SBM4104: Computer Network Design and Cloud Computing for ABC Company

Verified

Added on  2022/12/28

|20
|2687
|76
Report
AI Summary
This report details the design and configuration of a computer network for ABC Company, addressing IP addressing, subnetting, and the implementation of the OSPF routing protocol across three routers and various networks. The report covers the configuration of router interfaces, static IP addresses for end hosts, and the testing of network connectivity using ping commands. Furthermore, the report explores cloud computing solutions for ABC Company, examining services like SaaS, IaaS, and PaaS, along with a comparison of cloud service providers such as AWS and Microsoft Azure. The report concludes with a discussion on the scalability of web applications in the cloud, highlighting the importance of dynamic scaling and auto-scaling techniques, particularly within the context of AWS. The document offers a comprehensive overview of network design, cloud computing, and scalability considerations for modern IT infrastructures.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
planning and configuring a computer network.
[Document subtitle]
[DATE]
[Company name]
[Company address]
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Part A
Introduction
The computer network design and configuration is very crucial in success of any organization
now a days. In this assessment a network design is shown as given in the below figure, we
need to provide IT infrastructure solution to the organization as per the requirements. The
figure needs to be analysed and network configurations are given in this report.
Figure 1: Network design for ABC Company
For the computer diagram in Figure 1:
NET-A: 192.168.1XY.0/24
NET-B: 10.10.1XY.0/24
NET-C: 172.16.1XY.0/24
XY = student ID last two digit
As the student ID of one of the member of group is 27, so, IP address of network will be
given as
NET-A: 192.168.127.0/24
NET-B: 10.10.127.0/24
NET-C: 172.16.127.0/24
Document Page
In this task you will fill the required information using the IP network diagram:
a. NET-A:
Network/Subnet: 192.168.127.0/24
Net mask: 255.255.255.0
Network address: 192.168.127.0
Broadcast address: 192.168.127.255
Valid host range:192.168.127.1 - 192.168.127.254 (total 254 hosts)
b. NET-B:
Network/Subnet: 10.10.127.0/24
Net mask: 255.255.255.0
Network address:10.10.127.0
Broadcast address:10.10.127.255
Valid host range:10.10.127.1- 10.10.127.254 (total 254 hosts)
c. NET-C:
Network/Subnet: 172.16.127.0/24
Net mask: 255.255.255.0
Network address:172.16.127.0
Broadcast address:172.16.127.255
Valid host range:172.16.127.1- 172.16.127.254 (total 254 hosts)
d. RA - RB subnet:255.255.255.0
e.RB - RC subnet:255.255.255.0
F.NetA subnet mask:255.255.255.0
Network Topology
The network topology shows the network connectivity, the network includes three routers,
three switches and six PCs. Network A has 2 Pcs which is connected to switch 0, the switch
is then connected to Router RA . The second router RB connects RA, RC and net B. The
third router RC connects Net C and RB . Each devices and ports of routers are given IP
address according to the project requirements.
Document Page
Table showing the IP address
Device Interface IP Address/ Subnet Mask
D/Gateway
RA Fa0/0 192.168.127.1/24 To NET A
S0/0/0 192.168.0.254/24 TO RB
RB Fa0/0 10.10.127.1/24 To NET B
S0/0/0 192.168.0.253/24 TO RA
S0/0/1 192.168.1.249/24 TO RC
RC Fa0/0 172.16.127.1/24 To NET C
S0/0/1 192.168.1.250/24 TO RB
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Configure router RA interfaces:
RA(config)#:int F0/0
RA(config-if)#:ip address 192.168.127.1 255.255.255.0
RA(config-if)#: no shutdown
Figure: screenshot for the IP address configuration in RA
RA(config)#:int S0/0/0
RA(config-if)#:ip address 192.168.0.254 255.255.255.255.0
RA(config-if)#:clock rate 6400
Figure: screenshot for the IP address configuration in RA
Configure Routing Protocol
OSPF (open shortest path first) routing protocol is used for configuring Routers . In this
protocol, a router checks the neighbour IP address and cost for that link and creates routing
table. When data flows through the routers from one network to another network, this routing
table is used.
RA(config)#:router ospf 20
RA(config-router)#: network 192.168.127.0 0.0.0.255 area 0
RA(config-router)#:network 192.168.127.0 0.0.0.255 area 0
Document Page
The below figure shows all the IP routes or routing table of RA.
Provide commands to enable routing protocol in RB (same protocol configured in RA)
RB(config)#:router ospf 20
RB(config-router)#:network 192.168.0.0 0.0.0.255 area 0
RB(config-router)#:network 192.168.1.0 0.0.0.255 area 0
RB(config-router)#:network 10.10.127.0 0.0.0.255 area 0
The below figure shows all the IP routes or routing table of RB.
