UMUC Network Customization and Optimization Project Report

Verified

Added on  2023/06/03

|4
|1316
|336
Report
AI Summary
This report outlines a network customization and optimization plan for the University of Maryland University College (UMUC), addressing key areas such as network and cloud-based storage, data protection and backup, network monitoring, log storage and maintenance, and troubleshooting methodology. The proposed solutions include utilizing Amazon Cloud Storage for data hosting, implementing domain user groups and data encryption for security, employing Wireshark for network monitoring, using TACACs for log management, and adopting an IT troubleshooting wheel alongside tools like packet tracer and tone tracer for efficient fault identification and resolution. The report assumes a high-speed network, a dedicated private cloud, the presence of Active Directory services, sufficient storage space for backups, competent IT staff, and the potential for network downtime, providing a comprehensive approach to ensuring a robust and secure network infrastructure for UMUC.
Document Page
Network Customization and Optimization
Student Name:
III. Network Customization and Optimization
A. Network and Cloud Based Storage
Technical requirements
Storage of data for the University of Maryland University College is very important. UMUC’s data
has be organized in a good manner and stored securely. These data has to be stored in a central
place where it can be accessed easily with the authorized persons [1], [2]. The following assumptions
are made:
Campus staff and students are able to access the web portal with ease from the online
library.
The network is of high-speed.
There will be a dedicated private cloud
Proposed Network Systems hardware
To have the above mentioned technical requirements, a number of hardware or outsourced service
has to be availed. In addition the mentioned network hardware requirements that were mentioned
in section I) part E), we will require an outsourced service to host the files in cloud. Amazon Cloud
Storage will be our choice. The selection is made on the basis of available space, cost, security,
availability, disaster recovery mechanisms put in place and consistent support offered by Amazon
technical team [3].
Justification
On the basis of the assumptions made in the technical requirements section, high speed connection
is necessary to support access of online library resources. A dedicated cloud service implies full
access of the resources at all times regardless of the heavy traffic nor no traffic at all. Web portal has
to be accessed securely and solely by the UMUC fraternity alone.
B. Data Protection and Backup
Technical requirements
UMUC management understand the importance of data availability at the right time when required.
It therefore implies that any kind of data loss cannot be entertained by the administration. This then,
means that data has to be protected and backups made on frequent basis. We assume that two
types of data backups have to be made. These are, partial and fullback. Partial backups are taken
three times a day whereas fullback up is done on daily basis. More so, data has to be protected in a
manner that not everyone has access to any data. Only authorized users are necessitated to access
the data.
Proposed Computer Systems Hardware
Data security will be taken care of by the domain and data crypts. Domain user groups on the
network will be given access data which they are supposed to access. Some of the rights will include
reading alone. The administrators will have the ability to read and write the data. However, this will
be done in certain levels.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The computing system implemented will be performing data backups automatically without the
human intervention.
Justification
We assumed that UMUC has Active Directory services that performs network level authentication.
The authentication will also apply to access of data within the institution. Additionally, we assume
that UMUC has enough storage space to store backed data.
C. Networking Monitoring
Technical requirements
UMUC IT technical team understand that it is important to have a network monitoring system. In the
implementation of the monitoring system, we assume the following:
all the normal traffic has to be permitted
network logs has to be backed-up
report has to be generated on any flagged fishy activities
record of all network activities has to be generated
Proposed Network Monitoring Solutions
To achieve the above suggested technical requirements, a network monitoring tool has to be
availed. In our network monitoring activities, we select Wireshark network monitoring tool due to its
capability to perform a number of activities [4].
Justifications
Network monitoring is really necessary as for UMUC for it is a good practice in a networking
environment to be countable on any activity that is taking place on the network as an administrator.
Backup of network logs is important as it may be used in decision making by the administration.
D. Log Storage and Maintenance
Technical requirements
Logs and Maintenance report of a network infrastructure are necessary both to the IT technical team
and administration. The reporting aspect can give the administration the picture of networking
device and correct decision made. For example, a frequently repaired device implies that, the device
is failing and a replacement has to be done. This exactly what UMUC requires.
Proposed Computer Systems Hardware
To come up with analysis report on log storage and maintenance, we require the use of TACACs
system. The protocol authenticates all the users and records every activity log in its server system.
In addition, a ticketing system is necessary as it may provide a picture of the activities assigned to IT
staff to solve regarding the network.
Justification
In the above technical requirement, we assume that our IT staff are competent enough and a
frequently serviced item is not as a result of poor service, but it is the device that is failing.
Additionally, we assume that UMUC campus has TACACs server that is used to authenticate users on
the network.
Document Page
E. Troubleshooting Methodology
Technical Requirements
Troubleshooting mechanism is really necessary for every networked environment. We cannot have
an assumption that since our system is correctly working today, tomorrow it working too. UMUC
must have a troubleshooting strategy put in place to salvage network failures.
Proposed Computer Systems Hardware
Troubleshooting technique will include the identification of a fault, by elimination method. Basically
we use the IT troubleshooting wheel pictured below.
Figure 1: IT Service and Troubleshooting Wheel [5]
In addition, we will require packet tracer and tone tracer hardware equipment to be used in the
troubleshooting process. Packet tracer tool will assist in the identification of fault cables whereas
tone tracer tool will enable us trace discontinuous cables [6].
Justification
We assume that our network cannot be uptime all times. However, it is not the network system but
a section or one node of the network is may be the one that is failing. PING windows tool may also
be used in the troubleshooting.
Document Page
References
[1] S. Kumar, "A Survey on Data Storage and Security in Cloud Computing," International Journal of
Computer Science and Mobile Computing, vol. 3, no. 6, pp. 306-313, 2014,
https://www.ijcsmc.com/docs/papers/June2014/V3I6201444.pdf.
[2] N. Vurukonda, "A Study on Data Storage Security Issues in Cloud Computing," Procedia
Computer Science, vol. Volume 92, pp. 128-135, 2016,
https://doi.org/10.1016/j.procs.2016.07.335.
[3] N. Lakshmi, "A Study on Cloud Storage," International Journal of Computer Science and Mobile
Computing, vol. 3, no. 5, pp. 966-971, 2014,
https://ijcsmc.com/docs/papers/May2014/V3I5201499a81.pdf.
[4] S. U. K. R. Z. a. M. I. B. Rafiullah Khan, "An Efficient Network Monitoring and Management
Systems," International Journal of Information and Electronics Engineering, vol. 3, no. 1, pp. 1-6,
2013, 10.7763/IJIEE.2013.V3.280.
[5] "IT Admin Service Wheel," Get Digital, [Online]. Available: https://www.getdigital.eu/IT-Admin-
Service-Wheel.html. [Accessed 5 11 2018].
[6] L. Todd, Todd Lammle's CCNA IOS Commands Survival Guide, Hoboken: John Wiley & Sons, 2012.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]