This report summarizes the network expansion requirements for AML (Advanced Medicos Limited) and proposes a wider network infrastructure to meet the future needs of the institute.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Network Expansion of AML Author Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Executive Summary The objective of this report lies in summarizing network expansion requirements for the medical institute AML (Advanced Medicos Limited) seeks open a new branch office. To facilitate the network throughout the three different buildings including those of the headquarters as well as the newly opened branch office, AML attempts to redesign their existing network infrastructure into a wider network that can cater to the requirements of all the three buildings. The report begins by touching on the different business goals, followed by the several technological goals, all of which AML wishes to meet. Then after analysis of the respective requirements, this report tries explaining further on reasoning and methods by which the network being proposed meets every future requirement of the institute. This is again crosschecked by comparing various requirements with the functions of the new network and how it is achieved. Thereafter the overall network layout gets thoroughly discussed as also the roles of critical parts of the proposed network. From the observations drawn, conclusions are made that the network design proposed in the report easily meets AML’s requirements for the future while also addressing all concerns successfully.
Table of Contents Author...............................................................................................................................................1 Date...................................................................................................................................................1 1. Introduction.......................................................................................................................................4 2.Analysis of User Requirements......................................................................................................4 Requirement Summary and Analysis of Old network........................................................................4 Requirement Summary and Analysis of Proposed network..............................................................4 Network Requirements.................................................................................................................5 3. Description & Analysis of Current Setup with old setup....................................................................6 3.1Data Transmission.......................................................................................................................7 3.2Network Hardware......................................................................................................................7 3.3 Physical Network Topologies.......................................................................................................7 3.4 Description..................................................................................................................................7 3.5 Application Summary...............................................................................................................7 4. Conclusions........................................................................................................................................8 List of References..................................................................................................................................9 Appendix A..........................................................................................................................................10 Current System...........................................................................................................................10 Appendix B..........................................................................................................................................11 LAN Topology...............................................................................................................................11 WAN Topology.............................................................................................................................11 Old system...................................................................................................................................12
