All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Released Plan and a Maintenance Plan, Research Paper Example

Pages: 6

Words: 1557

Research Paper

Introduction

The document is based on a released plan and a maintenance plan. The release plan includes the release item information, priority, justification and scope of the release item, scheduling and reason for release, end date of the release product, groups that are affected by the release process, release method, risk assessment, communication, training and documentation. The maintenance plan includes the description of the system, progress or status of the system, system support, system maintenance and level of support required along with time duration.

Release Item

“Secure Wireless Network Access”

Priority

The priority is selected from the options i.e. minor or major. In the current scenario, it is a major release.

Description and Scope of Release

However, the organization is currently securing its wireless network by wired equivalence privacy (WEP). There is a requirement of configuring WEP version 2 and WPA within the wireless network along with installation of spyware and firewall. The security framework will secure the organizations wireless network

Release Schedule

The release schedule not assigned yet.

Release End Date

The release end data is not assigned yet.

Target groups affected by Release

End Users

In order to incorporate wireless security framework, employees using the wireless network will encounter service outage, as the wireless access points will not be operational. The encryption techniques including WEP version 2 and WPA will be configured on wireless routers and access points. In order to prevent service outage, network support staff can configure the wireless devices one by one, as this approach will minimize the downtime for some department requiring wireless connectivity.

IT Support Staff

“While ITS will provide support for the backend infrastructure and will also provide desktop support to administrative and other groups under an SLA, first-level troubleshooting and desktop support for this service will be provided to specific departments  by their respective IT support groups. Should a group or division in an organization do not have a local IT Support Group, Service Desk (ITS) will provide over the phone/email first-level support and installation guide” (ITS Release Management Plan Template. (n.d.))

IT Support Staff

The support groups that will facilitate the release plan are as follows:

  • Client Communications will be responsible for maintaining the wireless network security information in white pages for the organization.
  • Enterprise Workstation Services are responsible for issues related to desktop support and executive support for wireless network connectivity issues.
  • Network Infrastructure Services is responsible for issues related to second-level support and encryption services.
  • Shared Systems ensures adequate maintenance and running of the wireless encryption services on server along with its operating system.
  • Support or helpdesk ensures appropriate incident management, wireless network connectivity service request.
  • Production Facilities is responsible for examining wireless encryption services and notify to concerns, if any issue arises.

Release Contingency Plan

The wireless network security services will incorporate encryption services, DHCP services and WPA services. These services are configured on wireless network security server. One more consideration includes the operating system functionality, as these services will become non-functional in the case of an operating system failure. Moreover, if the server or operating system malfunctions, the services will be stopped. This will be a major drawback as the wireless network will become vulnerable to hackers, viruses and spywares. There is a requirement of mirroring these services on a separate server. Likewise, a dedicated support team is required to handle and monitor the instances of these services on both the systems i.e. primary server and secondary server.

Communication

A monitoring interface is required that will highlight and notify all issues related to the wireless network security services. Moreover, SNMP configuration can facilitate the network and support team to maintain uptime of network components, systems and services in an orderly manner. As per network dictionary, SNMP is defined as “Simple Network Management Protocol (SNMP) is the standard protocol developed to manage nodes (servers, workstations, routers, switches and hubs, etc.) on an IP network. SNMP enables network administrators to manage network performance, find, solve network problems and plan for network growth”. Likewise, managers and support groups will communicate with each other via emails.

Training

In order to train wireless network users, a self-troubleshooting guide will be published to the organization’s intranet. Documentation will illustrate the methods of establishing a secure wireless connectivity. Moreover, configuring a password or modifying old password for wireless connection is also demonstrated in the troubleshooting guide. It is observed that minor training is required to connect laptops or establishing wireless connection. However, certain credentials are required in order to gain access to the Internet. Likewise, as per policy, only limited users are granted Internet access, depending on the nature of work. However, if any user is unable to establish wireless connectivity, IT groups will facilitate users on phone, emails, or via visit. The troubleshooting guide is available for download from the organization’s intranet website.

