Multi User computer System

Name

Date

Table of Contents

Executive Summary 2

1. Introduction 3

2. Analysis 4

2.1. Performance Objectives 5

2.2. Tools to Access 6

2.3. Cost 8

2.4. Results 9

2.5. Solution 9

2.6. Procedures 10

2.6.1. Installing Antivirus 11

2.6.2. Firewall installation 11

2.7. Testing 13

2.8. Documentation and Maintenance 14

3. Conclusion 15

References 16

Executive Summary

A robust multi user computer system is essential for the success of any business organization whose core business is based on computer technology. A reliable network system will increase the performance of the company in many different ways. The improved performance will be due to an enhancement of security to ensure that the systems are safe from attacks. Also, a robust network will increase the system uptime thus, yielding more for the organization. Therefore, a regular upgrade of the network system is necessary for the companies. This report focuses on case company called Kiwi; a dealer in the stationary sector.

The paper aims at redesigning the current network system of Kiwi. The restructuring is critical because the current Kiwi’s system has many shortcomings regarding security, uptime, and performance among many other parameters. It analyses these gaps and suggests the areas in the system that needs an improvement. The report comes up with the procedures for the network redesign process for Kiwi. It provides the procedures for the entire system redesign project and also the particular component configuration procedure during the implementation process. Therefore, the report is critical in the evaluation and the redesign process for the network of this organization.

Take help for your assignment

Whenever you are in a need of help for your assignment, essay or report, we are here to assist you

Introduction

Kiwi Stationery Pvt Ltd is one of the market players in the stationery industry. The company sells its stationery online through its on premise network infrastructure. It has the necessary technology in place that helps it manage its technological needs. The company has two main servers that help in its business. Server 1 handles the internal business needs of the organization such as the Domain controller, the DNS, and the DHCP. On the other hand, server 2 serves to host the website of the organization. It is on this server that the company makes sale transaction with its customers. Thus, the current network design of Kiwi tries to solve its technological needs.

The company has found the need for to review of its current network system. Thus, the report investigates on the best strategy of redesigning the network system of Kiwi. The main objective of this report is to come up with the procedures for a multi-user computer system for Kiwi Stationery. The paper seeks to establish the all the requirements and the procedures that the organization can adopt for its smooth business operation.

The issues covered in this report include a review of the user requirements, feasibility needs, objectives and the development efforts required. It includes the design and the procedures to over gaps that are found in Kiwi’s technological needs, coming up with a new network design that solves the needs together with its needs. Besides, the report discusses the testing of the newly redesigned network for Kiwi to ensure that the procedures have been verified. Also, it provides documentation for the new network design of this organization. Therefore, the paper is critical in helping Kiwi increase its technological robustness which in turn increases its productivity.

Analysis

Performance Objectives

The main objectives of the network restructuring process for Kiwi are mainly centered on its uptime and security. Regarding the uptime of the Kiwi’s system, the redesign project seeks to establish whether Server 2 is connected to a UPS or not. Server 2 hosts the organization’s website, and thus, it is important to stay up all the time. All the core company business activities of Kiwi such as customer purchase transactions rely on this server. The uptime of a server is necessary for the continuity of services for organizations that depend on the internet (Mesly, 2017). Therefore, there is need to ensure that power interruptions do not discontinue or affect the services of this server.

The other goal of this project regarding attaining high system uptime is to establish their internet connectivity. The project aims at finding out if the servers on Kiwi’s network has multiple connections. The server computers are the heart of the system, and they should be therefore prioritized to receive continuous internet (Kurose & Ross, 2013). The project will seek to know whether the two servers on Kiwi’s network have multiple connections to the internet. Multiple connections are the key to increasing the reliability and sustainability of the system thus, ensuring the systems yield high uptime (Mesly, 2017, p. 130).

Regarding the security of Kiwi’s system, there are certain specific objectives that this paper seeks to achieve. Firstly, the paper seeks to determine whether the network of Kiwi has any security components configured on the system or not. This is a primary aspect for achieving a secure network infrastructure, as suggested by Kroenke (2015, p. 10). The project will seek to precisely determine whether Kiwi’s network has a firewall installed or not. A firewall is essential for securing the network of Kiwi. It is designed to filter the kind of traffic that enters the network to ensure that spam or attacks into the network are minimized. The firewall also helps in providing an analytic of the computers and the type traffic that is on the network (Costa, Ferreira, Bento & Aparicio, 2016, p. 659–671). Thus, determining its existence on Kiwi’s network is important.

