Alpha Omega IT Project Feasibility Study
Prepared by: Alpha Omega IT
Reviewed by: Jeffrey Dagher
V1.3
Table of Contents
1. Document Details ................................................................................................. 5
1.1 Document History .................................................................................................... 5 1.2 Document Purpose ................................................................................................... 5 1.3 Document Audience ................................................................................................. 5 1.4 Document Task Breakdown ...................................................................................... 5 1.5 Quality Assurance .................................................................................................... 6
2. Problem Analysis .................................................................................................. 7
2.1 Background ............................................................................................................. 7 2.2 Core Problem ........................................................................................................... 7 2.3 Problem Analysis ...................................................................................................... 7
3. Proposed solution ................................................................................................. 9
3.1 Common Goals ........................................................................................................ 9 3.2 LAN & WLAN ........................................................................................................... 9 3.3 Server Design ........................................................................................................ 10 3.4 Client Design ......................................................................................................... 11
4. Solution 1 ........................................................................................................... 11
4.1 System Overview ................................................................................................... 11 4.1.1 Server Hardware .............................................................................................. 12 4.1.2 Workstations and Laptops ................................................................................ 12 4.1.3 Network Hardware ........................................................................................... 12 4.1.4 Printers ........................................................................................................... 12 4.1.5 Software ......................................................................................................... 12 4.1.6 Ongoing Maintenance ...................................................................................... 13 4.1.7 Personnel Costs ............................................................................................... 13
4.2 Technical Feasibility ............................................................................................... 13 4.2.1 Network Structure ............................................................................................ 13 4.2.2 Internet and Remote access ............................................................................. 14 4.2.3 Server hardware .............................................................................................. 15 4.2.4 Server Operating System .................................................................................. 15 4.2.5 Domain Controller ............................................................................................ 15 4.2.6 Mail Server ...................................................................................................... 15 4.2.7 File Server ....................................................................................................... 16 4.2.8 Database Server .............................................................................................. 16 4.2.9 Backup Approach ............................................................................................. 16 4.2.10 Clients Hardware ........................................................................................... 16 4.2.11 Clients Operating System................................................................................ 17 4.2.12 Additional Applications ................................................................................... 17 4.2.13 Security ......................................................................................................... 17 4.2.14 Printing Facilities ............................................................................................ 17
4.3 Economic Feasibility ............................................................................................... 18 4.3.1 Table of Costs ................................................................................................. 18 4.3.2 Net Present Value (NPV) .................................................................................. 19 4.3.3 Return On Investment (ROI) ............................................................................ 19 4.3.4 Payback Analysis ............................................................................................. 20 4.3.5 Final Overview ................................................................................................. 20
4.4 Legal Feasibility ..................................................................................................... 20 4.5 Operational Feasibility ............................................................................................ 21
4.5.1 Final Overview ................................................................................................. 23 4.6 Schedule Feasibility ................................................................................................ 24
4.6.1 Project Time constraint .................................................................................... 24 4.6.2 Task Duration Estimate Justification .................................................................. 24
4.6.3 Schedule Analysis ............................................................................................ 26 4.6.4 Assumptions of Schedule Analysis ..................................................................... 27 4.6.5 Final Overview ................................................................................................. 27
5. Solution 2 ........................................................................................................... 28
5.1 System Overview ................................................................................................... 28 5.1.1 Server Hardware .............................................................................................. 28 5.1.2 Workstations and Laptops ................................................................................ 28 5.1.3 Network Hardware ........................................................................................... 28 5.1.4 Printers ........................................................................................................... 29 5.1.5 Software ......................................................................................................... 29 5.1.6 Ongoing Maintenance ...................................................................................... 29 5.1.7 Personnel Costs ............................................................................................... 29
5.2 Technical Feasibility ............................................................................................... 29 5.2.1 Network Structure ............................................................................................ 29 5.2.2 Remote Access ................................................................................................ 30 5.2.3 Server Hardware .............................................................................................. 30 5.2.4 Server Operating System .................................................................................. 31 5.2.5 Mail Server ...................................................................................................... 31 5.2.6 Database Server .............................................................................................. 31 5.2.7 Backup Approach ............................................................................................. 31 5.2.8 Client Hardware ............................................................................................... 31 5.2.9 Client Operating System ................................................................................... 31 5.2.10 Additional Applications ................................................................................... 32 5.2.11 Security ......................................................................................................... 32 5.2.12 Printing Facilities ............................................................................................ 32