1. Introduction The report studies and analyses the specifications and requirements for network infrastructure of the company AML (Advanced Medicos Limited) which looks to expand by opening a new branch office and presents a requirements summary (Taleb, Bagaa and Ksentini 2015). For facilitating the network among the headquarters and the newly created branch office, attempts to redesign their existing network infrastructure into a wider network that can cater to the requirements of all the three buildings. The report begins by touching on the different business goals, followed by the several technological goals, all of which AML wishes to meet. Then after analysis of the respective requirements, the study proceeds to explain further on why and by what means can the proposed network meet all the future requirements of the company, AML by comparing the various requirements with the functions of the new network and how it is achieved. Thereafter the overall network layout gets thoroughly discussed as also the roles of critical parts of the proposed network. Then the report ends with concluding notes with observations that suggest the proposed network handily meeting AML’s future requirements. 2.Analysis of User Requirements 2.1 Business Goal The communication channels have improved significantly through implementation of WLAN network and enabling of videoconferencing and live meetings (Cao, Cheung and Yuk 2015). Every expense allocated for restructuring of the network is crosschecked with requirements. Securing the network is a key part of restructuring the network. The company AML requires to employ over 400 members in the near future and wishes to tap the advancement in technology for accomplishing the expansion without having to invest fortunes. 2.2 Technical Goal The rooms housing the computers, servers and network devise needs upgrading. The video conferencing facility has to be enabled and made accessible in campuses for meeting needs of employees (Sun et al. 2017). The network proposed, must be scalable as AML seeks to expand. Wireless access points must be present helping employees in remote accessing of AML’s network (Cao, Cheung and Yuk 2015). The resources must be accessible to members from office rooms and campuses. Network should never be negatively affecting the performance of the organizational members (Oostenbrink 2015). The network must not possess any loopholes and risk of failures (Alatorre et al. 2019). Security of device and components of the network needs to be treated with highest priority. 2.3 Requirement Summary and Analysis of Old network Building/LocationDepartment Name Number of Servers Number of Workstations Number of Laptops Number of Printers Number of Floors
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Building ADevelopment Departments 1700103 Marketing Departments 11004 Building BProduction Departments 15043 Administration Departments 5502 2.4 Requirement Summary and Analysis of Proposed network Building/LocationDepartment Name Number of Servers Number of Workstations Number of Laptops Number of Printers Number of Floors Building ADevelopment Departments 17050103 Marketing Departments 11004 Building BProduction Departments 165043 Administration Departments 51304 Building C Development Departments 120155 3 Marketing Departments 1402 Primary network required is172.16.120.0/22 The IP addresses now available in this primary network are1022 Total IP addresses that are required from the different subnets are290 Total IP addresses that have been allocated to the various subnets are446 2.5 Calculation of Subnets after supernetting Subnet Descriptio n Size Required Size Allocated Network Addresses CIDR valueSubnet MasksAssignable IP Address Range Broadcast Addresses BuildingA146254172.16.120. 0/24255.255.255.0172.16.120.1 - 172.16.120.254172.16.120.255 BuildingB92126172.16.121./25255.255.255.128172.16.121.1 -172.16.121.127
0172.16.121.126 BuildingC4862172.16.121. 128/26255.255.255.192172.16.121.129 - 172.16.121.190172.16.121.191 BuildingB A22172.16.121. 192/30255.255.255.252172.16.121.193 - 172.16.121.194172.16.121.195 BuildingB C22172.16.121. 196/30255.255.255.252172.16.121.197 - 172.16.121.198172.16.121.199 2.6 Requirementsof the Network User community:The different community of users using the network are company managers and executives, general employees of the four departments and the CxO level members (Aydin and Ulger 2016). The CxO level members include the CEO, COO, CFO and others who are responsible for running the institute from the top. Mobility Requirements:The Bring Your Own Device (BYOD) facility is being provided by letting employees take or bring laptops to and from office as also access the network from anywhere within company premises (Dawson 2016). Security Requirements:The network is protected by multi layered security (Acemoglu, Malekian and Ozdaglar 2016). The firewall acts as the first layer of security while security applications in individual devices act as the second. Bandwidth Requirements:Since AML is expanding and willoperate with more than 400 members a class B IP 172.16.120.0/22 is assigned with 1022 maximum assignable IPs and a bandwidth of 2 GB/s. Application Requirements:The applications in use by the network are Cisco ASA 5505 firewall, Eset Nod32 antivirus, Cisco WebEx and Skype, Remote Desktop,MS Office 2016, Mozilla Firefox, Thunderbird, Windows 10, Windows Server 2016, Tally, Adobe Creative Cloud 7, inhouse tools and company website. Remote access requirements:Any system within the network can be accessed by administrators using the remote desktop application. Performance Requirements:The network is designed to not only meet but also exceed the future requirements of AML and is not supposed to have issues with direct or wireless access. Quality of Service (QoS):The network of AML is segment for each of the three building and hence is finetuned to provide quality service to devices of each building.
