The document outlines a plan for a new client/server network for Waterfront Tele-Support. Key points include:
- The current 10base2 network needs replacing with a new up-to-date infrastructure.
- An extended star topology is proposed using switches, servers, firewall and wireless access.
- The server will run Windows Server 2008 and provide file storage, web hosting, remote access, backups and more.
- Security measures like firewalls, filtering and permissions are included to protect the network.
- Budget is £30,000 and all new equipment will be purchased within this budget.
Capstone Presentation For Five Rivers Medical Centersdjackson134
This here is the final presentation of our Capstone project that team members Cheyenna Carson, Susan Worcester, and myself Dawonne D. Jackson completed to acquire our Associate Degree of Applied Science in Computer Networking Systems.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Capstone Presentation For Five Rivers Medical Centersdjackson134
This here is the final presentation of our Capstone project that team members Cheyenna Carson, Susan Worcester, and myself Dawonne D. Jackson completed to acquire our Associate Degree of Applied Science in Computer Networking Systems.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper addresses securing the Honeywell security and monitoring the network devices and computers/laptops.
We have discussed the improved, enhanced features of snmpv3.Shortcoming of the previous SNMP version are explained and solution to those are discussed along with the new capabilities of Snmpv3. SNMP User-based security model is explained, the encryption AES, DES is topically dealt with for the completeness. We have discussed the snmpv3 network configuration for the switch /router along with test tool to monitor the network and devices. Throughout the paper we emphasized the improvement with snmpv3 which provides a highly secure infrastructure for Honeywell.
SNMPv3 is a great way to secure and monitor the network devices. Previous versions of SNMP provide an insecure way to access the data.SNMPv3 addresses the security shortcomings with the access control based system, which properly authenticate users and a method for encrypting SNMP traffic between the agent and the host.
This paper addresses securing the Honeywell security and monitoring the network devices and computers/laptops.
We have discussed the improved, enhanced features of snmpv3.Shortcoming of the previous SNMP version are explained and solution to those are discussed along with the new capabilities of Snmpv3. SNMP User-based security model is explained, the encryption AES, DES is topically dealt with for the completeness. We have discussed the snmpv3 network configuration for the switch /router along with test tool to monitor the network and devices. Throughout the paper we emphasized the improvement with snmpv3 which provides a highly secure infrastructure for Honeywell.
SNMPv3 is a great way to secure and monitor the network devices. Previous versions of SNMP provide an insecure way to access the data.SNMPv3 addresses the security shortcomings with the access control based system, which properly authenticate users and a method for encrypting SNMP traffic between the agent and the host.
Simple Power Point Slides about Client-Server Architecture and Peer-to-Peer Architecture.
A short description (with pictures) about Client and Server computers is given in slides.
Feel Free to Like or Dislike the Slides.
A computer network is defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.
Components of computer network
Network benefits
Disadvantages of computer network
Classification by their geographical area
Network classification by their component role
Types of servers
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
CIS337– Networking in Business Unit 6 Assignment FinalVinaOconner450
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6
Points: 20
Overview:
Your medium-sized organization is expanding both nationally and internationally and
you have been tasked to implement a Wide Area Network (WAN) topology. The
organization has expanded to 5 different geographical locations and has directed you to
design the WAN. In essence, you need to submit a plan to your Executive board and
get approval to install the WAN.
Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions:
For this section, you will work in a group. One person will be assigned to submit the
PowerPoint and paper for the entire group.
You will need to ensure security is in place to protect from internal and external threats
to the network. In a PowerPoint Presentation present the following to the Executive
Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1-
page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide.
• APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each
slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the
needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before
you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs
Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for
security ...
Here, I created a report of policies, budgets, and appendixes to accommodate a more thorough understanding of a network design for a non-profit organization. In the group, my role was to write an executive summary and think of network policies to connect their organization throughout to building. The challenges I faced were coordinating schedules and work-load distribution. After completing the project, I learned how to develop a final report for a Network design. Completing this project has prepared me to demonstrate my research, organizational, and interpersonal skills in Networks and telecommunications for a future career.
