Network Infrastructure for iTech Solutions
VerifiedAdded on 2020/03/16
|23
|4709
|119
AI Summary
This assignment analyzes the challenges faced by iTech regarding its current network infrastructure. It identifies key issues related to reliability, performance, security, and scalability. The analysis concludes with a recommendation for a cloud-based solution to address these challenges, highlighting the benefits of leaving critical aspects such as security, scalability, performance, and reliability to the cloud vendor.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IT Infrastructure 1
IT Infrastructure
Name
Affiliate Institution
IT Infrastructure
Name
Affiliate Institution
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: IT Infrastructure 2
Table of Contents
1 Introduction...................................................................................................................................3
1.1 Aim and Objectives................................................................................................................3
1.2 Company Background............................................................................................................3
2 IT Infrastructure Components.......................................................................................................3
2.1 Hardware Components...........................................................................................................4
2.2 Software Components............................................................................................................5
3 Three-Layers Hierarchal Model...................................................................................................6
3.1 Current iTech IT Infrastructure Analysis...............................................................................7
3.2 Future iTech IT Infrastructure................................................................................................8
3.3 Geographical Scope of the iTech Network............................................................................8
3.4 Scalability of the iTech Network...........................................................................................9
4 Dedicated Server...........................................................................................................................9
4.1 Design Proposal.....................................................................................................................9
4.2 Logical Design.....................................................................................................................11
5 Cloud Based Design...................................................................................................................12
5.1 Amazon Web Services.........................................................................................................13
5.2 Microsoft Azure...................................................................................................................14
6 Network simulation....................................................................................................................15
6.1 Access layer diagram...........................................................................................................15
6.2 DHCP configuration............................................................................................................16
6.3 Configuration of iTech DNS and iTech Web Servers.........................................................17
6.4 Configuration of Dynamic Network....................................................................................19
Conclusion.....................................................................................................................................21
Recommendation...........................................................................................................................21
Bibliography..................................................................................................................................22
Table of Contents
1 Introduction...................................................................................................................................3
1.1 Aim and Objectives................................................................................................................3
1.2 Company Background............................................................................................................3
2 IT Infrastructure Components.......................................................................................................3
2.1 Hardware Components...........................................................................................................4
2.2 Software Components............................................................................................................5
3 Three-Layers Hierarchal Model...................................................................................................6
3.1 Current iTech IT Infrastructure Analysis...............................................................................7
3.2 Future iTech IT Infrastructure................................................................................................8
3.3 Geographical Scope of the iTech Network............................................................................8
3.4 Scalability of the iTech Network...........................................................................................9
4 Dedicated Server...........................................................................................................................9
4.1 Design Proposal.....................................................................................................................9
4.2 Logical Design.....................................................................................................................11
5 Cloud Based Design...................................................................................................................12
5.1 Amazon Web Services.........................................................................................................13
5.2 Microsoft Azure...................................................................................................................14
6 Network simulation....................................................................................................................15
6.1 Access layer diagram...........................................................................................................15
6.2 DHCP configuration............................................................................................................16
6.3 Configuration of iTech DNS and iTech Web Servers.........................................................17
6.4 Configuration of Dynamic Network....................................................................................19
Conclusion.....................................................................................................................................21
Recommendation...........................................................................................................................21
Bibliography..................................................................................................................................22
Running head: IT Infrastructure 3
1 Introduction
Networking is the interconnection of several devices so as to enhance communication and
resource sharing. This enhance ease of communication between stakeholders, businesses,
suppliers, vendors and customers. The report further evaluates the networking requirements that
iTech needs in place in order to implement the new platform, that is, the networking components,
the three-layer hierarchical model, dedicated server design proposal, cloud based design
proposal, network simulation and recommendation.
1.1 Aim and Objectives
Scalability of the network infrastructure to facilitate addition of more equipment.
To facilitate easy management, control, monitoring and troubleshooting of iTech network
infrastructure and also control access of network resources.
To improve the network security for the operation of company’s daily processes without external
interference by third party members including hackers, viruses among other threats.
1.2 Company Background
iTech is a software development company which has over 900 hundred computers distributed
across its three adjacent buildings, 5-story each, each building containing 300 computers. LAN
design is similar in all the three buildings. One building has been dedicated to be the data center
(DCB) on the second floor. DCB offers email and web services to the iTech employees. It also
offers dynamic IP address, file sharing and domain name server (DNS) services.
www.iTech.org.au is the company’s domain name. the company has realized that the current
network environment is poorly designed and thus wants to completely replaced it with a modern
infrastructure either the dedicated server or cloud infrastructure.
1 Introduction
Networking is the interconnection of several devices so as to enhance communication and
resource sharing. This enhance ease of communication between stakeholders, businesses,
suppliers, vendors and customers. The report further evaluates the networking requirements that
iTech needs in place in order to implement the new platform, that is, the networking components,
the three-layer hierarchical model, dedicated server design proposal, cloud based design
proposal, network simulation and recommendation.
1.1 Aim and Objectives
Scalability of the network infrastructure to facilitate addition of more equipment.
To facilitate easy management, control, monitoring and troubleshooting of iTech network
infrastructure and also control access of network resources.
To improve the network security for the operation of company’s daily processes without external
interference by third party members including hackers, viruses among other threats.
1.2 Company Background
iTech is a software development company which has over 900 hundred computers distributed
across its three adjacent buildings, 5-story each, each building containing 300 computers. LAN
design is similar in all the three buildings. One building has been dedicated to be the data center
(DCB) on the second floor. DCB offers email and web services to the iTech employees. It also
offers dynamic IP address, file sharing and domain name server (DNS) services.
www.iTech.org.au is the company’s domain name. the company has realized that the current
network environment is poorly designed and thus wants to completely replaced it with a modern
infrastructure either the dedicated server or cloud infrastructure.
Running head: IT Infrastructure 4
2 IT Infrastructure Components
These are the various devices and equipment that will facilitate deployment and implementation
of the new network infrastructure for iTech. In order to design a good network that will meet the
organization objectives, one needs to clearly define these components required both hardware
and software.1
2.1 Hardware Components
The major network hardware components that itech requires to set up the new infrastructure
include:
Router- this component is used to forward packets by identifying the best route to which the
packet will pass to reach its destination. A routing table is used to determine the routing
information to find the best route to transmit packets.
