All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

System Design and Specification, Capstone Project Example

Pages: 4

Words: 1234

Capstone Project

Introduction

Our industries, factories, organizations, SME’s are revolutionized significantly with the aid of information technology. The manual procedures which were conducted by physical interaction are now integrated in to computerized software programs and networks. The automation processes are now only a few mouse clicks away. These systems enabled the organizations to get accurate and efficient information almost instantly. Information technology is penetrated in almost every sector, every industry, corporate organizations, small businesses, online businesses, cell phones, home computers, fax machines, emails, Internet, and our day to day activities. Hence, Information technology is a part of our lives, culture and society.

On the other hand, the robust revolution of information technology advancements has enabled itself almost essential for every organization. The adaptation of information systems enables the business to automate the manual processes, productivity, reliability and efficiency. The objective is to automate organizational processes and decisions with the help of information systems. The objectives are to optimize the throughput and productivity at lowest cost. Evaluating information systems is listed in one of the most crucial aspects of this industry. Computer scientist showed the propensity to concentrate their efforts in terms of developing methods for evaluating the performance of information systems. The values which they consider as parameters to evaluate information systems are; the total throughput of the system, CPU utilization and processing a given job at lowest cost (Oxford Journals).

Today, information systems equipped with latest technology are mandatory to be incorporated in every corporate organization. However, gaining benefits from the new systems need an extensive consideration on various factors related to the success or failure of these systems. Similarly, a network design was constructed for Stush Inc. The specific product is a proposed network design addressing issues highlighted in requirement analysis. As the requirement analysis highlighted an absence of mechanism for capturing internal market of garment buyers and suppliers. Similarly, no administrative and technical controls are available. Moreover, no standardized practices are followed for business operations and no communication infrastructure available for connecting branches located at different locations. For addressing all these issues, a proposed network design was constructed. The design incorporates physical assets such as workstations, servers and network devices. For capturing international buyers, an infrastructure capable of hosting a secure website is implemented. For deploying administrative controls, network policy is drafted for designating ownerships and responsibilities for enforcement of policy. Moreover, technical controls are addressed by configuring VPN, CHAP, MD5 and PPTP along with Microsoft Internet and Acceleration server that will also work as a proxy server for Stush Inc. furthermore, for addressing scalability for the future, virtualization solutions are also implemented such as the Microsoft Hyper V (Stidley, 2008).

As far as training is concerned, information technology is evolving at a rapid pace. Organizations are keen to align with current trends in the industry. As we are currently on the initial stage of our training phase, users must be trained for using workstations and accessing data sources on the network. Moreover, they must be well versed for acceptable use policies that may include do’s and don’ts for the Stush network services and resources. Training is not a single phase activity; it is a periodic process that initiates on different phases of the network. For instance, network development training incorporates users to contribute in the development process, network migration training incorporates business continuity planning, and network maintenance incorporates support training for the support staff. As per the current scenario, on- going training is recommended, as the system behavior will change during network implementation. Users must be trained for accessing data sources within the internal as well as external networks i.e. remote offices. Moreover, users must be trained for establishing VPN connectivity if lost for some reason. Furthermore, updating anti-virus, defragmenting and scanning hard drive for efficiency and known viruses is also incorporated in an ongoing training of the staff.

Description of Products

The product of the design demonstrates a connectivity of two offices via a Virtual private network connection. The VPN connection is subscribed from an Internet Service Provider. Each remote office comprises of a firewall that accepts or denies data packets as per defined rules. After the firewall, a router is installed. The backbone router that is located at the hub branch is more secure, as it received request for connections from all other remote offices i.e. spokes. Secure encryption protocols, algorithms and hashing techniques are configured. Furthermore, the router is than connected to a switch connecting to internal network or local area network within the hub branch. However, the spoke branch incorporates a configuration of only MD5 at the router and the rest is similar to hub branch. The hub branch also incorporates Domain environment i.e. Microsoft Active Directory server, Microsoft Internet and Acceleration Server and RADIUS server. The Microsoft Active Directory server will ensure integrity and security of directory services and maintain them centrally (Brovick, Hauger, & Wade, 2000). The Microsoft Internet and Acceleration Server ensures added layer of security by dropping suspicious packets bypassing the firewall and granting, restricting Internet access to specific employees, as per business requirements. Moreover, ISA server is also configured for filtering traffic (Dooley, 2002), maintain a domain name service and dynamic host configuration protocol. Similar to a hub branch, all the spoke branches acquire a domain controller that will be synchronized with the primary domain controller located at the hub branch. Infrastructures for both hub branch and spoke branch are illustrated below in Fig 1.1 and 1.2 respectively.

