Professional Documents
Culture Documents
Minor Assessment
Date Submitted: May 5, 2015 Lecturer’s Name: Mr. Ahmed El- Hadad
Feedback / Assessment:
PLAGIARISM
Plagiarism is the presentation of the expressed thought or work of another person as though it is one's own without
properly acknowledging that person. You must not allow other students to copy your work and must take care to
safeguard against this happening.
Plagiarism is a serious offence. As set out in University Regulation 6.1.1., students who are caught plagiarising
will, for a first offence, be given a zero mark for that task. A second offence will result in a failing grade for the
Course(s) involved and any subsequent offence will be referred to the Student Discipline Committee.
Declaration
Except where appropriately acknowledged, this assignment is my own work, has been expressed
in my own words and has not previously been submitted for assessment. I have also retained a
copy of this assessment piece for my own records.
Signature: Gagandeep kaur, Maaz Uddin, Lovepreet Kaur Date: May 5, 2015
GROUP ASSIGNMENT
ITECH_6502
Scenario- B
Speedy’s Courier Service
Compiled By:
Maaz Uddin - 30128772
Gagandeep Kaur - 30124770
Lovepreet Kaur - 30083282
Executive Summary:
Truly the Internet has essentially changed the entire existence of the individuals and web innovation has
drastically changed each division in a positive manner, it hasn't left the Education anyplace. With more
underline on Enrolments, educational module, HR forms, Payrolls, Administration and Finance administration,
the need of computerization has expanded up to a need and these procedures as well as computerized
method for giving trainings has likewise affected the Education part.
In this report we discuss about the Speedy Courier Service Company’s development process where Company
is going to replace its older IT infrastructure with new latest IT technologies. Also it concentrates on a
progression of points to reveal some insight into huge business , the ideas, for example, system Architecture,
System Architecture, Network layer models incorporating usefulness of layers with separate gadgets, for
example routers, hubs, switches, cables and its capacities are examine, sort of uses will be obliged to meet
particular business objectives, security ideas and firewall usage on the individual layers are well characterize
and things obtained and evaluated expense are obviously explained. In the end, this report examines how the
arrangement proposed for the organization worked out for them in subtle element.
Contents
INTRODUCTIO
N
ASSIGNMENT TITLE: GROUP ASSIGNMENT- Speedy’s courier service....................................................1
1. Introduction:...............................................................................................................................................................5
2. Physical Structure:.....................................................................................................................................................5
2.1 Head Office Building and dispatch centre floor plan:.................................................................................6
3. Mission and Vision of Company................................................................................................................................7
4. Company’s Requirements and Challenges:..............................................................................................................7
4.1 Challenges with ICT Requirements:............................................................................................................... 8
5. Network Structure:.....................................................................................................................................................9
5.1 Overall Network Structure:........................................................................................................................ 9
5.2 Overall Network Diagram:....................................................................................................................... 10
5.3 Network Peripherals:............................................................................................................................... 12
6. Estimated Budget......................................................................................................................................................17
7. Assumptions:.............................................................................................................................................................18
8. Solutions to challenges by using Network Layer Model:.......................................................................................18
9. Security and Firewall Implementation:..................................................................................................................19
10. Conclusion :...........................................................................................................................................................19
11. References:............................................................................................................................................................20
Individual Statement of Contribution.................................................................................................................................21
1. Introduction:
company desired to modernize the system to meet up the current demands of the technology and provide
A Speedy Courier Service is a Melbourne based company which provide door- to- door courier services to
people throughout Victoria. It is a small company which has employees in different stores who are
responsible for obtaining delivery jobs, collecting items for delivery, determining efficient delivery routes
and delivering parcels to their final destination. However, Company still meeting the stringent delivery time
requirements promised by the company, the manager wants to modernize the company’s infrastructure
and require network up-gradation. The main reasons behind the change were:
Improved IT Infrastructure
2. Physical Structure:
In physical structure, company has two buildings located in regional city at the same location. One is main
building which act as company’s head office. This building includes a reception, four offices for
management and administrative staff, a conference room, a communal staff room and a storage room.
This office work as a main place for company’s operations such as tracking, reviewing data to identify
potential productivity and managing human resources. In the other building which is bigger than the first
one act as a dispatch centre for delivery of items and a lockable room which is the centre of IT network
infrastructure. Total 20 employees work at this location, 8 of them share 3 PCs and only concentrate on
warehouse operations.
