Vous êtes sur la page 1sur 28

WESTERN GOVERNORS UNIVERSITY

Submittal Cover Sheet

Date: 12/15/2010
Student Name:
Student ID Number:
Student Degree Program: BSIT
Student Email:
Four Digit Assessment/Project Code: TWA1
Mentor Name: Laura Creamer / Les Vance
For Revisions Only Indicate Previous Grader:

Submissions received with an altered, incomplete or


missing cover sheet will be returned for resubmission.
Submit to:
Western Governors University
Attn.: Assessment Delivery Department
4001 South 700 East, Suite 700
Salt Lake City, Utah 84107-2533

Technical Writing Project Cover Sheet

Capstone Proposal Project Name: Proposal for Small Business Network Design Upgrade

Student Name:

Degree Program:

Mentor Name: Laura Creamer / Les Vance

Signature Block
Students Signature

Mentors Signature

Table of Contents

Capstone Proposal Summary ........................................................................................................................ 1


Review of Other Work .................................................................................................................................. 3
Rationale and Systems Analysis .................................................................................................................... 5
Goals and Objectives..................................................................................................................................... 8
Project Deliverables .................................................................................................................................... 13
Project Plan and Timelines.......................................................................................................................... 19
References .................................................................................................................................................. 23
Appendix 1: Competency Matrix ................................................................................................................ 24

Page 1

Capstone Proposal Summary

Most small businesses today understand the need for a modern and efficient computer network
to maximize their bottom line. Others, however, continue to putter along utilizing outdated systems that
slow employee productivity and sharpen customer frustration.

is a small business in

California with 87 employees, working with a network that was current in 1998 but is quite
archaic in 2010. Upper management finds it lacking in many areas and the companys users feel the
whole system is extremely slow overall. As a former employee and current computer network
consultant, the company asked me to put together a formal proposal for a comprehensive company
network upgrade.
In preparation for this proposal, I researched the companys current hardware, software,
network and storage. I conducted this inventory in order to determine what was not working for their
needs and would need subsequent replacement. Not surprising, what I found was a system full of
inefficient equipment, which functioned to a point, but was much slower than was necessary for a
productive staff. As an advocate of using systems that are still useful, I spent a little more time trying to
tag any pieces of their network that I could salvage for a new system. Unfortunately, there was little to
save, which would not hamper productivity.
Next, after ascertaining the current systems physical characteristics, I began conducting
interviews with relevant employees such as the production manager, sales manager and the senior
product designer. These individuals had expressed a need for additional criteria for a new system. The
sales manager wanted to insure all of his sales staff had bigger flat-screen monitors and faster internet
access speeds for working with clients. The senior product designer also wanted an oversize monitor, in
addition to making sure her new computers specs met or exceeded the recommended specs for all of

Page 2
her new design software. The production manager felt his existing production terminal systems were
just fine for what he used them for, but wanted to eliminate any internet access on the machines.
With upper management signing off on the additional requirements, I then began to study
server software solutions, cabling options and switch/network card options as well as hardware options.
These options were:

Server OS Microsoft Server 2008 vs. Red Hat Enterprise Linux Server
Network cabling Cat5e vs. Cat6
Switches and Network Cards 100BASE-T vs. Gigabit

Over the years, Microsoft server software and its corresponding hardware was my server of choice in
setting up any network for any client, but this client expressed that I present at least two system
options. Since I had little experience with any Linux system, I began research on the Red Hat Linux
Enterprise Server as a second option. I also researched options for cabling, switches and network cards.
After conducting my research, I compiled a parts list. From this list, I worked with my hardware
and software vendors on costs to write up an estimate for the network upgrade. This estimate will
include an ROI projection and recapture timeframe as well as a timeline for implementation of the
network complete with employee training.
The goal of this project is to create a new network that meets or exceeds all customer
expectations within a defined budget and timeframe. Deliverables will include new desktop computers
and monitors, a main login server, switches, network cards, updated software and formal training. The
new system will provide

with real business benefits. They will see a tangible difference

in network speed and security, employee productivity, customer and employee satisfaction and upper
management reporting options. They will see that this new system makes complete business sense.

