ITSA 2005: Server Project Report and Implementation Proposal

Verified

Added on  2023/03/30

|15
|2696
|381
Report
AI Summary
This report presents a comprehensive proposal for planning and implementing a server project, addressing the challenges of managing and installing software products, particularly in the context of a Contoso server. The project focuses on automating server installation to reduce time and cost, improving data transmission speed, and enhancing network security. It covers hardware and software requirements, proposes solutions for server centralization, domain controller configuration, and network infrastructure redesign to accommodate a growing number of users. The report emphasizes the importance of authentication, authorization, and limiting access to sensitive resources like SQL databases. Furthermore, it recommends centralizing servers, synchronizing network nodes, and automating the installation process to improve efficiency and concurrency. The report also suggests adopting agile development methodologies to streamline development procedures. The project aims to improve the speed and efficiency of data transmission.
Document Page
[Document title]
Affiliate Information
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[Document title]
EXECUTIVE SUMMARY
The workload of a server depends on the tasks and the number of users it can serve at the same time.
The speed depends on the workload. Contoso server at a datum has huge of the number of clients
connected. To increase the speed of transmission to all the users it needs to be configured in such a way
that it serves resources with latency and slower connections. The connection between the application
service and the domain is enhanced by the use of controllers which act as connectors between them.
The authentication is enabled at the connectors to ensure that all the services are secured and available
to limited users only.
The project focuses on the implementation of secure servers configured to serve resources to clients.
The process of setting up the servers is done automatically to reduce the amount of time needed to
change the configuration every time during the installation of new servers.
Document Page
[Document title]
Table of Contents
Introduction..........................................................................................................................................4
Purpose..................................................................................................................................................5
Design and implementation.................................................................................................................6
Requirements........................................................................................................................................7
Proposed solution.................................................................................................................................9
Recommendation................................................................................................................................10
Conclusion..........................................................................................................................................12
References...........................................................................................................................................13
Appendix a..........................................................................................................................................14
Document Page
[Document title]
Introduction
The management and the installation of software products is a huge task which requires documentation
and test designs for each of the phases. The development of a server architecture involves the use of
these designs to test and validate the process of installation and management of a new server.
This project main focus is the implementation of an automated server strategy. Configuring these tasks
requires a process which can be simulated in an attempt to make it easier to create an installation every
time. New improvements in the technology have provided new techniques for configuring and creating
an architectural design in accordance with the requirements. Security issues involved in the design is an
area that need focus to enable protect the integrity of the installation.
The steps involved in the development and of products are iterative in nature. Some of the procedures
are repeated during implementation. The best methodologies for the design should be selected. For
instance, to avoid the problem of repeating some of the same steps used in the development, component
reuse should be a good strategy to make use of all already developed components other than creating
new ones.
Before the initial stage begins, all the requirements need to be present. The designs and layout should
also be present. all the stages and the phases should be well understood and well documented to avoid
errors.
Automation simulates a series of monotonous tasks to single tasks which can be operated with minimal
time. Installation of hundreds of server's every time is a task which needs to be automated. Automation
enables execution of many tasks at the same time with reduced cost and resources.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[Document title]
Purpose
The process of installing new servers every month is a monotonous task, which should be avoided. This
task should be automated to reduce the amount of time and the cost involved. The main aim is the
implementation of a strategy to automate the process using a single task that is able to create thousands
of installations.
The synchronization between the product and the server which centralized within the network nodes
should be configured to avoid latency and increase the speed with which data upload is done.
The process is divided into several tasks. The design phase is involved in the design and a strategy for
the product. When the product is designed, the implementation of the product follows involving the
strategies and the techniques outlined in the requirements and the design phase (Shah,2013). After the
product is fully developed, the testing team is involved in testing the new product developed.
Testing ensures that the product developed is operational and meets the needs played out. Once the
product passes all the tests, the test team validates the product which can then be rolled and shipped to
customers (Mosberger and Jin, 2010). The tasks of design and implementation need to be in sync to
ensure the quality of the product in development.
Document Page
[Document title]
Design and implementation
The server is centralized between the wireless nodes to increase the speed of data transmission between
the nodes andthe server. The server is able to collect the data from the nodes so that it can be analyzed.
Packet loss is avoided by retransmitting the packets back to the server. The server is able to maintain a
record of the data it is receiving from the nodes and able to understand what streams of data to analyze.
The domain controller is configured in such a way that is able to communicate with the application
services and maintaining high levels of security at the same time (Van, Swift, Logan and Misra,
Microsoft Corp,2009). The communication between the SQL and the application services to the domain
controller is a verified process which requires authentication to ensure that only privileged users can be
able to access resources from the application services.
The domain controller should not be used for any purpose other than which is intended. Use of domain
controller for other uses may cause the synchronization to be slow between the application services and
data upload. It is therefore important to limit the domain controller to only functions such as domain
services only (Hoppe,Yoon, Whitehouse and Kodger, 2010).
Installation of the servers should be done at a single point, one process should be involved in
initialization, creation, and deployment of the server. Although this is a huge task, the processes should
be concurrent and should occur at the same time.
The nature of the server's being implemented is dependent on the type of processes that are used to
create a single instance of the service. Once a new process is initialized, the process should not be
terminated until every process of managing and creating an instance of a new server is complete.
