The main purpose of the project is to develop a network infrastructure for an European software development company. The company have the requirement to resign the network for connecting the new branches with the existing network. The network is designed for the company such the employees can communicate with each other and increase their productivity in the workplace. Different technologies that should beapplied in the network for increasing the efficiency of the organization are discussed in the report.
The scope of the project is to develop a network solution for the organization such that the different branches ca communicate with each other and access the organizational resources. A vpn connection is established between the remote user and the network for allowing the user to connect with the organizational network and access the resources securely.
The main objectives identified for the development of the network solution are listed as follows:
The current network of the organization consists of the branches Dublin, Porto, Aarhus and the network is not disturbed for connecting the new two branches with the network. The Oslo branch network is connected with the main branch Aarhus, Milan and Riga. This increases the availability of the network and reduces the chances of data loss. The cost of implementation of the new branch in the network is also low compared to change in the design of the new solution.
The network is sub netted according to the number of hosts required to be connected with the network. The number of host required to be connected are given and the network should be designed according to the requirement of the organization. The following tables are created according for the preparation of the addressing plan for the LAN, WAN, Router Interface, Server and WLAN subnets as follows:
Major Network: 172.17.0.0/20
Available IP addresses in major network: 4094
Number of IP addresses needed: 1385
Available IP addresses in allocated subnets: 2068
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Aarhus |
650 |
1022 |
172.17.0.0 |
/22 |
255.255.252.0 |
172.17.0.1 – 172.17.3.254 |
172.17.3.255 |
Dublin |
335 |
510 |
172.17.4.0 |
/23 |
255.255.254.0 |
172.17.4.1 – 172.17.5.254 |
172.17.5.255 |
Milan |
100 |
126 |
172.17.7.0 |
/25 |
255.255.255.128 |
172.17.7.1 – 172.17.7.126 |
172.17.7.127 |
Oslo |
200 |
254 |
172.17.6.0 |
/24 |
255.255.255.0 |
172.17.6.1 – 172.17.6.254 |
172.17.6.255 |
Porto |
20 |
30 |
172.17.8.0 |
/27 |
255.255.255.224 |
172.17.8.1 – 172.17.8.30 |
172.17.8.31 |
Riga |
80 |
126 |
172.17.7.128 |
/25 |
255.255.255.128 |
172.17.7.129 – 172.17.7.254 |
172.17.7.255 |
The WAN subnet of the network is tabulated below:
Subnet Name |
Subnet Address |
Subnet Address |
Subnet mask |
First Usable Address |
Broadcast Address |
Aarhus |
172.17.0.0 |
1022 |
/22 |
172.17.0.1 |
172.17.3.255 |
Dublin |
172.17.4.0 |
510 |
/23 |
172.17.4.1 |
172.17.5.255 |
Milan |
172.17.7.0 |
126 |
/25 |
172.17.7.1 |
172.17.7.127 |
Oslo |
172.17.6.0 |
254 |
/24 |
172.17.6.1 |
172.17.6.255 |
Porto |
172.17.8.0 |
30 |
/27 |
172.17.8.1 |
172.17.8.31 |
Riga |
172.17.7.128 |
126 |
/25 |
172.17.7.129 |
172.17.7.255 |
The following table list the IP address used in the different interface of the routers
Subnet Name |
Interface |
IP Address |
Subnet Mask |
Aarhus |
s0/0/1 s0/0/0 s0/2/0 s0/2/1 Fa1/0 Fa1/2 |
31.167.22.44 172.17.0.1 172.17.0.2 172.17.0.3 172.17.0.4 172.17.0.5 |
/30 /22 |
Dublin |
S0/2/0 Fa0/0 |
172.17.4.1 172.17.4.2 |
/23 |
Milan |
S0/0/0 S0/2/0 S0/2/1 Fa1/0 Fa1/1 Fa1/2 Fa1/3 |
172.17.7.1 172.17.7.2 172.17.7.3 172.17.7.4 172.17.7.5 172.17.7.6 172.17.7.7 |
/25 |
Oslo |
S0/0/0 S0/2/0 S0/2/1 Fa0/0 |
172.17.6.1 172.17.6.2 172.17.6.3 172.17.6.4 |
/24 |
Porto |
S0/2/0 Fa0/0 |
172.17.8.1 172.17.8.2 |
/27 |
Riga |
S0/2/0 |
172.17.7.28 |
/25 |
Location |
Server Name |
IP Address |
Subnet Mask |
Aarhus |
WEB Server MAIL Server |
172.17.0.6 172.17.0.7 |
/22 |
Milan |
BACKUP Server1 BACKUP Server2 BACKUP Server3 |
17.17.7.3 172.17.7.4 172.17.7.5 |
/25 |
The OSLO and the Riga network is require to be designed according to the requirement of the organization and a proper hardware plan is created for assigning the number of hosts or workstations in the network solution. The wireless access point is installed in the network for the employees and the unauthorized access of the access point is restricted. A weighted decision matrix is created for the network solution and the feasibility and the efficiency of the solution are compared for deployment of the best network solution within the proposed budget.