Page 3

Review of Other Work

For this proposal, I was already very familiar with most of the projects options; however, a
Linux server-based option was not one of them. In looking for a workable Linux server system, I read
many articles on the internet regarding available options. Www.Linux.com had a direct comparison of
systems. In this article, they felt the Red Hat Enterprise Server (RHEL) was the best contender.
Best Linux Enterprise Server
Again, in this category it really comes down to two main contenders: Red Hat Enterprise Linux
(RHEL) and SUSE Linux Enterprise Server (SLES). Given the pick for the Enterprise Desktop
category, you might expect SLES to get the "best of" label here.
But, when all factors for the enterprise server are weighed, RHEL is still the king of this particular
hill.

Red Hat edges out Novell with its server product, because RHEL users get a deeply mature
distribution, and Red Hat's support structure is second to none in the enterprise channels
(Proffitt, 2010).

Page 4

I conferred with a few colleagues who specialized in Linux and they concurred that indeed that RHEL
would be the best choice. So with that in hand, I dug a little deeper in an attempt to quote integration
with this system into my upgrade.
The first thing I did was go to the www.redhat.com site for more information:

Features

Benefits

Optimized on highly scalable, multi-core systems, Red Hat Enterprise Linux manages the underlying
Application &

system complexity and reduces data bottlenecks so applications can perform their best.

infrastructure efficiency,

Red Hat works closely with our hardware partners and industry standard groups to enable the latest

scalability, and
reliability

hardware functionality as it becomes available. Red Hat Enterprise Linux 6 provides operating system
control for platforms to have enhanced system power management, and end-to-end data integrity.

Scaling with Red Hat Enterprise Linux 6 (pdf)

Red Hat Enterprise Linux: Application Compatibility Specification (pdf)

Unprecedented resource
Administrators and application developers can set policies by process, applications, and even guests to
management

match network, memory, and cpu usage to business needs and service-level agreements.

Red Hat Enterprise Linux provides a complete security stack from network firewall control to secure
containers for application isolation that has made Red Hat Enterprise Linux one of the most certified
operating systems available.
Integral security
As a host, a guest, or in the cloud, applications can be secured with a common and comprehensive suite
of technologies and policies - backed by Red Hat's global Security Response Team.

Stable application
development and
production platform

Security Technologies in Red Hat Enterprise Linux

Develop and deploy with confidence knowing that all the packages shipped with Red Hat Enterprise Linux
are supported and maintained. In addition to the LAMP stack, the application development portfolio
includes scripting languages such as PHP, the TurboGears2 framework, the Eclipse IDE, and
debugging/tuning tools. Not only is deployment easy, but architects can use advanced caching
technologies to scale as needed without additional complexity.
Red Hat Enterprise Linux provides comprehensive application support across cloud services, middleware,

Page 5

web applications, and enterprise applications.

Your Web Applications

Red Hat Enterprise Linux is designed to be both a superior virtualization host and guest on any of the
Integrated virtualization

major hypervisors. With virtualization incorporated into the kernel, the complete breadth of system
management, security tools, and certifications are available for your administrators to use.

Red Hat Enterprise Linux 6 Consolidation (pdf)

Red Hat provides two categories of control for datacenter operations. Our Smart Management Add-On
Enterprise

and Red Hat Network Satellite servers centralize and automate common management functions so
datacenters can scale systems without burdening staff.

manageability
Red Hat also packages the platform in system administer-friendly packages that allow the tailoring of
installations to application needs.

(RHEL, 2010)
According to the website information and the RHEL installation guides, this server could meet my needs.
However, I decided to do further research.
In looking at a variety of other sites, I discovered the deep divisions in opinions regarding Linux
vs. Microsoft server solutions. It seems that for every expert that lauds the virtues of Linux, there is
another expert doing the same for Microsoft, while at the same time they each bash the other. I know
each system has its pluses and minuses like most things, but the question remained could I propose a
Linux system as an option? There is no doubt I could, but could I do it within a tight timeframe and
under budget, with my unfamiliarity with the system? To be honest, I am sure the answer is no and will
have to inform the company I will only be able to offer a Microsoft solution given their criteria.

