Sally Lowe, Crystal Coochise, Brian Mills, Craig Jackson
NTC 362
March 16, 2015
Christina Spencer
Context
Introduction
SDLC Phase 1 Problem Recognition
SWOT
Current Status Assessment
Strengths
Weaknesses
Opportunities
Threats
Current facilities
Current Staff
Problem Definition
Feasibility Study
SDLC Phase 2 Requirements Definition
Operational Requirements
Access Requirements
Security Requirements
Equipment Requirements
Network Requirements
Workstations
Storage Requirements
Accessibility Requirements
References
Final Team Network Proposal for TrainAmerica
Introduction
Our company is called TrainAmerica; we are in the technology training business focused on Microsoft products such as the …show more content…
MS Office suite, MS Networking product training and MS certification training. Our mission at TrainAmerica is to provide the most sought after training expertise for Microsoft products within our training area and to continue to provide excellent instructors with the experience needed to exceed the student’s expectations and needs (Spencer, 2015).
To accomplish this we need to be able to implement a flexible network that can grow in a uniform manner that is easy and affordable to implement and manage, as well as being state of the art in its ability to provide services to the customer. Currently, all employees have a Pentium stand-alone PC with MS Office 2000 and Windows XT. The only network is a 5 station Lantastic network in accounting.
The new network is going to allow:
All employees to share databases.
All employees to share scheduling.
All employees to have secure company e-mail.
All employees to be able to e-mail out to non-company people.
Videoconferencing for sales staff and administrators.
Administrators and sales people to have World Wide Web access.
Remote access for employees when working from home.
Connections in each training room so that trainers and students can connect to the World Wide Web.
Firewall connection to the Internet.
Intranet in the future, if not to be part of this network.
Systems need to be easily replicated in new branches.
SDLC Phase 1 Problem Recognition
The mission of TrainAmerica is to provide the most sought after training expertise for Microsoft products within our training area and to continue to provide excellent instructors with the experience needed to exceed the student’s expectations and needs.
What are the goals for TrainAmerica?
1. It is the goal of TrainAmerica to provide state of the art training equipment to fulfill the needs of our customers training requirements.
2.
Also, it is our goal to provide training on all Microsoft applications and software that most competing companies will require to ensure TrainAmerica remains on top. What are the Objectives of TrainAmerica?
We will install a state of the art network allowing access to the Internet from every workstation, as well as provide an infrastructure that can be used as an example for those learning how to develop superior network design. We will also be able to provide a faculty for video conferencing not only for internal use but also for our customers.
We will create an infrastructure so that we can provide cross site scheduling for our customers to assure classes are available when they need them.
We will create a sales force automated systems that will allow us to better serve our community and increase revenue at least 5%. And more efficiently service our current customers increasing customer service at least 10 %.
SWOT
In every project or business, running a SWOT analysis will help in determining various questions, to help the success of the project or the business. Here is some list of questions that should be asked for each one of the four categories:
Current Status Assessment …show more content…
Strengths: What do you do well (in sales, marketing, operations, management)? What are your assets? What are your core competencies? Where are you making money? What experience do you have?
Weakness:
What do you need (customer service, marketing, accounting, and planning)? Where do you lack resources? What can you do better? Where are you losing money?
Opportunities:
What new needs of customers could you meet? What are the economic trends that benefit you? What are the emerging political and social opportunities?
What are the technological breakthroughs?
Where niches have your competitors missed?
Threats:
What are the negative economic trends?
What are the negative political and social trends?
Where are competitors about to bite you?
Where are you vulnerable?
Current facilities
There are three buildings within two thousand feet of each other, plus a branch within the same state. Building 1 is owned, building 2 and 3 are leased. Building 1 has ten training rooms, building 3 has twenty training rooms, and the branch facility has ten training rooms.
Current Staff
Building 1 contains one financial person in the bookstore and one Computer person. Building 2 will house three administrators, five financial people in the Accounting department, five sales employees, and three customer and technical support personnel. Building 3 will house two new technical support people. The branch facility will have one Administrator, two sales people, and one support technician person.
Problem Definition
The problem that exists with the entire overhaul of a network upgrade is that it is not just centralized into one location. This overhaul will have to be completed by replacing all older equipment throughout each location. Since it has been proposed to add in at least three more learning centers in the next five years in which the training rooms must have ten workstations per trainer workstation. However the budget has been set for 800k and the timeline has been given 90 days. The main problem with this project is the cost of all new equipment as well as configuring the network so that all branches can be connected simultaneously to share the same information safely, quickly, and securely. Feasibility Study
Every system in the company has to be updated. This includes the each workstation from computers, monitors, routers, modems, fax, and printers. Each workstation will cost roughly 500$.
