Discuss about the Intrusion Prevention System for Science.
The main aims and objectives for preparing the network infrastructure for compname.org.au is listed below:
The objectives for the development of the network diagram are given below:
The report is prepared for compname.org.au by proposing two different network solution for the organization aligning the needs of the organization. For the development of the network solution an analysis is made on the IT components required for the development of the network and a local area network is designed for connecting the network devices. A prototype of the network is designed in cisco packet tracer and the network devices are configured for connecting with different branches. A local area network and a cloud based solution is proposed that can be implemented by the company for virtualizing the servers and increase the scalability of the network. The benefits of the development of the in house servers and the cloud based design solution are discussed in the report.
There are 2000 hosts located in different areas of the organization and that are needed to be connected with each other for enabling communication in the network. Compname is a software development organization and it has different teams that are located in different floors of a three story building. There is a requirement for the management of the network and secure the network from external users. A wireless access point is needed to be installed in each of the floor such that the employees can connect their smart devices with the network and send and receive data packets. A dmz zone should be created for the installation of the servers and configure it according to the business rules for protecting the core layer of the network.
The main resources and IT components required for the development of the network solution are:
For the development of the network solution a three layer hierarchical model is selected because it increases the reliability of the network. The three layer hierarchical model is developed by dividing each of the layers of the network into core, access and distribution layers and reducing the complexity of the network. The access layer consist of the device that can be used for controlling the workgroup and it consists of the layer 2 switch and the access point that helps in connecting the servers and the workstations connected in the network. The distribution layer is used for analyzing the fastest path that can be used for forwarding the request to the servers connected in the network. The core layer is used for transferring the huge volume of data traffic in the network and it is used for interconnecting the distribution layer and consist of high speed network devices such as switches, routers that are connected using redundant links.
The geographical network diagram is created for each of the floor of the building and all the departments and the floors are connected via a concentrator. The concentrator is a network device that is able to efficiently forward the data packets to the designation address. It is used for handling the incoming data packets and redistributing it in the different layers of the network. Serial connection are used for connecting the firewall with the ISP router for carrying larger bandwidth and the frame relay is used for management of the network traffic. A router is used for each of the floor for the management of the data traffic and it is configured with different subnet for reducing the wastage of the IP address.
The use of separate router for each of the floor increases the scalability of the network. The network address plan is created for configuring the routers and the network device interface according to the addressing plan. For increasing the scalability of the network solution the network address is subdivided into different subnets and the routers and the servers are configured with DHCP pool for automatically assign the IP address to the hosts connected with the interface of the router.
The servers and the service that are required for the development of the current network solution are given below:
DHCP service – This is required for creating a DHCP pool and connecting the end device in the network with the IP address.
Web and DNS Service – This sis required to host a web page and created different account for the employees to access the resources and the information from the file server.
The design of the network is created for dividing the network into three different layers i.e. core layer, access layer and the distribution layer. In the core layer two routers are used and it is connected using redundant links such that if one of the link fails the data packets can reach the distribution layer using other link. It also reduces the congestion in the network and increases the availability of the device for sending and receiving data packets in the network. In the distribution layer 3 switches are used that helps in creating different vlan for different department and manage the network traffic efficiently.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
First Floor |
1000 |
1022 |
192.168.0.0 |
/22 |
255.255.252.0 |
192.168.0.1 – 192.168.3.254 |
192.168.3.255 |
Second Floor |
500 |
510 |
192.168.4.0 |
/23 |
255.255.254.0 |
192.168.4.1 – 192.168.5.254 |
192.168.5.255 |
Third Floor |
500 |
510 |
192.168.6.0 |
/23 |
255.255.254.0 |
192.168.6.1 – 192.168.7.254 |
192.168.7.255 |
The cloud based solution is proposed based on different strategy and the risk of adoption of the cloud platform should be avoided for the implementation of the cloud service. A multi provider design approach should be used for the identification of the workloads and performance of the cloud service providers and analysis of the workloads on the AWS and the Microsoft Azure. The same workloads can be applied in different cloud providers for mitigation of the potential outrage risk and different options should be provided such as development of the application for working with multiple service providers, driving automation and portability and deployment of different application and components for leveraging the micro service approach.
There are different cloud service organization that can be aligned with the business for differentiation of the current business process and gain the leading position. Technical innovations should be applied in the business such that business does not gets disrupted. The implementation of the cloud service technology in the current business process would help the organization to prioritize the cloud strategies. There are different service such as Iaas, SaaS, PaaS that are provided by the cloud vendor and it should be selected for the implementation of the cloud platform. There are different vendor such as AWS, Google, Microsoft Azure, etc. that provides IaaS service in the market and an in depth analysis should be made for the adoption of the cloud service.
The following are the list of service that are provided by the cloud service organization such as
Storage – the cloud service can be used for adding more storage for management of the files and document in the cloud servers.
Computation – The computation power can be increased and with purchasing of extra resource and reducing the needs of purchase of extra hardware for the in house server management.
Migration – The commercial platform can be used for migration of the data platform and the proficiency of the system can be increased.
Database – The database is used for recording the data generated due to daily activity and management of the information of the organization.
Network Delivery substance – Authorization should be applied at the access level for management of the network elements and ensuring integrity of data.
Management instruments – the assets in the organization can be managed for improving the service framework provided by the cloud vendor.
Developer Tools – The source codes generated by the software development team can be tested using the developer tools and it can reduce the cost of new application that are required to be purchased and installed in the physical machine of the organization for proceeding with the development of the software.
Security – The use of private cloud can increase the security of the sensitive data because the public cloud platform are not secure and can be accessed by external agents causing a risk for the organization.
IoT support – It can be used for the management of the unstructured data generated form the IoT devices installed in the network and storing them in separate servers for the management of the database.
Mobile Benefits – The mobile applications can be build using the cloud service and the cost of external software and hardware can be eliminated by the application of the cloud technology.
Analytics – It is applied for forecasting the future demands and finding the demands of the users for having better control on the business and administer according to the requirement of the users.
The database and the web servers can be virtualized with the application of vSphere and VmWare for migrating them into another location and management of the disaster recovery. The virtual machine can run independently irrespective of the physical configuration. The virtualization increases the dynamic application scaling and it can be uploaded to the cloud servers for remote management. The redundancy of the network can be increased and serve as a backup for handling the emergency condition.
For the demonstration of the Web, DHCP and DNS server configuration the Pc0 is used. The IP configuration is set from static to DHCP for getting the IP address from the DHCP server automatically. On getting the message that DHCP request successful it can be said that the configuration of the DHCP server is working and it can serve to allocate IP address to the device connected in the network. For testing the Web server configuration, the web browser is opened from the PC and the URL “www.compname.org.au” is used for connecting with the web server. If the default web page is returned that means that the connectivity and configuration is done properly.
Conclusion and Recommendations
From the above report it can be concluded that with the development of the network solution different platform are chosen. An analysis is made on the cloud based service and the in house servers for the development of the network solution for compname.org.au. The benefits of the adoption of the cloud platform and the drawbacks are analyzed for the selection of the new technology. The new technology that can be implemented for increasing the reliability of the network and creation of redundant links help in reducing the congestion in the network and increasing the availability of the resources. For the development of the network solution it is recommended that the cloud service vendor should be selected according to the requirement of the organization and the security option provided by the cloud vendor must be analyzed. The selection of the cloud service provider must not cause the organization to lock in and it should be scalable because the network is expected to grow in the following years. The implementation of the cloud platform can reduce the maintenance cost of the network and thus the organization can gain maximum benefits from the network solution.
Carthern, C., Wilson, W., Bedwell, R., & Rivera, N. (2015). The Network Layer with IP. In Cisco Networks (pp. 49-68). Apress.
Dowler, P., Demleitner, M., Taylor, M., & Tody, D. (2013). Data access layer interface, version 1.0. IVOA Recommendation. URL: https://www. ivoa. net/documents/DALI.
Hinds, A., Atojoko, A., & Zhu, S. Y. (2013). Evaluation of OSPF and EIGRP routing protocols for ipv6. International Journal of Future Computer and Communication, 2(4), 287.
Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., … & Darrell, T. (2014, November). Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia (pp. 675-678). ACM.
Jo, J., Jang, H., Lee, K., & Kong, J. (2015). SDN-Based Intrusion Prevention System for Science DMZ. The Journal of Korean Institute of Communications and Information Sciences, 40(6), 1070-1080.
Kliazovich, D., Bouvry, P., & Khan, S. U. (2013). DENS: data center energy-efficient network-aware scheduling. Cluster computing, 16(1), 65-75.
Kumari, N., Sharma, E. B., & Saini, R. K. (2016). Comparative Study of RIPng and OSPFV3 with IPV6. International Journal, 6(9).
Morgan, W., Tam, R., Gerasimova, N., Gastauer, K., Rasgado, S., Einstein, K., … & Townsend, E. (2016). U.S. Patent Application No. 15/361,769.
Mulder, J., & Dekker, R. (2014). Methods for strategic liner shipping network design. European Journal of Operational Research, 235(2), 367-377.
Nanda, S., & Hansen, R. A. (2016, July). Forensics as a Service: Three-tier Architecture for Cloud based Forensic Analysis. In Parallel and Distributed Computing (ISPDC), 2016 15th International Symposium on (pp. 178-183). IEEE.
Rohrer, J. P., LaFever, B., & Beverly, R. (2016). Empirical Study of Router IPv6 Interface Address Distributions. IEEE Internet Computing, 20(4), 36-45.
Simmons, J. M. (2014). Optical network design and planning. Springer.
Sun, Y., & Schonfeld, P. (2015). Stochastic capacity expansion models for airport facilities. Transportation Research Part B: Methodological, 80, 1-18.
Wang, G., Gao, Z., Xu, M., & Sun, H. (2014). Joint link-based credit charging and road capacity improvement in continuous network design problem. Transportation Research Part A: Policy and Practice, 67, 1-14.
Wu, L., Garg, S. K., & Buyya, R. (2012). SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences, 78(5), 1280-1299.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.