As a business’s operations start to grow and become complicated it is wise to have a functional IT infrastructure to manage those operations in a much smarter way. Hence upgrading an existing network in a company could make it much easier for that company to manage their operations.
GSM Associates is a financial back office which is situated at Sri Lanka. It is the back office of ASN Partnerships which is located at UK. The main purpose of GSM is meeting all the needs of all growing small and medium sized entity, sole trades or partnerships. As a back office, the accountants who are working at GSM does settlements, clearances, record maintenance of clients and also provide IT services to clients who are working overseas. Purpose of this group project is to create a new network design, that suites the business.
NETWORKING SYSTEMS 1
NETWORKING SYSTEMS 5
Networking System
Sarju Thapa
Dr. Stephen Gardner
East Central University
Abstract
In this report, the planning to design the network will be discussed and demonstrated in detail. The planning to design the network layout will be made according to the scenario given in the requirements. The plan will be implemented by the evaluation of the aspects that are important to design the network and other necessary things to design and implement the network. After implementing the network, the network will be tested by secure communication, WAN communication Channel, Wireless network, and PAN network. The troubleshooting of the network will also be discussed and elaborated in detail. The protocols used in this network will also be taken into consideration.
Introduction
Designing a network is not a simple task for someone. There are different phases to design the network. Each phase has a very important role to design the network. The first phase is to collect all the requirements to design the network. The second phase is to evaluate the requirements to make sure that either requirement is enough to design the network or not. After evaluating the requirements, the third phase is to implement all the aspects that are gathered in requirements. The fourth and last phase after implementing the network design is to optimize the network by performance.
Network Layout
The physical arrangement of the network is called network layout. The network layout of the given is scenario is shown below:
Diagram created using CISCO PACKET TRACER 7.3.0
Demonstration
This network consists of two different places one place is headquarter which is the main point of this network and another place is Therall which is the working point of this network.
Headquarter
In headquarter, the Executive office, R&D, Reception, Guest office, and accounting office’s host are connected with one switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C (Actually, RJ-45 is the more common term) jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network. (I think that what you have in your diagram is a bus-star hybrid. The switch is the bus, the individual cables to the hosts are the star)
Thrall
In Thrall Remote, the Engineering area, production area, and reception area’s host are connected with the switch. Twisted pair cable is used in this part of the network. Each device directly connected with the headquarter switch. 8P8C jack is used in this part of the network and it is located in the reception area. Bus topology is used in this part of the network.
For bot.
2. List of Contents
1)List of Contents
2)Introduction
3) Factors influencing the project
3.1 Functional and non-Functional
requirements.
3.2 Factors in detail
4) Approach to the project
5) Justification for design
6) Project plan
7) Resources Required
8) Bibliography
Introduction
The Current Situation
Waterfront Tele-Support is a small company based in North Edinburgh that
specialises in remote support for the clients of large Internet Service Providers.
The company inherited an old 10base2 network infrastructure which has reached the
end of its useful life. Management have decided to remove the existing network and
install a new network using up to date technology.
Below is the layout of the building:
3. 101 Admin Staff
102 Managers
103 Board and Meeting Room
104 IT and Technical Support
105 Lockable room with Telecoms POP
106 Staff Social Area
107 Telephone Support Staff
The company’s staff are organised into 2 main departments: Tele-Support and
Admin. The company currently employs 14 full-time staff as follows:
Managing Director: B Pasayet
IT and Network Support Manager J Dudek
Admin:
Admin Manager J Dodd
Admin Staff T McArdle
B Changjiang
B Hughes
Tele-Support:
Tele-Support Manager K Barnes
Tele-Support Staff W Campbell
J McCabe
4. P O’Brien
J Hall
P Cardin
F Riley
M Perez Bueno
The company also employs between 2 and 6 temporary staff on a casual basis.