Besides, as a security objective, the project aims at determining whether the network has a computer level security. The project will seek to know if all the computers on the Kiwi’s network are protected or not. Computer level security is an essential aspect of consideration to achieve a robust network system. The project has an objective of determining whether the computers on Kiwi’s network have any computer level security feature installed or not. Kiwi’s network. This will cover knowing if the computers have antivirus installed or not. And if they do have, the project will determine whether it is up to date or not. Therefore, this will be important to enhance the security upgrade implantation on Kiwi’s network.

Tools to Access

Various ways will be employed in Kiwi’s network redesign process to determine the project objectives. Firstly, regarding the establishment as to whether the Server 2 is connected to UPS can be done through physical inspection of the server room. Some of the network redesign team members will enter the server room physically and carefully check the power connections to Server 2 and establish whether it has any UPS systems connected to its power circuit. During the inspection, in case the team finds Server 2 connected to the UPS, it is important to also them to establish if the UPS are working and not damaged or faulty. Therefore, the physical inspection will help to give out relevant information that can be utilized in the network redesign process.

To determine the second checks, the team will inspect the server room to determine whether the two servers have multiple connections to the internet. One will have to enter the server room, and then Server 1 and Server 2 physical to know whether they have an internet connection. The process will be conducted carefully to ensure that it does not interrupt with anything in the server room. Therefore, this will be important to reveal all the information regarding the server connectivity to the internet. It will also provide additional information for the project such as whether all the network ports on the server machines are working well or not.

Regarding the security objectives of the redesign process, the physical inspection will still be the approach to use to check the aspect. Some members of the redesign team will go into the server room physical to check whether network security has been implemented or not. The team will look for the physical security components on the network. The item of the search for this objective is the firewall. The infrastructure will be inspected to know if the firewall is connected or not. This could be determining whether there are other components on the network that could not have been realized yet they affect the uptime or security of Kiwi’s network. Thus, inspection is critical to achieving the objectives of the project.

Also, as defined above to determine security at the computer level, the only best approach is a physical inspection of fun. The check will involve a look at the programs installed on the systems to determine if they have antivirus installed or not. The team will have to check all the 40 client machines on Kiwi’s network and determine if they are protected or not. For those clients machines that could be having protection, it is important to establish the type of protection used and also see if they are up to date or not. The physical inspection to determine the computer-level security will also be conducted on the two server machines of Kiwi.

Cost

The cost and effort involved in conducting the goals of the network redesign process have variations depending on the approach employed. Regarding the objective of determining whether Server 2 is connected to UPS or not, Kiwi will not incur costs of buying hardware, but it will meet the labor cost only. The team members who will undertake the duty of entering and inspecting the server room to check whether Server 2 is connected to the UPS or not. The human labour will cost $16 per hour, and thus the organization will have to meet these costs. The total cost of the exercise will be determined by the number of the individuals who will do the inspection job per hour at the rate above.

Concerning the second performance objective, the effort required to achieve this is the human effort only. This entails all the people who will be involved in the process of going to the server room and check whether the two servers have multiple internet connections. The organization will have to incur the costs involved to pay all the members of the team who will participate in this process. The rate pay per person is $16 per hour.

The cost and effort required to cover the security objectives of the project are also human labor only. These are the team members who will perform the task of going to the server room and checking the network connection to see if there is any firewall incorporated on the network system. These people will also be paid at a normal rate of $16 per hour. Also, there are costs for the team members who will conduct the check of all computers in the organization to determine the whether they have computer level security implemented or not. They will also be paid at the rate of $16 per hour. Therefore, Kiwi must organization to take care of these costs and efforts required to conduct the project objectives.

Results

The results from the test above reveal various aspects of the network system of Kiwi. Firstly, the results of the server inspection show that Server is not connected to the UPS. This indicates that incase the there is an interruption of the electric power supply, Server 2 will automatically go off. This is because there is no power storage device to boost its uptime in case of such event. Also, the inspection of the internet connectivity of the servers showed that the servers of Kiwi do not have multiple connections. Thus, there is need to handle work towards making improving this aspect for a steady internet supply to the servers to increase their uptime

The security checks also revealed a lot of information about the network of Kiwi. A check for the firewall brought it out that the entire network of Kiwi does not have any security component installed. This makes the network prone to the attacks from the malicious parties. Therefore, there is a need to improve the network security of Kiwi. The check also covered the computer-level security checks. The information obtained from the exercise shows that the computers on Kiwi’s network are not protected and are prone to attacks. Thus, there is need to protect them and ensure their safety.

