Jones Estates has contacted Tech G Limited to set up Local Area Network which will serve the following departments include: Management, Marketing, Sales, and Accounting department. In this documentation we will cover the following sub topics include:
Jones Estates has contacted Tech G Limited to set up Local Area Network. The network will consist of centralized server for authorization of all network users. Active Directory will handle all the user permission and access to network resources. Any unauthenticated user will not be able to access any shared network resources such as printers and files [11].
The network will also have a dynamic host controller which will lease out IP Address to all host connected to the company network. The workstation will obtain IP Address automatically without administrator doing the manual assignment and keeping records in Spreadsheets [11].
The network will also support sharing of printers through print servers. One server will be able to handle all the prints job in the company.
The company will host their website and share files through file server. Website will be accessible through internal and external network while file server will only be accessible through the internal networks.
Tech G have done thorough analysis on client requirements. The analysis approach used is a top down which consider the most important requirements before diving into others that needs to be implemented as a secondary requirements. Having done thorough analysis based on the client’s requirements, a new plan is created so that every requirements is implemented and meet client’s expectation. The following are clients network requirements include:
The network that will be implemented will consider this crucial factors include:
Network requirements are divide into two major parts includes:
Software requirements – These are operating system and applications which will be running on the network.
The following are devices needed to be used in new network implementations.
Software Requirements
Network security will be implemented for both internal and external network. Internal server will be protected by the build in operating system’s firewall. Router interfacing the internet will be protected by the external firewall. The internal firewall will protect the internal network from being accessed from external network [2]. Active Directory is responsible for managing all the users from the two domains. Users will be grouped according to departments for example operations department. User identification and authorization will be centralized in the network. This will ease management. Users and policy implementation will be based on departmental. Staffs which belongs to specific department will share common files and policies. This will ensure security in the organization’s network [7].
Data backup is essentials in every business. Hardware and Softwares tend to fail at unpredictable time. They are several factors that may cause data loses. Some factors may be beyond human control such as flood or fire which lead to data loses if correct backup measures are not done appropriately. So for Jones Estates, local and cloud backup will be implemented. Local backup involves scheduling a daily backup that will copy data from host computer to external drives.
Cloud backup involves synchronizing data to a cloud storage using third party such as Dropbox. All the backups will be schedule every day at midnight. After every backup a log file will be send to administrators email account. Log file will be used to track the backup process. If backup fails the log will contain information showing the log errors.
Network design will consist of the following zones include:
Windows Server 2012 Installation procedures
The following are the steps to install windows server 2012 Revision. This installation procedure is the same for all the windows servers used in this documentations.
In any organization file sharing is one of the basic requirements. Managers and employees shares reports such as financials spreadsheets. Windows server has an NTFS File sharing whereby computers in the same network can access the shared folder. This folders are secured since authorization can be enabled through active directory. So individual users can have different permission for every file for example read, write, and execute mode [14].
Network security will be provided through firewall which will be set it up in the network. The purpose of firewall is to control the inbound and outbound traffics in the network. It also drop traffics which tries to access the protected zones for example external firewall purpose is to protect the internal router and servers ports [2].
Though the use of VLAN technology in smart switches, traffics which are from same network subnet will be tunnel together while those from another network will be tunnel through another channel. Both traffics cannot be tunnel in the same channel therefore providing a high level of data privacy. Departmental traffics will use its own VLAN channels [16].
Computers in the network will be set to use dynamic IP addressing. This will enable them to obtain network settings automatically from the DHCP Server in the network. DHCP Server will lease out IP from a certain ranges for example from 192.168.43.100 TO 192.168.43.254 will be lease out for clients. Reserved IP address are those used for dedicated servers, switches, routers and any other devices in the network.
All the dedicated server will assigned static IP Addresses. In built firewall will be used to aid in securing ports and other services which are restricted from being accessed. In order for users to access the resources from this dedicated servers one must be identified and authorized through a central active directory server.
Backup are automated by use of schedule task process in windows servers. In Linux platform cron tab processes are being used to run a customize script to backup data. They are different types of backup being done for example full backup which is being done once then followed by incremental backup. Other types are hourly backup. The following are type of backups being done:
The department in charge of all the backup services in the company is the ICT department. All the backup procedures and documentation are being taken care by the ICT system administrators. In case of any change the policy must be updated [12].
System administrators are responsible for checking backup logs along with the backup files. In case of any errors being reported in the backup logs administrators must find a solution and ensures that all the backup are running successfully [12].
All the storage disk in the network that are being used for backup must be replaced after a period of four years. In case of disk failures an urgent replacement must be done.
Hardisk wears out after sometime therefore there is a need to dispose in a safe manner. The Hardisk will contain confidential data therefore there is a need to be dispose in a secured archives.
