Network Infrastructure Redesign for Usoft: A Comprehensive Solution
VerifiedAdded on  2025/04/14
|16
|2357
|492
AI Summary
Desklib provides past papers and solved assignments. This project details Usoft's network infrastructure redesign.

Data Communication and Networks
CSC00240
Assessment 3
1
CSC00240
Assessment 3
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Summary
Business are today rely on the complicated network infrastructure to control and provide
services 24x7. These services basically run on software solution and theses software where
developed by different solution provider. Every company is different and deal with different
type of industries so there requirement can vary. Software solution providing company need
to develop software to meet the requirement of the company they are dealing with.
The biomedical is a type industry where not every company provide software services. Only
the specialized company which deals in these area can do this task. It requires specialization
in this type of area to develop the software solution. Usoft is one of the company which is
specializes in developing the software solution for the biomedical industries. The company
has total 2 branch offices over the goal coast region and one Head Quarter. The company is
currently has enough number of employee which keep the organization in the small to
medium business type company. The company is expected to grow 15% of its workforce in
the next 12 months. So currently the company is facing problem in its network infrastructure
as it is not sufficient enough to run its business smoothly. The company wanted to redevelop
the entire network infrastructure to meet its certain type of dedicated demands. The company
also got new IP subnet space from the ISP and they want to re-design the addressing solution
for all the offices.
The company mainly deals with the software and support services to the client. So the
network infrastructure of the company must remain up for 24x7. In this way the company can
able to provide the quality of services and keep its workforce working smoothly without any
downtime.
2
Business are today rely on the complicated network infrastructure to control and provide
services 24x7. These services basically run on software solution and theses software where
developed by different solution provider. Every company is different and deal with different
type of industries so there requirement can vary. Software solution providing company need
to develop software to meet the requirement of the company they are dealing with.
The biomedical is a type industry where not every company provide software services. Only
the specialized company which deals in these area can do this task. It requires specialization
in this type of area to develop the software solution. Usoft is one of the company which is
specializes in developing the software solution for the biomedical industries. The company
has total 2 branch offices over the goal coast region and one Head Quarter. The company is
currently has enough number of employee which keep the organization in the small to
medium business type company. The company is expected to grow 15% of its workforce in
the next 12 months. So currently the company is facing problem in its network infrastructure
as it is not sufficient enough to run its business smoothly. The company wanted to redevelop
the entire network infrastructure to meet its certain type of dedicated demands. The company
also got new IP subnet space from the ISP and they want to re-design the addressing solution
for all the offices.
The company mainly deals with the software and support services to the client. So the
network infrastructure of the company must remain up for 24x7. In this way the company can
able to provide the quality of services and keep its workforce working smoothly without any
downtime.
2

Table of Contents
Summary....................................................................................................................................2
Table of Contents.......................................................................................................................3
1. Introduction............................................................................................................................4
2. Organisational Description.....................................................................................................6
2.1Network.............................................................................................................................6
2.2 Organization Goals...........................................................................................................6
3. Analysis of User Requirements (Requirement engineering).................................................7
4. Logical Design.......................................................................................................................9
4.1 Security:.......................................................................................................................9
4.2 Wireless Networks:.....................................................................................................9
5. IP Address Allocation Plan:.................................................................................................10
6. Logical Network Diagram:..................................................................................................12
7. Physical Network Diagram:.................................................................................................14
Conclusions..............................................................................................................................15
List of References....................................................................................................................16
3
Summary....................................................................................................................................2
Table of Contents.......................................................................................................................3
1. Introduction............................................................................................................................4
2. Organisational Description.....................................................................................................6
2.1Network.............................................................................................................................6
2.2 Organization Goals...........................................................................................................6
3. Analysis of User Requirements (Requirement engineering).................................................7
4. Logical Design.......................................................................................................................9
4.1 Security:.......................................................................................................................9
4.2 Wireless Networks:.....................................................................................................9
5. IP Address Allocation Plan:.................................................................................................10
6. Logical Network Diagram:..................................................................................................12
7. Physical Network Diagram:.................................................................................................14
Conclusions..............................................................................................................................15
List of References....................................................................................................................16
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1. Introduction
The Usoft software solution company is specialized in developing software for the
biomedical industry. So most of the company’s client are non-IT company and they need to
provide the support 24x7 for their implemented software solution. So to provide the seamless
support services to their client the company need the reliable network infrastructure.