Switches- this component is used to expand the network as it contains many ports. It is normally
found on layer two of the OSI model. It is regarded as an intelligent hub because it transmits
frames only to the ports taking part in communication. The switch uses the mac address to
determine where the frame is destined.
Network interfaces Controller (NIC)- this device enables the computer to physically be able to
connect to network cables and the capability of interpreting low level network instructions and
information. The NIC has distinct media access control address that is stored on it permanently
and can be used to identify the computer uniquely.
Repeaters- this component is used to boot the network signal by receiving, cleaning and
regenerating it. Re-transmission of the network signal is done at a level of high power so as to
cover longer distance. Repeaters are found on the physical layer of the OSI model. This
component uses small very short time for signal regeneration.
Bridges- this component operates on the data link layer and is used to form a single network by
interconnecting different segments of networks. Bridges, unlike hubs don’t broadcast signals to
all the ports rather it uses mac address to identify the destination port that is to receive the signal
1 Bruce A Hallberg, Networking (McGraw-Hill, 2014).
2 IT Infrastructure Components
These are the various devices and equipment that will facilitate deployment and implementation
of the new network infrastructure for iTech. In order to design a good network that will meet the
organization objectives, one needs to clearly define these components required both hardware
and software.1
2.1 Hardware Components
The major network hardware components that itech requires to set up the new infrastructure
include:
Router- this component is used to forward packets by identifying the best route to which the
packet will pass to reach its destination. A routing table is used to determine the routing
information to find the best route to transmit packets.
Switches- this component is used to expand the network as it contains many ports. It is normally
found on layer two of the OSI model. It is regarded as an intelligent hub because it transmits
frames only to the ports taking part in communication. The switch uses the mac address to
determine where the frame is destined.
Network interfaces Controller (NIC)- this device enables the computer to physically be able to
connect to network cables and the capability of interpreting low level network instructions and
information. The NIC has distinct media access control address that is stored on it permanently
and can be used to identify the computer uniquely.
Repeaters- this component is used to boot the network signal by receiving, cleaning and
regenerating it. Re-transmission of the network signal is done at a level of high power so as to
cover longer distance. Repeaters are found on the physical layer of the OSI model. This
component uses small very short time for signal regeneration.
Bridges- this component operates on the data link layer and is used to form a single network by
interconnecting different segments of networks. Bridges, unlike hubs don’t broadcast signals to
all the ports rather it uses mac address to identify the destination port that is to receive the signal
1 Bruce A Hallberg, Networking (McGraw-Hill, 2014).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: IT Infrastructure 5
Cables and connectors
Cables are components that are used to link to network components. Basically they are special
wires with unique properties. There are several types of cables including the latest fiber cable,
twisted pair cable, coaxial cable and many others. Connectors form the end points where the
cable is terminated. They include components like the RJ45.
Modems- this device is used to facilitate internet connection via telephone lines. A modem is not
attached to the motherboard rather it is a separate entity that can be mounted to the motherboard
using the PCI slots. It is mostly used in dial-up and DSL connections.
iTech requires these components in order to set up and implement the new infrastructure, the
company may not necessarily use all the components mentioned above. Purchase of these
equipment depends on the company requirements, objectives, size of the company and number
of users.
2.2 Software Components
Hardware components cannot make the network usable, it needs some software to control and
manage them. The following are some of the software needed by iTech to install a new
infrastructure.
Local Operating System- this OS is installed on the client computers so as to enable them access
and enjoy the network services and resources like files, share printer among others. Examples
include Windows 2007, 2008, 2010, Linux, UNIX and many more.
Network Operating System- this OS run on servers and computers to enable them communicate
over the network. 2
Firewalls- this software forms the first level defense of the network. Sometimes it is called the
network gate keeper. It contains a set of rules and procedures that the network uses to identify
which traffic to go through and which is to be blocked. These guidelines can be customized to
meet the objectives of the organization. iTech will need this software in order to maintain the
safety of the network components resources and services available all the time
2 Doug Lowe, Networking All-In-One Desk Reference For Dummies (Wiley, 2008).
Cables and connectors
Cables are components that are used to link to network components. Basically they are special
wires with unique properties. There are several types of cables including the latest fiber cable,
twisted pair cable, coaxial cable and many others. Connectors form the end points where the
cable is terminated. They include components like the RJ45.
Modems- this device is used to facilitate internet connection via telephone lines. A modem is not
attached to the motherboard rather it is a separate entity that can be mounted to the motherboard
using the PCI slots. It is mostly used in dial-up and DSL connections.
iTech requires these components in order to set up and implement the new infrastructure, the
company may not necessarily use all the components mentioned above. Purchase of these
equipment depends on the company requirements, objectives, size of the company and number
of users.
2.2 Software Components
Hardware components cannot make the network usable, it needs some software to control and
manage them. The following are some of the software needed by iTech to install a new
infrastructure.
Local Operating System- this OS is installed on the client computers so as to enable them access
and enjoy the network services and resources like files, share printer among others. Examples
include Windows 2007, 2008, 2010, Linux, UNIX and many more.
Network Operating System- this OS run on servers and computers to enable them communicate
over the network. 2
Firewalls- this software forms the first level defense of the network. Sometimes it is called the
network gate keeper. It contains a set of rules and procedures that the network uses to identify
which traffic to go through and which is to be blocked. These guidelines can be customized to
meet the objectives of the organization. iTech will need this software in order to maintain the
safety of the network components resources and services available all the time
2 Doug Lowe, Networking All-In-One Desk Reference For Dummies (Wiley, 2008).
Running head: IT Infrastructure 6
3 Three-Layers Hierarchal Model
Network are complex entities which contains many protocols, ad different technologies. To
design a reliable network a 3 layered hierarchical model was developed. This model aids in
designing, implementing, monitoring, controlling and troubleshooting a network. Each layer has
specific characteristics and functionality, thus reducing the complexity of the network.
These layers are Core, distribution and access layers which can be represented diagrammatically
as shown below.
Figure 1: Three-Layers Hierarchal Model
Access Layer
3 Three-Layers Hierarchal Model
Network are complex entities which contains many protocols, ad different technologies. To
design a reliable network a 3 layered hierarchical model was developed. This model aids in
designing, implementing, monitoring, controlling and troubleshooting a network. Each layer has
specific characteristics and functionality, thus reducing the complexity of the network.
These layers are Core, distribution and access layers which can be represented diagrammatically
as shown below.
