...Corp Network Upgrade Garima Shah Strayer University 6.17.2014 Fiction Corp Network Upgrade Wide-IP Corp June 2014 Table of contents Executive summary Project goal Project scope Design requirements: a. Business goals b. Technical goals c. User communities and data stores d. Network applications 7. Current state of the network Logical design Physical design Results of network design testing Implementation plan with a project schedule Project budget with a return on investment calculation Design document appendix Executive summary * Move Fiction Corporation’s data center to a new, state-of-the-art data center with improved networking capabilities to provide support and service to the existing organization, retail centers and any future expansion * Ensure Network security is reviewed and improved upon * Ensure minimal or zero network downtime for existing business operations during the move Project goal * Seamless migration of the data center to the new location with minimal or zero disruption to the current business operations * Assess current security flaws and provide solutions to eliminate flaws * Quality assurance-monitor the status of remote systems and determine feasible success /failure toward seamless migration and updated network system Project scope * The scope of the project is to migrate the existing data center to a new location; to assess and eliminate current security flaws in the network ...
Words: 1353 - Pages: 6
...Remote Monitoring and Control of Environmental Variables via GSM | Group Members:Maj NasirCapt ZeeshanCapt UsamaCapt Shoaib AliProject Supervisor:Lt Col (Dr) Adil Masood | Dated : 20th March 2014 | ABSTRACT Our main goal is to create a stand-alone device to monitor and control the environmental variables in different military storage facilities. The proposed project is a compliant solution to offer a modern and interactive way to efficiently reduce man power for storage management. This report defines the scope of the project and deliverables along with the applications. Furthermore a detailed block diagram of the project is mentioned and then the design implementation is discussed. The sensing unit has been prepared and its integration with the switching unit is in progress. Detailed design, simulations and code of hardware are also mentioned in following contents. Detailed timeline is given according to which the project will be completed well in time. TABLE OF CONTENTS 1. PROJECT DESCRIPTION.....………………………………………………………………… 3 2. SCOPE…………………………….………………………………………………………….…3 3. SPECIFICATIONS……………….……………………………………………………………..3 4. DELIVERABLES……………….………………………………………………………………3 5. DETAILED DESIGN………….………………………………………………………………..4 6. TIMELINE………………………………………………………………………………………5 7. DEMONSTRATION OUTLINE….…………………………………………………………….5 8. REFERENCES…………………….…………………………………………………………….6 9. APPENDIX………………………………………………………………………………………7 ...
Words: 786 - Pages: 4
...Project Management Assignment #1 MGT5164 City of Thunder Bay/Environment Division Digital SCADA Network Project Student Name: Joe Doe PROJECT INTRODUCTION ....................................................................................................... 2 Project Name........................................................................................................................................... 2 Scope and Objectives.............................................................................................................................. 2 Major Deliverables ................................................................................................................................. 2 OUTLINE OF WORK ................................................................................................................... 3 Resources................................................................................................................................................. 3 Customer Requirements ........................................................................................................................ 3 Key Attributes......................................................................................................................................... 3 PROJECT METHODOLOGY....................................................................................................... 4 Project Manager ......................................
Words: 1268 - Pages: 6
...http://www.researchgate.net/publication/269327743 Biometric-based attendance system with remote real-time monitoring for tertiary institutions in developing countries CONFERENCE PAPER · NOVEMBER 2013 DOI: 10.1109/NIGERCON.2013.6715633 DOWNLOADS VIEWS 86 111 4 AUTHORS, INCLUDING: U. Eze Peter Federal University of Technology Owerri 3 PUBLICATIONS 0 CITATIONS SEE PROFILE Available from: U. Eze Peter Retrieved on: 19 August 2015 Biometric-based Attendance System with Remote Realtime Monitoring for Tertiary Institutions in Developing Countries Eze Peter U., Joe-Uzuegbu C. K. A, Laz Uzoechi, Opara F.K Department Of Electrical/Electronic Engineering Federal University Of Technology, Owerri, Imo State, Nigeria peter.eze@futo.edu.ng, joskie23@yahoo.co.uk, laz_okey@yahoo.com class album. The system will easily produce required reports for both lectures and examinations. For the staff, check-in by proxy needs to be eliminated and there should be a way of monitoring and automatically appraising the staff based on check-in/out time for each working day. Remote monitoring is allowed for managers because they may have travelled out of the four walls of the institution but still needs to know what is happening in real time. Remote check-in/out is NOT allowed. One has to be within the campus in order to check-in/out of the system. However, remote monitoring is allowed for personnel in the management level. Biometrics ensures physical presence...
