ABC is a learning institution that simply provides education to students from the year range of 8 to 12. The school consist of two large story building containing a major classroom of 22 and administrative office. They also have assigned two classes that are dedicated for music and arts, a resource room and an indoor gymnasium containing two full size basketball courts (Blumhardt, & Smith, 2009). The school on the other hand plans to shift their current method of education to and focus on the use of equipment inside the classrooms. All learners basically will have their own iPad and on various subjects they are required to use it such as mathematics and science. ABC learning facility also have a wireless networking system that has been upgraded through the entire campus and simply supports the density in each and every classrooms.
Furthermore there are 2 reason fabricated PC rooms situated in the asset focus that containing 30 present day 5 the age PCs each, and 4 trolleys of 40 remote PCs which can be obtained on a specially appointed reason for classroom utilize (Cole and Rosenbluth, 2011)). The understudies additionally safe house essential access to 6 printers and photocopies situated all through the grounds.
Integration of the new system that is the VoIP solution will help to enhance the communication in the way that people interact in the network. Also learning can make high ends of the technology and use it to its advantage. In this instance the upgrade can improve and facilitate long call time and the connectivity does not interfere with any normal running function of the organization (Sun and Ifeachor, 2014). In the ip phone connectivity it can be able to display the caller id and on all the handset and also be able to provide the user with all the internal phone book for all the users in the network and also not to forget all the external phone calls are directed to the reception whereby all the internal direct call for the management, IT, Finance, Reception, Canteen, Gym and resource center are able to memorandum bank for all the phones and the capability for the for the message to be dispatched to the inbox.
Requirements Required To Setup a VoIP Solution Both Software and Hardware Equipment
There are basic requirement that are to be used while The devices will then need to be configured for proper functioning and communication within the organization, by simply setting the ip address and the subnet mask required for the machines in their specified interface on a dedicated network.
Device |
Quantity |
Price of piece in US dollars ($) |
Total Amount |
Router |
3 |
$700 |
2100 |
Switch |
6 |
$220 |
1320 |
Access Point |
2 |
$650 |
1300 |
Machines (pc) |
13 |
$300 |
36000 |
Laptops |
2 |
$300 |
600 |
Printer |
6 |
$200 |
1000 |
Server |
4 |
$2250 |
9000 |
Cabling |
– |
– |
300 |
IP Phones |
12 |
$130 |
2730 |
Calling Rates |
– |
– |
2600 |
Hosted Phone System |
– |
– |
1500 |
PSTN |
– |
– |
2000 |
Operating System (Win 10 Pro) |
– |
– |
1600 |
TOTAL |
$ 62050 |
In a switched network, Virtual Local Area Network is simply considered as logical segment, is simply consist of several attributes such as the physical LAN. They also partition the devices into categorized and segmented broadcast domains and layer 3 subnets (Dooley, & Brown, 2009)). Devices in a simple and dedicated Vlan can interact without physically routing devices to communicate with each other. They offer efficient use and benefits significantly in terms of bandwidth flexibility, performance and security.
First we need to set up a telnet router
Router>
Router>en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router (config)#line vty 0
Router (config-line) #password pass123
Router (config-line) #login
Router (config-line) #logging synchronous
Router (config-line) #exec-timeout 40
Router (config-line) #enable password password
Router (config) #exit
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router (config) #ip domain-name Teching.com
Router (config) #username Assign Password pass123
Router (config) #crypto key generate rsa
% please define a hostname other than Router.
Router (config) #hostname R1
R1 (config) #crypto key generate rsa
The name for the keys will be: R1.Teching.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% generating 1024 bit RSA keys, keys will be non-exportable… [OK]
R1 (config) #ip Ssh version 2
*Mar 1 0:24:45.524: %SSH-5-ENABLED: SSH 1.99 has been enabled
R1 (config) #ip ssh time-out 50
R1 (config) #ip ssh authentication-retries 4
R1 (config) #
R1 (config) #line vty 0
R1 (config-line) #transport input ssh
R1 (config-line) #login 
R1 (config-line) #logging synchronous
R1 (config-line) #motd-banner
R1 (config-line) #exit
R1 (config) #
As for many companies and organization it is easier to acquire additional Local Exchange Carrier that has creatively features. The following features are include a few of commonly used functions:
The use of continuous Network subnets will ease the use of Route Summarization Link state Routing protocol OSPF will be configured in the network to provide a fast convergence and good scalability (Hares, Chen, Lee, & Manghirmalan,2014). NAT will be implemented to permit access to the DMZ to outside users.
