Task 1: Requirements Gathering
Requirements Gathering
The first step in the development of any tool or technique is to collect the requirement that is suitable and required according to the business nature. The subject of the paper in discussion is a 24/7 call centre and hence the requirements for the development of the network should be in accordance to the nature of the call centre. Additionally, the simulator that would be suitable for the development of the networking solution for the subject is Netsim simulator. The requirements for the network in discussion was gathered from quantitative and qualitative analysis. The data for analysis would be collected from the users and the management. One of the prominent factors that decides the success of the developed tool or technique is its compatibility with the user’s perception and hence to attain the discussed success level it is important that the user’s perception is taken in consideration. So, quantitative analysis needs to be done on the stakeholders of the subject, however, the business requirement cannot be ignored. The vitality of the business requirement could be understood by the fact that the network in development will decide the sustainability of the firm, if it is in context with the business requirement. Hence, the business requirement will be obtained from the senior officials of the firm through qualitative analysis.
Technique used for Collection of Requirements
The quantitative data were collected by distributing a set of questionnaire among the users who will use the proposed network. The questionnaire will take account of the questions that are associated with the ease or challenges that were faced by the users in the past and the advancements that they wish to see in the developed network. The qualitative data were collected through means of interview of the top officials. The main collection from the qualitative data were the number of users, floor plan of the structure, the total number of vlans and pcs along with number of separate vlans for each floor. The obtained details would prove to be of great vitality as it would assist in enhancing the performance efficiency & effectiveness of the developed network.
The analysis of data is also one of the most crucial task that needs to be assessed with great accuracy to ensure the success of the network in development. Hence, the techniques that were used as part of the analysis of the data has also been listed and discussed as follows:
Prototyping- A prototype for the network in development was developed and the organisational stakeholders were granted access to it and the latter were monitored while they were accessing the former. The discussed measure was done to ensure that the network being developed is in context with the user’s perception and is capable of fulfilling the business requirements. Additionally, it helped in identification of some errors and assisted in concluding over some upgradations that needed to be made in the final network. Based upon the review over the prototype an adequate plan for the network was devised and proceeded with it accordingly.
Task 2: Network Design and Configuration
Research & Brainstorming- One of the major attempts that was included as part of the network development was research & brainstorming. The discussed measure was taken because IT is a disruptive technology which witnesses major upgrade with time and hence to cope up with the best technology in existence, the literary and current work (such as journals and news articles) were reviewed. It assisted in gathering new ideas and knowledge about disruptive tools and technologies which were then brainstormed to include as part of the network development. Another one of the assistance that the discussed measure offered was analysis of the risks that may be associated with the proposed network. Risks are a major threat for the networks and hence to offer competitive advantage that the subject desires, it was crucial to do a risk analysis and the discussed measure assisted in attaining that objective. Based on the findings security measures were included as part of the network.
Survey- As stated above the existing network infrastructure along with the upgrades that is desired by the subject and its stakeholders were also included as part of the requirement collection and analysis. However, along with the requirements for the network in development the constraints that needs to be mitigated were also identified. Additionally, the parts or sections of the existing infrastructure that needs to be retained and latter needs to be migrated was also identified which would prove to be crucial for saving resources and offer comfort to the stakeholders.
Finally, adequate attention was cited to the recovery and backup of the data along in the minimal possible time was also taken in account to have access to the most appropriate hardware for the proposed network. Based on the above discussed factor adequate network protocol was also developed to have a fully functional and secure network.
Network Diagram
Figure 1: Network Design for Call Centre
(Source: Created by author)
Network Diagram justification
“Cisco 2811 series router” is used for the configuration of the subject’s network. Further, the interface of the router is subdivided in two different sections. Additional router can also be added to the network to improve its functionality or if needed. DHCP setting is used to configure the PCs because of the formers capability to auto allocate IP address. Another major factor that had been taken in consideration is the inclusion of the IPV6 enabled network which is in context to the business requirement of extending the network life to over 5 years. Additionally, the installation and configuration of two different vlans has offered the advantage of reducing the traffic congestion. The different vlans create alternative communication paths and m igrats the traffic according to the suitability and connectivity of the systems which is a desirable feature.
Network Configuration
Performance Metrics
The core factors of the performance metrics are the resource, cost, quality, scope, time and multiple other factors that holds responsibility for the development and functionality of a networking solution. The discussed metrics also assists in identification of the internal processes and how they are assisted by the network according to which the altercations to the network could be made to increase or concise the network domain along with other necessary modifications. Performance metrics are also capable of enhancing the quality of the network and the output offered by it. Hence, it can be stated that performance metrics are crucial for a sustainable metrics and hence it should be measured regularly. The measures that can be undertaken to leverage the performance metrics has been discussed in the following paragraph.
The first measure to leverage the performance metrics is to compare and contrasts the network output with the output that is expected from the network. It could be done manually or with assistance of the network monitoring tools. The performance of a network can be analysed by installing network monitoring tools such as the PRTG or Wireshark and similar other tools. The discussed tool will be able to monitor the flow of traffic between the central server and the user’s systems. Additional perks such as the notification for the violation of network protocols and intruder alerts are also offered by the tools in discussion. The record maintained by the tools in discussion can also be used for further enhancing the security and performance of the network. Auditing of the records will also offer benefit of modifying the protocols according to the changing needs of the subject.
- Fogel, A., Fung, S., Pedrosa, L., Walraed-Sullivan, M., Govindan, R., Mahajan, R. and Millstein, T.D., 2015, May. A General Approach to Network Configuration Analysis. In NSDI(pp. 469-483).
- Beckett, R., Gupta, A., Mahajan, R. and Walker, D., 2017, August. A general approach to network configuration verification. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication(pp. 155-168). ACM.
- Bieszczad, A., Pagurek, B. and White, T., 1998. Mobile agents for network management. IEEE Communications Surveys, 1(1), pp.2-9.
- Headquarters, A., 2015. Cisco Unified IP Phone 7960G and 7940G Phone Guide for Cisco Unified Communications Manager 7.0 (SCCP).
- Bahaweres, R.B., Fauzi, A. and Alaydrus, M., 2015, November. Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed). In Wireless and Telematics (ICWT), 2015 1st International Conference on(pp. 1-5). IEEE.
- Palacios, F., Bermúdez, M.V., Orozco, F. and Villón, D.E., 2018. IP Telephony Applicability in Cloud Computing. Journal of Science and Research: Revista Ciencia e Investigación, 3(CITT2017), pp.128-133.
- Hannah, W.A. and Behl, A., 2016. Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) Foundation Learning Guide (CCNP Collaboration Exam 300-075 CIPTV2). Cisco Press.