IT Infrastructure Components
This project aims to design and implements the network for an organization. This organization is based on IT organization and it uses the information technology to delivers the effective customer satisfaction and marketing through their effective services compared to other IT organizations. The information technology is used to implement the organization business operations and it contains website for improving the marketing of the organization and meet customer satisfactions. www.csu.org.au is the domain name of this organization and it also contains email services for each employee. This organizations was presented in various locations. It has more than 2000 computers at the various campus. And, it shares the file between the staff by using file share and backup servers. The backup server is used to back up the staff important documents regularly. The organization information technology decided to analyses the current network infrastructure and implement that to provide the hosting the network services by using virtualization and cloud. This process done by using network simulator. The proposed network works depending on three layer hierarchical model and it is utilized for providing effective and secure network for the organization. Network design will be created and it will be implemented. The requirement of network infrastructure will be analysed. And, analysis the three layers hierarchical model for proposed network infrastructure. Creation of the cloud based design proposal will be done. The network simulation will be done.
The ITIL v3 is defined as the IT infrastructure components, because it contains a collection of networks, software, facilities, hardware and so on. The ITIL is utilized for monitoring, controlling, developing, testing and delivering the IT services for an organization (A, 2014). Here, we are using the following IT infrastructure components such as,
- Cisco Routers
- Cisco Switches
- Cisco Servers
- Dell Personal
Cisco Catalyst 2960-48TC-S Switch
- For an organization, the cisco catalyst switch is utilized for delivering high performance and scalability of network infrastructure.
- Basically, it helps business applications to reduce network down time on the organization’s network (Connecting networks companion guide, 2014).
- This switch is used to control the network traffic because it has the special features such as quality of services, layer three static routing as well as the IPv6 support.
- Also it supports the capabilities of mass deployment.
- It easily optimizes power usage to deliver energy efficiency of the network.
Cisco Router 1921/K9
- This cisco routers are used to delivers the high performance, security and reliability of the network for an organization. This routers is easily fixing the high availability that is used to manage and deploy the organization network connections.
- It is used to provide the secure broad band, wireless LAN connectivity and Ethernet.
- For the usage of customer premised equipment, this router is ideal.
- It delivers increased mobility for giving the next generation the options of WAN and LAN.
- It also offers the software defined WAN, next generation connection and integrated security.
- It easily enables the network connectivity services to provide the secure network.
Cisco UCS C240 M4 Rack Server
- The cisco servers are utilized for providing high security and performance.
- This server offers unified computing for increasing network agility and it decreases the TCO.
- It easily identifies the challenges of network work load which depends on the balance of internal storage, I/O and memory resources.
- It provides scalability and reliability of the network by it has the two unit rack and socket server. It easily extends the cisco united computing system capabilities (Diaz, 2014).
Basically, three layers hierarchical model is utilized for simplifying tasks to build a less expensive, reliable as well as a scalable hierarchical network for the organization. So, this organizations wants to design the hierarchical network infrastructure. And, it focuses on three functional areas like access layer, distribution layer and core layer. These layers are used to ensure the packers and delivers the end user computers to provide the secure and reliable access. These are backbone of the network and it has high end switches and speed cables to provide the flexible network infrastructure (Kotenko and Skormin, 2010).
The current IT infrastructure of the organization is does not provide the scalable and reliable network and also it does not provide the high performance on network components. It does not provide the security for an organization. So, this organization need high performance network components, cloud and virtualization services for implementing organization business processes and operations.
Geographical diagram of the network is illustrated below.
Identifies servers and services are as follows:
- Web services
- DHCP services
- File server
- DNS services
- Backup server
For the organization a network infrastructure proposed is illustrated as follows:
The organization proposed network infrastructure is based on three layered hierarchical network models. The implement network infrastructure is sued for providing high available, security, scalability of network. Then, for an organization it easily simplifies network traffic so as to provide a secure internet connection. It utilizes IT infrastructure network devices for monitoring, controlling, developing, testing and for delivering the IT services. Next, it has high speed network connection and high performance compared to existing IT network infrastructure.
Three layers Hierarchical Model
The proposed network infrastructure subnet mask and IP addressing are shown below.
Small and Medium sized business are uses the cloud services because it is one of the best investment to make the good business process and operations for an organizations. It is a best file sharing tool for documents and multimedia files which very large to send via, email. Also it delivers reliable data backup solutions and easy method for sharing files with the clients, colleagues so as to enjoy instant file accessing. For an organization, it supports to have best cloud storage services. For an organization, the recognized two cloud services are as follows:
- Acronis
- IDrive
Acronis
The Acronis supports to offer information assurance, matching up, sharing and secure document get to solutions and in addition framework administration instrument for any association. It secures everything in one straightforward advance. It works with both open and private hosts of client arrange.
IDrive
IDrive is utilized for offering the capacity plan for the individual and businesses. IT flaunts the broad document sharing and synchronizing the capacities. It can share the document and envelopes through email, versatile access, and remote administration devices and then some. It likewise reinforcement the different gadgets and various records continuously.
Proposed IT framework gives DNS, DHCP, and also web administrations for the organization. Additionally, it plays out Backing up and document sharing among the staffs. The dynamic application scaling utilizes virtualization and Cloud for giving viable association and it includes the following,
- Adequate asset maintaining.
- Meeting the pinnacle necessities could be expensive.
- Provide intense registering model which enables the clients to receive the assets when requested.
- In virtual machine occurrences, easily conveyed web application is introduced in the web server.
- Dynamically dispenses assets to the clients.
- Delivers IT assets when requested by clients.
- Then, ensures usage of higher assets.
