dccs full assignment

Upload: tulasi-nathan

Post on 05-Mar-2016

19 views

Category:

Documents


0 download

DESCRIPTION

Dccs Full Assignment

TRANSCRIPT

CT020-3.5-3-DCCS GROUP ASSIGNMENT

GROUP ASSIGNMENTDESIGN OF CORPORATE COMMUNICATION SYSTEMS(CT020-3.5-3-DCCS)

NAME : TULASINATAN A/L MUTHUALAGU (TP026049) DINESH A/L THULASIDASS (TP027442)INTAKE CODE : UC3F1504IT (ISS-FC)LECTURER : MR. REZA ADINEHNIAPROJECT TITLE : PARSTECH INC COMPANYDATE COMPLETED : 3TH AUGUST 2015

TABLE OF CONTENTS

ACKNOWLEDGEMENT5GANTT CHART6EXECUTIVE SUMMARY7ASSUMPTIONS81.0 NETWORK DESIGN (TULASINATAN MUTHUALAGU TP026049)91.1 Requirement Gathering91.1.1 Network Requirements91.2 Network Architecture121.3 Analysis of the Existing Network131.3.1 Estimated Traffic Volumes131.3.2 Network Design Constraints131.4 Logical Design141.4.1 Logical Network Diagram141.4.2 IP Addressing Strategy191.4.3 Demilitarized Zone (DMZ)221.4.4 Virtual LAN (VLAN)231.5 Physical Design251.5.1 Physical Network Diagram251.5.2 Virtual Private Network (VPN)261.5.3 WAN Technology281.6 Server301.6.1 Directory Service Server301.6.2 Domain Name System (DNS)301.6.3 Dynamic Host Configuration Protocol (DHCP)311.6.4 Database Server311.6.5 Application Server311.7 Corporate Communications321.7.1 Logon Procedure321.7.2 Remote connection (Remote access VPN)331.8 Network Topology341.8.1 Network Topology Chosen371.9 Transmission Media381.9.1 Unshielded Twisted Pair (UTP)381.9.2 Fiber Optics401.9.3 Data communications equipment (DCE)412.0 HARDWARE, SOFTWARE AND DESKTOP REQUIREMENTS42(TULASINATAN A/L MUTHUALAGU (TP026049)422.1 HARDWARE422.1.1 Workstation422.1.2 Server432.1.3 VPN Firewall router452.1.4 Internal Router462.1.5 Wireless Router472.1.6 Category 5e Cable (CAT5E)482.1.7 Switch492.2 SOFTWARE AND OPERATING SYSTEM502.2.1 Server Software502.2.2 Antivirus512.2.3 Operating System52REFERENCING53MARKING SCHEME56Workload Matrix57

Figure 1: Project Gantt chart6Figure 2 : Overall Logical Network Diagram of ParsTech Inc Company15Figure 3 : Logical Network Design of ParsTech's Central Office15Figure 4 : Logical Network Design of ParsTech's Branch Office 116Figure 5 : Logical Network Design of ParsTech's Branch Office 217Figure 6 : Logical Network Design of ParsTech's Branch Office 317Figure 7 : Logical Network Design of ParsTech's Branch Office 418Figure 8 : Logical Network Design of ParsTech's Branch Office18Figure 9 : Sample Demilitarized Zone (DMZ)22Figure 10 : Sample virtual local area network (VLAN)23Figure 11 : Figure : Physical Network Diagram of ParsTech Company25Figure 12 :Sample diagram of a Site to Site VPN26Figure 12 :Sample diagram of a Site Remote Access VPN27Figure 13 :Sample diagram of a WAN Technology with DSL Topology29Figure 14 :Sample diagram of how SSH protocol works32Figure 15 :Sample diagram of Remote-access VPN33Figure 16: Sample diagram of Bus Network Topology34Figure 17: Sample diagram of Star Network Topology36Figure 18 : Star Network in ParsTech Central Office37Figure 19 : Category 5e cable38Figure 20 : Fiber optic cable40Figure 21 : DCE cable41Figure 22 : Dell Precision Tower 5810 workstation42Figure 23 : PowerEdge R430 Rack Server44Figure 24 : Netgear SRX5308 VPN Firewall router45Figure 25 : Mikrotik RB/1100AHX2 Routerboard Router OS Level 646Figure 26 : Asus RT-AC66U dual-band wireless-AC175047Figure 27 : Cat5e Bulk 1000ft Ethernet Cable White.48Figure 28 : TP-Link JetStream 48-Port 10/100Mbps+ 4-Port Gigabit L249Figure 29 : Microsoft Windows Server Enterprise 200850Figure 30 : Kaspersky Endpoint Security for Business51Figure 31 : Windows 8.1 Enterprise 64bit52

ACKNOWLEDGEMENT

We would like to express my deepest appreciation to all those who provided us the possibility to complete this assignment. A special gratitude we give to our Lecturer Mr. Reza Adinehnia, whose contribution in stimulating suggestions and encouragementhelped us to coordinate our assignment especially for teaching us this module in such a way that we were able to learn this highly technical module very easily. Besides that, we also would like to take this opportunity to express a deep sense of gratitude to my college Asia Pacific University for allowing us to use and provide necessary information regarding the project that we have been working on.Finally, an honorable mention goes to our family and friends for their understandings and supports us in completing this assignment. Without helps of the particular that mentioned above, we could face many difficulties while doing this. Thank You.

Sincerely,TULASINATAN A/L MUTHUALAGU (TP026049)DINESH A/L THULASIDASS (TP027442)

GANTT CHART

Figure 1: Project Gantt chart

Figure 1 shows the Gantt chart activities displayed against time which is most useful to complete the project at the right time. On the left of the chart is a list of the activities and along the top is a suitable time scale. Each activity is represented by a bar, the position and length of the bar reflects the start date, duration and end date of the activity.

EXECUTIVE SUMMARY

ParsTech Inc. was established in 2004 intending to fill in the market need in different IT solutions for a professional, customer-focused computer company. The company emphasizes services in troubleshooting and maintenance. After a few years they are on the brink of penetrating a lucrative market in a rapidly growing its services nationally. It established several branches across the country and trained IT technicians and specialist implanted in every branch. Due to the organization growing and number of customers grew, several issues has been taken into consideration, such as increasing the number of employees and Quality of Service, customer satisfaction, complicated administrative tasks and also organization cost expenses which became a serious problem for the company.Telecommunication Company have rented their high speed leased lines to the branches in order to provide central management and also communication facilities. In this way all financial tasks like billing, payrolls, etc. as well as administrative jobs could be handled from the central branch. This documentation will be discuss about how the network architecture, hardware and software also the network security need to be apply in the organization. This design is actually an enhancement for reduce the cost which is not required manpower and enable the client's business in the most cost effective way.

