Discuss about the IT Infrastructure Component.
The following are aims for the development of the network framework for CompName.org.Au.
There are different objectives that are identified for the development of the network infrastructure are listed below:
The report is created for CompName.org.Au where two network solutions are proposed according to the needs of the organization. A local area network is designed for connecting the different areas of the building and cisco packet tracer is used for the development of the network solution. For the development of the network the requirement of the organization is analyzed. A cloud solution is proposed for DR management and increasing the flexibility of the network. The benefits for the adoption of the cloud platform is discussed in the report with the details of the configuration of the server and the addressing plan followed for the development of the network.
The organization CompName.org.au has its network connected with 900 hosts located in different floors of its building. It is a software development company and it building has three adjacent floors. The company have the requirement to implement new technologies for the management of the network and increase its security such that the intruders cannot access the core resources such as the DNS, Web and the DHCP servers.
A dedicated server design architecture is applied for developing the network solution and thus a dmz zone is created for the installing the servers and isolate them form the internal users to access them. The creation of the demilitarized zone helps in improvement the security of the network and protect the network from internal risks. A wall mounted rack should be used for the installation of the switch and the router. Proper cooling should be provided to the network devices such that they does not get overheated and their performance level does not drops because overheating can drop the performance and thus causing congestion and loss of data packets in the network. A cisco 5505 ASA firewall should be installed for securing the entry and the exit point of the network and block the unknown request. The integration of the cloud service with the in-house servers can increase the efficiency of the network and reduce the cost of management of the network.
The network proposed for CompName.org.au is divided into three layers such as the core layer, access layer and distribution layer for reducing the effort of management. The core layer consist of the central router and the servers and it acts as the heart of the network because all the data packets in the network are transferred through the core layer. The access layer consists of the switch that acts as the mediator or link between the distribution layer and the core layer of the network. In the distribution layer the hosts are present that connects with the server via the access layer switch.
The current requirement of the organization is to create an in-house database administrative framework such that the employees in the organization can use it to communication and increase their efficiency. The files are required to be stored in the central database and accessed by the other employees working in the organization. A DHCP server is required to be configured following the addressing scheme for allocation of the IP address to the hosts connected in different subnets. A web server should also be configured with the domain name “CompName.org.Au” for accessing the resources.
All the floors of the building are needed to be covered and a similar type of topology is used for connecting all the hosts in different floors of the building. The network device should be connected with serial fiber optics cable for getting larger bandwidth and reducing the congestion in the network. The flow of the data should be monitored for enforcing traffic management and preventing loss of data packets in the network. The branch office located in different geographical location is required to be connected by the implementation of VPN connection and securing the transaction between the remote site and the local site.
The current network is designed such that it can be expanded according to the growth of the organization for the accommodation of the new hosts per subnet. The subnet plan is created with extra address for meeting the future needs. The network solution should accommodate the growth upto five years and thus latest technology are applied for designing the network solution.
The following services and the servers are required for the development of the network solution such as:
DHCP service – use for automatically assigning IP address to the host connected with the network and thus the DHCP server is configured according to the created IP addressing plan.
WEB & DNS Service –Used for hosting a web page or portal used by the employees for management of the information and reach the other users connected in the network.
In the diagram two load balancer are deployed that helps in increasing the adaptability of the system. The logical network diagram is created for “CompName.org.Au” where a load balancer is used for exchanging the loads on the server. There is a requirement to virtualize the servers and in case of increase in the load in the physical server it is transferred to the virtual server for reducing the waiting time of the user. The data are required to pass through the load balancers and it acts as the front end for communication with the clients.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Assignable Range |
Mask |
Dec Mask |
Broadcast |
A |
300 |
510 |
10.10.0.0 |
10.10.0.1 – 10.10.1.254 |
/23 |
255.255.254.0 |
10.10.1.255 |
B |
300 |
510 |
10.10.2.0 |
10.10.2.1 – 10.10.3.254 |
/23 |
255.255.254.0 |
10.10.3.255 |
C |
300 |
510 |
10.10.4.0 |
10.10.4.1 – 10.10.5.254 |
/23 |
255.255.254.0 |
10.10.5.255 |
An analysis is made on the cloud service vendor for the selection of the best service identified that is implemented in the current system for the development of the network infrastructure for compname.org.au. The different service such as SaaS, PaaS and IaaS that should be implemented and integrated with the current server architecture for the development of the network. The security of the network devices and the information should be considered for the development of the network and the application of distributed database can increase the efficiency of the network. The cloud vendor such as Google, Microsoft Azure and AWS are evaluated for the analysis of the service and a vendor is selected improvement of the flexibility of the network. The benefits and disadvantage of the cloud solution are analyzed for the selection of the best possible service and increase the efficiency of the network. The service can be added with the network for extra payment and thus eliminated the needs of extra hardware cost and also reduce the maintenance cost of the network.
