...CNS Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications...
Words: 7795 - Pages: 32
...Integrating Wireless Sensor Networks with the Web Walter Colitti Vrije Universiteit Brussel - ETRO Pleinlaan 2, 1050 Brussels +32 2 629 10 27 Kris Steenhaut Vrije Universiteit Brussel - ETRO Pleinlaan 2, 1050 Brussels +32 2 629 29 76 Niccolò De Caro Vrije Universiteit Brussel - ETRO University of Perugia - DIEI +32 2 629 10 27 wcolitti@etro.vub.ac.be ksteenha@etro.vub.ac.be ndecaro@etro.vub.ac.be ABSTRACT IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) has accelerated the integration of Wireless Sensor Networks (WSNs) and smart objects with the Internet. At the same time, the Constrained Application Protocol (CoAP) has made it possible to provide resource constrained devices with RESTful web service functionalities and consequently to integrate WSNs and smart objects with the Web. The use of Web services on top of IP based WSNs facilitates the software reusability and reduces the complexity of the application development. This work focuses on RESTful WSNs. It describes CoAP, highlights the main differences with HTTP and reports the results of a simple experiment showing the benefits of CoAP in terms of power consumption compared to HTTP. The paper also describes the design and development of an end-to-end IP based architecture integrating a CoAP over 6LowPAN Contiki based WSN with an HTTP over IP based application. The application allows a user to access WSN data directly from a Web browser. The main system’s building blocks and functionalities...
Words: 4422 - Pages: 18
...functions and use of different Servers in benefitting a small web-presence business needs With the 21st century been in the digital era the use and need for technology and computers is increasing and people want everything right there in front of them with only one click away. Web servers Web servers deliver web content from anywhere in the world to your computer, they can either be software which is a computer application the aids the delivery of web content or they can be hardware so the computer itself that delivers web content. A web server works by breaking the URL down into 3 parts, the protocol (http), the server name (web address) and the file name. So your computer communicates with the server name translating it into an IP address which will connect to the desired web server, following the protocol the browser sent a request to the web server asking for the file name and text. A web server can benefit a small business as since it’s designed to run multiple applications such a messaging, databases and email. Having a server makes it easier for your employees to communicate and share data. Due to the server being able to store images, documents etc. It can be used as a hub for sharing information with colleagues, with being able to access the server from anywhere in the world. Most servers are...
Words: 1535 - Pages: 7
...the selling and buying of goods and services is being done n online. That is why Tony chips should also have a website where it can be able to advertize its business and reach many customers. This paper will cover the steps and requirements on how Tony chips will transfer web hosting from an external source to internal as well as how to make their website redundant. In the efforts to build that redundant and scalable website, the key principles of availability, performance, reliability, scalability, manageability and cost require much attention (Matsudaira, 2012). Also, the SDLC must be duly followed as it is the requirement of any system. These are systems planning, system analysis, system design, system implementation, and lastly system support/security (Shelly & Rosenblatt, 2012). System Planning In this phase, the familiarization of the processes involved and objectives of the business must be well highlighted. A formal business plan needs to be in place to show which operations the company will undertake. There is a need to know all participants in the whole migration process and the time when they will you require then in the migration process. As the one of the requirements is that the website needs to be hosting should be internal, it means that a server there is a server requirement. Besides that, the website’s redundancy needs to be planned for, and the way customers will be able to place their orders online. We require architecture in this case that allows dynamicity...
Words: 3258 - Pages: 14
...PowerEdge™ Servers Dell PowerEdge 6450 and 8450 with Microsoft® Windows® 2000 Advanced Server 1 Enterprise Systems Group (ESG) Dell White Paper 2 By Dave Jaffe and Todd Muirhead 3 dave_jaffe@dell.com 4 todd_muirhead@dell.com 5 [pic] Contents Executive Summary 3 Introduction 4 Solution Overview 6 The Database Servers 8 The Hardware 8 The Software 9 The Application Servers 11 The Hardware 11 The Software 11 Migrating the Application 13 The Tests 15 Conclusions 17 Acknowledgements 18 Bibliography 19 Appendix A : Baseball Database Organization 20 Database Tables 20 Master 20 Teammaster 20 Batting 21 Pitching 21 Fielding 22 Sample Query 22 Figure 1: The Dell and Sun Solution Implementations 6 Table 1: Database Server Comparison: PowerEdge 6450 and 8450 vs. Sun Enterprise 4500 8 Table 2: RAID Organization for Three Configurations 9 Table 3: Oracle Database Layout 9 Table 4: Oracle9i Tuning Parameters 10 Table 5: Application Servers: Dell PowerEdge 1550 vs. Sun Enterprise 220R 11 Table 6: Oracle Pricing 12 Table 7: 4-CPU Test Results: PowerEdge 6450 vs. Sun E4500 w/ 4 CPUs 15 Table 8: 8-CPU Test Results: PowerEdge 8450 vs. Sun E4500 w/ 8 CPUs 16 Section 1 Executive Summary Following studies showing the advantages of migrating Tier 1 web servers and Tier 2 application servers from Sun Microsystems, Inc. servers to Dell...