Rationale and Systems Analysis

Page 6
When approaching any project, it is always prudent to understand the existing system in place
as well as to determine the reasons for undertaking the project in the first place. The process starts with
asking the principles relevant questions, then mapping out the current system to determine what
changes must occur to meet their needs satisfactorily. For example, is the existing system inadequate in
whole or only in part, and if changes are made, then what are the business benefits of these changes?
Each business has a wide variety of needs and you can never assume you understand what a company
needs without asking the appropriate questions. In other words, you have to conduct a comprehensive
systems analysis and client interview before proposing any changes.
The first thing I did was schedule an appointment with the owner and COO of
to find out what they liked and disliked in their current system as well as what they were looking to
accomplish with an upgraded system. As it turned out, they liked very little about their existing setup. In
fact, they brought up a variety of complaints:
1. The computer system runs so slowly that the owner, the COO and all the employees
complained about it to each other constantly.
2. Customers often wonder aloud why the system takes so long to show them design options
via the internet as well as to give them any kind of quote.
3.

All of their computers show signs of viruses, spyware and malware.

4. Network security is lax. Everyone has access to any computer at any time (the company has
one standard user and password for every computer except for the owner and COO). There
is no central logging to show management who is doing what and when.
5. They are scared of losing all of their data, as they have no disaster recovery process in place.
Next, I held a meeting with several key employees to round out the feedback from management. From
these meetings I put together a descent picture of what they were looking for in an upgraded system.

Page 7
Concisely, they want a system that is faster, more secure, more efficient and safer than their current
one.
After gaining an understanding of what the company was trying to accomplish with a network
upgrade, I then began an inspection of the existing company network to determine its architecture.
From this inspection, I found their current system to be a simple peer-to-peer network, with 34 desktop
computers and no main login server. This examination exposed the first problem with the network.
While peer-to-peer networks are less expensive from a cost standpoint, networks with more than 10
desktops or so begin to show a significant degradation in network speed. Further, I discovered the
physical connection topology of the network utilized CAT5 cabling and 10BASE-T switches/network
adapters. This exposed problem number two. CAT5 cabling and 10BASE-T network adapters both
operate at 10mbps, which is excessively slow by todays standards. Further, all of the desktop
computers wired directly into one of two 10BASE-T switches, continuing the problem. A wired Linksys
router connects the switches to the companys T1 modem to round out the intranets access to the
outside world. All IP4 addressing in the network is strictly static using a conventional internal network
range of 192.168.1.100 192.168.1.200 and 255.255.255.0 subnet. The network also contains one Linux
application server that holds their proprietary design and accounting software. A tape backup system is
also in place for backing up this application server.
All of the company desktops use either Windows 98 or Window XP operating systems. Each
machine running Windows XP has the same hardware specification: 1800mhz Pentium 4 cpu, 128K ram,
16mb video card and 14 analog monitor. Each machine running Windows 98 is only used to log in
various production activities and print Identification product labels. These machines run a 200 mhz
Pentium cpu with 64K ram, 4mb video card and 13 amber monitor. The company architecture also
includes 12 Brother laser printers, an HP scanner and 2 thermal label printers.

Page 8
With a mapping of the overall structure of the companys topology in hand, I then turned to
examining a number of the desktops more closely. I examined only five machines to get an average
picture since they were all built much the same. Each machine had a 16 gig hard drive with almost 0
remaining space available; none had been cleaned out of undeleted temporary files, been
defragmented or had a backup in at least 4 years. In addition, each had Windows Word 97 as a standard
word processing program, but none had any virus, spam or spyware prevention programs. However, I
did find 20+ user-added programs that were unauthorized according to the owner. .
In the final analysis, it is obvious that this company can benefit some by simply conducting more
due diligence on maintaining the existing computers by erasing temporary files, removing the
unauthorized programs, defragmenting the drive and setting up scheduled backups of each computers
data files. They can improve even more with cable and network hardware replacements. However, is
that enough? Unfortunately, the answer is no. There are just too many problems those measures do not
address. A full systems upgrade is the necessary option.

Goals and Objectives

This project contains 11 main goals and objectives, including:

Create a faster and more efficient network

Upgrade all existing inefficient computer hardware and software

Install new user productivity software

Design and install a new designer station

Establish tools to generate reports on user and systems usage

Install portal virus and malware software

Page 9

Set up remote access for management and outside sales employees

Develop a backup and disaster recovery plan

Remove and recycle all replaced equipment

Provide appropriate employee training in the new system

Meet project budget and exceed customer expectations.

