Telstra's IT Infrastructure Management: Solutions and OSI Model

Verified

Added on  2023/04/08

|14
|2799
|52
Report
AI Summary
This report provides an overview of IT infrastructure management at Telstra, a leading technology and telecommunications company in Australia. It discusses Telstra's use of information technology to improve customer care and support its global enterprise services. The report details the types of data used by the organization, including internet subscriber information and average revenue per user (ARPU), and proposes two IT infrastructure solutions for data storage and access: mobility solutions and cloud storage. It also identifies the network devices required for day-to-day activities, such as network hardware, transmission media, repeaters, switches, bridges, hubs, routers, and gateways, and lists application software needed for data communications, including MightyCall VoIP Solution, RingCentral, 8x8 Phone Service of VoIP, and Slack. Finally, the report explains the seven layers of the OSI model and their relevance to network communication.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT INFRASTRUCTURE MANAGEMENT
IT Infrastructure Management in Telstra
Name of Student-
Name of University-
Author’s Note-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1IT INFRASTRUCTURE MANAGEMENT
Table of Contents
1. Background of the organization and use of Information Technology in Telstra.........................1
2. Types of data used by the organization and use of data by the staffs. Two solutions for IT
infrastructure for storing as well as accessing data.........................................................................2
3. Network Devices required to achieve day to day activities in Telstra........................................4
4. Application software needed for data communications...............................................................5
5. Seven Layers OSI model.............................................................................................................7
6. Summary......................................................................................................................................8
References......................................................................................................................................10
Document Page
2IT INFRASTRUCTURE MANAGEMENT
1. Background of the organization and use of Information Technology in
Telstra
Telstra, a leading technology and tele-communication company in Australia. Telstra
offers full range communication services and provides a tough competition for the tele-
communication market in Australia. Telstra provides over 17.7 retail services of mobile with 4.9
million services for retail voice and 3.6 million service for fixed broadband. Being one of the
leading information as well as tele-communication Service Company, Telstra is proud of its
business processes and is very happy to help all their customers to improve their way of living by
providing secured connection (Skees 2016). For improving the customer care service, Telstra has
implemented information technology as well as the solutions of IT with very easy to use facility.
This has made Telstra the largest as well as fastest mobile network in Australia. After
implementing technology solutions, they could serve their customers much better and know their
customers in a better way offering them to have a digital choice.
The Telstra in Australia is transforming its IT infrastructure that helps to support the
Global Enterprise and the Services involved in B2B unit. This helps to supply the services to a
wide enterprise making the market internationally (Koek et al. 2015). The information
technology project has made the company to become its first cloud to focus on using the data in a
better as well as interfaces of application programming. The project of Information Technology
is phased for two years in Telstra and the company is trying to minimize the disruption to the
customers for legacy platforms.
Telstra has a wide range of computing strategies and it is organized in the business
engagement and the platform groups. The organization’s main IT focus is to implement cloud
Document Page
3IT INFRASTRUCTURE MANAGEMENT
based system, along with API-driven as well as data centric process. The leadership team of IT in
Telstra is integrated tightly and have moved the integrated groups to some engagement groups
and related platform capabilities for delivering all developed reusable engines with the business
needs based on the priorities.
2. Types of data used by the organization and use of data by the staffs. Two
solutions for IT infrastructure for storing as well as accessing data
Telstra use data such as Internet Subscribers, the average revenue that is used by per
user, and the minutes of using of data by per user (Aldossary and Allen 2016). The average
revenue per user is known as ARPU and is primarily used by the consumer communication as
well as networking companies that are defined as total revenue divided by total number of
subscribers.
Securing all stored data in an organization includes preventing the authorization of the
people from the data being accessed and preventing the accidents of data and the intentional
destruction, infection, as well as corruption related to information. Encryption of data is one of
the most popular technique of securing the data and can be implemented for the strategy of data
security. There are many ways to secure data that involves understanding the threats that are
applicable, aligning proper defense layer as well as monitoring continuously of all the activity
logs that are to be taken in to action.
