logo

IT Infrastructure for Desklib: Design and Implementation

   

Added on  2023-06-13

18 Pages2850 Words452 Views
Running head: IT INFRASTRUCTURE
IT Infrastructure
Name of the Student
Name of the University
Author’s Note

1
IT INFRASTRUCTURE
Table of Contents
Introduction......................................................................................................................................3
Discussion of the IT infrastructure Components Required.............................................................4
Three layer hierarchical Model........................................................................................................5
Introduction..................................................................................................................................5
Analysis of the current IT Infrastructure Requirements..............................................................5
Geographical Diagram of the network........................................................................................5
Possibility of scaling of the organization network......................................................................6
Identification of service and servers required..............................................................................6
Logical Network Diagram and Justification................................................................................7
List of IP address and Network Mask for all the network...........................................................7
Cloud Based design proposal...........................................................................................................8
Identification of two cloud service organization.........................................................................8
List of service provided by the organization...............................................................................8
Dynamic Application Scaling using virtualization....................................................................10
Network Simulation.......................................................................................................................10
Access Layer Diagram...............................................................................................................10
DHCP Configuration.................................................................................................................11
DNS and Web Server Configuration.........................................................................................12
Demonstration and Explanation................................................................................................13

2
IT INFRASTRUCTURE
Conclusion and Recommendations................................................................................................14
References......................................................................................................................................15

3
IT INFRASTRUCTURE
Introduction
Aims and Objectives
The following are aims for the development of the network framework for CompName.org.Au.
An analysis should be performed on the current framework of the organization and
identification of the requirement of the project for aligning the business with the network
framework.
An analysis should be made on the number of hosts required to be connected to the
network and the address plan should be created according to it.
There must be scope of expansion of the current network and it should be expanded for
the accommodation of the future growth of the company.
A secure zone must be created for installing the DNS, WEB and DHCP servers for
serving the different needs of the users connected with the network framework.
Proper authorization should be used for connecting with the service and access the
resources of the organization.
There are different objectives that are identified for the development of the network
infrastructure are listed below:
To configure the networking devices according to the network plan and secure it from
illegal access
To isolate the server from the employees for reducing the risk of data steal and malware
injection via USB or other sources.
To use an appropriate domain name for the web server and configure the firewall for
denying the unknown users to access the servers installed in the dmz zone.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Infrastructure for Compname.org.au: Network Solution Proposal
|19
|3051
|347

The Geographical Scope and the Future Needs of the Network | Report
|19
|3373
|209

IT Infrastructure Proposal for Technosavy Limited Company
|20
|4161
|274

(Solved) Assignment on IT Infrastructure | iTech
|17
|3262
|401

SBM4104 IT Infrastructure- Project Report
|20
|3730
|206

Report on Network Proposed for iTech
|17
|3246
|127