Factors influencing the project
3.1 Functional requirement:
Requirement ID: Network
Requirement: A network with new pcs and printers connected, the network
should be capable of wireless network for laptops. A server will be installed
capable of hosting the company website, remote services, and backing up the
company systems. Depending on Finical status of the upgrade of the network,
consideration of a backup server outside the company (incase of fire).
Location: Waterfront Tele-Support
Rationale: Without the equipment, the project would not be sustainable.
Importance: Critical
Risks:
Pcs and printers may not be working.
Networking hardware might be fail
Assumptions: Hardware will be new, equipment should be working.
Pre- Conditions There is currently a 10base2 network in place.
Post-Conditions The network should be installed and the networking should
run smoothly with everything in place and connected.
Requirement ID: Server
Requirement: A server is to be installed, for hosting the company website,
capable of remote management and backing up network and dns.
Rationale: Without the server there will be no company website, remote
management will not be possible and back ups of the network will not be made.
Also give devices an ip address.
Importance: Critical
Risks:
If the server is down the website will not be able to host the company
website.
If the server is down then remote services will not be possible.
If the server is down then backups of the network will to be possible.
Assumptions: The server will be working fine.
5. Pre- Conditions: There is not a specific detailed plan of the current network,
detailing the hardware. So there is no way of knowing of a server currently
installed.
Post-Conditions: The server will be installed; the services that are installed
(web server, remote services and back up services) will be installed and work
efficiently.
Requirement ID: Network Security
Requirement: The network must be secure from viruses hacking any threats to
the network.
Rationale: It’s a business, so there will be sensitive information that needs to be
protected.
Importance: Critical
Risks:
Security is most often breached due to human error, mistakes such as
writing passwords down and leaving them where they can end up in
wrong hands and unauthorized access could be granted.
Assumptions: The network is being built from the bottom- up, so Security will
be set up properly
Pre- Conditions. N/A
Post-Conditions: Network security will be set up correctly and the network will
be secure from threats.
Requirement ID: Private Storage
Requirement: Each team member/department is to have their own private
storage.
Rationale: Depending on the department depends on the size of the private
storage allocated. It is as followed:
Importance: Critical
Risks: n/a
Assumptions: n/a
Pre- Conditions. n/a
Post-Conditions Depending on the departments the rules will be set for the
storage to be set to the size stated above.
All Managers 25 GB each
IT Manager 100 GB
Admin Staff Shared 250 GB
All Staff private 5 GB each
6. Requirement ID: Web & Email Filtering
Requirement: restrictions will be set on the Internet and email, websites and
emails that are thought to dangerous and websites that are not work related.
Rationale: Filtering websites, keep the network safe and workers focused on
work.
Importance: Critical
Risks: If there was no filtering the network would be vulnerable to attacks from
bad websites and staff would be less encouraged to work as they could go on
websites like Facebook.
Assumptions: n/a
Pre- Conditions .n/a
Post-Conditions Managers and directors will be able to manage the filers.
Requirement ID: Server backup
Requirement: There will be a pc in the same room as the server making a back
up for the server every morning at 2.30am
Rationale: Having a pc making backup is a safety precaution for if the sever has
a hardware failure.
Importance: Critical
Risks: If a backup is not made then important data could be lost.
Assumptions: n/a
Pre- Conditions .n/a
Post-Conditions: A backup will be made every morning a 2.30 am when the
server is least busy and will be stored on the spare pc.
Non- functions
Requirement ID: Budget Constraints
Requirement: For the new network to be installed, there needs to be a source
of money for the new requirement for the new network.
Rationale: If there is no money then no new network can be built.
Importance: Critical
Risks: n/a
Assumptions: n/a
Pre- Conditions .the company has given a budget of £30,000
Post-Conditions The network will be implemented within the means of given
budget.
7. Requirement ID: Manual labor
Requirement: A team will be in charge of all the manual labor, setting up the
new network.
Rationale: Without the team to set up the network, the project would not be
able to be started.
Importance: Critical
Risks: n/a
Assumptions: n/a
Pre- Conditions team will be ready to set up the new network.