It is important to have a layout of the procedural activities and the tasks that should be carried out,
before the design and implementation of a new prototype.
The growing number of users at a datum could pose a security threat and slow down the operation of
the services. To prevent this, the services need to be configured in such a way that multiple users can be
able to access the services at the same time.
Document Page
[Document title]
The application services should be modeled again to take care of the new users and the huge number of
users (Patwari, Kyperountas, Hero, Moses, and Correal, 2010). The process of remodeling the whole
services at a datum needs to follow the paradigms and the techniques stated in the iterative processes.
Requirements
Requirements can be divided into software and hardware requirements. Hardware is the physical and
which require physical installation while the software is a system that is involved in executing all the
functions and the sub-functions for proper working and operations of the system (Makoviy, Proskurin,
Khitskova and Metelkin, 2017).
The hardware requirements include:
Server
Processor
100 GB SSD Storage space for the processor.
Hypervisor
The operating system of choice.
Virtual machine.
Processor cache.
GPU card.
The new product being developed by Contoso is a home security product for monitoring equipment.
The speed and efficiency of the measuring instrument should be high to ensure reliability in the data
that is being sent to the user.
Therefore, the tools and the type of requirements used to develop the prototype for the new product
determines the nature of the product.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[Document title]
The type of requirements for a product is dependent on nature and the quality of the product needed,
the service at Contoso Corporation should handle multiple processes and users and the same time, and
therefore the server should be designed to fit all these needs.
The software requirements are the tasks that are executed to do something. For instance, a series of
programs or commands executed to initialize and complete the process of the server installation. The
software requirements can be a series of scripts or a packaged program.
Software is used to manage and control the tasks that are in operation, for instance when control fails a
server instance is executed to ensure the service is up and running (Yeung, Cha and Pang, Inventec
Corp, 2008). The subtasks created by the software should be compatible with the type of hardware
used.
Document Page
[Document title]
Proposed solution
The solution to the paradigms of these projects falls into:
Installation of new servers.
Configuration of the domain controllers.
Design of the equipment for home and medical monitoring.
Redesigning of network infrastructure at a datum.
The automation strategy is meant to simulate and automate the process of building and installing new
servers. To solve this problem, a model needs to be designed and configured in such a way that is able
to create an instance of a server without the need to start from scratch.
The servers need to centrally position within the network nodes. The nodes are synchronized in such a
way that they can be able to access the server's at any time and upload the data without lower latency
(Kenner, Colby, and Brownell, Intervu Inc, 2011).
Modeling of equipment to do the task can improve nature and the way in which the server is
implemented.
Configuring the domain controllers to communicate with the application services is a process which
needs authentication and authorization of the users accessing the services (Tittel and Stewart, 2011).
This provides an extra layer of abstraction that is used to manage and maintain the way in which they
communicate. The interactions between the services and the domain should be monitored by a service.
The domain controller should be configured to handle the functions of establishing interactions with the
services only (Jun, ChaoJu and HeJin, 2010,). The domain controller should not be used for other
functions such as sharing of the printer. This ensures that the speed of access to the services is faster
within the same architecture.
Document Page
[Document title]
A limited number of users should be allowed access to the domain and access to the services such as
the SQL. SQL is used to store the data records and retrieved when needed, limiting access to users,
maintains the integrity of the data and its efficiency (Agrawal, Chaudhuri, Kolla, Marathe, Narasayya
and Syamala, 2015).
The network infrastructure at Adatum should be reconfigured in such a way that it allows and is able to
accommodate the growing number of users. The higher the number of users accessing the network at
the same time, can result in lower speed. To increase the speed of access with the increasing number of
users, the infrastructure needs to have different access points within the vicinity of the users to increase
the bandwidth of access and connectivity (Priyantha, Kansal, Goraczko and Zhao, 2008).
Recommendation
The server needs to be centralized between the network nodes to increase the speed with which data is
collected from the nodes. Each of the nodes should be situated strategically around the central server.
The server and the wireless network nodes should be synchronized to reduce latency between the data
upload and transmission.
Packets which have not been transmitted from the nodes to the server should be retransmitted again, to
avoid the problem of packet loss, streams of data sent to the server should be in synch with the
endpoints at the server.
The process of installing new hundreds of server's every month is a huge task, which consumes a lot of
time and resources during every installation. This process needs to be automated in such a way that
every instance of a new server uses the configuration of each of the original installation. Consecutive
installation should inherit from the previous installation. This is a way of reducing the amount of time
used to create the server's and improve concurrency and efficiency of the installation.
Adoption of the paradigms involved in agile and crud development is an important technique that can
ease development procedures and the amount of time involved in the delivery of the final product.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[Document title]
Domain controller should be installed as a single unit and configured in such a way that all the
processes between the application services such as the SQL remain synchronized.
Some of the products and services should be reused to avoid the creation of similar services at another
endpoint. For instance, some of the application architecture Contos corporation should be customized
and inherited at Adatum . Product and service reuse is a technique which reduces the cost and the
amount of time spent during the implementation of similar services for the same corporation.
The communication between the design, development and the testing teams should be maintained with
high integrity due to the nature and the kind of services that are being implemented.
Server installation should be an automated task with a single instance of configuration. Each of the
tasks should be dependent on the previous task to ensure concurrency and speedy development (Mason,
Laing, MacIntyre, and Pletcher, Microsoft Corp, 2010)
Document Page
[Document title]
Conclusion
Improvements and introduction of new techniques in the field of technology have initiated ways of
integrating and developing secure products. The implementation of a product is dependent on the type
of design implemented for the product. Good design implies faster development with reducing cost and
time. The process of testing is in accordance with the phases involved in the development of the
product. Testing is the last step in the design and implementation of a product.
If a product fails during the testing phase, it then fails to meet the requirements and should not validate.
Poor implementation designs and strategies are the possible causes of failure. The most important
phase is the development and the testing phases which involves the design of the product and validating
the implementation of the product to ensure that it meets all the necessary requirements.
The paradigms and the methodologies involved in agile and development of projects should be
incorporated into the task.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]