ASSUMPTIONS

The design process of this project is categorized into two sections which are corporate network and remote connection between technicians inside the company and clients machine that need be troubleshooting. The proposed design should be addressed with the hardware and software from the benefits of the current technology. The proposed design will reduce the number of branches to 5 and establishing it in 5 various cities over the country. The replacement of existing technology will assist to lease the line or reduced the costs. The server will be located at the central branch considering the risk of security issues and cannot be placed in any part of country. However there are certain tasks can be accessed or used in shared or distributed manner. The networks have to be managed remotely. The proposed design is permit the use of the wireless mobile computing. Appliance of security for the connections and the application must be place in the proposed design.

1.0 NETWORK DESIGN (TULASINATAN MUTHUALAGU TP026049)

1.1 Requirement Gathering

The important part of network design process is requirements gathering. Understanding well a network is essential in delivering its critical to its success. This provides details on how to set up a network and this is the reference for the foremost requirements of the network design of the ParsTech Inc Company. 1.1.1 Network Requirements

I. LAN Functions

The branches of ParsTech Inc Company confess the potential the sharing of resources, data transfer and e-mail, improve the reliability and easy distributed processing. The sharing of resources, including the hardware resource sharing, file sharing, and software inventory data sharing.Users can share a network system software and application software. Data transfer and e-mail,Data and network file transfer is an important feature of modern LANs which is not only transmits files, data, information, but also can send voice, images. Improve the reliabilityof the computer system.LAN computers can back each other, avoiding the stand-alone system without backup failure may occur when system failures. This will be greatly improving the reliability and the security of the system. Easy to distributed processing,by using a network technology can have more than one computer connected to a Server through a certain algorithm, the larger global issues points to a different computer to complete.

II. Physical Topologies

A physical topology is how they are actually interconnected with wires and cable in the network design. Based on the company requirement the physical topology has to be design is star topology which every node on the network connects to a central hub. Star topology will offer a dynamic network design in supporting the future network traffic. It also helps to apply the existing LAN technology in ParsTech Inc Company which purpose in reducing cost to the new network.

III. Performance

To examine the performance of network system in sense of usability, the network design should improve and satisfy the client's request. The present online services of ParsTech are troubleshooting and maintaining the operations by the IT technicians. From the factor, the proposed network system should provide their services with an excellent performance.

IV. Networking software

The proposed network system should be considered with the use of current application server of ParsTech Inc Company. The current application software also required to be intentionally used by staffs in the sub-offices. It will be useful in reducing the cost of the new network.

V. Security

Developing security strategies is necessary in protecting all parts of network design. The security of application server and security of connections between central office, branch offices and users are the major things which have to be considered in this part. In order to pursue the security issues, application server should be placed at ParsTechs central office. The new network must concern about the general task and applications to be run only by the authorized staffs from other branches.

VI. Economy and cost control

The new system of ParsTech will decrease the quantity of branches to 5 and setting up it in 5 various cities over the nation. Each and every services of the new network have to be online so technicians can do troubleshooting online in order to decrease the expenses of transportation and labor.

VII. Metropolitan area network (MAN) / WAN options

The new network outline of WAN technology should comprise of two major processes which is corporate network and remote connections among the companys technicians and customers machines which need troubleshooting. Current leased line should be recovers with the lower expense secured WAN technology in order to connect central office to branch workplaces. Wireless mobile computing is allowed to be utilized in new network system which is managed and monitored only by the authorized staffs.

1.2 Network Architecture

Network Architecture is about how the network works and functions. It describes how different network components communicate with each other and the conventions used as a part of new network. It is used to classify all the network layers step-by-step in logical form by describing each step in detail. An extraordinary company surely has well plan network architecture to their organization networking and communication backbone. Most of the organizations need their architecture to be dependable and secured connection between their branches and focal offices. The Network design is prescribed to be working for 24 hours to make sure that data do not get access when the information transmitting.The new network design should be comprise of the current technologies alongside the new technologies and help to decrease the cost to the new network.Besides, the new design will support to sort out certain issues such as customer satisfaction, expanding the number of employees, quality of service, complicated administrative task and more.

1.3 Analysis of the Existing Network

In this part, the present network design of ParsTech Company is analyzed. The existing network infrastructure of ParsTech Company consolidates a focal office and few branch offices in different cities that are connected through the leased lines. The numbers of branch offices have to be decreased to 5. Additionally, the current leased lines must be supplanted which are less expensive and secured WAN technologies. Moreover, implementation of remote access will be reduce the workload of technicians and expenses cost of the company. This new network design is develop for increase the security of the network because the existing network is less secure and could misuse by hackers or unauthorized personnel.

1.3.1 Estimated Traffic Volumes

Estimation of network traffic is an imperative consideration when outlining a network plan. Traffic volumes of the network in the company is rely on upon the number of active workstations in every branch office, number of clients, sorts of data that is being transmitted from every workstation. The number of active workstation for the ParsTech Company is nearly 140 workstations. This sort of companies using remote desktop with the normal quality of 5Mbps for upstream and downstream for the branch and 20Mbps to 50Mbps upstream and downstream for the central office.1.3.2 Network Design Constraints

The Network design constraints phase is where a list of factors that should to be considered in expansive terms. One of the main constraints on this project is time. The network designer team will be given a duration of time to accomplish the network system design. There will be many stages to be finished and this will be the most difficult part in the network system design. Additionally, there are some existing devices and network equipments are remaining which can be used to design ParsTech's new network. This is due to some of the existing devices which are suitable for the revamp in the new system and also it will be diminishes the expense for the new network system design.

1.4 Logical Design

Logical network design relies upon on the requests of the clients of the network. The most fundamental issues that logical network design will address are what the clients are doing on the network and how the applications will use the network in the prompt and faraway of future.

