Beruflich Dokumente
Kultur Dokumente
are a major consideration for SLC technologies. Considering that the company will be expanding
from one (1) floor to three (3) floors in the very near future, I am responsible for the design of
the infrastructure and security protocols. I have been tasked with designing a network that is
stable, redundant, and scalable. The network solution that is chosen should support the conceived
information system and allow for scalability. The network infrastructure will support
gateways, and access points will be attached. In addition, access paths for Internet access will be
depicted.
Network architecture is the high-level, end-to-end structure for the network. This includes
the relationships within and between major architectural components of the network, such as
addressing and routing, network management, performance, and security. Determining the
network architecture is the next part of the process of developing our network, and is, as we will
see, key in integrating requirements and flows into the structure of a network.
dedicated IT staff. The 20 users have terminals with Windows 10 professional and are set up in a
workgroup all on the same subnet. This was manageable for a small group, but this will need to
be revamped with the expansion. The company plans to expand from one floor to three in the
upcoming months. . Since this is a relatively new company, there is currently limited technology
infrastructure to support the business. All information technology (hardware and software) must
Our current infrastructure is based on a hybrid topology with a server based network. We
have three server racks in our server room on the first floor each with 10 TB of storage. This is
not enough to sustain at our current rate of growth .The suggested increase is about 20% per
year, therefore to sustain for the next 5 years we will need an increase of at least 100TB. At the
main site, we currently have 1 physical Hyper-V hosts that can host approximately one hundred
twenty (120) virtual machines. The virtual machines are running Windows Server 2012 R2 and
Windows 10 Enterprise. The servers are needed to host email, various databases, file services,
print services, and our business intelligence application. The virtual machines are stored in the
server room and use a redundant array of independent disks (RAID).We utilize remote desktop to
configure and maintain them from our Corporate office. To avoid slowdowns or loss of systems
resources we can use a failover cluster with Network Load Balancing to implement a high
availability technology on a managed budget. The Windows Server 2012 failover clustering
feature is designed to minimize the amount of downtime of critical backend services and
applications. We can take the virtual machines, or VMs, themselves and put them into a failover
cluster. This is known as guest clustering and this makes the VM services even more available.
Since speed and reliability are important considerations we will stack the clusters in layers so we
can create a level of high-availability and resilience. Each essential application can be clustered
into four nodes adding better performance along with fault tolerance to our infrastructure. A
failover cluster requires at least two networked physical servers, or one physical server for each
node you want in the cluster up to a maximum of 64. For clustering, the hardware needs to be
certified to work with Windows Server and it is recommended that the hardware for each one of
With Security as one of our top initiatives, we will implement a defense in depth concept
that adds a layer of protection at every level. We will add a Domain Controller (DC) and lock
down the terminals on the domain with strict group policy settings. The user accounts in a
domain will be easier to manage with a centralized server. The DC performs authentication of all
users who log on to a domain. We will use the principle of least privilege to ensure the users only
have access to what they need. We will create groups for each department to allow access by job
duties. Our windows server update services will check and update critical updates and patches
like antivirus on a regular. They are secured by an all in one unified threat management
appliance, which combines the roles of an intrusion detection system, intrusion prevention
system, firewall and Network Access Controls. This in addition to multi-factor authentications,
strong password policies and security awareness training will help harden our system against
threats. We may want to consider upgrading our current Windows 10 professional editions to an
enterprise license in order to take advantage of the built in security features like Bit locker,
Our Data warehouse application and technical architecture will consist of a QNAP TS-
EC2480-RP 100 TB 24-BAY 4U Rackmount NAS with 20 5TB HD attached. Hardware cost for
purchasing software licenses for a given number of seats, a business would access software
applications can be developed and tested within the cloud without the need to test and deploy on
client computers. Implementing this solution would cut down cost of workstations. We could use
thin client machines with virtual desktop solutions and then use the software as a service for the