3. Description & Analysis of Current Setup with old setup The previous network of AML composed of two buildings of the headquarters Building A and Building B being connected through LAN and communications had to be made by accessing the company web portal (refer to figure 4). In this network Building A operated 80 workstations and 14 printers of the software development department and marketing department combined. The proposed network of AML comprises of three buildings (refer to figure 1). These are the two buildings of the headquarters - Building A and Building B connected through a LAN network as well as a third building – Building C or branch office which connects its devices through its own LAN and communications which is connected to LAN of the headquarters to form a LAN to LAN wide area network (WAN) (Leon, Parra and Bermudez 2018). In this network Building A operates 80 workstations, 50 laptops and 14 printers of the software development department and marketing department combined. Building B operates 78 workstations, 0 laptops and 8 printers. Building C operates 24 workstations 15 laptops and 7 printers. Building B acts as the server farm where the web servers, email servers and file servers are present (Sahinoglu 2018). Other servers in different floors of all buildings serve networking needs of respective departments. 3.1Data Transmission The different cables used to establish the network are: Fast-Ethernet:A Fast-Ethernet cable provides transmission of data rates around 100 megabytes/second (Dolezilek, Gordon and Anderson 2016). This cable is used to enable direct connections from routers as also connection to wireless access points. Gigabit-Ethernet: A Gigabit-Ethernet cable is used for providing technologies for transmission of frames at the rate of 1 gigabyte/second (Swartz et al. 2017). This cable is generally used to distribute the network from a switch to multiple devices present within the network. 3.2Networking Hardware The components that comprise this network can be 3 routers, 3 switches, 10 servers, 182 workstations and 35 printers (Wood et al. 2015). Each router facilitates network access to a specific building or wing. The network is distributed by switches to the devices. Most servers are in Building B, the server farm. 3.3Physical Network Topologies The various networking topologies used in the proposed network of AML are: Local Area Network (LAN) (refer to figure 2) Wide Area Network (WAN) (refer to figure 3) Wireless Local Area Network (WLAN)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
3.4 Description 3.5ApplicationSummary Cisco ASA 5505 Firewall:To secure network components and function as firewall, the Cisco ASA 5505 is selected (Konikiewicz and Markowski 2017). This is a standalone device that provides security for all parts of AML’s network. Eset Nod32 Antivirus:This is an industry leading anti-virus solution installed on each system to provide a second layer of security. Cisco WebEx Meeting:A corporate communication application for video and meetings and is in use among big, medium and small sized businesses. This application provides an interface tailor made to support office work including greater details in user profiles. Remote Desktop:RDC (Remote Desktop Connection) is Microsoft’s default connectivity tool for remotely connecting other systems within the network. Microsoft Office 2016:This suite of office applications is the latest offering from Microsoft and offers maximum functionalities and compatibility. Mozilla Firefox:This is a free and open source web browser that offers comprehensive set of features offered by few other competing browsers. Thunderbird:Thunderbird mail is another open source product from Mozilla offering multiplatform support (Ghiglieri, Henhapl and Gerber 2018). The thunderbird mailing agent is both cost effective and efficient in terms of performance with respect to competition. Windows 10:Windows 10, the latest OS from Microsoft is popular its compatibility towards a broad array of applications and secure framework with support for regular patches and updates. Based upon the windows platform, it offers the most popular services tailor made for businesses and educational institutes. Windows Server 2016:This is the windows based operation specially built for serving server based roles. Hence, this operating system is best suited for the various types of servers being used by AML like web servers, mail servers, database servers and networking servers of building B. Tally:The Tally Software refers to a leading accounting application used by businesses worldwide in performing financial and accounting tasks as well as ERP related activities (Amin et al. 2016). It handles almost all forms of accounting transactions in conjunction with GST calculation and billing, compliance, banking and the like. For ERP, Tally.ERP 9 among leading and most widely used software. Adobe Creative Suite 6:This application package is used to perform creative work such as photo or video editing, business card design and like (Oakes 2016). The Marketing department of AML makes extensive use of the software for repeatedly producing creative content. In house tools:These tools are the ones that are developed by the software development team for automating task for own benefit and fast tracking of business processes. These automation tools are
typically based on MS Excel with the help of macros as well as several the visual studio dot net framework. Company web portal:The web portal of AML is built owned and hosted by the company themselves and serves as an interface for communication within the network. In the older network this web portal would facilitate communications between the two buildings by itself. In the proposed network the web portal additionally enables communications with the branch office as well as the portable devices like laptops from the campus premises of all three buildings. 4. Conclusions To conclude the report successfully analyses the requirements and specifications of AML’s network infrastructure which is undergoing expansion by opening a new branch office and presents a requirements summary. To enable network access and communications between the two buildings of the company headquarters as well as the new branch of AML, a restructuring and design of their existing network infrastructure is conducted to form a wider network that can cater to the requirements of all the three buildings. The report talks about the various business goals along with the technological goals, all of which AML wishes to meet. Then after analysis of the respective requirements, this report proceeds to describe further on why and by what means can the redesigned network structure is able to meet all of company’s requirements in the future, by comparing the various requirements with the functions of the new network and how it is achieved. Thereafter the overall network layout gets thoroughly discussed as also the roles of critical parts of the proposed network. From the study conducted, it is observed that this redesigned network structure easily meets AML’s future requirements.
