Network Infrastructure Redesign for Advanced Medicos Limited

Verified

Added on  2025/04/29

|15
|2159
|319
AI Summary
Desklib provides past papers and solved assignments for students. This report details the network infrastructure redesign for Advanced Medicos Limited.
Document Page
CSC00240 – Data Communications
and Networks
Assignment 2
Student name:
Student ID:
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Executive Summary
The purpose of the report lies in summarizing the requirements and specifications for the network
infrastructure of the company Advanced Medicos Limited (AML) which is looking to expand by
opening a new branch office. To facilitate the network among the headquarters and the newly
created branch office, attempts to redesign their existing network infrastructure into a wider
network that can cater to the requirements of all the three buildings. The report begins by touching
on the different business goals, followed by the several technological goals, all of which AML wishes
to meet. Then after analysis of the respective requirements, the study proceeds to explain further on
why and by what means can the proposed network meet all the future requirements of the
company, AML by comparing the various requirements with the functions of the new network and
how it is achieved. Thereafter the overall network layout gets thoroughly discussed as also the roles
of critical parts of the proposed network. From the observations drawn, conclusions are made that
the network design proposed in the report easily meets AML’s future requirements while
successfully addressing all concerns.
2
Document Page
Table of Contents
Student name:...................................................................................................................................1
1. Introduction.......................................................................................................................................4
2. Analysis of User Requirements......................................................................................................5
Requirement Summary and Analysis of Old network........................................................................5
Requirement Summary and Analysis of Proposed network..............................................................5
Network Requirements.................................................................................................................6
3. Description & Analysis of Current Setup with old setup....................................................................8
3.1 Data Transmission.......................................................................................................................8
3.2 Network Hardware......................................................................................................................8
3.3 Physical Network Topologies.......................................................................................................9
3.4 Description..................................................................................................................................9
3.5 Application Summary...............................................................................................................9
4. Conclusions......................................................................................................................................11
List of References................................................................................................................................12
Appendix A..........................................................................................................................................13
Current System...........................................................................................................................13
Appendix B..........................................................................................................................................14
LAN Topology...............................................................................................................................14
WAN Topology.............................................................................................................................14
Old system...................................................................................................................................15
3
Document Page
1. Introduction
This report analyses the requirements and specifications for the network infrastructure of
the company Advanced Medicos Limited (AML) which is looking to expand by opening a new branch
office and presents a requirements summary (Taleb, Bagaa and Ksentini 2015). For facilitating the
network among the headquarters and the newly created branch office, attempts to redesign their
existing network infrastructure into a wider network that can cater to the requirements of all the
three buildings. The report begins by touching on the different business goals, followed by the
several technological goals, all of which AML wishes to meet. Then after analysis of the respective
requirements, the study proceeds to explain further on why and by what means can the proposed
network meet all the future requirements of the company, AML by comparing the various
requirements with the functions of the new network and how it is achieved. Thereafter the overall
network layout gets thoroughly discussed as also the roles of critical parts of the proposed network.
Then the report ends with concluding notes with observations that suggest the proposed network
handily meeting AML’s future requirements.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2. Analysis of User Requirements
Requirement Summary and Analysis of Old network
Building/Location Department
Name
Number
of
Servers
Number of
Workstations
Number
of
Laptops
Number
of
Printers
Number
of Floors
Building A Development
Departments
1 70 0 10 3
Marketing
Departments
1 10 0 4
Building B Production
Departments
1 5 0 4 3
Administration
Departments
5 5 0 2
Requirement Summary and Analysis of Proposed network
Building/Location Department
Name
Number
of
Servers
Number of
Workstations
Number
of
Laptops
Number
of
Printers
Number
of Floors
Building A Development
Departments
1 70 50 10 3
Marketing
Departments
1 10 0 4
Building B Production
Departments
1 65 0 4 3
Administration
Departments
5 13 0 4
Building C Development
Departments
1 20 15 5 3
5
Document Page
Marketing
Departments
1 4 0 2
Primary network required is 172.16.120.0/22
Number of IP addresses available in primary network are 1022
Number of IP addresses required are 290
Number of IP addresses allocated to subnets are 446.
Subnet
Descriptio
n
Size
Required
Size
Allocated
Network
Addresses
CIDR
value Subnet Masks Assignable IP
Address Range
Broadcast
Addresses
Building A 146 254 172.16.120.
0 /24 255.255.255.0 172.16.120.1 -
172.16.120.254 172.16.120.255
Building B 92 126 172.16.121.
0 /25 255.255.255.128 172.16.121.1 -
172.16.121.126 172.16.121.127
Building C 48 62 172.16.121.
128 /26 255.255.255.192 172.16.121.129 -
172.16.121.190 172.16.121.191
Building B
A 2 2 172.16.121.
192 /30 255.255.255.252 172.16.121.193 -
172.16.121.194 172.16.121.195
Building B
C 2 2 172.16.121.
196 /30 255.255.255.252 172.16.121.197 -
172.16.121.198 172.16.121.199
Network Requirements
Communities of users: The dissimilar public of users consuming the network are
corporation managers and executives, overall employees of the four sections and the CxO
level associates (Aydin and Ulger 2016). The CxO level members include the CEO, COO, CFO
and others who are responsible for running the institute from the top.
6
Document Page
Mobility Requirements: The Bring Your Own Device (BYOD) facility is being provided by
letting employees take or bring laptops to and from office as also access the network from
anywhere within company premises (Dawson 2016).
Security Requirements: The network is protected by multi layered security (Acemoglu,
Malekian and Ozdaglar 2016). The firewall acts as the first layer of security while security
applications in individual devices act as the second.
Bandwidth Requirements: Since AML is expanding and will operate with more than 400
members a class B IP 172.16.120.0/22 is assigned with 1022 maximum assignable IPs and a
bandwidth of 2 GB/s.
Application Requirements: The applications in use by the network are Cisco ASA 5505
firewall, Eset Nod32 antivirus, Cisco WebEx and Skype, Remote Desktop, Office 2016, Firefox,
Thunderbird, Windows 10, Tally, Adobe CC7, inhouse tools and company website.
Remote access requirements: Any system within the network can be accessed by
administrators using the remote desktop application.
Performance Requirements: The network is built to easily meet or exceed the future
requirements of AML and is not supposed have issues with direct or wireless access.
Quality of Service (QoS): The network of AML is segment for each of the three building and
hence is finetuned to provide quality service to devices of each building.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3. Description & Analysis of Current Setup with old setup
The previous network of AML composed of two buildings of the headquarters Building A and
Building B being connected through LAN and communications had to be made by accessing the
company web portal (refer to figure 4). In this network Building A operated 80 workstations and 14
printers of the software development department and marketing department combined.
The proposed network of AML comprises of three buildings (refer to figure 1). These are the
two buildings of the headquarters - Building A and Building B connected through a LAN network as
well as a third building – Building C or branch office which connects its devices through its own LAN
and communications which is connected to LAN of the headquarters to form a LAN to LAN wide area
network (WAN) (Leon, Parra and Bermudez 2018). In this network Building A operates 80
workstations, 50 laptops and 14 printers of the software development department and marketing
department combined. Building B operates 78 workstations, 0 laptops and 8 printers. Building C
operates 24 workstations 15 laptops and 7 printers.
Building B acts as the server farm where the web servers, email servers and file servers are
present (Sahinoglu 2018). Other servers in different floors of all buildings serve networking needs of
respective departments.
3.1 Data Transmission
The different cables used to establish the network are:
Fast Ethernet: A Fast Ethernet cable provides data transmission rates around 100 megabits/second
(Dolezilek, Gordon and Anderson 2016). This cable is used to enable direct connections from routers
as also connection to wireless access points.
Gigabit Ethernet: A Gigabit Ethernet cable provides technologies to transmit frames at the rate of 1
gigabit/second (Swartz et al. 2017). This cable is generally used to distribute the network from
switches to the various devices present in the network.
3.2 Network Hardware
The hardware parts that comprise the network are 3 routers, 3 switches, 10 servers, 182
workstations and 35 printers (Wood et al. 2015). Each router facilitates the network for a specific
building. The switches distribute network access to the devices. Most servers are in Building B, the
server farm.
8
Document Page
3.3 Physical Network Topologies
The various networking topologies used in the proposed network of AML
are:
Local Area Network (LAN) (refer to figure 2)
Wide Area Network (WAN) (refer to figure 3)
Wireless Local Area Network (WLAN)
3.4 Description
3.5 Application Summary
Cisco ASA 5505 Firewall: To secure network components and function as firewall, the Cisco ASA
5505 is selected (Konikiewicz and Markowski 2017). This is a standalone device that provides
security for all parts of AML’s network.
Eset Nod32 Antivirus: This is an industry leading anti-virus solution installed on each system to
provide a second layer of security.
Cisco WebEx Meeting: A corporate communication application for video conversations and meetings
and is in use among big, medium and small sized businesses.
