IT Infrastructure for Compname.org.au: Network Solution Proposal
Verified
Added on 2023/06/13
|19
|3051
|347
AI Summary
This report proposes a network solution for Compname.org.au, including a three-layer hierarchical model, cloud-based design, and virtualization using dynamic application scaling. It also includes DHCP and DNS server configuration, network simulation, and recommendations for selecting a cloud service provider.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT INFRASTRUCTURE IT Infrastructure Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 IT INFRASTRUCTURE Table of Contents Introduction......................................................................................................................................3 Required IT infrastructure Components..........................................................................................4 Three layer hierarchical model........................................................................................................4 Introduction..................................................................................................................................4 Current IT infrastructure Requirements.......................................................................................5 Network Geographical Diagram..................................................................................................5 Scaling of the organizational network.........................................................................................6 Service and server required.........................................................................................................6 Logical network model and Justification.....................................................................................7 IP address and mask.....................................................................................................................8 Design proposal based on Cloud.....................................................................................................8 Identification of different cloud service organization.................................................................9 List of service provided by the organization...............................................................................9 Application of virtualization using dynamic application scaling..............................................11 Network Simulation.......................................................................................................................11 Access Layer Diagram...............................................................................................................11 DHCP Configuration.................................................................................................................12 DNS and WEB server configuration.........................................................................................13 Demonstration and Explanation................................................................................................14
2 IT INFRASTRUCTURE Conclusion and Recommendations................................................................................................15 Bibliography..................................................................................................................................16
3 IT INFRASTRUCTURE Introduction The main aims and objectives for preparing the network infrastructure for compname.org.au is listed below: To increase the security of the servers such that the sensitive information residing in the data center and the servers cannot be access by the illegal users. To install firewall at different location of the network for allowing or denying the data packets to reach the destination location. To configure the DHCP servers with the pool of address for allocating IP address to the machines connected with the interface of the router. To configure a main server with SMTP protocol such that the business rules are aligned and the internal communication can be maintained with the employees can send or receive data packets in the network. The objectives for the development of the network diagram are given below: Configure the DHCP and the DNS server according to the requirement for association of the network equipment and enabling communication between them To configure the DNS server with network address translation and using a domain name for accessing the web server To configure the router with access control list for blocking the unknown sources to connect with the internal network of the company. The report is prepared for compname.org.au by proposing two different network solution for the organization aligning the needs of the organization. For the development of the network solution an analysis is made on the IT components required for the development of the network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 IT INFRASTRUCTURE and a local area network is designed for connecting the network devices. A prototype of the network is designed in cisco packet tracer and the network devices are configured for connecting with different branches. A local area network and a cloud based solution is proposed that can be implemented by the company for virtualizing the servers and increase the scalability of the network. The benefits of the development of the in house servers and the cloud based design solution are discussed in the report. There are 2000 hosts located in different areas of the organization and that are needed to be connected with each other for enabling communication in the network. Compname is a software development organization and it has different teams that are located in different floors of a three story building. There is a requirement for the management of the network and secure the network from external users. A wireless access point is needed to be installed in each of the floor such that the employees can connect their smart devices with the network and send and receive data packets. A dmz zone should be created for the installation of the servers and configure it according to the business rules for protecting the core layer of the network. Required IT infrastructure Components The main resources and IT components required for the development of the network solution are: Web Server DNS Server DHCP Server Router Switch
5 IT INFRASTRUCTURE Firewall Three layer hierarchical model Introduction For the development of the network solution a three layer hierarchical model is selected because it increases the reliability of the network. The three layer hierarchical model is developed by dividing each of the layers of the network into core, access and distribution layers and reducing the complexity of the network. The access layer consist of the device that can be used for controlling the workgroup and it consists of the layer 2 switch and the access point that helps in connecting the servers and the workstations connected in the network. The distribution layer is used for analyzing the fastest path that can be used for forwarding the request to the servers connected in the network. The core layer is used for transferring the huge volume of data traffic in the network and it is used for interconnecting the distribution layer and consist of high speed network devices such as switches, routers that are connected using redundant links.
6 IT INFRASTRUCTURE Current IT infrastructure Requirements Network Geographical Diagram The geographical network diagram is created for each of the floor of the building and all the departments and the floors are connected via a concentrator. The concentrator is a network device that is able to efficiently forward the data packets to the designation address. It is used for handling the incoming data packets and redistributing it in the different layers of the network. Serial connection are used for connecting the firewall with the ISP router for carrying larger bandwidth and the frame relay is used for management of the network traffic. A router is used for each of the floor for the management of the data traffic and it is configured with different subnet for reducing the wastage of the IP address.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 IT INFRASTRUCTURE Scaling of the organizational network The use of separate router for each of the floor increases the scalability of the network. The network address plan is created for configuring the routers and the network device interface according to the addressing plan. For increasing the scalability of the network solution the network address is subdivided into different subnets and the routers and the servers are configured with DHCP pool for automatically assign the IP address to the hosts connected with the interface of the router. Service and server required The servers and the service that are required for the development of the current network solution are given below: DHCP service –This is required for creating a DHCP pool and connecting the end device in the network with the IP address. Web and DNS Service –This sis required to host a web page and created different account for the employees to access the resources and the information from the file server.
8 IT INFRASTRUCTURE Logical network model and Justification The design of the network is created for dividing the network into three different layers i.e. core layer, access layer and the distribution layer. In the core layer two routers are used and it is connected using redundant links such that if one of the link fails the data packets can reach the distribution layer using other link. It also reduces the congestion in the network and increases the availability of the device for sending and receiving data packets in the network. In the distribution layer 3 switches are used that helps in creating different vlan for different department and manage the network traffic efficiently. IP address and mask Major Network – 192.168.0.0 /21
9 IT INFRASTRUCTURE Subne t Name Neede d Size Allocate d Size AddressMas k Dec MaskAssignable Range Broadcast First Floor 10001022192.168.0. 0 /22255.255.252. 0 192.168.0.1 - 192.168.3.25 4 192.168.3.25 5 Secon d Floor 500510192.168.4. 0 /23255.255.254. 0 192.168.4.1 - 192.168.5.25 4 192.168.5.25 5 Third Floor 500510192.168.6. 0 /23255.255.254. 0 192.168.6.1 - 192.168.7.25 4 192.168.7.25 5 Design proposal based on Cloud The cloud based solution is proposed based on different strategy and the risk of adoption of the cloud platform should be avoided for the implementation of the cloud service. A multi provider design approach should be used for the identification of the workloads and performance of the cloud service providers and analysis of the workloads on the AWS and the Microsoft Azure. The same workloads can be applied in different cloud providers for mitigation of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 IT INFRASTRUCTURE potential outrage risk and different options should be provided such as development of the application for working with multiple service providers, driving automation and portability and deployment of different application and components for leveraging the micro service approach. Identification of different cloud service organization There are different cloud service organization that can be aligned with the business for differentiationofthecurrentbusinessprocessandgaintheleadingposition.Technical innovations should be applied in the business such that business does not gets disrupted. The implementation of the cloud service technology in the current business process would help the organization to prioritize the cloud strategies. There are different service such as Iaas, SaaS, PaaS that are provided by the cloud vendor and it should be selected for the implementation of the cloud platform. There are different vendor such as AWS, Google, Microsoft Azure, etc. that provides IaaS service in the market and an in depth analysis should be made for the adoption of the cloud service. List of service provided by the organization The following are the list of service that are provided by the cloud service organization such as Storage –the cloud service can be used for adding more storage for management of the files and document in the cloud servers. Computation –The computation power can be increased and with purchasing of extra resource and reducing the needs of purchase of extra hardware for the in house server management. Migration –The commercial platform can be used for migration of the data platform and the proficiency of the system can be increased.
11 IT INFRASTRUCTURE Database –The database is used for recording the data generated due to daily activity and management of the information of the organization. Network Delivery substance –Authorization should be applied at the access level for management of the network elements and ensuring integrity of data. Management instruments –the assets in the organization can be managed for improving the service framework provided by the cloud vendor. Developer Tools –The source codes generated by the software development team can be tested using the developer tools and it can reduce the cost of new application that are required to be purchased and installed in the physical machine of the organization for proceeding with the development of the software. Security –The use of private cloud can increase the security of the sensitive data because the public cloud platform are not secure and can be accessed by external agents causing a risk for the organization. IoT support –It can be used for the management of the unstructured data generated form the IoT devices installed in the network and storing them in separate servers for the management of the database. Mobile Benefits –The mobile applications can be build using the cloud service and the cost of external software and hardware can be eliminated by the application of the cloud technology.