The files that have already been backup will be put in a test if in case of disaster can be used for recover data.
Each file must be tested if ensure that the backup stored are working if in case of any disaster. This test will give an overview of backup being done in the organization if they are reliable or not. In case of backup failures a full backup will be recreated and tested to ensure that they are working.
The administrator doing backup must document all the backup test and its results for future references.
Conclusion
In conclusion, organization to achieve the best in business it requires minimum downtime in the network therefore there is need to implement a reliable, secured and scalable network that will support every need of a business.
References
[1]”What is DMZ (demilitarized zone)? – Definition from WhatIs.com”, SearchSecurity, 2018. [Online]. Available: https://searchsecurity.techtarget.com/definition/DMZ. [Accessed: 29- May- 2018].
[2]”Understanding Firewalls and Their Role in Network Security – Schneider Electric Blog”, Schneider Electric Blog, 2018. [Online]. Available: https://blog.schneider-electric.com/datacenter/2011/08/19/understanding-firewalls-and-their-role-in-network-security/. [Accessed: 29- May- 2018].
[3]B. Nelson, “How to Setup and Configure DNS in Windows Server 2012 – Install and Configure DNS on Windows Server 2012”, Tom’s IT Pro, 2018. [Online]. Available: https://www.tomsitpro.com/articles/configure-dns-windows-server-2012,2-793.html. [Accessed: 29- May- 2018].
[4]”Chapter 4: Installing and Configuring Microsoft DHCP and WINS Server Services”, Technet.microsoft.com, 2018. [Online]. Available: https://technet.microsoft.com/en-us/library/cc302637.aspx. [Accessed: 29- May- 2018].
[5]”How to setup FTP server / users on Windows 2012 R2?”, VPSie, 2018. [Online]. Available: https://vpsie.com/knowledge-base/how-to-setup-ftp-server-users-on-windows-2012-r2/. [Accessed: 29- May- 2018].
[6]P. Kennedy, “Microsoft Windows Server 2012 Hardware Requirements and Recommendations”, ServeTheHome, 2018. [Online]. Available: https://www.servethehome.com/microsoft-windows-server-2012-hardware-requirements-recommendations/. [Accessed: 29- May- 2018].
[7]”Install Active Directory on Windows Server 2012″, Support.rackspace.com, 2018. [Online]. Available: https://support.rackspace.com/how-to/installing-active-directory-on-windows-server-2012/. [Accessed: 30- May- 2018].
[8]”Star topology – Telecom ABC”, Telecomabc.com, 2018. [Online]. Available: https://www.telecomabc.com/s/star.html. [Accessed: 29- May- 2018].
[9]”Cisco Firewall Best Practices Guide”, Cisco, 2018. [Online]. Available: https://www.cisco.com/c/en/us/about/security-center/firewall-best-practices.html. [Accessed: 29- May- 2018].
[10]P. Support, C. Firewalls and C. Guides, “CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.5 – Introduction to Cisco ASA Firewall Services [Cisco ASA 5500-X Series Firewalls]”, Cisco, 2018. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/firewall/asa-95-firewall-config/intro-fw-services.html. [Accessed: 29- May- 2018].
[11] N. Ilyadis, “Five network trends challenging the enterprise”, Network World, 2018. [Online]. Available: https://www.networkworld.com/article/2931983/data-center/five-network-trends-challenging-the-enterprise.html. [Accessed: 29- May- 2018].
[12]”Full, incremental or differential: How to choose the correct backup type”, SearchDataBackup, 2018. [Online]. Available: https://searchdatabackup.techtarget.com/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type. [Accessed: 30- May- 2018].
[13]”Step-by-step Installation Guide for Ubuntu – MoodleDocs”, Docs.moodle.org, 2018. [Online]. Available: https://docs.moodle.org/34/en/Step-by-step_Installation_Guide_for_Ubuntu. [Accessed: 30- May- 2018].
[14]”Step-By-Step: Creating a Windows Server 2012 R2 Work Folders Test Lab”, CANITPRO, 2018. [Online]. Available: https://blogs.technet.microsoft.com/canitpro/2015/01/19/step-by-step-creating-a-work-folders-test-lab-deployment-in-windows-server-2012-r2/. [Accessed: 30- May- 2018].
[15]”What is Web server? – Definition from WhatIs.com”, WhatIs.com, 2018. [Online]. Available: https://whatis.techtarget.com/definition/Web-server. [Accessed: 29- May- 2018].
[16]C. Academy, “Basic Switch Configuration (2.1) > Cisco Networking Academy’s Introduction to Basic Switching Concepts and Configuration”, Ciscopress.com, 2018. [Online]. Available:
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download