The business success of this project hinges on achieving these important goals and objectives. They
represent the scope of the project and provide a blueprint for a satisfying conclusion.
The most important upgrade management is asking for is a network-wide increase in speed and
efficiency. How is this important? Let us say you are a customer at a grocery store and there are
several customers with full shopping carts in front of you waiting to check out. Further, let us say that
the grocery store has technology in place that makes the sales clerk input a code by hand for each item
purchased. As you might imagine, you would be in that line a very long time. Now what if right across
the street there was another grocery store with similar pricing, but they offer a faster checkout system
where the clerk enters each item purchased automatically via flatbed infrared scanner. Compared
head to head, if the customer in the store with the scanner lives close by, then they are likely to be
able to check out, get into their car and be at home by the time the non-scanner customer even gets
out of the store. A faster system brings greater efficiency. Employees will be happier; customers will
be happier. Moreover, if faster technology gives a business an advantage over its competitors, then
that companys management and ownership are going to be happy.
The main technique to getting increased speed for

is to upgrade their existing

hardware and software. Circuit boards are the main component of any hardware in a computer
network. According to Moores Law, the number of transistors that can be placed inexpensively on
an integrated circuit has doubled approximately every two years. The trend has continued for more

Page 10
than half a century (Wikipedia, 2010). Since the company has not upgraded their system in 12 years,
that means new circuit boards now hold roughly 64 times more transistors than those in the
companys current system. That simply means that todays computers run so much faster than the
companys current system that there is no comparison in performance. However, does that mean
productivity will be 64 times better than it was with a simple hardware upgrade? Not as long as there
is a human element in the equation, but upgrading the software will help considerably. Software is
symbiotic with hardware in producing better performance. Software upgrades, while not advancing to
the degree of circuit boards, do make processes faster, easier and more automatic.
In upgrading the software for this company, there are many types to consider. First, depending
on what new hardware I install, new operating systems need to take advantage of the increase in
hardware performance and new software should provide increased productivity over outdated suites
such as Word 97. Additionally, software to keep calendars and better manage emails would
immediately enhance workers organizational and communication skills. The senior product designer
asked for and will need new design software that had been available on the market for years.
Moreover, she knows competitor employees in her position are working with the software right now.
Consequently, she produces inferior product designs that take her longer to produce.
A new modern design station is a critical part of the new setup. It has to contain a desktop
machine that is fast and holds a lot of RAM. The monitor attached has to be at least a large 28+ LCD
monitor running off a video card with a lot of memory and color match tuning. Hard drives have to be
set up as a raid system with a very large storage capacity to hold a large number of high-resolution
designs. The design stations main function is to show clients new and exciting art designs. For
accessories, it needs a digital writing tablet, large-format flatbed scanner, mid-range priced six-color
printer and digital projector. Customers often complain to the senior designer that they are frustrated
at how long it takes to render designs onscreen and the old CRT screen never shows any of the colors

Page 11
in the designs accurately. Consequently, when they pick supporting mats and framing for the designs,
the art simply comes out different and does not have the impact desired of the overall design.
The next goal is to provide management with better reporting tools for their system. They have
no answers to the many questions which most modernized corporations have access. How many hours
are lost to unauthorized employee internet usage? Who is accessing the network, when are they
accessing it and what are they accessing? If there are errors on the system and no one knows, are they
really happening? Of course, but no one will know it until information leaks out or some insidious
software leaks in and devours irreplaceable data. However, by then, it is entirely too late. Reports and
tools to track these things and many others are not only nice to have, but are essential to the
maintenance and security of todays computer systems.
When I initially examined some the existing desktop systems, I found a variety of malware
present on each system. One had an outdated version of Norton, but the rest had no protection at all.
There are two types of security for viruses, spyware and other types of malware desktop or portal.
Each desktop can have security software like Norton or McAfee suites installed on them. The updating
of these desktop versions works very well but is laborious to maintain for each machine. Portal
malware security is a better option for larger organizations as it scans and screens incoming and
outgoing data at the packet level looking for digital trouble. Moreover, since it is a single portal and
only in one physical position, it is much easier to maintain and manage. Many organizations decide to
utilize a little of both. For example, even if you use a portal malware system you may still use desktop
versions of virus software on sensitive desktops for added security.
Someone once said that the only way to secure yourself from outside digital influences was not
to connect your system to the internet and plug all of your ports to allow zero outside access. In
todays business environment, that is far from advisable. What if you have remote employees such as
salespeople, who need access to internal network resources when they are not physically on site? It is

