Prepared for: mr. Albin lemuel



Download 1.25 Mb.
Page2/4
Date30.05.2021
Size1.25 Mb.
1   2   3   4

1.2 BUSINESS REQUIREMENT



KEY PLAYERS


  1. Information Source :

    1. Chief Executive Officer

  2. Decision makers :

b) Chief Executive Officer

MAJOR MILESTONE


Task Name / Duration(month)

1

2

3

4

5

6

7

8

9

Information Gathering




























Analysing Current Network




























Create Logical Network Design




























Create Physical Network Design




























Installation And Maintenance




























Report





























FUNDING LEVEL





TYPE OF BUSINESS ACTIVITY


Champs sdn bhd is a electrical company that involve in electrical hardware selling and leasing including electrical ware for home used and Industrial used. Lately, Champs start to used online services in order to expend their business variety and profit.

ESTIMATED GROWTH


For the first 2 years from now, it is estimated growth rate of the company’s employees is 70 % per year since the company are short in number of staff. Increasing in company’s employees cause increasing in network traffic.

RELIABILITY AND AVAILABILITY


Since Champs are aiming for involving in online marketing it is crucial to keep this network availability and make it reliable, if not it will cause in serious dropping of productivity and revenue.

SECURITY


Management would also like to implement a more tight security system to ensure there is no data breaching to unauthorised person.

REMOTE ACCESS


Changing in business strategy forced the data to be access anywhere and anytime by top and middle management especially for network personnel to monitor company network.

1.3 USER REQUIREMENT


In improving network performance, a survey had been carry out in order to understanding user needed for a new network.

Based on the survey conducted, the result can be conclude as follow :


  • Timely delivery information : User want to get data immediately

  • Reliability and availability : Network have to be stable to support their workload

  • Security : Their data and information stored or travel over network must be kept secure and private from breaching


PHASE 2: ANALYZING CURRENT NETWORK



EXISTING LOGICAL DIAGRAM



4

5

3

6

2

1

Support :



  • Number of workstation(s) : 50 units

  • Division of staffs :

    • Top Management :
      Chief Executive, Senior Manager, Production Manager, Sales Manager,

Human Resources Manager.

    • Middle Management :

Electrical Engineer, System Engineer, Accountant, System Analyst,

Safety and Health Manager



    • Low Management : Supervisor, Team Leader, Technician, Sales Person.



  • Type of topology : Bus

  • Type of network : LAN

  • Type of router : Wired Router

  • Type of computer network : Intranet and Internet for all staffs

  • Type of security : Firewall

  • NETWORK ENVIROMENT

Problem

Description

  1. Old switch

Core switch which connect to server always faced a bottleneck problem especially during peak hour since limitation of switch bandwidth and everyone need to access to the server.

  1. Cabling

There are currently no patch panel or equipment racks for proper cable management and mounting of switches. This can lead to more frequent cabling failures. Most cabling recognized is standard Category 5 cabling which is fit for paces just up to 100Mbps which won't be sufficient for future employments. Cabling is likewise unlabelled which makes it hard to trace when there are issues and this slows resolution.

  1. Remote Access

A remote access Virtual Private Network (VPN) used to be set up for Top and Middle level user to remote access data from the workplace frameworks. Presently that VPN framework is not utilized for specialized or operational reasons.

  1. Backup Server

A cursory review of the EMC Retrospect backup logs suggests that not all data is being backed up to the Buffalo Network Attached Storage (NAS) devices and it is attached hard drives and/or is not being written reliably. Not having all application, databases, and data directories backed up can make it impossible to restore lost data. Additionally, the information that is being backed up to the Buffalo NAS external drives is not being taken offsite thus all data and their backups is subject to being lost in the event of a flood, fire, or theft affecting the servers (even if it were being taken offsite, it is not believed to be encrypted thus information could be stolen if these offsite drives were stolen). Lastly, one of the four hard drives on the Buffalo NAS is physically failing and may not be able to hold backup information much longer.

  1. Server Space

Currently the data partition on the ‘widgets1file’ server only has 5GB free which is 4% free of its total disk space. The operating system partition on this same server is at 4.6GB free which is 15% free of its total disk space. The data partition on the ‘widgets1mail’ server at 24GB free which is 18% free of its total disk space. A server which runs out of disk space can either crash and become not available or at the minimum not be able to store additional information and possibly corrupt user information.

  1. Single Firewall

Aware with the security, the company place a firewall before the gateway but it just not enough to have secure network. The connection for a staff, middle manager and the top manager to access server are directly interlinked which mean it has a probability or give a chance for staff to get access or to tap the data that been sent by their manager and there might be a possibility that the top or middle manager are getting fault information.



  • PHYSICAL ENVIROMENT

Problem

Description

Automatic Server Shutdown

During an extended power outage, the UPS batteries will get to be depleted and in the end quit giving energy to the servers bringing about an unexpected shutdown of the servers. This sudden disturbance of electrical supply to servers may cause data to be lost or undermined.

Enviroment Notification

There is no monitoring and alarming if the encompassing temperature or humidity surpasses adequate limits. Alarming to administrators is critical so that extreme temperature or humidity variations can be addressed in a timely fashion in an auspicious manner to best secure the interest in IT equipment which could somehow be harmed

Server Location

The servers are currently in an area trafficked by non-IT staff and could be effectively either incidentally or intentional disrupted. The location of server hardware and system console itself is located in a vulnerable area.

Download 1.25 Mb.

Share with your friends:
1   2   3   4




The database is protected by copyright ©ininet.org 2020
send message

    Main page