Network Design and Directory Structure of TTF
Added on 2023-04-19
16 Pages2928 Words115 Views
Running head: NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Network Design and Directory Structure of TTF
Name of the Student
Name of the University
Author Note
Network Design and Directory Structure of TTF
Name of the Student
Name of the University
Author Note
1NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Summary
The purpose of this report is to analyse the network requirements of Talon Textile Fasteners
(TTF) and suggest an upgraded network design that meets the demands of the expanding
business. The report starts by summarizing the requirements in a requirements specification
table and proceeds to suggest the upgraded network design while also mentioning the IP
address related specifications. Then the components of the active directory are explained by
talking about the Sites, Organizational Units and Groups where added focus is given on role
of users with respect to the organizational units and domains. Thereafter the server layout and
role are discussed and various project specific documents like sign-off, task list and test plan
are given. Then the report lists the maintenance plan and discusses about router and server
specifications afterwards. The report then ends with conclusions drawn from the study.
Summary
The purpose of this report is to analyse the network requirements of Talon Textile Fasteners
(TTF) and suggest an upgraded network design that meets the demands of the expanding
business. The report starts by summarizing the requirements in a requirements specification
table and proceeds to suggest the upgraded network design while also mentioning the IP
address related specifications. Then the components of the active directory are explained by
talking about the Sites, Organizational Units and Groups where added focus is given on role
of users with respect to the organizational units and domains. Thereafter the server layout and
role are discussed and various project specific documents like sign-off, task list and test plan
are given. Then the report lists the maintenance plan and discusses about router and server
specifications afterwards. The report then ends with conclusions drawn from the study.
2NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Table of Contents
Introduction................................................................................................................................4
Discussion..................................................................................................................................4
Requirements Summary.........................................................................................................4
Upgraded Network Design.....................................................................................................5
Active Directory.....................................................................................................................6
Sites....................................................................................................................................6
Organizational Units..........................................................................................................6
Groups................................................................................................................................6
Server specifications..............................................................................................................7
Number and location..........................................................................................................7
Server Role.........................................................................................................................7
Approval sign-off document..............................................................................................8
Server maintenance plan............................................................................................................9
Router Specifications...........................................................................................................10
Security plan and policy.......................................................................................................11
Defence in depth..............................................................................................................11
Perimeter Design..............................................................................................................11
Remote Access.................................................................................................................12
Threat Identification.........................................................................................................12
Policies.............................................................................................................................12
Disaster Recovery................................................................................................................12
Table of Contents
Introduction................................................................................................................................4
Discussion..................................................................................................................................4
Requirements Summary.........................................................................................................4
Upgraded Network Design.....................................................................................................5
Active Directory.....................................................................................................................6
Sites....................................................................................................................................6
Organizational Units..........................................................................................................6
Groups................................................................................................................................6
Server specifications..............................................................................................................7
Number and location..........................................................................................................7
Server Role.........................................................................................................................7
Approval sign-off document..............................................................................................8
Server maintenance plan............................................................................................................9
Router Specifications...........................................................................................................10
Security plan and policy.......................................................................................................11
Defence in depth..............................................................................................................11
Perimeter Design..............................................................................................................11
Remote Access.................................................................................................................12
Threat Identification.........................................................................................................12
Policies.............................................................................................................................12
Disaster Recovery................................................................................................................12
3NETWORK DESIGN AND DIRECTORY STRUCTURE OF TTF
Conclusion................................................................................................................................13
Bibliography.............................................................................................................................14
Conclusion................................................................................................................................13
Bibliography.............................................................................................................................14
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Network Design and Implementation Plan.lg...
|19
|3503
|206
Network Design Configuration and Securitylg...
|19
|3997
|243
IT Networking in Talon Textilelg...
|10
|2476
|148
Assignment on Network Design and Implementationlg...
|18
|3281
|32
Network Design Assignment (Doc)lg...
|20
|5604
|583
Network Infrastructure Upgrade for TTFlg...
|14
|1973
|98