Post-Conditions the team will complete all tasks given and the network will be
fully functional.
Factors in detail
All staff must have their own networked pc’s, this includes temp staff that
are hired, so there must be enough computers at hand for the maximum
amount of staff both full time staff and hired temp staff.
The company will be looking to advertise the business; the IT manager
has responsibility for maintaining a web
Site, which is hosted locally and should be available for public access.
The Company network should be secured from virus, attacks form
hackers, any external sources.
Any cabling should be installed in an unobtrusive manner and network
connections should be positioned in convenient locations for connecting
users to the network. All cabling infrastructure should comply with
TIA/EIA-568B.1-2000 and TIA 569-A standards
The minimum requirement for initial network bandwidth implementation
should be 100Mbps for any host computer or server on the network My design
allows for future network expansion of at least 2x user numbers and 10x LAN
throughput.
Costs forthe wholenetwork installation should be kept as low as possible while
maintaining quality and standards. The total budget for the project should not
exceed £30,000. Labour should be costed at a standard rate of £29 per hr.
All Staff should have Internet and email access, unsuitable web page content
should be filtered. Other Internet traffic should be restricted for all staff except
for the IT Manager and Managing Director whoshould have full Internet access.
A system should be set in place to back up data regularly. In the event of
hardware failure the network should be able to be made fully operational as
soon as possible and with no loss of data.
8. New desktop PC systems for all staff, and where necessary additional server
computers and network devices, should be purchased and configured.
Each of the offices should be equipped with its own all-in-one laser printing
device, except room 107 which should have 2 devices. The admin staff device
should be able to print in colour, and should have access restricted to members
of that department plus all managers. The Managing Director has a printer that
is restricted to his own personal use. The printer for the managing director will
have his printer plugged in locally to his own pc.
All Equipment must be new, PcsServer, networkmedia.
A muilti Business licence for windows 7 will be bought; so all pcs are covered
with a legitimate. The server will have a single licence of its own.
Approach to the project
NETWORK
The network that is going to be put in place is going to be based using the
extended start topology. An ISP will provide Internet for the company and
the ISP will provide the company with the fiber optic connection and
modem that will be connected to the firewall. Any Internet connection in or
out will go through a netgear firewall the firewall will be one of the safety
percussions that are apart of the new network. From the other end of
firewall, two switches will be connected, from the switches the server, Pcs,
Printers and a wireless Access point will be connected.
Between the two switches there are 48 ports (24 per switch) this allows for
future expansion if required.
The Wireless access point that will be also connected to the switch and will
lead through to the staff area, where staff can bring in their laptops and can
log into their accounts through the domain wirelessly.
Any media connected to the switches will be connected using Ethernet
cable (cat5e) The modem, firewall, switches and server will be stored in a
locked cupboard with a vent. The Ethernet cables connected to the switch
will be sent through Plymouth through out the building and where pcs are
needed they will be distributed through patch panels. Each room will have
more patch panels available than currently needed; this leaves more
connections to be added in the future and saves a lot of problems through
out future expansion.
The Server that will be connected will the deal with running services such
as:
File Storage
Web Server
9. Remote management
Domain Services
DHCP services
Backup
The Pcs and printers that are connected to the switches are able to
connected to the server and will all be connected to the domain that is
created by the server.
The server will also deal with hosting the company website through IIS.
The server will be capable of remote services
The Managing Director, IT Manager, all Managers, and admin staff so they
can log into their accounts while being out of work using terminal at any
time. Normal staff will be only be able to use this services between 7AM
and 20:30PM and only locally from the company LAN.
The Server also deals with each users personal storage(editing storage, this
includes permissions for users and storing data users store in their
personal drive).
PCs connected to the switch will be given a static IP addresses. Laptops
connected to the Domain through the wireless network will be given an IP
Address from the DHCP server.
Incase of a hardware failure with the server, the server will back up
everything at 2.30am to another server with the same specs that will be
ready to use, incase of the hardware failure to the original server.