Figure 1.1

Figure 1.1

Figure 1.2

Figure 1.2

VPN connectivity is established by utilizing Public Switched Telephone Networks (PSTN). The connectivity is demonstrated in Fig 1.3 below

Figure 1.3

Figure 1.3

As per fig 1.2, one of the branches is hub branch and other one is the spoke branch (Remote office). As hub branch is the backbone for connecting all the branches, spoke branches must require an Internet connection and a VPN dialer (Roland & Newcomb,) with credentials. In order to establishing connectivity with the hub branch, spoke branch will dial in from a ‘VPN dialer’ with correct credentials for authentication and connecting successfully with the Stush Network. Cisco network devices and security appliances are preferred. However, if cost is the issue than the alternative will be to configure software based firewalls. Likewise, Microsoft ISA server is a firewall that also RADIUS, DHCP and VPN is a suitable options for an SME such as Stush. Moreover, for hosting web server, total cost of ownership will be increased significantly, as the web server requires periodic maintenance, redundant Internet links and alternate power supplies. Hosting to a third party will be a feasible option, as administrative access will be provided to modify or add dynamic web pages with updated contents.

References

Brovick, E., Hauger, D., & Wade, W. (2000). Windows 2000 active directory. Indianapolis, Ind.: New Riders Pub.

Dooley, K. (2002). Building large-scale LANs . Beijing: O’Reilly.

Roland, J., & Newcomb, M. J.CCSP cisco secure VPN exam certification guide (CCSP self-study) Cisco Press.

Stidley, J. (2008). MCTS: Windows server 2008 applications infrastructure configuration study guide (exam 70-643). Hoboken: John Wiley & Sons, Inc.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Capstone Project Samples & Examples

My Coaching Philosophy, Capstone Project Example

Coaching Philosophy The school I am using is American Military University. My coaching philosophy would be thought of as one that expects a lot of [...]

Pages: 11

Words: 3049

Capstone Project

African-American Women and HIV/AIDS, Capstone Project Example

The aggregate of Hillsborough, Florida—HIV-positive, African American women–is characterized by high poverty rates, lack of education, and the recurrence of various disease including sexually transmitted [...]

Pages: 6

Words: 1619

Capstone Project

Girl Education in Africa, Capstone Project Example

Historically, women have been subject to significant equality when compared to men. As a consequence, women are conventionally seen as homemakers, and their worth is [...]

Pages: 3

Words: 912

Capstone Project

Caring for the Elderly, Capstone Project Example

Introduction The Mary Wade Home The Mary Wade Home is a five-star senior community that aims to provide personalized care. This assisted living facility and [...]

Pages: 28

Words: 7650

Capstone Project

Therapeutic Solutions to Children Experiencing Domestic Violence, Capstone Project Example

Domestic violence refers to the violence committed by a person in the domestic circle of the victim. People who abuse others may include partners, ex-partners, [...]

Pages: 12

Words: 3297

Capstone Project

Unplanned Changes, Capstone Project Example

For the revision of budget and implementation plan, we have selected scenario A that is mandatory and scenario b. In scenario A, we will replace [...]

Pages: 2

Words: 552

Capstone Project

My Coaching Philosophy, Capstone Project Example

Coaching Philosophy The school I am using is American Military University. My coaching philosophy would be thought of as one that expects a lot of [...]

Pages: 11

Words: 3049

Capstone Project

African-American Women and HIV/AIDS, Capstone Project Example

The aggregate of Hillsborough, Florida—HIV-positive, African American women–is characterized by high poverty rates, lack of education, and the recurrence of various disease including sexually transmitted [...]

Pages: 6

Words: 1619

Capstone Project

Girl Education in Africa, Capstone Project Example

Historically, women have been subject to significant equality when compared to men. As a consequence, women are conventionally seen as homemakers, and their worth is [...]

Pages: 3

Words: 912

Capstone Project

Caring for the Elderly, Capstone Project Example

Introduction The Mary Wade Home The Mary Wade Home is a five-star senior community that aims to provide personalized care. This assisted living facility and [...]

Pages: 28

Words: 7650

Capstone Project

Therapeutic Solutions to Children Experiencing Domestic Violence, Capstone Project Example

Domestic violence refers to the violence committed by a person in the domestic circle of the victim. People who abuse others may include partners, ex-partners, [...]

Pages: 12

Words: 3297

Capstone Project

Unplanned Changes, Capstone Project Example

For the revision of budget and implementation plan, we have selected scenario A that is mandatory and scenario b. In scenario A, we will replace [...]

Pages: 2

Words: 552

Capstone Project