For this the company entire network infrastructure need to be re-develop to meet these
specific requirements. This will requires the following task to be done in order to meet the
expectations:
- Current Network infrastructure study
- Requirement analysis
- Scope of work
- Prepare the proposed solution
1.1 Network Design
The network design is one of the important part of the infrastructure development. The
current network design need to be analysed in order to proposed the solution for the problem
the company is facing. This will requires the study of the existing network design and
addressing solution currently company is using.
The list of devices which are currently in their company which requires network connectivity
for business to run (Singh, 2014).
1.2 System Requirements
The propose system must able to provide the support for the future upgradation. So that all
the implemented technologies can be easily managed and integrated with the existing
systems. Some of the required features with the modified systems.
1. Scalability
2. Manageability
3. Interoperability
4. Open Standard
1.3 Security Requirements
4
The Usoft software solution company is specialized in developing software for the
biomedical industry. So most of the company’s client are non-IT company and they need to
provide the support 24x7 for their implemented software solution. So to provide the seamless
support services to their client the company need the reliable network infrastructure.
For this the company entire network infrastructure need to be re-develop to meet these
specific requirements. This will requires the following task to be done in order to meet the
expectations:
- Current Network infrastructure study
- Requirement analysis
- Scope of work
- Prepare the proposed solution
1.1 Network Design
The network design is one of the important part of the infrastructure development. The
current network design need to be analysed in order to proposed the solution for the problem
the company is facing. This will requires the study of the existing network design and
addressing solution currently company is using.
The list of devices which are currently in their company which requires network connectivity
for business to run (Singh, 2014).
1.2 System Requirements
The propose system must able to provide the support for the future upgradation. So that all
the implemented technologies can be easily managed and integrated with the existing
systems. Some of the required features with the modified systems.
1. Scalability
2. Manageability
3. Interoperability
4. Open Standard
1.3 Security Requirements
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Security should be achieved to maintain the integrity and confidentiality of data and
information. To achieve this information should be categorized into non-sharable and
shareable. A security policy should be there. To add the level of security, physical security
(guard, fencing, camera, video surveillance system) should be included in a design. To ensure
the security of data cryptography and encryption technologies should be included. A
password policy should be implemented to protect and strengthen the password. Network
design should be able to maintain confidentiality, integrity, authentication, and non-
repudiation. To ensure the network security firewall and intrusion detection system should be
implemented to filter the network traffic. Access control list is also required to keep out the
unauthorized users. Anti-malware software is required to protect the system against viruses
and other malware.
5
information. To achieve this information should be categorized into non-sharable and
shareable. A security policy should be there. To add the level of security, physical security
(guard, fencing, camera, video surveillance system) should be included in a design. To ensure
the security of data cryptography and encryption technologies should be included. A
password policy should be implemented to protect and strengthen the password. Network
design should be able to maintain confidentiality, integrity, authentication, and non-
repudiation. To ensure the network security firewall and intrusion detection system should be
implemented to filter the network traffic. Access control list is also required to keep out the
unauthorized users. Anti-malware software is required to protect the system against viruses
and other malware.
5

2. Organisational Description
Usoft software development company mainly deals with the software solution in the
biomedical industries. The growth of the company is mainly dependent on the software
solution and support services. Which is heavily dependent on the strong network
infrastructure. The main software is developed at the HO office and the implementation and
support services are provided by the branch offices (Park, 2011).
The branch offices need to access the critical data which is stored centrally in the HO office.
The company want’s the secure seamless access of the data according the access level of
different users.
