You are on page 1of 12

Running head: COIT20264

COIT20264 ‘OZ Dispatch’

Name of the Student


Name of the University

Author Note
1
COIT20264

1. Introduction

This project is developed for management of the day to day operations and the delivery

of operations at OZ Dispatch. The project is main aim of this project is the development of the

kind of network which enables the better management of the exchange of information’s of OZ

dispatch and services related to delivery at home operations made by the OZ dispatch. As the

data need to store in the storage which is to be secured in nature, Security related to the network

storage network is kept on top priority which will be helpful in the exchange of the data of the

OZ dispatch and management of the all types of operations as well. The approach will be

development of the network system throughout the OZ dispatch main building and the branches

those could possibly contribute in boosting the output and production of the company. This

report will be covering the network management and the project management aspects required

for the establishment of the entire network.

2. Goal of the Project

Following are the goals for the new OZ Dispatch network:

 For the effective & efficient management of the business of OZ delivery

 For managing business operations by the various stakeholders in efficacious way.

 For processing of the information of the customers in a smooth and secured way

3. Scope of the Project

The scope related to this network development are:

 Meeting the various business motto of OZ solutions

 Establishment of low traffic network for efficient exchange of various information

 Securing various data of the customers which could be only accessible to authorized

personnel of the company

 Development of wireless connectivity in different parts of the company


2
COIT20264

4. Goals and Constraints of OZ Business

[1] Developing a system which is free from all types of the error which can enhance the

productivity and smooth functioning of the company

[2] Introducing a system which can meet all types of the customer requirements related to

delivery or others functions

[3] For delivery of the accurate products as desired by the customers

[4] Establishment of an effective connectivity between the managers of the OZ delivery

and the various staff of the company involved the delivery related jobs

Constraints:

[1] Securing the information’s of various customers safe and secure

[2] Management of the 20 CDCs related data and information collection and the centres of

distribution

[3] Introduction of wireless interconnectivity between various 20 members involved in

delivery.

5. The Trade-offs and Technical Goals

The technical goals for the development of this network can be listed as following:

1. Access to each user with the high-speed internet connectivity

2. Network should be compatible with the all types of wired devices or wireless devices

and the system for the easily connectivity must be maintained

3. For smooth management and delivery of the operations, wireless connectivity and

BYOD must be allowed


3
COIT20264

4. Keeping in view about Security related to the network information’s of the customers

the business module must be highly secured

5. The development of network is done with an approach that it can have various features

like troubleshooting, data backup, access to network, balancing loads and various type

of centralised capabilities.

For technical trade off following table is demonstrated considering various types of the trade-

off which is technical:

Percentage Technical Trade-Off

15 The adaptability feature of the network in addition to the affordability

10 Characterizing the infrastructure of the network

10 Availability of the network in accordance with the traffic

15 Network performance considering the service deliveries and management

10 The manageability and the application of the network in different sectors

30 The scalability feature of the network

10 Security related to the network data being processes using the same network

allowing the different users to meet their sector of jib competencies

100 Total
4
COIT20264

6. Table of User Communities

User communities

Communities Community Use of the Branches or

name accessing the size or the network for the head office

network number of respective location

users community

Delivery Boy 20 Android Service CDCs

Sales and Marketing 1 Customer data The office at

Parramatta

Accountant 1 Mail The office at

Parramatta

Admin Access 1 Monitoring, The office at

Overall report Parramatta

Data Analyst 1 Overall report The office at

Applications Parramatta

Data Stores

Name of the data Location Application Users


store
Data related to the The office Information about Delivery boys and
customers at various customers data analyst
operating the Parramatta of the organisation
network
Details related to The office Collection of the Marketing and sales
the delivery of the at data related to the team and the
services Parramatta delivery and delivery Boy
allowing of service
deliveries
5
COIT20264

Data related to the The office Service related to Marketing and sales
overall sales at proper delivery team and the Admin
Parramatta
Storage of the data The office Collection of the Admin authorization
related to all at various data relate and access
process Parramatta to staff and storage
of the collected
data
Access to the The office Managing and Admin access and
admin at monitoring the authority
Parramatta entire business

Network Application

Application Application Different Comments Importance


for different for the users Applications for for the
community the users different
users
Access to the Yes Database access Monitor Critical
admin activities
and network
accesses

Email, No Email Actions and Critical


information functioning
exchange and in the
management of business
the
communication

Network Yes Manage Security Security Extremely


related security related to the management critical
and data network data and
security information
Traffic Flows

The network will be operated at the ip: 192.168.0.1/22

The subnetting IP selected for the establishment of the network for managing the performance

and operations

The network occupancy of the established network is 79%


6
COIT20264

The major network will be used by 45% of the available network

7. Network addressing and naming model


7
COIT20264

8. Explanation as well justification of logical design of network

The logical network design should be built with or designed with the connectivity of

the networks, software and the hardware for smooth delivery of the information’s of the OZ

systems. It will assure about the effective delivery of the OZ delivery operations. It will also be

helpful in managing all types of the internal operations. LAN connection will be helpful in

connectivity of the various users which will allow access within the organisation and the office

at Parramatta will act as headquarter. Web portal should be of high access which will be helpful

in maintaining easy exchange of the data and maintaining the low traffic within the network.

There is requirement of the firewall along with other security measures to maintain the security

within the system to keep the data and information’s related to the systems secured. This will

be helpful the organisational goals of the organisation.

Traffic Bandwidt Jitter Latenc


h y

Application High Low Low


access

Network Low High High


Management

Voice Medium Low Low

Messaging (e- High High High


mail)

File Transfer High High High

Transaction data Medium Medium Medium

Overall sales and High High High


customer Data
8
COIT20264

9. The logical network diagram(s) including addressing and naming

Internet

Desktop

Router
Firewall
Desktop 2
Desktop 2

Scanner

Switch Desktop 1 Desktop n Desktop 1 Desktop n

Printer Switch
database Server
Bridge NSW Offices
Parramatta Office

Figure: Network Diagram

10. Routing and switching protocols, and security mechanisms

As there is need of the high security within the systems of the developed network and

the priority is on higher side IEEE 802.1 standard is recommended which will assure the

network security protocols as well as the security management of the data of the customers

within the organisation. For the deployment of a robust network, OSPF is also recommended

for designing and smooth management of the network.

11. Security Mechanism

For assurance of Security related to the network encryption is recommended. Various

measures may be taken which may be internal or external for Security related to the network

information collected by the different users. For filter of messages of entering the network and

the leaving the network firewall is being introduced. For encountering various types of network

threats third party software’s like antivirus can be also used.


9
COIT20264

12. Conclusion

From the above, the conclusion of the network which is proposed will be about meeting the

organisational goals, effective management of the day-to-day operations of the company with

securing the data of the customers for meeting the present and the future needs of the OZ

delivery. The developed network will be supporting the network application for the different

users at the OZ dispatches.


10
COIT20264

13. Bibliography

Chen, Q., He, M., Zheng, X., Dai, F. and Feng, Y., 2018. A Scalable SDN Architecture for

Underwater Networks Security Authentication. IEICE TRANSACTIONS on Information and

Systems, 101(8), pp.2044-2052.

Comer, D., 2015. Computer networks and internets. Pearson.

Haseeb, S., Hashim, A.H.A., Khalifa, O.O. and Ismail, A.F., 2017, November. Network

Function Virtualization (NFV) based architecture to address connectivity, interoperability and

manageability challenges in Internet of Things (IoT). In IOP Conference Series: Materials

Science and Engineering (Vol. 260, No. 1, p. 012033). IOP Publishing.

Liu, Y., Chen, H.H. and Wang, L., 2017. Physical layer security for next generation wireless

networks: Theories, technologies, and challenges. IEEE Communications Surveys &

Tutorials, 19(1), pp.347-376.

Mostovoy, Y.A. and Berdnikov, V., 2017. Large scale networks security

strategy. algorithms, 5(6), pp.7-8.

Penzenstadler, B., Raturi, A., Richardson, D. and Tomlinson, B., 2014. Safety, security, now

sustainability: the non-functional requirement for the 21st century. IEEE software, (1), p.1.

Tichy, D., Pickl, A., Maria, J., Benner, A. and Sültmann, H., 2017. Experimental design and

data analysis of Ago-RIP-Seq experiments for the identification of microRNA

targets. Briefings in bioinformatics.

Yang, H., Zhang, J., Zhao, Y., Ji, Y., Li, H., Lin, Y., Li, G., Han, J., Lee, Y. and Ma, T., 2014.

Performance evaluation of time-aware enhanced software defined networking (TeSDN) for

elastic data center optical interconnection. Optics express, 22(15), pp.17630-17643.


11
COIT20264

Zeiler, M.D. and Fergus, R., 2014, September. Visualizing and understanding convolutional

networks. In European conference on computer vision (pp. 818-833). Springer, Cham.

You might also like