Solution

The results above need robust approach solutions to handle them. Regarding the first issue of Server 2 lacking the UPS, there is need to connect the UPS to the circuit. The UPS stores charge for some time, thus, connecting the UPS to the circuit of the Server will greatly help in proving the extra electric power for use in case the mains supply goes off. Therefore, connecting the UPS to the circuit is critical in maintaining the uptime of Server 2 which is Kiwi’s heart for business. Concerning the internet connectivity of the servers on the Kiwi’s network, the solution is to make a connection between the two servers. This will involve a physical check and actual connection of the servers to the internet to ensure that they have multiple connections (Peterson & Davie, 2012).

The check as to whether security components are installed on the network revealed that Kiwi’s network does not have security devices installed. To solve this, there is need to install a firewall on the network. This should be connected to the servers and other components on the network. The firewalls will help provide security to the network by filtering contents that enter the system that could otherwise be malicious to the systems (Stock & Stock, 2013). All traffic from outside will be monitored, and those that meet the security requirements on the network will allow entering, the suspicious content will be controlled. Thus, a firewall is a critical element in implementing the security of a network system.

Besides, results revealed that the network of Kiwi has the computers which are not protected. This is a matter of concern because insecure computers can be dangerous on the network. The solution to such the problem is to install the appropriate antivirus. This will help reduce the infection of the computers on the network and also the data security. Computers which are not protected can corrupt the files on infecting the entire network of the organization (Mir, 2007). The best antivirus for the network of Kiwi is Kaspersky, whereby the two servers will have the Server Version, while the forty clients will take the Client Version of the same antivirus. This step will help improve the security of the network.

Procedures

There is need to design the procedures to be used in the process of implementing the above solution. They provide a guide on what should be done while applying the solution to the organization’s network shortcomings. For the implementation of a connection of the UPS to the server 2, the procedure is to connect the UPS to the main supply, disconnect the Server 2 power from direct main’s supply, plug and connect Server 2 to get power from the UPS. This is an important exercise that should be conducted carefully and accurately to reduce the Server 2 downtime during the connection process.

The solution for improving the internet connectivity of the servers on the network will involve another network connection to act as the back. The procedure for this solution is to plug in the landline cable into the server machine. After that, set up the computer so that one of the network entries become the backup connection. The process also required careful handling of the network equipment to avoid causing damage to other network parts during the upgrade exercise. All the system input must be confirmed to be working well before leaving the server room.

Installing Antivirus

  • Acquire the antivirus,
  • install the program,
  • do the computer scan,
  • configure a schedule for self-scanning
  • Keep windows updated.
  • To ensure that the procedure is effective and minimizes area, there is need to use a checklist.

Firewall installation

  • Plug the cable from the network router which comes from the modem, and connect it to the firewall, as suggested by Alt and Smith (2007).
  • Use another landline cable to connect the firewall to the router.
  • The next step is to use the configuration kit that comes with it and use it to set up the firewall.
  • As away to ensure in the procedure, there is need to incorporate a checklist which will be used for this process

Further details of procedures are given in Appendix-1.

C:\Users\ittech\AppData\Local\Microsoft\Windows\INetCache\Content.Word\network_architecture.png

Figure 1.0: Design

Testing

Testing of the new upgrade should be done a few days later. This entails a review of the previous issues and a check to confirm if the solution that was provided worked to solve the problem. Firstly, after a few days of applying the solution to the network, check if Server 2 is working well with the UPS that was connected to the electric circuit. It helps determine is the UPS is strong to sustain Server 2 for the required amount of time. The test can be conducted by switching off the mains supply of the UPS and then, leave Server 2 to run from the UPS directly and establish the amount of time it takes before giving warnings. The test is critical because it helps realize if the fix worked for the problem or not. The test can be repeated even later after some other days.

Regarding the test for server internet connectivity, one must inspect the server room again. Look physically to establish if both network inputs to the servers are working well and that one of one them is a backup of the other. The procedure will help know the cases where the connectivity failed and therefore, the connection process to repeat. Thus, there is need to affirm the working of the internet on the machines.

