logo

IT Infrastructure Subtitle: Project Description

   

Added on  2021-06-14

11 Pages2589 Words50 Views
Title: IT Infrastructure
Subtitle: Report Study for AusEd
Student Name:
Student ID
MAY 22, 2018
STUDENT NAME
Student ID

Table of Contents
Introduction.................................................................................................................... 1
Scope of the problem........................................................................................................ 2
Assumptions................................................................................................................... 3
List of Devices................................................................................................................ 3
Logical Design Diagram.................................................................................................... 4
Budget Cost Analysis........................................................................................................ 7
Justification of hardware used............................................................................................. 8
Conclusion..................................................................................................................... 8
References................................................................................................................. 9

Introduction
For any organization the best way to approach to a strategic plan is understanding the major
needs and making them fully stretched and met when distributing the organization resources. We
have to understand all the equipment’s that are already planted in the institution. The way the
data is being transmitted from the servers to the workstations is a major thing for any
organization to understand. There has been so many times that we do not know what exactly
happens in the background when we are sending and receiving messages. We see that we put
much concentration on the icons and the interfaces rather than understanding what happens
behind the scene. Hardware components are those devices that are tangible and we can
physically see them while the software component are those that we use when interacting with
the device. There are some steps that are followed when we are trying to analyze on the type of
IT infrastructure we are going to setup. First step is understanding the existing hardware devices
in the institution so that we are able to know what to buy and what not to. The second key
requirement is knowing all the demands and needs of AusEd from the moment we start doing the
thorough analysis and planning. After the analysis has been completed then we can be able to
categorize all the problems and be able to come up with the best solutions that will solve the
problems in existence. Third after the analysis we have to use the analysed data in coming up
with the network diagram of the institution. Understanding the type of topology to be used will
be a key thing in this assignment because it will help us to be able to come up with a good
network design. In making the design to be successful and choosing the appropriate models then
we can consider some key factors like how secure the network will be, the flexibility and
scalability, understanding the budget allocated for the setting up of the network and lastly is the
time plan where we have to give out the project schedule of how long we will take to complete
the project. (Leon, 2015). To know the ease of the network that has already been designed it is
good we know the management involved and the way they will respond to errors when asked to
troubleshoot.
The main concept the AusEd need to be brought about in this case study is creation of a system
that will help them to maintain their accounts and a continued good relationships with their
customer. They want an advanced use of the Sugar Customer Relationship management and that
of the Microsoft Exchange Server 2007 which is used for sending, when receiving and storing of
resources used within the existing network. If AusEd has more than 2000 student within the

school premises more than 200 people working in the institutions then we will need a network
that will be strong and that will be applied and accessible to all the people may it be the admin,
staffs, students or even lecturers. The requirements of AusEd are based on the hardware parts of
the networking from the networking devices to the resources used by the individuals in the
AusEd. Some of these hardware that must be used are such as the scanners, printers, personal
computers and much more all other workstations working or used for working in making the
network to be complete.
After the department associated with the development of the said IT infrastructure understands
all the above then it is the mandate of IT manager or the designer of the network to come with a
plan of the design to use for the network. The diagram lay down all the content used in
something that can be visualized clearly showing how the devices in the network communicates
with each other from the router to the devices such as the scanners, computers and the scanners
among many more. The other idea that has been emphasized in this category is the issue of the
security where we are advised to apply the devices such as the firewalls and the virtual Private
networks.
Scope of the problem.
The reason to as why we need the network design for AusEd is because of its future plan that it
will use in achieving its plan strategically and increasing the diversified sources of funds which
will essence in minimizing the cost of the non-core activities. Also when we understand their
technology plan will assist them in future in developing an offline Moodle for students and the
add-on Moodle for taking exams.
When we want to understand the objectives of AusEd then we can be able to setup a network
layout that will be based on the good security and the extensions in future. (Coleman, 2012).
Managing a network after being implemented is a thing will greatly needed to be observed. This
will help in predicting the problems that may come as a result of such in future hence becoming
easy to troubleshoot. Lastly but not least the other purpose of the study on the proposed network
design of AusEd is that we will need the network very secure in that we will use the devices such
as the firewall in the routers that will help filtering the of the data and the virtual private
networks that will help to maintain and keep the confidentiality and privacy of the data.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Designing a Network Setup for AusEd: Logical Diagram and Hardware Justification
|12
|2996
|472

IT Infrastructure - AusEd Case Study for Proposed Network Design
|13
|2813
|387

Transmission Control Protocol in Information Technology - PDF
|11
|2463
|75

Designing IT Infrastructure for AusEd: Logical Diagram, Equipment List, and Budget Analysis
|10
|2710
|303

Logical Network Design Diagram - Doc
|9
|2385
|113

Designing a Network Infrastructure for AusEd Institution
|8
|2438
|275