and justifies your proposed solution such as location and no of APs, subnet, security, etc.
The mobility of the networking system is very important in processing of the project. This ensures the fact that the management of the project will be performed with the help of the wireless networking system. As there are 1 HQ and 2 branches of the office. This ensures the fact that the management of the project will get easier. Hence the productivity of uSoft.com will get better. Robustness of the wireless network is also comparatively high and hence this will affect the uSoft.com in a better manner. Even in cases of disasters that might occur, people in different branches and the HQ can communicate with each other. With the help of the usage of the subnet system, the main advantages that are present includes improved speed and network performance. With the help introduction of the subnet by the uSoft.cm, a single broadcast packet is used for sending the data to the each and every device present. With the help of the access point implementation, uSoft.com will be well performing and this is the main reason that the projection of the uSoft.com will be performed in a better manner
4.3 Virtual LANs: this sub-section describes and justifies (benefits) your proposed solution for VLANs including no of VLANS, user groups, routing between inter VLANs, etc.
4.4 In case of using the VLAN service the main advantage that is present includes the fact that the user can gain access to their functioning process. This insists the facts that prosecution of the shift in membership. In case the job role or the job location is changed, the main advantage that will be taken into consideration incudes the fact that the employee can just shift their job location and log into different management portals for continuing their services. uSoft.com with 2 branches and 1 HQ gets benefited from the system. VLAN acts beneficial in progression of the management as per the diversity of the location of the object.
4.5 With the help of the introduction of the user group in uSoft.com, the main advantage that is present in the projection includes the fact that the connectivity in between the different employees of different organization increases and the job that is ti be performed by the employees of different branches in a collaborative manner gets performed in a better manner. With the help of the introduction of the VLAN, the main advantage that might be enjoyed by uSoft.com is that the usage of A Layer 3 switch is not required. This systems also helps in provisioning of better communication.
May have sub sections
5.1 IP Subnetting: The IP address is provided with the subnet mask number that helps in recognizing the host address. Virtually distinguishing the private network in terms of the network administrator is well defined. With the help of the IP subnetting, uSoft.com can prevent broadcasts that are unnecessary in nature. Security options also increase as per the functioning of the uSoft.com
5.2 Static addressing: With the help of the introduction of the static addressing uSoft.com will get benefitted in terms of hosting of the servers that contain data regarding the computing accessories as per the location of the server from a distinct location.
5.3 Dynamic addressing: with the help of the implementation of the dynamic addressing performed by the uSoft.cm, static data address can be saved and the shortage of the static data addresses can be resolved
IP addressing plane for the HQ
Major Network: 172.16.120.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 733
Available IP addresses in allocated subnets: 948
About 94% of available major network address space is used
About 77% of subnetted network address space is used
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Software Development |
207 |
254 |
172.16.120.0 |
/24 |
255.255.255.0 |
172.16.120.1 – 172.16.120.254 |
172.16.120.255 |
Solution Design |
186 |
254 |
172.16.121.0 |
/24 |
255.255.255.0 |
172.16.121.1 – 172.16.121.254 |
172.16.121.255 |
Customer Support |
125 |
126 |
172.16.122.0 |
/25 |
255.255.255.128 |
172.16.122.1 – 172.16.122.126 |
172.16.122.127 |
Sales |
105 |
126 |
172.16.122.128 |
/25 |
255.255.255.128 |
172.16.122.129 – 172.16.122.254 |
172.16.122.255 |
Finance |
65 |
126 |
172.16.123.0 |
/25 |
255.255.255.128 |
172.16.123.1 – 172.16.123.126 |
172.16.123.127 |
Human Resource |
45 |
62 |
172.16.123.128 |
/26 |
255.255.255.192 |
172.16.123.129 – 172.16.123.190 |
172.16.123.191 |
Conclusions
From the above discussion it can be stated that the uSoft.cm has been an expanding business organization. This insists the fact that the management of the project that is under projection can be benefitted as per the management of the data transaction. This ensures the fact that the commencement of the project is done with proper efficiency. With the implementation of the VPN, firewall setting, DMZ. IP Subnetting and VLANs, uSoft.com can be having a higher efficiency in functioning.
List of References
Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76.
Johannisson, B., 2017. Networking and entrepreneurial growth. The Blackwell handbook of entrepreneurship, pp.368-386.
Kuss, D.J. and Griffiths, M.D., 2017. Social networking sites and addiction: Ten lessons learned. International journal of environmental research and public health, 14(3), p.311.
Lecher, W., Platzer, H.W. and Weiner, K.P., 2018. European Works Councils: development, types and networking. Routledge.
Comer, D.E., 2018. The Internet book: everything you need to know about computer networking and how the Internet works. Chapman and Hall/CRC.
Leung, V.C., Yu, F.R. and Zhang, X., 2016. Green communications and networking. CRC Press.
Smed, J. and Hakonen, H., 2017. Algorithms and networking for computer games. John Wiley & Sons.
Arslan, M.Y., Sundaresan, K. and Rangarajan, S., 2015. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Communications Magazine, 53(1), pp.150-156.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download