Ask a question from expert

Ask now

Project Report on IT Infrastructure in an Organization

22 Pages5978 Words247 Views
   

Added on  2019-11-26

Project Report on IT Infrastructure in an Organization

   Added on 2019-11-26

BookmarkShareRelated Documents
Running Head; IT INFRASTTRUCTURE1IT InfrastructureNameAffiliate Institution
Project Report on IT Infrastructure in an Organization_1
Running Head; IT INFRASTTRUCTURE2Table of ContentsIntroduction.................................................................................................................................................3IT Infrastructure Components......................................................................................................................3Hierarchical Model......................................................................................................................................4Current and Future Itech IT Infrastructure Requirements............................................................................7Geographical Scope of the Network............................................................................................................8Scalability of iTech Network.......................................................................................................................9Dedicated Server.........................................................................................................................................9Logical Network Design............................................................................................................................10Cloud based design....................................................................................................................................12Access Layer Diagram..............................................................................................................................12Configuring DHCP....................................................................................................................................13Configuring a DNS Server........................................................................................................................14Configuring a Web Server.........................................................................................................................15How Clients Obtain Network Configuration Automatically......................................................................19Conclusion.................................................................................................................................................20Recommendation.......................................................................................................................................20References.................................................................................................................................................21
Project Report on IT Infrastructure in an Organization_2
Running Head; IT INFRASTTRUCTURE3IntroductionThe objectives of this report is to develop a logical design for the data center building for iTechcompany. It should include a set of required servers, network devices and their connections. Thisreport will also focus on IT infrastructure components, the several types of dedicated servers,cloud computing and network simulation. The current network setup in iTech is poorly designand wants it replaced completely by considering either dedicated server techniques and cloudhosting.IT Infrastructure ComponentsSwitchesA network switch is an equipment that offers connectivity between a Local Area Network andnetwork devices. A switch has several ports that connect directly to other network apparatus, forexample servers, routers and other switches. Switches enable two devices on the network tocommunicate with each other without broadcasting traffic to other devices on the network. Furht,& Escalante, (2010). RoutersRouters enhance movement of packets across networks. Routing allows devices on differentnetwork segments to talk to each other by resolving the route that will enable the network packetto reach its destination. In most cases the default gateway value on a workstation connected to anetwork is normally the IP address of the router.FirewallsFirewalls are the first level security of any network. It can be regarded as the gatekeeper. A set ofguidelines determines the kind of network traffic to be blocked or passed through the firewall.Rules can be developed in the simplest way of a firewall to allow unique port from a group ofdevices to another cluster of devices. For instance: two firewall rules from hosting a web serverwith limited web traffic, would typically look like this:SourceDestinationProtocolDescriptionAny10.0.1.8090 / httpWeb traffic acceptedAny10.0.1.80334/ httpsSecure web traffic acceptedOriginating device in this case is the source. Any means that computers can talk to each other.Destination on the other hand represents internal web server IP address. Protocol describes thetype of traffic permitted from the source to the destination. Reese, (2009).Servers
Project Report on IT Infrastructure in an Organization_3