Words: 3263 - Pages: 14
...controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. This new strategy guide for Bloom Design Group provides a comprehensive strategy for providing a safe and secure work environment. Several new policies and procedures will be implemented as a result of these new ideas. Bloom Design Group will have little trouble in adhering to the promised plan based on the their assets and experienced personnel. The goals implemented will include new user accounts and access policies and controls. These goals will allow for monitoring for all persons using the network and view all...
Words: 3916 - Pages: 16
...to the primary datacenter is required, the remote site would host its own Email Server, manage its own backups, control its own Internet access, and host its own Shared Files. Application access may still rely on HQ, although many applications support this type of distributed model. The benefit of a Distributed model is that each site can ‘survive’ on its own. There is no Single Point of Failure in this regard. Also, assuming that the hardware in some of the sites is stored in a secure Server Room, this also would potentially facilitate Business Continuity by utilizing Sites that reference each other as contingency Sites. When designing distributed systems it is said that the following assumptions should be considered false: 1. The network is reliable. 2. Latency is zero. 3. Bandwidth is infinite. 4. The network is secure. 5. Topology doesn’t change. 6. There is one administrator. 7. Transport cost is zero. 8. The network is homogeneous By challenging each of these assumptions and looking at the system design within that context it can help identify potential risk areas. Systems that exhibit the key principles, like reliability and availability, have designs that take each of these fallacies into consideration. When it comes to failures, most fall into one of two buckets: hardware or software related. Hardware failures used to be more common, but with all of the recent innovations in hardware design and manufacturing they tend to be fewer and...
Words: 931 - Pages: 4
...Physical Security Table of Contents INTRODUCTION III ELEMENTS AND DESIGN III EXAMPLES OF PHYSICAL SECURITY III PHYSICAL SECURITY ELECTRONIC ACCESS III CASINOS AND GAMING III EDUCATION III TRANSPORTATION III Goggle Search iii Dictionary Search iii Introduction This paper examines Physical Security from the perspective of perimeter such as gates/guards, building access controls, room access controls, enforcement options, auditing approaches, risk determination for physical attack vectors, etc. Physical Security describes measures that prevent and/or deter attackers from accessing a facility, resource, or information stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers of armed guardposts. In the Global world, Physical Security is the most common mechanisms for access control on doors and security containers. They are found in the vast majority of residences, commercial businesses, educational institutions, and government facilities, and often serve as the primary protection against intrusion and theft. Elements and design The field of security engineering has identified three elements to physical security: 1. obstacles, to frustrate trivial attackers and delay serious ones; 2. alarms, security lighting, security guard patrols and closed-circuit television cameras, to make it likely that attacks will be noticed; and 3. security response, to repel, catch or frustrate attackers when an attack is...
Words: 2139 - Pages: 9
...Chapter 8: Local Area Networks: Software and Support Systems TRUE/FALSE 1. Network operating systems are essential if the network is going to allow multiple users to share resources. ANS: T 2. Users cannot interact directly with the operating system through a shell. ANS: F 3. In reality, a multitasking operating system runs only one program at a time. ANS: T 4. The resources that a network operating system must manage typically include one or more network servers. ANS: T 5. A network operating system does not perform network support functions. ANS: F 6. Microsoft Windows 7 is an example of a desktop operating system. ANS: T 7. NetWare 6 was the last version of Novell’s network operating system. ANS: T 8. A bindery contains the data that pertains only to the server it resides in. ANS: T 9. The design of a tree should ideally be similar to a pyramid. ANS: T 10. NetWare 5 dropped the NDS distributed database of network resources. ANS: F 11. Windows 2008 Server is a network operating system designed to run over a network of microcomputer workstations and provide file sharing and peripheral sharing. ANS: T 12. It is not possible to create a network with multiple domains. ANS: F 13. Unlike NetWare’s NDS, Active Directory creates a hierarchical structure of resources. ANS: F 14. Unix is most often found with a text-based interface, although graphical user interfaces are available...
