Client Requirements
Jones Estates has contacted Tech G Limited to set up Local Area Network which will serve the following departments include: Management, Marketing, Sales, and Accounting department. In this documentation we will cover the following sub topics include:
- Analyzing client’s requirements – In this section we will cover the business problems that need to be address in the network.
- Network design and solution – In this section we will cover network requirements that is software and hardware, network architecture and general recommendation basing on the network being set it up.
- Network set up and configurations – In this section we cover installation of servers and service configurations. Services are required in any network.
Jones Estates has contacted Tech G Limited to set up Local Area Network. The network will consist of centralized server for authorization of all network users. Active Directory will handle all the user permission and access to network resources. Any unauthenticated user will not be able to access any shared network resources such as printers and files [11].
The network will also have a dynamic host controller which will lease out IP Address to all host connected to the company network. The workstation will obtain IP Address automatically without administrator doing the manual assignment and keeping records in Spreadsheets [11].
The network will also support sharing of printers through print servers. One server will be able to handle all the prints job in the company.
The company will host their website and share files through file server. Website will be accessible through internal and external network while file server will only be accessible through the internal networks.
Tech G have done thorough analysis on client requirements. The analysis approach used is a top down which consider the most important requirements before diving into others that needs to be implemented as a secondary requirements. Having done thorough analysis based on the client’s requirements, a new plan is created so that every requirements is implemented and meet client’s expectation. The following are clients network requirements include:
- Centralized user Authentication. Active directory will be implemented in the network to ensure that all the users must identify and get authorized through active directory before accessing any shared network resources.
- Print Servers. Print server will be shared in the network. The will ensures that all the department shared limited resources and reduce cost of buying more printers in the organizations.
- Acquiring IP Addresses automatically. Dynamic host controller (DHCP).All the workstation which will connect to the organization network will acquire IP Address automatically. The Server will run a DHCP daemon will be installed in the network. The DHCP Server will reduce the tedious job which requires system administrator to assign every computer a static IP Address. Also it will reduce the use of paperwork to store and keep track of used IP Addresses in the network.
- File Sharing. In the organization files will be shared among departments’ staffs therefore there is a need for a dedicated file server. The files being shared will need to be authenticated and only authorized users will be able to read, update and modify. Different roles will be used in file sharing server to ensure every users has its own role on every file. Unauthorized users will not be able to access the files.
- Network Security. Network authorization and Identification will be centralize to ease in network user’s management.
The network that will be implemented will consider this crucial factors include:
- Network Security. In every network security is a key factor that must be ensure that all the network computer and user’s data are safe from any threat.
- Reliable Network. The network being implemented should be able to handle huge traffics in the network. Users should not experiences bandwidth bottleneck when accessing the network.
- Network Availability.Network downtime should be minimum. The design should enable plug and play which will not affect the entire network if some part of the network is plug out or in.
- Network Scalability. The network will be design and implemented to support room for adjusting the network. The network layout will be implemented to give more room for network devices in the network and to accommodate the growing number of users.
Network requirements are divide into two major parts includes:
- Hardware requirements – These are physical devices that will be used in the network set up.
Software requirements – These are operating system and applications which will be running on the network.
The following are devices needed to be used in new network implementations.
- 4 HP ML350 ProLiant (TOWER MODEL) Tower – It has the following features:
- 32 GB Random Access Memory
- 2 TB Storage Capacity
- Linksys WRT32X AC3200 Dual-Band Wi-Fi
- 4 Cisco Catalyst 2960-L Series Switches each with 24 ports
- 2 TB of Transcend External Backup Storage
- Cat 6 Ethernet Cable with Solid Conductors 305m Reel Box Green Color.
- 2 Firewall Cisco ASA5505-BUN-K9 ASA 5505
Software Requirements
- Windows Server 2012 – 4 Licenses [6]
- Ubuntu Server Version 16.0.4 and Above [13]
- Windows 8 Professional for testing.
Network security will be implemented for both internal and external network. Internal server will be protected by the build in operating system’s firewall. Router interfacing the internet will be protected by the external firewall. The internal firewall will protect the internal network from being accessed from external network [2]. Active Directory is responsible for managing all the users from the two domains. Users will be grouped according to departments for example operations department. User identification and authorization will be centralized in the network. This will ease management. Users and policy implementation will be based on departmental. Staffs which belongs to specific department will share common files and policies. This will ensure security in the organization’s network [7].