The two IT infrastructure solutions that can be used to store and access the data at a
database are explained below:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4IT INFRASTRUCTURE MANAGEMENT
Mobility Solutions: There are modern business processes who have the ability to interact
with the customers, assets, products, and employees in the basic requisite. Modern
transformation of Digital transformation has become the enterprise mobility of the organization.
The concept included in mobility can be extended to strategic conversation that includes the end
users, how the content is consumed and with the efficient that the service is delivered, its security
capabilities, and the device connected to end point (Kumar, Vealey and Srivastava 2016). The
mobility solution in an organization can incorporate directly some good strategy of
infrastructure. The strategy in the infrastructure should revolve in the ability of the company for
enabling as well as empowering the workforce giving greater freedom access to freedom for the
resources and the information.
The global data traffic in mobile will help to increase the tenfold between the year 2014
and 2019. Because of increased use of smart phones, the smart phones will reach in the quarter
of the mobile traffic. The mobility spans are much further compared to a device or to the access
point.
Cloud Storage solution: The cloud storage is a method that stores, retrieves and share the
data that are simple, scalable, as well as reliable (Omnes et al. 2015). This cloud storage helps to
store the data on Internet via provider of cloud computing that manages as well as operates the
service of data storage. The cloud storage is delivered on demand with the time capacity and the
cost by eliminating the buying as well as managing the storage infrastructure of data. The cloud
storage gives agility, durability, and global scale with data access.
The cloud storage is generally purchased from some vendor of third party cloud who
operates the capacity of data storage and then delivers the data over Internet in a different model.
The vendors of cloud storage can manage the capacity, durability, and security for making the
Document Page
5IT INFRASTRUCTURE MANAGEMENT
data accessible for applications around the world (Borylo et al. 2016). The applications access of
the cloud storage via traditional protocols of storage or through API. There are many vendors
that offers complementary service that are designed to collect, manage, data analyze as well as
secure the data at large scale.
The benefits of cloud storage is that it helps Telstra to reduce the purchase of hardware,
the storage provision and capital that is being used for some scenarios (Kumar, Vealey and
Srivastava 2016). The cloud storage allows the IT to deliver exact amount of storage that is
needed. This helps to solve the problems of complex applications instated of managing the
storage systems.
3. Network Devices required to achieve day to day activities in Telstra
Network Hardware: For setting up the network of computer in Telstra, network hardware
is needed. All the employees should have computer as well as printers and peripheral devices in
the organization.
Transmission Media: Transmission media is one of the most important network devices
in Telstra. The transmission media involved in a computer network mainly explains all the
substances having some energy waves. This helps to enhance transmission of data (Aldossary
and Allen 2016). There are two main categories of transmission media that includes wired, or the
guided wires that uses such physical cables, as well as the wireless that uses some
electromagnetic waves to travel in some medium and vaccum.
Repeaters, Switches, Bridges, and Hubs: Repeaters are devices that helps to receive all
the electromagnetic signals, retransmits them, as well as cleans them at some high power level.
Document Page
6IT INFRASTRUCTURE MANAGEMENT
The signals that are transmitted over the cables tends to degrade over some long distance (Koek
et al. 2015). Hubs are used in Telstra that are used in connecting many devices to a network
using the cables. All the connections are known as port and the connections typically consists of
fiber optic or some Ethernet cable (Skees 2016). Hubs are networking devices that receives data
in one port and then distributes to other ports in network. Switches that are available in Telstra
contains various number of ports that connects to different segment networks. The switches are
same as hubs but are more efficient and performs better compared to the hubs. When there are
various devices, there is a need of switch instead of using the hubs. This makes sure that the
communication established between the devices does not slows down. Bridges are generally
networking devices dividing the network in different segments for managing the traffic amount
(Larsen et al. 2016). The bridges helps to prevent all the unnecessary traffic that enter the
network and then helps to reduce the congestion. As the networks are more complex, the bridges
ensures that the speed of the network does not stop.
Routers and gateways: Routers are devices similar to switch that helps to route the data
packets that are based on the IP addresses. The routers are commonly known as a device of
Network layer. The routers are connected with LANs as well as with WANs and has update
routing table that are actually based on the decision making of data packets routing. The router
then divides the domain broadcast of the hosts that are connected through the routers (Esposito,
Castiglione and Choo 2016). The gateways is a passage that connects the network together that
works on different models of networking. The gateways basically works as the agents of
messenger that collects data from a system, interpret them as well as transfer them to other
system. The gateways are more complex compared to switches.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7IT INFRASTRUCTURE MANAGEMENT
4. Application software needed for data communications
There are many application software that are needed for data communication in Telstra.
The applications are listed below:
a. MightyCall VoIP Solution: This is the best virtual systems for receptionist that helps to
facilitate the processing of the calls users receiving the toll-free, vanity numbers and the local
numbers (Diaz-Montes et al. 2015). This software is praised with various premium features that
includes ClickConnect.
b. RingCentral: This software application is a system of cloud phone. This application
helps to set up as well as manage all the activities in minutes (Hernantes, Gallardo and Serrano
2015). This software offers a number of communication capabilities of enterprise level that
includes texting, voicemail, mobile apps, BYOD as well as voicemail and many other.
c. 8x8 Phone Service of VoIP: This software application features to instant messaging,
internet faxing, unique smartphone that includes web conferencing, automated answering as well
as call routing, instant messaging and many more (Demchenko et al. 2016). The users using the
Phone service of VoIP gets impressed by the reliable support of the company.
d. Slack: Slack is another instant messaging application that units to different channels of
communication in a single platform. This is one of the most top rated application for
communication that helps the individuals as well as businesses for communicating and to store
all the interaction data in a single search or in the action database (Piessens et al. 2016). This
application also has other feature that includes checking the configurable as well as flexible
Document Page
8IT INFRASTRUCTURE MANAGEMENT
notifications, the web books and the open API that helps in integration with the application of
business.
5. Seven Layers OSI model
The OSI model (Open System Interconnection) model is reference model stating how the
applications communicates in the network. This OSI model includes conceptual model that
understands the relationships in between the application (Santos and Marcillo 2018). The main
purpose of this model is to guide the vendors as well as developers to get products of digital
communication as well as software programs that can be interoperated by the users. The vendors
of the tele-communication sectors attempts in describing all their services as well as products as
the OSI model.
There are seven layers of OSI model namely the application layer, the presentation layer,
the Session layer, the transport layer, the network layer, the data link layer and lastly the physical
layer. The application layer that identifies the communication partners. The presentation layer in
the OSI model is usually a part included in operating system as well as helps in converting the
incoming of data and the outgoing of data from the presentation format to other presentation
format (Sinha et al. 2017). Session layer mainly terminates the conversation and coordinates and
sets up the conversation in the network. The services includes many authentication as well as
reconnection when there is an interruption. The transport layer manages data packets, packet
delivery, and include checking the errors of data if it arrives in the network. The network layer in
the model handles the network addressing as well as routing of the data that are sent to the right
direction to right destination (Alotaibi et al. 2017). The layer of data link help to set up link that
Document Page
9IT INFRASTRUCTURE MANAGEMENT
comes across the physical network, combining packets in the network frames. The last layer is
the physical layer that conveys some bit stream over the network that is either mechanically,
electrically as well as connected through radio waves.
Figure 1: OSI model
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10IT INFRASTRUCTURE MANAGEMENT
(Source: Buamod, Abdelmoghith and Mouftah 2015)
6. Summary
From this report, the business process of Telstra is explained along with the along with
the Information Technology that is included in Telstra. There are different types of data that are
used in the organization that are included in Telstra and two different solutions are explained in
details that can be used to store data as well as access the data. This report also explains different
network services that are required in everyday activities of a telecommunication organization and
functions of each device is explained clearly. Types of application software are also explained in
this report that helps in data communication and the OSI model is explained stating the
transporting the data.