List of References Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion.Journal of Economic Theory,166, pp.536-585. Alatorre, D., Nasser, B., Rabani, A., Nagy-Sochacki, A., Dong, X., Axinte, D. and Kell, J., 2019. Overcoming the Internet Latency Hurdle.IEEE ROBOTICS & AUTOMATION MAGAZINE,1070(9932/19). Amin, M.K., Munira, S., Azhar, A., Amin, A. and Karim, M.T., 2016, December. Factors affecting employees' behavioral intention to adopt accounting information system (AIS) in Bangladesh. In2016 19th International Conference on Computer and Information Technology (ICCIT)(pp. 501- 505). IEEE. Aydin, M.N. and Ulger, C., 2016. Perception of IT Governance in an Emerging Market. Perception, 5(01). Cao, Y.F., Cheung, S.W. and Yuk, T.I., 2015. A multiband slot antenna for GPS/WiMAX/WLAN systems.IEEE Transactions on Antennas and Propagation,63(3), pp.952-958. Dawson, P., 2016. Five ways to hack and cheat with bring‐your‐own‐device electronic examinations.British Journal of Educational Technology,47(4), pp.592-600. Dolezilek, D., Gordon, C. and Anderson, D., 2016, November. Fast Fault Detection Isolation and Recovery in Ethernet Networks for Teleprotection and High-Speed Automation Applications. In CIGRE Mexico International Colloquium, Mexico City. Ghiglieri, M., Henhapl, B. and Gerber, N., 2018. Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.Mensch und Computer 2018-Workshopband. Konikiewicz, W. and Markowski, M., 2017. Analysis of Performance and Efficiency of Hardware and Software Firewalls. Journal of Applied Computer Science Methods, 9(1), pp.49-63. Leon, A.F.H., Parra, O.J.S. and Bermudez, G.M.T., 2018. LAN-WAN-LAN end-to-end Network Simulation with NS2.International Journal of Applied Engineering Research,13(17), pp.13136-13140. Oakes, M.D., 2016. Testing the Viability of a 3D Workflow Using Only Adobe Creative Cloud. Oostenbrink, J., 2015.Financial impact of downtime decrease and performance increase of IT services(Bachelor's thesis, University of Twente). Sahinoglu, M., 2018. CLOUD computing risk management for server farm repair rates, consumer‐ load cycle, server farm repair crew count, and additional servers.‐Wiley Interdisciplinary Reviews: Computational Statistics,10(2), p.e1424. Sun, M., Liu, Z., Qiu, J., Zhang, Z. and Sinclair, M., 2017 Swartz, M., Torres, D.J., Liberatore, S. and Millard, R., 2017. WHOI SDSL data-link project—ethernet telemetry through sea cables.Journal of Atmospheric and Oceanic Technology,34(2), pp.269-275.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Taleb, T., Bagaa, M. and Ksentini, A., 2015, June. User mobility-aware virtual network function placement for virtual 5G network infrastructure. In2015 IEEE International Conference on Communications (ICC)(pp. 3879-3884). IEEE. Wood, T., Ramakrishnan, K.K., Hwang, J., Liu, G. and Zhang, W., 2015. Toward a software-based network: integrating software defined networking and network function virtualization.IEEE Network, 29(3), pp.36-41.
Appendix A Current System Figure 1: Proposed network (Created by Author)
Appendix B LAN Topology Figure 2: LAN topology (Created by Author) WAN Topology Figure 3: WAN topology (Created by Author)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.