Network Architecture Current - Information Technology Assignment Sample

Information Technology Assignment Sample on Network Architecture Current and Future Requirements

 Sample Assignments

You can download the sample Information Technology essay on Network Architecture Current and Future Requirements with the following question for free at the end of this page. There are two important features of our samples worth noting.

  • Our samples are Marker reviewed Samples which means it has comments mentioned by the marker throughout the assignment. 
  • The marker has also highlighted marking rubric points in yellow (at the end of the solution) which he found present in the solution.

For further assistance in Information Technology Assignment help, please check our offerings in Information Technology assignment solutions. Our subject-matter experts provide online assignment help to Information Technology students from across the world and deliver plagiarism free solution with free Turnitin report with every solution.

(AssignmentEssayHelp does not recommend anyone to use this sample as their own work.)

Information Technology Assignment Question


You are to go through the Hands on exercise 5A on page 187 of the textbook.  You will need access to a networked computer with access to the PING, ARP and TRACEROUTE tool.  For some of the activity if you have a restrictive firewall you will need to search for a looking glass type services and modify your report accordingly (Google looking glass tools).  The exercise has a number of activities for you to perform but for the assignment, we only need the output and discussion for the following activities.  IF you are using non-Windows machines the commands may be slightly different.

IPCONFIG: Finding your computer settings

PING: Finding other computers

ARP: Displaying Physical Address

TRACERT: Finding Routes through the Internet

Each of the activities listed includes a number of deliverables that you will need to attach as part of your assignment submission.  For the output of the commands use the screen capture capabilities.  Under Windows use Cmd Alt Print Screen keys combinations to capture the current active window and then paste into a word document.  For Mac OS use Command-Shift-4, then space, and then click a window you want to capture.


Management has identified that in order to provide employees with mobile access a more flexible networking environment needs to be created.  Since the organisation uses a typical client server network design, management feels that it would be a simple and reasonably inexpensive process to add extra connection capabilities to realise the mobile cloud based design benefits.

In order to proceed with the planning and implementations of the solution, you as the IT manager have been called in to provide a report on the type of changes that would need to be implemented and further research on the cloud solutions.

During your initial discussion with management, you highlighted how your department has only just finished the process of modernising from the existing ad-hoc system to the new client server solution.  The current new design, due to the processing needs of the applications utilised by the organisation the employee's workstations had to be quite upscale and powerful systems in terms of CPU power, memory size, network speed and storage.  The back end systems are used mainly as secure data access and storages.

The new mobile devices direction from management means that the network design needs a major rethink and redesign especially if a portion or all of the services will be moved to the cloud.  The organisation also plans to split into two separate offices to bring their operations closer to their main partners and customers in the future.  It is believed that their proximity to major partners will help them better service the partner needs and grow the organisation.

As a result of the new direction you have been tasked to provide a report to address the following areas of concern and also provide more information to facilitate a better decision making process.

Note:  When we say Mobile devices we mean devices that can be used by employees to access the data and services in an unstructured network environment as well as through other third party networks.

  • The cloud solutions are not well formulated at the moment due to some misunderstanding of what the term actually means. Describe the type of cloud services available, the benefits and disadvantages of each solution.
  • Nominate the cloud solution that would be best for the organisation as describe above with justifications for your selection. Also, include any possible problems that the solution might pose in the future plans.
  • Consider the overall impact that the introduction of new devices would have on the network functionality and availability. Identify possible problems and issues that the introduction of mobile computing could have on the network services.
  • It is evident that the introduction or restructure can cause a major disruption to the employees with having to adjust to the new technology, new security and access restrictions and so on. Provide advice with the management on the need for training and reskilling you think would be needed to maximise the adoption of new technology by the organisational employees.

Information Technology Assignment Solution on Network Architecture Current and Future Requirements


This type of company is considered as a SOHO (Small Office/Home Office) that has less than 5 employees working. Here, they have only engineering research projects on complex data intensive analysis and have a high capacity internal server. As they are having a projected expansion of 15-16 employees over the next 5 years, Pat's Engineering Works needs new offices. Thus, as a future requirement, they need a scalable and flexible network. Mostly, Firewall Architecture is used to mitigate the problem of IT security and to make the organisation robust. This type of design uses Packet Level, NAT and Application Level firewalls to create a secure Demilitarized Zone for public access to WEB and DNS servers.

The below figure demonstrates how a client computer sent packets to an internal network. The client sends the HTTP packet with a random IP address and port number…

Read more in the complete solution PDF document at the end of this page.


