Table of Contents INTRODUCTION...........................................................................................................................1 MAIN BODY...................................................................................................................................1 1. Geographical scope of the network developed within Xero company established in Sydney1 2. Logical design for the Sydney branch which is based on three layered architecture. Also identify the network devices and server used in development of the networking infrastructure2 3. Identify the IP addresses with the subnet masks used for network configuration...................3 4. Discuss about the two organisations that provides cloud services for hosting the email and wed services of company . Justify the answer explaining the level of services each company provide that suits..........................................................................................................................3 5.Discussaboutthetechniqueofusingthevirtualisationserviceinsupportingand implementing the cloud platform.................................................................................................6 6. Dynamic scaling which is supported by cloud computing......................................................7 CONCLUSION................................................................................................................................7
INTRODUCTION In today's modernised world, Technology have transformed the human creative world into the automatised world. IT infrastructure within the industry one of the important aspect nowadays, which helps in improving the productivity and efficiency of the business. This report will be based on the networking infrastructure of the Xero company which is going to develop its new branch within Sydney. This report will assist the organization in developing a effective IT infrastructure for the company in order to improve the overall performance. This study will provide logical design of the networking infrastructure within the Xero company which is newly established in Australia. Furthermore, it will create a complete knowledge about the service provider which fulfils various data manipulation requirements of the users. This document also helps in determining the geographical range of network design which supports the communication and interaction within the systems situated within 8 floor building. Moreover, It will also help in identifying the IP addresses and subnet masking in order to configure the systems within the industry. Various virtualisation techniques are also identified here along with the dynamic scaling which is supported by cloud computing. MAIN BODY 1. Geographical scope of the network developed within Xero company established in Sydney Geographical scope of networking can be termed as a range within which the computer systems can interact with each other in order to meet the specific goal of the Xero company Sydney branch. The scope of the network is referred to its geographical size. A network can range in size from just a few computers to the thousands of computers linked together for the main purpose of interconnectivity (Dijkhuizen Ham,2018). Networking is generally classified under different types of categories such as LAN, MAN, CAN, WAN etc. Sydney branch of the Xero company wants to establish a interconnectivity between 240 computer systems which are placed in the building of 8 floor. In order to connect the computer devices with each other which can be further connected to the main server which controls all the information of the company. Sydney branch of Xero organization uses mix architecture that is LAN (Local area Network) and CAN (Campus area network) for providing the interconnectivity within the 8 floored building. According to the given diagram, the network is divided into four Local Area Network which connects the compute systems of the Two floors together in order to 1
create LAN network. All the LANs are then connected to a common server which establishes the CAN (Campus Area Network). In addition to this, network segment is a portion of the a computer network that is separated from the rest of the network by various devices such as repeater, hub, bridge, switches and router. Each segment generally consists of the multiple computers or other hosts and the type of the segmentation is generally differs according to the type of the devices used. There are commonly four servers used in this networking diagram. 2. Logical design for the Sydney branch which is based on three layered architecture. Also identifythenetworkdevicesandserverusedindevelopmentofthenetworking infrastructure The IT manager in Sydney Xero company wants to develop a architecture effective and efficient architecture which allows the employees of the firm to easily access the information and share the data within the enterprise. So Three layered hierarchical model will be used in order to reduce the complexity of the networking design. Such layers are described as: Core layer:This is the backbone layer which provides the optimal; transport of the data and information between different sites (Sourek,and Zelezny 2019). It is referred as a high speed switching backbone and this is mainly designed to switch the packets as fast as possible. This layer is not involved in any kind of packet manipulation such as access lists and filtering. 2 Illustration1: Geographical Area for the Xero company Sydney branch