Figure 1: Three-Layers Hierarchal Model
Access Layer
Running head: IT Infrastructure 7
This layer is basically made of the end users, or workstations that accesses the network
resources. This layer utilizes access points and layer two switches to access the network and acts
as a link between the servers and workstations.3
Distribution Layer
This layer links the access and core layers and facilitate their communication. The major
function of this layer is to offer WAN access, filtering and routing information to identify the
way packets can access the core. Distribution layer is used to identify the quickest way to access
the accessed network resources. Basically this layer is made up of multilayer switches and
routers.
The Core Layer
This layer is commonly referred to as the backbone of the network. This layer comprises of high
speed components like switches that have redundant links and high end routers. It also
interconnects distribution layer components and is capable of transmitting vast amount of traffic
very fast.4
3.1 Current iTech IT Infrastructure Analysis
The current iTech network infrastructure suffers from the limitations efficiency, scalability,
security, performance and management. This is attributed to the fact that all iTech LANs operate
on the same level. This means that all the computers and other components ate iTech have
similar properties and characteristics. This makes management of such components difficult tus
resulting to vulnerability on terms of security, evaluation and monitoring. The current
infrastructure has limited scope in terms of scalability meaning that in case iTech expands then
there are high chances the devices won’t fit in to the current setup. In case of a failure, this
design offers limited troubleshooting, that is, it is very difficult to identify where the problem is
and its source. Also security of the current infrastructure is very vulb=nerable since they share a
common backbone, the data center.
3 Bruce A Hallberg, Networking (McGraw-Hill, 2014).
4 Frances Kay, Successful Networking : How To Build New Networks For Career And Company Progression(2010).
This layer is basically made of the end users, or workstations that accesses the network
resources. This layer utilizes access points and layer two switches to access the network and acts
as a link between the servers and workstations.3
Distribution Layer
This layer links the access and core layers and facilitate their communication. The major
function of this layer is to offer WAN access, filtering and routing information to identify the
way packets can access the core. Distribution layer is used to identify the quickest way to access
the accessed network resources. Basically this layer is made up of multilayer switches and
routers.
The Core Layer
This layer is commonly referred to as the backbone of the network. This layer comprises of high
speed components like switches that have redundant links and high end routers. It also
interconnects distribution layer components and is capable of transmitting vast amount of traffic
very fast.4
3.1 Current iTech IT Infrastructure Analysis
The current iTech network infrastructure suffers from the limitations efficiency, scalability,
security, performance and management. This is attributed to the fact that all iTech LANs operate
on the same level. This means that all the computers and other components ate iTech have
similar properties and characteristics. This makes management of such components difficult tus
resulting to vulnerability on terms of security, evaluation and monitoring. The current
infrastructure has limited scope in terms of scalability meaning that in case iTech expands then
there are high chances the devices won’t fit in to the current setup. In case of a failure, this
design offers limited troubleshooting, that is, it is very difficult to identify where the problem is
and its source. Also security of the current infrastructure is very vulb=nerable since they share a
common backbone, the data center.
3 Bruce A Hallberg, Networking (McGraw-Hill, 2014).
4 Frances Kay, Successful Networking : How To Build New Networks For Career And Company Progression(2010).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Running head: IT Infrastructure 8
3.2 Future iTech IT Infrastructure
This reports focuses mainly on the future iTech infrastructure. There is clear definite of the
company’s objectives and network requirements, they include aspects such as security,
scalability, performance, reliability, availability and functionality. The design will be
differentiated in to different segments each with specific function for the case of the dedicated
server. The future design will be easy to manage as it is based on the three hierarchical model.
The infrastructure is expected to support the current technologies and adapt to changes, also in
case the company expands it will give room for adding more device without interfering with the
network structure. Troubleshooting the network will be such a simple and easy task as compare
to the current infrastructure.
3.3 Geographical Scope of the iTech Network.
The most essential method of grouping and categorizing network is basing on geographical
scope. This means that network can be categorized depending on the coverage area. iTech can
implement either of the three categories LAN, WAN or MAN technology.
Local Area Network (LAN)
iTech can implement this technology on every building. It is recommended to use this when you
are connecting devices within one building. This type of network facilitates interconnection of
printers and computers within a limited geographical area. These component can be connected
either wirelessly or using cables such as Ethernet. Recently Ethernet the used widely technology.
LAN will facilitate iTech to interconnect its components that can be used within a building such
as a shared printer, scanner among others. It is important to note that LAN work best at the
Access layer.5
Metropolitan Area Network
This type of network is mostly implemented in a city or town. It is bigger than LAN and have
more sophisticated technology. This type of network can be useful for iTech to interconnect the
5 Misty Vermaat, Discovering Computers 2017 (Cengage Learning, 2017).
3.2 Future iTech IT Infrastructure
This reports focuses mainly on the future iTech infrastructure. There is clear definite of the
company’s objectives and network requirements, they include aspects such as security,
scalability, performance, reliability, availability and functionality. The design will be
differentiated in to different segments each with specific function for the case of the dedicated
server. The future design will be easy to manage as it is based on the three hierarchical model.
The infrastructure is expected to support the current technologies and adapt to changes, also in
case the company expands it will give room for adding more device without interfering with the
network structure. Troubleshooting the network will be such a simple and easy task as compare
to the current infrastructure.
3.3 Geographical Scope of the iTech Network.
The most essential method of grouping and categorizing network is basing on geographical
scope. This means that network can be categorized depending on the coverage area. iTech can
implement either of the three categories LAN, WAN or MAN technology.
Local Area Network (LAN)
iTech can implement this technology on every building. It is recommended to use this when you
are connecting devices within one building. This type of network facilitates interconnection of
printers and computers within a limited geographical area. These component can be connected
either wirelessly or using cables such as Ethernet. Recently Ethernet the used widely technology.
LAN will facilitate iTech to interconnect its components that can be used within a building such
as a shared printer, scanner among others. It is important to note that LAN work best at the
Access layer.5
Metropolitan Area Network
This type of network is mostly implemented in a city or town. It is bigger than LAN and have
more sophisticated technology. This type of network can be useful for iTech to interconnect the
5 Misty Vermaat, Discovering Computers 2017 (Cengage Learning, 2017).
Running head: IT Infrastructure 9
different buildings within the city. This technology will facilitate sharing of important resources
such as data and information.
