Information Communication Network Proposal For AusEd Incorporation Learning System

Design Expectations

Discuss about the IT Infrastructure & Competitive Aggressiveness In Explaining.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

This is an information communication network proposal intended for the AusEd Incorporation learning system. Recently the Maryland assembly approved enough funding to cater for the execution of the proposal (Campbell,  2018). The administration of AusEd Incorporation has chosen to evaluate the current IT infrastructure to support the increasing need for improved services for students and the staffs. Financing will be required to execute the proposal.

The suggested network is intended to support the three departments in AusEd namely: Sales, Operations, and Course Delivery. The Sales department manages marketing and sales processes. The department is as well responsible for course promotion and managing. Each regional office has four departments that should be attended. The Courses Delivery department is in charge of teaching as well as assessment, developing course materials, and learning management (Roldán Bravo, Lloréns Montes, and Ruiz Moreno, 2017).The Operations department controls all the main operations like information systems, accounting, and human resources management. AusEd has about two thousand full time students as well as about a hundred workers more than 50% of whom operate on part-time, a casual basis.

The proposed network is planned to accomplish numerous specific operational/business objectives:

  1. Safe Service: The fundamental aim of the network system is to offer safe managerial computing services to the incorporation’s three divisions (Laudon, and Laudon, 2015). It is planned to be physically and functionally isolated from accessibility by individuals who are not employees of the AusEd Incorporation education scheme hence minimizing the danger of illegal use.
  2. Update and Integration: Currently there are several LANs (Local Area Networks) in the company’s learning system, however most of the equipments used are outdated, several LANs are not compatible with one another, and not linked to system-wide networks(Hernantes, Gallardo, and Serrano, 2015). This suggestion defines a WAN (Wide Area Network) that updates and integrates these local area networks to support fruitful collaboration through the system.
  3. Processing of Versatile Data: The network is intended to facilitate users to recover, process, as well as store non-ASCII as well as ASCII text, video, still graphics, as well as audios from any linked PC.
  4. Collaboration: This network should combine the capabilities and power of different equipment in the AusEd Incorporation to offer a collaborative intermediate that assist users to combine their expertise irrespective of their locality (Hernantes, Gallardo, and Serrano, 2015).  A system will allow individuals to share ideas and information easily hence they are able to work more productively and efficiently.
  5. Scalability: The network is scalable, therefore more departments can be included when funding becomes accessible without redoing the fitted network.

The key consumers of the design at the company’s level should be the ten members in the Curriculum Division, three secretaries, three administrators, eight members in the department of Human Resources, six members in the Accounting/Finance Department, as well as three members in the Computer Service Division (Ajamieh, Benitez,  Braojos, and Gelhard, 2016).  At the regional level the key users should be four secretaries, four administrators, four participants in the Computer Service Division, sixteen members in the Human Resources Department, as well as two members in the Accounting /Finance Division.  Pre-service tutors, Parents, public, and the teachers are secondary consumers of the design because they will get information produced from the network, however they cannot use the system directly (Borena, and Negash, 2016).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Design Expectations. This network design undertakes the following (Andersen, Kasparick, Ulrich, Franke, Schlamelcher, Rockstroh, and Ingenerf, 2018):

  1. The AusEd Incorporation Learning Network contains a firewall, which safeguards all information entering and leaving the network.
  2. Internet services are offered by NBC (National Broadcasting Company) Network, supported by the administration of AusEd Incorporation.

Types of Data. The kinds of information that the system will serve includes; reports, bulletins, web pages, accounting information, and personnel profiles (Bouchard, Dysert, Farshi, Garber, Hackett, Lal, Mishra, and Pillai, EMC IP Holding Co LLC, 2017). Most of the information will be non-ASCII and ASCII texts, however some still images and perhaps a little measure of video and voice will be there (mainly for computer-based coordination).