Page 12
not practical to deny them access if they connect with a secure connection. The company has several
employees that require this access, so VPN tunneling will need to be set up for these employees. This
will help nullify unauthorized external access to the LAN.
Precautions are necessary to maintaining your network, nevertheless, what if something still
goes wrong. Is there a system in place to restore lost data or restore systems that go offline? Currently,
the company has only a single backup system established for their Linux server, which contains their
design and accounting software. This solution does nothing if crucial one-of-a-kind proprietary designs
on someones desktop are lost because of a hard disk crash or other hardware or software failure. A
new backup and disaster recovery plan is necessary to maintain business continuity and retain valued
digital assets.
When you have in with the new, you inevitably have out with the old, which in this case
constitutes physical hardware disposal. In todays green world of recycling, no company or contractor
should simply toss in the trash any computer network components that hold hazardous materials.
GENERALLY, ELECTRONIC WASTE IS CLASSIFIED AS HAZARDOUS IF IT CONTAINS COMPONENTS
THAT ARE TOXIC (POISONOUS), IGNITABLE/COMBUSTIBLE, CORROSIVE, OR REACTIVE. MOST
ELECTRONIC DEVICES CONTAIN HEAVY METALS, SUCH AS LEAD. IF THE HAZARDOUS
COMPONENTS GET INTO LANDFILLS, THE HAZARDOUS SUBSTANCES CAN THEN GET INTO THE
SOIL AND PERHAPS SEEP INTO THE GROUNDWATER. (Shinder, 2008)
Types of hazardous materials include most old circuit boards, batteries and CRT screens. The company
has requested appropriate disposal and an appropriate recycling of all discarded hazardous material.
An authorized vendor will be secured.
Upon conclusion of the project, my goal is to provide complete employee training on the new
system. Just because there is, a new system in place does not mean anyone knows how to use it. It is
only possible to increase productivity on new systems through training. Desktop users need to know

Page 13
how to do their jobs better using their new desktop equipment. Management needs to know how to
access the report information and understand what the reports mean in order to act on them. There
will need to be additional training in some of the specific design software for the Senior Designer, but
that is outside the scope of my abilities. I will accomplish training verbally augmented by a written
instruction manual for management and one for all other users.
Lastly, a primary goal of any professional should be to conclude the project on or under the
established budget while attempting to meet or exceed project expectations of the principle
stakeholders. This may sound like a simple concept, but it usually is far from it. Scope creep is a
notorious culprit for this and must be controlled with due diligence. This company established an
upper budget range for the project with complex criteria for accomplishing their upgrade. My
objective is to build a system that meets all of their requirements.

Project Deliverables

There are several project deliverables for this project, broken down by hardware, software and
training. Hardware deliverables consist of a new server, new network hardware, new cabling, a new
network attached server, and new desktop computers and monitors. Software deliverables will include a
server operating system, desktop operating systems, design software and productivity software.
Training deliverables will be both in verbal and written formats.
The first major piece of hardware is the nerve center of the network the main network login
server. This server needs to be fast, secure and contain enough ram and hard disk space to handle the
companys workload. Given this criteria, I selected a Dell T110 PowerEdge Server with the following
specifications:

Processor Intel Xeon X3430, 2.4 GHz, 8M Cache, Turbo

Page 14

Memory 8GB Memory (2x4GB), 1333MHz, Dual Ranked UDIMM

Operating System Windows Server2008SP2, Standard x64,With Hyper-V

OS Client Access Licenses of Windows Server 2008 Device CALs

Hard Drive Configuration Onboard SATA,4 Hard Drives connected to onbaord SATA
Controller -RAID