5.3 Economic Feasibility ............................................................................................... 33 5.3.1 Table of Costs ................................................................................................. 33 5.3.2 Net Present Value (NPV) .................................................................................. 34 5.3.3 Return On Investment (ROI) ............................................................................ 34 5.3.4 Payback Analysis ............................................................................................. 35 5.3.5 Final Overview ................................................................................................. 35
5.4 Legal Feasibility ..................................................................................................... 35 5.5 Operational Feasibility ............................................................................................ 36
5.5.1 Final Overview ................................................................................................. 38 5.6 Schedule Feasibility ................................................................................................ 38
5.6.1 Project Time constraint .................................................................................... 38 5.6.2 Task Duration Estimate Justification .................................................................. 38 5.6.3 Schedule Analysis ............................................................................................ 40 5.6.4 Assumptions of Schedule Analysis ..................................................................... 41 5.6.5 Final Overview ................................................................................................. 41
6. Solution 3 ........................................................................................................... 42
6.1 System Overview ................................................................................................... 42 6.1.1 Server Hardware .............................................................................................. 42 6.1.2 Workstations and Laptops ................................................................................ 42 6.1.3 Network Hardware ........................................................................................... 43 6.1.4 Printers ........................................................................................................... 43 6.1.5 Software ......................................................................................................... 43 6.1.6 Ongoing Maintenance ...................................................................................... 43 6.1.7 Personnel Cost................................................................................................. 43
6.2 Technical Feasibility ............................................................................................... 44 6.2.1 Network structure ............................................................................................ 44 6.2.2 Remote Access ................................................................................................ 44 6.2.3 Server Hardware .............................................................................................. 44 6.2.4 Server Software ............................................................................................... 45 6.2.5 Backup Approach ............................................................................................. 45 6.2.6 Client Hardware ............................................................................................... 45
6.2.7 Client Operating System & Additional Applications ............................................. 45 6.2.8 Printing Facilities .............................................................................................. 45
6.3 Economic Feasibility ............................................................................................... 46 6.3.1 Table of Costs ................................................................................................. 46 6.3.2 Net Present Value (NPV) .................................................................................. 47 6.3.3 Return On Investment (ROI) ............................................................................ 47 6.3.4 Payback Analysis ............................................................................................. 48 6.3.5 Final Overview ................................................................................................. 48
6.4 Legal Feasibility ..................................................................................................... 48 6.5 Operational Feasibility ............................................................................................ 49
6.5.1 Final Overview ................................................................................................. 51 6.6 Schedule Feasibility ................................................................................................ 51
6.6.1 Project Time constraint .................................................................................... 51 6.6.2 Task Duration Estimate Justification .................................................................. 51 6.6.3 Schedule Analysis ............................................................................................ 53 6.6.4 Assumptions of Schedule Analysis ..................................................................... 54 6.6.5 Final Overview ................................................................................................. 54
7. Cost/Benefits Analysis ....................................................................................... 55
7.1 Costs ..................................................................................................................... 55 7.2 Benefits ................................................................................................................. 55 7.3 Payback Analysis .................................................................................................... 56 7.4 Net Present Value (NPV) ......................................................................................... 58 7.5 Return On Investment (ROI) .................................................................................. 58 7.6 Final Overview ....................................................................................................... 58
8.General outline of approximate Budgets, Timing and Risks ............................... 58
8.1 Budgets ................................................................................................................. 58 8.1.1 Defining project costs ...................................................................................... 58 8.1.2 Budget Risk Assessment ................................................................................... 60 8.1.3 Project Estimated Budgets ................................................................................ 60 8.1.4 Final Overview ................................................................................................. 60
8.2 Timing ................................................................................................................... 61 8.3 Risks ..................................................................................................................... 61
8.3.1 Risks Evaluation tool ........................................................................................ 61 8.3.2 Risk Identification ............................................................................................ 62 8.3.3 Final Overview ................................................................................................. 66
9. Recommended System Solution for implementation ......................................... 66
10. Bibliography ..................................................................................................... 68
Documentation Standards Ver 1.0 - 5 - Alpha Omega IT
1. DOCUMENT DETAILS
1.1 DOCUMENT HISTORY Date Revised By Changes Made Version
2nd June 2008 Alpha Omega IT Initial Document Collated 1.0
16th June 2008 Christine Zhou Document Standards applied 1.1
20th June 2008 Jeff Dagher Review Document 1.2
31st July 2008 Stuart Alexander Review Document. Tech Feas.
Updated. Spelling and grammer
1.3
1.2 DOCUMENT PURPOSE The purpose of this document is to provide three possible wireless office solutions for Eastcoast Contracting. After performing a feasibility analysis on all three solutions a
recommendation on the most suitable option will be made to Eastcoast Contracting. This will be used as a basis for the prototype and next project phases such as the Requirements
Specification, design document and implementation plan.
1.3 DOCUMENT AUDIENCE This document is intended for Alpha Omega staff to use as a tool within the wireless office
network project. It will help guide management to decide the most feasible option to adopt in carrying out the project. The manager at Eastcoast Contracting will receive a copy of this
document and make the final decision on which solution to go ahead with.
1.4 DOCUMENT TASK BREAKDOWN
Section Name
Project Feasibility Study
a. Problem Analysis Christine Zhou
b. Explain the solution (broadly) Stuart Alexander
c. Propose 3 solutions:
HW solution Jeff Dagher
SW solution Christine Zhou
Network solution Christine Zhou
All Options
Technical Feasibility Jeff Dagher
Economic Feasibility Stuart Alexander
Legal Feasibility Stuart
Operational Feasibility Stuart Alexander
Schedule Feasibility Christine Zhou
d. Cost/Benefits Analysis Stuart Alexander
e. General outline of approximate budget,
timing and risks
Christine Zhou
f. Recommended solution for implementation Jeff Dagher
Appendix A Hardware
Servers Jeff Dagher
Router Jeff Dagher
Switch Jeff Dagher
Desktop Jeff Dagher
Laptop Jeff Dagher
Print server Jeff Dagher
Wireless pc adapter Jeff Dagher
Wireless notebook adapter Jeff Dagher
Printer Jeff Dagher
Documentation Standards Ver 1.0 - 6 - Alpha Omega IT
Section Name
Server Console switch Christine Zhou
UPS Christine Zhou
Server rack Christine Zhou
ADSL modem Stuart Alexander
Appendix B Software
Costs Minimisation Table Jeff Dagher
Windows server 2008 Jeff Dagher
Exchange server 2007 & CAL Jeff Dagher
Symantec Anti-virus Jeff Dagher
XP Professional Edition Jeff Dagher
Office Professional 2007 Jeff Dagher
Fedora Core 8 Jeff Dagher
OpenOffice Stuart Alexander
SQL Server 2005 Express Stuart Alexander
Red Hat Enterprise Christine Zhou
Postfix Mail Server Christine Zhou
MySQL Christine Zhou
Appendix C External Services
Next G wireless broadband x 1 Stuart Alexander
Business Broadband ADSL 2+ Stuart Alexander
Next G Mobile Broadband Stuart Alexander
Domain Name Hosting Christine Zhou
Website Hosting Christine Zhou
1.5 QUALITY ASSURANCE
Documentation Standards Ver 1.0 - 7 - Alpha Omega IT
2. PROBLEM ANALYSIS
2.1 BACKGROUND Eastcoast Contracting has decided to start a branch in Sydney. The company works in the field of nursing contracting which belongs to a highly competitive environment. Today,
Information Technology (IT) is vital to most companies. Computers, computer-based systems
and computer networks are necessary parts of an enterprise. The IT systems help business to conduct their core business and to increase profits.