1.4.1 Logical Network Diagram

Logical Network Diagramsconceptualize the PC and connection between networks logical structure. They are utilized by IT experts and corporate IT divisions, network and system administrators to visually document the topology of computer and networks. The planned logical network diagram of the ParsTech Inc comprehensively shows the connectivity and relationship among the devices located in central office, 5 branch offices and remote accesses such as remote clients or remote staffs of the ParsTech Company. The design shows the central office located in a place and the 5 branches from different cities are connected across the nation. The topology has been chosen for this network is star topology which provides a productive network design. The entire ParsTech Companys network infrastructure is based on Virtual Private Network (VPN) and DSL WAN technology to give broadband connections around the network. Moreover, there are two types of VPN have been executed in the this network which are site to site VPN and remote access VPN. Site to site VPN has been utilized to link all five branches of this ParsTech Company to the central office and the remote access VPN to make companys technician able to access into client's machines in around the world for troubleshooting and maintenance services. The new network will offer the general task and applications to be only accessible by the authorized staffs from other branches. Besides, the new system has included the existing system technologies in the aim of reducing the cost for the new network system design. The new network designs have been included beneath.

Figure 2 : Overall Logical Network Diagram of ParsTech Inc Company

Figure 2 shows the overall ParsTech Inc company network design. This network is include 1 central office and 5 branches which are remotely connected via (SSH). Other than that, VPN has empowers the client to get to the organization network anyplace.

Figure 3 : Logical Network Design of ParsTech's Central Office

Figure 3 above, shows the internal network of ParsTech's central office. There are 5 server in the network which are Application server, Database server, VPN server, and Directory Service server, DHCP server and DNS server. Every server is associated with the server switch and the server switch unites with the multilayer switch. Besides, multilayer switch can be reduce the cost usage additional router in the network. It also can be usable for the future network design planning. The application firewall was placed between the main router and DMZ to protect the network from the malicious activities.

Figure 4 : Logical Network Design of ParsTech's Branch Office 1

All the 5 branches are implemented with same network architecture. All the branches network works through WAN Internet technology to sent and receive data from the central office. Each of the branches have 3 floors which connected through multilayer switch and also each branch have their own firewall to protect the network from malicious activities.

Figure 5 : Logical Network Design of ParsTech's Branch Office 2

Figure 6 : Logical Network Design of ParsTech's Branch Office 3

Figure 7 : Logical Network Design of ParsTech's Branch Office 4

Figure 8 : Logical Network Design of ParsTech's Branch Office

1.4.2 IP Addressing Strategy

The ParsTech Company has a central office and lessened branch offices to 5. As indicated by network design there are 6 local area networks (LAN) are situated across the nation. Every branch is comprised of a separate firewall, internal router, hub switch and DSL modem. A Demilitarized Zone (DMZ) is also build as portal in central office to protect the servers. A class B IP as a valid IP will be assigned for the gateway (DMZ) in order to be open from other site to site VPNs and also remote access VPN for the user and network administrator. The further IP will be allotted from C class IPs as invalid or local IPs to produce local area network and intranet. The diagrams below illustrate and describe how the IP addresses assigned for each branch office.

Central OfficeNetwork ID : 129.100.2.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.2.254Firewall : 230.0.10.1/24Server Router : 230.0.11.1/24HQ Router : 230.0.12.1/24Branch 1Network ID : 129.100.3.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.3.254Firewall : 230.0.20.1/24Server Router : 230.0.21.1/24HQ Router : 230.0.22.1/24Branch 2Network ID : 129.100.4.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.4.254Firewall : 230.0.30.1/24Server Router : 230.0.31.1/24HQ Router : 230.0.32.1/24

Branch 3Network ID : 129.100.5.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.5.254Firewall : 230.0.40.1/24Server Router : 230.0.41.1/24HQ Router : 230.0.42.1/24

Branch 4Network ID : 129.100.6.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.6.254Firewall : 230.0.50.1/24Server Router : 230.0.51.1/24HQ Router : 230.0.52.1/24

Branch 5Network ID : 129.100.7.0Subnet Mask : 255.255.255.0Usable IP Address : 254Broadcast Address : 129.100.7.254Firewall : 230.0.60.1/24Server Router : 230.0.61.1/24HQ Router : 230.0.62.1/24

1.4.3 Demilitarized Zone (DMZ)

DMZ (demilitarized zone) is a physical or logical sub-network that isolates an internal local area network (LAN) from other depended networks, more often the Internet. External-facing servers, resources and services are situated in the DMZ so they are accessible from the Internet but the rest of the internal LAN remains inaccessible. This gives an additional layer of security to the LAN as it limits the potential of hackers to directly get to internal servers and information via the Internet (Rouse, 2015). The following diagram shows DMZ position in a sample network.

Figure 9 : Sample Demilitarized Zone (DMZ)Source : http://etutorials.org/Networking/Router+firewall+security/Part+I+Security+Overview+and+Firewalls/Chapter+2.+Introduction+to+Firewalls/Firewall+Design/Advantages of Demilitarized Zone (DMZ) (Syngress, 2003) Inexpensive, fairly simple configuration, low maintenance. Lower cost than more robust alternatives. Firewall provides protection to both internal network and bastion host, constraining some of potential breach possibilities of an unprotected bastion host. Allow for establishment of multiple service-providing hosts in the DMZ; shields bastion hosts in DMZ from both networks, permits much more granular control of assets and access: removes single point of failure and attack.

1.4.4 Virtual LAN (VLAN)

A virtual local area network (VLAN) is a logical group of workstations, servers and network devices that seem to be on the same LAN despite their geographical distribution. A VLAN allows a network of computers and clients to communicate in a simulated environment as though they exist in a single LAN and are sharing a single broadcast and multicast domain. VLANs are actualized to accomplish scalability, security and ease of network management and can rapidly adjust to change in network requirements and relocation of workstations and server nodes. Higher-end switches permit the functionality and implementation of VLANs. The purpose of executing a VLAN is to enhance the performance of a network or apply proper security features. (Janssen, techopedia, 2012). The following demonstrates two broadcast domain in two switches and two broadcasting domain in a single switch as Virtual LAN (VLAN)

Figure 10 : Sample virtual local area network (VLAN)Source : http://alliedtelesis.com/manuals/AWPLUSV224CLIa1/port_based_VLANs_overview.html

Advantages of Virtual LAN (VLAN) There many reasons that network designer use VLANs. There are some of advantages of utilizing VLAN in ParsTech Companys network:

VLANs empower logical grouping of end-stations that are physically scattered on a network. At the point when clients on a VLAN move to another physical location yet keep on performing the same job function, the end-stations of those clients do not need to be reconfigured. So also, if users change their job functions, they require not physically move: changing the VLAN participation of the end-stations to that of the new group makes the clients end-stations local to the assets of the new team (netapp, 2013). VLANs decrease the necessary to have routers deployed on a network to contain broadcast traffic. Flooding of a packet is limited to the switch ports that fit with a VLAN (netapp, 2013). Confinement of broadcast domains on a network essentially diminishes traffic. By keeping the broadcast domains, end-stations on a VLAN are restricted from listening to or receiving broadcasts not expected for them. Besides, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs (netapp, 2013).

