Scope of the problem
Write a Report Study for AusEd.
For any organization the best way to approach to a strategic plan is understanding the major needs and making them fully stretched and met when distributing the organization resources. We have to understand all the equipment’s that are already planted in the institution. The way the data is being transmitted from the servers to the workstations is a major thing for any organization to understand. There has been so many times that we do not know what exactly happens in the background when we are sending and receiving messages. We see that we put much concentration on the icons and the interfaces rather than understanding what happens behind the scene. Hardware components are those devices that are tangible and we can physically see them while the software component are those that we use when interacting with the device. There are some steps that are followed when we are trying to analyze on the type of IT infrastructure we are going to setup. First step is understanding the existing hardware devices in the institution so that we are able to know what to buy and what not to. The second key requirement is knowing all the demands and needs of AusEd from the moment we start doing the thorough analysis and planning. After the analysis has been completed then we can be able to categorize all the problems and be able to come up with the best solutions that will solve the problems in existence. Third after the analysis we have to use the analysed data in coming up with the network diagram of the institution. Understanding the type of topology to be used will be a key thing in this assignment because it will help us to be able to come up with a good network design. In making the design to be successful and choosing the appropriate models then we can consider some key factors like how secure the network will be, the flexibility and scalability, understanding the budget allocated for the setting up of the network and lastly is the time plan where we have to give out the project schedule of how long we will take to complete the project. (Leon, 2015). To know the ease of the network that has already been designed it is good we know the management involved and the way they will respond to errors when asked to troubleshoot.
Assumptions
The main concept the AusEd need to be brought about in this case study is creation of a system that will help them to maintain their accounts and a continued good relationships with their customer. They want an advanced use of the Sugar Customer Relationship management and that of the Microsoft Exchange Server 2007 which is used for sending, when receiving and storing of resources used within the existing network. If AusEd has more than 2000 student within the school premises more than 200 people working in the institutions then we will need a network that will be strong and that will be applied and accessible to all the people may it be the admin, staffs, students or even lecturers. The requirements of AusEd are based on the hardware parts of the networking from the networking devices to the resources used by the individuals in the AusEd. Some of these hardware that must be used are such as the scanners, printers, personal computers and much more all other workstations working or used for working in making the network to be complete.
After the department associated with the development of the said IT infrastructure understands all the above then it is the mandate of IT manager or the designer of the network to come with a plan of the design to use for the network. The diagram lay down all the content used in something that can be visualized clearly showing how the devices in the network communicates with each other from the router to the devices such as the scanners, computers and the scanners among many more. The other idea that has been emphasized in this category is the issue of the security where we are advised to apply the devices such as the firewalls and the virtual Private networks.
The reason to as why we need the network design for AusEd is because of its future plan that it will use in achieving its plan strategically and increasing the diversified sources of funds which will essence in minimizing the cost of the non-core activities. Also when we understand their technology plan will assist them in future in developing an offline Moodle for students and the add-on Moodle for taking exams.
When we want to understand the objectives of AusEd then we can be able to setup a network layout that will be based on the good security and the extensions in future. (Coleman, 2012). Managing a network after being implemented is a thing will greatly needed to be observed. This will help in predicting the problems that may come as a result of such in future hence becoming easy to troubleshoot. Lastly but not least the other purpose of the study on the proposed network design of AusEd is that we will need the network very secure in that we will use the devices such as the firewall in the routers that will help filtering the of the data and the virtual private networks that will help to maintain and keep the confidentiality and privacy of the data.
List of Devices
There are major assumptions that have been made for this study to be a success. Some of them are such as.
- We have assumed that the management is willing to pay any amount of money to make the network design to be the best they ever though off and this will be in terms of the networking devices listed by the IT manager.
- We should also assume that AusEd needs to expand its network in future where we will have to make assumptions that the network will be scaled in case we have some additional devices that need to connected to the network.
- We have assumed also the 3-layered hierarchical architecture will be used in this context making it easy for us in case we want to scale or in need a network design model that is flexible unlike in flat network design model.
- Last assumption is that the cost used for the hardware’s might not be the actual price but it is just an estimate of what we anticipate to be used in the market.
- Lastly is that we will use the following three companies in buying our major products such as the servers, pcs and switches.
- Dell
- Cisco
- HP
Devices are the physical equipment’s that are used for sharing and transmitting resources from one place to the other. They are known for they make communications between the people within a given network to be very easy and much more convincing in all manners. Some of these devices are listed and explained in the table below.
Device |
Function |
Switch |
This is the device that communicates with the end devices directly. They do usually have ports where they devices are connected using the RJ 45 |
Router |
This is used for connecting the local area network over the internet. It is most applied by the both sides that is the ISP for passing the internet and hence it acts as device where everything must pass through before it enter or leaves. |
cables |
Just like any other cable they are used for connecting the devices to help them transmit so that they can share and transfer resources from one person to the other (Maggie, 2014). |
Servers |
They are of different types but they depend with the functionality. Their main function is to store and share resources within the network.some of these servers are such as the Application, proxy, DHCP, Mail, Web server etc. (AdminMuba, 2015). |
Access devices |
These are the the devices used for sharing and transferring resources that are used directly by the end user. |
Security devices |
These are the devices that are used for providing enough security to the data as it is transmitted across the network. In this case we have the use of VPN and the Firewall. |
Transceiver |
This is a wireless access point device which broadcast WI-FI signals in the network. |
Just like in any other network there are other minor devices that are sometimes used to bring the services close to the end user. Some of these devices are such as the use of personal computers, scanners, printers, photocopiers, hub, bridge, modem, gateway, repeater, RJ45 connectors among many others.