SDLC Phase 2 Requirements Definition
Operational Requirements
We will install a state of the art network allowing access to the Internet from every workstation, as well as provide an infrastructure that can be used as an example for those learning how to develop superior network design. We will also be able to provide a faculty for video conferencing not only for internal use but also for our customers.
We will create an infrastructure so that we can provide cross site scheduling for our customers to assure classes are available when they need them.
We will create a sales force automation systems that will allow us to better serve our community and increase revenue at least 5%. And more efficiently service our current customers increasing customer service at least 10 % (Spencer, 2015).
Access Requirements
Table 1 lists the Functional Access Requirements.
All Employees
Administrators
Sales Staff
Shared Database Access
Yes
Yes
Yes
Shared Scheduling
Yes
Yes
Yes
Company email
Yes
Yes
Yes
External email
No
Yes
Yes
External Internet Access
No
Yes
Yes
Video Conferencing
No
Yes
Yes
Remote Access from Home
Yes
Yes
Yes
Table 1- Functional Access Requirements
Security Requirements
The main security concern is the safeguarding of client information. Employee information will need to be safeguarded as well. A strong encryption system, along with a secure firewall should be sufficient. Users, both employees and clients, will be required to login to their individual account. Access can and will be limited based on the user account. It will be important to stay current on update software upgrades and security enhancements. The current setup for security the company has only a welcome greeter at the front door. The security for the company should consist of user passwords to connect to the intranet, and possibly security clearance cards to enter the building. When adding a database to the enterprise it is vital to have levels of security put in place so that only qualified users can access necessary information. The janitor should not be able to access the human resources files for example. It is also important to ensure that the intranet and any system connected to a firewall enabled to reduce the risk of having important information taken.
Equipment Requirements
Network Requirements
As all workstations will need to have full Internet access and the capability of video conferencing, there will need to be a strong firewall in place. A new backbone will need to be installed, especially as most areas do not currently have internet access of any kind.
Workstations
All workstations will be new, with state-of-the-art hardware and software. Leasing options will be looked at strongly to help with the security and upgradeability requirements. There will be workstations for all employees, which number approximately thirty at the present time. There will be fifty training rooms initially and each training room will require ten workstations, one trainer workstation, a projection device, a printer, and a phone. All workstations will have full internet capabilities
Storage Requirements
Looking at the strengths of this system in place, there are a minimum of 466 Pentium stand-alone PC’s with MS Office 2000 and Windows XT with only five connected to a Lantastic network in accounting, so everyone has a workstation to work on in order to do their job. Accounting may be the strongest section since they have the ability to connect to the network. Seeing that MS Office 2000 is being utilized on windows XT platforms is a good thing because it means the company can function with the tools that it has, even though they are a little outdated it is better than having nothing to work with to accomplish the job at hand. Also the fact that the company is leasing two buildings besides the one they are in for expansion and space is a good thing that may even increase morale since there is no overcrowding of employees to a building. With the added space more activities can be carried out to include video conferencing, and training on systems. Storage must be accessible for up to 250 miles away in the same state and be available in other states and countries in the future. Depending on how much data the company stores, and the rate at which they use up space on a company database will determine the size the database needs to be.
Looking at the weaknesses of the system, TrainAmerica has no joint database to share company information, no scheduling program and no secure company e-mail for storing important information for the company.
Their systems are out of date, need internet installed with firewall, Microsoft office 2000 could be updated to Microsoft Office 2013 or Office 365 depending on how they want to function. There is no satellite internet or intranet page set up to store data for the company so that it can be seen by other branches of the company, besides a Lantastic network in accounting there is no network set up to reach every employee in the company so that they can email non company people or have remote access to. Then there is the operating system that can be upgraded to a current operating system like Window’s 10. This may mean that the Pentium PC’s may need upgrades to the memory or RAM and may even extend to upgrading the motherboards or whole system if they cannot be easily upgraded. It is also important to look at whether the company will be using a virtual private network, or if each system will need software installed on them. Looking at licensing costs for a company to update all of their systems to the current standards may need to be evaluated. There are no security requirements set up for protecting the database, to include physical security of the main system, backups, firewall, security policies, an Intranet and Internet setup, antivirus or threat
detection.
Accessibility Requirements
Looking at the strengths of the accessibility requirements, everyone has access to a workstation with Windows XT and Microsoft Office 2000. They all have the same access no matter where they are but on the down side there is no security requirements that protect who can access what data. The good thing about that is the computer will be set up so that the employee can do their job with the current programs in place and have as much space as the computer allows for storage.
Looking at the weaknesses of the accessibility there are no locks put on information to keep it from being copied and taken from the workplace. Some departments may need to see files from other departments to function and so when there is no network or database in which the company shares information between its employees, the company suffers due to the need to communicate between platforms. Without the Internet, the files cannot be transferred amongst the company branches or even from workstation to workstation. It would also not be easy for the company to communicate with customers outside the company without the Internet, fax line or phone lines as well. If remote access is enabled from outside the company than information that is accessed by an employee from home could end up in the wrong hands. Making sure that back ground checks and security levels are given to those that have passed the investigation process should be completed and access control locks should be setup so that only those authorized to see certain info can view it without giving all of the info to every employee should be important to the company.
