Uploaded by bluedondd

Network support technologies - Middlesex Uni

advertisement
Network Support Technologies- CMT
3345
Case Study - Barcroft Media
Final Stage
Student Number:
i
Table of Contents
Network Support Technologies- CMT 3345 .................................................................. i
Introduction .................................................................................................................... 1
Cost analyzes ................................................................................................................. 5
The SSITI of Strategic area can be discussed as follows............................................... 8
Physical ...................................................................................................................... 8
Logical ....................................................................................................................... 9
Human ...................................................................................................................... 10
The SSITI under Policies area can be discussed as follows. Further company policies
can be set up by considering the following areas. ....................................................... 11
Physical .................................................................................................................... 11
Logical ..................................................................................................................... 11
Human ...................................................................................................................... 12
The SSITI under Best Practices can be discussed as follows ...................................... 13
Physical .................................................................................................................... 13
Logical ..................................................................................................................... 13
Human ...................................................................................................................... 14
Appendix ...................................................................................................................... 19
i
Introduction
The technologies are rapidly developing day by day. Therefore to take competitive
advantages within the competitive market the company must has proper change
management process. As a part of this process the company should follow and apply
new and emerging technologies which are related to the business process in order to
improve their business since the company has been engaged with selling of Digital
Assets such as Text, Image, Videos & Audios, News articles, etc. to worldwide
market. In here company must concern about the cost of new technologies, positive
and negative impact of them for the company and the social, maximum return and
positive growth of the business, safety and security of the company, workflow
implementation, new marketing strategies, etc.
By introducing these technologies to the business process, the company will be able to
achieve set of goals and objectives in very effective and efficient manner. Some of
them are listed as follow.

Produce a high quality and valuable Digital Asset to market.

Cost minimization for overall production.

To keep maximum staff satisfaction within the company.

To earn higher profit from the business than other competitors.

Expand the market segment within the competitive market.

Provides high safety and security for over roll business activities.

To improve psychical behaviors of the employees
Presently company uses servers [ Web & Main ],Firewalls ,FTP, Apple Macs, Mobile
Phones, etc. in order to carry out the business process and using iChat, Skeype as
communication ways and also company uses cameras to take photos and videos for
captioning. Though the company uses these kind of technologies considering present
market situation, the time has become to migrate in to the newly technologies. While
migrating into latest technology the company has to be removed some existing
technologies and adapt into the new technologies. Due to this some resistance may be
occurred and the management should be tact full to overcome these kind of resistance
within the company. According to the present stage the company network architecture
can be displayed as follow.
1
UK Branch
Multifunction
device
PC
PC
PC
Mobile Phone
Wireless Access
point
Switch
Web Server
Main Server
USA Branch
ADSL Router
Firewall
Indian Branch
Multifunction
device
Switch
Firewall
Firewall
Switch
ADSL Router
ADSL Router
PC
PC
Multifunction
device
Wireless Access
point
PC
Wireless Access
point
PC
Mobile Phone
Main Server
Main Server
Mobile Phone
Figure 1.0 – Existing Network Diagram
As a consultant the new network architecture & technological approaches to the company can be describe as follows.
2
UK Branch
Multifunction
device
PC
PC
PC
IPad2
Wireless Access
point
Firewall
ADSL Router
USA Branch
Indian Branch
Proxy Server
Multifunction
device
Main + Mail Server
Firewall
Internet
Firewall
ISP
ADSL Router
PC
PC
VPN
Tunnels
VPN
Tunnels
Wireless Access
point
ADSL Router
Wireless Access
point
Dedicated Web
Server
PC
Proxy Server
Proxy Server
IPad2
Multifunction
device
VPN
Tunnels
PC
Main Server
Main Server
IPad2
Figure 2.0 – Proposed Network Diagram
3
Device Name
Availability
Availability in proposed
in Existing
Network
Reason for Change
Network
Apple iMac
Yes
Yes
Web Server
Yes
Yes(Dedicated Web Server
- Eliminate the following cost
http://iweb.com/dedicated/classicdeals?gclid=CLSy4IyipKoCFQhP
4QodEXPeMQ)
Main server
Yes
Yes
FTP Server
Yes
Yes
Mail Server
No
Yes (One mail server)