Words: 4937 - Pages: 20
... This paper describes the Inventory Management System sufficiently to determine the feasibility and usability of a finished system. The core concept is to track the sale of items from the cash registers with additional features for interpreting the data. It uses a client-server model with a connected database to allow multiple stores and warehouses to be connected. This allows for later expansion while still supporting the targeted small businesses. The core features and final framework should be completed within 2 weeks, leaving 5 weeks to implement additional features and testing. 1. Operational Concepts The Inventory Management System is a real-time inventory database capable of connecting multiple stores. This can be used to track the inventory of a single store, or to manage the distribution of stock between several branches of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location through email at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. Further features may include the ability to generate reports of sales, but again the interpretation is left to the management. In addition, since theft does occasionally occur, the system provides solutions for confirming the store inventory and for correcting stock quantities. 2. System Requirements The Inventory Management System uses a web-based interface...
Words: 1417 - Pages: 6
...Abstract……………………………………………………………………………………………3 Part One: Screen Shots for OSForensics………………………………………………………………….4&5 Part Two: What servers were compromised?...................................................................................................6 Was network equipment compromised?.............................................................................................................................6&7 What user accounts were employed to gain access?..................................................................7&8 What vulnerabilities were exploited?..............................................................................................8 What can be done to prevent a recurrence?................................................................................8&9 Conclusion………………………………………………………………………………………...9 References……………………………………………………………………………………….10 Abstract The purpose of this paper was to perform a forensics analysis of a network break-in. In the first part of the paper, six screen shots are inserted from the OSForensics software. In the second part of the paper, it discussed how to go about finding information when you are told there has been a break-in. There were five essay questions that went along with this scenario. The first question discussed utilities that would be used to establish what servers were compromised. Web shells, administrative interfaces, and general attack activity were three indicators to make this determination...
Words: 1627 - Pages: 7
...Web Server Application Attacks Brooks Gunn Professor Nyeanchi CIS 502 July 10, 2013 Web Server Application Attacks Many organizations have begun to use web applications instead of client/server or distributed applications. These applications has provided organizations with better network performance, lower cost of ownership, thinner clients, and a way for any user to access the application. We applications significantly reduce the number of software programs that must be installed and maintained in end user workstations (Gregory 2010). Web applications are becoming a primary target for cyber criminals and hackers. They have become major targets because of the enormous amounts of data being shared through these applications and they are so often used to manage valuable information. Some criminals simply just want vandalize and cause harm to operations. There are several different types of web application attacks. Directory traversal, buffer overflows, and SQL injections are three of the more common attacks. One of the most common attacks on web based applications is directory traversal. This attack’s main purpose is the have an application access a computer file that is not intended to be accessible. It is a form of HTTP exploit in which the hacker will use the software on a Web server to access data in a directory other than the server’s root directory. The hacker could possibly execute commands...
Words: 1620 - Pages: 7
... | |Date Created: 09/22/2011 |Date Last Updated: 09/22/2011 | |CAUSE AND EFFECT ANALYSIS |SYSTEM IMPROVEMENT OBJECTIVES | |Problem or Opportunity |Causes and Effects |System Objective |System Constraint | |The current system dose not accurately track |The papers placed in the three-ring binder are |A searchable database with configuration |Nixed the idea of having configuration and | |configuration information, leading to wasted time |disorganized so the information is never really |information is needed. |component information on the Internet for security | |for technicians and clients. |complete. |Design the system so it is easy to update. |reasons. | | |The three-ring binder paperwork cannot be updated |...
Words: 638 - Pages: 3
...CITRIIX LICENSE CLUSTERING INTRUCTIONS The following steps describe the overall process involved in installing and configuring licensing on a cluster-enabled server. These steps assume you configured the clustering on the hardware on which you intend to install the license server. A detailed procedure follows. 1. Ensure that the first node has control of the cluster resources. 2. On the first node of the cluster, start the Citrix Licensing installation from the command-line and install it on the first node to the shared cluster drive (not the quorum drive). 3. Move the resources from the active node in the cluster to the second node. 4. Install the license server on the second node to the same shared location as the first node. 5. Obtain license files that specify the cluster name of the license server as the host name. After obtaining license files, you must add them to the license server and then reread them. 6. Configure your Citrix product to use the cluster name—not the node name—of the license server cluster. Note: When a clustered license server fails over, the cluster service renames the lmgrd_debug.log to the name of the node that previously hosted the services. Then it starts the services on the new active node and creates a new lmgrd_debug.log. To install licensing on a cluster-enabled server 1. Install Java on both cluster nodes. You can find a supported version on the Citrix product CD in the Support folder. 2. Ensure that the cluster IP address, cluster...