Speed Requirements Looking at the strength of the systems and their speed, the systems seem to be running at a decent speed running Windows XT and Microsoft Office 2000. Depending on the amount of customers, the amount of data that will need to be stored, and the amount of space the programs take up will affect the speed.
Also depending on if the system is setup with twisted pair, coaxial cable or fiber optic connection for Internet and intranet connection will affect the rate at which the system is running. Having a Lantastic connection may help the accounting department to improve their speed of operation but will not help the entire company to efficiently provide service to other parts of the company or its customers. Looking at the weaknesses of the speed requirements it is important to note that the system is out of date, does not have a scheduling system, no internet or intranet connection with a fast speed as in fiber optic capabilities, or firewall to protect it from incoming attacks. Without a network in place it would be hard for information to be sent to other employees or customers to take care of a job at hand. No one should have to go through not being able to be successful working with customers or other employees just because there is no network to send the files or have problems with storage and retrieval just because there was not enough room on the workstation due to no database in place to hold the files.
SDLC Phase 3 Architectural Design
In keeping with the short implementation schedule and the limited budget available, a simplistic design approach will be maintained, all in keeping with system requirements.
Computing Platform
Since Train America is involved with training on Microsoft products, Microsoft products will be chosen for the upgraded system design. All desktop computers will be Inspiron 23 5000 Series by Dell, with Windows 8 and will be password protected.
Windows Server
Windows Server 2012 will be utilized as the main network server and reside on a separate PC dedicated as a server. The PC will be configured with two network adapters, an ISP adapter to connect to the Internet connection device and a local network adapter. This will allow the firewall built into Windows Server to be utilized ("Securing Your Windows Small Business Server 2003 Network", n.d.). Windows Server also allows remote access.
Database Server
A separate PC running SQL server will serve as the database server. SQL Server will allow for authentication and verification of database requests for security purposes.
Infrastructure
All locations, current and future, will connect with each other through the Internet. A 100 Base T Fast Ethernet backbone will be installed for the Ethernet connection between devices.
Building 1 Network
Building 1 local area network (LAN) will consist of a 100 Base T Fast Ethernet backbone connecting through a network hub to the network server, a Dell Inspiron 23 5000 Series PC that is running Windows Server 2012. The network server connects to the Internet through an Internet connection device, such as a DSL modem provided by the local Internet service provider.
Training
The training room in Building 1 will contain ten workstations (Dell Inspiron 23 Series 5000 PCs) and a shared laser printer. Each workstation will have a guest profile set up for students that will not have access to any system files, anything on the LAN, or the Internet. All employees will be trained on the appropriate aspects of the network that they will be required to use. Appropriate documentation will be made available for all employees.
Company Personnel
Building 1 will house one finance person in the bookstore, two support people, and one computer person. Each employee will have a desktop PC for a total of four PCs and a shared multifunction laser printer.
Database Server A dedicated desktop PC running SQL Server will be the database server. The database will be password protected and only those accounts that are authorized for database access will be allowed in.
Building 2 Network
The network in Building 2 will be the same as Building 1 with the exception the number of PCs for company personnel. There will be sixteen total PCs for company employees.
Building 3 Network
The network in Building 3 will be the same as Building 1 with the exception the number of PCs for company personnel. There will be two total PCs for company employees.
Branch Location Network
The network in the Branch location will be the same as Building 1 with the exception the number of PCs for company personnel. There will be three total PCs for company employees.
Selections and Costs The selections and costs of implementing this network will be discussed with the decision makers to make sure that it is cost efficient, and affordable and meets the needs of the company. A discussion will be made on weather to use off the shelf software or to be developed by the programming team specifically for the task at hand. Maintenance and future developments will be discussed as well to determine the needed system. If contracts must be set up to ensure maintenance and repair with distributors of software or from programmers this will be discussed at this time.
Backup and Recovery
Database backup and recovery will be managed directly within SQL Server using the Microsoft Azure Tool. This allows backups to be stored on the cloud.
SDLC Phase 4 Solution Design
Solution Design Mapping and Descriptions Microsoft Outlook should be implemented in the environment so that the employees can accomplish the mission of being able to email outside sources along with internal sources as well. There should be encryption set up on email and firewall set up between the network and the Internet. An Intranet site should be set up at this time as well in order to secure important company information and to make it available for use through the company. Access Control should be set up with authentication and permissions so that those who have the proper security level and access codes can access the information without letting just anyone have access to that information. Patches and updates should be applied to the products as needed and running anti-virus and malware protection should be set up with maintenance done on each of the systems regularly will help make sure that they are working properly. It would be important to have an external server for backing up information so that in the event of a break down or system crash it can be recovered from the server to either implement on a fixed system or a new one.