Wide Area Network
iTech is anticipating growth and this technology can be very useful it covers a large geographical
area and is comprised of smaller networks such as MAN and LAN. The most common type of
WAN is internet.
3.4 Scalability of the iTech Network
Scalability of a network refers to the ability of a network to expand and accommodate the rate of
growth without affecting the current infrastructural design. For iTech this means that it would be
ready for any device addition to the network in case the company grows and therefore, requiring
more users and workstations. In the current world and available technologies, the company can
build and infrastructure that precisely meets it objective, that is, it would comprise of the enough
storage, precise amount of computing components and capabilities of the network. Cloud
solutions are normally the best infrastructure to support scalability easily without the company
incurring any cost of adjusting the network design. For iTech to create an ideal network
infrastructure, it needs enough resources, budget and manpower which many companies don’t.
for iTech to grown, it needs to be prepare enough to meet the needs of expansion in order to be
successful. If this doesn’t happen then the company is destined to fall. It is important for the
company to get prepared to expand or growth will bring them down, as it is said failing to plan is
planning to fail, that simple. Scalability allows the company host to upgrade its capacity to meet
the need of the increasing traffic daily. In essence, scalability allows iTech to meet the secifi
company objectives as they arise each time. This is a very important factor for any business to
succeed.6
4 Dedicated Server
4.1 Design Proposal
6 Manish Agrawal, Business Data Communications (Wiley, 2011).
different buildings within the city. This technology will facilitate sharing of important resources
such as data and information.
Wide Area Network
iTech is anticipating growth and this technology can be very useful it covers a large geographical
area and is comprised of smaller networks such as MAN and LAN. The most common type of
WAN is internet.
3.4 Scalability of the iTech Network
Scalability of a network refers to the ability of a network to expand and accommodate the rate of
growth without affecting the current infrastructural design. For iTech this means that it would be
ready for any device addition to the network in case the company grows and therefore, requiring
more users and workstations. In the current world and available technologies, the company can
build and infrastructure that precisely meets it objective, that is, it would comprise of the enough
storage, precise amount of computing components and capabilities of the network. Cloud
solutions are normally the best infrastructure to support scalability easily without the company
incurring any cost of adjusting the network design. For iTech to create an ideal network
infrastructure, it needs enough resources, budget and manpower which many companies don’t.
for iTech to grown, it needs to be prepare enough to meet the needs of expansion in order to be
successful. If this doesn’t happen then the company is destined to fall. It is important for the
company to get prepared to expand or growth will bring them down, as it is said failing to plan is
planning to fail, that simple. Scalability allows the company host to upgrade its capacity to meet
the need of the increasing traffic daily. In essence, scalability allows iTech to meet the secifi
company objectives as they arise each time. This is a very important factor for any business to
succeed.6
4 Dedicated Server
4.1 Design Proposal
6 Manish Agrawal, Business Data Communications (Wiley, 2011).
Running head: IT Infrastructure 10
A dedicated server is that computer that is specifically set up and configured to meet users’
specific needs on a network. If iTech should opt for a dedicated server type of network, it must
monitor the way server is utilized over the network and how it processes users’ requests.7 Some f
the dedicated servers in a network include:
Web Server
This server processes users request using the http protocol. If a user requests a web page this
server will be the one to process this request and displays that specific webpage. Hosting of the
domain name of iTech, that is , www.iTech.org.au will be done on a dedicated server in the
DCB.8
File Server
This server will be used by iTech to monitor and process file requests by users.
Dynamic Host Configuration Protocol (DHCP) Server
iTech uses DHCP server to automatically assign IP addresses to the components connected to the
network.
Mail Server
This server is used by iTech to manage user emails and stores all mails that users use to
communicate with one another. This server is solely for managing email communication.
Domain Name Server (DNS Server)
This server is used to manage user IP addresses and is offered by the interet service provider
(ISP). This server uses IP addresses to locate feedback from the web server when it is processing
users’ requests.9
7 Todd Lammle, CCNA Cisco Certified Network Associate Deluxe Study Guide (John Wiley & Sons, 2011).
8 Samee U Khan, Albert Y Zomaya and Assad Abbas, Handbook Of Large-Scale Distributed Computing In Smart
Healthcare (Springer, 2017).
9 Kyi Thar, Saeed Ullah and Choong Seon Hong, "Consistent Hashing Based Cooperative Caching And Forwarding In Content Centric
Network" [2014] The 16th Asia-Pacific Network Operations and Management Symposium.
A dedicated server is that computer that is specifically set up and configured to meet users’
specific needs on a network. If iTech should opt for a dedicated server type of network, it must
monitor the way server is utilized over the network and how it processes users’ requests.7 Some f
the dedicated servers in a network include:
Web Server
This server processes users request using the http protocol. If a user requests a web page this
server will be the one to process this request and displays that specific webpage. Hosting of the
domain name of iTech, that is , www.iTech.org.au will be done on a dedicated server in the
DCB.8
File Server
This server will be used by iTech to monitor and process file requests by users.
Dynamic Host Configuration Protocol (DHCP) Server
iTech uses DHCP server to automatically assign IP addresses to the components connected to the
network.
Mail Server
This server is used by iTech to manage user emails and stores all mails that users use to
communicate with one another. This server is solely for managing email communication.
Domain Name Server (DNS Server)
This server is used to manage user IP addresses and is offered by the interet service provider
(ISP). This server uses IP addresses to locate feedback from the web server when it is processing
users’ requests.9
7 Todd Lammle, CCNA Cisco Certified Network Associate Deluxe Study Guide (John Wiley & Sons, 2011).
8 Samee U Khan, Albert Y Zomaya and Assad Abbas, Handbook Of Large-Scale Distributed Computing In Smart
Healthcare (Springer, 2017).