Words: 3578 - Pages: 15
...Industrial Networks Instructor: Andrew Cornell Bentek Technical Paper Prepared by: David Klutts Submission Date: October 25 , 2013 Bentek Systems provides complete remote monitoring solutions for environmental applications in Oil & Gas, Mining, Petrochemical, Manufacturing and Water industries. Bentek Systems' Scope of Supply includes System Design, Systems Integration, Equipment Supply, Installation and Field Services. Bentek Systems offers SCADA Hosting service for industrial application. With over 20 years of experience and expertise in SCADA systems and industrial applications, our clients can be confident in our Hosted SCADA solution. Bentek Systems have a range of SCADA host software that provides local plant site monitoring to enterprise-wide SCADA Systems for the Oil & Gas, Water and Environment Industry. We use NetSCADA,which is a a Client-Server SCADA host software, which enables clients to login securely to monitor their remote sites by viewing data through Monitoring, Alarming, Historical Trending & Reporting graphical screens. The SCADALink SAT100 is a flexible low power satellite SCADA device that provides Modem, RTU, and Alarm Callout in a single device. It is designed for remote SCADA communications and monitoring to RS232/RS485 serial devices such as Flow Computers, RTU, PLC, Smart Transmitters and Power Meters inaccessible by terrestial communications. The SAT100's low power draw makes it an ideal solution for many remote SCADA applications...
Words: 588 - Pages: 3
...Project 2.1 Project Overview 2.2 Project Functions 2.3 User Characteristics 2.4 Constraints to Project Development and Implementation 2.5 Assumptions and Dependencies 3. Specific Requirements of Physician Office System 3.1 Functional Requirements of Physician Digital Record System 3.2 Non- Functional Requirements of Physician Digital Record System 3.3 Physician Digital Record System Performance 3.4 Logical Database Requirements 3.5 Design Constraints 4. Specific Requirements of Hospital System 4.1 Functional Requirements of Hospital Digital Record System 4.2 Non- Functional Requirements of Hospital Digital Record System 4.3 Hospital Digital Record System Performance 4.4 Logical Database Requirements 4.5 Design Constraints 5. Specific Requirements of Real-time Patient Monitoring System 5.1 Functional...
Words: 4207 - Pages: 17
...Mission • Strategy MANAGED SERVICES PROCESSES • Assessments. Design Services Support. Managed Print Services. Managed Client Services • Managed Network Services. Service Desk. Hosting. Monitoring. Remote Access . Onsite Services • Update Infrastructure Review SBU MISSION AND STRATEGY • Management • SBU Process • SBU Selection Criteria IMPLICATIONS AND ANTICIPATION • Research and Development • Competition I INTRODUCTION Industry Profile eBryIT is an information technology (IT) company that provides solutions, services, and support to companies throughout the United States. eBryIT was first established back in 1990 and was named Benchmark Maintenance Corporation. Before the company became known as eBryIT it also went by another name which was BMC Solutions, but the companies’ main focus has always been on IT solutions for businesses. The company started out with just three employees but has grown to 130 direct staff with an average contractor pool of more than 5,000 and this growth has came primarily in the past 10 years in the companies over 20 years of existence. During this period of growth the company has shown a strong performance and profitability. Business Specialization As stated previously at eBryIT we provide solutions, services, and support for companies which range from small to large throughout the United States. We offer managed services offerings that entail assessments, design services support, managed print services, managed client...
Words: 2484 - Pages: 10
...Infrastructure Planning and Design Dynamic Datacenter Version 1.2 Published: April 2010 Updated: November 2011 For the latest information, please see www.microsoft.com/ipd Copyright © 2011 Microsoft Corporation. All rights reserved. Complying with the applicable copyright laws is your responsibility. By using or providing feedback on this documentation, you agree to the license agreement below. If you are using this documentation solely for non-commercial purposes internally within YOUR company or organization, then this documentation is licensed to you under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS". Your use of the documentation cannot be understood as substituting for customized service and information that might be developed by Microsoft Corporation for a particular user based upon that user’s particular environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM. Microsoft may have patents, patent applications, trademarks...
Words: 15668 - Pages: 63
...Week 3 Lab - Assessment Worksheet Design Your DMZ and LAN-to-WAN Security Solution Overview This lab will demonstrate how to properly design a LAN-to-WAN DMZ given functional and technical business requirements. Students will transform the design requirements into a block diagram design of a DMZ with LAN-to-WAN security appliances. Lab Assessment Questions & Answers 1. Describe how creating zones is helpful in the design of a DMZ and security solution for the LAN-to-WAN Domain. The purpose of a DMZ is to add an additional layer of security to an organization's local area network. an external attacker only has direct access to equipment in the DMZ, rather than any other part of the network 2. How many zones does your design incorporate? Do you think an additional zone may be needed if the e-commerce server was implemented? Explain why or why not. 2 zones, I would implement a zone due to the costly nature of the e-commerce server I would want the added sevurity. 3. While supporting IP-SEC VPNs provides a secure, remote-access solution for mobile employees, it does not scale and requires stringent security operations and management procedures. What alternatives would you recommend for a scalable remote-access VPN solution for your design? SSL because almost all web browsers support ssl it provides extra security without any additional software needed 4. As per the functional and technical requirements, where must you...
Words: 582 - Pages: 3
...Executive Summary The Toy Company has requested an upgrade of their network system. The current system has over ten old Windows 95 Operating System desktops with MS Office 95 products. The office employees use the network to send e-mail, access the Internet, make the payroll, accounting, scheduling receiving and delivering, invoicing, human resources tasks, and an outdated inventory System. The manufacturing side of the operation has a legacy network managing a classic robotics system. Every part of this system is obsolete, and the vendors went out of business, eliminating the possibility of support. The only IT person at the manufacturing facility may be an expert on keeping this old system running, but they do not have any experience with new technology. Needless to say, the system is slow and when a problem arise the downtime can go on for hours and sometimes even days at a time. The Toy Factory management wants to address these issues through an upgrade to their system, but they are also looking to positively affect productivity and improve security of the network overall. The proposed network will require significant changes to The Toy Factory's systems. The current hardware is in dire need of an upgrade, which will be implemented with the new physical network architecture. The implementation of this new architecture will provide higher speeds, reliability, and easier maintenance of network (Dennis, 2009). The upgraded hardware will come with better software that will...
Words: 3448 - Pages: 14
...Table of Contents INTRODUCTION 2 DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3 AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3 INSTALLING AND AUTHORIZING A DHCP SERVER 4 CREATING AND CONFIGURATION OF DHCP SCOPES 8 CREATING AND TESTING DHCP CLIENT RESERVATIONS 10 IMPLEMENTING DHCP RELAY AGENTS 12 DOMAIN NAMING STRATEGY 16 DOMAIN NAME SERVICE INSTALLATION 17 DOMAIN NAME SERVICE LOOK UP ZONES 18 ZONE AUTHORITY DELEGATION 23 DNS DYNAMIC UPDATES 25 DNS RESOURCE RECORDS 25 NETBIOS NAME RESOLUTION 27 INSTALLATION OF WINS 27 STATIC WINS RECORD 28 CONFIGURING REPLICATION PARTNERS 30 ALTERNATIVE IP ADDRESSING STRATEGY 31 ALTERNATE NAME RESOLUTION TECHNIQUES 32 NETWORK PLAN FOR THE UWS GLASGOW SITE 32 NETWORK PLAN FOR THE UWS CLYDE SITE 33 NETWORK PLAN FOR THE UWS HEAD OFFICE SITE 33 OVERVIEW OF THE UWS NETWORK INFRASTRUCTURE AS A WHOLE 34 TROUBLESHOOTING STRATEGY FOR UWS NETWORK 34 BACK UP AND FAULT TOLERANCE STRATEGY FOR NETWORK SERVICES 38 NETWORK HEALTH MONITORING AND ANALYSES 38 CONNECTIVITY SOLUTIONS FOR MULTI-VENDOR -ENVIRONMENT 40 REMOTE CONNECTIVITY TO UWS NETWORK USING VPN 41 CONFIGURING INBOUND VPN CONNECTION 41 CONFIGURING REMOTE ACCESS POLICIES 45 CONFIGURING OUTBOUND VPN CONNECTION 48 NETWORK COUNTERACTIVE APPROACHES WITH REGARDS TO SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company...
Words: 5792 - Pages: 24