1.5 Physical Design

1.5.1 Physical Network Diagram

The physical design is a geographical representation of a system showing the system's internal and external entities, and the streams of information into and out of these entities. The physical design network diagram of the ParsTech Company expose WAN technology, Servers, network devices and transmission media which to be apply in the network and represents the connection between one another. The central office connected with the branch offices by using VPN technology through broadband access DSL technology. The following diagram illustrates the physical network design in the system.There are five servers are intended to be situated in central office. The application and database servers are existing servers in ParsTech Inc Company. DHCP server, DNS server, Directory service server must be purchased by the ParsTech. Each and every servers are detached in the secured zone called DMZ which can expand the security of network, database and clients information. A firewall is situated between DMZ internal router. This will detect and prevent intruders penetrate to the ParsTech's network. Besides, VLAN configuration have been used between machines in central office by switches to data transmission.

Figure 11 : Figure : Physical Network Diagram of ParsTech Company

1.5.2 Virtual Private Network (VPN)

A Virtual Private Network (VPN) is a process which used to figure the security and protection to private and open networks, for example, service provider backbone network or internet. VPNs are usually used by organization to ensure their private data and information. The VPN sorts that have been develop for the ParsTech Company is to apply internet as a network infrastructure for the purpose of diminishing the cost of networking.According to the ParsTech Company, there are two types of VPN technology have been used which are site to site VPN and Remote access VPN. The site to site VPN has intended to link central office to branch offices and Remote access VPN has designed to allow the companys technicians able to connect to clients machines for troubleshooting and maintenance purpose.

Corporate Network by Site to site VPNSite-to-site VPN connections empower organizations to have routed connections between separate offices or with different organizations over an open network while serving to maintain secured communications. A routed VPN connection across the Internet logically works as a dedicated WAN link. When networks are connected by the Internet, as shown in the following figure, a router forwards packets to another router across a VPN connection. To the routers, the VPN connection operates as a data-link layer link (technet, 2003). The following diagram shows a site to site VPN.

Figure 12 :Sample diagram of a Site to Site VPNSource : http://www.besecurenetworks.com/server.html

Remote Connections by Remote Access VPNRemote access VPN connections allow clients working at home or on the road to access a server on a private network using the infrastructure provided by a public network, for instant, internet. From the users viewpoint, the VPN is a point-to-point connection between the computer (the VPN client) and an organizations server. The exact infrastructure of the mutual or public network is insignificant because it seems logically as if the information is sent over a dedicated private link (technet, 2003).The following diagram shows the Remote Access VPN.

Figure 12 :Sample diagram of a Site Remote Access VPNSource : http://www.besecurenetworks.com/server.htmlAdvantages of VPN: I. Enhanced security. When you connect to the network through a VPN, the data is kept secured and encrypted. In this way the information is away from hackers eyes (ibvpn, 2010).II. Remote control. In the event of a company, the great advantage of having a VPN is that the information can be accessed remotely even from home or from any other place. Thats why a VPN can increase productivity within a company (ibvpn, 2010).III. Share files. A VPN service can be used if you have a group that needs to share files for a long period of time (ibvpn, 2010).IV. Online anonymity. Through a VPN you can browse the web in complete anonymity. Compared to hide IP software or web proxies, the advantage of a VPN service is that it allows you to access both web applications and websites in complete anonymity (ibvpn, 2010).V. Unblock websites & bypass filters. VPNs are great for accessing blocked websites or for bypassing Internet filters. This is why there is an increased number of VPN services used in countries where Internet censorship is applied (ibvpn, 2010).VI. Change IP address. If you need an IP address from another country, then a VPN can provide you this (ibvpn, 2010).VII. Better performance. Bandwidth and efficiency of the network can be generally increased once a VPN solution is implemented (ibvpn, 2010).VIII. Reduce costs. Once a VPN network is created, the maintenance cost is very low. More than that, if you opt for a service provider, the network setup and surveillance is no more a concern (ibvpn, 2010).1.5.3 WAN Technology

A wide area network (WAN) is a system that exists over a large-scale geographical area. A WAN connects different smaller networks, including local area networks (LAN) and metro area networks (MAN). This guarantees that computers and clients in one area can communicate with computers and users in different areas. WAN implementation can be possible either with assistance of the public network or a private network (Janssen, 2012).A WAN connects more than one LAN and is used for larger geographical areas. Computers connected to a wide-area network are frequently connected through public networks, for example the telephone system. They can also be connected through leased lines or satellites (Beal, 2013). A WAN works in a similar manner to a LAN yet the difference is LAN can work on a larger scale. Commonly, TCP/IP is the protocol used for a WAN in combination with devices such as routers, switches, firewalls and modems (Janssen, 2012).

Figure 13 :Sample diagram of a WAN Technology with DSL TopologySource : http://www.ciscopress.com/articles/article.asp?p=2202411&seqNum=8

1.6 Server

A server is a computer that serves data to different computers. These computers, called clients, can connect to a server through either a local area network (LAN) or a wide area network (WAN), such as the Internet (Christensson, 2005).There are several different types of servers, including Web servers, mail servers, and file servers. A web server serves Web pages to computers that connect to it. It also can parse scripting languages such as PHP, ASP, and JSP. A mail server stores users' e-mail accounts and sends and receives e-mail messages. Case in point, when you send an e-mail to a friend, the message is sent by a mail server which uses SMTP protocol. A file server is a computer that stores files that can be accessed by other computers. File servers are often used within local networks and frequently require a secret key or some kind of authentication to get connected (Christensson, 2005).1.6.1 Directory Service Server

A network service can identify all resources on a network and make them available to users and applications. Resources include e-mail addresses, computers, and peripheral devices like printers. Preferably, the directory service must make the physical network topology and protocols transparent so that a user on a network can get into any resource without knowing where or how it is physically connected. There are various directory services that are utilized widely. The most important two includes LDAP, which is for e-mail addresses, and Netware Directory Service (NDS), which is for Novell Netware networks. 1.6.2 Domain Name System (DNS)

An Internet service that interprets domain names into IP addresses. Since domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, a DNS service must translate the name into the corresponding IP address (Beal, 2013).