9 Kyi Thar, Saeed Ullah and Choong Seon Hong, "Consistent Hashing Based Cooperative Caching And Forwarding In Content Centric
Network" [2014] The 16th Asia-Pacific Network Operations and Management Symposium.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: IT Infrastructure 11
4.2 Logical Design
Figure 2: Logical Design of iTech Network
The figure above shows the logical design of iTech network infrastructure
In order to make sure that breakdown of a single LAN does not interfere with the functions of
other LAN, iTech should ensure that all its servers is situated in the data center and possesses its
own LAN. From the figure above Itech will easily monitor each action carried out as well as
keep track of it resources at one central point. As such, it will help in ensuring that all resources
are used and the activities within the whole network are defined properly.10
IP addresses and Network Mask
Class B of IP address is the most appropriate course of action for iTech. Flexibility and
scalability is supported by this type of IP address. iTech will require a variety of IP address that
10 Sjaak Laan, IT Infrastructure Architecture (Lulu, 2017).
4.2 Logical Design
Figure 2: Logical Design of iTech Network
The figure above shows the logical design of iTech network infrastructure
In order to make sure that breakdown of a single LAN does not interfere with the functions of
other LAN, iTech should ensure that all its servers is situated in the data center and possesses its
own LAN. From the figure above Itech will easily monitor each action carried out as well as
keep track of it resources at one central point. As such, it will help in ensuring that all resources
are used and the activities within the whole network are defined properly.10
IP addresses and Network Mask
Class B of IP address is the most appropriate course of action for iTech. Flexibility and
scalability is supported by this type of IP address. iTech will require a variety of IP address that
10 Sjaak Laan, IT Infrastructure Architecture (Lulu, 2017).
Running head: IT Infrastructure 12
would provide for many users that are more than 1300 inclusive of those linked wirelessly.
Therefore, range of class B IP address would be appropriate and efficient. The table below
displays the range of class B IP address that could be utilized by iTech.11
Logical IP Addresses
IP
Address
Block
Network
Address
Subnet Mask Subnet
Bits
Host
Bits
Number
of
Subnets
Host per
subnet
10.0.0.1 10.0.0.1 255.255.255.0 21 11 32 2046
Table 1: IP Addressing Details
Table b: IP Addressing for iTech Buildings
Building Subnet Subnet Mask Subnet Size Host Range Broadcast
A 10.0.0.1 255.255.255.0 2046 10.0.0.1 to
10.0.0.254
10.0.0.255
B 10.0.3.0 255.255.255.0 2046 10.0.3.1 to
10.0.3.254
10.0.3.255
C 10.0.5.0 255.255.255.0 2046 10.0.5.1 to
10.0.5.254
10.0.5.255
Table 2: Respective IP addressing for iTech's Buildings
5 Cloud Based Design
This is another design that itech network could use to meet their objectives. Cloud networking is
used to describe networking resources access from a systematic third-party provider using WAN
(wide area network) or access technologies that are internet-based. It is associated with the idea
of cloud computing whereby computing resources stored at one point are shared to clients. iTech
can use cloud networking to share computing resources and network. As such, more functions of
network management are pushed into the cloud, and so only few client devices are required to
control the network.12
11 William Panek, James Chellis and Tylor Wentworth, MCTS Windows Server 2008 Network Infrastructure Configuration (Sybex, 2015).
12 Steven T Karris, Networks (Orchard Publications, 2009).
would provide for many users that are more than 1300 inclusive of those linked wirelessly.
Therefore, range of class B IP address would be appropriate and efficient. The table below
displays the range of class B IP address that could be utilized by iTech.11
Logical IP Addresses
IP
Address
Block
Network
Address
Subnet Mask Subnet
Bits
Host
Bits
Number
of
Subnets
Host per
subnet
10.0.0.1 10.0.0.1 255.255.255.0 21 11 32 2046
Table 1: IP Addressing Details
Table b: IP Addressing for iTech Buildings
Building Subnet Subnet Mask Subnet Size Host Range Broadcast
A 10.0.0.1 255.255.255.0 2046 10.0.0.1 to
10.0.0.254
10.0.0.255
B 10.0.3.0 255.255.255.0 2046 10.0.3.1 to
10.0.3.254
10.0.3.255
C 10.0.5.0 255.255.255.0 2046 10.0.5.1 to
10.0.5.254
10.0.5.255
Table 2: Respective IP addressing for iTech's Buildings
5 Cloud Based Design
This is another design that itech network could use to meet their objectives. Cloud networking is
used to describe networking resources access from a systematic third-party provider using WAN
(wide area network) or access technologies that are internet-based. It is associated with the idea
of cloud computing whereby computing resources stored at one point are shared to clients. iTech
can use cloud networking to share computing resources and network. As such, more functions of
network management are pushed into the cloud, and so only few client devices are required to
control the network.12
11 William Panek, James Chellis and Tylor Wentworth, MCTS Windows Server 2008 Network Infrastructure Configuration (Sybex, 2015).
12 Steven T Karris, Networks (Orchard Publications, 2009).
Running head: IT Infrastructure 13
Figure 3: iTech Cloud Based Design
5.1 Amazon Web Services
Amazon web services is a type of cloud service provider that iTech could use to meet their
objectives. It offers the following services;
EC2 (Elastic Cloud Computing)
An environment of virtual computing is represented by Amazon EC2. It permits users to utilize
interfaces of web services to launch instances with several operating systems, loading them with
environment of custom application, control permissions of network access, and execute images
using few or many systems as required. Features of Amazon EC2 include; it is integrated with
the platform of AWS, it involves elastic computing and it instances are controlled.13
13 Chip Dawes, Bob Bryla and Joseph C Johnson, OCA (John Wiley & Sons, 2009).
Figure 3: iTech Cloud Based Design
5.1 Amazon Web Services
Amazon web services is a type of cloud service provider that iTech could use to meet their
objectives. It offers the following services;
EC2 (Elastic Cloud Computing)
An environment of virtual computing is represented by Amazon EC2. It permits users to utilize
interfaces of web services to launch instances with several operating systems, loading them with
environment of custom application, control permissions of network access, and execute images
using few or many systems as required. Features of Amazon EC2 include; it is integrated with
the platform of AWS, it involves elastic computing and it instances are controlled.13
13 Chip Dawes, Bob Bryla and Joseph C Johnson, OCA (John Wiley & Sons, 2009).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Running head: IT Infrastructure 14
Elastic Beanstalk
AWS elastic beanstalk is a service that is used in scaling and deployment of web services and
application built with Java, Docker, .Net, Python, PHP, Go, Node.js, and Ruby on servers like
IIS, Passenger, Apache, and Nginx. Users can upload program and automatically Elastic
Beanstalk manages the deployment, from the provisioning of the capacity, load balancing and
application health controlling auto scaling. In addition, users can keep full management over the
resources powering programs of AWS and can view underlying resources. Some of the feature of
this service include; deployment is fast, auto scaling and complete control of resource.
5.2 Microsoft Azure
This is another type of cloud service provider that iTech could use. Azure virtual machines
enable users to deploy a variety of computing solutions. Deployment of virtual machines is
almost instant and pay within a minute. Users can deploy any language or workload on almost
any operating system with the support for Azure BizTalk Services, Microsoft windows, SAP,
Linux, IBM, and Microsoft SQL server. Some of the features of this service provider include;
deployment of any language and workload on almost any OS, customized load balancing and
virtual networking, and hybrid constancy with on premise applications. The following is a type
of service offered by Microsoft Azure;
Cloud Services-Cloud Services permit users to build, deploy and package services and
applications that are powerful to the cloud with cloud services of Azure and the click of a button.
It permits users measure from 1to 1000 in minutes. Azure handles health monitoring,
provisioning and load balancing. Some of the features of this service include; automated
application patching and OS, auto scaling and support for Ruby, Java, .Net, Node.js, Python and
PHP.14
6 Network simulation
6.1 Access layer diagram
14 Harold F Tipton and Micki Krause Nozaki, Information Security Management Handbook (John Wiley & Sons, 2016).
Elastic Beanstalk
AWS elastic beanstalk is a service that is used in scaling and deployment of web services and
application built with Java, Docker, .Net, Python, PHP, Go, Node.js, and Ruby on servers like
IIS, Passenger, Apache, and Nginx. Users can upload program and automatically Elastic
Beanstalk manages the deployment, from the provisioning of the capacity, load balancing and
application health controlling auto scaling. In addition, users can keep full management over the
resources powering programs of AWS and can view underlying resources. Some of the feature of
this service include; deployment is fast, auto scaling and complete control of resource.
5.2 Microsoft Azure
This is another type of cloud service provider that iTech could use. Azure virtual machines
enable users to deploy a variety of computing solutions. Deployment of virtual machines is
almost instant and pay within a minute. Users can deploy any language or workload on almost
any operating system with the support for Azure BizTalk Services, Microsoft windows, SAP,
Linux, IBM, and Microsoft SQL server. Some of the features of this service provider include;
deployment of any language and workload on almost any OS, customized load balancing and
virtual networking, and hybrid constancy with on premise applications. The following is a type
of service offered by Microsoft Azure;
Cloud Services-Cloud Services permit users to build, deploy and package services and
applications that are powerful to the cloud with cloud services of Azure and the click of a button.
It permits users measure from 1to 1000 in minutes. Azure handles health monitoring,
provisioning and load balancing. Some of the features of this service include; automated
application patching and OS, auto scaling and support for Ruby, Java, .Net, Node.js, Python and
PHP.14
6 Network simulation
6.1 Access layer diagram
14 Harold F Tipton and Micki Krause Nozaki, Information Security Management Handbook (John Wiley & Sons, 2016).
Running head: IT Infrastructure 15
The diagram below shows the access layer of network simulation of iTech using packet tracer
software of cisco. The IP Address used is 10.0.0.1/24
Figure 4: Access Layer of Network Simulation of iTech
The simulation uses PC (personal computer) as access layer consumer machines and generic
switches of cisco for interfacing. Configuration of DHCP is done to allocate IP addresses
automatically to all the machines in the network. The DHCP server fits hosted web files of iTech
on the web server and web server host iTech organization web applications and website. As
such, the network PCs are able to access the web documents hosted in this network access.15
6.2 DHCP configuration
15 Thomas Kyte and Darl Kuhn, Expert Oracle Database Architecture (Springer Science and Business Media, 2014).
The diagram below shows the access layer of network simulation of iTech using packet tracer
software of cisco. The IP Address used is 10.0.0.1/24
Figure 4: Access Layer of Network Simulation of iTech
The simulation uses PC (personal computer) as access layer consumer machines and generic
switches of cisco for interfacing. Configuration of DHCP is done to allocate IP addresses
automatically to all the machines in the network. The DHCP server fits hosted web files of iTech
on the web server and web server host iTech organization web applications and website. As
such, the network PCs are able to access the web documents hosted in this network access.15
6.2 DHCP configuration
15 Thomas Kyte and Darl Kuhn, Expert Oracle Database Architecture (Springer Science and Business Media, 2014).
Running head: IT Infrastructure 16
On the menu bar of Server Manager menu bar, select tools and then select DHCP. The console of
DHCP opens. In the console tree of DHCP, scroll to IPv4 and then select New scope. The wizard
of New scope opens. Select Next and then write New scope’s name adjacent to Name. Select
Next and then in the Range of IP address, adjacent to Start IP address write 10.0.0.1, write
10.0.0.254 adjacent to End IP address, and adjacent to Length write 24. Subnet mask value will
automatically change to 255.255.255.0.16
Select Next and then below Start IP address write 10.0.0.1 in Add Delay and Exclusions, below
End IP address write 10.0.0.10 and then select Add. This permits the first 10 addresses of IP in
10.0.0.0/24 subnet to be utilized for servers’ static addressing on the network. Select Next and
then below Limited enter 2 minutes, 0 hours and 0 days in Lease Duration. DHCP demonstration
will be simplified by this short Lease Duration. Select Next thrice and then validate contoso.com
as Parent domain and list 10.0.0.1 as the only domain server in the DNS server and Domain
Name. select Next two times and then click Yes, in activate scope. Select Next and then Select
Finish. Use the right mouse button to select dhcp1.contoso.com in the console tree of DHCP and
then select authorize. In the DHCP console refresh the view and validate that contoso-scope1is
active and DHCP1 is authorized.17
Note: in order to review scopes on the existing server using Windows PowerShell, use the right
mouse button to select Windows PowerShell, select run as an administrator, in the user account
control alert select Yes and then in the Window PowerShell prompt, write the command and then
click enter.
6.3 Configuration of iTech DNS and iTech Web Servers
To open DNS server of iTech select it and then click desktop option, configuration of IP and then
select the DHCP option and automatically the server will be allocated by the DHCP server the IP
address. This is shown in the figure below.
16 Josh Lockhart, Modern PHP (O'Reilly, 2016).
17 Mohamed Ahmed Hail et al, "Caching In Named Data Networking For The Wireless Internet Of Things" [2015] 2015 International
Conference on Recent Advances in Internet of Things (RIoT).