2.1Network
Currently the company’s network infrastructure is not capable of handling the future growth
and address need to be redone. This is because the ISP has given the company new subnet
range of class B address space.
This address space need to be subnetted in order to provide address solution to all the branch
office including the HO. The free space must be left for the upcoming month for workforce
growth.
2.2 Organization Goals
The organization have set various targets in order to cope up with the business demand. The
company growth is very steady so that they want to keep the infrastructure ready for this
growth. For this they need the following requirements must be fulfilled with future growth
and implementation
- Seamless operation
- Future growth
- Network device integration
- Secured system and server access
- Security level access
6
Usoft software development company mainly deals with the software solution in the
biomedical industries. The growth of the company is mainly dependent on the software
solution and support services. Which is heavily dependent on the strong network
infrastructure. The main software is developed at the HO office and the implementation and
support services are provided by the branch offices (Park, 2011).
The branch offices need to access the critical data which is stored centrally in the HO office.
The company want’s the secure seamless access of the data according the access level of
different users.
2.1Network
Currently the company’s network infrastructure is not capable of handling the future growth
and address need to be redone. This is because the ISP has given the company new subnet
range of class B address space.
This address space need to be subnetted in order to provide address solution to all the branch
office including the HO. The free space must be left for the upcoming month for workforce
growth.
2.2 Organization Goals
The organization have set various targets in order to cope up with the business demand. The
company growth is very steady so that they want to keep the infrastructure ready for this
growth. For this they need the following requirements must be fulfilled with future growth
and implementation
- Seamless operation
- Future growth
- Network device integration
- Secured system and server access
- Security level access
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3. Analysis of User Requirements (Requirement engineering)
As per business and technical goals, the organization want to achieve various targets and
goals. This requirement different in different section but some of them are mentioned below
which are demanded by the user.
3.1 Mobility Requirements
The user must able to access the server and application anywhere from the office. The access
medium may be wired and wireless. The user must also able to access the office resources
from remote location using the VPNs
3.2 Security requirements
Security should be achieved to maintain the integrity and confidentiality of data and
information. To achieve this information should be categorized into non-sharable and
shareable. A security policy should be there. To add the level of security, physical security
(guard, fencing, camera, video surveillance system) should be included in a design. To ensure
the security of data cryptography and encryption technologies should be included. A
password policy should be implemented to protect and strengthen the password. Network
design should be able to maintain confidentiality, integrity, authentication, and non-
repudiation. To ensure the network security firewall and intrusion detection system should be
implemented to filter the network traffic. Access control list is also required to keep out the
unauthorized users. Anti-malware software is required to protect the system against viruses
and other malware.
3.3 Bandwidth requirement
The bandwidth is the critical part of the overall working process. The dedicated user must
able to get the dedicated network speed according to the requirement. The VIP user must not
be disconnected from the network in the failure event.
Voice services of the phone must be travel through the ISP network must not get hampered
by overutilization of network resources.
3.4 Application requirement
7
As per business and technical goals, the organization want to achieve various targets and
goals. This requirement different in different section but some of them are mentioned below
which are demanded by the user.
3.1 Mobility Requirements
The user must able to access the server and application anywhere from the office. The access
medium may be wired and wireless. The user must also able to access the office resources
from remote location using the VPNs
3.2 Security requirements
Security should be achieved to maintain the integrity and confidentiality of data and
information. To achieve this information should be categorized into non-sharable and
shareable. A security policy should be there. To add the level of security, physical security
(guard, fencing, camera, video surveillance system) should be included in a design. To ensure
the security of data cryptography and encryption technologies should be included. A
password policy should be implemented to protect and strengthen the password. Network
design should be able to maintain confidentiality, integrity, authentication, and non-
repudiation. To ensure the network security firewall and intrusion detection system should be
implemented to filter the network traffic. Access control list is also required to keep out the
unauthorized users. Anti-malware software is required to protect the system against viruses
and other malware.
