Revamping USOFT Biomedical's Network Infrastructure: A Detailed Report
VerifiedAdded on 2025/04/14
|15
|2966
|55
AI Summary
Desklib provides past papers and solved assignments. This report details USOFT Biomedical's network redesign.

USOFT BIOMEDICAL Software Company
Software company specializes in software solution for biomedical industries
KRANTHI
Student ID : 23082214
Date : 29/01/2019
Software company specializes in software solution for biomedical industries
KRANTHI
Student ID : 23082214
Date : 29/01/2019
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Summary
Today’s businesses are dependent on the IT Network infrastructure which connects them to the
world and user. It helps the companies to scale according to the situation. It helps them grab more
and more opportunity and user can easily connect with them and also it simplifies the working
experience of employee as well as for the user
Usoft is one of the Software solution providers which specializes in providing a software solution for
the Biomedical industries. Every industry are deploying software solution to simplify the work and
improve work efficiency. The IT Network solution not only provides efficiency but also provide the
centralized control. The company is located over the Gold Coast region and has two branches over
there which operate the business. Branch offices will be connected to the HO office using the ISP link
for the management and operation purpose of business. All the data are stored in the server which
is located at the HO office and both the branches will access these resources using the ISP
connection.
The company’s currently working IP Subnet has been discarded by the ISP, but they have allocated
new subnet range instead. This will interrupt the services of the company on day today activity and
create a lot of issue in the existing IT infrastructure. The company is demanding for the revamp of
existing address solution for both IPv4 and IPv6 so then it won’t create any problem. The network
infrastructure will also be ready for the IPv6 migration without any issue. The existing physical and
logical connectivity may be change and it will require the administrator to understand the new
environment for better operation.
Today’s businesses are dependent on the IT Network infrastructure which connects them to the
world and user. It helps the companies to scale according to the situation. It helps them grab more
and more opportunity and user can easily connect with them and also it simplifies the working
experience of employee as well as for the user
Usoft is one of the Software solution providers which specializes in providing a software solution for
the Biomedical industries. Every industry are deploying software solution to simplify the work and
improve work efficiency. The IT Network solution not only provides efficiency but also provide the
centralized control. The company is located over the Gold Coast region and has two branches over
there which operate the business. Branch offices will be connected to the HO office using the ISP link
for the management and operation purpose of business. All the data are stored in the server which
is located at the HO office and both the branches will access these resources using the ISP
connection.
The company’s currently working IP Subnet has been discarded by the ISP, but they have allocated
new subnet range instead. This will interrupt the services of the company on day today activity and
create a lot of issue in the existing IT infrastructure. The company is demanding for the revamp of
existing address solution for both IPv4 and IPv6 so then it won’t create any problem. The network
infrastructure will also be ready for the IPv6 migration without any issue. The existing physical and
logical connectivity may be change and it will require the administrator to understand the new
environment for better operation.

Contents
Summary...............................................................................................................................................2
1. Introduction.......................................................................................................................................4
1.3 Network Traffic......................................................................................................................4
2. Organisational Description................................................................................................................4
2.1 Network.......................................................................................................................................5
2.2 Technical Goals......................................................................................................................5
2.3 Data Centre............................................................................................................................5
2.4 Backup...................................................................................................................................5
3. Analysis of User Requirements (Requirement engineering)..............................................................6
4.1 Security:......................................................................................................................................7
4.2 Wireless Networks...................................................................................................................8
7. Conclusions......................................................................................................................................14
List of References................................................................................................................................15
Summary...............................................................................................................................................2
1. Introduction.......................................................................................................................................4
1.3 Network Traffic......................................................................................................................4
2. Organisational Description................................................................................................................4
2.1 Network.......................................................................................................................................5
2.2 Technical Goals......................................................................................................................5
2.3 Data Centre............................................................................................................................5
2.4 Backup...................................................................................................................................5
3. Analysis of User Requirements (Requirement engineering)..............................................................6
4.1 Security:......................................................................................................................................7
4.2 Wireless Networks...................................................................................................................8
7. Conclusions......................................................................................................................................14
List of References................................................................................................................................15
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1. Introduction
The report is created to solve the networking problem currently the usoft company is facing from ISP
side. The sudden change in the addressing solution will hamper the services of the company. In
current scenario the company’s network is running fine but they want to improve the overall
network performance in terms of scalability, performance and security mainly.
