KEY PLAYERS
Information Source :
Chief Executive Officer
Decision makers :
b) Chief Executive Officer
MAJOR MILESTONE
Task Name / Duration(month)
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
|
9
|
Information Gathering
|
|
|
|
|
|
|
|
|
|
Analysing Current Network
|
|
|
|
|
|
|
|
|
|
Create Logical Network Design
|
|
|
|
|
|
|
|
|
|
Create Physical Network Design
|
|
|
|
|
|
|
|
|
|
Installation And Maintenance
|
|
|
|
|
|
|
|
|
|
Report
|
|
|
|
|
|
|
|
|
|
FUNDING LEVEL
TYPE OF BUSINESS ACTIVITY
Champs sdn bhd is a electrical company that involve in electrical hardware selling and leasing including electrical ware for home used and Industrial used. Lately, Champs start to used online services in order to expend their business variety and profit.
ESTIMATED GROWTH
For the first 2 years from now, it is estimated growth rate of the company’s employees is 70 % per year since the company are short in number of staff. Increasing in company’s employees cause increasing in network traffic.
RELIABILITY AND AVAILABILITY
Since Champs are aiming for involving in online marketing it is crucial to keep this network availability and make it reliable, if not it will cause in serious dropping of productivity and revenue.
SECURITY
Management would also like to implement a more tight security system to ensure there is no data breaching to unauthorised person.
REMOTE ACCESS
Changing in business strategy forced the data to be access anywhere and anytime by top and middle management especially for network personnel to monitor company network.
1.3 USER REQUIREMENT
In improving network performance, a survey had been carry out in order to understanding user needed for a new network.
Based on the survey conducted, the result can be conclude as follow :
Timely delivery information : User want to get data immediately
Reliability and availability : Network have to be stable to support their workload
Security : Their data and information stored or travel over network must be kept secure and private from breaching
PHASE 2: ANALYZING CURRENT NETWORK
EXISTING LOGICAL DIAGRAM
4
5
3
6
2
1
Support :
Number of workstation(s) : 50 units
Division of staffs :
Top Management :
Chief Executive, Senior Manager, Production Manager, Sales Manager,
Human Resources Manager.
Electrical Engineer, System Engineer, Accountant, System Analyst,
Safety and Health Manager
Low Management : Supervisor, Team Leader, Technician, Sales Person.
Type of topology : Bus
Type of network : LAN
Type of router : Wired Router
Type of computer network : Intranet and Internet for all staffs
Type of security : Firewall
NETWORK ENVIROMENT
Problem
|
Description
|
Old switch
|
Core switch which connect to server always faced a bottleneck problem especially during peak hour since limitation of switch bandwidth and everyone need to access to the server.
|
Cabling
|
There are currently no patch panel or equipment racks for proper cable management and mounting of switches. This can lead to more frequent cabling failures. Most cabling recognized is standard Category 5 cabling which is fit for paces just up to 100Mbps which won't be sufficient for future employments. Cabling is likewise unlabelled which makes it hard to trace when there are issues and this slows resolution.
|
Remote Access
|
A remote access Virtual Private Network (VPN) used to be set up for Top and Middle level user to remote access data from the workplace frameworks. Presently that VPN framework is not utilized for specialized or operational reasons.
|
Backup Server
|
A cursory review of the EMC Retrospect backup logs suggests that not all data is being backed up to the Buffalo Network Attached Storage (NAS) devices and it is attached hard drives and/or is not being written reliably. Not having all application, databases, and data directories backed up can make it impossible to restore lost data. Additionally, the information that is being backed up to the Buffalo NAS external drives is not being taken offsite thus all data and their backups is subject to being lost in the event of a flood, fire, or theft affecting the servers (even if it were being taken offsite, it is not believed to be encrypted thus information could be stolen if these offsite drives were stolen). Lastly, one of the four hard drives on the Buffalo NAS is physically failing and may not be able to hold backup information much longer.
|
Server Space
|
Currently the data partition on the ‘widgets1file’ server only has 5GB free which is 4% free of its total disk space. The operating system partition on this same server is at 4.6GB free which is 15% free of its total disk space. The data partition on the ‘widgets1mail’ server at 24GB free which is 18% free of its total disk space. A server which runs out of disk space can either crash and become not available or at the minimum not be able to store additional information and possibly corrupt user information.
|
Single Firewall
|
Aware with the security, the company place a firewall before the gateway but it just not enough to have secure network. The connection for a staff, middle manager and the top manager to access server are directly interlinked which mean it has a probability or give a chance for staff to get access or to tap the data that been sent by their manager and there might be a possibility that the top or middle manager are getting fault information.
|
Problem
|
Description
|
Automatic Server Shutdown
|
During an extended power outage, the UPS batteries will get to be depleted and in the end quit giving energy to the servers bringing about an unexpected shutdown of the servers. This sudden disturbance of electrical supply to servers may cause data to be lost or undermined.
|
Enviroment Notification
|
There is no monitoring and alarming if the encompassing temperature or humidity surpasses adequate limits. Alarming to administrators is critical so that extreme temperature or humidity variations can be addressed in a timely fashion in an auspicious manner to best secure the interest in IT equipment which could somehow be harmed
|
Server Location
|
The servers are currently in an area trafficked by non-IT staff and could be effectively either incidentally or intentional disrupted. The location of server hardware and system console itself is located in a vulnerable area.
|
Share with your friends: |