Running Head; IT INFRASTTRUCTURE4A network server is a super computer that has more resources in terms of capacity, speed amongothers. A server allows several users to share and access its resources simultaneously. There arevarious types of servers including the file server which provides a common location for storingfiles for it end users. They can also be configured to limit access of specific files by users.Directory server is another type of server which provides centralized database of accounts forusers. Therefore, it facilitates easy management of client credentials used to explore serverresources. Web server is the most common form of server that uses Hyper Text Transfer Protocol(HTTP) that enables user to access files through a web browser. Others include print servers,application servers and database servers. Abdoulaye, (2014).Physical plantThis is the actual layout of network devices in the server rooms, data center and office spaces.This infrastructure is often ignored yet very crucial and failure to manage it properly can causesystem downfall. For example, if cables are not laid out well on the floor or along the walls,users can accidentally pull the off thus cutting short resource access. The two main cablinginfrastructure are fiber and CAT 5/6/7. PeopleAlthough people are not regarded as part of the network infrastructure capabilities of a companycan be limited if there are inadequate qualified and competent individuals to run and maintain theinfrastructure. In larger firms, there are reserved positions for every sector of the networkinfrastructure. However, for smaller companies, the system administrator can manage theseduties. Server rooms / Data centerIn large companies, the server room is considered to be the backbone of the network setup. Thisis where all the servers are installed and acts as the central core of several networks.Infrastructure SoftwareServer operating system is considered the grayest component. If there were no multi-useroperating systems, then infrastructure functions could not have been achieved.Hierarchical ModelIntroductionA hierarchical network model entails splitting a network into separate exceptional and uniquetiers. In the hierarchy, every tier or layer, provides discrete functionalities that describes itsresponsibilities and roles in the network. This will aid the network architect and designer inselection and optimization of the correct network software and hardware features to executedistinct functions for that particular network tier. Hierarchical design is applicable to wide areanetwork and local area network models. Heisterberg & Verma, (2014).Subdivision of flat network into smaller segments have several advantages one of which is toensure that internal traffic continue being local. Traffic that is intended for other different
Project Report on IT Infrastructure in an Organization_4
Running Head; IT INFRASTTRUCTURE5networks is shifted to a higher tier. A typical enterprise hierarchical LAN campus networkdesign includes the following three layers:The Access Layer This layer manages workgroup and client connection to the components on the network. Thislayer normally assimilates access points and Layer 2 switches that offers connectivity betweenservers and workstations. Also one can create separate collision domains, regulate access controland policy, and actualize port security at this layer. Laan, (2013).In a Local Area Network setup, theaccess tierdisplayed accord end equipment entry to thenetwork. For the Wide Area Network domain, it may dispense remote sites access to thecompany network. The highlighted zone in the diagram below, is the access layer.This layer has a number of functions. This includes; spanning tree, layer 2 switching, highavailability, virtual access control lists, marking and classification of quality of serviceboundaries, Port security and inspection of address Resolution Protocol (ARP).The Distribution Layer Distribution layer serves as the intermediary between the core and access layer. Its fundamentalduty is to provide Wide Area Network access, filtering, routing and to decide how core can beaccessed by packets. It also determines the quickest technique that network service calls areaccessed. For instance, how a resource request is directed to a server and, if compulsory, sendsthe request to the core layer. This layer normally contains multilayer switches and routers. Laan,(2011).
Project Report on IT Infrastructure in an Organization_5
Running Head; IT INFRASTTRUCTURE6Data gathered from the access tier switches is aggregated by the distribution layer beforeforwarding it to the core tier for transporting to its end. The highlighted area shows thedistribution tier.The distribution tier component is the centerpiece for the wiring cabinet. Workgroups are eithersegmented by a router or a multitier switch. Some of the functions attributed to this layerincludes; upstream services for several access layer switches, aggregation of WAN or LANlinks, for route summarization and aggregation boundary designed on conjoins toward the coretier, routing services between VLANs, routing domains, and LANs, action-based security in thestructure of access control lists and sifting, repetition and load balancing. Rensin, (2012).The Core LayerThis layer is the network backbone and is bound to transfer huge volume of traffic fast. Itcoordinated distribution layer devices it usually. The core contains high speed devices includinghigh end switches and routers with oratorical links. They are structured to swap packets quicklyinterconnect many network equipment, like the wide area network edge, service modules, thedata center, and distribution modules. The highlighted section in the figure below shows the corelayer.
Project Report on IT Infrastructure in an Organization_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Infrastructure | Report
|23
|4709
|119

SBM4104 IT Infrastructure- Project Report
|20
|3730
|206

Computer Networking | Assignment-2
|15
|524
|22

(Solved) Assignment on IT Infrastructure | iTech
|17
|3262
|401

SBM4104 - IT Infrastructure
|21
|2752
|243

IT Infrastructure for Compname.org.au: Network Solution Proposal
|19
|3051
|347