The main objective of the company to provide door to door courier service to customers throughout
Victoria. The team of company work together to achieve the aim of company by delivering the items on
Company’s Vision:
“We are continually searching for techniques to increase the value of the client experience. This is seen by
our progressing conveyance of prevalent, more proficient and less costly approaches to work with us. We
reinvest more than 90% of our benefits once again into our different organizations, into new stops, new
hardware and new innovation. The client's recognition is dependably the need. We convey more included
As company’s manager want to modernize the company, following is the brief description about company’s
Internet connectivity at all workstations: all staff members, sales people and administrative
All the systems must be connected to one centralized system: A client server architecture which
Email accessibility to each employee: all staff members and sales people can have fast access
to the email server by using the email domain and MTA server.
New system to support their new e-commerce website: The e-commerce website also needs to be
Secure access to company network and database by sales agents from remote location: sales
agent travel throughout Victoria, so they must be able to access the database securely.
Video conferencing facility: A dedicated link in conference room for video conferencing.
Routers
Switches
Servers
Computers
Cables
Antivirus
Firewalls
Windows
Manager want to modernization of Company by using new IT technology infrastructure to improve the
operations of the company. It brings number of challenges to overwhelm in order to run effective result to the
company.
Some of these challenges are defined for a better understanding of the work associated to the project:
Complexity: for the fast and improved development and maintenance it is essential that proposed
Centralization: one more important factor of the up gradation is centralization of the company system
Security: To implement a good network, security is the most important factor which need to be handle
very carefully. As customer provide their personal information so data security and physical security of
the core devices are important. As given sales agent will access the data base from remote location
such as different parts of the Victoria, which requires encrypted data transfer.
Reliability and integration: to implement a good network, reliability and integration of data is very
Dedicated channels: in order to increase the security of critical data file internally in the company,
warehouse must be established, also they must be able to share data with other departments also.
5. Network Structure:
access point. The four office staff use 4 workstations and 1 workstation is used on the reception desk. All the
workstations are connected with the network switch along with the network printer and wireless access point.
The network printer can be used by any staff member of the office. The conference room has a laptop which is
connected to the network by wireless access point. The conference room also has the facility to share wireless
network by other portable devices like smart phones and tablets etc. The network switch is connected to the
dispatch centre building network switch which further connected to the main network.
The dispatch centre building network consists of 3 shared workstations and a network printer. This building
also encompasses the main network infrastructure of the company. The shared workstations and the network
printer are connected to the network with the help of the network switch. The network room has a router which
acts as a gateway of the network and connects the whole network to the internet. The router’s inbound
connection is connected to the firewall which is a hardware firewall to protect all the inbound and outbound
network traffic. The company has a website which is hosted by in house web server. The company also has a
proxy server for the internet connectivity for the client. The company also provide the e-mail facility to the
All of these servers are placed in the secure DMZ which is connected to a soft wired firewall. This firewall is
then connects to the hardwired firewall. This technique provides two level security to the company DMZ. All of
the workstations are equipped with the latest antivirus for protection from all types of internet viruses.
All the sales centres are also connected to the company network and all the delivery drivers are equipped with
the portable tablet computers. The sales centre are connected to the network using internet with the help of
Figure - 3
Figure – 4
Figure - 5
The whole network of the company is made up of many computing peripherals. The choice of most adequate
and efficient equipment plays a vital role in the overall performance of the network. The following are the main
Router
The router is main part of the whole network of the company. The router is a device that connects one network
to another. In this company it connect the company’s network to the internetwork. The router also prohibits the
Figure – 6
Firewall
The firewall is a network security device. It is placed on the edge of the network to protect the internal
corporate network with the external network threats like hackers, worms, Trojans and viruses etc. The firewall
can be of both software and hardware based in our scenario we used both software and hardware based
firewalls. The firewall has many options to protect and prohibit the inbound and outbound network traffic.
Figure - 7
Switch
The switch is most commonly used network hardware. It is also found in every computer network these days.
The switch is a device that connects workstations and other network devices to the network. Switches are very
fast and secure devices and can be configured according to the needs of the network.
Figure - 8
The wireless access point a switch type device which connect the wireless devices to the network. These days
it also quiet common and also very helpful in connecting wireless devices to the network with a huge ease.