On the menu bar of Server Manager menu bar, select tools and then select DHCP. The console of
DHCP opens. In the console tree of DHCP, scroll to IPv4 and then select New scope. The wizard
of New scope opens. Select Next and then write New scope’s name adjacent to Name. Select
Next and then in the Range of IP address, adjacent to Start IP address write 10.0.0.1, write
10.0.0.254 adjacent to End IP address, and adjacent to Length write 24. Subnet mask value will
automatically change to 255.255.255.0.16
Select Next and then below Start IP address write 10.0.0.1 in Add Delay and Exclusions, below
End IP address write 10.0.0.10 and then select Add. This permits the first 10 addresses of IP in
10.0.0.0/24 subnet to be utilized for servers’ static addressing on the network. Select Next and
then below Limited enter 2 minutes, 0 hours and 0 days in Lease Duration. DHCP demonstration
will be simplified by this short Lease Duration. Select Next thrice and then validate contoso.com
as Parent domain and list 10.0.0.1 as the only domain server in the DNS server and Domain
Name. select Next two times and then click Yes, in activate scope. Select Next and then Select
Finish. Use the right mouse button to select dhcp1.contoso.com in the console tree of DHCP and
then select authorize. In the DHCP console refresh the view and validate that contoso-scope1is
active and DHCP1 is authorized.17
Note: in order to review scopes on the existing server using Windows PowerShell, use the right
mouse button to select Windows PowerShell, select run as an administrator, in the user account
control alert select Yes and then in the Window PowerShell prompt, write the command and then
click enter.
6.3 Configuration of iTech DNS and iTech Web Servers
To open DNS server of iTech select it and then click desktop option, configuration of IP and then
select the DHCP option and automatically the server will be allocated by the DHCP server the IP
address. This is shown in the figure below.
16 Josh Lockhart, Modern PHP (O'Reilly, 2016).
17 Mohamed Ahmed Hail et al, "Caching In Named Data Networking For The Wireless Internet Of Things" [2015] 2015 International
Conference on Recent Advances in Internet of Things (RIoT).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: IT Infrastructure 17
Figure 5: Allocating IP address to the DNS Server
As shown above 10.0.5.20 is the IP address allocated to the DNS server of iTech. Upon
completion open the web server of iTech and then repeat the same by choosing the desktop
option, configuration of IP and chose DHCP option for allocation of dynamic IP address as seen
in the figure below.18
Figure 6: Allocating IP address to the Web Server
18 Anthony C Caputo, Build Your Own Server (McGraw-Hill/Osborne, 2013).
Figure 5: Allocating IP address to the DNS Server
As shown above 10.0.5.20 is the IP address allocated to the DNS server of iTech. Upon
completion open the web server of iTech and then repeat the same by choosing the desktop
option, configuration of IP and chose DHCP option for allocation of dynamic IP address as seen
in the figure below.18
Figure 6: Allocating IP address to the Web Server
18 Anthony C Caputo, Build Your Own Server (McGraw-Hill/Osborne, 2013).
Running head: IT Infrastructure 18
DHCP server allocates 10.0.0.17 IP address to the web server of iTech. Upon completion select
vices tab and chose HTTP service and develop a web page www.itech,org,au as shown in the
figure below.
Figure 7: Creating Web page www.iTech.org.au
After setting the web page, select the DNS server of iTech again and chose DNS on the service
panel. This is displayed in the figure below. 19
19 Rahul Shrimali, Hemal Shah and Riya Chauhan, "Proposed Caching Scheme For Optimizing Trade-Off Between Freshness And Energy
Consumption In Name Data Networking Based Iot" (2017) 07(02) Advances in Internet of Things.
DHCP server allocates 10.0.0.17 IP address to the web server of iTech. Upon completion select
vices tab and chose HTTP service and develop a web page www.itech,org,au as shown in the
figure below.
Figure 7: Creating Web page www.iTech.org.au
After setting the web page, select the DNS server of iTech again and chose DNS on the service
panel. This is displayed in the figure below. 19
19 Rahul Shrimali, Hemal Shah and Riya Chauhan, "Proposed Caching Scheme For Optimizing Trade-Off Between Freshness And Energy
Consumption In Name Data Networking Based Iot" (2017) 07(02) Advances in Internet of Things.
Running head: IT Infrastructure 19
Figure 8: IP Address and the Name of the Web Server
IP address and the name of the web server (www.itech.org.au) is provided in this window. Select
Add Button. The web server will be supplemented to the record of available web servers in the
network. In the end complete the process of configuration of DNS server setup of iTech by
selecting ON.
6.4 Configuration of Dynamic Network
DHCP server allocates IP address dynamically to any customer connected. To stimulate this,
Click workstation 3 of iTech , open the window of the desktop, and select the tab of IP
configuration. Then chose DHCP for IP address automatic allocation. This is demonstrated in the
figure below.
Figure 8: IP Address and the Name of the Web Server
IP address and the name of the web server (www.itech.org.au) is provided in this window. Select
Add Button. The web server will be supplemented to the record of available web servers in the
network. In the end complete the process of configuration of DNS server setup of iTech by
selecting ON.
6.4 Configuration of Dynamic Network
DHCP server allocates IP address dynamically to any customer connected. To stimulate this,
Click workstation 3 of iTech , open the window of the desktop, and select the tab of IP
configuration. Then chose DHCP for IP address automatic allocation. This is demonstrated in the
figure below.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Running head: IT Infrastructure 20
Figure 9: Configuration of Dynamic Network
Workstation 3 of iTech linked to its network is assigned IP address 130.30.0.1 as shown in the
diagram above. Web server of iTech access (www.iTech.org.au)
Select any workstation of iTech in the network to access web server. Open the tab of desktop and
chose web browser. Then on the section of the url on the opened window write
www.iTech.org.au and then select go to access then web server. This is shown below.
The customer connected to the network is able to access web server of iTech from their devices.
Figure 9: Configuration of Dynamic Network
Workstation 3 of iTech linked to its network is assigned IP address 130.30.0.1 as shown in the
diagram above. Web server of iTech access (www.iTech.org.au)
Select any workstation of iTech in the network to access web server. Open the tab of desktop and
chose web browser. Then on the section of the url on the opened window write
www.iTech.org.au and then select go to access then web server. This is shown below.
The customer connected to the network is able to access web server of iTech from their devices.