Words: 1830 - Pages: 8
...Term Paper Website Migration CIS University 09/07/15 Tony’s Chips has recently been sold to a new independent company. The new company has hired me to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. Therefore, the site will be redesigned so that customers will be able to place orders through the website and have them delivered as before. The design of the new system will be able to provide more data storage, faster retrieval, better security features and recovery solutions in the event that the website has any problems. With the operational reliability of the existing system, this will make it easier to improve the new system. The first part of the project goal is to discuss what it will take to build the web architecture, then what will have to be done to move the existing Website with minimal downtime, and then provide a disaster recovery plan in the event that the website should crash or stop working. In order to build the architecture, migrate the existing website along with adding the ability for the customers to place orders online and providing for redundancy of the site the system development life cycle (SDLC) will be used. The SDLC consists of five phases that will be utilized in this project and the five phases are systems planning, systems analysis...
Words: 2274 - Pages: 10
...How Windows Server 2008 Delivers Business Value Published: January 2008 © 2008 Microsoft Corporation. All rights reserved. This document is developed prior to the product’s release to manufacturing, and as such, we cannot guarantee that all details included herein will be exactly as what is found in the shipping product. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The information represents the product at the time this document was printed and should be used for planning purposes only. Information subject to change at any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization...
Words: 10609 - Pages: 43
...advertising; the other sought a degree in graphic design technology. The graphic designer was learning how to take an art form that was originally done with paper, pens, acetate, tape and glue and apply those same skills using computerized graphics, layers, vectors and pixels. Business work such as accounting, proposals, estimates, invoices and contracts was performed on an IBM compatible machine while all the graphic and design work was performed on a Mac LC II. Internal communications were executed using a 9600 baud modem system. External communications were performed through U.S. mail, telephone calls and a relatively new technology called facsimile transmissions (fax). Primary project output consisted of creating marketing and advertising materials such as logos, corporate branding materials, advertisements and other promotional print driven materials. Like many partnerships, Creative Image owners eventually dissolved the working relationship to pursue other ventures; however the business license was retained for 20 years in order to continue to allow freelance work by the artist. In 2011, the designer re-entered college to support 20 years of freelance design experience with a Bachelor’s Degree and redirect a career based upon print experience into establishing an expertise on creating successful web presence. Thus began the reinvigoration of Creative Image Group. State of the Company Today the company primarily creates and maintains corporate websites...
Words: 1523 - Pages: 7
...A server role in Windows Server 2008 R2 is defined as a service, feature, or program which allows a specific job function within a computer network. Many of these services are optional and do not come installed with Windows Server 2008 by default. Once roles are properly installed and configured they can become automated at a System Administrator’s disposal. The server roles available in Windows Server 2008 R2 are listed as follows: Active Directory Certificate Services This service is used for assigning and managing digital certificates used in software such as Adobe PDF’s. The AD-CS service is an excellent way to offer an extra layer of security among documents and files. Security layers consist of file encryption, digital signatures, and key authentication. AD-CS can also aid with Hyper Text Transfer Protocol Service (HTTPS) and authentication for employees using VPN services. Active Directory Domain Services Active Directory Domain Services allows computer, user, and device information to be stored. This allows for an easier, visual based management in a tree structured format; the domain is the host controller. AD-DS makes IT administration easier by allocating resources in one central, secure location. Active Directory Federation Services (ADFS) ADFS is a service which authenticates users in-between two parties over an extranet. This server provides user identity which recognizes and authenticates a user between two different servers, businesses, or locations in...
Words: 837 - Pages: 4
...WEB CONTENT MANAGEMENT SYSTEM February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy of the information. The Government of HKSAR accepts no liability for any error or omission arising from or related to the use of the information. TABLE OF CONTENTS Summary ............................................................................................................................. 2 I. Introduction..................................................................................................................... 3 What is a Web Content Management System? ............................................................... 3 Impact and Business Trends with WCMS ...................................................................... 5 The Common Components of WCMS............................................................................ 6 II. Security Concerns and Precautionary Measures ............................................................ 8 III. Conclusion.................................................................................................................. 11 Web Content Management...
Words: 2233 - Pages: 9