The wireless access point is also less expensive device and can be configured according to the user needs.
Figure - 9
Network Printer
The network printer is a printer that can be connected to the network. The network printer provides the shared
printing capabilities. The network printer manages and prioritizes the printing requests. The network printer
eliminates the needs of the multiple printers and also cost effective printing solution.
Figure - 10
Workstation
Figure - 11
Tablet
Tablets are portable computing device. Tablets are a powerful tool for enhancing your productivity and online
experience whether for business use, or life in general. Smaller than a laptop and bigger than a Smartphone,
the tablet is perfect to take with you on the go. You can browse the internet, create and share presentations,
Figure - 12
Server
A server is a specialised computing device that controls and manages the computing programs and other
network resources. In this company there are four main servers are used:
1. Web Server
2. Mail Server
3. Proxy Server
4. Firewall Server
The company is hosting a website which is crucial part of their business. The website is widely used by the
customers to book the deliveries online for the pickups. The company is maintaining and managing the
website by themselves. The company also provides the e-mail services to the employees for this reason an in
house email server is also maintained. The proxy server is used to provide the internet connectivity to the
company’s network so the employees can work more efficiently. The company is also maintaining a firewall
server which runs a firewall application. This is a secondary firewall in the company’s network and it provide
the second level of the security to the DMZ of the corporate network.
Figure – 13
Dispatch
Centre
(1,000m)
Estimated Budget
7. Assumptions:
The enhance security is provided to the network by placing the servers behind two layer firewalls and in
DMZ.
The wireless network option is also provided for the conference room and the staff room for the ease of
The company is largely depends on the online service for this reason in house web server is also
maintained.
The delivery and sales employee are provided the tablet computing devices for the real time status
Sale centres are connected to the main network using secure VPN connection.
From network cables to the router all network devices fall under
Considering the growing risks from the internet the two layered firewall is used for servers within DMZ.
The user computers are provided with the latest MacAfee small business security to protect from all types
of viruses.
The access point are configured to allow only the desired network traffic and WPA-2 enterprise security is
used.
VPN tunnelling is used by the sales centres and drivers to enhance the security of the network.
Unused ports of switches are disabled to stop the unauthorized usage of network.
10.Conclusion :
To conclude, in this report we have discussed and proposed the overall Speedy’s courier service
organization’s up gradation solutions. A suitable and cost effective proposal for modernization of network
infrastructure of company has been given. Some assumptions has been taken to create an effective network
system with some proposed solutions. A proper security implementation to e-commerce business is the
demand for today’s technical era. To keep the pace of success the regular up gradation of computer systems
11.References:
Amy Meade (2015): Topic 8: Connecting LANs [lecture notes], ITECH-6502; Data communications
imgurl=http://images.clipartpanda.com/courier-clipart-picture-of-delivery-guy.jpg
Figure 2 OSI sever layer cake (march 1998) Retrieved on 19 May 2015 from
https://www.microsoft.com/msj/0398/dcom.aspx
R.H. Katz, 1994: Adaptation and Mobility in Wireless Information Systems. IEEE Personal
The other team member in my group was: Student Number- 30128772, 30083282
I have individually prepared the solution for the following tasks in this Assignment:
o Data gathering
o Propose possible scenarios
o Time management for the assigned tasks
I have been involved in group collaboration, discussion and review of the following tasks in this
Assignment:
o Data Analysis
o Data Assessments
o Documentation
I feel that, overall, my contribution to this Assignment would equal _35___ % of the total work
submitted.
The other team member in my group was: Student Number- 30124770, 30083282
I have individually prepared the solution for the following tasks in this Assignment:
o Solution selection for chosen scenario
o Data selection
o Solution Enhancement checkings
I have been involved in group collaboration, discussion and review of the following tasks in this
Assignment:
o Solution Implementation
o Designing
o Material Selection
I feel that, overall, my contribution to this Assignment would equal __35__ % of the total work
submitted.
Date: 1-June-2015
The other team member in my group was: Student Number- 30128772, 30124770
I have individually prepared the solution for the following tasks in this Assignment:
o Documentation
o Referencing checks
o Group Help
I have been involved in group collaboration, discussion and review of the following tasks in this
Assignment:
o Data rectification
o Material Checking
o Design Checking
I feel that, overall, my contribution to this Assignment would equal __30_ % of the total work submitted.