Assessment 2: Case Study-1
This assessment is designed to assess your skills in analysing the IT infrastructure hardware, software and networking requirements for a selected organisation, select an organisation. The organisation must provide IS services to the staff and customers such as email, webpage, and database. You have to write a report to answer the followings related to the selected organisation:
between the layers when an employee’s open the home page of the organisation website.
You may need to make some assumptions with the required justifications.
For successful completion of this assessment, you should meet with your group regularly (at least once a week face to face or via Zoom meeting). you require to study the material provided (lecture slides, tutorials, and reading materials), engage in the unit’s activities, and in the discussion forums. The prescribed textbook is the main reference along with the recommended reading material. Groups expected to discuss their work with lecturer and to seek support. In completing this assessment successfully, you will achieve ULO1, ULO2 and ULO2, this in turn will help you in achieving CLO-1, CLO- 5, CLO-6, CLO-7 and CLO-8, which collectively with other unit learning outcomes will help in achieving GA1, GA2, GA3, GA4 and GA9.
Assessment 3: Case Study-2 Assessment Details:
This assessment is designed to assess students technical skills in planning and configuring a computer network. In addition, it develops your skills in planning and finding IT infrastructures solution that suit enterprise requirements.
Assume the head officer of the IT department for ABC company wants you to analyse current network design and propose network configuration for the network shown in Figure 1.
Figure 1: Network design for ABC company
For the computer diagram in Figure 1:
where X, and Y are the last two digits of the student ID of one of the group members.
[For example, if the student ID is 201701234 then XY=34 and NET-A:192.168.134.0/24, NET-B: 10.10.134.0/24 and NET-C: 172.16.134.0/24]
Task-A: Prepare a report to provide the details configuration for the network for ABC company.
In this task you will fill the required information using the IP network diagram: (15 Marks)
Network/Subnet Network address Broadcast address
Valid host range
Network address Broadcast address
Network/Subnet Network address Broadcast address
Fill the following table with the corresponding IP addresses. (7 Marks)
|IP Address/ Subnet Mask|
|RA||Fa0/0||To NET A|
|Fa0/0||To NET B|
|Fa0/0||To NET C|
Configure router RA interfaces: (6 Marks)
Configure Routing Protocol
Provide commands to enable any routing protocol (student’s choice) in RA? (4 Marks)
Provide commands to enable routing protocol in RB (same protocol configured in RA)? (4 Marks)
Provide commands to enable routing protocol in RC (same protocol configured in RA)? (4 Marks)
The configuration document should include;
Task-B: (20 marks)
Assume the IT department of the ABC company wants to adapted virtualization and Cloud computed for hosting some of the organization application servers. Discuss the followings:
Please note you have to use Harvard reference style and the report should be submitted as a Word file.
There is one origination having name has ABC PVT. LTD., this is located in Melbourne Australia. This company is has 2 more branch office located in Perth and Darwin. The core business of this company is selling and manufacturing of conveyor belt in Australia. All the IT resources which are required to deal with user of this company are located in HQ of ABC PVT LTC., which is available in Melbourne. There is requirement to design the network for connecting these branch locations with each other. For the communication within branch location there will be local network and network resources to provide the local connection. All the users may have business application i.e. ERP system that will be used for the task management from the users. There will be various departments like Sales and marketing, Finance, Purchase, Management, Production, IT department, Customer service department. All the ask which are going-to performed by the various department, which are going to logged in the this business application. If any order is there from the customer than all the details will be provided by the Sales and marketing department, after that necessary purchase requirement for this order will be done by purchase department, so purchase will do entry of the raw material which is required. Similar to this all department will use ERP system as per they need. For the above requirements, new network design will be discussed in this report.
All computer machine in now a day, are supported to latest networking protocol TCP/IP ("What is TCP/IP?", 2019). For this there will copper cable or fiber optic cable in the networking. But fiber optic cable will not be used for the client system as it is very expensive and not recommend for the client PC but it can be used based on the need and demand of the network for the WAN or for the communication purpose between the switch. All the required component along with requirement is as describe below:
Network interface card will be used to connect the end device (computer system PC/Server) to the network. If NIC is not present in the PC/Laptop then it is not possible to connect this device with network. NIC can be wired or wireless, with the help of wireless network unguided connection between the device and network can be done, in case of wired network physical connectivity will be needed (Definitions and Hope, 2019).