The switch mode made access command is under to change the operation mode of the port from dynamic (Default) to access that ensures the port belongs to and carrier traffic from only one Vlan (Leung, 2012). A port in this mode can also be used to connect end devices only.
The other mode that is trunk can carry traffic from another Vlan’s. Trunk Mode is the one you configure for that port connected to another switch. The dynamic mode allows the port to become an access port when connected to another switch (Zhang, Lundin, and Kleijn, 2008).
“Switch Port Access Vlan [Vlan id]” command binds the port with the Vlan.
Switch (config) #Vlan [number] eg.vlan 2
Switch (config-Vlan) #name [word] e.g.
#name admin
Switch (config) #int range type/start num/end num. e.g.
#int range fa0/1-20 (For multiple ports then)
#int range fa0/1 – single port
Switch (config –if) #switch mode access
Or
Switch (Config- if- range) #switch port mode access;
Then
Switch (Config-if) #Switch port Access Vlan [Vlan-id]
Or
Switch (Config- if- range) #Switch port access Vlan [Vlan-ID]
A Virtual Local Area Network is defined to as a switched segment in a switched network in an attribute such as physical LAN. They also partition the devices into categorized and segmented broadcast domains and layer 3 subnets (Vuong & Singh, 2013). Devices in a simple and dedicated Vlan can interact without physically routing devices to communicate with each other. They offer efficient use and benefits significantly in terms of bandwidth flexibility, performance and security.
Inter Virtual Local Area Network (Vlan) routing is simply supported by the switch that basically runs enhanced multilayer image EMI software. One can ideally restrict the communication between VLAN with use of access lists.
There several steps that needs to be made while configuring the VLAN routing:
The most commonly used is the layers 2 switching where you configure the LAN on the layer 2 switch and one needs to communicate on the needs a layer 3 switch that consist of a router.
This simply show the number of vlan present in the switch and the configuration.
Conclusion
Voice in the PSTN is a pool of different communication technology that have been I constant change of state sine the innovation. The technology required to enable true multimedia conversation on a daily availability. The telephone communication is taking a different stunt and is moving towards new and different models and will soon be able to bear multimedia conversation.
References
Blumhardt, M. S., & Smith, C. A, 2009. U.S. Patent No. 5,629,978. Washington, DC: U.S.
Patent and Trademark Office.
Cole, R. G., & Rosenbluth, J. H, 2011. Voice over IP performance monitoring. ACM SIGCOMM Computer Communication Review, 31(2), 9-24.
Dooley, K., & Brown, I, (2009). Cisco IOS Cookbook: Field-Tested Solutions to Cisco Route Problems. ” O’Reilly Media, Inc.”.
Hares, S., Chen, J., Lee, C., & Manghirmalan, R, (2014). U.S. Patent Application No.11/347,834.
Leung, M. K, 2012. U.S. Patent No. 7,099,332. Washington, DC: U.S. Patent and Trademark Office.
Sun, L. and Ifeachor, E., 2014, June. New models for perceived voice quality prediction and their applications in playout buffer optimization for VoIP networks. In Communications, 2004 IEEE International Conference on (Vol. 3, pp. 1478-1483). IEEE.
Vuong, S., & Singh, K. K, 2013. Voice Over IP Security. Network Security: Current Status and Future Directions, 229-245.
Zhang, G., Lundin, H. and Kleijn, W.B., 2008, August. Band control policy of playout scheduling for voice over IP. In Signal Processing Conference, 2008 16th European (pp. 1-5). IEEE.
<ta
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download