Company requires to solve the address solution which is the first priority. The company has been
given the class b address space that need to be sub divided among all the offices according to the
need of all location. Whole implementation process must have very least impact on overall working
of the company.
1.1 Network Addressing
Addressing is one of the most important parts of the network redesigning. The company needs a
require the addressing so that it can provide scalability of up to 15% for next 12 months. Because the
workforce of the company will be increased up to that time. Now the address needs to focus on both
the branch offices and HO office.
1.2 Infrastructure Design
Currently, the network infrastructure of the company is very simple and straight forward. There are
many loopholes present in it and redundancy planning is not done up to the mark which can handle
any failure. Entire physical and logical connectivity need to be redefined in order to make it simple
and reliable for day to day work. Any integration of new devices or segment of network will not
hamper the working of company.
1.3 Network Traffic
Company’s entire network is large as compared to medium business requirement. A lot of local and
remote traffic will be generated in the entire network flow. Software development is one of the
critical parts which host very important data and employee on both the branches will access the
resources over the ISP link through remote access. This will increase the throughput on the link
connecting to the ISP. So need done load balancing and failover recovery for the traffic for smooth
working of business process.
2. Organisational Description
Usoft is a software development company which deals with many type software projects
among different client. Each client has its own set of demands and needs to be fulfilled by
the Usoft software development team. The company deals many types of data which may
be company’s own or clients data. This data need to be stored and secured from all the
employee and public access.
The company specifically deals with the biomedical industry clients and they also trust the
company relationship in terms of business they are dealing with. The company has slow,
The report is created to solve the networking problem currently the usoft company is facing from ISP
side. The sudden change in the addressing solution will hamper the services of the company. In
current scenario the company’s network is running fine but they want to improve the overall
network performance in terms of scalability, performance and security mainly.
Company requires to solve the address solution which is the first priority. The company has been
given the class b address space that need to be sub divided among all the offices according to the
need of all location. Whole implementation process must have very least impact on overall working
of the company.
1.1 Network Addressing
Addressing is one of the most important parts of the network redesigning. The company needs a
require the addressing so that it can provide scalability of up to 15% for next 12 months. Because the
workforce of the company will be increased up to that time. Now the address needs to focus on both
the branch offices and HO office.
1.2 Infrastructure Design
Currently, the network infrastructure of the company is very simple and straight forward. There are
many loopholes present in it and redundancy planning is not done up to the mark which can handle
any failure. Entire physical and logical connectivity need to be redefined in order to make it simple
and reliable for day to day work. Any integration of new devices or segment of network will not
hamper the working of company.
1.3 Network Traffic
Company’s entire network is large as compared to medium business requirement. A lot of local and
remote traffic will be generated in the entire network flow. Software development is one of the
critical parts which host very important data and employee on both the branches will access the
resources over the ISP link through remote access. This will increase the throughput on the link
connecting to the ISP. So need done load balancing and failover recovery for the traffic for smooth
working of business process.
2. Organisational Description
Usoft is a software development company which deals with many type software projects
among different client. Each client has its own set of demands and needs to be fulfilled by
the Usoft software development team. The company deals many types of data which may
be company’s own or clients data. This data need to be stored and secured from all the
employee and public access.
The company specifically deals with the biomedical industry clients and they also trust the
company relationship in terms of business they are dealing with. The company has slow,
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

steady growth and has two branches spread over two different locations. This allows HQ to
control the services and product development of client. HQ mainly provides the support and
management services to the client and branch office. Main software development is done at
the HQ office and distributed among the branch offices for deployment and side support for
the client.
2.1 Network
The company’s network is not reliable according to the current demand which the branch office
requirement in various terms. The IP is addressing need to be redone in order to continue the
network connectivity and day today business process. Currently, the company’s entire network relies
on the ISP network address space provided by them. Since the company main business is the
software development so a lot of data will be shared using the network lines from HQ and vice versa.
There are various team sitting on all the location and working together in order to develop the
project as fast as possible. So this will consume network resources so the system must have least
number of downtime.
2.2 Technical Goals
The entire network redesigning must cover up the following network goals:
- Scalability
- Remote access
- Performance
- Security
- Flexibility
- Availability
All the above technical goals will be covered up in the proposed network designing solution with
testing and reliability.
2.3 Data Centre
The data centre is one of the core parts of the company’s network as it will hold a lot of company’s
data which is related to project and company’s own data also. Most of the resources are shared
using the same data centre among different offices. There will be a various server for a different
requirement which deals with different business process. Storage solution contains all the required
crucial data and software codes blueprints which are very important for the company.
These important assets need to be protected from all type of access. And the physical and access to
the critical data must be given according to the authorization level.
2.4 Backup
The data is critical for the business so the backup solution for each and every type of important data
must be configured so in the event of catastrophic failure the data must be safe and secured
properly. The solution will provide recovery of data in any type of situation so that criticality of the
business can be matched with requirement.
control the services and product development of client. HQ mainly provides the support and
management services to the client and branch office. Main software development is done at
the HQ office and distributed among the branch offices for deployment and side support for
the client.
2.1 Network
The company’s network is not reliable according to the current demand which the branch office
requirement in various terms. The IP is addressing need to be redone in order to continue the
network connectivity and day today business process. Currently, the company’s entire network relies
on the ISP network address space provided by them. Since the company main business is the
software development so a lot of data will be shared using the network lines from HQ and vice versa.
There are various team sitting on all the location and working together in order to develop the
project as fast as possible. So this will consume network resources so the system must have least
number of downtime.
2.2 Technical Goals
The entire network redesigning must cover up the following network goals:
- Scalability
- Remote access
- Performance
- Security
- Flexibility
- Availability
All the above technical goals will be covered up in the proposed network designing solution with
testing and reliability.
2.3 Data Centre
The data centre is one of the core parts of the company’s network as it will hold a lot of company’s
data which is related to project and company’s own data also. Most of the resources are shared
using the same data centre among different offices. There will be a various server for a different
requirement which deals with different business process. Storage solution contains all the required
crucial data and software codes blueprints which are very important for the company.
These important assets need to be protected from all type of access. And the physical and access to
the critical data must be given according to the authorization level.
2.4 Backup
The data is critical for the business so the backup solution for each and every type of important data
must be configured so in the event of catastrophic failure the data must be safe and secured
properly. The solution will provide recovery of data in any type of situation so that criticality of the
business can be matched with requirement.

Regular backup must be fire on all the required machines including the branch offices to store it
centrally at least two different locations.
3. Analysis of User Requirements (Requirement engineering)
The companies have various demand to improve its network infrastructure from scratch so that it
won’t hamper the future business and infrastructure growth. The main part of it is to develop the
HQ’s existing LAN to achieve various businesses and technical goal.
Some of the main business goals are the provide highly available network infrastructure which can
support the following:
- improved communication over a wired and wireless medium.
- VoIP support for the voice traffic among the branch and HQ.
- An application protocol that is critical for the business process.
- Improve the data security
By complying all the above business goal, the company’s infrastructure will become flexible and
secured so that it can be ready for the future scalability. Some of the key technical goals for the
redesigning of the HQ Lan are:
3.1 Mobility Requirements
As the world is moving 24x7 the company’s software product support and development must go on
smooth without any interruption. The employee must be able to connect with the company’s
network through wired and wireless medium. So that the working experience of the user will be
enhanced and more robust working on the software product can be done.
Mobility also provides the user to use any mobile device to work anywhere in the office location.
3.2 Security requirements
The security of the application and network is very important. As any loopholes can bring down the
network on its knees and create huge losses for the company. The security must be put in place for
the user access at various level from physical to application data. Security zones must be created and
user must have restricted access to the server and application.
Each activity in the network and application must be logged for proper monitoring (Zimmermann,
2011).
3.3 Bandwidth requirement
As we know that the company’s entire workforce is increasing and continue to increase more 15%
for the next 12 months. This will require the scalability of network resources like bandwidth. This
requirement must be taken care for the next two month. The minimum bandwidth must be
guaranteed to each user including the guest one.
Which won’t hamper the application and day-to-day work of the employee related to the software
project.
centrally at least two different locations.
3. Analysis of User Requirements (Requirement engineering)
The companies have various demand to improve its network infrastructure from scratch so that it
won’t hamper the future business and infrastructure growth. The main part of it is to develop the
HQ’s existing LAN to achieve various businesses and technical goal.
Some of the main business goals are the provide highly available network infrastructure which can
support the following:
- improved communication over a wired and wireless medium.
- VoIP support for the voice traffic among the branch and HQ.
- An application protocol that is critical for the business process.
- Improve the data security
By complying all the above business goal, the company’s infrastructure will become flexible and
secured so that it can be ready for the future scalability. Some of the key technical goals for the
redesigning of the HQ Lan are:
3.1 Mobility Requirements
As the world is moving 24x7 the company’s software product support and development must go on
smooth without any interruption. The employee must be able to connect with the company’s
network through wired and wireless medium. So that the working experience of the user will be
enhanced and more robust working on the software product can be done.
Mobility also provides the user to use any mobile device to work anywhere in the office location.
3.2 Security requirements
The security of the application and network is very important. As any loopholes can bring down the
network on its knees and create huge losses for the company. The security must be put in place for
the user access at various level from physical to application data. Security zones must be created and
user must have restricted access to the server and application.
Each activity in the network and application must be logged for proper monitoring (Zimmermann,
2011).
3.3 Bandwidth requirement
As we know that the company’s entire workforce is increasing and continue to increase more 15%
for the next 12 months. This will require the scalability of network resources like bandwidth. This
requirement must be taken care for the next two month. The minimum bandwidth must be
guaranteed to each user including the guest one.
Which won’t hamper the application and day-to-day work of the employee related to the software
project.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3.4 Application requirement
As we know that the IT infrastructure cannot be handled and controlled with network devices put in
place only. There is various other application required for various purposes like the centralized login,
payment management, project management and etc. So the required application with redundancy
must be installed on the servers.
The application must be configured in the highly available manner so that any network or
communication failure must not hamper the application working.
3.5 Remote access requirement
The remote access is one of the key parts of network infrastructure. This allows the user to work
anytime irrespective of the location. And this provides the user to work for the project in their
comfort zone.
This also makes the working environment for employee simplistic and user-friendly.
4. Logical Design
IT infrastructure network design and solution is one of the most critical parts as it requires a various
component to be integrated together so that they can work properly. The redesigning of the HQ
office need to be done carefully so that the future growth and maintainability of the network can be
done without any issue.
The HQ office is a six-story building which and the company want to put each department at each
floor. But the software and solution design development alone require two floors while others will
have to share rest four floors. Network needs to be flexible according to changing demand of the HQ
office
Some of the key things need to be put in the network in order to complete the setup and these
things are:
4.1 Security:
Security is one of the important parts of the network so the security of the entire network
infrastructure is integrated using the software and hardware solution like firewall which will
separate the network segment. And it will provide secure access to hardware resources like servers.
The security implementation may contain the following things:
Firewall must be put at the edge of the network infrastructure and in between the server and user
for restricted access Centralized login into the desktop machine.
Access control must be enabled to drop the unauthorized network access.
As we know that the IT infrastructure cannot be handled and controlled with network devices put in
place only. There is various other application required for various purposes like the centralized login,
payment management, project management and etc. So the required application with redundancy
must be installed on the servers.
The application must be configured in the highly available manner so that any network or
communication failure must not hamper the application working.
3.5 Remote access requirement
The remote access is one of the key parts of network infrastructure. This allows the user to work
anytime irrespective of the location. And this provides the user to work for the project in their
comfort zone.
This also makes the working environment for employee simplistic and user-friendly.
4. Logical Design
IT infrastructure network design and solution is one of the most critical parts as it requires a various
component to be integrated together so that they can work properly. The redesigning of the HQ
office need to be done carefully so that the future growth and maintainability of the network can be
done without any issue.
The HQ office is a six-story building which and the company want to put each department at each
floor. But the software and solution design development alone require two floors while others will
have to share rest four floors. Network needs to be flexible according to changing demand of the HQ
office
Some of the key things need to be put in the network in order to complete the setup and these
things are:
4.1 Security:
Security is one of the important parts of the network so the security of the entire network
infrastructure is integrated using the software and hardware solution like firewall which will
separate the network segment. And it will provide secure access to hardware resources like servers.