Administrative cost
Maintain cost
Operational cost
Security cost
Due to use of VPN and eliminate the
unnecessary hardware usage
Proxy Server
No
Yes
To increase the security & reduce the
bandwidth cost
Multi
Yes
Yes
ADSL Router
Yes
Yes
Switch
Yes
No
Functioning
Devises
In the future all the devises may be
used wireless technology therefore the
cost for the switch is an additional
expense for the company.
This
wireless connectivity go through the
fire wall and proxy
Wireless
Yes
Yes
Yes
Yes (Software firewall)
To gain the cost benefit
No
Introduce iPad2 by eliminate mobile
Access Point
Firewall
(Hardware
fire wall)
Mobile Phone
Yes
phones & cameras
iPad2
No
Yes
4
Cost analyzes
Device Name
Proposed Network cost
Apple iMac
N/A
Web Server
£82.5
Main Server
£32.0n
*
3
-refer
this
(http://www.pcmag.com/article2/0,2817,2386897,00.asp)
FTP Server
N/A
Mail Server
N/A (Inbuilt )
Proxy Server
£32.0n * 3 (Due to proxy server is running separately)
Multi Functioning Devises
N/A
ADSL Router
N/A
Switch
-£191(http://www.nextag.com/48-port-switch/compare-html)
Wireless Access Point
N/A
Firewall
-£235 *3 (http://www.nextag.com/firewall-hardware/shop-html)
+
£50.1
*3
http://www.macworld.com/article/135888/2008/10/firewalls.html
Mobile Phone
-£278*8
(http://www.slmpriceindex.com/show_phone.php?phone_id=128#)
iPad2
+£447*8
Total net cost
£ 880.80
According to the new proposal, the company can use separate VPN for their business
transactions. Through this VPN the company can be able to implement higher data
security, using of high bandwidth to improve working efficiency and the management
can create authorization limits within the network very easily. Using higher
bandwidth the company can be able to transfer high resolution images and videos
through the FTP and due to this, the fed-ex charges and processing time will be
minimized. Further qulitiness of the production will increase and the company can be
able sell them with higher price. The bandwidth cost may be managed from the
margin of the production selling. Further the approaches of external entities can be
filtered using fire walls and newly implemented proxy servers. The implementation
cost of VPN in much higher, but considering the long-lasting success of the company
that it will be given more benefits and generate more income in the future and it will
5
be a valuable assets for the company. The company can use OS X Lion Server as
their main server instead of their existing server. Through that, they can configure
their own email server for their mail functions and using that server the company can
be able to increase the security of data than third party’s servers such as Gmail, yahoo
mail, etc. company can be customized the mail server according their working
environment. In here though the company has to expense higher cost for purchasing
of mail server, considering the risk impact for internal data that can be justifiable,
because the main business of the company is selling digital assets. The company can
provide iPad2 to the employees by eliminating the usage of Mobile Phones &
Cameras from the business process. Through this, the company can gain a reasonable
cost benefit. iPad2 is contained with Wi-Fi and 3G facility therefore staff can be
communicate between each other very easily and also it can be connected with VPN
also. Therefore the additional time wasting for data sharing such as Images and
Videos will be reduced and the reduced time can uses for business in effectively.
Since the company uses Apple Macs the configuration of both devises can be done in
very easily. By giving iPad2 to employees, that satisfaction, motivation and working
efficiency of them will be increased. It will be given intangible cost benefit to the
company. Further Company can use iPad2 as marketing strategy. Apart of that the
company can use social network and web 2 applications such as Face Book, Blogs,
Wikis, etc for marketing process. The creating FAN pages for business purposes are
unethical thing since the social network is unable to use for business purposes. But by
paying for the social network or web 2 applications the company advertisement can
display within the relevant site. Though the advertising cost is higher, due to the
popularity of the socials networking sites and web 2 applications, the company can be
able to deal with the new business clients throughout the world. In addition the
company can develop a payment service through the PayPal in addition to main
payment service. According to the company view, the web is too old. Therefore the
upgrading of the WEB is given competitive marketing benefit to the company. The
Skype will be removed from the communication process and have to use iChat for
communication since the Skype has been purchased by the Microsoft. If the company
uses Skype furthermore the company may has to pay some subscription for the
service in near future. Therefore away from the Skype in this stage is given cost
benefits to the company since the resistance from the employees can be manage
during few days.
Further company can use yahoo messenger also their
6
communications as alternative product and I proposed the Google could service to the
company in order to increase their workflow management. Free vector graphics editor
applications such as Inkspace and Video editing applications such s HyperEngine-AV
will be introduced to the company as a cost effective methods and all existing
application remove from the company. These applications can be run within the MAC
O/S in and it will be given cost benefit to the company since the purchasing and
updating can be done by freely. In here the company has to conduct some awareness
programs about the new software and it will be an intangible cost for the company.
The apple Macs are not being changed due the company main goal is produce a high
quality and valuable Digital Asset to market. Through the Mac, the graphic designing
works can be done in very quality way.
The Safety and Security of IT Infrastructure [SSITI] is very important to the company
since the company is dealing with valuable digital assets. The proposed structure of
SSITI can be displayed as follows.
Figure 3.0
Presently company uses Fire Walls, Password Protections Processors, etc. as security
methods for IT infrastructure. Considering the new proposal company must has
developed proper SSITI within the company to achieved better business environment.
The company can implement SSITI using the physical, logical & human ways within
the company by considering Company Strategies, Polices and Best Practices.
7
The SSITI of Strategic area can be discussed as follows
Physical

