Communications solution and a deployment plan

Assignment Help Computer Networking
Reference no: EM133167423

PART 01 - Designing and Planning
This part requires you to prepare an architecture design of the unified communications solution and a deployment plan.

Scenario
You are employed by Pacific IT Solutions, an IT services company providing systems integration and consultancy services. You have been appointed as an IT consultant for Online Travel Services (OTS) which is a client of Pacific IT Solutions.

Background
OTS is a national organisation within Australia with 7 retail and sales offices in Australian capital cities and a central office and Data Centre on the Gold Coast. All the sites are connected to the central office via VPN. In total OTS employs 120 people across the organisation with the majority of the staff provided with remote access through either a dial-up or a virtual private network (VPN) connection.

Business Profile
Global Travel Pty Ltd (The Company) is a leading provider of Travel services in the Asia Pacific region with headquarters in Singapore. The Company is the holding group for five smaller companies: OTS, Asia Hotel Services, APAC Flight Brokers, Asia Adventure Holidays and Happy Insurance. All of the companies owned by The Company focus on their individual target markets and employ several hundred staff. The Company is currently trying to reduce its costs and decrease the time it takes to break into new markets. OTS is a wholly owned subsidiary of The Company.

The business was setup in 2001 by the General Manager (Jack Slasher) and run from a small office on the Gold Coast until 2004, when the business was bought by Global Travel Pty Ltd and expanded to have offices nationally. This offered the ability for OTS to expand from the online travel services to offer personalized service to clients through the regional offices. OTS targets the provision of specialist travel packages to high value clients, advertising the packages it offers through the website. The business is currently highly successful, with a turnover in the last financial year of over $100 million and a profit of $6 million. Current technology OTS does not currently have any unified communications technologies. The company uses a legacy PBX and all calls are made using the PSTN.

All servers are deployed in a VMWare virtualized environment. They have enough spare capacity in the VMWare virtualized environment to deploy any additional virtual servers they may need. All servers are attached to a Gigabit network.

Requirements

OTS has obtained a feasibility report in relation to migrating their telecommunications systems to a solution that uses a relatively low cost SIP trunking service provided by an ITSP. They have decided to proceed with the migration as it will provide substantial savings on their telephone costs. They will start with an implementation of IP telephony at their Gold Coast office. This means that they will replace their current PSTN lines with a SIP trunk, replace their legacy PBX with a VoIP PBX, and replace their legacy handsets with SIP compatible handsets.

You have been given the task of designing the solution. Your contact at OTS is the office manager, Jane Moss, who will also sign off on the project completion. Your design and implementation plan must provide for the following:

An IP telephony solution that will:

1. Use SIP trunking
2. Use SIP compatible handsets
3. Provide flexibility to expand and link to other sites
4. Provide call parking, call queuing, voice mail, ring groups, and an IVR service
5. Achieve these outcomes with minimal cost

Task 1

Research the following VoIP technologies.
• Asterisk
• Shoretel
• Cisco

Compare the technologies on the following criteria. Create a table/matrix showing the comparison.
• Cost
• Scalability
• Size of online community
• Quality of support documentation
• Ability to integrate with legacy PBX
• Features - voice mail, IVR, etc.

Task 2

Write a description of the solution you envisage. Assume that you have chosen Asterisk as the solution. You should include:

1. A description of the architecture - include VoIP, IP telephony, network, and firewall elements
2. A thorough explanation of how your solution will work - the exact process of how calls are made, received, interfaced with the PSTN
3. An explanation of how your solution meets the business requirements
4. A description of each component
5. The rational for the design decisions you made

Task 3

Compile an inventory of hardware and software components. You must include the recommended hardware requirements for an Asterisk/FreePBX installation for an organization of this size.

Task 4

Prepare a work breakdown of your deployment plan.

Task 5

Write a post deployment test plan.

Task 6

Create a drawing of the solution using Visio. Include all physical and virtual components

PART 03 - Questions and Answers

Question 1

Start Wireshark Network Protocol Analyzer and open the capture file named 'Wireshark Capture VoIP Assessment'. This file is located in the student materials folder.
Examine line number 255.
1. Describe what is happening here - what is this packet doing?

2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 2

Using the same capture file from the question above. Examine line number 262.
1. Describe what is happening here - what is this packet doing?
2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 3

Using the same capture file from the question above. Examine line number 282.
1. Describe what is happening here - what is this packet doing?
2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 4

Using the same capture file from the question above. Examine line number 284.
1. Describe what is happening here - what is this packet doing?
2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 5

Using the same capture file from the question above. Examine line number 286.
1. Describe what is happening here - what is this packet doing?
2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 6

Using the same capture file from the question above. Examine line number 479.
1. Describe what is happening here - what is this packet doing?
2. What is the application layer protocol?
3. What are the IP addresses and names/numbers of the endpoints involved?
4. What are the source and destination port numbers?