Decision Matrix
Decision matrix for the design a network |
|||||||||||
Network Design |
OSLO Network |
Riga Network |
Designing the whole Network |
||||||||
Objective |
Weighting Factor |
Parameter |
Mag. |
Score |
Value |
Mag. |
Score |
Value |
Mag. |
Score |
Value |
Hardware Cost |
0.10 |
$ |
2500 |
8.8 |
0.9 |
2500 |
8.8 |
0.9 |
2200 |
10.0 |
1.0 |
Configuration Cost |
0.20 |
$ |
1500 |
8.0 |
1.6 |
1200 |
10.0 |
2.0 |
2400 |
5.0 |
1.0 |
Installation Time |
0.10 |
hours |
40 |
6.3 |
0.6 |
25 |
10.0 |
1.0 |
50 |
5.0 |
0.5 |
Durability |
0.15 |
experience |
great |
10 |
1.5 |
good |
8 |
1.2 |
good |
8 |
1.2 |
Reliability |
0.30 |
experience |
good |
8 |
2.4 |
great |
10 |
3.0 |
okay |
6 |
1.8 |
Reparability |
0.15 |
experience |
good |
8 |
1.2 |
great |
10 |
1.5 |
fair |
4 |
0.6 |
Overall value |
8.2 |
9.6 |
6.1 |
||||||||
Qualitative Score Assignments: |
|||||||||||
great |
10 |
||||||||||
good |
8 |
||||||||||
okay |
6 |
||||||||||
fair |
4 |
||||||||||
poor |
2 |
Hardware |
||||
Cisco Catalyst 2800 24 Port Layer 3 switch. |
Learning With Technologies |
$ 8,333.00 |
1 |
$ 8,333.00 |
Cisco Catalyst 2800 Router |
Learning With Technologies |
$10,000 |
1 |
$ 10,000.00 |
Lacie 2 TB 10/100/1000 Back-up Device |
Learning With Technologies |
657 |
1 |
$ 657.00 |
Netgear WG302 Managed Wireless Access Point |
Learning With Technologies |
331 |
1 |
$ 331.00 |
Netgear GS108 Switch 8-port |
Learning With Technologies |
159 |
1 |
$ 159.00 |
Cabling |
Store |
n |
$ 5,000.00 |
|
Sub Total |
$ 24,480.00 |
The budget exceeds the expected budget of $10,000 because a backup device is installed in the network and make it redundant. A wireless access point is installed in the network for connecting the wireless devices of the employees and increase their productivity.
The cloud computing solution should beapplied on the current network of the organization for reducing the maintenance cost and increasing the efficiency of the network. The selection of the cloud vendor is important for the success of the network and it is highly scalable. With the implementation of the cloud solution in the network the organization can cut down the electricity bill and also reduce the maintenance cost of the network.
The distributed computing arrangement should beapplied in the network for migrating to the cloud platform. There are different risk for the migration and it should be mitigated before selection of the right solution for the organization. The service level agreement of the cloud vendor should be analyzed for application of the cloud service.
The selection of the cloud vendor is an important factor for the success of the network solution because all the cloud vendor does not support all the services. The services that is to be applied in the network should be applied according to the requirement. The services that should be moved to the cloud platform for increasing the efficiency should be listed and the permission provided to the users are also documented for increasing the security of the network solution.
The security of the files residing in the cloud storage are the main factor for the success of the network solution and proper authentication measures should be applied for the improvement of the security of the network. Segmentation of the cloud storage into different parts like private and public should bean easy solution to store the files in the cloud. Unauthorized access to the data residing should be restricted with the application of different security measures such as:
The application of the cloud service can offer different benefits to the organization by eliminating the maintenance cost of the in house servers. The scalability of the network can also be improved and reduces more service should beadded on demand without the need of modification of the whole network design or installation of new hardware.
There are several risk of lock in to the cloud vendor that is if the cloud vendor increases the charges it would be an issue to move the data to another server. The internet service should be reliable and if the internet is down the whole network would become inaccessible. For the adoption of the cloud service the current framework of the organization should be modified and the complexity of the network increases.
Migrating the database in the cloud server should be partitioned by their affectability. The data that should be from time to time got to by the application and the organization should be migrated for decreasing the store on the area server. The old data should be expert and set away as fortification in the cloud server for getting more space in the adjacent server and store the tricky various leveled data and augmentation the viability of the present framework establishment of the affiliation.