Types of Data

 Data Source. The formation and exploitation of data is done at every end station on the structure (Liu, Li, Lin, Kang, and Xiao, 2017).  Some software applications found in Windows 10, mostly Dream Weaver as well as Office 2013 Proficient (Word, Outlook, Excel, PowerPoint, as well as Access) will generate the data. Other sources of data to be served at least on a restricted basis will be Windows 10 Fixtures (Notepad and Paint), NetMeeting, Photoshop, and Media Player. It is worthy to remember that the system will never be accessed from outside.

 Priority Levels and Numbers of Users. At the AusEd Incorporation level, the consumers will be secretaries, administrators, as well as members of the three divisions.  At the department level, the consumers will be secretaries, administrators, and participants in three divisions (Lindörfer, and Mansmann, 2017). The maximum users projected for the system at any specific time is a hundred: thirty regular users in Sales department, thirty regular users for the Course Delivery Department, thirty-three regular users at the AusEd Inc level, and seven unexpected users for the Operations department.

Three urgency stages will be served: management (top prioritized), user (medium prioritized), as well as background (low prioritized).  These titles do not match to administrative ranks in the AusEd Incorporation learning structure; however, they are system service ranks. Network management procedures will be given top-priority services; most network procedures will be given medium-priority services; a few procedures (like, backup, and e-mail transfers) will receive low-priority services (Hernantes, Gallardo, and Serrano, 2015). It is important to note that, system management will generally use a little measure of the bandwidth available; this meaning that user processes and management will enjoy equal support. Background procedures will as well get more than enough services, however they should be deferred as desired to continue supporting the user and management services.

 Speed of Transmission. The system will be clear to the consumer. Consequently, file transfers, as well as remotely implemented applications should preferably appear to function as fast as processes implemented in an end-station (Leitold, Arrott, and Hadarics, 2016). Dialogues with consumers so as to establish their expectations and needs show that an ordinary throughput of 10 mbps for each user among local area networks and 20 megabits per second per user in each LAN will hence more than back the necessary performances in most circumstances (teleconferencing is a possible exclusion).

Load Difference Estimates. Dialogues with consumers and surveillance of the use of LAN at the three levels’ average data produced per hour as well as highest loads from February to April, year 2001. The received data are presented in the appendices. The data show that the maximum average traffic size will happen from 9:30 a.m. – 7:30 p.m., from Monday to Friday.  The highest network traffic size is anticipated twice per day: 9:00 a.m.-12:00 noon as well as from 5:30 p.m.-7:30 p.m (Berger, Chen, Hu, Pendarakis, Rao, Sailer, Schales, and Stoecklin, International Business Machines Corp, 2017).  During night hours and during weekends the system traffic is slight apart from the day-to-day backup of the computers to the local area network servers within the regions and some batch data transmissions expected from the regions to the company (AusEd Inc). The data show the following system design parameters:

  • The average essential output on all local area networks during working time (7:30 a.m. – 6:30 p.m.), approximately 0.2 mbps only.
  • The average necessary output on the wide area network during working time (7:30 a.m. – 6:30 p.m.) will be 0.04 mbps only.
  • The peak anticipated traffic on each local area network will be approximately 100 mbps.
  • The highest expected traffic loads on the wide area network will be approximately 20 mbps.

Priority Levels and Numbers of Users

Of course, for the sake of avoiding user grievances, the system is planned for the highest traffic loads and not for the average traffic loads.

Storage Necessities. Storage should be big enough to accumulate all teacher, student, as well as AusEd Inc information (worthy to note: student information is information about students but not data created by students). Discussions and experiences by users’ anticipated and present storage necessities show that each consumer will have at least 100 MB space of the server (also to secondary storing on local computers); the maximum projected server-side capacity requirement per every user is approximately 1.5 GB. In addition, the network’s OS will occupy around 550 MB on every local area network server. Considering an issue of price-performance, each computer will possess a minimum capacity of about 10 GB, each one of the LAN servers will contain a minimum capacity of about 20 GB storage. The central server within the company will have about 36 GB storage capacity (vom Brocke, Braccini, Sonnenberg, and Spagnoletti, 2014).

Reliability Requirements. To maintain industry standards and the user expectations, both the WAN and the LANs are supposed to operate at least 99.9 percent uptime while undiscovered error is supposed to be at a rate of 0.001percent (Avram, 2014).

