Monday, December 9, 2019
Network System Design
Question: Write an essay on Network System Design? Answer: Analysis of Business Requirements Alfa Travel is a very well-known name in the field of tourism management in the United Kingdom. Alfa Travel mainly organized their tour packages by using their dedicated bus service. All tourism information system is maintained and managed by Manchester based head office. Alfa Travels office that is locating in the Manchester that department is entirely responsible for scheduling of any tour packages (Windeck, 2013). All the staff of Alfa travel is directly reported to Manchester office through company network over the Internet. Now Alfa travel picked up another tourism organization for more growth in their entire organization. The new organization that is incorporated with Alfa travel is providing air service based tourism packages. The newly incorporated organization need to connect with Alfa travels Manchester office. But due to some circumstance connection of both organization are become more complex (A and M, 2012). The main reason behind this situation is both organizations is located in different geographic location. For the making of a connection between both systems, a new network design is needed. According to their business purpose both of the system is are identical but they some minor differences. Like Alfa travel organized bus service base travel and tourism packages whereas new adopt organization is providing travel and tourism services by helicopters (Akram and Sheikh, 2012). For their connection, a new centralized server and network are needed which can feed both networks by synchronization of both organization servers. For doing a new server is needed connect over internet based hosting sites or their hosting over the internet. For their hosting services, they need to install a new server in Manchester or Edinburgh. But for more specialty in Manchester office end new server needed to place in the Manchester office location. And if this service is provided by another third party inte rnet base server hosting organization then selection of network is not necessary (Boche, Naik, and Alpcan, 2012). For third party server hosting service provider provide cloud-based infrastructure so any resource can be pulled from any location of a globe. New server needed to connect with both organization server. Their two-way connection approach is required to maintain network scalability. Bilateral means a connection between two different organizations server over internet and connection through a dedicated network that will provide significant functionality among both servers due to network transactions (Bonwetsch, 2012). Alfa Travels new server can keep track of both networks and updated simultaneously to provide the report in real time manner. Newly installed server can merge both results that are collected from these two servers and make the same report. Alfa travels need to migrate their web services like web portal, online booking onto a new server. Migration of web server is very necessary for synchronizing both organization data and information. Otherwise, a website cannot provide the practical result and create an anomaly in a physical server database. But after migration of web server with a new central server is very use ful for their business perspective (Chaki, Meghanathan, and Nagamalai, 2013). Now tourist can book any service related with Alfa tours by browsing its single website. But before the redesign of the net network system Alfa tours needed to concern about other concern like security constraints, storage area, etc. Network solution The Alfa Travel is an organization that has been conducting tours and travels package in the United Kingdom. The organization acquired new small business or organization that was also a one type of travel organization. The organization based in the Manchester and the new organization is based on the Edinburg (Eira, Pedro, and Pires, 2012). The primary organization wants a new network system that will connect these two organization servers, and they can do their job accordingly. A new cloud server is the one of the best solutions for this situation. Two mainframe central server are located in two different places. Therefore, the cloud is the best solution for this organization. One centralized cloud server will connect these two separate servers so that the staffs of this organization can access their server from any one of their branch (Garcia-Dorado et al., 2012). The main centralized cloud server will connect with the two others server; those are the file server, and another one is the web server. One main website also stores in the web server that can be accessible from the two different location. This network solution will allow the staffs to make a connection with both servers. The organization has ten workers, twenty-five drivers and eight pilots, five administrative and human resource employee (https://www.eng.tau.ac.il, 2016). They also have few marketing employee and management employee. This network solution will provide the computer system to all the employee that are connected to the data server for their purpose. The printers are connected to the server. Both branches have two separate printers, those are linked to the mainframe computer of the respective office. A system is created for the workers for ordering the parts for the business and the helicopters (https://www.scte.org, 2016). The driver can view their log and the schedule and route information. The new network solution helps the admin and the human resource department to consider the