2.2 CORE PROBLEM The core problem of Eastcoast Contracting is that they do not have a holistic, efficient and
cost-effective IT system for their day-to-day business in Sydney. Their lack of an IT system would mean they are incapable of operating at all. They require this IT system to allow them
to be competitive in this market.
2.3 PROBLEM ANALYSIS Unsuitable paper-based office work processes
If an IT system is not developed they will need to do their everyday office tasks through a manual process and rely on the Melbourne office for nursing details. This will be a waste of
time, money and staff resources.
Eastcoast Contracting urgently need an office automation system to ensure basic office
procedures are easier and faster than a manual system. These include word processing, storing data, exchanging files, maintaining business information and operating payroll. This
requirement is of primary importance.
Low collaborative ability of standalone computer
Eastcoast Contracting does not have a LAN in their Sydney branch office. Because of this, the staff can not execute programs, share expensive devices and share information with each
other.
Eastcoast Contracting requests a high capability LAN to help their office automation more
efficiently. They hope that the LAN is cost-effective, easy to expand and easy to maintain. Therefore, they really prefer a Wireless Local Area Network (WLAN).
Large volume of nursing staff detail
Over the years Eastcoast Contracting has compiled a large amount of data on their clients. It
has been established that there are more records than will fit in Microsoft Access Database.
The current data need to be imported into a powerful, secure and fast database system so that Eastcoast Contracting can share, manage, search and organize the information efficiently.
Lack of electronic communication methods Eastcoast Contracting is aware that a successful business requires multiple ways of
communication with their clients. The traditional methods such as mails and phones are vital. However, the traditional mail can not provide the Real-time service. Sometimes, the staff are
not able to respond to customers requests timely by phone. Furthermore, they realize that it will costs much money to connect with headquarter in Melbourne by phone.
Eastcoast Contracting hope that they have a dependable and secure Electronic mail system. They can gather more customers, build stronger relationship with the existing customers and
promote their service via emails. Otherwise, Sending and receiving fax directly in personal computer is ideal.
Documentation Standards Ver 1.0 - 8 - Alpha Omega IT
Internet connection
Internet connection is the precondition of E-mail using, Web surfing, Web presence and remote access. Eastcoast Contracting need an Internet connection with high speed and high
quality.
Remote access
Remote access is a critical request for Eastcoast Contracting because the staff need to frequently use data when they are not in the office. Eastcoast Contracting heavy demands
the technology of Remote access is secure and low cost.
Issue of security
Eastcoast Contracting work in a highly competitive filed. The data which include personal details and job details is confidential. This data could be used by competitors for
inappropriate reasons such as unwanted mailouts or blackmailing. These potential problems might come from computer virus, unsafe web searching, unauthorized system access and low
level network administration.
Besides the above reasons, the weakness of wireless LAN compared to a wired LAN might
result in serious security problem. Wireless radio signal is transmitted through the air and easier to intercept by hackers and snoopers. Eastcoast contracting requires apply appropriate
strategies and technologies to avoid these security problems.
IT staff training
The whole IT system will be maintained by an IT staff of Eastcoast contracting. The person is not being appointed now. Sometimes, the project documentation might get a lot skimpier.
This situation is anxious when the system Iis in operation.
Eastcoast contracting need sufficient documentation to record this project so that the IT staff
can use the documentation for further troubleshooting, system modifications and avoiding needless repetition of work.
Minimising initial outlay cost
Budget problems are one of the common problems of most projects. Eastcoast Contracting
needs to keep the budget to the minimum and present it to higher management. However, many factors cause the budget problem- equipment, personnel, development and technology.
Eastcoast Contracting is aware that estimates and guesswork are the frequent source of budget problems.
Eastcoast contracting require a thorough investigation of the project cost and so avoid the potential budget problem.
Documentation Standards Ver 1.0 - 9 - Alpha Omega IT
3. PROPOSED SOLUTION
3.1 COMMON GOALS All three solutions provided have common functionalities that fulfil the goals set out in the Project Charter and Project Management plan. The proposed solutions include the following
functionalities:
Scalable infrastructure by selecting hardware with spare capacity within each part of the network.