Security Requirements. A firewall is necessary to restrict any unauthorized user.  Part of the safety will be User account and a password that will limit accessibility(Avram, 2014).  Different accessibilities for network users and managers will be there.

Existing Network: The head office of AusEd Inc is located at Darwin, technical team maintain an accounting structure running registered MYOB program, a client association administration system utilizing open source email system based on Microsoft Exchange Server 2007 and SugarCRM software (Roy, Moitra, Das, Srinivasan, and Malhotra, 2015).

Network Head Office LAN

Network LAN Diagram Finance

Course Delivery Network LAN Diagram

Network LAN Diagram Sales Division

Network LAN Diagram Operations

HP Jetdirect ew2500 802.11b/g Wireless Print Server (J8021A)

HP NetServer Hard Drive

intelliFAX-4750e Business-Class Laser Fax

HP Laser Jet 81SON Series

Windows 2008 Server

Dell Optiplex Desktop Computer Quad Core i5 3.2GHz

CAT 6 Cable (2,000 feet)

APC BACKUP UPS 700VA

Catalyst 9500 1/10-G ?16- and 40-port switches

Catalyst 9500 40-G 12- and 24-port switches

Catalyst 9500 25-G 24- and 48-port switches

Catalyst 9500 100/40-G 32-port switches

Both RJ11 and RJ45 Plugs Packs of 50

Tool Kit

Labor (lvfaintaining the System) per hour

NBC Network (2 months, limited rights)

Cost Analysis

Item

Amount

Quantity

Total

HP Jetdirect ew2500 802.11b/g Wireless Print Server(J8021A)

$3,989.00

7

$27,923.00

HP NetServer Hard Disk Drive

$379.95

12

$4,559.40

intelliFAX-4750e Business-Class Laser Fax

$399.95

4

$1,599.80

HP Laser Jet 81SON Series

$2,569.95

5

$12,849.75

Windows 2008 Server

$820.95

5

$4,099.75

Compaq DeskPro EN i3/2600

$1000.00

70

$70,000.00

CAT 6 Cable (2,000 feet)

$150.99

5

$754.95

APC BACKUP UPS 700VA

$500.99

4

$2,003.96

Catalyst 9500 1/10-G ?16- and 40-port switches

$80.99

6

$485.94

Catalyst 9500 40-G 12- and 24-port switches

$129.99

5

$649.95

Catalyst 9500 25-G 24- and 48-port switches

$200.99

3

$602.97

Catalyst 9500 100/40-G 32-port switches

$449.99

4

$1,799.96

Cisco 2800 Series Integrated Services Routers

$2,419.00

$0.00

RJ45 Plugs
*Packs of 50

$50.94

8

$407.92

Tool Kit

$400.00

1

$400.00

Cisco Systems ASA 5585-X Adaptive Security Appliance models

$5,500.00

1

$5,500.00

Labor (lvfaintaining the System) per hour

$30.00

300

$9,000.00

NBC Network (2 months, exclusive
rights)

$700.00

36

$25,200.00

Subtotal of Tangible Costs

$167,837.35

Load Difference Estimates

One goal of business owners is to reduce cost and increase output. To do this it is important to assess the areas where time can be optimized and reduce unnecessary costs (Leitold, Arrott, and Hadarics, 2016). LAN network will benefit the institution in the following way:

To understand the supportable improvement for the industry, one major test is to use the limited land assets in a sensible and arranged way. To this end, Dudukovi utilized the spatial-choice supportive system strategies in light of geographic data frameworks, to help achieve the correct siting for newly planned activities for businesses. The proposed application tool is exceptionally helpful to the creating new business structures, where the reasonable industrialization is still in their untimely stages. Sotoudeh exhibited this in a whitepaper which depicts the essentialness of technologies on maintainable development. For instance, a few techniques supporting cleaner generation, and the Environmental Technologies Action Plan (ETAP) of European Union. It is additionally indicated out that accomplish practical advancement requires not just adopting the environmental user-friendly technologies for financial development.