- Reduces cost of administration and foundation.
For Personal Computers
In Personal Computers – 1
Configuration on personal computer by using following procedure to configure the PC.
Click on the Personal Computer and choose Desktop. Then, choose IP configuration. Finally type the IP address, Subnet mask and default Gateway as follows- 192.168.1.10, 255.255.255.0 and 192.168.1.1, respectively.
This process is illustrated as follows (Routing and switching essentials companion guide, 2014).
In Personal Computer – 2,
Type the IP address, Subnet mask and default Gateway as follows- 192.168.1.11, 255.255.255.0 and 192.168.1.1. This process is illustrated below.
In Personal Computer – 3,
Type the IP address, Subnet mask and default Gateway as follows- 192.168.1.12, 255.255.255.0 and 192.168.1.1. This process is illustrated as follow.
Personal Computer – 4
Type the IP address, Subnet mask and default Gateway as follows- 192.168.2.10, 255.255.255.0 and 192.168.2.1. This process is illustrated as follows.
Personal Computer – 5
Type the IP address, Subnet mask and default Gateway as follows- 192.168.2.11, 255.255.255.0 and 192.168.2.1. This process is illustrated as follows.
Personal Computer – 6
Type the IP address as 192.168.2.12, Subnet mask as 255.255.255.0 and Default Gateway as 192.168.2.1. This process is illustrated as follows.
Switch’s Configuration
Switch by entering command on command line, to configure.
Create vlan network for interconnecting both the routers.
This process is illustrated as follows,
Router’s Configuration
To configure router enter the following command on command line.
In Router 0,
Interface: fa0/0
The IP address: 192.168.1.1
Subnet mask: 255.255.255.0
This process is illustrated as follows.
In Router 0,
Interface: se2/0
ip address: 192.168.1.1
Subnet mask: 255.255.255.0
Current IT infrastructure
This process is illustrated as follows.
Interface: se2/0
ip address: 192.168.3.1
subnet mask: 255.255.255.0
Interface: fa1/0
ip address : 192.168.4.1
subnet mask :255.255.255.0
Interface : fa0/0
ip address: 192.168.2.1
subnet mask: 255.255.255.0
This process is illustrated as follows.
Configuration on IP route
IP routing process is completed with the help of Routers.
In router 0,
ip route : 192.168.2.0 255.255.255.0 192.168.1.0
In router 1,
ip route : 192.168.1.0 255.255.255.0 192.168.2.0
DHCP services are configured by following the following steps.
In Router 1,
For configuring DHCP connection enter the following command.
ip dhcp pool IPD
network 192.168.1.0 255.255.255.0
default-router 192168.1.1
ip dhcp excluded-address 192.168.1.1 192.168.1.5
ip dhcp excluded-address 192.168.1.6 192.168.1.9
DHCP connection is checked as follows:
Click on Personal Computer.
Choose Desktop then select IP configuration
Next, select DHCP
Automatically it gives the IP address, as follows (Routing protocols, 2014).
For configuring DHCP connection enter the following command.
ip dhcp pool IPD
network 192.168.2.0 255.255.255.0
default-router 192168.2.1
ip dhcp excluded-address 192.168.2.1 192.168.2.5
ip dhcp excluded-address 192.168.2.6 192.168.2.9
DHCP connection is checked as follows:
Click on Personal Computer.
Choose Desktop then select IP configuration
Next, select DHCP
Automatically it gives the IP address, as follows.
The web browser services are configured with the below mentioned steps:
Select server and choose web browser option.
Next type IP address, as in the below image.
The w DNS server is configured with the below mentioned steps.
Select server and choose Services.
Then select DNS.
Go to DNS services window, the type, csu.edu.au and enter address as 30.0.0.1.
At last, the record must be saved as mentioned below.
Then, DNS server name must be entered for every single Client, server and PC, as mentioned below.
DNS server is configured here, for every single interface. Then it allows inside and outside NAT address as follows.
At last, DNS services are checked as illustrated below.
Client pings the own gateway and as illustrated below (Scaling networks, 2014).Client Pings the server and it is shown below.
Conclusion
This project was successfully designed and implemented the network for an organization. This organization uses the information technology to delivers the effective customer satisfaction and marketing through their effective services compared to other IT organizations. And, it is used to implement the organization business operations and it has website to improve the organization marketing and customer satisfaction. And, it shares the file between the staff by using file share and backup servers. The backup server is used to back up the staff important documents regularly. The organization information technology successfully analyzed the current network infrastructure and implemented current network to provide the hosting the network services by using virtualization and cloud. This process done by using network simulator. For an organization, the proposed network depends on three layers hierarchical model and it is utilized for providing effective and secure network. Network design is created and implemented. Requirement of network infrastructure is analyzed. And, successfully analyzed the 3 layer hierarchical model for proposed network infrastructure. Creation of the cloud based design proposal is also done. The network simulation is also done. This organization in the future utilizes most popular cloud and virtualization services for improving the services of backup and file sharing.
References
A, J. (2014). Packet Tracer Network Simulator. Packt Publishing.
Connecting networks companion guide. (2014). Indianapolis, IN: Cisco Press.
Diaz, L. (2014). Advanced Cisco Routing: RIPv2, EIGRP, and OSPF. [Carpinteria, Calif.]: Lynda.com.
Kotenko, I. and Skormin, V. (2010). Computer network security. Berlin: Springer.
Routing and switching essentials companion guide. (2014). Indianapolis, IN: Cisco Press.
Routing protocols. (2014). Indianapolis, Ind.: Cisco Press.
Scaling networks. (2014). Indianapolis, IN: Cisco Press.