Network Security
The network work must be safe from all threats, internal or external. Network
Security Will is a big part of the network; a firewall will be in place between the
outside Internet connection and the company network.
Web filtering – web filtering will be another Security feature, All staff will not
have full access to the internet apart from the IT manager and the Managing
Director, who have full access. This stops users going on dangerous websites
and downloading things that could be thought to be a threat to the network.
Remote Access, The Managing Director, IT Manager, all Managers, and admin staff will
have full remote access at all times to the network,no matter where they are. Normal
staff willonly be able to log in between 7am and 20:30pm.
PrivateStorage
EachUser has his or her ownpersonal storage, that only them and if needed the IT
manager can access. They can store their important files and access them from
anywhere when they log into their user accountassociated with their file storage
located on the server.
10. Web filteringandemail
Web filtering – web filtering will be another Security feature, All staff will not
have full access to the internet apart from the IT manager and the Managing
Director, who have full access. This stops users going on dangerous websites
and downloading things that could be thought to be a threat to the network.
Staff Email - Staff will be given a personal windows liveoutlook email accountCreated,
whichhas the companies email domain by the IT Manager. The IT manager has the
overall power off the accounts, the IT manager can monitor, Change any settings, reset
passwords, Any and the IT manager will be notified in the Outlookadmin center.
Temporary staff will be given a template email account,for example there willbe a
maximum number of six temp staff hired at one time, so the admin willmake six
accounts:
1. Temp_Staff1@Comapnydomain.com
2. Temp_Staff2@Comapnydomain.com
3. Temp_Staff3@Comapnydomain.com
4. Temp_Staff4@Comapnydomain.com
5. Temp_Staff5@Comapnydomain.com
6. Temp_Staff6@Comapnydomain.com
Once a member off temporary staff has left, the accountwill be, reset to a blank inbox
and the password reset to a new one so the old user has no access.
Also when a full time worker leaves the company their email will be de-activated.
Server Backup
The server will take a full back up, then from the original full backup take
differential back ups on a spare server that will be the same spec as the sever
running and will be ready to go and run off the back ups made if a hardware
failure occurs on the original server.
I have two options that I will have to look into further; I can use the Windows
backup, or I can use acronious, I will look further into this during the
implementation.
Permissions
There will be user permissions in place, pacific shared files, depending on whom
the folder belongs to and who needs what access and what privileges they will
have will vary.
11. Wireless Access point
The wireless access point will be connected to one of the switches, and lead to
through to the staff room, giving wireless connection to the network for laptops.
I will buy a spare wireless access point just incase of failure of the first one
installed.
The Server
The server will be running, the windows server 2008, the server hardware I have
given more detail further on in the report.
The Server that will be connected will the deal with running services such as:
File Storage
Web Server
Remote management
Domain Services
DHCP services
Backup
The Pcs and printers that are connected to the switches are able to connected to
the server and will all be connected to the domain that is created by the server.
The server will also deal with hosting the company website through IIS.
The server will be capable of remote services
The Managing Director, IT Manager, all Managers, and admin staff so they can log
into their accounts while being out of work using terminal at any time. Normal
staff will be only be able to use this services between 7AM and 20:30PM and only
locally from the company LAN.
The Server also deals with each users personal storage(editing storage, this
includes permissions for users and storing data users store in their personal
drive).
PCs connected to the switch will be given a static IP addresses. Laptops
connected to the Domain through the wireless network will be given an IP
Address from the DHCP server.
Incase of a hardware failure with the server, the server will back up everything
at 2.30am to another server with the same specs that will be ready to use, incase
of the hardware failure to the original server.
Client and server licenses
For the client Pcs multi volume licensees will be bought and for the server one
server license will be bought.