The security implementation may contain the following things:
Firewall must be put at the edge of the network infrastructure and in between the server and user
for restricted access Centralized login into the desktop machine.
Access control must be enabled to drop the unauthorized network access.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4.2 Wireless Networks
The wireless will provide the network to be available to all type of user. And if the wired network
breaks down or vice versa. The connectivity of the end user machine will remain connected to the
network. The solution will include the following
- Adequate number of AP’s which will cover most of the company location
- Separate network address for all type of users
- Secured access list of the user’s traffic.
4.3 Virtual LANs
The network segmentation is very important as it will restrict the direct access. Most of the time the
separation of network is done logically using the VLAN. As it will require less number of network
devices and cabling overhead. There will be 8 VLANs will be created 6 for the department, one is for
the guest wireless user and last one is for the server zone.
Routing will be done using the inter-VLAN routing using the L3 device like a firewall
4.4 Firewall
The firewall is the critical part of the network as it will be the primary line of control for the network
traffic coming from all type of location. The firewall configuration needs to be done according to the
HQ office.
4.5 Router
The router will provide the remote connectivity using the ISP’s network. The router also provides a
high availability for network loss or hardware failure (Kist, 2010).
5. IP Address Allocation Plan
The network address allocation is one of the critical parts of the organization entire work process. In
order to do that we need to identify and collect the required number of devices which will be there
in the company. Some of the following task we need to do in order to complete the process:
- IP subnetting will be done according to the needs of the network and its device in each
segment with some free address space
- Static IP address allocation needs to be done for some of the machines.
- Dynamic IP address allocation for rest of the network (Khair, 2014).
So the address solution for each floor and department are as follows
5.1 Software Development and Solution Design Team
So the IP address requirement and allocation are:
Software Development
Required IP : 23
The wireless will provide the network to be available to all type of user. And if the wired network
breaks down or vice versa. The connectivity of the end user machine will remain connected to the
network. The solution will include the following
- Adequate number of AP’s which will cover most of the company location
- Separate network address for all type of users
- Secured access list of the user’s traffic.
4.3 Virtual LANs
The network segmentation is very important as it will restrict the direct access. Most of the time the
separation of network is done logically using the VLAN. As it will require less number of network
devices and cabling overhead. There will be 8 VLANs will be created 6 for the department, one is for
the guest wireless user and last one is for the server zone.
Routing will be done using the inter-VLAN routing using the L3 device like a firewall
4.4 Firewall
The firewall is the critical part of the network as it will be the primary line of control for the network
traffic coming from all type of location. The firewall configuration needs to be done according to the
HQ office.
4.5 Router
The router will provide the remote connectivity using the ISP’s network. The router also provides a
high availability for network loss or hardware failure (Kist, 2010).
5. IP Address Allocation Plan
The network address allocation is one of the critical parts of the organization entire work process. In
order to do that we need to identify and collect the required number of devices which will be there
in the company. Some of the following task we need to do in order to complete the process:
- IP subnetting will be done according to the needs of the network and its device in each
segment with some free address space
- Static IP address allocation needs to be done for some of the machines.
- Dynamic IP address allocation for rest of the network (Khair, 2014).