3.3 Bandwidth requirement
The bandwidth is the critical part of the overall working process. The dedicated user must
able to get the dedicated network speed according to the requirement. The VIP user must not
be disconnected from the network in the failure event.
Voice services of the phone must be travel through the ISP network must not get hampered
by overutilization of network resources.
3.4 Application requirement
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

All the application which the employee and users are using must able to get access according
to the access level. The control of the application must remain centrally from the HO office.
These application working may or may not be dependent on the network resources.
But if the network resources are required the application must get required bandwidth.
3.5 Remote access requirement
The remote user must able to access the servers and organization resources through remote
login. The requirement for the VPN can be provided to provide the remote access problem
from the external network like home network.
8
to the access level. The control of the application must remain centrally from the HO office.
These application working may or may not be dependent on the network resources.
But if the network resources are required the application must get required bandwidth.
3.5 Remote access requirement
The remote user must able to access the servers and organization resources through remote
login. The requirement for the VPN can be provided to provide the remote access problem
from the external network like home network.
8

4. Logical Design
Network infrastructure is the critical part of an organization it consist several parts. Each
department and team has their own sets of requirement and all are integrated in the single
network infrastructure. So in order to provide the network connectivity to all the department
with considering security in mind we need to keep track of the following task.
4.1 Security:
Security of the network infrastructure is very important we need to define all the necessary
security setting in the entire network infrastructure which include the following:
- Implementation of the segmented zones using the VLANs
- Creating of zoning for different segments
- Implementation of secure channel between sites using VPNs
- Access Control Implementation
4.2 Wireless Networks:
Wireless network is one of the important aspect of the organization it requires the
implementation of the following task
- Centralised AP configuration and SSID broadcast
- Security zone creation and access control implementation
- DHCP Server implementation
9
Network infrastructure is the critical part of an organization it consist several parts. Each
department and team has their own sets of requirement and all are integrated in the single
network infrastructure. So in order to provide the network connectivity to all the department
with considering security in mind we need to keep track of the following task.
4.1 Security:
Security of the network infrastructure is very important we need to define all the necessary
security setting in the entire network infrastructure which include the following:
- Implementation of the segmented zones using the VLANs
- Creating of zoning for different segments
- Implementation of secure channel between sites using VPNs
- Access Control Implementation
4.2 Wireless Networks:
Wireless network is one of the important aspect of the organization it requires the
implementation of the following task
- Centralised AP configuration and SSID broadcast
- Security zone creation and access control implementation
- DHCP Server implementation
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

5. IP Address Allocation Plan:
The IP address allocation must be done for all the office department according to the
requirement with some free spaces must be available for the future use. So the allocation plan
is given below for all the department (Francis, 2018).
5.1 Software Development and Solution Design Team
The current requirement for the IP address is 23 and require almost 20% future growth. So
we are planning to reserve just double address almost 50. So the network details will be
- Network : 172.16.123.0/26
- Network ID : 172.16.123.0
- Broadcast ID : 172.16.123.63
- Range : 172.16.123.1-172.16.123.62
- Free address : 62-23 =39
5.2 Solution design
The current requirement for the IP address is 20 and require almost 20% future growth. So
we are planning to reserve just double address almost 50. So the network details will be
- Network : 172.16.123.64/26
- Network ID : 172.16.123.64
- Broadcast ID : 172.16.123.127
- Range : 172.16.123.65-172.16.123.126
- Free address : 62-20 =42
5.3 Customer Support
The current requirement for the IP address is 11 and require almost 20% future growth. So
we are planning to reserve just double address almost 30. So the network details will be
- Network : 172.16.123.128/27
- Network ID : 172.16.123.128
- Broadcast ID : 172.16.123.159
- Range : 172.16.123.129-172.16.123.158
10
The IP address allocation must be done for all the office department according to the
requirement with some free spaces must be available for the future use. So the allocation plan
is given below for all the department (Francis, 2018).