For the making any LAN using copper cable, twisted pair cable type can be used. This cable will be 4 pair of cable each pair has different roles for carrying electric single. If there is requirement to build 1000basedT network than CAT 6 (Lifewire, 2019) or above cable is recommended for the network. This 1000baseT will provide the network speed up to 1 Gbps. All end devices/client will be connected with this device, while connection between the switch will be done using the fibre optic cable for the encasement of the network connection speed.
To connect this cable with end device RJ-45 Jack will be used, this jack can be configured using two ways, one will be TIA/EIA 568A and another is TIA/EIA 568B (Csd.uoc.gr, 2019). if there is requirement to connect same layer device like two switches with each other, than Crossover cable connection in RJ-45 jack will be used, in crossover cable , one side will be 568A and another will be 568B. in other hand, if two different layer device, Switch and PC/Server is required to connect with each other, than straight through cable connection will be used, where both end will have same crimping standard.
Star topology will provide efficient networking connection for the existing connected device as well as new device. In star topology all the devices will be connected with central device which will be switch. This switch may have port from 8 to 48(Fiber Cabling Solution, 2019). Based on the number of device which is required to connect with this network, switch can be selected. It is assumed that there will be 200 users in HQ, while 40 users in Perth and 150 users in Darwin. For connecting 200 Switch 4 x 48 port switch will be used.
In the give case there will be a backbone switch after the gateway device, all the other switch in the LAN will be connected with this networking, to connect all other switch with this backbone switch, uplink port will be used, this port will have more connection speed than the other ports with are available in the switch to connect the end device in network.
All the branch and HQ are present in different location, so it is not possible to connect each branch with single fiber optic cable. For the inter branch connection leased line connection will be used. In this leased line connection, there will be public IP address on both ends. So it is not possible to connect with same network, to route the traffic from one location to another location (Sackett, 2001), layer 3 device router will be used. This router will have routing table, with the help of that destination IP address will find his way to reach its destination. It is also possible to restrict or limit the traffic from one location to another location using ACL.
Firewall will be the security device which will work on all layers of OSI model. All requests from the public internet will be passing through this firewall. Using firewall, public access to the internal network can be restricted, using this firewall. Every firewall will have pre-specified category and databased based on that any attack or the specious required for accessing internal network will be restricted or blocked (Barracuda.com, 2019). Using firewall it is also possible to provide network authentication to the users, who requirement a network access, and specific bandwidth and usage limit can be set for the users, for the better control of bandwidth.
To access the services which are provided by the network and server there must be computer system that will be used by users for their routine tasks. Based on the give service details the hardware configuration of the system can be given as below (Support.microsoft.com, 2019):
|Processor||Min. 2 GHz CPU|
|RAM||Min. 4 GB|
|Operating system||Windows 10 pro|
To provide the service of business application and centralize domain controller Active directory, there must be one server host, which will be used for the hosting VM for this two requirement. The recommended hardware details can be given as per the below table:
|Server Name||PowerEdge R630 Rack Server|
|Processor||Intel® Xeon® E5-2609 v4 1.7GHz|
|HDD||1.92TB SSD SATA|
|Ethernet ports||Intel Ethernet I350 QP 1Gb Server Adapter|
|Operating system||Vmware ESXI|
|OS in VM||Microsoft Server 2019|
Type of application software with justification
As per the give scenario, there will be email service, web services and database service is required in the network. For the all such requirement, it is assumed that there will be web server which is hosted in cloud, so all the mail is required to be access from the internet only. To provide the Web service in the network, firewall rule must be configured such than it can allow the web traffic, it can be done by allowed port 80 and port 443 traffics, which are mostly responsible for the web service.
It is also assumed that for the business application, there will be Microsoft Dynamics NAV (Corporation, 2019) server which is hosted in HQ location. There will be SQL server along with Microsoft Dynamics NAV, to provide service of database along with application of Microsoft Dynamics NAV. The service related to Microsoft Dynamics NAV, will be run under control of Active directory. All users will have to use domain id firstname.lastname@example.org, to login in their system. Based on the specific rights of department, user can work with Microsoft Dynamics NAV.
There will be two version of Microsoft Dynamics NAV, server module will be configured in the server end and client module will be configured in client end. If this application is not installed than it is not possible to use business application.
Internet explorer (Support.microsoft.com, 2019)
In every client and server machine there will be a pre-installed web browser application along with Windows 10 operating system. This application will be used for the accessing web service provided in locally and for accessing any public website which is allowed via firewall device.
MS office/Libre office (The Windows Club, 2019)
To prepare document, table, presentation there will be a requirement of MS office or Libre Office. Here, MS office is powered by Microsoft and it is no freely available but Libre office is open source software and is freely available. To prepare table related document i.e. invoices, MS excel can be used, in case of any presentation, Power point tool can be helpful.
To access any mail from the intent, which is hosted in cloud, web browser can be used. But without internet it is not possible to use web browser for the checking mail. For such type of requirement, email client can be used. If MS office is installed in the system than MS outlook can be used, if not than “Mail” application in the windows 10 machine will be used for accessing older mail, offline.
Before going through the process, it is assumed that website name is www.abc.com , the IP address of client machine is 192.168.100.1, the MAC address of the device is AA:BB:CC:DD:EE:F1.based on this background details the use of OSI model can be given as below (Inetdaemon.com, 2019):
User will use in application layer and using web browser the website will be accessible. It is obvious that protocol for the web service will be http, so the data in application layer can be given as per the below:
Figure 1 : Application
While accessing the URL, there is another protocol called DNS, which will be used for resolving the IP address for the asked website URL. Now, assuming that the IP address for the abc.com has been resolved and now request is going to the next layer.
All the data which are coming from the application layer will be checked and translated into the crossed platform so that machine can understand it. Based on the platform (MAC/Linux) presentation layer will make the conversation.
When web site is loading there will be number of other URLs also available from that data is loaded. Here, session layer will download the content from the all links which are available in website, also create session so, that after creating connection to the target host, the connection automatically closed. Session layer also make sure about the data delivery and session isolation.
It is not possible to send whole bunch of request directly to the target. All the data will be first converted into chunks than it will be transmitted further. Here, transport layer will decide port number of the request. As the requested service in application layer is http, the port for the service will be 80. So, transport layer will do 2 duties, converting data into chunks and assigning port number details to the segment.
Figure 2: segment
As per the above, transport layer has added TCP details in HTTP packets which is coming from session layer.
In this layer IP address details will be added in the packet, as the client IP address is 192.168.100.1 this will be added to the segment which is received from the transport layer. The IP version for the given case will be ipv4.
Figure 3: Packet
Encapsulation of the segment to packet can be verified from the above figure, where network layer added IP details.
Data link layer:
Similar to the network layer, Layer 2 addressing details will be added to the data link layer. Here, source and destination mac address details will be added. As per the assumption, the MAC address of the client pc is AA:BB:CC:DD:EE:F1 so this will be added to the encapsulated packet which will be treated as frame.
Figure 4: frame
Frame having Ethernet address of layer 2 can be visible as per the above figure.
In this layer, frame from the data link layer will be converted to the binary data frame. This binary data frame will be transmitted to the medium, based on the media type (copper/fiber) the signal will be encoded.
The whole above process will be repeated from the physical layer to application layer and when server receive the request, server will reply to the sender client pc, at that time server became sender and client PC will became receiver.
In the given report, all required networking device has been provided, without which communication will not be possible. From that router will handle the traffic from one location to another location. The traffic will be passing on the leased line. After that using Layer 3 switch, this traffic from WAN will be distributed to LAN. End device will received this data based on the need of service. For providing the service, local server for the ERP, databased has been hosted locally along with active directory server. All the client machine will use, web browser for accessing the web service, outlook or other email client for accessing email service and Microsoft dynamic NAV-client for accessing the business databased, which is working along with AD. In the last, the OSI model in terms of Web traffic has been demonstrated and explained, where each layer will have their our responsibility to make communication possible.