Network Design
Data backup is essentials in every business. Hardware and Softwares tend to fail at unpredictable time. They are several factors that may cause data loses. Some factors may be beyond human control such as flood or fire which lead to data loses if correct backup measures are not done appropriately. So for Jones Estates, local and cloud backup will be implemented. Local backup involves scheduling a daily backup that will copy data from host computer to external drives.
Cloud backup involves synchronizing data to a cloud storage using third party such as Dropbox. All the backups will be schedule every day at midnight. After every backup a log file will be send to administrators email account. Log file will be used to track the backup process. If backup fails the log will contain information showing the log errors.
Network design will consist of the following zones include:
- Internal Network Zone This network will consist of servers which are only accessible to the internal users. The external users that is public will not be able to access resources inside the internal network zone.
- Demilitarized Network Zone. This zone will be accessible to internal network users and external network users. Server or shared resources inside this zone will be available to public via hypertext transfer protocols and file transfer protocol.
Windows Server 2012 Installation procedures
The following are the steps to install windows server 2012 Revision. This installation procedure is the same for all the windows servers used in this documentations.
In any organization file sharing is one of the basic requirements. Managers and employees shares reports such as financials spreadsheets. Windows server has an NTFS File sharing whereby computers in the same network can access the shared folder. This folders are secured since authorization can be enabled through active directory. So individual users can have different permission for every file for example read, write, and execute mode [14].
Network security will be provided through firewall which will be set it up in the network. The purpose of firewall is to control the inbound and outbound traffics in the network. It also drop traffics which tries to access the protected zones for example external firewall purpose is to protect the internal router and servers ports [2].
Though the use of VLAN technology in smart switches, traffics which are from same network subnet will be tunnel together while those from another network will be tunnel through another channel. Both traffics cannot be tunnel in the same channel therefore providing a high level of data privacy. Departmental traffics will use its own VLAN channels [16].
Computers in the network will be set to use dynamic IP addressing. This will enable them to obtain network settings automatically from the DHCP Server in the network. DHCP Server will lease out IP from a certain ranges for example from 192.168.43.100 TO 192.168.43.254 will be lease out for clients. Reserved IP address are those used for dedicated servers, switches, routers and any other devices in the network.
Software Requirements
All the dedicated server will assigned static IP Addresses. In built firewall will be used to aid in securing ports and other services which are restricted from being accessed. In order for users to access the resources from this dedicated servers one must be identified and authorized through a central active directory server.
- DHCP Server
- DNS Servers
- Web Server
- File Server
- Active Directory Server
Backup are automated by use of schedule task process in windows servers. In Linux platform cron tab processes are being used to run a customize script to backup data. They are different types of backup being done for example full backup which is being done once then followed by incremental backup. Other types are hourly backup. The following are type of backups being done:
- Hourly Backup – This type of backup is done every one hour between working hours. The data is stored in an external hard drive before being move to permanent disk after one week. Backup logs are generated along with the backup files. The backup are stored for 2 weeks before being overridden.
- Weekly Backup –This type of backup is being done after every 5 working days of a company. The backup data store for a period of one month before being overridden.
The department in charge of all the backup services in the company is the ICT department. All the backup procedures and documentation are being taken care by the ICT system administrators. In case of any change the policy must be updated [12].
System administrators are responsible for checking backup logs along with the backup files. In case of any errors being reported in the backup logs administrators must find a solution and ensures that all the backup are running successfully [12].
All the storage disk in the network that are being used for backup must be replaced after a period of four years. In case of disk failures an urgent replacement must be done.
Hardisk wears out after sometime therefore there is a need to dispose in a safe manner. The Hardisk will contain confidential data therefore there is a need to be dispose in a secured archives.
The files that have already been backup will be put in a test if in case of disaster can be used for recover data.
Each file must be tested if ensure that the backup stored are working if in case of any disaster. This test will give an overview of backup being done in the organization if they are reliable or not. In case of backup failures a full backup will be recreated and tested to ensure that they are working.
The administrator doing backup must document all the backup test and its results for future references.