Requests for Proposals
After determining the requirements for the system, doing research and looking at future needs vs. current needs than a system can be either created or bought. After breaking down the potential options for the project into a proposal it will be up to the company to determine which needs and wants they want to invest in that is affordable and efficient for the company to increase sales while making things better for its employees. This will include two important decisions. A determination to have the system built or bought, along with a cost break down will help the company to determine which they would rather implement and which option will have the most advantages
Buy Vs. Build
If the company needs a customized and built system they will need to take into account what is out there and how much it will cost. If building a system the company will have to take into account how long it will take, what options they will need and how much will be charged for the job. If they want to buy the equipment or software for their systems than they will have to take into account who will do the maintenance how popular is the product, does it have the options needed that will take care of the needs of the company and will it be phased out in the future and will they need to update in the future to a new system. How much will each of these things cost?
If building than the maintenance of the system will include Coding and debugging where the final system will be set up and tested by several programmers to minimize the risk of the system having any problems or errors when it is implemented. The system will be tested to make sure the actual system works in the environment that it was meant for and that all of the old system is implemented into the new system and that everything is working as intended. Coding and debugging can be used with off the shelf software to make sure they are working correctly as well, but this is not always the case when you purchase a program, there may be locks and different coding that may need someone knowledgeable in how to fix it or may need certain equipment or passwords to edit it for all platforms.
Design for Maintenance and Future Developments
Setting up a network for accounting with firewall protection and implementing fiber optic will help with speed and setting up a local area connection will help to make sure the company works as efficiently as possible. Making sure to have accountability for systems by implementing a sign-out system will help to make sure that employees who want to take computers home to work remotely from home will be able to while still being held accountable for bringing back the equipment. Setting up a network to reach all computers will be easier when setting up a Local area connection within the workplace and a wide area network for reaching those at their home or vacation locations. Making sure that authentication, firewall protection and security logs are checked regularly will along with an Intrusion protection system and anti-virus and malware protection will help keep the systems healthy while protecting the systems from malicious activity.
Backup and Recovery Methodologies Implementing a server dedicated to nightly backups of all systems can help ensure that the systems are protected even if the hardware or software has problems. The company can set up a maintenance plan to make sure that their equipment is tested, maintained and replaced as needed will help ensure that the systems are healthy, ready for business and working like they should. This will mean that they can hire their own on site IT team with backup equipment to fix the equipment as needed or set up a contract with a contractor that can handle service calls and visit to do maintenance for a fee that is set up. One of these personnel can be available for any upcoming problems, the only decision to make is how it will be done and how much it will cost depending on what system is selected.
SDLC Phase 5 Implementation
Installation
The first stage in the Implantation phase will be the installation of all wiring, hubs, switches, and fiber that is part of the infrastructure. This is followed by the installation of all hardware such as servers, end nodes, PCs, printers, software, and applications.
Complete testing of New Hardware, Software and Applications
The next stage of implementation will be the complete testing of hardware and software components in the system.
Conversion
This is where the old system will be converted to the new system and testing will be conducted on how well it performs the activities that the employees need to do their job.
SDLC Phase 6 Evaluation and Evolution
Review of Systems In this part of the testing satisfaction surveys could be completed so that an analysis can be completed on the current system and how they are functioning. User feedback from the employees can be collected about the systems to see what needs to be improved and the system can be tuned to work as the employees would like so that efficiency can be increased. This will help make sure the new systems are working as well as possible and that things are fixed to maximize time and profit to the company.
Conclusion
The new network is now complete and is fully functional. At this point it is important to ensure the new system is working the way it was designed and needs are being met. Routine maintenance will be performed periodically, to keep the system running efficiently. System and virus definitions are kept up-to-date as technology changes or new threats being discovered. User training will be conducted for both new employees from upper management to lower-level employees and contractors to acquaint everyone with the new system. Technical support will be included at all times, should there be any issues with the new system. Since TrainAmerica system development project, correcting errors is more difficult at this stage as opposed to the Development and Implementation stages. This is not to say making corrections are not impossible, if there is a last minute change of requirements, TrainAmerica may be required to redo the entire project.
References
Spencer, C. (2015, Winter). SDLC Information and Lecturette. Retrieve from https://classroom.phoenix.edu/afm214/secure/view-thread.jspa?threadID=58258216
Spencer, C. (2015, Winter). TrainAmerica Documents. Retrieved from https://classroom.phoenix.edu/afm214/secure/view-thread.jspa ?threadID=58041280
Securing Your Windows Small Business Server 2003 Network. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700836.aspx