Network Adapter Intel Gigabit ET Dual Port NIC, PCIe-4

4 Hard Drives 2TB 7.2K RPM SATA 3.5in Cabled Hard Drive

This configuration will easily accommodate a small business network and meets the configuration specs
for most any server operating system.
The next pieces of hardware consist of user desktop computers. There is a wide range of options
for desktop computers, from stripped down versions with little resources to high-end gaming machines
with advanced graphic cards. However, for the purposes of this project, I chose a mid-range machine
with adequate resources to work with clients and show high-end graphics 35 Dell Inspiron 560 Desktop
Computers with 21.5 HD Flat Widescreen LCD Monitors. Each unit has the following specifications:

Intel Pentium dual-core E5700(3.0GHz,2MB L2,800MHz) Processor

Gigabit Ethernet Card

Windows 7 64bit Professional OS

3GB DDR3 SDRAM - 3 DIMMs

Integrated Intel GMA X4500 Graphics Video Card

16X DVD+/-RW Drive

500GB Serial ATA Hard Drive (7200RPM) w/DataBurst Cache

Tape backup drive

Page 15
These specs should be just high enough to allow some future expansion, especially with the hard drive
storage capacity.
However, a new server and new desktop computers are not going to make the network faster all
on their own. Accomplishing this speed upgrade requires an update to the network topology of cables
and switches as well. First, I will replace the existing 10Base-T switches with Cisco Gigabit 24 port
switches. Next, the entire network of CAT5 cabling will upgrade to CAT6 cabling. This will complete a full
Gigabit network and, in theory, increase the data flow across the network theoretically 100 times its
previous flow.
So now, we have an excellent data flow to the switches, but what about the connection to the
outside world. The companys WAN connection consists of a T1 modem, which is more than adequate
for this size company. However, a bottleneck exists at the companys Linksys router; the router operates
at the same slow 10mbps speed as the existing network cards and switches. Clearly, this router needs
replacement as well. I could just upgrade it to a new Gigabit router, but an opportunity exists to replace
this equipment and introduce a new firewall/VPN malware prevention portal at the same time. I will
discuss this further when talking about software later in this section, but from a hardware standpoint,
this new unit will be a SonicWall NSA 2400 appliance:

A high-performance 2-core processor utilizes SonicWALL Reassembly-Free Deep Packet


Inspection (RFDPI) technology to scan packets in all network flows on all ports for a multitude
of threats, with virtually zero latency. And with six 10/100/1000 copper Gigabit Ethernet Ports,

Page 16
one console interface and two USB interfaces, you can configure the NSA 2400 using primary or
secondary modem or 3G wireless interfaces for future-proofed extensibility.
The NSA 2400 supports 75 site-to-site VPN tunnels, 10 Global VPN clients (250 maximum), 2 SSL
VPN NetExtender Clients (25 maximum), and 1 Virtual Assist Technician (up to 5 maximum).
(SonicWall, 2010)

The last piece of hardware will consist of a new network attached storage system complete with
a tape backup device. All critical data will be stored on this device for users to access and edit. No critical
data will be kept on local hard drives. The company has decided not to entertain a disaster recovery
system outside of doing regular tape backups and storing a weekly backup offsite.
The second major deliverable is software; the first major piece of software is a server operating
system. The operating system for this new server will be Windows Server2008SP2, Standard x64, With
Hyper-V. The server will ship with the operating system already installed. Upon arrival, the server will
be set up with several network roles including, active directory domain services (AD DS), Domain Name
Services (DNS) and Dynamic Host Configuration Protocol (DHCP). AD DS will establish a single domain to
set up for user/group management and security, providing an ability to secure resources to only those
authorized to use them. The DNS role is set up to allow for faster retrieval of domain names instead of
relying on outside servers all the time. DHCP is set up to allow desktop computers to request their IP
settings automatically instead of needing static settings.
Next, when the desktops arrive with Windows 7, they will need to be set up with Administrator
and user accounts. Administrator accounts will have secure passwords accessible to management only.
User accounts will be limited to use of authorized programs only. Internet usage will be available, but
logged. Also by management request, only the sending and receiving of email from the companys
managed offsite email server will be allowed. To access the Linux application server, custom telnet
software from the application must be set up on each desktop to connect with the server. Finally, each
desktop will have a background with the

logo.