The figure below indicates the way the design of the network in AusEd is anticipated to be like.
Figure 1 the logical diagram
From this diagram we can see that we have computers , servers which are used in the access layer of the hierarchical and acting as the end-user which are connected via the switch where we use the cables such as the Cat 6e (Macken, 2016). .
Figure 2 three layered hierarchical network design
As seen in this hierarchical model the functions of these layers as explained here below.
Distribution layer- known for helping the devices to connect to the access layer which has been enabled for accessing that access layer and the services that are associated with it (Cisco, 2013)..
Access layer provides links that directly connects the users over the network.
Core Layer- a layer that help to connects all the devices in the distribution layer to very large Local Area Network in AusEd.
From the above we can deduct that there is successful communication and that we can be able to give AusEd a plan of the anticipated network design.
Networking Device |
Manufacture |
Specs |
Quantity |
TOTAL Cost (Dollars $) |
Computers |
Dell |
Core i5 with a RAM of 6GB, 1TB disk capacity, 3.2GHZ and have optical drives. |
1400 |
14000000 |
Laptops |
HP |
Core i5 with a RAM of 8GB, 500GB and supports AMD graphics. |
80 |
200000 |
Servers |
Cisco |
Have all the speed of up to 20G |
10 |
12000 |
Switch |
Cisco |
Each switch has about 48 Ports |
30 |
36000 |
Iphones |
cisco |
– Screen display is 5 inches and they are portable |
150 |
250,000 |
Switch |
Cisco |
Supports 48 10/100/1000 Ethernet ports, has forwarding capacity of about 76Mbps |
25 |
24000 |
Routers |
Cisco |
Supports up to 20G – It has more than two antennas Has a frequency channel of about 8GHZ, Supports all WEP, WPA and the WPA2, Its compliant to ABCs standards of 802.11 |
2 |
8500 |
Cables |
4000 Feet |
5 rolls |
5000 |
|
Firewall |
Cisco |
RV220w network that has a high performance in filtering the data |
5 |
75000 |
VPNs |
Cisco |
We will use CISCO VPN 3002 hardware .it is very secure in that it provide remote connections (Nelson, 2016). |
4 |
6500 |
Transceiver |
Cisco |
1000Base-T (Tittel, 2016).-Supporting up to 400 feet. |
45 |
72,000 |
TOTAL |
1,909,000 |
Dell core I5 desktop is a very good machine as its speed is very high and has a larger storage compared with the others. Also it is good to know that the cost of the stated hardware choice is friendly to the buyer. Cisco gadgets are very compatible in the manner that they easily communicate with other devices from other companies. The interoperability and how compatible a system is has driven is in choosing the three manufacturers and that is cisco, HP and dell.
Conclusion
The research above was to implement the said plan of the proposed design network where we will need to identify the model of the network design. Network design model that has been used in designing the network IT Infrastructure is the Hierarchical model making it easy when accessing, distributing and integrating all the devices in the core layers so that they can communicate with each other without errors. If the above design and plans will be followed then we will be able to implement the anticipated network design of AusEd.
References
AdminMuba, 2015. What are Types of Servers ?. [Online] Available at: https://wifinotes.com/computer-networks/server-types.html[Accessed 21 May 2018].
Anon., 2010. Subnetting. [Online] Available at: ttp://www.tutorialspoint.com/ipv4/ipv4_subnetting.htm
[Accessed 10 September 2017].
Cisco, 2009. Benefits of a Hierarchical Network, s.l.: Cisco.
Cisco, 2012. Cisco Router. [Online] Available at: https://www.router-switch.com New and Used Cisco network equipment, cisco router,cisco switch[Accessed 20 May 2018].
Cisco, 2013. Small Enterprise Design Profile Reference Guide, s.l.: cisco.
CISCO, 2014. Campus Design Summary, Singapore: Cisco.
Coleman, N., 2012. Happy Haven Day care network design proposal, Michigan: Network Solution Inc.
Hope, C., 2017. Router. [Online] Available at: https://www.computerhope.com/jargon/r/router.htm
[Accessed 03 may 2018].
Hope, C., 2017. Server. [Online] Available at: https://www.computerhope.com/jargon/s/server.htm
[Accessed 03 May 2018].
JoshWepman, 2015. techwalla. [Online] Available at: https://www.techwalla.com/articles/what-are-the-benefits-of-hierarchical-network-design
Leon, A., 2015. 5 Fundamental Requirements For High-Performing Networks. A new set of network essentials is necessary to meet the challenges of today’s network administration and management, pp. 23-36.
Macken, T., 2016. Azure Resource Manager and Classic Deployment, s.l.: Microsoft.
Maggie, R., 2014. server. Types of servers, 23(12), pp. 23-40.
Meena, R., 2017. How to configure DHCP , DNS, HTTP Server in Cisco packet tracer along with switches.. Technoheper24, pp. 1-9.
Mitchell, B., 2017. Internet and Network. What is Computer Networking?, pp. 1-3.
Nelson, T., 2016. VPN requirements and components: What do you need to set up a VPN?. [Online]
Available at: https://searchenterprisewan.techtarget.com/photostory/4500270544/The-best-VPNs-for-enterprise-use/4/VPN-requirements-and-components-What-do-you-need-to-set-up-a-VPN
[Accessed 20 May 2018].
requirement, N., 2014. Network Requirements for a Small Office , s.l.: requirements network.