IT Infrastructure project phase 1 Assignment
Introduction
According to the requirement IgnaceBazigaHospital owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated LAN. The department has recently deployed a new “Radiology Images” application as part of their initiative to digitize patient records. However, the department staff sometimes faces long application delays during busy hours. It also experiences regular delays in Internet connectivity, FTPS services, web services, and email services. As per the case study, we have to build a prototype of a network that will support a medium-size network for 200 to 1000 devices. It will provides high speed and good quality of the service for the organization. To build the strong network, I am using a good quality and good feature network devices like router, switch etc. Computer user system should be free from a virus so we might be used antivirus tool. Another idea from my side, we should use IDS system which is a helping to provide the security and help to identify the internal and external attacker. A network should be reliable so that in future we can be easily modified and enhance the system as the company requirement and user demand without disturbing existing network and we can also increase the scalability of the system.
Project requirements
Router: Routers is another significant part of the network and it helps to link various network to each other. There is a different type of network topology available in the network architecture. A router is a very valuable part because it helps to data communication by using a method of packet switching. Routers help to reduce the collision in the network. Routers are also helped to decrease the traffic in the network.
Laptop: It is a host of the network
Switch: A switch also helps to avoid the collision of the network. Switches are also helped to connect the different workstation with each other.
Desktop PC: It is also a host of the network
File Server: It is a server which is a help to transfer a file from source to destination
Literature review:
RAS (reliability, availability, serviceability) (Analysis, Architecture, and Design-Morgan Kaufmann ,2007)
- Reliability: The user requirement for consistently service availability. For example when the network is down, which will be the most effected department.
- Timeliness: The time concern of the network when the user be able to transfer, modify or access information. Delay produced by the system should be minimum. End to end or round trip delay is the concerned parameters
- Interactivity: It defines the response time of the system with the users. In this requirement the round trip interactivity is important. For example intra department interaction must have much less response time than inter department interaction
- Presentation quality: This requirement of the user is very important as this makes the user friendly environment for the end users. We are dealing with different people of different departments having lots of differences in work and technical knowledge.
- Adaptability: If any changes are to be made in the system, it should be easily done. For example if the resources are to be monitored and the workforce is changed, then the system must be robust such that it can be changed according to new workforce. Another example is when the network is modified such as extra servers are needed, than we need not have to change whole network architecture.Analysis, Architecture, and Design-Morgan Kaufmann ,2007)
- Security: In the given scenario, authentication, integrity, confidentiality is a major concern. The financial and development resources are very important which needs to be protected from unauthenticated persons.
- Supportability: Due to fast changing network requirements, a central support system is needed by the organization to make the system adaptable. The network operation staffs and network operations center (NOC) plays important role in this.
- Future growth: The organization should estimate the growth of the network in future as the company expands so is the users and network is to be expanded along with. Analysis, Architecture, and Design-Morgan Kaufmann ,2007)
Security, and disaster recovery (Analysis, Architecture, and Design-Morgan Kaufmann ,2007)
Fig: Security Risk Assessment (Network Analysis, Architecture, and Design-Morgan Kaufmann (2007))
Security configuration helps the administrator to control and monitor the system and fulfill all the objects of the network.
- A router should be properly configured with the correct IP address
- A host should be properly configured with the network. Unauthorized used should not able the network system. A system should be protected by the username and the password.
- To provide better security use the network security tools like antivirus, IDS system etc. and network should password protected so it will help to monitor and control the network traffic.
- Use good configuration switch and router so it will help to increase bandwidth and help increase efficiency and avoid conjunction.
To maintain the quality of service, we have to maintain time to time network configuration and for better security use the network security tool. We have to create the protocol of the network according to human factor means all the user can access a network with reliable and get the secure and good bandwidth [4]. Time to time update the devices of the network and keep data security and the backup. Give the proper IP address so then there should not be any conflict in the network.