Remote Desktop Connection: Remote Desktop Connection is Microsoft’s default connectivity tool
for remotely connecting other systems within the network.
Microsoft Office 2016: This suite of office applications is the latest offering from Microsoft and offers
maximum functionalities and compatibility.
Mozilla Firefox: This is a free and open source web browser that offers comprehensive set of
features offered by few other competing browsers.
Thunderbird: Thunderbird mail is another open source product from Mozilla offering multiplatform
support (Ghiglieri, Henhapl and Gerber 2018). The thunderbird mailing agent is both cost effective
and efficient in terms of performance with respect to competition.
Windows 10: Windows 10, the latest OS from Microsoft is popular its compatibility towards a broad
array of applications and secure framework with support for regular patches and updates.
9
Document Page
Tally: The Tally Software refers to a leading accounting application used by businesses worldwide in
performing financial and accounting tasks as well as ERP related activities.
Adobe Creative Suite 6: This application package is used to perform creative work such as photo or
video editing, business card design and like (Oakes 2016). The Marketing department of AML makes
extensive use of the software.
In house tools: These tools are the ones that are developed by the software development team for
automating task for own benefit and fast tracking of business processes.
Company web portal: The web portal of AML is built owned and hosted by the company themselves
and serves as an interface for communication within the network.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. Conclusions
To conclude the report successfully analyses the requirements and specifications for the
network infrastructure of the company Advanced Medicos Limited (AML) which is looking to expand
by opening a new branch office and presents a requirements summary. For facilitating the network
among the headquarters and the newly created branch office, attempts to redesign their existing
network infrastructure into a wider network that can cater to the requirements of all the three
buildings. The report begins by touching on the different business goals, followed by the several
technological goals, all of which AML wishes to meet. Then after analysis of the respective
requirements, the study proceeds to explain further on why and by what means can the proposed
network meet all the future requirements of the company, AML by comparing the various
requirements with the functions of the new network and how it is achieved. Thereafter the overall
network layout gets thoroughly discussed as also the roles of critical parts of the proposed network.
From the study conducted, it is observed that the proposed network handily meeting AML’s future
requirements.
11
Document Page
List of References
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion. Journal of
Economic Theory, 166, pp.536-585.
Aydin, M.N. and Ulger, C., 2016. Perception of IT Governance in an Emerging Market. Perception,
5(01).
Dawson, P., 2016. Five ways to hack and cheat with bring‐your‐own‐device electronic
examinations. British Journal of Educational Technology, 47(4), pp.592-600.
Dolezilek, D., Gordon, C. and Anderson, D., 2016, November. Fast Fault Detection Isolation and
Recovery in Ethernet Networks for Teleprotection and High-Speed Automation Applications. In
CIGRE Mexico International Colloquium, Mexico City.
Ghiglieri, M., Henhapl, B. and Gerber, N., 2018. Evaluation der Nutzbarkeit von PGP und S/MIME in
Thunderbird. Mensch und Computer 2018-Workshopband.
Konikiewicz, W. and Markowski, M., 2017. Analysis of Performance and Efficiency of Hardware and
Software Firewalls. Journal of Applied Computer Science Methods, 9(1), pp.49-63.
Leon, A.F.H., Parra, O.J.S. and Bermudez, G.M.T., 2018. LAN-WAN-LAN end-to-end Network
Simulation with NS2. International Journal of Applied Engineering Research, 13(17), pp.13136-13140.
Oakes, M.D., 2016. Testing the Viability of a 3D Workflow Using Only Adobe Creative Cloud.
Sahinoglu, M., 2018. CLOUD computing risk management for server farm repair rates, consumer
load cycle, server farm repair crew count, and additional servers. Wiley Interdisciplinary Reviews:
Computational Statistics, 10(2), p.e1424.
Swartz, M., Torres, D.J., Liberatore, S. and Millard, R., 2017. WHOI SDSL data-link project—ethernet
telemetry through sea cables. Journal of Atmospheric and Oceanic Technology, 34(2), pp.269-275.
Taleb, T., Bagaa, M. and Ksentini, A., 2015, June. User mobility-aware virtual network function
placement for virtual 5G network infrastructure. In 2015 IEEE International Conference on
Communications (ICC) (pp. 3879-3884). IEEE.
Wood, T., Ramakrishnan, K.K., Hwang, J., Liu, G. and Zhang, W., 2015. Toward a software-based
network: integrating software defined networking and network function virtualization. IEEE Network,
29(3), pp.36-41.
12
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]