Located server backups in separate geographical area as a Disaster Recovery
Plan.
According to the company views The Company cannot be down for even 10
minutes, therefore proper backup system must be implemented. The backup
server must be updated within every 5min. The Network Attached Storage
[NAS] system which is consider as file-level computer data storage, connected
to a computer network providing data access to heterogeneous clients, can be
also use to backup the data within the network addition to the backup server.

Setup servers in the server room about one feat height from the ground flow
level to protect from the small floods and other natural perils.

Company must develop a proper disaster alarming process to protection of the
company. The company can use smoke detectors, fire alarms, fire doors, flood
detectors, etc. And also to prevent from the hardware and software failures the
company can use following methods

Fault Tolerance – this allows hardware to continue to operate even if
some components fail

Backup & Checkpoints – this allows programs and data to be
recovered to their state before the failure took please. Taking a back up
involves copying data and programs to removable storage medium
such as magnetic tapes, magnetic dicks or optical dick .the choice of
backup medium depends on number factors and must concern about
cost , robustness and volume.

Contingency and recovery planning is also very important to plan what to do
when things go wrong. In here the business continuity planning is important
and company must consider about the following areas when going to be
implement this continuity plan.

Responsibilities

Proprieties

Communication with staff

Backup and standby arrangements
8

Public relations

Risk assessment
In overall the company must has to expense additional cost for implement these
strategies for SSITI .when comparing the assets value and the longstanding stability
of the company with the implementation cost, the cost cannot be considered as
unusual cost since it create better future to company.
Logical

Use Firewalls & Proxy server for the network to deny of unauthorized access.
The company already uses firewalls and by using proposed proxy server the
company can limit the internet access and downloading .A proxy is more
sophisticated. Instead of allowing data through the proxy ‘pretends’ to be the
organization’s systems to anyone trying to access them externally and pretends
to be the external network to anyone trying to access it from inside the
organization. And also the company can be able to use maximum of the
bandwidth and it will be increased the productivity of the company. Though
the company has spend money for the installation of the proxy server that cost
will be manage by reducing the cost for the network using.

Use Intrusion Detection System & Intrusion Prevention Systems [IDP/IPS] to
protect the system from malicious activities and improve the network
security. The main functions of intrusion prevention systems are to identify
malicious activity, log information about said activity, attempt to block/stop
activity, and report activity. Through this application the company will be able
to protect their digital assets from the malicious activities. The intangible
value of the digital assets is much higher than the tangible cost of above
systems.

Use cryptographic protocols such as Security Socket Layer [SSL] through the
network to communicate in very safety manner. A protocol describes how
the algorithms should be used to data transitions. SSL a protocol developed
by Netscape for transmitting private documents via the Internet. SSL uses
a cryptographic system that uses two keys to encrypt data. A public key
known to everyone and a private or secret key known only to the recipient of
9
the message. By implementing these kinds of security menthods the digital
assets can be transfer through the VPN in very safety manner.
Human
 The company can conduct IT awareness programs to the staff about new trends
of IT. Through this, company built knowledgeable workers within the company
and it will help to company since they work 24/7.Further there is no full time
IT person or department, therefore the IT literate staff is a valuable assets for
the company. Though the reasonable cost has to spend for the training
programs, the intangible cost benefit which is generated through the
knowledgeable staff is given cost advantage to the company. The trainings can
be launched as


Compute based training (CBT)

One to one training

Videos

Books and Manuals

Circulars
The company can provide a system in order gather employee’s suggestions
and innovation about the SSITI. Through that company can rectify the lapses
and improve Safety and Security of company. The company can issue
commendation letter or any kind of reward to the employee who suggests the
best innovation idea. It helps to improve employee satisfaction and other
employees are motivated through this process. Due to this the lapses area of
the company can be easily rectified. Though the company has to spend money
for the recognition process the intangible value of the innovations and
suggestion is given cost benefit to the company.
10
The SSITI under Policies area can be discussed as follows.
Further company policies can be set up by considering the
following areas.
Physical

Restrictions can be established by avoiding the use of external storage devices
such as memory sticks, portable hard disks, etc. The harm fills malwares,
spywares, virus can be spread out within company system due the use of these
kinds of devises and the digital assets can be dammed through this. By
established a policy the company can take disciplinary actions against the
employee who violates the policy. This is very cost effective method to
prevent the system from the outside threats.