Documentation

Documentation is a critical part of the release plan. However, the troubleshooting guide is available for download from the intranet; additional information is also available for novice users. The following information is published on the organization’s website:

  • Recommended Wireless Ethernet models
  • FAQ for connecting the wireless network
  • Installation and download guide for accessing the Internet on the wireless network.
  • Systematic power point presentation for connecting and securing the wireless network
  • Guide for Manual IP assignment, in case of DHCP failure. Guide includes, IP addresses, Gateway and subnet mask.

The support staff and end users approach the Intranet in case of any assistance in terms of configuration and administrative guides, as intranet is the central source of all the guides and troubleshooting related to wireless networks.

Maintenance Plan

System

The network security architecture will provide enhanced security for the organization’s wireless network. In order to incorporate skills that are required for implementing the maintenance plan, network support engineers and system administrators are vital. Moreover, the concerned managers will handle management issues related to the system. The system will incorporate several services that will provide enhanced security of the wireless network of an organization. Encryption and security technologies including WPA, WEP version 2 and SNMP will facilitate enhanced security. “WEP uses passwords that are entered manually at both ends (see preshared keys). Using the RC4 encryption algorithm, WEP originally specified a 40-bit key, but was later boosted to 104 bits. Combined with a 24-bit initialization vector, WEP is often touted as having a 128-bit key. See WPA, 802.11i and initialization vector.” (WEP definition from PC magazine encyclopedia) moreover, WPA utilizes a new key hierarchy that constructs new encryption keys. These encryptions keys are unique, as the end users will generate a new key each time they connect to the wireless network. Likewise, protocols that are incorporated during this process are 802.1x, RADIUS and EAP, in order to provide enhanced security (Edney & Arbaugh, 2004). The support and administrative staff will configure wireless routers, wireless access points and servers running services related to wireless network security and encryption. However, the core components are the services running on a server, wireless routers and access points.

Status

Organization is currently operational on a wired and wireless network. The wireless network will incorporate an enhanced wireless network security including WPA, WEP version 2, SNMP, antivirus software and anti spyware software. By incorporating these technologies and software, the current wireless network will improve and protect itself by attacks from intruders, hackers and viruses.

Support

Technology is evolving; every now and then replacing itself by an advanced and improved technology or service, there is no prediction of a project or system life. However, in order to ensure sustainable protection, invariable system monitoring procedures are essential. Moreover, considerations to improve system productivity will be beneficial for the organization. By considering these factors, maintenance support is essential.

Maintainer

In order to support the functions of the system, organization is equipped with a technical support department including technical support staff and managers. However, outsourcing maintenance of the system is optional. The factors supporting the decision of outsourcing maintenance activities is probably the cost. In the current scenario, organization can cope up with the current system maintenance requirements.

Contracts

Outsourcing requires certain contracts and agreements between the maintainer and the customer. The technical support department of an organization may sign agreement with the maintainer, in order to provide maintenance services for the system i.e. wireless network architecture. However, in some cases, emergency services are also a part of the outsourcing contract or agreement. Likewise, the emergency services are provided on an hourly basis. Moreover, if there is a requirement of system upgrade, configuration control board (CCB) has a role to play.

Level of Support

The level of support for the wireless network will be for maximum three years including two major enhancements. However, one release is supported each year. Likewise, system upgrade will include all the changes that are granted and approved by the configuration control board (CCB). In order to handle queries related to technical issues and support, technical help desk will provide all the assistance required.

Support Period

The support period and duration may vary, as the period before ‘delivering the product’ and ‘after delivering the product’ will depend on many factors. However, the maintainer will facilitate the system during the construction stage. The maintainer will provide support via emails or via phone. Likewise, the support will be associated with factors related to system requirements, planning etc. as per the agreement; the duration of support will be of three years.

References

ITS Release Management Plan Template. (n.d.). Retrieved from http://www.its.monash.edu.au/staff/projects/desktop-vc/dvc-rm-v2.0.pdf

Edney, J., & Arbaugh, W. A. (2004). Real 802. 11 security: Wi-fi protected access and 802. 11i . Boston, MA: Addison-Wesley.

Simple network management protocol version 2. (2007). Network Dictionary,  442-443.

WEP definition from PC magazine encyclopedia Retrieved 7/9/2011, 2011, from http://www.pcmag.com/encyclopedia_term/0,2542,t=WEP&i=54412,00.asp

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper