Efficient Network Planning For USoft.com

1. Aims and Goals

New section, Starts on New page. Page numbering starts from 1.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The aims of your report (what you intend to cover) – goals, purpose, background & scope

May have sub sections

1.1 Aim of the report: Aim of the project is to develop a logical and physical network

1.2 Goal: To improve the communication in wireless, VoIP

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

1.3 Purpose: Increase the scalability, remote access, performance, security, flexibility and availability of system functioning

1.4 Background: uSoft HQ is located in a 6 storey building with proper floor planning. The company has different sections in different floors and also has 2 different branches that is controlled by the HQ itself.

1.5 Scope: Scope of the report is to develop an efficient network planning

This section contains a general description of the organisation, including your assumption about the business activities and future growth.

2.1 uSoft.com is a private biomedical software organization that has its own branches all over the Gold Coast Region. The company’s local area network will be performed with the help of the topology that is initially set.  The company has been ever developing and this is the main reason that the projection of redeveloping of the HQ’s existing LAN must be done in order to support the functioning of the project in a better manner.  

2.2 The HQ has a total of 6 departments, namely the software development section, solution design is also a sector of the HQ. Customer support, Sales, Finance, Human resources are the departments that are functional in the commencement of the project. 

As per business and technical goals, this section describes and organises user requirements (make any assumption needed if you wish about the user groups, location, application, etc.)

May have sub sections such as:

3.1 Mobility Requirements: due to the fact that the uSoft.com has 2 different branches and 1 HQ, mobility is very important. This leads to the fact that the management of the undertaken project will require wireless technology in completion of the tasks

3.2 Security requirements: Implementation of the control access and firewall will be enacting beneficial for the uSoft.com. With the help of these security techniques uSoft.com can perform their functionality in an efficient manner

3.3 Bandwidth requirement: The Ethernet bandwidth must range from 25 Mbps to 1000 Mbps

3.4 Application requirement:  the application that will be setup must be having high robustness as per the security cooncern

3.5 Remote access requirement: Remote access requirements are one of the main aspect of uSoft.com. The fact that the functioning of uSoft.com will be performed with the help of the data management from the HQ. This management of the entire data system is performed from a single office.

  1. Logical Design

2. General Description of the Organisation

This section contains all aspect of the proposed solution in details with justification.

Implementation of the Tunneled Connections in the uSoft.com will help in sending data in a private manner over the digital platform. With the help of the VPN service encapsulation, data transaction is performed. This leads to the fact that the data that are transferred do not leak the personal data of the sender. This helps in increasing robustness in the security of the uSoft.com

With the help of proper implementation of the firewall in uSoft.com, the main advantage that is received includes isolation of the computing system. Firewall helps in selection of the ports. This ensures the fact that the management of the project will be better performed. uSoft.com will also gain benefits in this section as the usage of internet will get more secure.

Access control is the technique that decides the permissibility of the data access. Access Control ensures the fact that the risk assessment can be performed in a better manner. This leads to the fact that the data that are stored in the data base of uSoft.com will stay protected and accessing of unauthorized personnel will not be allowed. This security system uses the personification of identity of the personnel who can approach the data, this will help uSoft.com to realise the imposters who are present and function accordingly

With the help of the Antimalware system, the min advantage that will be enjoyed by uSoft.com is that they can stay protected from the viruses that might be present. With the help of the antimalware system, with different branches and several computing system introduction of Malware can harm the functioning of the uSoft.cm. This might affect the processing of beneficially conducting of the business. This is the main reason that the management of the uSoft.com requires better management of the system.

With the help of the implementation of the DMZ, uSoft.com gets benefitted as the DMZ isolates the public server of the organization from the other LAN services. In case unauthorized access to the organization is checked in and the issues that are present are discarded.  With the help of DMZ, easy route to the LAN system is closed and this is the main reason that the processing of the entire system is performed with compromised server setting. These are the main reasons that uSoft.com will be benefitted on using the terminology of the DMZ.

3. User Requirements

4.2   Wireless Networks:  this sub-section describes and justifies your proposed solution such as location and no of APs, subnet, security, etc. 

The mobility of the networking system is very important in processing of the project. This ensures the fact that the management of the project will be performed with the help of the wireless networking system. As there are 1 HQ and 2 branches of the office. This ensures the fact that the management of the project will get easier. Hence the productivity of uSoft.com will get better. Robustness of the wireless network is also comparatively high and hence this will affect the uSoft.com in a better manner. Even in cases of disasters that might occur, people in different branches and the HQ can communicate with each other. With the help of the usage of the subnet system, the main advantages that are present includes improved speed and network performance. With the help introduction of the subnet by the uSoft.cm, a single broadcast packet is used for sending the data to the each and every device present.  With the help of the access point implementation, uSoft.com will be well performing and this is the main reason that the projection of the uSoft.com will be performed in a better manner

4.3  Virtual LANs: this sub-section describes and justifies (benefits) your proposed solution for VLANs  including no of VLANS, user groups, routing between inter VLANs, etc.