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Distributed layer:This is demarcation point between the access and core layer which helps in differentiating the access and core layer. This layer is mainly aimed at providing the bpoudary definition which may involve in packet manipulation. Access layer:This can be considered as a point at which local end users are allowed to interrupt into the entwork. This layer is involved in providing the remote sites access to corporate network via internet. Required networking device used in designing the network for Xero Sydney branch are Computer systems, printers, four different types of servers and one centralised server. Along with this routers, switches and hub are also used for the proper transmission of the data from source to the appropriate destination along with the secured way. However, IT manager of the company has also used the Firewall for the security purpose which restricts the authorisation of the users in gaining access to the confidential data. Although, there are many servers used in this network such as Dynamic Host control protocol, file server, print server, Domain name server etc in order top control the file printing actions. 3 Illustration2: Logical Diagram interface for the networking
3. Identify the IP addresses with the subnet masks used for network configuration IP addresses is a dotted decimal notation which is 4 sets of numbers separated space. Each set generally represents the 8-bit number ranging from 0-255 (Liand et.al.,2019). This is the main aspect fo configuring the network server for a web site. It is a logical numeric address assigned to every single computer, printer, Ethernet, router, switch or device based on TCP/IP network. Subnetting is the process of dividing the large network of Xero Sydney branch into smaller sub-networks (Subnets). IP address helps in identifying the subnets which is more efficient practice as it creates smaller broadcast and generates less traffic. Address classNumber of network bits Number of Host bits Subnet maskCIDR Notation C248255.255.255.0/24 C257255.255.255.240/25 C284255.255.255.240/28 C302255.255.255.252/30 4. Discuss about the two organisations that provides cloud services for hosting the email and wed services of company . Justify the answer explaining the level of services each company provide that suits. Cloud services are the important part of network development which made available to the users on the demand by using internet from the cloud computing service provider. It always opposed to being provide from the XERO firm on premises servers. Cloud services are covered the wide range of important resources that service provider delivers to the customer. The usage of service has become associated with the common cloud offering facilities such as Software as a service and platform as a service (Bennett, Ward and Robertson, 2018). Web services and hosting are necessary concept that support the entire infrastructure to maintain and control the data in proper manner. Amazon web service: Amazon web service is the fastest and protected platform of cloud service which offered different type of infrastructure facilities such as computing power, database storage, networking etc. This type of service provide the host in the static websites. In this way, user can easily build 4
the complicated application that are trustworthy, flexible and scalable. Amazon web service started to offer the various type of service in marketplace. It is also known as cloud computing service. It doesn't required any plan for server and other Information techniques infrastructure which takes up time advance (Kumar and Kushwaha, 2018). Instead, this service is increasing the demand in marketplace. In marketplace, The Amazon EC2 container service enables the customer to work with the docker container on the AWS platform. Developer can use this service for the server less functions that automatically run the code for applications and services. Data Management- Amazon web service has provided to manage the database service through the Amazon relational database which includes the different type of options such as MySQL, SQL server and Oracle etc. this system has high performance database Amazon Aurora that offers the facilities to manage the DBMS. Networking- Amazon circuital cloud provide an administrator to control or manage the overall virtual network that easily isolated the sections of AWS cloud. It is automatically provisions the new resources within the VPC for extra protection. The professional has established a connection from on premises data centre into the Amazon direct cloud. It help to balance the traffic of network by using AWS balancing tools such as network load balancer and application load balancer. Security and governance- This service has provided a wide range of service regarding cloud security which include the identity and management access. It allows the admin to define or easily manage the user access through resources. An administration has created a user directory with the cloud directory and connect cloud resources for an existing active drive within the AWS services. Google cloud platform services: Google cloud platform is a type of cloud service for the purpose of hosting that should integrate with the storage used by the developer and enterprises for the managing the live data. This type of service available in market at various flexible payment plan which based on the pay as you go. Google cloud platform services can easily access by the developer, administrator and other professional over the internet. They provide different type of services such as storage, big data, machine learning and internet of things. 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Artificial intelligence- For instances, Good cloud service offers the machine learning engine that help to manage the service. It also enables users to build strong learning model to handle different type of operations and functions. This service is evolving, change and introduce on the demand of user as well as high competitive pressure. Big data processing- Big data service is mainly included the data processing, analytics such as big query which made against the multi terabyte data data sets. It intend to process for analytics, extract and load for real time computational projects. It hosting the online service to secure their information through the cloud computing. 