Based on book System analysis and design chapter 1,2 and 3 Write a project Syste
ID: 3885356 • Letter: B
Question
Based on book System analysis and design chapter 1,2 and 3 Write a project Systems Planning case - You are the Sr. Systems Analyst of your local Community College. The computer labs are outdated and the network infrastructure is slow and unreliable. There is a business need for network and computer lab modernization to include new hardware and software solutions. - Introduce the problem/issue/opportunity with a problem statement and introduction of the organization. - Present the business case for your project. - Outline the proposed project plan (include the Work Breakdown Structure). - Outline the proposed communication plan and identify all project stakeholders.
Explanation / Answer
Network infrastructure
IMPLEMENTATION PLAN
Version <1.0>
09/17/2017
1 Introduction
1.1 Purpose
Being the Sr. Systems Analyst of your local Community College I have observed that computer labs are outdated and the network infrastructure is slow and unreliable that is causing hindrance to the student development process.
So College Community has decided to upgrade the infrastructure.
1.2 System Overview
Recommendations for hardware and software products, such as file servers, communications servers, routers, intelligent wiring components, host connectivity products, groupware products, security services etc. In addition, college need suitable software applications which control the data traffic; they must be installed on the computers in their network. For such connections, even more systems might be required.
1.2.1 System Description
Designing new solutions for Routers and switches, Storage Area Network (SAN), Windows Server Suite (in needed), Citrix and other industry standard operating systems and environments. Additionally, Microsoft SQL, Oracle, and other industry standard SQL Client/Server RDBMS's.
In addition, you need suitable other applications which control the data traffic; they must be installed on. These include, in any case, Domain Name System (DNS), maybe also Dynamic Host Configuration Protocol (DHCP) or Windows Internet Naming Service (WINS) and they need to be configured and must be available to the users. If you plan to connect your computers to the Internet, you will also need additional devices, i.e. security gateways (firewall), Load balancers. In addition, the computers in existing branch or home offices also need to be connected to the network.
1.2.2 Assumptions and Constraints
o Schedule: Once scope is known, an implementation schedule should be made. You'll already know the two most important project points: the beginning (most likely following immediately after the project scope is determined) and the end (when the network is needed as dictated by the sponsor). It's up to you to fill in the blanks. We are way with the schedule.
o Budget : With listing of the different new hardware and software products that need to be bought and the listing of things that need to be upgraded can be put to a paper and need to be reviewed for proper estimation.
o Resource availability and skill sets: With the existing resources and checking its durability and observing all its life cycle need to be estimated. It might give the exact reference about the budget required.
o Constraints associated with product interfaces: Everything comes with a good and bad. Likewise these technologies can only be handy to the college when they will maintain its performance on daily basis. So the college might not be the most beneficial if they go by this model or infrastructure. Even the e-commerce companies and service provider companies whom college will acquire can be benefited but only when they will have the right skill sets available to analyze and maintain the resources.
1.2.3 System Organization
The following common network infrastructure components have a direct impact upon the success of your deployment:
• Routers and Switches
Routers connect networks of your infrastructure, enabling systems to communicate. We need to ensure that the routers have spare capacity after the deployment to cope with projected growth and usage.
In a similar ways, switches connect systems within a network.
• Firewall Access Control
These days, it is becoming more common to protect application servers on their own (trusted, isolated) network from the untrusted networks (your network and the Internet).
Thus Firewalls sit between a router and application servers to provide access control. Even achieving minimization in services, libraries, and applications helps increase security by reducing the number of subsystems that must be maintained. This provides a flexible and extensible mechanism to minimize, harden, and secure Solaris systems. Even the college Site Security Policy should provide direction on such issues.
• Load Balancers
Use load balancers to distribute overall load on your Web or application servers, or to distribute demand according to the kind of task to be performed. Placing the hardware load balancers in front of the servers and behind routers because they direct routed traffic to appropriate servers. Software load balancing solutions reside on the Web servers themselves. With software solutions, one of the servers typically acts a traffic scheduler.
• Storage Area Networks (SANs)
Understanding the data requirements of the storage system is necessary for a successful deployment. Increasingly, SANs are being deployed so that the storage is independent of the servers used in conjunction with it. Deploying SANs can represent a decrease in the time to recover from a non-functional server as the machine can be replaced without having to relocate the storage drives.
• Domain Name System (DNS)
Servers which make heavy usage of DNS queries should be equipped with a local caching DNS server to reduce lookup latency as well as network traffic.
• Windows Server Suite
To support specific cryptographic protocols, such as TLS 1.2, new cipher suites may need to be added to a server or workstation. It will give stability to the college lab.
• Citrix
The users are then connected to the server to which the application is delivered. ... With XenApp and session virtualization, Citrix enables Windows, Mac, iOS, and Android devices to run Windows applications from Microsoft RDS. On the other hand, XenDesktop is able to deliver full VDI desktops to any remote client device.
• Dynamic Host Configuration Protocol (DHCP)
The DHCP client requests an IP address by broadcasting a DHCPDiscover message to the local subnet. The client is offered an address when a DHCP server responds with a DHCPOffer message containing an IP address and configuration information for lease to the client.
• Windows Internet Naming Service (WINS)
WINS and DNS. WINS and DNS are both name resolution services for TCP/IP networks. While WINS resolves names in the NetBIOS namespace, DNS resolves names in the DNS domain namespace. WINS primarily supports clients that run older versions of Windows and applications that use NetBIOS. WINS is required for any environment in which user access resources that have NetBIOS names. If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name unless you use Lmhosts files, and you might be unable to establish file and print sharing connections.
• Providing Centralized Access to the Internet
A proxy server will allow college to bundle the access to the network by using a central system. This means that the computer does not connect directly to the Internet, but uses the proxy server for this purpose
1.3 Glossary
DHCP: Dynamic Host Configuration Protocol
WINS: Windows Internet Naming Service
DNS: Domain Name System
SAN: Storage Area Networks
2 Management Overview
To implement this whole process new services providers need to be hired and they need to monitored by the appointed personnel from the college management to make this implementation a success.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.