4.4 In case of using the VLAN service the main advantage that is present includes the fact that the user can gain access to their functioning process. This insists the facts that prosecution of the shift in membership. In case the job role or the job location is changed, the main advantage that will be taken into consideration incudes the fact that the employee can just shift their job location and log into different management portals for continuing their services. uSoft.com with 2 branches and 1 HQ gets benefited from the system. VLAN acts beneficial in progression of the management as per the diversity of the location of the object.

4.5 With the help of the introduction of the user group in uSoft.com, the main advantage that is present in the projection includes the fact that the connectivity in between the different employees of different organization increases and the job that is ti be performed by the employees of different branches in a collaborative manner gets performed in a better manner. With the help of the introduction of the VLAN, the main advantage that might be enjoyed by uSoft.com is that the usage of A Layer 3 switch is not required. This systems also helps in provisioning of better communication.  

  1. IP Address Allocation Plan: this section describes and justifies IP subnetting, static and dynamic address allocation, etc.

4. Proposed Solutions

May have sub sections

5.1 IP Subnetting: The IP address is provided with the subnet mask number that helps in recognizing the host address. Virtually distinguishing the private network in terms of the network administrator is well defined. With the help of the IP subnetting, uSoft.com can prevent broadcasts that are unnecessary in nature. Security options also increase as per the functioning of the uSoft.com

5.2 Static addressing: With the help of the introduction of the static addressing uSoft.com will get benefitted in terms of hosting of the servers that contain data regarding the computing accessories as per the location of the server from a distinct location.   

5.3 Dynamic addressing: with the help of the implementation of the dynamic addressing performed by the uSoft.cm, static data address can be saved and the shortage of the static data addresses can be resolved

IP addressing plane for the HQ

Major Network: 172.16.120.0/22
Available IP addresses in major network: 1022
Number of IP addresses needed: 733
Available IP addresses in allocated subnets: 948
About 94% of available major network address space is used
About 77% of subnetted network address space is used

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Software Development

207

254

172.16.120.0

/24

255.255.255.0

172.16.120.1 – 172.16.120.254

172.16.120.255

Solution Design

186

254

172.16.121.0

/24

255.255.255.0

172.16.121.1 – 172.16.121.254

172.16.121.255

Customer Support

125

126

172.16.122.0

/25

255.255.255.128

172.16.122.1 – 172.16.122.126

172.16.122.127

Sales

105

126

172.16.122.128

/25

255.255.255.128

172.16.122.129 – 172.16.122.254

172.16.122.255

Finance

65

126

172.16.123.0

/25

255.255.255.128

172.16.123.1 – 172.16.123.126

172.16.123.127

Human Resource

45

62

172.16.123.128

/26

255.255.255.192

172.16.123.129 – 172.16.123.190

172.16.123.191

  1. Logical Network Diagram:  Logical diagram(s) shows data flow and functional structure including location of key network interconnection point, subnetting (as well VLAN, VPN) architecture, key network services, brief IP addressing and main device naming, type and no user devices, etc.
  1. Physical Network Diagram:  Physical diagram(s) shows location of major end users and network devices such as servers, interconnecting devices, firewall, wireless access points, etc. with appropriate icons and legends.

Conclusions

From the above discussion it can be stated that the uSoft.cm has been an expanding business organization. This insists the fact that the management of the project that is under projection can be benefitted as per the management of the data transaction. This ensures the fact that the commencement of the project is done with proper efficiency. With the implementation of the VPN, firewall setting, DMZ. IP Subnetting and VLANs, uSoft.com can be having a higher efficiency in functioning.

List of References

Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S. and Uhlig, S., 2015. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), pp.14-76.

Johannisson, B., 2017. Networking and entrepreneurial growth. The Blackwell handbook of entrepreneurship, pp.368-386.

Kuss, D.J. and Griffiths, M.D., 2017. Social networking sites and addiction: Ten lessons learned. International journal of environmental research and public health, 14(3), p.311.

Lecher, W., Platzer, H.W. and Weiner, K.P., 2018. European Works Councils: development, types and networking. Routledge.

Comer, D.E., 2018. The Internet book: everything you need to know about computer networking and how the Internet works. Chapman and Hall/CRC.

Leung, V.C., Yu, F.R. and Zhang, X., 2016. Green communications and networking. CRC Press.

Smed, J. and Hakonen, H., 2017. Algorithms and networking for computer games. John Wiley & Sons.

Arslan, M.Y., Sundaresan, K. and Rangarajan, S., 2015. Software-defined networking in cellular radio access networks: potential and challenges. IEEE Communications Magazine, 53(1), pp.150-156.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.