The internet cloud is terminated in the company's dedicated routers (1 & 2). The RED link is connected to the Primary switch through firewall whereas the BLUE link is of secondary switch. The IT Security is achieved through multiple firewalls and internal Demilitarized zone (DMZ). The DMZ creates isolation of the internal network from outside internet threats and provides resilience, thus all the important servers are racked together and hoisted inside the DMZ. The different servers hosted are Application Server (to run applications), Web Server (to host web services), DHCP Server (for dynamically providing IP address to all the Client computers) and Database Server (for storing the large chunk of data). The Native Authentication server will provide the authentication and single sign on SSO facility…

Read more in the complete solution PDF document at the end of this page.


1.     IPCONFIG:

Deliverables: Use the IPCONFIG/ALL command on your computer.

Default Gateway: Computer having local area network are connected to the Internet using default gateway. This passes the network traffic from a local subnet of one device to other devices…



Organizations have shifted their focus from traditional wired LAN architecture to a more sophisticated and robust wireless LAN architecture. This helps them achieve the benefits of business expansion through more value centric investments in technology to support their business system with increased effectiveness and better revenue margins. The emerging next generation technologies require wireless connectivity to operate and are 'Always-On' devices.

As wireless LANs is flexible, more scalable for supporting Mobile devices. They can be easily scaled with existing architecture as well as emerging technologies like wearable computing device using Nano Technology (example- Google Glass, Google Gears and Samsung Smart Watch- Galaxy Gear). Wearable computing is a very niche field, where the size of the device has been considerably reduced and the performance is greatly increased. This has been achieved using chips based on Nano Technology which depends mostly on wireless networks to communicate and is linked to the cloud based services. (Stein 2014) …

Read more in the complete solution PDF document at the end of this page.


As in the given scenario, the company uses typical client server architecture. They have the inherent client-server network design, and the management has identified that there is a need to upscale the existing networking environment with a more flexible design to support mobile access for each and every employee. Thus the existing ad-hoc system will be modernized with powerful systems like CPU power, network speed and storage, memory size and will have a provision for backend systems to secure data access and storages. As a cost saving approach, the management wants to migrate to cloud solutions so that they can split into two offices to enhance their operation and built strong partners and customer relationship in future…

Read more in the complete solution PDF document at the end of this page.


Cloud service providers like Amazon, Google, Microsoft and Cisco provides multiple types of service and platforms. These are like Network as a service (NAAS); Platform as a service (PAAS); Software as a service (SAAS); Infrastructure as a service (IAAS); web based cloud services; utility cloud services; Managed services; services commerce. (Crystal Nichols 2011).

The different application services offered by the cloud will make the company boost its infrastructure and enjoy the web service functionality (example APIs for Maps, Sales, and HR, ERP and infrastructure services for virtual storage). The service commerce structure of cloud is made up of the mixed or hybrid cloud of SAAS and Managed Cloud services to provide end users services like travel ordering, virtual assistance service or expense tracking. The managed services are important because they can provide anti-spam services and application monitoring services. SAAS Cloud services to provide management of infrastructure scalability and platforms with virtual platform support like load balancers for virtual machines (examples include: Microsoft Office 365, Google Apps) (Naresh Kumar 2012)

Read more in the complete solution PDF document at the end of this page.


Apart from above mentioned cloud service, the local architecture will have following things deployed on the local office environment to enhance security and support the client interface. This architecture discussed in Figure 10 will help the multiple offices of the company to get connected to each other and work in a proper synchronization…

The DHCP server is configuring to provide the IP address to the valid user The database server and the file server is hosted securely to store the data in encrypted format. Thus a data Centre is needed to host several servers including, Local File Server, Web Servers, Proxy Servers, Database Servers-SQL Server, Exchange Server, Cisco's Authentication Server and most importantly Antivirus SCCM servers…

Read more in the complete solution PDF document at the end of this page.


To provide a solution, where employees can use mobile devices to access data and services in an unstructured network environment and third party networks the company having the Enterprise Resource Planning (ERP) and Customer Relation Management (CRM) solutions already implemented will just need an extension for mobile devices with the same set of features to integrate with the CRM. (Hariharan 2012)…


As the management of the company has decided to migrate its existing client server architecture to the cloud environment to support mobile users and get connected to multiple offices in various locations a major technological rescaling is needed. This will require training and reskilling the employees to understand the basic troubleshooting that would be needed to maximize the adoption of new technology. As the best way to manage such huge transition is to hire third party vendors to train and provide adequate knowledge to the users and employees.

    Download this Assignment Sample for FREE
    1. This form collects your email so that we can correspond with you through our newsletters. Checkout our Privacy policy for more information.
    2. Yes, i consent to this conditions.

    (Some parts of the solution has been blurred due to privacy protection policy)

    Check More Samples

    Order Now

    WhatsApp WhatsApp Us