12. Justificationfor design
The reason I have came up with this plan and I am so confidentwith my plan, is that first
of all, if one PC or switchgoes down, it wont effectthe entire network,this is the reason
I decided togo withthe extended star topologies. Everything is replicable withoutthe
full disruption of the business. If the server goes down, there is another server withthe
current server backup to take its place. The server will be running windowsserver
2008 as it’s the most capable Operating system for running the servces required by the
company witha single server license as only one willbe used at a time.
I believe that the security I have decided to use in the new network willensure
protection forthe companies network. A firewall will protectthe networkfrom external
threats. Web filters will protect the networkinternally as this stops users going on from
dangerous websites. For the email, the company will use windowslive outlookand
create domains, windows live outlookstore the users and new users on their own
servers, but the company’s ITmanager willhave the rights to create, modify and
monitor all email accounts.
The overall physical design that I willgo into more detail in stage twowill cause no
problems around the workspace.
There are twoswitches so if one switchfails only half the network is down.
Client PCs will be running windows 7 with a multi volume licensee.
As previously mentioned for shared files, permissions will be in place to keep folders
and files safe and secure. If the wireless access point stops working, then there will be a
second one ready to install right away.
I am very confidantin my plan.
I did lookat different topologies like token rings, bus and other ones, howeverI noticed
with some of the other topologies where quite unreliable, meaning if one pc failed, the
entire networkwould fail. I also noticed for the equipment I am using best suits the
topology I have chosen is best to use withmy network media is the extended star
topopgie.
I looked at different waysof backing up, I couldcreate incremental back ups but this
would take up both too much time and space on the spare server so I then decided to go
with differential backups. I also looked at just storing back ups just on removable hard
drives, however I felt,the server should be covered forall failures, so if anything goes
wrong at all withthe server, a exact double of the server is ready to go when and if
failure occurs withthe old back up ready on the spare server.
I compared server Operating Systems and Windows server 2008 was best compared to
any comparators like Linux, All the clients are windowsbased, and for the services
needed from the server like networkstorage, Remote services etc. Windows server
2008 was the best option.
For the email requirement, I feltit was easier to use windowslive outlook,as it is one
less strain for the networkand the ITmanager having to run the full email server their
self. With the Outlook server the IT manager knowseverything is safe as Microsoft
insure this, well still being able to administrate, creating, modifying and monitoring
email accounts under the company domain.
The Physicallayout is the best way possible withoutthere being any hazards. The
networkis very accessible withthe plan that I have laid out.
13. For the licensing, there are going to be a lot of clients, so instead of buying a lot of single
licensees, it is more cost efficientto buy a multi volume licensee of all pcs are covered.
For the server, only one licensee is needed, as there is only one server activeat any one
time.
Project plan
Below is my ganatt chart showing the time line of the
jobs.
14. This is another photo of the gannt chart.
This is a list of the jobs, this details the job, date, how
long it takes and who is working it.
15. above is a photo of a mile stone at the bottom, to say
the project is complete.
Resources Required
16. Resource
Name
Reason For
buying the
Required
Resource
(s)
Howmuch ofthe
resourcewasbought
Source
NETGEAR
JGS524 Gigabit
Switch Switch -
24 ports
X 2 The switches are
resources needed forthe
network;this will
connectall devices
together to the internet.
Source Link
Ethernet Cables 300M Ethernet is for
connection all network
media
(Modem >firewall
>switches>Pcs&Printers)
Source Link
Client Pc’s X 20 Client Pcsfor all users,
this includes if the
maximum number of
temp staff where hired
as well,this insures there
are enough pcs forall
workers.
Source Link
(More detail
is given on
quote
below)
Server PC
&
Mouse and
Keyboard
x1
x 1
The company needs the
Server for user
requirements; the server
comes with the OS
License.
The keyboard and mouse
is bought from a
different source than the
server its self.
Source Link
for server
Source for
mouse and
keyboard
A quote
with the
server is
also given
below the
table after
the Quote
for client.