Question 7

Using the table below, fill in the missing information for Bandwidth (Incl. Overhead), Bandwidth for 15 Concurrent Calls, and Quality.

Question 8

Describe the impact that the choice of codec will have on network performance.

Question 9

Compare H.264 and H.265. Describe what these codecs do. Select which one is better and explain why.

Question 10

What is the purpose of the ITU-T E.164-numbering scheme?

Question 11

What is the purpose of ENUM?

Question 12

Provide an example configuration for an ENUM lookup in an Asterisk dialplan. REF: Asterisk- The Definitive Guide, 4th Edition, Ch 12.

Question 13

Describe 3 potential benefits that could be provided via the IMS IP-Multimedia Subsystem standards

Question 14

Describe possible network congestion solutions that would enable quality of service (QoS) requirements to be met during periods of network congestion. REF: JNAA-JRE- 12.a_SG, Appendix A

Question 15

Make a copy of the text file named 'ooh323.conf'. This file is located in the student materials folder. Edit this file to configure an Asterisk PBX to act as a H.323 gateway and connect with a H.323 gatekeeper at 10.10.100.100.

Question 16

Write an Asterisk dial plan to facilitate emergency calls from VoiP handsets in Australia. REF: Asterisk- The Definitive Guide, 4th Edition, Ch 7.

Question 17

You need to allow the SIP protocol through your firewall. What port number would you open?

Question 18

Read the following post about a PBX security breach.

What measures could be taken in Asterisk to prevent this from happening? Describe 3 measures that could be taken. REF: Asterisk- The Definitive Guide, 4th Edition, Ch 26.

Attachment:- VOIP - Assignment.rar

Reference no: EM133167423

Questions Cloud

Determine the upper control limit for an r-chart : Determine the upper control limit for an R-chart if the sum of the sample ranges equals 88.0. Please type your answer in four decimal places.
Identify microsoft business-level-corporate-level strategy : Identify Microsoft's business-level and corporate-level strategies. Are they successful? Why?
Discussing the common stigmas around whistle-blowers : Discussing the common stigmas around whistle-blowers and how they could be considered an asset to a company instead. Do you personally think they are good thing
Types of common fdi investment vehicles : 1. What are the four types of common FDI investment vehicles?
Communications solution and a deployment plan : Write a description of the solution you envisage - Compile an inventory of hardware and software components. You must include the recommended hardware
Possible impact on jordanian tourism : Discuss the role of any relevant public policy and/or government legislation, and the possible impact on Jordanian tourism
Example of specific long term outcomes : The best way to clarify your target outcomes is to define your program theory of change.
How are cultural values reflected in organizations : What is organizational culture and how are cultural values reflected in organizations?
Explain the idea of decoupling and luddites : Explain the idea of "Decoupling" and "Luddites" in context with the article "How technology is destroying jobs"?

Reviews

Write a Review

Computer Networking Questions & Answers

  Develop a plan to set up a local area network

Develop a plan to set up a local area network based on the scenario presented in Appendix A

  Write a report explaining the concept of certificates

Write a report explaining the concept of certificates that could be understood by a non-technical person. Avoid using technical jargon completely

  Provide one example of a business networking scenario

Provide one example of a business networking scenario that would demand consistent availability of the DHCP service. From the textbook, choose at least two of the overall objectives Microsoft used.

  Describe role windows firewall plays in protecting computer

Describe the role Windows Firewall plays in protecting computer from threats. Research and list some salient features of each of following versions of Window 10

  Discuss the seven layers of the open system interconnection

Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation. Minimum two pages.

  Is wireshark open-source or proprietary

1. Is Wireshark open-source or proprietary? 2. What is seen in each of the three panes that display the packets seen on a local area network?

  Implementing sliding window protocols using cnet

Implementing Sliding Window Protocols using CNET - It is assumed that the nodes will communicate directly with each other if they are directly connected, otherwise the intermediate nodes will be used to relay the communications. No dynamic routing ..

  What would be your approach to assign ip address

If you have to choose only one class of an IP address college campus network, what class of IP address would you choose? Why?

  Discuss about the osi network model

Describe the relationship between network devices and the OSI Network Model.

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Protocol used in a wide area network

If you were able to recommend another way to build this network from the idea and requirements of the company, what would be your recommendation? Why would you recommend this alternative?

  Convenience and minimum administrative overhead

Patient's and Guests personal network, for convenience and minimum administrative overhead, should be one bridged Wireless Network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd