The report describes the backbone devices and logical network design for the development of a new branch in Sydney city centre for Care Australia. It focuses on improving communication and business performance through the sharing of information and files.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SBM4104 IT INFRASTRUCTURE SBM4104 IT Infrastructure Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 SBM4104 IT INFRASTRUCTURE Table of Contents Introduction................................................................................................................................2 Geographical Scope...................................................................................................................2 Logical Design...........................................................................................................................4 IP address and Subnet mask.......................................................................................................4 Cloud Providers..........................................................................................................................6 Techniques supporting virtualization and cloud computing......................................................8 Dynamic Scaling Using Cloud computing...............................................................................10 Summary..................................................................................................................................12 References................................................................................................................................13
2 SBM4104 IT INFRASTRUCTURE Introduction The report is prepared for Care Australia that have the mission of working around the world for saving lives, defeating poverty and achieving social justice. They focus on putting girls and women’s in the centre for providing them equal rights and opportunities and ending poverty. The organization have the need to open a new branch in Sydney city centre and the report describes about the back bone devices and logical network design for the development of the network and connect it with the main and emergency location for sharing of information and files and improve their communication and business performance. Geographical Scope Currently the organization work over a large geographical area such as Asia-Pacific, Middle East, Africa and emergency location for accomplishment of the mission and vision. For interconnectingtheirdifferentareasof operationleased lineand translink fiber connection. Fibre optics cables are the main backbone of their connection and the following network diagram is created for visualizing the geographical scope of the network.
3 SBM4104 IT INFRASTRUCTURE Each of the local area network is connected with the internet and it uses VPN client software for transmitting the data packets over the distributed network. An analysis is made on the current network usage by segmenting the network, users and applications. The network is segmented into smaller lan for each of the location and a local server is used for connecting the internet of the branch with the other branch via the internet. SSL connection is used for securely transmitting data packets and keep the organizational information secured from external agents. The Lan is sub divided into multiple VLAN depending on the number of department and users working under on that branch. The users are also managed according to their needs of bandwidth and assigned to a high speed VLAN for improving their performance.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 SBM4104 IT INFRASTRUCTURE Logical Design The design is created following the three-layer hierarchical model and redundant links are used for connecting the distribution layer devices such that the data traffic can reach the destination address using different path and no data is lost. A firewall is used in the core layer for management of the incoming and outgoing of data packets in the network and increasing the security of the network framework. IP address and Subnet mask Major Network:192.168.16.0/20 Available IP addresses in major network:4094 Number of IP addresses needed:1200 Available IP addresses in allocated subnets:2032 About50%of available major network address space is used About59%of subnetted network address space is used
5 SBM4104 IT INFRASTRUCTURE Subn et Name Neede d Size Allocat ed Size AddressMas k Dec MaskAssignable Range Broadcast Floor 1 150254192.168.1 6.0 /24255.255.25 5.0 192.168.16.1 - 192.168.16.2 54 192.168.16.2 55 Floor 2 150254192.168.1 7.0 /24255.255.25 5.0 192.168.17.1 - 192.168.17.2 54 192.168.17.2 55 Floor 3 150254192.168.1 8.0 /24255.255.25 5.0 192.168.18.1 - 192.168.18.2 54 192.168.18.2 55 Floor 4 150254192.168.1 9.0 /24255.255.25 5.0 192.168.19.1 - 192.168.19.2 54 192.168.19.2 55 Floor 5 150254192.168.2 0.0 /24255.255.25 5.0 192.168.20.1 - 192.168.20.2 192.168.20.2 55
6 SBM4104 IT INFRASTRUCTURE 54 Floor 6 150254192.168.2 1.0 /24255.255.25 5.0 192.168.21.1 - 192.168.21.2 54 192.168.21.2 55 Floor 7 150254192.168.2 2.0 /24255.255.25 5.0 192.168.22.1 - 192.168.22.2 54 192.168.22.2 55 Floor 8 150254192.168.2 3.0 /24255.255.25 5.0 192.168.23.1 - 192.168.23.2 54 192.168.23.2 55 Cloud Providers Microsoft’s Office 365 Business Essentials:Office 365, offered by Microsoft, is an effective application for hosting email and web servers. The organization Standards Australia can utilize the enterprise oriented plans offered in Office 365 to access the cloud hosted versions of MS office server platforms on a SaaS (Software as a Service) basis. It includes Exchange Online, which is a hosted version of the traditional Microsoft Exchange Server or Outlook Web. The company can opt for an Office 365 subscription and avail the joint cloud services featuring Office suites, email hosting, file sharing and many other facilities (Wilson, 2016). Office 365 email subscription will save significant amount of time by means of eliminating hardware or software maintenance as well as avoiding costly downtimes. In
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 SBM4104 IT INFRASTRUCTURE addition to that, this cloud based powerful email package supports 15 MB of attachments and 50 GB of storage per user. Moreover, it offers 1 TB online storage with respect to the One Drive account. The organization can further benefit from the third party solution with their seamlessly integrated email solution, which naturally guarantees more efficiency and rapid application loading saving lot of time and energy for the employees (Mark Grysiuk, 2018). Furthermore, it will provide the company with the ability to easily scale as well as update the applications using its automated and standardized functionalities. Along with that, the company no more needs to worry about additional security and compliance with the Office 365 subscription to an effective and secure cloud based email solution. Amazon’s WorkMail:Amazon offers managed, secure business calendar and email hosting services with support for existing mobile and desktop email client applications. The organization can utilize this cloud based solution to access their contacts, emails and calendars in a seamless fashion using the client application of their choice (Android email apps, native Ios, Microsoft Outlook or any other application supporting the IMAP protocol), or even through a web browser directly (Nadon, 2017). If the company integrates Amazon WorkMail with its existing corporate directory, it would enable them to meet the important compliancerequirements.Thiscloudemailserviceismanaged,secure,availability, accessibility and cost efficiency. It will enable the employees of Standards Australia to easily synchronize emails, calendars and contacts with Android, iOS or even Windows Phone. Moreover, with the security and compliance features of Amazon WorkMail, integration with different clients and devices is possible. For example, it synchronizes with the existing MS Active Directory in order to enable users to access the mailboxes through the already existing credentials. Apart from that, it also encompasses enterprise grade security where all of the organization’s data is automatically encrypted (Nadon, 2017). Along with that, the company will be able to retain full control over the locality of its data by means of selecting the AWS
8 SBM4104 IT INFRASTRUCTURE (Amazon Web Services) region where the data will be stored. Therefore, by implementing AmazonWorkMail,StandardsAustraliawillbeabletomanageitscorporateemail infrastructure in an effective and efficient manner and at the same time, eliminate the need for making upfront investments in terms of license and on-premises email server provisioning. Techniques supporting virtualization and cloud computing Service virtualization in cloud computing enables the developers to continue the developmentofapplicationsevenwhenoneormorecomponentsaremissing.This virtualization technique enables integrated and rapid testing that helps the developers to meet deadlines and deliver the application in a timely and efficient manner (Kumar and Kushwaha, 2018). There are different techniques of using service virtualization in supporting and implementing cloud platforms. Virtualization of the cloud platforms enables long term cost reduction, high scalability, disaster recovery, as well as the ability to test operating systems, kernels and software applications in a safe manner (Kumar and Kushwaha, 2018). The techniques of server virtualization are discussed below: Application virtualization:Users will have remote access to a specific application through a server. This particular server is responsible for storing all the personal information of the application along with its other characteristics. It can still run through internet on a localworkstation.Thisparticularvirtualizationabstractstheapplicationlayerby distinguishingitfromtheoperatingsystem(OS)(JainandChoudhary,2016).This virtualization approach enables the users in overcoming the issues related to the application’s incompatibility with respect to the faults such as bags, existing hardware etc. Networkvirtualization:Thistechniquecombinestheavailableresourcesina particular network by dividing the bandwidth into separate channels where each of them are
9 SBM4104 IT INFRASTRUCTURE significantly distinguished. These bandwidths can be assigned to a device or server in real time. On top of a single physical network, it will co-exist, that facilitates the creation and provision of virtual networks including firewalls, routers, load balancer, logical switches, workload security and VPN or Virtual Private Network. Storage virtualization:This virtualization technique is hassle free and cost effective where all the data pertaining to the company can be transferred from multiple physical hard drives into one virtual storage. In this technique, a central console is created for operating the storage in order to simplify the overall management process (Haoet al., 2015). This technique manipulates the storage in the cloud most commonly for backup, recovery and archivingofdata.Ithidestherealandphysicalarchitecturecontainingthestorage complexity. In other words, the storage virtualization technique implements a single storage device that multiple servers can utilize. Desktop virtualization:This virtualization technique allows the operating system of the user to be stored remotely on a server situated in the data centre. This approach enables the users to access the desktop virtually irrespective of the location of the user’s machine. Users may have virtual desktops to access a particular operating system. The desktop virtualization technique provides several benefits including portability, user mobility, and easy management of software patches, updates and installation. This technique involves a modern strategy that is largely implemented in the modern business world in order to transfer data from one system to the other. Dynamic Scaling Using Cloud computing Theuseofthecloudcomputinghasbeenhelpingindifferentwaystothe organization. Scalability has been a critical success of every organization working in the web servers. Scalability has been an ability for an application for expanding for meeting enterprise