employee and manage the employee. Marketing employee can manage the marketing activity. Store files and backup resources Two main servers or the mainframe computer is connected to one centralized cloud server. The cloud server has two separate servers; one is the file server, and another one is the web server. All servers are connected to each other. So the employ can view data from any office. One of the primary facility is the centralized cloud server (Kavian and Leeson, 2012). The employees can store a file indirectly in the cloud, and the other employees can access this file if they are authorized. The primary facility of this system is the file can accessible from anywhere in the world. If the bus driver needs to store a file or Shearer a file with the office, then it is the very easier process to save and share the file (Lammle, 2011). The file is backed up on the cloud server if the local office server will be corrupted and crashed then it is not a big problem in this situation. Because all the server is connected to the cloud system and all the files are backed in the cloud (Lim et al., 2011). Use of required application Alfa travels are tours management based company, so they need to monitor their travel troops location in real time manner. For making this applicable Alfa travels network need to connect with the GPS based relocation service provider (Ren, Cai, and Su, 2012). After connecting GPS device on board of their travel medium like bus or helicopter GPS transponder will send their location coordinates to their company server address. After getting and identifying GPS device and its location GPS server will send automatic updated continually towards alpha travels central server (Luo et al., 2012). Alfa also travels need to implement Intrusion detection system and firewall to protect their data from intruders attacks. Alfa travels also need to improvise an automated SMS service system for sending reminder or alert. Automatic SMS system will create the message for their tourist phone number as a reminder (Maheshwari et al., 2012). Share the network resource or Printer In the first layer of the system, the virtual switch will be the organic communication medium among all gadgets that are utilized as a part of Alfa Travel Manchester office. Every one of the gadgets furthermore printers is expected to interface with the main switch. Association of a printer with the system switch can make an asset pool of serving printing administrations (Malekzadeh ., Ghani and Subramaniam, 2011). Every one of the gadgets can share a particular system based printer for their printing arrangement. The provided network is the better solution for the employee to use the printer. Checking and sending electronic mail internally and externally Alfa travels customized their network in some level of application. Different level of implementation is authorized to do the different task. Alfa also travels configure their email system as per their specific requirements. They structured their mail services in two broad category one is internal email and external email. Internal email is also classified in two general category, and they are in-house internal mail and in-organization mail services (Michalski and Wyant, 2012). For in-house services Alfa Travels office employee can send the email to their office premises. An employee can send their local mail by using a local mail server. For a case of in organization based email service provide same infrastructure services, but there are some changes present. For in team based mail services employee of both office can send their email under the navigation of Alfa travels centralized server. In this system, all the operator can send mail through entire centralized mail server (Park, Hong, and Kang, 2012). Apart from internal email services, external mail services can be used as globally for sending mail among employee or customer. Secure internet access The internet is secure in the organization because a firewall system is used in a primary network system. All the server is connected to the firewall. Firewall protect the unauthorized access in the primary system. Also, a virtual private network is created for the overall organization security purpose (Pop, 2012). Utilizing the most formal evaluation encryptions available, Private Internet Access will secure your association for you. Using encryption calculations fabricated by specialists in cryptography, it is to a significant degree troublesome, and conceivably inconceivable, to break our encryption advances (Popescu et al., 2013). Also, we give grade server firewalls, and IP was shrouding with each record. The main issue: you will have solidified security so you might appreciate the web. . . Internet Protocol address structure Manchester office Device Port number IP address Subnet musk Router1 Serial 3 / 0 222.240.10.2 255.255.255.252 Alfa Travels server Fa 0/0 192.168.10.1 255.255.255.0 Computer1 Fa 0/0 192.168.10.2 255.255.255.0 Computer2 Fa 0/0 192.168.10.3 255.255.255.0 Computer3 Fa 0/0 192.168.10.4 255.255.255.0 Printer1 Gigabyte Ethernet 7/1 192.168.10.5 255.255.255.0 Printer 2 Gigabyte Ethernet 8/1 192.168.10.6 255.255.255.0 Edinburg office Device Port Number IP address Subnet Musk Router 2 Serial 3 / 0 222.240.10.2 255.255.255.252 Alfa Travels server Fa 0/0 192.168.10.7 255.255.255.0 Computer1 Fa 0/0 192.168.10.8 255.255.255.0 Printer1 Gigabyte Ethernet 7/1 192.168.10.9 255.255.255.0 Printer2 Gigabyte Ethernet 8/1 192.168.10.10 255.255.255.0 Computer1 Fa 0/0 192.168.10.11 255.255.255. Cost break down structure Work Break Down COST Network Structure 1 PC workstations 1.1 Setup workstation $1,000 1.2 install windows $12,000 1.3 Install office $10,000 1.4 Test workstation $0 1.5 Deploy workstations $1,250 2 Server 2.1 Server Structure $0 2.1.1 Design Server Structure $12,000 2.1.2 Implement Server Structure $10,000 2.2 Setup server $11,339 2.3 Install Server OS $14,540 . . 