So the address solution for each floor and department are as follows
5.1 Software Development and Solution Design Team
So the IP address requirement and allocation are:
Software Development
Required IP : 23

Number of bits requires in the host address : 5
Total available address : 30
Network subnet : 172.16.123.0/27
Network subnet details
1. N/W Subnet : 172.16.123.0/27
2. N/W ID : 172.16.123.0
3. Broadcast Address : 172.16.123.31
4. Address Range: 172.16.123.1 – 172.16.123.30
5. Free address space left : 30-23 =7
Solution Design
Required IP : 20
Number of bits requires in the host address : 5
Total available address : 30
Network subnet : 172.16.123.32/27
Network subnet details
1. N/W Subnet : 172.16.123.32/27
2. N/W ID : 172.16.123.32
3. Broadcast Address : 172.16.123.63
4. Address Range: 172.16.123.3 – 172.16.123.62
5. Free address space left : 30-20 =10
5.2 Customer Support
Required IP : 11
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.64/27
Network subnet details
1. N/W Subnet : 172.16.123.64/28
2. N/W ID : 172.16.123.64
3. Broadcast Address : 172.16.123.95
4. Address Range: 172.16.123.65– 172.16.123.94
5. Free address space left : 14-11 = 3
Total available address : 30
Network subnet : 172.16.123.0/27
Network subnet details
1. N/W Subnet : 172.16.123.0/27
2. N/W ID : 172.16.123.0
3. Broadcast Address : 172.16.123.31
4. Address Range: 172.16.123.1 – 172.16.123.30
5. Free address space left : 30-23 =7
Solution Design
Required IP : 20
Number of bits requires in the host address : 5
Total available address : 30
Network subnet : 172.16.123.32/27
Network subnet details
1. N/W Subnet : 172.16.123.32/27
2. N/W ID : 172.16.123.32
3. Broadcast Address : 172.16.123.63
4. Address Range: 172.16.123.3 – 172.16.123.62
5. Free address space left : 30-20 =10
5.2 Customer Support
Required IP : 11
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.64/27
Network subnet details
1. N/W Subnet : 172.16.123.64/28
2. N/W ID : 172.16.123.64
3. Broadcast Address : 172.16.123.95
4. Address Range: 172.16.123.65– 172.16.123.94
5. Free address space left : 14-11 = 3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

5.3 Sales
Required IP : 11
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.96/28
Network subnet details
1. N/W Subnet : 172.16.123.96/27
2. N/W ID : 172.16.123.96
3. Broadcast Address : 172.16.123.111
4. Address Range: 172.16.123.97 – 172.16.123.110
5. Free address space left : 14-11 =3
1.4 Finance
Required IP : 7
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.112/28
Network subnet details
1. N/W Subnet : 172.16.123.112/27
2. N/W ID : 172.16.123.112
3. Broadcast Address : 172.16.123.127
4. Address Range: 172.16.113. – 172.16.123.126
5. Free address space left : 14-11 =3
1.4 Human Resource
Required IP : 3
Number of bits requires in the host address : 3
Total available address : 6
Network subnet : 172.16.123.128/29
Network subnet details
1. N/W Subnet : 172.16.123.128/29
2. N/W ID : 172.16.123.128
Required IP : 11
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.96/28
Network subnet details
1. N/W Subnet : 172.16.123.96/27
2. N/W ID : 172.16.123.96
3. Broadcast Address : 172.16.123.111
4. Address Range: 172.16.123.97 – 172.16.123.110
5. Free address space left : 14-11 =3
1.4 Finance
Required IP : 7
Number of bits requires in the host address : 4
Total available address : 14
Network subnet : 172.16.123.112/28
Network subnet details
1. N/W Subnet : 172.16.123.112/27
2. N/W ID : 172.16.123.112
3. Broadcast Address : 172.16.123.127
4. Address Range: 172.16.113. – 172.16.123.126
5. Free address space left : 14-11 =3
1.4 Human Resource
Required IP : 3
Number of bits requires in the host address : 3
Total available address : 6
Network subnet : 172.16.123.128/29
Network subnet details
1. N/W Subnet : 172.16.123.128/29
2. N/W ID : 172.16.123.128
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3. Broadcast Address : 172.16.123.133
4. Address Range: 172.16.129 – 172.16.123.134
5. Free address space left : 6-3 =3
6. Logical Network Diagram:
The network diagram is one of the crucial parts of the pre-implementation phase. Because once
the architecture is proposed designed is implemented it will become hard to rectify the issue
and validate the requirements.
The logical network diagram will help us to provide the critical information which can be used
to identify and validate the requirements of the company (Kaseva, 2011).
4. Address Range: 172.16.129 – 172.16.123.134
5. Free address space left : 6-3 =3
6. Logical Network Diagram:
The network diagram is one of the crucial parts of the pre-implementation phase. Because once
the architecture is proposed designed is implemented it will become hard to rectify the issue
and validate the requirements.
The logical network diagram will help us to provide the critical information which can be used
to identify and validate the requirements of the company (Kaseva, 2011).

7. Physical Network Diagram:
Physical diagram(s) shows location of major end users and network devices such as servers,
interconnecting devices, firewall, wireless access points, etc. with appropriate icons and legends.
Physical diagram(s) shows location of major end users and network devices such as servers,
interconnecting devices, firewall, wireless access points, etc. with appropriate icons and legends.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.