1.6.3 Dynamic Host Configuration Protocol (DHCP)

DHCP is a protocol for assigning dynamic IP addresses to devices on a network. A device can have a different IP address every time it connects to the network during dynamic addressing. In a few network system, the device's IP address can even change while it is still connected. DHCP additionally support a blend of static and dynamic IP addresses (Beal, 2013).1.6.4 Database Server

Database server is the term used to allude back-end system of a database application using client/server architecture. The back-end system, sometimes called a database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks.1.6.5 Application Server

An application server is a program that handles all application operations between users and an organization's backend business applications or databases. An application server is frequently used for complex transaction-based applications. To support high-end needs, an application server needs to have built-in redundancy, monitor for high-availability, high-performance distributed application services and support for complex database access (Beal, 2013).

1.7 Corporate Communications

1.7.1 Logon Procedure

In the new network design, we chose Secure Shell Protocol (SSH) as a logon technique for employees to sign into another computer over a network, to execute commands in a remote machine, and to move documents from one machine to another. It gives solid verification and secure communications over frail channels. SSH shields a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has figured out to take over a network can only compel SSH to disconnect. The employee cannot play back the traffic or hijack the connection when encryptions empowered (Beal, 2013).

Figure 14 :Sample diagram of how SSH protocol worksSource : https://www.vandyke.com/solutions/ssh_overview/ssh_overview.pdf

1.7.2 Remote connection (Remote access VPN)

As indicated by the new network design, we have outlined Remote access VPN to provide companys technicians ready to connect to clients machines in purpose for troubleshooting and maintenance to accomplish the secure remote connection between the client machines. In a Remote-access VPNs, individual hosts or users, such as telecommuters, mobile users, and extranet consumers, are able to access a company network safely over the Internet. Each host typically has VPN client software loaded or uses an online-based client. A remote-access VPN host or client typically has VPN client software. Whenever the host tries to send any information, the VPN client software exemplifies and encodes the information before sending it over the Internet to the VPN gateway at the edge of the targeted network. On receipt, the VPN gateway handles the data in the same path as it would handle data from a site-to-site VPN (orbitcomputersolution, 2013).

Figure 15 :Sample diagram of Remote-access VPNSource : http://www.orbit-computer-solutions.com/Remote-access-VPNs.php

1.8 Network Topology

Network topology is the way different components of a network (like nodes, links, peripherals, etc) are organized. Network topologies define the layout, virtual shape or structure of network, physically as well as logically. The way in which various systems and nodes are connected and communicate with one another is recognized by topology of the network. Topology can be physical or logical (Beal, 2013). A physical topology of a network is all about the configuration of cables, computers, and other peripherals, while the logical topology focuses refer to the pattern of data transfer between network nodes. The physical and network topologies can be classified into five fundamental model such as bus, star, ring, tree and mesh topology.Bus Topology

Figure 16: Sample diagram of Bus Network TopologySource: https://www.edrawsoft.com/Network-Topologies.phpAll the devices/nodes are connected sequentially to the same backbone or transmission line. This is a simple, low-cost topology, but its single point of failure presents a risk.

Advantages of a Linear Bus Topology (edrawsoft, 2012)

Easy to connect a computer or peripheral to a linear bus. Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology (edrawsoft, 2012)

Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building.

Star Topology

Figure 17: Sample diagram of Star Network TopologySource: https://www.edrawsoft.com/Network-Topologies.phpAll the nodes in the network are connected to a central device such like hub or switch via cables. Failure of individual nodes or cables does not create downtime in the network but the failure of a central device can. This topology is the most preferred and popular model.Advantages of a Star Topology (edrawsoft, 2012)

Easy to install and wire. No disruptions to the network then connecting or removing devices. Easy to detect faults and to remove parts.

Disadvantages of a Star Topology (edrawsoft, 2012)

Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are disabled. More expensive than linear bus topologies because of the cost of the concentrators.The protocols used with star configurations are usually Ethernet. Token Ring uses a similar topology, called the star-wired ring.

1.8.1 Network Topology Chosen

Star Topology

The current network topology of the ParsTech Inc Company is of star topology which is appropriate and perfect with new designed network infrastructure of the company. Consequently, in lessening the cost of networking, the main existing star topology will continue but IP addressing and VLAN configuration will be upgraded.

Figure 18 : Star Network in ParsTech Central Office

Based on the network diagram above, the topology have been selected for this network is star topology which will provide a productive network design between the central branch and five other branches. As should be obvious there, all the branches are connected to the router and WAN connection. Next the switch is regularly used at the central branch, servers, and also to the computer in the network. The reason of using this topology as part network design is, before a remote customer has separated, the other remote customer will be not influenced. They are still available to connect the switches and keep up the procedure as for the most part. In addition, this star topology is easy to repair and easy to troubleshoot the errors and evacuate the parts. Despite the fact that this topology is exorbitant to apply, it delivers an excellence performance to the client in the each branches.1.9 Transmission Media

Transmission media is express kind of physical system used to bring a communication signal starting with one framework then onto the next. The stability and the speed of the network will be relies upon on picking the proper cables for the new network and it's likewise must be backing up for future improvement. High capacity bandwidth cabling will be additional cost for the organization. In this manner, the cables selected should be adequate for the new network design to perform ideally and must provide inexpensive cost for the network. The transmission media includes twisted-pair cable, coaxial cable and fiber optic cable.1.9.1 Unshielded Twisted Pair (UTP) Unshielded twisted pair is a well known sort of cable that comprises of two unshielded wires twisted around one another. Because of its minimal effort, UTP cabling is used broadly for local-area networks (LANs) and telephone connections. UTP cabling does not offer as high bandwidth or as great security from interference as coaxial or fiber optic cables, yet it is less lavish and less demanding to work with. The proposed cable for ParsTech's new network is Category 5e cable (Cat 5e) which is suitable for Ethernet. Cat5e cable provides performance of up to 100MHz and its suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). This will provide services for a long term usage and most of the company used to install it in workstation. Cat 5e is cheapest UTP cable which is easy to install and maintain. (Nicholson, 2013).

Figure 19 : Category 5e cableSource : http://www.redco.com/Redco-CAT5E-SHIELDED.htmlCharacteristics of UTP low cost easy to install High speed capacity High attenuation Effective to EMI 100 meter limit

Advantages of UTP Easy installation Capable of high speed for LAN Low cost

Disadvantages of UTP Short distance due to attenuation

1.9.2 Fiber Optics

Fiber optic cable uses electrical signals to transmit data. It uses light and the light only moves in one direction. If for two way communication to take place, a second connection must be made between the two devices. It is a two stands of cable where each stand is in charge for one direction of communication. A laser at one device sends pulse of light through this cable to other device. These pulses translated into 1s and 0s at the flip side. In the focal point of fiber cable is a glass stand or core. The light from the laser that travels through this glass to the next device around the internal core is a reflective material known asCladding. No light escapes the glass core because of this reflectivecladding. Fiber optic cable has bandwidth more than2 Gbps (hubpages, 2010).

