ITSA2005 Project Report: Planning and Implementing Server Solutions

Verified

Added on  2023/01/17

|13
|2725
|27
Report
AI Summary
This report details a server planning and implementation strategy for Contoso Corporation, focusing on automated server installation. The project involves evaluating the existing infrastructure of Adatum Corporation to identify issues and propose a network redesign to support organizational growth. The report analyzes the number of offices and users to determine server deployment and domain controller configuration requirements. It identifies necessary applications and services for each department, leading to the development of a network solution proposal. The report emphasizes the need for a hierarchical network design and modular design provided by Cisco Enterprise Architectures. The project aims to control operational costs, actively maintain the network, and enhance security through firewall rules, antivirus software, and virtualization. The report also addresses the need for redundant links, increased network security, and backup configurations to handle network failures and downtime. The conclusion highlights the importance of selecting an appropriate architecture to increase efficiency and performance, along with the need for verifying data generated from home security and medical equipment to determine server requirements. Sector-based images are proposed for faster deployment and configuration adjustments. Desklib provides this and many other past papers and solved assignments.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: PLANNING AND IMPLEMENTING SERVER
Planning and implementing server
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
PLANNING AND IMPLEMENTING SERVER
Executive Summary
The report introduces about the automated server installation strategy developed by Contoso
Corporation. The infrastructure of Adatum Corporation is evaluated for the identification of
current issues in the organization and propose redesigning of the network and support the growth
of the organization. The number of offices and users needed to be served is needed to be
analyzed such that server can be deployed and the domain controller is configured. The
application and service that are needed in each of the department is identified for the
development of the server deployment and configuring the domain controller. A proposal for the
network solution is developed after analyzing the requirement and.
Document Page
2
PLANNING AND IMPLEMENTING SERVER
Table of Contents
Introduction......................................................................................................................................3
Purpose of the Project......................................................................................................................3
Project Requirement........................................................................................................................4
Solution Proposed............................................................................................................................5
Hierarchical Network...................................................................................................................5
Modular Design provided by Cisco Enterprise Architectures.....................................................7
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
Document Page
3
PLANNING AND IMPLEMENTING SERVER
Introduction
The report is prepared for the development of an automated server installation strategy by
Contoso Corporation. The corporation is a producer of smart devices for the home and the design
team of the organization is currently working on home security monitoring and medical
monitoring project. The project has the need to collect data from the wireless nodes and store it
in a central server. The report is prepared for the identification of server requirement and the
services that are needed to be installed in the server for configuring it such that the collected data
can be analyzed. The new solution is needed to create hundreds of new servers per month and
thus the strategy that can be implemented for automating the server installation plan is discussed.
The acquirement of another company is considered for the development of the server solution
with the services that are essential for the development of server installation plan.
Purpose of the Project
The project mainly aims in developing a server installation plan for Contoso Corporation that
helps in supporting the new project of home security monitoring and medical equipment
monitoring project. With the implementation of the automated server installation the
organization can gain different benefits such as:
Control the operation cost of the organizational network – The maintenance, software,
hardware and service cost can be reduced with the virtualization of the server and
selecting cloud options for increasing the scalability and performance based on the
demand (Comcol.nl. 2019). The solution is needed to be aligned with the business growth
such that productivity and efficiency of the organization increases.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
PLANNING AND IMPLEMENTING SERVER
Active maintenance of the network - The selection of the third party cloud server would
help the managers and other business official to concentrate on the project and improve
the feature rather than wasting time maintaining the infrastructure. Security checks and
needed to be performed such that there is no disruption in the network and the production
is improved.
Security – The server is needed to be configured with firewall rules and active directory
such that the unknown users are blocked from accessing the resources available on the
server. The technology that can be applied for the configuration of the server is needed to
be identified and antivirus software is needed to be installed in the client machine and the
server for detecting malware, virus, and spyware and secure the information system form
different types of network attacks (Gichuru 2016). The malware and spyware can have a
negative impact on the organization and thus the security measure is needed to be
implemented for improving the security of the proposed network framework.
Increase availability – Virtualization is needed to be implemented such that the sever can
handle more number of request from the user and help the business to run smoothly. The
service quality is needed to be improved and the server should respond shortly for the
user request (Chao, TANG and LIU 2016). The flow of traffic in the network is needed to
be monitored for identifying the bandwidth usage and management of traffic in the
network.