IP Addressing:
Floors |
nodes |
Network ID |
Host ID |
Subnet mask |
Default gateway(given by ISP) |
No. of hosts |
First |
Node 1 |
192.168.0.0 |
192.168.0.2-192.168.0.253 |
255.255.0.0 |
192.168.0.1 |
252 |
Node 7 |
192.168.2.0 |
192.168.2.2-192.168.2.253 |
255.255.0.0 |
192.168.1.1 |
252 | |
Doctors |
192.168.3.0 |
192.168.3.2-192.168.3.253 |
255.255.0.0 |
192.168.1.1 |
252 | |
Others |
192.168.4.0 |
192.168.4.2-192.168.4.253 |
255.255.0.0 |
192.168.1.1 |
252 | |
Second |
Node 3 |
192.168.5.0 |
192.168.5.2-192.168.5.253 |
255.255.0.0 |
192.168.5.1 |
252 |
Node 6 |
192.168.6.0 |
192.168.6.2-192.168.6.253 |
255.255.0.0 |
192.168.5.1 |
252 | |
Servers |
192.168.7.0 |
192.168.7.2-192.168.7.253 |
255.255.0.0 |
192.168.5.1 |
252 | |
Others |
192.168.8.0 |
192.168.8.2-192.168.8.253 |
255.255.0.0 |
192.168.5.1 |
252 |
Network design
As per the case study in this project network has to be designed such that it should be flexible and reliable, it must also be secure and data need to be protected from outside attackers. To maintain the quality of the network, it must be using best network devices such as routers, switches available in the market, we will analyze the requirement and design the network. Before designing the network in the packet tracer and simulating we need to add sufficient modularity, resiliency, and flexibility into the design
Topology:
Router configuration
ISP Router configuration
Router0>enable
Router0# configure terminal
Router(Config)# hostname Ignace_Baziga_Router_2
Router 2 configuration
NAT & PAT configurations in Local Router4
DNS Configuration
DHCP configuration
Security setting in routers:
Working of IT infrastructure
PC and device connectivity
DHCP working
FTP connected:
Conclusion
In this project the network is designed for IgnaceBaziga Hospital that owns a 5-story building and houses many departments that span multiple floors. Its Radiology department is spread across the first and second floors, connected by a dedicated LAN. We have used class A IP address so that it can have at least 1000+ devices connected through the network. The human factors are studied and used in the network so that the network is reliable, secure and flexible for future development of the network. The routers and switches are most important network devices that need to configured and optimized in a proper way. The simulation of the network is done in Packet tracer and network is optimized and tested .
Reference
- Chandra Kar, M. Rahman Syed, "Network Security Administration and Management: Advancing Technology and Practice" in, Pennsylvania, IGI Global, pp. 1-19, 2011.
- Rasmussen, W.B. Rouse, "Human Detection and Diagnosis of System Failures", Volume 15 of Nato Conference Series / III Human Factors, Springer, 2012
- Chaudhary et al., "Impact of Employee Motivation on Performance (Productivity) In Private Organization", International Journal of Business Trends and Technology, vol. 2, no. 4, pp. 29-35, 2012.
- J Gubbi, R Buyya, S Marusic et al., "Internet of things (IoT): A Vision Architectural Elements and Future Directions[J]", Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2012.
- MagrethMushi, Rudra Dutta, "Human Factors in Network Reliability Engineering", Journal of Network and Systems Management, 2017.
- Buchmann, ”Verified Network Configuration:Improving Network Reliability”, Ph.D. dissertation, Faculty of Maths and Natural Sciences University of Fribourg,Switzerland, 2008
- H. Kantowitz and R.D. Sorkin,R.D, ”Human Factors:Understanding People-System Relationships”, 1st Edition, New Jersey, Wiley,1983
- Rasmussen, and W.B. Rouse, ”Human Detection and Diagnosis of System Failures”, Volume 15 of Nato Conference Series / III Human Factors, Springer, 2012.
- Data Communications and Networking, Fourth Edition , Behrouz A. Forouzan
- Computer Networking: A Top-Down Approach, Jim Kurose ,5th edition , 2017
- Analysis, Architecture, and Design-Morgan Kaufmann (2007)
Resources
- 24 x 7 Availability.
- Trained and Certified Experts.
- Deadline Guaranteed.
- Plagiarism Free.
- Privacy Guaranteed.
- Free download.
- Online help for all project.
- Homework Help Services