The organization level comprehension of the cloud advantage gave should be destitute down for recognizing verification of the deception of the cloud establishment. The misconfiguration of the cloud framework can realize shortcoming and the assailant can strike the structure for getting the passageway of the database. The framework should be attempted diverse conditions for reducing the threat of outside access and upgrade the execution of the present framework. The APIs used as a piece of the framework should be outlined and misconfiguration should be striven for area of the goofs in the structure. Issues may in like manner rise up out of the customer end in light of the fact that the apparition server and the vagrant storing can extend the threat of access of the database and the delicate data staying in the database of the affiliation.
The cloud platform should beapplied for modification of the current network arrangement and increase the flexibility of the network solution. The data should be used by applications for providing an appropriate outcome and open new possibility for the business.
The reinforcement of information should be put away in the cloud stage after encrypting the database for putting away and utilize it in future.
The information should be moved down in the cloud by utilizing an application or utilizing a cloud include for accomplishing the information in cloud arrangement. The client information and the hierarchical information should be portioned and put away in various tables in the database for get to level administration. The information is went down in the cloud stage for expelling the danger of inadvertent information misfortune and reestablishing the framework to its typical shape if any crisis circumstance emerges.
The information that should be put away in the database and for capacity of the authoritative information the information should be transferred to the cloud server and verification should be connected for availability of the information. The security of the information dwelling on the cloud stage relies upon the correct use of encryption procedures and safety effort took after by the cloud seller for putting away the records.
The information put away in the cloud stage should be recovered whenever in the wake of influencing an effective signing on the cloud to account. The time taken for the recovery of the information relies upon the web availability speed and the measure of information required to be recovered. The information might be put away in groups and it should be recovered from various area for enhancing the execution of the system.
Firewall are installed in the network for securing the network from illegal access. The network can also be controlled from remote location and monitored for illegal attempt made for accessing the resources in the network. The firewall should be configured with the business rules of the origination and appropriate permission should be provided to the different levels of users and the security of the network should be improved. Implementation of network monitoring tools in the network also helps the network administrator to monitor the activity of the network and secure the weak points of the network.
Conclusion
It should be concluded that the cloud computing proposal is provided to the organization for the security of the organizational data is analyzed for the application of the cloud service. The cloud vendor is selected and different service required to be applied should be selected according to the requirement of the organization. The cost of maintenance of the in-house servers are much more than the implementation of the cloud vendors and thus it should be replaced and the efficiency of the organization should be improved.
Dart, E., Rotman, L., Tierney, B., Hester, M., & Zurawski, J. (2014). The science dmz: A network design pattern for data-intensive science. Scientific Programming, 22(2), 173-185.
Eskandarpour, M., Dejax, P., Miemczyk, J., & Péton, O. (2015). Sustainable supply chain network design: an optimization-oriented review. Omega, 54, 11-32.
Garrison, G., Kim, S., & Wakefield, R. L. (2012). Success factors for deploying cloud computing. Communications of the ACM, 55(9), 62-68.
Genge, B., Haller, P., & Kiss, I. (2017). Cyber-security-aware network design of industrial control systems. IEEE Systems Journal, 11(3), 1373-1384.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Kavis, M. J. (2014). Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons.
Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.
Khan, S., Pathan, A. S. K., & Alrajeh, N. A. (Eds.). (2016). Wireless sensor networks: Current status and future trends. CRC Press.
Kumar, S., & Goudar, R. H. (2012). Cloud Computing-Research Issues, Challenges, Architecture, Platforms and Applications: A Survey. International Journal of Future Computer and Communication, 1(4), 356.
Lam, J. S. L., & Dai, J. (2015). Developing supply chain security design of logistics service providers: An analytical network process-quality function deployment approach. International Journal of Physical Distribution & Logistics Management, 45(7), 674-690.
Li, J., Qiu, M., Ming, Z., Quan, G., Qin, X., & Gu, Z. (2012). Online optimization for scheduling preemptable tasks on IaaS cloud systems. Journal of Parallel and Distributed Computing, 72(5), 666-677.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press.
Mauch, V., Kunze, M., & Hillenbrand, M. (2013). High performance cloud computing. Future Generation Computer Systems, 29(6), 1408-1416.
McNiff, J. (2013). Action research: Principles and practice. Routledge.
Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and practice (Vol. 6). London: Pearson.
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013, July). Security and privacy in mobile cloud computing. In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International (pp. 655-659). IEEE.
Tree, S. (2014). Wireless sensor networks. Self, 1(R2), C0.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), 75-86.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download