Project Requirement
Contoso Corporation have the requirement of planning and implementing 100 of servers for
the management of the project and install Windows Internal Database (WID) for replacing the
inventory. The company also needs to redesign the network framework of the newly acquired
Document Page
5
PLANNING AND IMPLEMENTING SERVER
organization for meeting the needs of automation of server installation (Gaset 2018). The
following are requirement that are identified for the development of new network solution for
Contoso Corporation:
Handling network failure and use countermeasure for reducing the recovery time of the
network
Use of redundant link for ensuring that no data packets are lost in the network and data
packets reach the destination address finding the optimized path.
To increase network security and enabling updating and patching the system after a
regular interval of time for eliminating the security vulnerability and prevent leakage of
data
The network failure and the risk are needed to be troubleshoot and the configuration of
the network is needed to be backed up such that it can be restored for handling network
downtime.
Solution Proposed
Hierarchical Network
For organizing devices that are of multiple domains or in the multiple networks, the design of
hierarchical network is required for meeting all the network requirements. There are three layers
present in hierarchical network.
Core layer: In the distribution layer the devices are connected.
Distribution layer: The small local networks are interconnected.
Access layer: The end devices and the network hosts gets the connectivity.
Document Page
6
PLANNING AND IMPLEMENTING SERVER
In case of making local traffic hierarchical blocks that are manageable gets divided from the
flat network or it gets divided into smaller groups. All undesirable traffic present in the network
cannot be blocked and not even allow to handle broadcasts in case of the devices present in the
flat network (Chekryzhov, Kovalev and Grigoriev 2018). In any case if more devices are added
or even other applications are added in this network the time of response decreases and it takes a
huge amount of time.
Core layer:
This type of layers is designed for faster switch packets. This layer can perform very high
speed of switching. Access lists or else filtering, this type of packet manipulation should not be
performed in this layer. By doing such it decreases the packet switching (Hallett and Aspinall
2017). The core layer consists of high speed technology, besides the links are aggregate, the
routing protocol are much enhanced even it has load balancing technology.
Mesh topology:
Mesh topology is used in case of core layers. Partial mesh is one and full mesh is the other
two methods in which wiring process is done in mesh topology. All of the tools are connected to
one another in case of wiring system those are full mesh, thus this takes huge amount of cost
(Kantor, Starkschall and Balter 2017). In case of partial mesh topology if one device if connected
with another device it can provide enough redundancy. The complexity of the wiring system gets
reduced.
Distribution layer:
In this case the core layer with the access layer gets filtered and the distribution layer also
deals with communication point and also with filtering. Traffic flow handling and filtering are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
PLANNING AND IMPLEMENTING SERVER
the two main functions of this layer. Before the routes are advertised to the core summarizing of
the routes occur (Demidov, Pyvovar and Kravchenko 2018). The control policy thus accessed
thus enforced and the cores are isolated from the disruptions of the access layer.
Access layer:
In case of the resources of internetwork thus layer is needed for user handling. Here is the
connection of all end devices. Campus building is resided in the access layer besides of which
server farm and edge of company is also resided.
Modular Design provided by Cisco Enterprise Architectures
In modules the hierarchical design is divided into three-layers. Many types of logical or else
physical connectivity is defined by these modules. The network design which is modular are of
three layers, such as:
Enterprise Campus:
In any of unit campus for any independent operation this area comprises network element.
This is consisted of core campus, distribution building and access building.
Server farm:
Server resources are prevented from server firm and besides it gives better connectivity with
high speed.
Enterprise Edge:
Whenever new traffic enters campus network, enterprise edge blocks the external resource’s
traffic and it is directed to enterprise network. Various efficient communication that occurs
Document Page
8
PLANNING AND IMPLEMENTING SERVER
between locations that are remote with the enterprise campus for this type of communication
enterprise elements contain better elements (Braun, Ekler and Fitzek 2016).
Methodology:
The network infrastructure is carried out after which some criteria are analysed such as,
understanding the requirement of the network, existing system are characterized, network
topology is designed and all its solutions.
There are five phases in which the project is completed:
Project initiation:
The Adatum which is analysed by business scenario, opportunity and the problems of
business and in case of alternative solutions the cost and the advantage is developed by
Contoso in the particular phase. In case of determining one of the proposed architecture a
study of feasibility is carried out that whether Adatum will solve the issue or not. For the
purpose of people employment and thus assign them into various roles and various
responsibilities, a project character will be established into the project department (Crnko
2017). The head of projects will review all later phases in any life cycle of later phases and
then it will also be discussed with the employees.
Project Planning:
All the phases time frame and all the activities that are required to complete any project that
are consisted into the project pan which are developed by project members. Financial plan,
communication plan, acceptance plan, resource plan, risk plan, procurement plan and quality
plan, these are the types of plan which are established (Lu et al. 2018). All the factors of an
organization is analysed by the impact of the project.
Document Page
9
PLANNING AND IMPLEMENTING SERVER
Project execution:
Delivery items of the project is to be deal in this phase. Various methods of management
such as time management, change management, issue management, procurement
management, cost management, risk management quality management and lots more are to
be performed and this is handled in this phase. Execution of the final project is done in this
phase.
Project testing:
Contoso which is consisted of the quality control team will test the particular network. After
that if the product is free of error then Adatum will implement the product. The variable
present in the infrastructure of the network is to be examined and further it is to be revised
carefully and then after it is to be submitted finally (Rahman et al. 2016). Keeping in mind of
the vulnerable attacks that can occur into the infrastructure and thus which will cause
negative impact to the Adatum, thus different type of counter measures is to be prepared.
Project closure:
The network will be approved by the project manager on the basis of the result that comes on
testing phase and after that the project is to be implemented into the organization.
Conclusion
From the above report it can be concluded that the network redesign is proposed for
Contoso Corporation and for automation of server installation plan. For the development of the
solution it is essential to select an architecture and implement the network for increase the
efficiency and performance of the organization. The amount of data that is generated from the
home security system and medical equipment is needed to be verified such that the number of
servers are needed for the installation and the service needed for managing the analytics and roll
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
PLANNING AND IMPLEMENTING SERVER
out the project. A track is needed to be maintained on the server loads and the new server
requirement for virtualizing the server and add more server for handling the loads and user
request. Sector based images are used for faster deployment and making necessary changes in
the configuration such that it compatible with the other devices connected in the network. WDS
server is needed to be configured with active directory for the setting the image for the clients
under the boot tab. It can be used for creating a link between the computer account objects and
physical computers using the active directory domain services. It is important to select an
appropriate server deployment strategy for the deployment of the server with minimum effort,
resources and time. Microsoft deployment tool kit can be used for creating a central interface
creating and deploying the image for the targeted workstations.
Document Page
11
PLANNING AND IMPLEMENTING SERVER
References
Braun, P.J., Ekler, P. and Fitzek, F., 2016, October. Network coding enhanced browser based
Peer-to-Peer streaming. In 2016 IEEE International Conference on Systems, Man, and
Cybernetics (SMC) (pp. 002104-002109). IEEE.
Chao, S.U.N., TANG, Z.Y. and LIU, D.H., 2016. Research on the Integrated Security
Supervision Technology of Cyber-Physical System in Substations. DEStech Transactions on
Computer Science and Engineering, (cmee).
Chekryzhov, V., Kovalev, I.A. and Grigoriev, A.S., 2018. An approach to technological
equipment performance information visualization system construction using augmented reality
technology. In MATEC Web of Conferences (Vol. 224). EDP Sciences.
Comcol.nl. (2019). [online] Available at:
https://www.comcol.nl/code/inkijkexemplaar/9781118789186/exam-70-413-designing-and-
implementing-a-server-infrastructure-engels-microsoft-official-academic-course.pdf [Accessed 4
Jun. 2019].
Crnko, N., 2017, May. Distributed Database System as a base for multilanguage support for
legacy software. In 2017 40th International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) (pp. 371-374). IEEE.
Demidov, V.K., Pyvovar, O.I. and Kravchenko, Y.G., 2018, May. Modern development
methodologies for GIS oriented web application. In 17th International Conference on
Geoinformatics-Theoretical and Applied Aspects.
Document Page
12
PLANNING AND IMPLEMENTING SERVER
Gaset, C., 2018. BPM implementation for the worldwide distribution of Azithromycin for Yaws
eradication (Bachelor's thesis, Universitat Politècnica de Catalunya).
Gichuru, J., 2016. Implementation Plan for Mobile resource Planing Software.
Hallett, J. and Aspinall, D., 2017. Common Concerns in BYOD Policies. In Workshop on
Innovations in Mobile Privacy and Security.
Kantor, M.E., Starkschall, G. and Balter, P., 2017. Relational database of treatment planning
system information. Journal of Radiation Oncology Informatics, 5(1), pp.1-10.
Lu, M.C., Chen, Y.X., Yang, Y.Y., Sha, M.X., Chen, Y.W. and Lin, S.L., 2018, August. Tax
Reduction and Corporate Investment-Applying Big Data to Tax Policy Formulation.
In Proceedings of the 2nd International Conference on E-Society, E-Education and E-
Technology (pp. 103-106). ACM.
Rahman, N.E.A., Azhar, A., Karunanayaka, K., Cheok, A.D., Johar, M.A.M., Gross, J. and
Aduriz, A.L., 2016, November. Implementing new food interactions using magnetic dining table
platform and magnetic foods. In Proceedings of the 2016 workshop on Multimodal Virtual and
Augmented Reality (p. 5). ACM.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]