5.1 Software Development and Solution Design Team
The current requirement for the IP address is 23 and require almost 20% future growth. So
we are planning to reserve just double address almost 50. So the network details will be
- Network : 172.16.123.0/26
- Network ID : 172.16.123.0
- Broadcast ID : 172.16.123.63
- Range : 172.16.123.1-172.16.123.62
- Free address : 62-23 =39
5.2 Solution design
The current requirement for the IP address is 20 and require almost 20% future growth. So
we are planning to reserve just double address almost 50. So the network details will be
- Network : 172.16.123.64/26
- Network ID : 172.16.123.64
- Broadcast ID : 172.16.123.127
- Range : 172.16.123.65-172.16.123.126
- Free address : 62-20 =42
5.3 Customer Support
The current requirement for the IP address is 11 and require almost 20% future growth. So
we are planning to reserve just double address almost 30. So the network details will be
- Network : 172.16.123.128/27
- Network ID : 172.16.123.128
- Broadcast ID : 172.16.123.159
- Range : 172.16.123.129-172.16.123.158
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

- Free address : 30-11 = 19
5.4 Sales
The current requirement for the IP address is 11 and require almost 20% future growth. So
we are planning to reserve just double address almost 30. So the network details will be
- Network : 172.16.123.160/27
- Network ID : 172.16.123.160
- Broadcast ID : 172.16.123.191
- Range : 172.16.123.161-172.16.123.190
- Free address : 30-11 = 19
5.5 Finance
The current requirement for the IP address is 7 and require almost 20% future growth. So we
are planning to reserve just double address almost 14. So the network details will be
- Network : 172.16.123.192/28
- Network ID : 172.16.123.192
- Broadcast ID : 172.16.123.207
- Range : 172.16.123.193-172.16.123.206
- Free address : 14-7 = 7
5.6 Finance
The current requirement for the IP address is 3 and require almost 20% future growth. So we
are planning to reserve just double address almost 6. So the network details will be
- Network : 172.16.123.208/29
- Network ID : 172.16.123.208
- Broadcast ID : 172.16.123.215
- Range : 172.16.123.209-172.16.123.214
- Free address : 6-3= 3
11
5.4 Sales
The current requirement for the IP address is 11 and require almost 20% future growth. So
we are planning to reserve just double address almost 30. So the network details will be
- Network : 172.16.123.160/27
- Network ID : 172.16.123.160
- Broadcast ID : 172.16.123.191
- Range : 172.16.123.161-172.16.123.190
- Free address : 30-11 = 19
5.5 Finance
The current requirement for the IP address is 7 and require almost 20% future growth. So we
are planning to reserve just double address almost 14. So the network details will be
- Network : 172.16.123.192/28
- Network ID : 172.16.123.192
- Broadcast ID : 172.16.123.207
- Range : 172.16.123.193-172.16.123.206
- Free address : 14-7 = 7
5.6 Finance
The current requirement for the IP address is 3 and require almost 20% future growth. So we
are planning to reserve just double address almost 6. So the network details will be
- Network : 172.16.123.208/29
- Network ID : 172.16.123.208
- Broadcast ID : 172.16.123.215
- Range : 172.16.123.209-172.16.123.214
- Free address : 6-3= 3
11

6. Logical Network Diagram:
Logical network design is very much important to understand how the whole system works.
It helps the network and system administrator to know the exact working of the entire
infrastructure. The process of network design and planning is a repeatation process which
consist of the process like the synthesis of the network, network topological design and
realization os network. The complete process has the objective that the newli designed
network completes the specification requirements of the client. Architecture design of the
existing network will change so as the traffic flow.
So the new and modified design for the is given below with detailed labelling.
12
Logical network design is very much important to understand how the whole system works.
It helps the network and system administrator to know the exact working of the entire
infrastructure. The process of network design and planning is a repeatation process which
consist of the process like the synthesis of the network, network topological design and
realization os network. The complete process has the objective that the newli designed
network completes the specification requirements of the client. Architecture design of the
existing network will change so as the traffic flow.
So the new and modified design for the is given below with detailed labelling.
12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.