Figure 20 : Fiber optic cableSource : http://mathscinotes.com/2014/08/cost-of-optical-fiber-versus-kite-string/

Characteristics Of Fiber Optic Cable Expensive Very hard to install Capable of extremely high speed Extremely low attenuation No Electromagnetic interference (EMI)Advantages Of Fiber Optic Cable Fast Low attenuation No Electromagnetic interference (EMI)

Disadvantages Fiber Optic Cable Very costly Hard to install

1.9.3 Data communications equipment (DCE)

Data communications equipment (DCE) refers to computer hardware devices used to set up, keep up and terminate communication network sessions between a data source and its destination. DCE is connected to the data terminal equipment (DTE) and data transmission circuit (DTC) to change over transmission signals. However, when you talk as far as DCE, it turns into an input signal. This because the specification was written from the point of view of the DTE end of the link.

Figure 21 : DCE cableSource : http://media.cablesandkits.com/p/CAB-232FCc.jpg

2.0 HARDWARE, SOFTWARE AND DESKTOP REQUIREMENTS (TULASINATAN A/L MUTHUALAGU (TP026049)

2.1 HARDWAREAs a network consultant team, we need pick a right hardware close by to address clients needs is a basic element regarding the matter of improving working environment productivity. If your workers arent equipped with the right tools to carry out their employments, office efficiency will affect as a result.2.1.1 Workstation

The network consultant chosen Dell Precision Tower 5810 workstation for the new network. This workstation PC is suitable for long-term work with some of huge datasets. This organization has a central office and 5 branches. All out workstations required in this organization are 140 workstations, which will be 40 workstations in the central office and 20 workstations for each branches in the company. All workstations will be finished with Wireless keyboard and mouse and 26' inch LED Monitor.

Dell Precision Tower 5810 workstation specification

Figure 22 : Dell Precision Tower 5810 workstationSource : http://www.dell.com/my/business/p/precision-t5810-workstation/pdComponentsSpecification

ProcessorIntel Xeon Processor E5-1620 v3 (4C, 3.5GHz, 10M, 140W)

RAM16GB (4x4GB) 2133MHz DDR4 RDIMM ECC

Hard Disk Drive256GB 2.5" Serial-ATA Solid State Drive

Operation SystemWindows 7 Professional (64Bit Windows 8.1 License, Media)- English, French, German, Dutch, Italian

MonitorDell UltraSharp 24 PremierColor Monitor

Price

$ 1,799 (dellus, 2015) (approximately RM 6,881)

2.1.2 Server

The ParsTech Inc network are implemented with 5 server which that include the Dynamic Host Configuration Protocol (DHCP), Database Server, Domain Name System (DNS), Directory Service Server and Application Server. Besides, the DMZ server is also are implemented in the organization. In spite of the fact, these types of the server is already applied in the company, however it is expected to overhaul the server due to the quantity of the workers and the client of organization is developing and expanding. So that, Upgrading the server rack is required and can build the execution of the server, so can deal with more the clients of organization. The allocation of the Rack mount servers is as following:ServersNo of rack mount server

Dynamic Host Configuration Protocol (DHCP) 1

Database Server2

Domain Name System (DNS) 1

Directory Service Server1

Application Server2

DMZ server1

Figure 23 : PowerEdge R430 Rack ServerSource : http://www.dell.com/us/business/p/poweredge-r430/pd?~ck=anav

ComponentsSpecifications

ProcessorIntel Xeon processor E5-2600 v3 product family with 2 Processor sockets.

Memory Slots12 DIMM slots

Price$ 1489 (dellus, 2015) (approximately RM 5,695)

Operating SystemMicrosoft Windows Server 2008 R2Microsoft Windows Server 2012Microsoft Windows Server 2012 R2Novell SUSE Linux Enterprise ServerRed Hat Enterprise LinuxVMware ESX

2.1.3 VPN Firewall router

Netgear SRX5308 VPN Firewall router will be utilized in the ParsTech new network. It is an elite security switch for joining a coordinated VPN server and client and powerful security highlights. The Netgear SRX5308 VPN Firewall router can be the better solution for reducing the cost. This router definitely will increase the security level of the ParsTech new network. Overall 6 routers are required to be implemented in the new network.

Figure 24 : Netgear SRX5308 VPN Firewall routerSource : http://www.netgear.com/business/products/security/SRX5308.aspx#tab-techspecs

Specification of Netgear SRX5308 VPN Firewall router (Netgear, 2015):

4 Gigabit WAN ports with 4 Gigabit LAN ports, load-balancing and failover across quad WAN ports Business-class Stateful Packet Inspection Firewall prevents unwanted access to your network 125 dedicated IPSec VPN tunnels, 75 SSL VPN tunnels for secure remote access 924Mbps LAN-to-WAN throughput, 200000 concurrent sessions Prioritize traffic with Quality of Service (QoS) and WAN Traffic MeteringPrice : $231.49 (amazon,2015) (approximately RM 885) 2.1.4 Internal Router

As the internal router for ParsTech Inc Company, Mikrotik RB/1100AHX2 Routerboard Router OS Level 6 will be used. Outer. It is good router whereby the device perform in 1U aluminium rack mount Gigabit Ethernet router. Apart from that, this device enables switch reset and temperature sensor. ParsTech Inc needed 6 Pcs of this device for central office and their 5 branches.

Figure 25 : Mikrotik RB/1100AHX2 Routerboard Router OS Level 6Source : http://routerboard.com/RB1100AHx2

The following are the specifications (Routerboard, 2015): CPU : PowerPC P2020 dual core 1066MHz network CPU with IPsec accelerator Memory : SODIMM DDR Slot, 2GB installed (RouterOS will use only up to 1.5GB) Ethernet : Thirteen(13) 10/100/1000 Mbit/s Gigabit Ethernet with Auto-MDI/X Includes switch to enable Ethernet bypass mode in two ports Expansion: Reset switch, beeper, voltage and temperature sensors

Price : $329.00 (amazon,2015) (approximately RM 1258)

2.1.5 Wireless Router

As the wireless router for the ParsTech's central office and branches offices, Asus RT-AC66U dual-band wireless-AC1750 is selected. This wireless router offers some key features which will be needed in ParsTech Inc. This router definitely will provide good performance and adequate wireless coverage.