12 IT INFRASTRUCTURE Analytics –It is applied for forecasting the future demands and finding the demands of the users for having better control on the business and administer according to the requirement of the users. Application of virtualization using dynamic application scaling The database and the web servers can be virtualized with the application of vSphere and VmWare for migrating them into another location and management of the disaster recovery. The virtualmachinecanrunindependentlyirrespectiveofthephysicalconfiguration.The virtualization increases the dynamic application scaling and it can be uploaded to the cloud servers for remote management. The redundancy of the network can be increased and serve as a backup for handling the emergency condition. Network Simulation Access Layer Diagram
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16 IT INFRASTRUCTURE For the demonstration of the Web, DHCP and DNS server configuration the Pc0 is used. The IP configuration is set from static to DHCP for getting the IP address from the DHCP server automatically. On getting the message that DHCP request successful it can be said that the configuration of the DHCP server is working and it can serve to allocate IP address to the device connected in the network. For testing the Web server configuration, the web browser is opened from the PC and the URL “www.compname.org.au” is used for connecting with the web server. If the default web page is returned that means that the connectivity and configuration is done properly. Conclusion and Recommendations From the above report it can be concluded that with the development of the network solution different platform are chosen. An analysis is made on the cloud based service and the in house servers for the development of the network solution for compname.org.au. The benefits of the adoption of the cloud platform and the drawbacks are analyzed for the selection of the new technology. The new technology that can be implemented for increasing the reliability of the network and creation of redundant links help in reducing the congestion in the network and increasing the availability of the resources. For the development of the network solution it is recommended that the cloud service vendor should be selected according to the requirement of the organization and the security option provided by the cloud vendor must be analyzed. The selection of the cloud service provider must not cause the organization to lock in and it should be scalable because the network is expected to grow in the following years. The implementation of the cloud platform can reduce the maintenance cost of the network and thus the organization can gain maximum benefits from the network solution.
17 IT INFRASTRUCTURE Bibliography Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). The Network Layer with IP. In Cisco Networks (pp. 49-68). Apress. Dowler, P., Demleitner, M., Taylor, M., & Tody, D. (2013). Data access layer interface, version 1.0. IVOA Recommendation. URL: http://www. ivoa. net/documents/DALI. Hinds, A., Atojoko, A., & Zhu, S. Y. (2013). Evaluation of OSPF and EIGRP routing protocols for ipv6. International Journal of Future Computer and Communication, 2(4), 287. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., ... & Darrell, T. (2014, November). Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM. Jo, J., Jang, H., Lee, K., & Kong, J. (2015). SDN-Based Intrusion Prevention System for Science DMZ. The Journal of Korean Institute of Communications and Information Sciences, 40(6), 1070-1080. Kliazovich, D., Bouvry, P., & Khan, S. U. (2013). DENS: data center energy-efficient network- aware scheduling. Cluster computing, 16(1), 65-75. Kumari, N., Sharma, E. B., & Saini, R. K. (2016). Comparative Study of RIPng and OSPFV3 with IPV6. International Journal, 6(9). Morgan, W., Tam, R., Gerasimova, N., Gastauer, K., Rasgado, S., Einstein, K., ... & Townsend, E. (2016). U.S. Patent Application No. 15/361,769. Mulder, J., & Dekker, R. (2014). Methods for strategic liner shipping network design. European Journal of Operational Research, 235(2), 367-377.
18 IT INFRASTRUCTURE Nanda, S., & Hansen, R. A. (2016, July). Forensics as a Service: Three-tier Architecture for Cloud based Forensic Analysis. In Parallel and Distributed Computing (ISPDC), 2016 15th International Symposium on (pp. 178-183). IEEE. Rohrer, J. P., LaFever, B., & Beverly, R. (2016). Empirical Study of Router IPv6 Interface Address Distributions. IEEE Internet Computing, 20(4), 36-45. Simmons, J. M. (2014). Optical network design and planning. Springer. Sun, Y., & Schonfeld, P. (2015). Stochastic capacity expansion models for airport facilities. Transportation Research Part B: Methodological, 80, 1-18. Wang, G., Gao, Z., Xu, M., & Sun, H. (2014). Joint link-based credit charging and road capacity improvement in continuous network design problem. Transportation Research Part A: Policy and Practice, 67, 1-14. Wu, L., Garg, S. K., & Buyya, R. (2012). SLA-based admission control for a Software-as-a- Service provider in Cloud computing environments.Journal of Computer and System Sciences,78(5), 1280-1299. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.