2.4 Test Structure $0 3 Network 3.1 Design Network Structure $7,500 3.2 Implement Network Structure $354,900 3.2.1 Implement internet access $15,000 3.2.2 Implement Email/Fax $1,000 3.2.3 Implement Printer $5,000 3.3 test network $0 4 Database 4.1 design database $10,000 4.1.1 DB structure $5,000 4.1.2 DB web front $1,250 4.2 Implement database $4,500 4.3 Test database $0 5 website 5.1 website design $45,000 5.2 implement website $12,500 5.3 test website $1,230 6 security 6.1 security design and features $5,000 6.2 implement security $3,500 6.3 test security $1,250 7 training 7.1 development training schedule $0 7.2 train employee $15,000 Network system Implementation The proposed network of Alfa travel organization is connect three different servers and a web server. So the design of the entire system must be done with some security measurement and network constant for providing a better scalable and effect network management. For doing this task the Alfa travels Manchester based office and Edinburg office need to redesign their entire network structure to communicate between newly installed centralized servers (QIAN et al., 2012). In the first phase of development Manchester, based office system is redesigned with an installation of new high-performance router and switches. In the first layer of a network, the functional switch will be the primary communication medium among all devices which are used in Alfa travel Manchester office (Ren, Cai, and Su, 2012). All the devices and also printer are needed to connect to the primary switch. The connection of printer with network switch can create a resource pool of serving printing services. All the d evices have the ability to share a single network based printer for their printing solution (Scc.spokane.edu, 2016). Manchester based office server is connected to a router where the primary function of the router is to create a service enabled platform among the network switch; Manchester based office server and internet service provider. Router is also protected by a thread party firewall service to identify the security threat and elements them (Tang, Zhang, and Liu, 2012). All the information of Manchester office computing devices is routed through three primary router and office server. The Edinburg office will have the same configuration like the Manchester office with some minor changes. Because the main functionality and maintainability are authorized under the Manchester based office (Windeck, 2013). The Edinburg office network based system will serve all the information as requested on the side of Manchester based office. For accessing information from Manchester based office will require some verification that will be made by the management authority of Manchester office. Now the major part is connecting the both network through a single centralized server. For connecting to a new centralized server needed to reconfigure both routers of the Alfa travels organization (Boche, Naik, and Alpcan, 2012). They need to configure their network address according to central server hosting provider network information. Due to security reason Alfa travels organization needs to customize their service by enabling the network firewall and ICT or information communication technology based on intrusion detection system devices. So they can do analysis their system and make some implement towards its security improvement (Chaki, Meghanathan, and Nagamalai, 2013). In this network information communication technology based on intrusion detection system devices or IDS is needed to configure for analyzing all inbound network packet. There is no necessity to filter inbounds network packet. The reason of disabling outbound network IDS system is there is no threat in its cont ent or network packet (Eira, Pedro, and Pires, 2012). In previous day, Alfa travels web server is connected along with the Manchester based office server. But for the new situation Alfa travels need to migrate it to a new centralized cloud server. So another office that is situated in Edinburg can also access the web content (Garcia - Dorado et al., 2012). Now all the information of two servers (Edinburg office server and Manchester office server) can simonteneuslly update create or delete web content for their user. On the user end, they also have the flexibility to book both tours package tickets by browsing a single website. Alfa travels mail server is needed to connect with the centralized server to serve both office central server (HTTP : // www. Eng .tau .ac .il .org, 2016). Network design implementation and critical appraisal For configuring of new centralized server needs to meet some particular condition. In the first phase of network configuration all the end devices like computers, network printers, need to configure their network domain, subnet mask and the network gateway. So they can access the entire network without any network anomaly (Kavian and Leeson, 2012). All the end devices the IP address must follow the fundamental rule of public IP addressing. For adding more security they can be configured with the IPv6 network addressing but it is not necessary due to internal network activity (Lim et al., 2011). All the end computing devices of the office needed to configure their subnet musk as the router subnet musk