Conclusion
In conclusion, organization to achieve the best in business it requires minimum downtime in the network therefore there is need to implement a reliable, secured and scalable network that will support every need of a business.
References
[1]”What is DMZ (demilitarized zone)? – Definition from WhatIs.com”, SearchSecurity, 2018. [Online]. Available: https://searchsecurity.techtarget.com/definition/DMZ. [Accessed: 29- May- 2018].
[2]”Understanding Firewalls and Their Role in Network Security – Schneider Electric Blog”, Schneider Electric Blog, 2018. [Online]. Available: https://blog.schneider-electric.com/datacenter/2011/08/19/understanding-firewalls-and-their-role-in-network-security/. [Accessed: 29- May- 2018].
[3]B. Nelson, “How to Setup and Configure DNS in Windows Server 2012 – Install and Configure DNS on Windows Server 2012”, Tom’s IT Pro, 2018. [Online]. Available: https://www.tomsitpro.com/articles/configure-dns-windows-server-2012,2-793.html. [Accessed: 29- May- 2018].
[4]”Chapter 4: Installing and Configuring Microsoft DHCP and WINS Server Services”, Technet.microsoft.com, 2018. [Online]. Available: https://technet.microsoft.com/en-us/library/cc302637.aspx. [Accessed: 29- May- 2018].
[5]”How to setup FTP server / users on Windows 2012 R2?”, VPSie, 2018. [Online]. Available: https://vpsie.com/knowledge-base/how-to-setup-ftp-server-users-on-windows-2012-r2/. [Accessed: 29- May- 2018].
[6]P. Kennedy, “Microsoft Windows Server 2012 Hardware Requirements and Recommendations”, ServeTheHome, 2018. [Online]. Available: https://www.servethehome.com/microsoft-windows-server-2012-hardware-requirements-recommendations/. [Accessed: 29- May- 2018].
[7]”Install Active Directory on Windows Server 2012″, Support.rackspace.com, 2018. [Online]. Available: https://support.rackspace.com/how-to/installing-active-directory-on-windows-server-2012/. [Accessed: 30- May- 2018].
[8]”Star topology – Telecom ABC”, Telecomabc.com, 2018. [Online]. Available: https://www.telecomabc.com/s/star.html. [Accessed: 29- May- 2018].
[9]”Cisco Firewall Best Practices Guide”, Cisco, 2018. [Online]. Available: https://www.cisco.com/c/en/us/about/security-center/firewall-best-practices.html. [Accessed: 29- May- 2018].
[10]P. Support, C. Firewalls and C. Guides, “CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.5 – Introduction to Cisco ASA Firewall Services [Cisco ASA 5500-X Series Firewalls]”, Cisco, 2018. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/firewall/asa-95-firewall-config/intro-fw-services.html. [Accessed: 29- May- 2018].
[11] N. Ilyadis, “Five network trends challenging the enterprise”, Network World, 2018. [Online]. Available: https://www.networkworld.com/article/2931983/data-center/five-network-trends-challenging-the-enterprise.html. [Accessed: 29- May- 2018].
[12]”Full, incremental or differential: How to choose the correct backup type”, SearchDataBackup, 2018. [Online]. Available: https://searchdatabackup.techtarget.com/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type. [Accessed: 30- May- 2018].
[13]”Step-by-step Installation Guide for Ubuntu – MoodleDocs”, Docs.moodle.org, 2018. [Online]. Available: https://docs.moodle.org/34/en/Step-by-step_Installation_Guide_for_Ubuntu. [Accessed: 30- May- 2018].
[14]”Step-By-Step: Creating a Windows Server 2012 R2 Work Folders Test Lab”, CANITPRO, 2018. [Online]. Available: https://blogs.technet.microsoft.com/canitpro/2015/01/19/step-by-step-creating-a-work-folders-test-lab-deployment-in-windows-server-2012-r2/. [Accessed: 30- May- 2018].
[15]”What is Web server? – Definition from WhatIs.com”, WhatIs.com, 2018. [Online]. Available: https://whatis.techtarget.com/definition/Web-server. [Accessed: 29- May- 2018].
[16]C. Academy, “Basic Switch Configuration (2.1) > Cisco Networking Academy’s Introduction to Basic Switching Concepts and Configuration”, Ciscopress.com, 2018. [Online]. Available: