PRESTARIANG BERHAD. PROJECT BACKGROUND Implementing :  upgraded version of computer network better performance and security. Implementing  several simple.

Slides:



Advertisements
Similar presentations
Vocabulary words By: Toyre Jones. Electronic mail which allows individuals with an account to send messages to another person with an account.
Advertisements

Remote Monitoring System 90% of organizations dont know: – # of devices in population – # of model numbers – # of pages printed – Toner levels in each.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
NetWatcher NetGuarder NetWatcher Introduction - Boost Enterprise Efficiency Dramatically
Page 1 Organize for Success IST Organization Design January, 2013 MALCOLM BERNSTEIN CONSULTING.
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
An Introduction to System Administration Chapter 1.
Computer Networks An Overview. A Computer Network!
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
INFORMATION SYSTEMS & SERVICES FY Budget Worksession July 17, 2007.
Juniper Bridge Ltd | Suite 5, Crescent House | Yonge Close, Eastleigh | Hampshire SO50 9SX | |
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Implementing Unified Messaging Joseph Blanchard Joseph Mancuso S. Paul Petroski.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Unified Communications Survey Summary Results Market Connections, Inc. June 2007.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Effectively Explaining the Cloud to Your Colleagues.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
CSNB424 Network Analysis and Design NETWORK DESIGN PROPOSAL FOR WAXTON IT SOLUTION By: PRIYA RAJAGOPAL ASHARUDIN ABDUL BUHARI USHAMALAR SELVARAJAH MOHD.
Chapter 4 Computer Networks – Part 1
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Natick Public Schools Technology Presentation February 6, 2006 Dennis Roche, CISA Director of Technology.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
SPrint: A Smart Printing Service for Siebel Center Imranul Hoque, Sonia Jahid, Ahsan Arefin {ihoque2, sjahid2, illinois.edu Department of Computer.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
-Electronic mail which allows individuals with an account to send messages to another person with an e- mail account. IRC- internet relay chat was.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
National Chi Nan University Automatic Event-Driven System for Network Management Author: Ya-Ling Wang, Arak Sae Yuan, Quincy Wu Date : 2/21/2012.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Hosted Voice & Hosted Contact Center
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
+ Lec#1: Planning, Designing, and Operating Local Area Networks 1 st semester CT.
Chapter4 Part2. User Account Management Once Active Directory is installed and configured, you enable users to access network servers and resources through.
CEG 2400 FALL 2012 Chapter 15 Network Management 1Network Management.
11/8/2012Proprietary & Confidential1. Enhancing the learning environment to… Increase student & teacher competencies in technology Support the integration.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Virtual Directory Services and Directory Synchronization May 13 th, 2008 Bill Claycomb Computer Systems Analyst Infrastructure Computing Systems Department.
Information Technology Proprietary and Confidential © Copyright 2007 – Peralta Community College District.
Printing (Net-Print) Joanne Button August 23rd 2016.
Unit 36: Internet Server Management
3.1 Types of Servers.
Chapter 6 Application Hardening
3.1 Types of Servers.
Data Center Service Brian Messenger 11/15/2016.
3.1 Types of Servers.
Unit 36: Internet Server Management
PLANNING A SECURE BASELINE INSTALLATION
Technology Department Annual Update
Profit Tools IT Infrastructure Improvement
Presentation transcript:

PRESTARIANG BERHAD

PROJECT BACKGROUND Implementing :  upgraded version of computer network better performance and security. Implementing  several simple security applications onto the network  restructing its current network architecture, it can achieve its goal.

OBJECTIVE Main objective is:  enhance the current network of Prestariang Berhad.  performance and security.

SCOPE focusing on the 1 st Floor of Prestariang Berhad’s office in Cyberjaya, Selangor.  The measurement of the floor is: 26’ 11” X 58’ 12”

ANALYSIS List of network user. User Amount CEO’s Office3 Finance Department20 Marketing Department15 Technical Department30 Human Resource Department20 Guests15

Network Service Provided  Current network:  Directory services   Printing  File server  World wide web  SNMP The potential upgraded version :  Instant messaging  Voice over IP

PRIORITIZING BUSINESS GOAL There are several business goals :  Improve communication  Increase employee productivity  Avoid business disruption caused by network security problem  Avoid business disruption caused by natural and unnatural disaster  Profitability

Prioritizing Business Goals Priority Increase employee productivity 35% Profitability 25% Avoid business disruption by network security problem 15% Avoid business disruption by natural & unnatural disaster 15% Improve communication 10% TOTAL 100%

TECHNICAL REQUIREMENT RequirementAmount Intrusion Detection System2 units Network Monitoring System1 unit Network Cable10 meter Server Rack1 unit Uninterrupted Power Supply1 unit

NETWORK SERVICES AND APPLICATIONS PROVIDED

Application No.ServiceData Rate 1 30 kbps 2Printing20 kbps 3File Server50 kbps 4Accounting40 kbps 5Word Process Doc50 kbps 6Web Page50 kbps 7SNMP70 kbps Application No.Service 1 2Printing 3File Server 4Accounting 5Word Process Doc 6Web Page 7SNMP

NEW NETWORK SERVICES AND APPLICATIONS

BUDGETING RequirementAmountPrice Intrusion Detection System2 unitsRM 700 Network Monitoring System 1 unitRM 350 Network Cable10 meterRM 100 Server Rack1 unitRM 500 Uninterrupted Power Supply 1 unitRM 300 TOTALRM 1 950

SNMP MONITORING WITH NAGIOS Nagios provides complete monitoring of SNMP (Simple Network Management Protocol). Thousands of different network devices and operating systems from different vendors support SNMP for delivering critical information on health and usage metrics, service state.

SNMP MONITORING WITH NAGIOS Nagios offers the following benefits: Increased server, services, and application availability Fast detection of server and operating system failures Fast detection of service and application failures Reduced deployment time Reduced administrative overhead

LOGICAL NETWORK DIAGRAM

PRESTARIANG’S SERVER ROOM

THE END

GROUP MEMBERS :