Figure 26 : Asus RT-AC66U dual-band wireless-AC1750Source : https://www.asus.com/us/Networking/RTAC66U/overview/

The following are the specifications (Asus, 2015) 5th generation 802.11ac chipset gives you concurrent dual-band 2.4GHz/5GHz for up to super-fast 1.75Gbps Gigabit Ethernet ports for the fastest, most reliable internet performance AiRadar optimizes wireless coverage with detachable high-powered antennas Enjoy the ASUSWRT dashboard UI for 3 steps easy setup, signal monitoring, and network application control File sharing, printer sharing, and 3G sharing via two multi-functional built-in USB ports

Price : $142.88 (amazon,2015) (approximately RM 546)

2.1.6 Category 5e Cable (CAT5E)

The proposed cable for ParsTech's new network is Category 5e cable (Cat 5e) which is suitable for Ethernet. Cat5e cable provides performance of up to 100MHz and its suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet). This will provide services for a long term usage and most of the company used to install it in workstation. Cat 5e is cheapest UTP cable which is easy to install and maintain. (Nicholson, 2013). Cat5e cable chosen for the ParsTech new network is Cat5e Bulk 1000ft Ethernet Cable White.

Figure 27 : Cat5e Bulk 1000ft Ethernet Cable White.Source : http://www.amazon.com/Cat5e-1000ft-Ethernet-Cable-White/dp/B004PL082U

The following are the specifications (Signal, 2015) Cat5e 4 Solid UTP Unshielded Twisted Pair Conductor: 24AWG CCA - Copper Clad Aluminium Fluke test up to 350MHz Certified Transfer Rate: 10/100/1000 Mbps Length: 1,000 feet (305 meters)

Price : $38.05 (amazon,2015) (approximately RM 145)2.1.7 Switch

Network switch is a hardware device that joins multiple PCs together inside of one local area network (LAN). High-performance network switches are broadly used as a part of corporate networks and data centers. Through information sharing and resource allocation, network switches save ParsTech's expenses and increase employee productivity. As the network switch of ParsTech Inc, TP-Link JetStream 48-Port 10/100Mbps+ 4-Port Gigabit L2 Managed Switch will be used in the new network. In this switch, every port has possibility to select between gigabit Ethernet, Fast Ethernet and standard Ethernet. It can help monitor vitality consequently, which is can naturally shuts down ports for the ports not meeting expectations. ParsTech Inc will be use 3 switches for the central office and 3 switches for each branch offices.

Figure 28 : TP-Link JetStream 48-Port 10/100Mbps+ 4-Port Gigabit L2 Source : http://www.tp-link.com/lk/products/details/cat-39_TL-SL3452.html#overview

The following are the specifications (tp-link, 2015) P-MAC-Port-VID Binding, ACL, Port Security, DoS Defend, Storm control, DHCP Snooping, 802.1X Authentication and Radius provide you robust security strategies L2/L3/L4 QoS and IGMP snooping optimize voice and video application WEB/CLI managed modes, SNMP, RMON bring abundant management features

Price : $306.42 (amazon,2015) (approximately RM 1172)2.2 SOFTWARE AND OPERATING SYSTEM

2.2.1 Server Software

The new network of ParsTech have installed windows Server 2008 Enterprise edition, because windows Server 2008 Enterprise Edition gives more prominent useful functionality and scalability than the Standard Edition. Similarly as with Standard Edition, just a 64-bit version is available. Upgrades incorporate backing for upwards of 8 processors and up to 2TB of RAM. Extra components of the Enterprise edition include support for clusters of up to 8 nodes and Active Directory Federated Services (AD FS) (techotopia, 2013). Additionally, ParsTech Inc. have adaptability where the clients can use from alternate client and information in central storage of organization and their applications from anyplace.

Figure 29 : Microsoft Windows Server Enterprise 2008Source : http://www.amazon.com/Microsoft-Windows-Server-Enterprise-Version/dp/B0011F193A

Price : $2,874.95 (amazon,2015) (approximately RM 10996)

2.2.2 Antivirus

The new network of ParsTech have installed Kaspersky Endpoint Security for Business Core antivirus for the security. By using this antivirus the management can protect the client workstations and the critical servers of ParsTech Inc from attackers. The Kaspersky's Endpoint Security gives top-notch malware detection and is less demanding to send than competing products. The Security Center reassure gives great centralised management facilities and offers quality reporting and alerting features (Millman, 2015).

Figure 30 : Kaspersky Endpoint Security for BusinessSource : http://www.totalavsecurity.com/Kaspersky-KL4867AANDR-p/kl4867aandr.htm

Supported devices (Millman, 2015):

PCsWindows XP Home/Professional (32bit) SP3, Professional (64bit) SP2, Vista SP1, 7 SP1, 8, 8.1.Servers Windows Server 2008 R2/Standard SP1, SBS 2008 SP2, SBS 2011 Essentials, SBS 2011 Standard SP1 ,Windows Server 2012 R2/Foundation/Essentials/Standard.

Price : $49.73 (totalavsecurity,2015) (approximately RM 190)2.2.3 Operating System

The existing network of ParsTech is already using Windows 7 ultimate 64bit. In order to upgrade for a better choice for the new network Windows 8.1 Enterprise 64bit have been installed. Windows 8.1 Enterprise 64bit offers many improvements for Windows users as a whole, such as a better Windows Store experience, built-in apps and enhanced personalization options compare to Windows 8.0 (businessnewsdaily, 2013). ParsTech use for their client systems.