Document Page
11IT INFRASTRUCTURE MANAGEMENT
References
Aldossary, S. and Allen, W., 2016. Data security, privacy, availability and integrity in cloud
computing: issues and current solutions. International Journal of Advanced Computer Science
and Applications, 7(4), pp.485-498.
Alotaibi, A.M., Alrashidi, B.F., Naz, S. and Parveen, Z., 2017. Security issues in Protocols of
TCP/IP Model at Layers Level. International Journal of Computer Networks and
Communications Security, 5(5), p.96.
Borylo, P., Lason, A., Rzasa, J., Szymanski, A. and Jajszczyk, A., 2016. Green cloud
provisioning throughout cooperation of a wdm wide area network and a hybrid power it
infrastructure. Journal of Grid Computing, 14(1), pp.127-151.
Buamod, I., Abdelmoghith, E. and Mouftah, H.T., 2015, September. A review of OSI-based
charging standards and eMobility open protocols. In 2015 6th International Conference on the
Network of the Future (NOF) (pp. 1-7). IEEE.
Demchenko, Y., Turkmen, F., de Laat, C., Blanchet, C. and Loomis, C., 2016, July. Cloud based
big data infrastructure: Architectural components and automated provisioning. In 2016
International Conference on High Performance Computing & Simulation (HPCS) (pp. 628-636).
IEEE.
Diaz-Montes, J., AbdelBaky, M., Zou, M. and Parashar, M., 2015. Cometcloud: Enabling
software-defined federations for end-to-end application workflows. IEEE Internet
Computing, 19(1), pp.69-73.
Document Page
12IT INFRASTRUCTURE MANAGEMENT
Esposito, C., Castiglione, A. and Choo, K.K.R., 2016. Challenges in delivering software in the
cloud as microservices. IEEE Cloud Computing, 3(5), pp.10-14.
Hernantes, J., Gallardo, G. and Serrano, N., 2015. IT infrastructure-monitoring tools. IEEE
Software, 32(4), pp.88-93.
Koek, M., Achterberg, H., de Groot, M., Vast, E., Klein, S. and Niessen, W., 2015. Population
Imaging Study IT Infrastructure: An Automated Continuous Workflow Approach. In 1 st
MICCAI Workshop on (p. 31).
Kumar, S.A., Vealey, T. and Srivastava, H., 2016, January. Security in internet of things:
Challenges, solutions and future directions. In 2016 49th Hawaii International Conference on
System Sciences (HICSS) (pp. 5772-5781). IEEE.
Larsen, T.A., Hoffmann, S., Lüthi, C., Truffer, B. and Maurer, M., 2016. Emerging solutions to
the water challenges of an urbanizing world. Science, 352(6288), pp.928-933.
Omnes, N., Bouillon, M., Fromentoux, G. and Le Grand, O., 2015, February. A programmable
and virtualized network & IT infrastructure for the internet of things: How can NFV & SDN help
for facing the upcoming challenges. In 2015 18th International Conference on Intelligence in
Next Generation Networks (pp. 64-69). IEEE.
Piessens, F., Devriese, D., Mühlberg, J.T. and Strackx, R., 2016, November. Security guarantees
for the execution infrastructure of software applications. In 2016 IEEE Cybersecurity
Development (SecDev) (pp. 81-87). IEEE.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13IT INFRASTRUCTURE MANAGEMENT
Santos, M.G.M. and Marcillo, P.A.A., 2018. Security in the data link layer of the OSI model on
LANs wired Cisco. Journal of Science and Research: Revista Ciencia e
Investigación, 3(CITT2017), pp.106-112.
Sinha, P., Jha, V.K., Rai, A.K. and Bhushan, B., 2017, July. Security vulnerabilities, attacks and
countermeasures in wireless sensor networks at various layers of OSI reference model: A survey.
In 2017 International Conference on Signal Processing and Communication (ICSPC) (pp. 288-
293). IEEE.
Skees, J.R., 2016, December. Financail Disaster Risk Mangement Solutions for Life Systems
Infrastructure in Low and Middle Income Countries. In AGU Fall Meeting Abstracts.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]