Company can provide external storages which are configured with security.
However the usage of external memory device is important to employees to
take valuable data for their official usage. Therefore company can provide
security configured devices to carry out the data. Though the cost for the
devices is much higher the intangible cost benefit through this process is
valuable factor to the company.
Logical

Implementing Password policy , E-Mail policy , etc. within the organization
The company must have implemented these kids of policies within the
working environment to reduce misbehaviors of the employees. And the
employees must known about content of these policies and it will be help to
create better working environment within the company. The policies brief how
to use the system applications and what are the limitations of them.

Set up user level accesses into the system according to grade of the employee.
Most of the companies are doing this user level authentication system and this
can apply to the company. Due to these authentications the management can
11
be easily allocate the job functions for each employee and monitor hire
working.

Can be implemented Data Protection act [1998] as a policy within the
organization.
The internal staff may use customers’ data to their personal usage and
sometime they deliver or sell the data to third parties. According to the Data
protection act the personal data shall be obtained only for one or more
specified and lawful purposes, personal data shall be processed in accordance
with the right of data subject under the Act & Data must not be disclosed to
other parties without the consent of the individual whom it is about. Therefore
the privacy of the data is very important and if some company violates this
privacy, the customer can go in front of the law with Data Protection act and
consumer protection act. In here also the digital media is valuable evidence if
it is accepted by the court as evidence. Therefore by implementing this act as a
policy of the company the difficulties which can be happened in the future can
be minimized. The financial loss which can be raised due to violation of act
can be controlled by implanting this.

Allocation of bandwidth can be managed in accordance with the user work
class.
According to the company views the expenses for bandwidth is one of the
major issues. Therefore by using router the company can manage the
bandwidth according to the user work classes. It will be help to the overcome
the bandwidth issue for some extend. Further by using VPN this bandwidth
expenses may reduce.
Human

Separate medical treatment policy can be established within the company to
get treatments for deceases which are raised due to electronic impact.
Employee satisfaction & motivation will be improved through this.
The
following health issues can happen while working with computers.

Repetitive Strain injury (RSI)

Back and neck problems

Radiation from screens

Danger from trailing cables
12


Risk of electric shocks
Introduce a digital identification tags for employees.
Wearing of tag can be considered as compulsory rule and it can be established
as a policy. Employee recognition will be improved due to this and by
spending low cost the high intangible cost benefit can be gain through the staff
satisfaction.
The SSITI under Best Practices can be discussed as follows
Physical

Not to use unauthorized devises within the company
The management must take action to develop the employees self behaviors
within the organization. Through this the loyalty for the company will be
automatically raised among the employees. According to that the management
can convey the message to not to use unauthorized devises with the
organization.

Not to use company devises, hard or soft medias [printed medias], for personal
usage.
The internal Medias are intellectual’s property of the company. The
management must give proper awareness to employee about the value of the
intellectual properties and the legal background which is bond with intellectual
property act.
Logical

Log off the system when the relevant work is over.
It will be help to reduce bandwidth cost of the company and increases the
productivity of the company.
13

Prevention from unnecessary downloads such as films, songs, stories,
software, etc.
By implementing proxy server these kind of activities can be control and it
also help to the reduce the bandwidth cost and increase the data transition
speed through the VPN

Not to use unauthorized software within the company network.
By implementing windows group policies theses kind of activities can be
eliminated.
Human

Use Ergonomics theories while working with computes and other electronic
devises. The way how it will be applied within the company can be displayed
from the following pictures
Figure 4.0- Keyboard Handling
14
Figure 5.0- Mouse Handling
Figure 6.0 - Proper way to Sit
15
Figure 7.0 - Proper way to Sit
16
Figure 8.0 - Proper way to Sit
17
Figure 9.0 - Proper way to Adjust the Seat
Figure 9.0 - Proper way to arrange working Zone
Considering the previous IT approaches of company and by implementing proposed
IT solutions for company, the company goals can be achieved in very effective and
efficient way with cost effective manner.
18
Appendix
19
Download