Figure 31 : Windows 8.1 Enterprise 64bitSource : http://voucherstore.net/Windows-8.1-Enterprise

The following are the minimum requirements (voucherstore, 2015) Processor: 1 gigahertz (GHz) or faster RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Hard disk space: 16 GB (32-bit) or 20 GB (64-bit) Graphics card: Microsoft DirectX 9 graphics device with WDDM driver

Price : $49.99 (voucherstore.net,2015) (approximately RM 191)

REFERENCING

Beal, V. (2013, june 6). webopedia. Retrieved 2015, from webopedia: http://www.webopedia.com/TERM/A/application_server.htmlChristensson, P. (2005, february 23). Retrieved 2015, from pc.net: http://pc.net/helpcenter/answers/purpose_of_a_serverDanen, V. (2001). techrepublic. Retrieved 2015, from techrepublic: http://www.techrepublic.com/article/lock-it-down-implementing-a-dmz/1061732/dellus. (2015, may 15). Retrieved 2015, from dellus: http://www.dell.com/us/business/p/precision-t5810-workstation/pd?oc=cup5810w7pssd&model_id=precision-t5810-workstationedrawsoft. (2012, june 06). Retrieved 2015, from edrawsoft: https://www.edrawsoft.com/Network-Topologies.phphubpages. (2010, january 9). Retrieved july 6, 2015, from http://ninjacraze.hubpages.com/hub/Data-Communicationibvpn. (2010, February 24). ibvpn. Retrieved 7 28, 2015, from invisible browsing vpn: http://www.ibvpn.com/2010/02/8-advantages-of-using-vpn/informatics. (2012, october 28). Retrieved july 11, 2015, from informatics: http://www.informatics.buzdo.com/extras/tcp-ip-3.htmJanssen, C. (2012, may 6). Retrieved 2015, from http://www.techopedia.com/definition/5409/wide-area-network-wanJanssen, C. (2012). techopedia. Retrieved from techopedia: http://www.techopedia.com/definition/4804/virtual-local-area-network-vlanKayne, R. (2015, july 16). wisegeek. Retrieved 2015, from wisegeek: http://www.wisegeek.org/what-is-a-web-server.htmLewis, M. (2006). Comparing, Designing, and Deploying VPNs (illustrated ed.). Adobe Press.Mitchell, B. (2013, june 16). Retrieved 2015, from compnetworking: http://compnetworking.about.com/od/basicnetworkingconcepts/g/network_servers.htmnetapp. (2013, may). Retrieved from netapp: https://library.netapp.com/ecmdocs/ECMP1196907/html/GUID-C9DA920B-F414-4017-8DD1-D77D7FD3CC8C.htmlNetgear. (2015, march 21). amazon. Retrieved july 28, 2015, from amazon: http://www.amazon.com/NETGEAR-ProSAFE-SRX5308-Firewall-SRX5308-100NAS/dp/B003HF8SL8Nicholson, M. (2013, april 21). streetdirectory. Retrieved 2015, from streetdirectory: http://www.streetdirectory.com/travel_guide/116195/networking/cat5e_for_high_speed_networks.htmlOdom, W. (2004). CCNA INTRO Exam Certification Guide: CCNA Self-study (illustrated ed.). Cisco Press.orbitcomputersolution. (2013, may 16). Retrieved 2015, from orbitcomputersolution: http://www.orbit-computer-solutions.com/Remote-access-VPNs.phpRouse, M. (2015, june). searchsecurity. Retrieved from searchsecurity: http://searchsecurity.techtarget.com/definition/DMZRouterboard. (2015, april 11). Retrieved July 28, 2015, from Routerboard: http://routerboard.com/RB1100AHx2Syngress. (2003). Building DMZs For Enterprise Networks. Syngress.Syngress. (2003). Building DMZs For Enterprise Networks (1st ed.). Syngress.technet. (2003, March 28). Retrieved 2015, from technet: https://technet.microsoft.com/en-us/library/cc739294(v=ws.10).aspxvicomsoft. (2013, june 13). Retrieved 2015, from vicomsoft: http://www.vicomsoft.com/learning-center/email-and-email-servers/Amazon.com, (2015). Amazon.com: Cat5e Bulk 1000ft Ethernet Cable White: Electronics. [online] Available at: http://www.amazon.com/Cat5e-1000ft-Ethernet-Cable-White/dp/B004PL082U [Accessed 3 Aug. 2015].Amazon.com, (2015). Amazon.com: Microsoft Windows Server Enterprise 2008 25 Client [Old Version]. [online] Available at: http://www.amazon.com/Microsoft-Windows-Server-Enterprise-Version/dp/B0011F193A [Accessed 3 Aug. 2015].Asus.com, (2015). RT-AC66U - Overview. [online] Available at: https://www.asus.com/us/Networking/RTAC66U/overview/ [Accessed 3 Aug. 2015].Netgear.com, (2015). VPN Firewalls - SRX5308 | Security | Business | NETGEAR. [online] Available at: http://www.netgear.com/business/products/security/SRX5308.aspx#tab-techspecs [Accessed 3 Aug. 2015].node, K. (2015). Kaspersky KL4867AANDR. [online] www.totalavsecurity.com. Available at: http://www.totalavsecurity.com/Kaspersky-KL4867AANDR-p/kl4867aandr.htm [Accessed 3 Aug. 2015].Routerboard.com, (2015). RouterBoard.com : RB1100AHx2. [online] Available at: http://routerboard.com/RB1100AHx2 [Accessed 3 Aug. 2015].Server, P. (2015). PowerEdge R430 Rack Server. [online] Dell. Available at: http://www.dell.com/us/business/p/poweredge-r430/pd?~ck=anav [Accessed 3 Aug. 2015].Tp-link.com, (2015). JetStream 48-Port 10/100Mbps + 4-Port Gigabit L2 Managed Switch TL-SL3452 - Welcome to TP-LINK. [online] Available at: http://www.tp-link.com/lk/products/details/cat-39_TL-SL3452.html#overview [Accessed 3 Aug. 2015].Voucherstore.net, (2015). Windows 8.1 Enterprise - retail license -. [online] Available at: http://voucherstore.net/Windows-8.1-Enterprise [Accessed 3 Aug. 2015].Workstation, D. (2015). Dell Precision Tower 5810 Workstation. [online] Dell. Available at: http://www.dell.com/my/business/p/precision-t5810-workstation/pd [Accessed 3 Aug. 2015].

MARKING SCHEME Students Name TULASINATAN A/L MUTHUALGU (TP026049)DINESH A/L THULASIDASS (TP027442)

Group Components (A)

Overall design (5)

Current trends & best practices (5)

Executive summary (5)

Coherence & integration (10)

Referencing (5)

Total Marks (Group Component)

Individual Components (B)

Technical accuracy (25)

Critical analysis & justification (20)

Research & completeness (10)

Presentation (15)

Total Marks (Individual Component)

TULASINATAN A/L MUTHUALGU (TP026049) DINESH A/L THULASIDASS (TP027442)

Group Components (A)

Individual Components (B)

Overall Marks (A + B)

Workload Matrix

Tasks Group Members

TULASINATAN A/L MUTHUALAGU (TP026049) DINESH A/L THULASIDASS(TP027442) -

Executive Summary 100-

Assumption 100-

Section 1 100-

Section 2 3367-

Section 3 100-

Page | 28