Assist in Managing Data:The institutions documents will be stored in file servers instead of keeping them in every employee’s desk. The documents will be more organized (Leitold, Arrott, and Hadarics, 2016). In case of learning, whenever lecturers update anything in the files, it is changed in the server as well, hence all students wherever they are will receive the same update. Therefore the need for isolated backups for each file is eliminated.

Data is shared easily:The network system will help to share details about the students’ academic as well as financial issues. Data about the employees is as well shared easily using the system(Leitold, Arrott, and Hadarics, 2016). The network can also allow students to have discussions with their colleagues regardless of their localities. Since different departments in an institution must work together, it is important to share Data among them for easy running of the institution.

Roldán Bravo, M.I., Lloréns Montes, F.J. and Ruiz Moreno, A., 2017. Open innovation and quality management: the moderating role of interorganisational IT infrastructure and complementary learning styles. Production Planning & Control, 28(9), pp.744-757.

Laudon, K.C. and Laudon, J.P., 2015. Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText–Access Card Package. Prentice Hall Press.

Ajamieh, A., Benitez, J., Braojos, J. and Gelhard, C., 2016. IT infrastructure and competitive aggressiveness in explaining and predicting performance. Journal of business research, 69(10), pp.4667-4674.

Hernantes, J., Gallardo, G. and Serrano, N., 2015. IT infrastructure-monitoring tools. IEEE Software, 32(4), pp.88-93.

Leitold, F., Arrott, A. and Hadarics, K., 2016. Quantifying cyber-threat vulnerability by combining threat intelligence, IT infrastructure weakness, and user susceptibility. In 24th Annual EICAR Conference, Nuremberg, Germany.

Berger, S., Chen, Y., Hu, X., Pendarakis, D., Rao, J., Sailer, R., Schales, D.L. and Stoecklin, M., International Business Machines Corp, 2017. Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure. U.S. Patent 9,832,217.

vom Brocke, J., Braccini, A.M., Sonnenberg, C. and Spagnoletti, P., 2014. Living IT infrastructures—an ontology-based approach to aligning IT infrastructure capacity and business needs. International Journal of Accounting Information Systems, 15(3), pp.246-274.

Avram, M.G., 2014. Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technology, 12, pp.529-534.

Roy, C., Moitra, S., Das, M., Srinivasan, S. and Malhotra, R., 2015. IT Infrastructure Downtime Preemption using Hybrid Machine Learning and NLP. In FedCSIS Position Papers (pp. 39-44).

Lindörfer, D. and Mansmann, U., 2017. IT Infrastructure of an Oncological Trial Where Xenografts Inform Individual Second Line Treatment Decision. Studies in health technology and informatics, 235, pp.226-230.

Liu, Y., Li, X., Lin, Y., Kang, R. and Xiao, L., 2017, December. A colored generalized stochastic Petri net simulation model for service reliability evaluation of active-active cloud data center based on IT infrastructure. In System Reliability and Safety (ICSRS), 2017 2nd International Conference on (pp. 51-56). IEEE.

Bouchard, P.A., Dysert, D.C., Farshi, H.R., Garber, C.P., Hackett, C.J., Lal, P.B., Mishra, M. and Pillai, A.K., EMC IP Holding Co LLC, 2017. Method and apparatus for automated data protection with IT infrastructure visibility. U.S. Patent 9,736,007.

Andersen, B., Kasparick, M., Ulrich, H., Franke, S., Schlamelcher, J., Rockstroh, M. and Ingenerf, J., 2018. Connecting the clinical IT infrastructure to a service-oriented architecture of medical devices. Biomedical Engineering/Biomedizinische Technik, 63(1), pp.57-68.

Borena, B. and Negash, S., 2016. It infrastructure role in the success of a banking system: The case of limited broadband access. Information Technology for Development, 22(2), pp.265-278.

Campbell, W., 2018. The Impact of the Internet of Things (IoT) on the IT Security Infrastructure of Traditional Colleges and Universities in the State of Utah. In The Internet of People, Things and Services (pp. 132-153). Routledge.