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 SBM4104 IT INFRASTRUCTURE business expectationsand requirements(Lehrig, Eikerling and Becker 2015). Scalable applications have been operating at growing stage and utilize resources with time for providing enhanced services to customers. The main problem with internet application has been inability of planning ahead prediction of amount of user accessing. Therefore, cloud computing has been the solution to this issue with web application Cloud computing has been associated with providing various type of services to the users (Coutinho et al. 2015). It also routes these requests towards web servers that has been hosting identical web applications. The web applications have been implemented in Apache HTTP servers installed in Virtual machines. For controlling actions of provisioning web server virtual machines, a dynamic scaling algorithm related to relevant threshold and scaling indicator have been used. This scaling indicator have different active sessions in every application. The utilize of load balancer including Apache HTTP load balancer have been allowing HTTP request for routing web servers and host web applications. The service monitor subsystem has been responsible for gathering scaling indicators for web applications and calculate their moving age. This technique manipulates the storage in the cloud most commonly for backup, recovery and archiving of data. It hides the real and physical architecture containing the storage complexity (Aljawarneh and Yassein 2016). A agent for monitoring has been installed in each web applications for tracking number of active sessions. Scale up or down of an event have been triggered for instructing provisioning subsystem for starting and shutting down server virtual machine in cloud. This technique manipulates the storage in the cloud most commonly for backup, recovery and archiving of data. It hides the real and physical architecture containing the storage complexity. Automated scaling feature have been including some vendors and rules and policies for expressing deal with user and virtual machine. There have been more abstract frameworks that convey automation.
11 SBM4104 IT INFRASTRUCTURE Scaling algorithm has been installed in service monitor subsystem and used for triggering scale up and down in the provisioning subsystem over virtual machine. The algorithm determines recentweb applications instances having active sessions above or below threshold numbers. Vertical scaling has been diminishing server for increasing the capacity of existing infrastructure by adding extra resources. It synchronizes with the existing MS Active Directory in order to enable users to access the mailboxes through the already existing credentials. Apart from that, it also encompasses enterprise grade security where all of the organization’s data is automatically encrypted There is no code and infrastructure changing done in vertical scaling (Chang, Kuo and Ramachandran 2016). In case of vertical scaling, there us a scope of changing infrastructure and coding. Horizontal scaling include services for being independent and spate servers can be called. In other words, the storage virtualization technique implements a single storage device that multiple servers can utilize. Cloud providers have been providing auto scaling that can even further help in managing human resources. The use of cloud computing has been helping in mainlining a keen approach in the development if the organization in the market.The use of different services of cloud computing has been helping in creating a specific approach to the development of the company. The load balancing factor p the cloud computing has been helping in scaling up the services and infrastructure of the system. The delay with peak users have been depended in the resource consumption for balancing the work load available on unused resources. The organization can further benefit from the third party solution with their seamlessly integrated email solution, which naturally guarantees more efficiency and rapid application loading saving lot of time and energy for the employees. The testing of scaling up applications can be done using the cloud environment. There are various cloud services including IaaS cloud have been dealing with the single virtual machine management.
12 SBM4104 IT INFRASTRUCTURE Summary From the above report it can be summarized that the cloud computing can be adopted by the organization for sharing of files and information between the branches and increase the flexibility of the proposed network. For the development of the report an analysis is made on the current structure of the organization and building plan for the development of the new network solution. An analysis is also made on the number of users using the network for the development of the IP addressing plan. A proposal for cloud service that can be adopted by the organization for hosting email web is given in the report. The techniques of virtualization and supporting implementation cloud is also discussed. The support of cloud computing for dynamic scalability is also given that would help the organization to increase the flexibility of the proposed network framework.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14 SBM4104 IT INFRASTRUCTURE Nadon, J., 2017. AWS Enterprise Applications. InWebsite Hosting and Migration with Amazon Web Services(pp. 235-249). Apress, Berkeley, CA. Nadon, J., 2017.Website Hosting and Migration with Amazon Web Services: A Practical Guide to Moving Your Website to AWS. Apress. Wilson, K., 2016.Essential Office 365. Elluminet Press.