Regarding the firewall, the exercise will involve the use of the testing tools that come with it. Firewalls come with their testing kids who are important at this stage. There is need to use the tool and ensure that it gives a positive result. In cases where it gives negative, reinstallation process must be conducted. The test for system antivirus installation entails a confirmation to whether the scheduled scan is performed or not. This entails a review of the logs on the system. Another test is through scanning the computer and observe the results (Tedre, 2014). In case the antivirus does not perform well, then there is a need for re installation. Therefore, it is clear that testing is essential to confirm and proof that the solution that was applied to the network upgrade is indeed working as expected.

Documentation and Maintenance

Maintenance is the last step in the process of network upgrade for Kiwi Company. It is essential and inevitable for the network system. Maintenance acts as a way to support to the longevity of the network system performance and also as the way to enhance its sustainability of the robust features. Maintenance plan and procedures must be stated to ensure that even if the implementation team leaves, the services will continue well (Stallings, 2007). Thus, it is clear that maintenance is continuous as long as the network system exists.

Regarding the power issue of Server, the maintenance procedure will be, configure the UPS to give alarm when their batteries are becoming low. This can happen during the case when the blackout happens and takes a long time. Regarding the internet connectivity, there is a need for occasional physical checks in the server room to ensure that servers have multiple connections and everything is performing well. The practice of periodic check should be extended even to the firewall to make sure that it’s performing well and it is connected well to the network. Thus, a plan for the periodic checks is useful in this case.

Lastly, the maintenance of the antivirus involves ensuring that the automatic schedule scans are working well to each system. Besides, it calls for ensuring that the antivirus is configured to check for the updates automatically from the internet. This will ensure that it stays up to date enhancing an improved security. Therefore, maintenance is critical for the network system redesign for Kiwi to ensure its sustainability.

Conclusion

In conclusion, the redesign of Kiwi’s network is likely to improve on various aspects of its organization’s performance. In as much as the current network of the organization is serving the purpose, there certain aspects that can be improved to ensure that the network yields maximum security and high uptime. In the process of implementation of the system redesign, there is need to ensure that all the requirements are captured. This increases the quality outcome of the new system upgrade. Thus, Kiwi will yield a lot out of the network redesign project.

Also, there is need to implement procedures on the process of project redesign. They play a critical role in providing systematic ways of setting up the new network architecture. The systems will help the team working on Kiwi’s network to achieve accuracy, security and also reduce the time taken for the exercise. The procedures are designed to handle the overall network change for Kiwi and thus, guide through the entire network redesign process. Also, the server and computer configuration procedures guide in the implementation process. They enforce the steps that are adapted for the effective actual system configuration. Therefore, with the adoption of procedures, Kiwi’s network will be successfully implemented to realize the best performance for the company.
information-system-insecurity

Learn how can Essay Assignment Writing assist you

We are a team of professional assignment writers, essay experts, editors, proofreaders and tutors. We
can help you with all your projects, dissertations and reports. We guarantee a service that satisfies you
100%.

References

Alt, R. & Smits, M. (2007). Networkability of Organizations and Business Networks. In: ECIS 2007 Proceedings of the 15th European Conference on the Information Systems, St. Gallen, pp. 119–130

Costa, A, Ferreira, C., Bento, E. & Aparicio, F. (2016). “Enterprise resource planning adoption and satisfaction determinants”. Computers in Human Behavior. pp. 659–671.

Kroenke, D. (2015). MIS Essentials (Fourth ed.). Boston: Pearson. pp. 10.

Kurose & Ross (2013). Computer Networking: A Top-Down Approach Using the Internet, Addison-Wesley Computer Science.

Mesly, O. (2017). Project feasibility – Tools for uncovering points of vulnerability. New York, NY: Taylor and Francis, CRC Press. ISBN 9 781498 757911. pp. 130.

Mir, N. (2007). Computer and Communication Networks, Prentice Hall.

Peterson, L. & Davie, B (2012). Computer Networks a system approach, 5th Edition, Networking planet.com

Stock, W. & Stock, M. (2013). Handbook of Information Science. Berlin, Boston, MA: De Gruyter Saur.

Tedre, M. (2014). The Science of Computing: Shaping a Discipline. Taylor and Francis / CRC Press.

Like this article?

Share on facebook
Share on Facebook
Share on twitter
Share on Twitter
Share on linkedin
Share on Linkdin
Share on pinterest
Share on Pinterest