5. Discuss about the technique of using the virtualisation service in supporting and implementing the cloud platform Virtualisation is basically type of process that create virtual version which included the computer hardware computer network and storage devices etc. virtualisation is playing important role in cloud for creating of virtual server, devices, infrastructure and other resources. It has ability to run different type of operating system at same hardware (Mondesire and et.al., 2019). It can be divided into different type of virtualisation technique that support the cloud services in proper manner. Network virtualisation- It is a type of method that combine with the available resources in the network system by separatedin the available bandwidth into the multiple channels. It can be assigned to the particular sever at real time operations.This technology help to manage the complexity of network system in proper manner. Storage Virtualising- this technique is provided the facility to user for managing the space of hardware system from the several interconnected storage device into the single storage device (Prakash, 2019). This type of storage technique basically used for the storage area networks. It also manipulating in the cloud mostly useful for backup, recovering and archiving etc. Server Virtualisation- 6
This technique is based on the physical servers which simulates server by changing their processor, identify and operating system. In this way, user continuously managing the complex server resources and make lot of resources required for sharing or utilising. Data Virtualisation- This type of cloud computing virtualisation technique is mainly abstracting the technical details which usually used the data management of performance and location. It is important technique that help for XERO Firm to manage and store their data in an appropriate manner. Desktop Virtualisation- This type of technique enables to emulate a load of workstation than the server. It allows for user to access the desktop through remotely (Sun and et.al., 2018). Each and Every work stations are necessary running in the data centre server which access to both more secure and portable. This type of technique is using to control the overall functionality of desktop system in proper manner. Application Virtualisation- The application virtualisation is a type of software in cloud computing abstract of the application layer which separated it from the other operating system (Suratno and et.al., 2018). It is the best ways to determine that application can run in the form of encapsulated with out being independent. It is providing the level of isolation and application created for the operating system which are completely run from different operating system in proper ways. 6. Dynamic scaling which is supported by cloud computing. Cloud computing is a powerful tool which enables the user to access the resource on demand in Which dynamic scaling helps in creating the virtualised storage for the users. Dynamic scaling of web applications in a virtualised cloud environment helps in providing the ability to grow or shrink the infrastructure resource dynamically as needed to adopt workload changes in an autocratic manner (Abrarand et.al., 2018). It also maximises the uses of resources. It enables the users for Pay-per-use or pay-as-you-grow services. CONCLUSION As per discussion, it concluded that cloud computing is modern technology that help for storage the data through devices. It is based on the networking infrastructure of the Xero which is going to develop its new branch within Sydney. It also discuss about theorganization in developing a effective IT infrastructure to improve the overall performance. It summarised that 7
the logical design of the networking infrastructure within the Xero company which is newly established in Australia. Furthermore, this report is also describing the geographical range of network design which supports the communication and interaction within the systems situated within 8 floor building. It is determine the IP addresses and subnet masking in order to configure the systems within the industry. 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES Books and Journals Bennett, K.W., Ward, D.W. and Robertson, J., 2018, May. Cloud-based security architecture supportingArmyResearchLaboratory'scollaborativeresearchenvironments.In Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX(Vol. 10635, p. 106350G). International Society for Optics and Photonics. Kumar, S. and Kushwaha, A.S., 2018, August. Virtualization Backbone of Cloud Computing- Analysis. In2018 4th International Conference on Computing Sciences (ICCS)(pp. 35- 39). IEEE. Mondesire, S.C. and et.al.,2019. Combining virtualization and containerization to support interactive games and simulations on the cloud.Simulation Modelling Practice and Theory,93, pp.233-244. Prakash, S., 2019. Role of Virtualization Techniques in Cloud Computing Environment. In Advances in Computer Communication and Computational Sciences(pp. 439-450). Springer, Singapore. Sun, J. and et.al., 2018, March. The Research for Virtualization Network Security on Cloud Computing.In20182ndInternationalConferenceonArtificialIntelligence: Technologies and Applications (ICAITA 2018). Atlantis Press. Suratno, B. and et.al., 2018, July. A method for operationalizing service-dominant business modelsintoconceptualprocessmodels.InInternationalSymposiumonBusiness Modeling and Software Design(pp. 133-148). Springer, Cham. Dijkhuizen,N.V.andHam,J.V.D.,2018.ASurveyofNetworkTrafficAnonymisation Techniques and Implementations.ACM Computing Surveys (CSUR).51(3). p.52. Sourek, G. and Zelezny, F., 2019. Efficient Extraction of Network Event Types from NetFlows. Security and Communication Networks. 2019. Li, Z. and et.al., 2019. A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS).4(1).p.3. Abrar, M. and et.al.,2018, February. Real time smart grid load management by integrated and secured communication. In2018 International Conference on Innovative Trends in Computer Engineering (ITCE)(pp. 253-257). IEEE. 9
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.