Document Page
Provide commands to enable routing protocol in RC (same protocol configured in RA)
RC(config)#:router ospf 20
RC(config-router)#:network 192.168.1.0 0.0.0.255 area 0
RC(config-router)#:network 172.16.127.0 0.0.0.255 area 0
The below figure shows all the IP routes or routing table of RC.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Static IP address Configuration of network A PCs
The IP address of each end hosts needs to be given for identifying the address , as source or
destination in data flow in the network.
Document Page
Document Page
Static IP address Configuration of network B PCs
Static IP address Configuration of network C PCs
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RB IP configuration
Testing connectivity of the network
Ping command is used for testing the connectivity of any network, as it is a two way
communication, which shows the sending ICMP message and reply from the destination to
source.
1. Within NETA
As shown in the below screenshot, the ping test is successful. The local network does
not need any routing protocol for taking the data from source to destination. This data
flows in layer 2 of the OSI model. The MAC address is utilized for this type of data
flow, the data flowing from IP 192.168.127.2 to IP address 192.168.127.100 flowing
from PC0 to switch then from switch to PC1.
Document Page
2. With default router of NETA
As shown in the below screenshot, the ping test is successful.
The default router in this case is RA, having the IP address 192.168.127.1.
3. Network A to network B (PC0 to PC2)
Document Page
4. Network A to network C (PC0 to PC4)
The network A is having the IP network address 192.168.127.0/24 and network C is having
IP network address 172.16.127.0/24 , both are having different network address so , the
routers need to take care of data flow between them , first the source is 172.16.127.100 , the
data coming out of this device goes to the default router , which has IP 172.16.127.1 , this
router is running OSPF routing protocol, the protocol decides the shortest path knowing the
destination IP as 192.168.127.2 . The data goes to the second router RA and again this is sent
to RA , at last the data is received by the destination successfully . The ping command gives
acknowledgment to the source, all data is received successfully.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
Cloud Computing of ABC Company
The organization needs IT infrastructure, database servers and complex platform and
software for running its business. All these services and operation needs maintenance,
adaptability, and lots of investment, the It firms provides these as cloud and reducing lots of
efforts of the organization. The cloud services like web hosting, email services, storage are
provided by third party reducing the computational power needed with the on-demand
services.
Software as a Service (SaaS) is the upkeep, support and different tasks done by the product is
effectively sensible by utilizing SaaS. Infrastructure as a Service (IaaS) provides the extra
room, association’s servers and so on are overseen and scaled with no need of obtaining IT
foundation, and this is useful for the business as it don't need to require additional exertion
for IT framework of its organization. This additionally gives stage to the product of the
organization to run. Platform as a Service (PaaS) is application's arrangement, scaling relies
upon the stage that is given by the cloud. A portion of the notable organizations that give this
office are Google App Engine, power and so forth. This kind of administrations is gainful for
new businesses organizations and other IT organizations as they are free from the tumultuous
apparatuses and applications required for building up their items. The versatility and porting
of the current applications are simple with little administration required.
Organizations that provide cloud services:
1. Amazon Web services (AWS), (AWS. (2019). )
Amazon cloud service provider is top company that provides more than 100 services
in this field which includes cloud computing, application deployment and
development, infrastructure management and security.
The various services can be categorized as follows:
Data management: Oracle, SQL Server, PostgreSQL, MySQL are some of the
applications in this category that is provided under relational database
management services. (Mannava, (2012).)
Storage: this service is used to store data and files as S3 objects, which is like
a backup and used for other applications.
Computing: the instances also known as virtual servers provide wide range of
computing facility to the users.
Networking: the network traffic balancer, virtual private cloud are some
services that comes under this category. This services is used to provide
administrative control and traffic balancing.
Document Page
Application and development: The software development kits (SDKs), and
Amazon command line interface equips users to develop and manage
applications and software.
Big Data: Analytics of large data files and management is very critical in
today’s business functionality.
Security:Theuser’s authorization and access is controllable in Amazon cloud
to provide better security.
2. Microsoft cloud computing and services
According to Hong Son (2017) Microsoft Azure is second most important firm
providing cloud services and these services can be categorized into 18 products.
These services include all types of services PaaS, SaaS, IaaS and some are given
below
Migration: the workload is migrated for better operation of the organization.
Mobile: The cloud application is developed for mobile devices.
DevOps : The collaboration tools and various projects are integrated for build
test and experiment.
AI and machine learning
Security
Database
Web services
Internet of things: This provide the seamless and reliable network and control
to devices in IOT applications.