Running head: IT Infrastructure 21
Conclusion
Networking is becoming more and more critical to any organization. The reason why iTech is
upgrading its network infrastructure is because of four reasons: reliability, performance, security
and scalability.
Reliability ensures that there is availability of critical resources even at down time. Performance
ensure effectiveness and efficiency in carrying out daily operations. Security ensures protection
of the company’s resources on the network. Scalability ensures that as the company grows and
more devices are being incorporated, then the network structure doesn’t require any upgrade or
changes to meet this change.
Recommendation
It is very critical that iTech upgrades its infrastructure so as to address the challenges they are
experiencing now. However, for the case of iTech, a cloud solution would best suit them. This is
because it requires less hardware components and a lot of the critical aspect such as security,
scalability, performance and reliability are left for the cloud vendor to address. It is important for
iTech to consider this option.
Conclusion
Networking is becoming more and more critical to any organization. The reason why iTech is
upgrading its network infrastructure is because of four reasons: reliability, performance, security
and scalability.
Reliability ensures that there is availability of critical resources even at down time. Performance
ensure effectiveness and efficiency in carrying out daily operations. Security ensures protection
of the company’s resources on the network. Scalability ensures that as the company grows and
more devices are being incorporated, then the network structure doesn’t require any upgrade or
changes to meet this change.
Recommendation
It is very critical that iTech upgrades its infrastructure so as to address the challenges they are
experiencing now. However, for the case of iTech, a cloud solution would best suit them. This is
because it requires less hardware components and a lot of the critical aspect such as security,
scalability, performance and reliability are left for the cloud vendor to address. It is important for
iTech to consider this option.
Running head: IT Infrastructure 22
Bibliography
1. Bruce A Hallberg, Networking (McGraw-Hill, 2014).
2. Doug Lowe, Networking All-In-One Desk Reference For Dummies (Wiley, 2008).
3. Bruce A Hallberg, Networking (McGraw-Hill, 2014).
4. Frances Kay, Successful Networking: How To Build New Networks For Career And
Company Progression(2010).
5. Misty Vermaat, Discovering Computers 2017 (Cengage Learning, 2017).
6. Manish Agrawal, Business Data Communications (Wiley, 2011).
7. Todd Lammle, CCNA Cisco Certified Network Associate Deluxe Study Guide (John Wiley & Sons, 2011).
8. Samee U Khan, Albert Y Zomaya and Assad Abbas, Handbook Of Large-Scale
Distributed Computing In Smart Healthcare (Springer, 2017).
9. Kyi Thar, Saeed Ullah and Choong Seon Hong, "Consistent Hashing Based Cooperative
Caching And Forwarding In Content Centric Network" [2014] The 16th Asia-Pacific
Network Operations and Management Symposium.
10. Sjaak Laan, IT Infrastructure Architecture (Lulu, 2017).
11. William Panek, James Chellis and Tylor Wentworth, MCTS Windows Server 2008
Network Infrastructure Configuration (Sybex, 2015).
12. Steven T Karris, Networks (Orchard Publications, 2009).
13. Chip Dawes, Bob Bryla and Joseph C Johnson, OCA (John Wiley & Sons, 2009).
14. Harold F Tipton and Micki Krause Nozaki, Information Security Management
Handbook (John Wiley & Sons, 2016).
15. Thomas Kyte and Darl Kuhn, Expert Oracle Database Architecture (Springer Science
and Business Media, 2014).
16. Josh Lockhart, Modern PHP (O'Reilly, 2016).
17. Mohamed Ahmed Hail et al, "Caching In Named Data Networking For The Wireless
Internet Of Things" [2015] 2015 International Conference on Recent Advances in
Internet of Things (RIoT).
Bibliography
1. Bruce A Hallberg, Networking (McGraw-Hill, 2014).
2. Doug Lowe, Networking All-In-One Desk Reference For Dummies (Wiley, 2008).
3. Bruce A Hallberg, Networking (McGraw-Hill, 2014).
4. Frances Kay, Successful Networking: How To Build New Networks For Career And
Company Progression(2010).
5. Misty Vermaat, Discovering Computers 2017 (Cengage Learning, 2017).
6. Manish Agrawal, Business Data Communications (Wiley, 2011).
7. Todd Lammle, CCNA Cisco Certified Network Associate Deluxe Study Guide (John Wiley & Sons, 2011).
8. Samee U Khan, Albert Y Zomaya and Assad Abbas, Handbook Of Large-Scale
Distributed Computing In Smart Healthcare (Springer, 2017).
9. Kyi Thar, Saeed Ullah and Choong Seon Hong, "Consistent Hashing Based Cooperative
Caching And Forwarding In Content Centric Network" [2014] The 16th Asia-Pacific
Network Operations and Management Symposium.
10. Sjaak Laan, IT Infrastructure Architecture (Lulu, 2017).
11. William Panek, James Chellis and Tylor Wentworth, MCTS Windows Server 2008
Network Infrastructure Configuration (Sybex, 2015).
12. Steven T Karris, Networks (Orchard Publications, 2009).
13. Chip Dawes, Bob Bryla and Joseph C Johnson, OCA (John Wiley & Sons, 2009).
14. Harold F Tipton and Micki Krause Nozaki, Information Security Management
Handbook (John Wiley & Sons, 2016).
15. Thomas Kyte and Darl Kuhn, Expert Oracle Database Architecture (Springer Science
and Business Media, 2014).
16. Josh Lockhart, Modern PHP (O'Reilly, 2016).
17. Mohamed Ahmed Hail et al, "Caching In Named Data Networking For The Wireless
Internet Of Things" [2015] 2015 International Conference on Recent Advances in
Internet of Things (RIoT).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Running head: IT Infrastructure 23
18. Anthony C Caputo, Build Your Own Server (McGraw-Hill/Osborne, 2013).
19. Rahul Shrimali, Hemal Shah and Riya Chauhan, "Proposed Caching Scheme For Optimizing
Trade-Off Between Freshness And Energy Consumption In Name Data Networking Based
Iot" (2017) 07(02) Advances in Internet of Things.
18. Anthony C Caputo, Build Your Own Server (McGraw-Hill/Osborne, 2013).
19. Rahul Shrimali, Hemal Shah and Riya Chauhan, "Proposed Caching Scheme For Optimizing
Trade-Off Between Freshness And Energy Consumption In Name Data Networking Based
Iot" (2017) 07(02) Advances in Internet of Things.
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.