Beruflich Dokumente
Kultur Dokumente
Assessment Title
Consultancy Report
Student Name
Hussain AlMukhtar
Student ID
201101942
Course Title
Course Code
ITB6004
Please Note:
- Requests for extensions should be made in writing to the Course Coordinator 48
hours before the deadline. You must have a valid reason for requesting an extension as
you are not automatically entitled to one. Students are only permitted one extension
per subject per semester.
- Late submissions will incur a penalty of 5% per day
Page 1 of 18
Bachelor of ICT
Table of Contents
Consultancy Report ................................................................................................................................. 3
Introduction ........................................................................................................................................ 3
Collected Data (Questions and Answers)............................................................................................ 4
Category 1: IT environment ........................................................................................................... 4
Category 2: Domain ........................................................................................................................ 5
Category 3: Roles and Features ..................................................................................................... 5
Category 4: Printers ........................................................................................................................ 6
Category 5: DHCP and DNS ............................................................................................................ 6
Category 6: Storage and File Sharing ............................................................................................. 7
Category 7: Deployment ................................................................................................................ 7
Category 8: Data backup & System recovery ................................................................................ 7
Category 9:Security ........................................................................................................................ 8
Category 10: Problems ................................................................................................................... 8
Category 11: Virtualization ............................................................................................................ 8
Category 12: Terminal service........................................................................................................ 8
Category 13: Future outlook .......................................................................................................... 9
Analysis and Recommendations (with Reply Summaries) ................................................................ 10
Reflection .......................................................................................................................................... 13
Appendices........................................................................................................................................ 14
Tutors approval of the questions ................................................................................................. 14
The reply from the company about the recommendations ......................................................... 14
Full reply received ......................................................................................................................... 15
References ........................................................................................................................................ 18
Page 2 of 18
Bachelor of ICT
Consultancy Report
For [[Mr. SayedMajed]]
Of [[Batelco]]
By: [[Student Name: HussainAlMukhtar
Introduction
This report looks at the servers in the real-life atmosphere for existing company which is
Batelco. Bahrain Telecommunication Company has the largest share in the
telecommunication market here in Bahrain. The headquartered is located in Bahrain and it
has other branches in different countries.
I interviewed Sayed Majed Fadhul from the IT department in Batelco. He is the team leader
of that organization as "Infrastructure development manager". I sent the questions to the
manger to get an overview about what the interview will be about. The questions and
answers will be included in the report. After analyzing the answers, a set of
recommendations that explain how to get better and efficient environment will be given to
the company. The recommendations and the customer feedback will be included also in the
report, showing whether the company agree or disagree about the recommendations with
the reason stating why. The end of the report will include my reflections about what I
gained from this report.
Page 3 of 18
Bachelor of ICT
The company satisfied with the current operating systems as it is covers the
company needs.
The company serves the clients depending on the applications they use for
example if we are talking about the LPAM which is record data base
information's server, this server serve around 80 clients. For the intranet
server it serves more than 1200 clients.
The company use almost all the topologies structure for example cluster
database on two physical servers and load balance (front end), single servers
such as (LPAM and Gicom), and failover (Active - passive) both connected to
the same san Storage in case one of them crashed the other one work as a
backup. Others.
Page 4 of 18
Bachelor of ICT
Category 2: Domain
1. How many domains does the company have?
The company use one main domain and two other domains for special
requirements.
3. Does the company use the same domain for the other company branches? Why?
The company uses the same domain between both branches Hamala and
Telephone House, which include redundancy and backups.
IIS used to transfer data and information's through the network and
enables the clients to access the internet through the protocols thats
support such as HTTP, HTTPS.
SFTP which stands for secure file transfer protocol thats used to secure
file transferring across the network.
They have more than one Active Directory installed in case one of them
crashed the other one works by the (round robin) which checks the other
active directory works.
Page 5 of 18
Bachelor of ICT
Category 4: Printers
1. What is the topology of the printers in the offices?
2. Does the company use the 80 20 rule to ensure continue DHCP services? Why?
3. Does the company use failover clustering in your DHCP services? Why?
At the moment they don't, they use a separated DHCP by site for each one.