The following are the list of service offered by Amazon Web Service:
The web server and the database server needs to be virtualized for handling the emergency conditions. The load balancers are used for dividing the loads on physical server to the virtual servers for increasing the availability of the data and reducing the waiting time of the users. The virtualization of the server helps in increasing the redundancy of the network and can be used for creating backup of the current state of the network.
Figure 2: Access Layer diagram
Figure 3: DHCP server Configuration
Figure 4: DNS and WEB server configuration
Figure 5: Screenshot of successful DHCP request
The above screen shot is given for the demonstration of the configuration used for configuring the Web, DHCP and the DNS server used for the configuration of the network. On the host end the option “DHCP” is required to be selected for requesting the DHCP server for an IP address. On successful DHCP request the web browser should be opened and the URL www.compname.org.au should be used fr accessing the DNS and the WEB server.
Conclusion and Recommendations
From the above report it can be concluded that with the development of the network solution and integrating the current in house solution with the cloud technology the efficiency of the current solution would be improved. The business rules of the organization should be analyzed for configuring the network aligning the needs of the company. A network hierarchy should be maintained for connecting the different floors of the network and enabling the network devices to communicating with each other. The servers should be configured according to the addressing plan and active directory should be configured for the management of the users and allowing access to them for read, update or modify the information residing in the database of the information system.
References
Altenbach, H., Eremeyev, V. A., & Naumenko, K. (2015). On the use of the first order shear deformation plate theory for the analysis of three?layer plates with thin soft core layer. ZAMM?Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und Mechanik, 95(10), 1004-1011.
Dowler, P., Demleitner, M., Taylor, M., & Tody, D. (2013). Data access layer interface, version 1.0. IVOA Recommendation. URL: https://www. ivoa. net/documents/DALI.
Hinds, A., Atojoko, A., & Zhu, S. Y. (2013). Evaluation of OSPF and EIGRP routing protocols for ipv6. International Journal of Future Computer and Communication, 2(4), 287.
Jo, J., Jang, H., Lee, K., & Kong, J. (2015). SDN-Based Intrusion Prevention System for Science DMZ. The Journal of Korean Institute of Communications and Information Sciences, 40(6), 1070-1080.
Kliazovich, D., Bouvry, P., & Khan, S. U. (2013). DENS: data center energy-efficient network-aware scheduling. Cluster computing, 16(1), 65-75.
Morgan, W., Tam, R., Gerasimova, N., Gastauer, K., Rasgado, S., Einstein, K., … & Townsend, E. (2016). U.S. Patent Application No. 15/361,769.
Nanda, S., & Hansen, R. A. (2016, July). Forensics as a Service: Three-tier Architecture for Cloud based Forensic Analysis. In Parallel and Distributed Computing (ISPDC), 2016 15th International Symposium on (pp. 178-183). IEEE.
Rohrer, J. P., LaFever, B., & Beverly, R. (2016). Empirical Study of Router IPv6 Interface Address Distributions. IEEE Internet Computing, 20(4), 36-45.
Wang, G., Gao, Z., Xu, M., & Sun, H. (2014). Joint link-based credit charging and road capacity improvement in continuous network design problem. Transportation Research Part A: Policy and Practice, 67, 1-14.
Wu, L., Garg, S. K., & Buyya, R. (2012). SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences, 78(5), 1280-1299.
Xu, S., Qian, Y., & Hu, R. Q. (2015). On reliability of smart grid neighborhood area networks. IEEE Access, 3, 2352-2365.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download