Data storage
Analytics
Network
Scaling of Web Applications in a Cloud
According to Carretero (2014) The organization having IT infrastructure and web services
needs scalability in their business for running and cope up with its business in competitive
market. This could be very hectic, time consuming and costly, but those can be made simple
by using cloud computing and web services. The cloud computing uses advance technologies
to scale the resources as per the demand of the users in no time. According to Giessmann
(2016)The virtual servers, load balancers are some applications that can be used by the users
for traffic routing and this is installed in virtual machine instances. (
The need for scaling the web resources can be indicted by
The current users using the web applications
The active users having connections
Response time in average
The per second request by the users
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
According to Kernelthread (2019).These are analysed by cloud computing applications and
virtual instances are created and deployed accordingly. (
According to Fallah (2015)The load balancer needs to route the traffic according the number
of user request and response time, this will be provide dynamic access of web servers.
The dynamic algorithm running in the back ends will analyse the trigger and scale up or
down the application requests by newly creating instances that is temporary in nature. The
IBM Tivoli provisioning Manager (TPM) is one example software that automate this scaling
task. (AWS. (2019).)
Figure: Auto scaling in Amazon AWS (Shahzad (2013))
In amazon AWS the cloud based auto scaling is done in following steps ( Das (2018).)
Step 1: Cloud Watch Custom Metric creation
SQS get queue attributes command
Document Page
To know the running capacity of the group
Put metric data command
Step 2: Create a Target Tracking Scaling Policy
Scaling policy is created by following command
Step 3: Testing the scaling policy
Document Page
Summary
In this project the network was designed and configured in task A, which includes routing
protocols and allocating IP address to the networking devices.The IP address allocation to
tehe devices including end hosts like PCs and router ports are done according to the project
requirement . After IP allocation the routing protocol is setup in each routers for routing the
data from one local network to other, as this network consists of 5 different networks, two
connecting the routers and three for local networks namely NetA, Net B, and Net C.IN task B
the cloud computing was investigated for ABC IT infrastructure, the organizations that
provide various services are analysed and the deployment was discussed according to the
need of the company. The scalability of cloud infrastructure is very important in current
scenario as the response time and number of request increases or decreases drastically for a
web based services. So, according to Lee (2014) in this report the dynamic scaling of cloud
services is discussed in detail with demonstration in Amazon AWS. All the process and steps
are shown as screenshots in this report.
List of References
Ali, H. (2015). Cloud Computing Security: An Investigation into the Security Issues and
Challenges Associated with Cloud Computing, for both Data Storage and Virtual
AWS. (2019). what is Amazon Web Services (AWS)? - Definition from WhatIs.com. [Online]
Available at: https://searchaws.techtarget.com/definition/Amazon-Web-Services [Accessed 4
Sep. 2019].
Carretero, J. and Blas, J. (2014). Introduction to cloud computing: platforms and
solutions. Cluster Computing, 17(4), pp.1225-1229.
Das, A., Iyengar, A. and Mueller, F. (2018). KeyValueServe†: Design and performance
analysis of a multi-tenant data grid as a cloud service. Concurrency and Computation:
Practice and Experience, 30(14), p.e4424.
Fallah, M., Ghobaei Arani, M. and Maeen, M. (2015). NASLA: Novel Auto Scaling
Approach based on Learning Automata for Web Application in Cloud Computing
Environment. International Journal of Computer Applications, 113(2), pp.18-23.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Giessmann, A. and Legner, C. (2016). Designing business models for cloud
platforms. Information Systems Journal, 26(5), pp.551-579.
Hong Son, N. (2017). Load Balancing in Auto Scaling Enabled Cloud
Environments. International Journal on Cloud Computing: Services and Architecture, 7(5),
pp.15-22.
J Wettinger(2016) Enhancing Cloud Application Develops Using Dynamically Tailored
Deployment Engines. Services Transactions on Cloud Computing.
Kernelthread.com. (2019). An Introduction to Virtualization. [online] Available at:
http://www.kernelthread.com/publications/virtualization/ [Accessed 4 Sep. 2019].
Lee, G.2014. “Cloud networkingCloud Networking: Understanding Cloud-based Data Centre
NetworksMorgan Kaufmann,1stedition,San Francisco, CA, USA
Mannava, V. (2012). Composite Design Pattern for Feature Oriented Service Injection and
Composition of Web Services for Distributed Computing Systems with Service Oriented
Architecture. International journal of Web & Semantic Technology, 3(3), pp.73-84.
Shahzad, A. and Hussain, M. (2013). Security Issues and Challenges of Mobile Cloud
Computing. International Journal of Grid and Distributed Computing, 6(6), pp.37-50.
Yaish, H., Goyal, M. and Feuerlicht, G. (2014). Multi-tenant Elastic Extension Tables Data
Management. Procedia Computer Science, 29, pp.2168-2181.
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]