7. What does your company do to reduce the amount of DNS traffic passing over the
internet connection?
The company use a domain controller to forward Internet domain name resolution
requests to the ISPs DNS server
Page 6 of 18
Bachelor of ICT
The company does use soft quotas and it is managed by the administrator.
3. Do you have private storage in the server for each user? Or the users have their storage
on their own PC?
The company uses both, storage on the server and on their PC hard disks.
Category 7: Deployment
1. Does your company use the servers to deploy operating systems on the
network? Which tool do you use? What is the process of deploying?
The company has daily, weekly and monthly backup which depends on
requirements.
They are retention policies from months to years and it depends on the data
that they decide to keep before they erased.
In case of one of the servers crashed they use the backup server
immediately.
Page 7 of 18
Bachelor of ICT
Category 9: Security
1. What is the security plan for the company?
They have a security plan but they prefer not to declare it.
They placed the servers in a data center room, and it has a different security
levels, first two are with an access card, third level is only limited persons can
access to it, fourth level is that the servers are locked with keys, and the keys
kept in different place.
Yes, first the problem sent to the local competent authorities if they need a
help the have a vender supports for both (hardware and software).
Yes, as they have vender support for both hardware and software.
Yes, the company uses it in Gicom, LPAM, active directory and small
applications.
Yes, the company use it for secure SSH and Remote Desktop.
Page 8 of 18
Bachelor of ICT
Yes, they think to use the features on windows 2012 data de-duplication (DeDup).
Yes, to be up to date.
Page 9 of 18
Bachelor of ICT
The company mentioned that they have more than 300 servers, and this is a
huge number and a huge cost for both buying and maintain the servers.
Which I recommend to consolidate the common features or roles from
several servers into one powerful server. Which will reduce the number of
servers, will save money and avoid wasting time maintaining them.
We will be considering consolidating the common features.
Currently part of the company servers are using windows 2000 -2003. Where
the company can upgrade those two windows operating system. Because
there is no support for Windows 2000 and by the end of 2014 there will be no
support for the Windows 2003. I recommended to put a plan to upgrade the
company Windows servers.
We will consider migrating to windows 2008 or higher.
Generally there are some features are installed on the company servers such
as Windows 2012 but they are not used. So I recommended removing the
unused software elements which will make the server more secure and more
efficient to install other used features.
The company agree to preform and will do it through the infrastructure
team.
Page 10 of 18
Bachelor of ICT
As mentioned in your answers that the company dont use the 80 -20 rule. I
recommend your company to use the 80/20 rule for your DHCP servers to
ensure continues DHCP services for client when requesting a lease. You can
split each scopes between two servers applying an 80% of IP address range
for primary server A / and 20% for secondary DHCP server B.
The company will investigate to find the best architecture to implement.
As stated in your answers that the company use windows file sharing
between the branches. I recommended the company to use SharePoint
rather file sharing to gain more secure environment, efficient storage and
document management system.
Also, I recommended the company to use Distributed File System (DFS),
where the user can access the files even if the server that it saved on is
turned off because more than one target can be chose for the file. So the
user can access it from another place.
Using DFS will be a good solution.
Page 11 of 18
Bachelor of ICT
In the discussion, you mentioned that your company doesn't use the
Windows AIK in your Windows server 2008. So I recommended that your
company starts using Windows Automated Installation Kit (AIK) in your
Windows 2008 server. This tool reduces the configurations time for the
computers. Furthermore, the company may use this tool to deploy any
versions of windows Operating system in several computers through an
image file stored in the network at the same time.
We will investigate the efforts needed to implement this feature.
As mentioned in the answers the company uses soft quotas to manage the storage
of the users. I recommend to use hard quotas as it is prohibits user from exceeding
the allotted space from him. That will limit the load over the network storage. Also,
it will allow saving more space.
We will consider this recommendation.