Printer
Wireless Access
point
TP LINK TL-
WA730RE
Range
Extender
X2 To give the staff
wireless access
to the network
well in the saff
area
Source Link
Windows 7 pro
Installation Disk
X1 Windows 7 pro
installation disk
to install on pcs
Windows 7 pro
muilti License
X unlimited The clients need
an OS that is
17. Quote ofClientPCS
TheServerquote
QUOTATION
Quote Number: 539033 Tel: 0844 499 4000 | Fax: 0845 226 4046
Date Created: 27-02-2013 PC Specialist Ltd
Units 20 + 20A Brockholes Business Park
Ricky Asher Rock Mill Road
Brockholes
Holmfirth
HD9 7BN
VAT No. GB 827 4395 05
Product Category Product Description
Case STYLISH PIANO BLACK ENIGMA MICRO-ATX CASE + 2 FRONT USB
Processor (CPU) AMD A6-3500 Triple Core APU (2.1GHz) & Radeon™ HD 6530D Graphics
Motherboard ASUS® F1A55-M LK R2.0: FM1 A-SERIES, SATA 3.0GB/s, Windows 8 Ready!
Memory (RAM) 2GB SAMSUNG DUAL-DDR3 1333MHz (1 x 2GB)
Graphics Card Integrated AMD Radeon HD 6000 Series Graphics
Memory - 1st Hard Disk 500GB 3.5" SATA-III 6GB/s HDD 7200RPM 16MB CACHE
1st DVD/BLU-RAY Drive 24x DUAL LAYER DVD WRITER ±R/±RW/RAM
Memory Card Reader INTERNAL 52 IN 1 CARD READER (XD, MS, CF, SD, etc) + 1 x USB 2.0 PORT
Power Supply 350W Dual Rail PSU + 120mm Case Fan
Processor Cooling STANDARD AMD CPU COOLER
Sound Card ONBOARD 8 CHANNEL (7.1) HIGH DEF AUDIO (AS STANDARD)
Network Facilities 10/100/1000 GIGABIT LAN PORT - AS STANDARD ON ALL PCs
USB Options 4 PORT USB 2.0 INTERNAL PCI CARD + STANDARD USB PORTS
Modem NONE, I WILL BE USING BROADBAND
Operating System NO OPERATING SYSTEM REQUIRED
Office Software NO OFFICE SOFTWARE
Anti-Virus NO ANTI-VIRUS SOFTWARE
Monitor AOC 21.5" WIDESCREEN LED TFT - 1920 x 1080, 5MS, D-Sub, DVI-D (£89)
DVI-D & HDMI Monitor Cables 1 x 2 METRE DVI-D CABLE (£5)
Keyboard & Mouse LOGITECH® K200 USB MEDIA KEYBOARD (£10)
Mouse LOGITECH® OPTICAL USB MOUSE (£5)
Speakers LOGITECH S120 2.0 BLACK SPEAKER SYSTEM (£9)
Warranty 3 Year Standard Warranty (1 Month Collect & Return, 1 Year Parts, 3 Year
Labour)
Delivery STANDARD INSURED DELIVERY TO UK MAINLAND (MON-FRI)
Build Time Standard Build - Approximately 7 to 9 working days
Price Ex VAT £295.83
Price £355.00
Quantity 20
Total Order Price EX VAT £5916.67
Total VAT Amount £1183.33
Total Order Price £7100.00
installed legally.
Net gear firewall
18. 27/ 02/ 2013 01:43The Dell Online Store: Build Your System
Page 1 of 3http:/ / configure.euro.dell.com/ dellstore/ print_summary_details_po…c= svt110ii&s= bsd&vw= classic&leadtime= 05/ 03/ 2013&showleadtime= True
DELL PowerEdge™ T110
II
Price £1,122.00
Discount £208.00
Subtotal £914.00
Estimated Delivery Times
Save an extra £120 when you spend
over £800 on Dell PowerEdge
Servers.
Add coupon code
QK1FTTZ7KSQDFG to your basket to
claim savings.
Offer ends 1st March 2013.
Recycle your old Dell Server and on
purchases of over £700
claim £250 cash back
Ex. VAT & Shipping
36 months lease from only £35 per
month
Why lease? Find out more.
Discount Details
Preliminary Ship Date: 05/03/20131
DELL PowerEdge™ T110 II
Date
26/02/2013 19:36:52 Central Standard
Time
Catalog Number 202 Retail ukbsdt1
Catalog Number / Description Product Code Qty SKU Id
Base:
PowerEdge T110 II Tower Chassis, Up to 4x 3.5"
Cabled HDDs
509987 1 [210-35874] 1
Processor:
Intel® Core™ i3-2100, 2C/4T, 3.10GHz, 3M
Cache, 65W TDP
509996 1 [213-13586] 146
Memory:
2GB Memory, DDR3, 1333MHz (1x2GB Single
Ranked LV UDIMM)
509798 1 [370-20355] 3
Operating System:
Windows Server 2008 R2 SP1, Standard Edition,
English, Incl. 5 CALs, Including Media
727822 1
[617-10338]
[618-10616]
285
Shipping Documents:
T110II EMEA1 Ship Docs No Power Cord
(English/French/German/Spanish/Russian/Hebrew)
509989 1 [340-25318] 21
RAID Connectivity:
My Selections All Options
19. 27/ 02/ 2013 01:43The Dell Online Store: Build Your System
Page 2 of 3http:/ / configure.euro.dell.com/ dellstore/ print_summary_details_po…c= svt110ii&s= bsd&vw= classic&leadtime= 05/ 03/ 2013&showleadtime= True
C1 4HD - No RAID with On-board SATA Controller,
Requires 1-4 SATA HDDs
510002 1 [780-12786] 1009
Primary Hard Drive:
1TB, SATA, 3.5-in, 7.2K RPM Hard Drive (Cabled)
305583 1 [400-18492] 1209
Power Cord:
UK 250V 2M Power Cord 10A
256929 1 [450-13370] 207
Server Management Card:
Embedded Baseboard Management Controller
256923 1 [565-10165] 1314
Network Cards:
Intel® PRO/1000PT GbE Single Port Server
Adapter, Cu, PCIe-1
60757 1 [540-10371] 1230
Optical Devices:
16X DVD-ROM Drive with SATA Cable
569529 1 [429-15949] 16
Mouse:
Dell MS111 USB Optical Mouse
425997 1 [570-11091] 12
Monitor:
Display Not Included
5931 1 [480-10611] 5
Systems Management:
PE T110II Electronic System Documentation and
OpenManage DVD
510021 1 [631-10807] 49
Gedis Bundle Reference:
SVT110II
581097 1 [200-87266] 22
Order Information:
PowerEdge Order - United Kingdom
32396 1 [800-10511] 111
Base warranty:
1Yr Basic Warranty - Next Business Day -
Minimum Warranty
315107 1
[709-10513]
[709-10514]
29
Support Services:
1Yr Basic Warranty - NBD Included - No Upgrade
Selected
315183 1 [710-18105] 30
Dell Services: Installations:
No Installation Service Selected (Contact Sales rep
for more details)
58267 1 [683-11870] 1290
Remote Advisory Service:
Declined Remote Advisory
691639 1 [715-10838] 735
Proactive Maintenance:
Declined Proactive Maintenance (info)
135789 1 [713-10026] 140
Print
How to Contact Dell
SMALL BUSINESS Phone Fax Email/ Web
Companies with fewer than 200 employees
General Sales 0870 907 5819
Software & Peripherals Sales 0870 907 5083
Order Status (system orders only) 0870 907 4712
Customer Care General Order Enquiries 0870 906 0010
Technical Support Queries 0870 908 0800
Address
Dell Computer Corporation
Dell House
The Boulevard
20. Bibliography
1. Wikipedia, [online] Available at < http://www.wikipedia.org > [Accessed
1st February]
2. Ehow, [online] Available at http://www.ehow.co.uk > [Accessed 28th
february]
3
Windows live domain email , [online] Available at
http://www.domains.live.com
3. > [Accessed 29th february