Perfect Technology is a network consulting and engineering firm which provides services to customers such as network design, security implementation, network installation and general network maintenance. Our team consist of three personnel which have expertise in the field of information technology and they are able to deliver a solution to any customer. We have deep analysis and customer relations which have proofed by our success with other customer. The team members involves.
Head of Network Implementation
Customer Relation Manager
Head of Network Security
First Couriers Pty Ltd management are opening new branches at Werribee and Thomastown. They need the following solutions to be provided in their new branches.
Perfect Technology has done analysis on the customer’s requirements, so the company has come up with the following solution to address our client’s needs.
The above solution shall be implemented, tested and handed over to the Mr. Jones to test with their staffs.
Since the server will be handling several tasks while providing network services, the following are the requirements that must be met by the new server:
Hardware, such as CPU, RAM, Disk and Network interface should be specified here
The following are the services that need to be configured in the network:
The following are the applications that will be running on the server.
Identify the application software that is required to run on the server
Active Directory Services will be configured in the new server. All the First Couriers Pty Ltd computers will authenticate to the Active Directory Service. Any computer in the network that need to access shared resources such as printers, files, or internet must be a member of Active Directory Groups. All the users in the network will be group according to the departmental and administrative positions. Also files access will be based on the common interest and position that users possess in the organization. Some of the ports will be made accessible through internal network for example port 1045 which will be used in the internal network.
Fail over cluster will need to be implemented to ensure high availability of the service in case of hardware failures. The following are the requirements that need to be implemented so that redundancies is achieved:
I choose the above device because our server has 4 dedicated NIC. Also this device is faster and reliable since it uses serial port for cluster node and it is ISCSI connection is very fast, it is above 1.4 GHz. The ISCSI is supported by several vendors. ISCSI supports also live migrations. Considering its cost it is inexpensive.
Installation check list.
FEATURE SERVICE NAME |
INSTALLED |
INSTALLATION DATE |
TESTED |
TESTED DATE |
Other |
DNS |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
DHCP |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
Active Directory Service |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
FTP |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
Firewall |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
Network Printers |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
Schedule Backup |
YES |
05/05/2018 |
YES |
05/05/2018 |
Working |
SMTP Relay |
Yes |
05/05/2018 |
YES |
05/05/2018 |
Working |
SQL Server |
Yes |
05/05/2018 |
Yes |
05/05/2018 |
Working |
|
Yes |
05/05/2018 |
Yes |
05/05/2018 |
Working |
Approved |
YES |
YES |
YES |
YES |
Confirmed |
Required third-party applications
The server installation will be done during out of office hours for example over the weekend. This will ensure there is minimum interruptions of activities in the company. Also during cables layout we expect a lot of noise and dust from the ceiling board which may not be convenience to the staff.
In the Windows Server 2012 that is the destination Server for data, we will enable migration tools. There are several features that will be migrated for example Group Policies, Active Directory Users, Back up roles. Microsoft ships with migration tools therefore each tool will be applied accordingly to the services.
Shared files which does not required a complex tool to copy will be shared over the network and copy using XCOPY or Robocopy commands.
Each component will be installed. After installation the component will be tested three times by different experts. Each test will be recorded if it has passed the test. In case of failure the service will be troubleshoot before moving to another service. The name of the person who will do test will be recorder and its test results. All the test will be approve by Mr. Jones who also will be part of the test.
Performance Monitoring that is inbuilt applications will be used. This utility stores the server performances. The data that will be stored will be analyses before and after the employee have use the services. The purpose of doing this test is to ensure that services are sharing resources efficiently. In case of abnormal service behavior a solution will be provided by either migrating a service to its own server or server tune will be done.
Our company offering solution have working standard layout of rules which ensures that our employees and clients participating in the installation process must meet the required standards such as:
The email will be send to a customer asking for agreement to sign off. If the client agrees then he will be taken through business requirements forms. Client will go through each before verifying. Client must be shown physically and in practical the requirements for each was met. Client will approve each business requirement in a form and make a recommendation. After the client has gone through all the business requirements and have ensure that every requirements were met a circulation list will be given out to other stakeholders to ensure client’s recommendations are up to the standard.
If all the stakeholders have signed that all the requirements were met then handover will be done. Before handover basic training will be done to ensure client is in control of the network.
Windows Server have in inbuilt feature called Server Backup Utility. It is very reliant and this feature will be enabled as a service in the feature. The backup will be save in the shared network folder. Schedule backup will be created so that the service will run overnight when the server is not being used by the employee. The backup utility provides logs after every successful or failed backup. The email will be send to Mr. Jones which consist of backup logs. Restore strategy will only be done if the hardware or files are corrupted by the malicious malwares or hardware failures such as Hardisk.
An email will be send to the human resource manager requesting access to a specific site. An email will contain details of what will be done, details of the person who will be doing service and the company name requesting. Also service that will be disrupted will be listed in the detail form. Then human resource manager will consult the departments such as security and ICT department. Security will authorize while the ICT department are the one to determine the best time for the service.
The new server will be connected through WAN network therefore other workstations will be able to connect through the server to the company network.
Conclusion
In conclusion, First Couriers Pty Ltd management will be able to access all the services with high availability and its security implementation which ensures that everyone in the network is safe from any attack.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download