Page 12 of 18
Bachelor of ICT
Reflection
This report was a challenge for me by finding authorized person of a company to gather information
about its infrastructure. After that, we have been asked to prepare questions of at least eight
different categories. I find difficulties when writing questions that have fit the person I am aiming to
interview and where I can give recommendations about. I faced some difficulties gathering the
answers during the interview especially when I asked questions about security methods. The next
challenge was writing recommendations and I found it hard because the company was audited by
another company regarding their infrastructure and security. On the other hand, I obtain an
experience by doing this report which covers a lot of things. In the beginning I learned how to
implement and connect what we are studying into the real life atmosphere. Also, I learned how to
find the gaps of an existing infrastructure by analyzing the information's received from the customer.
Then how to give the solutions in order to cover these gaps and improve the environment to be
efficient.
Page 13 of 18
Bachelor of ICT
Appendices
Tutors approval of the questions
Page 14 of 18
Bachelor of ICT
Full reply received
1. The company mentioned that they have more than 300 servers, and this is a
huge number and a huge cost for both buying and maintain the servers.
Which I recommended is to consolidate the common features or roles from
several servers into one powerful server. Which will reduce the number of
servers, will save money and avoid wasting time maintaining them.
We will be considering consolidating this especially for web sites having
IIS and MS SQL, having less servers will be a good solution.
2. Currently part of the company servers are using windows 2000 -2003. Where
the company can upgrade those two windows operating system. Because
there is no support for Windows 2000 and by the end of 2014 there will be no
support for the Windows 2003. I recommended to put a plan to upgrade the
company Windows servers.
Old windows versions as in your recommendation will be considered to
be migrated to windows 2008 or higher as this is dependent on the
application hosted if it supports upgrading the windows server.
3. Generally there are some features are installed on the company servers such
as Windows 2012 but they are not used. So I recommended removing the
unused software elements which will make the server more secure and more
efficient to install other used features.
I agree and this will need the infrastructure team to work with
Application Teams to go through the servers and identify which to be
removed.
Page 15 of 18
Bachelor of ICT
5. As mentioned in your answers that the company dont use the 80 -20 rule. I
recommend your company to use the 80/20 rule for your DHCP servers to
ensure continues DHCP services for client when requesting a lease. You can
split each scopes between two servers applying an 80% of IP address range
for primary server A / and 20% for secondary DHCP server B.
This needs more investigation by network team as we have more than
one site and need to find the best architecture to implement this, but
good point to rise.
6. As mentioned in your answers that the IP lease duration of the IP address is
48 hours (two days). I recommended increasing this duration to be up to 120
hours (5 days). Because your DHCP server would be overloaded with many
DHCP requests from the clients which will be a reason for congestion inside
the network.
The policy implemented is not to fix the IPs for a long time and thats
why the IP lease is set to 48 hours will need to consult the network team
to make sure there will be any impact on other systems.
Page 16 of 18
Bachelor of ICT
7. As stated in your answers that the company use windows file sharing
between the branches. I recommended the company to use SharePoint
rather file sharing to gain more secure environment, efficient storage and
document management system.
Also, I recommended the company to use Distributed File System (DFS),
where the user can access the files even if the server that it saved on is
turned off because more than one target can be chose for the file. So the
user can access it from another place.
This needs will depend on file types and size which some are not
recommended to be hosted on SharePoint, while using DFS for them will
be a good solution.
8. In the discussion, you mentioned that your company doesn't use the
Windows AIK in your Windows server 2008. So I recommended that your
company starts using Windows Automated Installation Kit (AIK) in your
Windows 2008 server. This tool reduces the configurations time for the
computers. Furthermore, the company may use this tool to deploy any
versions of windows Operating system in several computers through an
image file stored in the network at the same time.
As we have SCCM implemented we need to investigate the efforts
needed to be done to implement this feature.
9. As mentioned in the answers the company uses soft quotas to manage the storage
of the users. I recommend to use hard quotas as it is prohibits user from exceeding
the allotted space from him. That will limit the load over the network storage. Also,
it will allow saving more space.
We will consider this recommendation after discuss it with concerned team.
Page 17 of 18
Bachelor of ICT
References
http://en.wikipedia.org/wiki/Batelco
Page 18 of 18