Page 17
Productivity software comes in many forms, but the desktops all will arrive with Microsoft 2007
Office Standard Edition. This popular suite comes with Microsoft Word, Excel, Outlook and Powerpoint.
All employees could use Word and Outlook in their daily workload, while only some would use the Excel
and PowerPoint programs often. However, with individual pricing for Word and Outlook being more
than just purchasing the suite, it made no sense to buy the programs separately.
Getting back to the SonicWall portal appliance, it will function very nicely as a Gigabit router
firewall between the WAN and LAN. However, it can be so much more. Through subscriptions, gateway
anti-virus, anti-spyware, spam filtering, IP filtering and intrusion prevention services deliver intelligent,
real-time network security protection against sophisticated application layer and content-based attacks
including viruses, spyware, worms, Trojans and software vulnerabilities such as buffer overflows. This
portal based protection offers a centrally managed option and prevents having to spend hours on every
desktop computer to update malware software.
The SonicWall also comes with excellent reporting features. These reports constitute all aspects
of the portals filtering process, are customizable and emailed to any management email account
desired. These reports constitute part of the reporting management has requested. The other part will
come from the new Windows server through logging and other customized activity reports. It will allow
management to have a much better idea of what is happening on their network than before.
The last installation is strictly for the senior product designer and includes a desktop computer
with more hardware punch and design software. This machine will be the same as the others, but with
some differences video card with 1GB memory, 6 GB total motherboard memory and a bigger 28 true
color monitor. This desktop will handle many open graphics simultaneously and the extra memory will
keep it from slowing to a crawl, as a regular machine would be prone to do as more windows open up.
As requested, I will also install the Adobe Creative Suite 5 Design Premium on her desktop. It includes:

InDesign CS5 - Page layout

Page 18

Photoshop CS5 Extended - Image editing

Illustrator CS5 - Vector graphics creation

Flash Professional CS5 - Interactive content

Flash Catalyst CS5 - Integrate content with Flash

Dreamweaver CS5 - Web design

Fireworks CS5 - Web prototyping and optimization

Acrobat 9 Pro - PDF creation

Bridge CS5 - Visual media management

Device Central CS5 - Preview and test mobile content

Upper management has assured the senior designer she will receive external training for this new suite,
absolving me of any training on this machine.
Finally, I need to provide training on the new system for all employees. This includes live training
on the new desktop computers, server login procedures and basic hardware maintenance for all users.
For management, training on accessing and understanding reports is additionally important. I will also
produce a basic written manual of sorts for all the new equipment, composed mostly of manufacturer
manuals. Two weeks of phone support will be provided free of charge and a discounted rate will apply
for any onsite service for 30 days. In addition, I will present management with an ROI projection on their
investment along with system backup procedures.

Page 19

Project Plan and Timelines

Estimated
Duration

Estimated Begin
Date

Estimated End
Date

Review Project Scope

1 Day

12/1/2010

12/1/2010

Review Success Criteria

1 Day

12/2/2010

12/2/2010

Develop Communication Plan

1 Day

12/3/2010

12/3/2010

Determine Schedule

1 Day

12/6/2010

12/6/2010

Create Risk Assessment

1 Day

12/7/2010

12/7/2010

Project Kickoff Meeting with Upper


Management

1 Day

12/8/2010

12/8/2010

1 Day

12/9/2010

12/9/2010

Project Initiation

Project Planning

Design Specification

Hardware Requirements

Page 20

Software Requirements

1 Day

12/10/2010

12/10/2010

Security Requirements

1 Day

12/13/2010

12/13/2010

Network Requirements

1 Day

12/14/2010

12/14/2010

Storage Requirements

1 Day

12/15/2010

12/15/2010

Access Requirements

1 Day

12/16/2010

12/16/2010

Obtain Project Start sign-off from client

1 Day

12/17/2010

12/17/2010

Obtain Hardware and Software

3 Days

12/20/2010

12/22/2010

Configure Main Server

1 Day

12/23/2010

12/23/2010

Install Network Cabling

2 Days

12/26/2010

12/27/2010

Install Network Hardware

1 Day

12/28/2010

12/28/2010

Install Desktop Computers

3 Days

12/29/2010

12/31/2010

Install Main Design Station

1 Day

1/02/2011

01/02/2011

Build Out

Page 21

Install Backup Solutions

.5 Day

01/03/2011

01/03/2011

Install Access Controls/Configure


Remote VPN Solution

.5 Day

01/03/2011

01/03/2011

Test Hardware/Software

1 Day

01/04/2011

01/04/2011

Test Network/Network Security

1 Day

01/05/2011

01/05/2011

Test backup solution/WAN


connectivity/Access Controls

1 Day

01/06/2011

01/06/2011

Train Upper Management/Staff

1 Day

01/07/2011

01/07/2011

Review hardware requirements and


specifications, goals and objectives,
budget and maintenance contracts

1 Day

01/10/2011

01/10/2011

Physical network diagram

1 Day

01/11/2011

01/11/2011

System Manual

2 Days

01/12/2011

01/13/2011

Project Lessons learned

1 Day

01/14/2011

01/14/2011

Testing and Quality Control

Project Review

Project Closing

Page 22

Disposal of obsolete equipment

1 Day

01/15/2011

01/15/2011

For installation, this project requires a very specific timeline from the client. Every year they
close for the Christmas holidays, which this year meant a closure by mid-day on December 23, 2010 and
a reopening on January 7, 2011. All physical building and testing of the new system has to be completed
during that timeframe. Initially, I felt this timeframe would be possible by working only weekdays and no
weekends or holidays. However, in laying out all of the tasks, it became quickly apparent there would
not be enough time to complete the work without working the two Sundays during the period as well.
The estimated time for project completion is 45 days, including 35 actual workdays.

Page 23

References

Proffitt, Brian. (2010). The Top 7 Best Linux Distributions for You. Retrieved October 28, 2010, from
http://www.Linux.com/learn/docs/ldp/282996-choosing-the-best-Linux-distributions-foryou.html
Red Hat Enterprise Linux. (2010). Retrieved November 5, 2010, from
http://www.redhat.com/rhel/server/features/
SonicWall Network Security Appliance 2400. (2010). Retrieved November 24, 2010, from SonicWall
Network Security Appliance 2400 http://www.sonicwall.com/us/products/NSA_2400.html
Shinder, Deb. (2008). What IT pros should know about exposure to hazardous materials. Retrieved
November 22, 2010, from http://blogs.techrepublic.com.com/networking/?p=637
Wikipedia. (n.d.). Retrieved November 14, 2010, from http://en.wikipedia.org/wiki/Moore%27s_law

Page 24

Appendix 1: Competency Matrix

Domain/Sub-domain
Technology Management
Fundamentals

Competency
Upper division technology
management skills

Language and
Communication

Upper division language and


communication skills

Natural Science

Upper division natural science


skills

Quantitative Literacy

Upper division quantitative


literacy skills

Reasoning and Problem


Solving

Upper division reasoning and


problem solving skills

Principles of Management
Organizational Behavior
and Leadership

Upper division principles of


management skills
Upper division organizational
behavior and leadership

Networks

Upper division network skills

Operating Systems

Upper division operating system


skills

Project Management

Upper division project


management skills

Explanation
Recommended appropriate tools,
diagnostic procedures, preventive
maintenance and troubleshooting
techniques for personal computer
components in a desktop system
Presented information to an
audience using effective
communication strategies
Analyzed the components,
organization, interactions, and
processes of ecosystems
Constructed reasonable quantitative
arguments, reasons deductively and
inductively, solved quantitative
problems using a variety of
techniques, and determined whether
a given argument has logical flaws
Logically brought together
information to arrive at a viable
solution to a problem, and then
clearly and accurately communicated
the results
Responded appropriately to diversity
issues in the workplace
Analyzed the culture within an
organization to determine how to
work effectively within that
organization
Differentiated and
installed/configured network devices.
Installed, configured, and updated
computer operating systems;
determined and fixed postinstallation issues
Implemented, controlled, and
coordinated projects according to

Page 25

Network Security

Upper division network security


skills

Web Systems and


Technologies

Upper division web system and


technology skills

project plans
Identified security needs and
recommended appropriate security
practices for network infrastructures.
Identified suspicious network activity
and selected the appropriate strategy
to counter it.

Vous aimerez peut-être aussi