to accessing individual devices information. Alfa travels used the manageable switch for them each office so the switch can cause automatically manage the network bandwidth. Using a controllable switch is the very functional organization like Alfa travels because it has capability of scheduling the network resource in priority based (Luo et al., 2012). So any user who has maximum priority needed not to wait for bandwidth allocation. Cat 5 cable connects all the end devices with network switch (Maheshwari et al., 2012). Cat5 cable connected both the switch and end devices by their RJ45 ports. On every switch utilize the accompanying diagram to finish the ideal switch setups. Additionally, make certain to design tending to and hostnames. The main IP for each subnet ought to be allotted to the switch interface. The interfaces should be configured as specified in the IP tending to segment above; utilize a clock Rate of 64000on the R1-ISPS0/0/0 interface (Malekzadeh, Abdul Ghani, and Subramaniam, 2011). The static course onR1-ISP ought to indicate the Existing Student LAN subnet using R2-Central's serial interface IP address; the static route on R2-Central ought to be a static default course that focuses on R1-ISP's serial interface IP address (Michalski and Wyant, 2012). At whatever point you design a Cisco IOS gadget, make sure to spare your setup. The switch is connected to the router is configured with the Internet service provider Internet Protocol address. Both the offices have one switch and one router for the network purpose. Central office server is connected to the router. This server is content all the office data files and the all the relevant information. The router is connected to the one centralized server (Park, Hong, and Kang, 2012). That is cloud network. Manchester based office server is joined to a switch where the necessary capacity of the switch is to make an administration empowered stage among the system switch, Manchester based office server, and web access supplier. The switch is additionally ensured by a string party firewall administration to recognize the security risk and components them (Popescu et al., 2013). All the data of Manchester office processing gadgets are steered through three primary switches and office server. A website is also included for booking facility. The site is very simple, and basic HTML code is used. The user of this website can view this website by visiting the URL of the Alfa travels organization. In Cisco packet tracer, the network designer makes this website and include in it. The website can be viewed on any computer. All the end devices the IP address must follow the fundamental rule of public IP addressing. For adding more security they can be configured with the IPv6 network addressing but it is not necessary due to internal network activity (Lim et al., 2011). All the end computing devices of the office needed to configure their subnet musk as the router subnet musk to accessing individual devices information. Alfa travels used the manageable switch for them each office so the switch can cause automatically manage the network bandwidth. Using a controllable switch is the very functional organization like Alfa travels because it has capability of scheduling the network resource in priority based (Luo et al., 2012). So any user who has maximum priority needed not to wait for bandwidth allocation. Cat 5 cable connects all the end devices with network switch (Maheshwari et al., 2012). Cat5 cable connected both the switch and end devices by their RJ45 ports. On every switch utilize the accompanying diagram to finish the ideal switch setups. Additionally, make certain to design tending to and hostnames. The main IP for each subnet ought to be allotted to the switch interface. The interfaces should be configured as specified in the IP tending to segment above; utilize a clock Rate of 64000on the R1-ISPS0/0/0 interface (Malekzadeh, Abdul Ghani, and Subramaniam, 2011). The static course onR1-ISP ought to indicate the Existing Student LAN subnet using R2-Central's serial interface IP address; the static route on R2-Central ought to be a static default course that focuses on R1-ISP's serial interface IP address (Michalski and Wyant, 2012). At whatever point you design a Cisco IOS gadget, make sure to spare your setup. The switch is connected to the router is configured with the Internet service provider Internet Protocol address. Both the offices have one switch and one router for the network purpose. Central office server is connected to the router. This server is content all the office data files and the all the relevant information. The router is connected to the one centralized server (Park, Hong, and Kang, 2012). That is cloud network. Manchester based office server is joined to a switch where the necessary capacity of the switch is to make an administration empowered stage among the system switch, Manchester based office server, and web access supplier. The switch is additionally ensured by a string party firewall administration to recognize the security risk and components them (Popescu et al., 2013). All the data of Manchester office processing gadgets are steered through three primary switches and office server. A website is also included for booking facility. The site is very simple, and basic HTML code is used. The user of this website can view this website by visiting the URL of the Alfa travels organization. In Cisco packet tracer, the network designer makes this website and include in it. The website can be viewed on any computer.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.