File security by taking a multi-level approach to security such as centralised storage of data, software and hardware firewalls, anti-virus software, IP management and monitoring, security based policies and procedures.
Communication and collaboration opportunities between employees, suppliers and customers through a relational database and web technologies such as a company
webpage.
A standard and integrated environment where data can be utilised by each software package. Hardware devices have been chosen to minimise the potential conflict that
can occur.
Minimise or eliminate areas of redundancy by employing an SOE on the desktops, multiple printers, and separate servers for each server function and technical
documentation in case replacement is necessary for a piece of hardware.
System reliability by selecting reputable brands, reducing the complexity of system
operation and employing maintenance policies.
In addition to common functionalities there are several design features that make up the system.
3.2 LAN & WLAN The wired Local Area Network section of the system has speeds between 100Mbs up to
1000Mbs. The Wireless LAN section has speeds between 54Mbs and 300Mbs. This means network traffic will be sent quickly between the servers and desktop clients with minimal
delays for the user.
Security is maintained on the WLAN by enabling WPA authentication, only allowing specific
MAC addresses to connect to the router, setting static IP addresses on network equipment, monitoring network traffic and educating end users. The printers will also require these
security measures to be put in place.
Internet connectivity is achieved through the modem and router and will be discussed later in
this document. The key factors of the internet connectivity are speed and security. Speed is achieved by the combination of a fast broadband plan and the fast throughput of the network
hardware. Security is maintained at the ISP, router and client level by utilising antivirus software and only allowing genuine traffic through. This minimises virus and Trojan attacks
and other forms of illegitimate access.
Documentation Standards Ver 1.0 - 10 - Alpha Omega IT
3.3 SERVER DESIGN The system will consist of 4 servers, each having a specific role. The reasons for this are:
Allows easier configuration of server setups and management including auditing network traffic
Reduces the likelihood of errors occurring between conflicting server functions
Helps maintain a high network speed by separating different server requests e.g. Database requests and email requests
In the event of a server malfunctioning only one server function is affected allowing staff to still be connected to the other servers.
The four servers are:
File Server Storage of all Eastcoast documents and files (not database files) will be on this server. Having
it in a centralised place ensures staff are able to view their files from any pc, allows backups to be taken and reduces the likelihood of unauthorised access by limiting which folders staff
have access to.
Mail Server
Move and store email across the LAN and VPN. It enables communication between stakeholders of the business. There are more options for filtering and email management that
can be employed with a mail server onsite.
Domain Controller
Manages user logon details, accounts and effective rights. Reports will be run on this server to monitor logon habits and identify unauthorised access.
Database Server
All database files will be located on this server. Client machines will run the database client to
establish connection with this server. By passing SQL (Structured Query Language) requests to the server, the server will be able to user its own processing power to retrieve the data,
rather than the client finding the data. This helps maintain high speeds over the network. It is similar to the file server in that backups can be done, there is centralised data and access
levels can be managed.
Both rack options and standalone servers are included in the Solutions below. All servers will
have the option of having RAID implemented into their design to give another level of redundancy within the system if required. The software used in the 3 Solutions is either
Microsoft or Linux based. Both operating systems have the same functionalities but offer varying degrees of support and are implemented differently.
All servers when set up will have network tools used for monitoring server and network performance and utilisation. These will be set up to notify the system administrator if errors
occur on the hardware, operating systems or applications. This also makes auditing easier.
Documentation Standards Ver 1.0 - 11 - Alpha Omega IT
3.4 CLIENT DESIGN Since most of the applications run from the client, the PCs chosen have the ability to run current applications and also future applications. Dell has been chosen due to their good
reputation and support Solutions. They are also considered good value for money.
A SOE (standard operating environment) will be used for each pc to allow easier
management and allow users to operate on any pc. One piece of software that is common to all the outlined Solutions is the Symantec Antivirus small business Edition. Although managed
on the server, each client is equally protected from virus and Trojan attack.
Wireless connectivity allows workstations to be moved in the office without the need for
installation or activation of extra ports. This ensures downtime for users and the system administration is minimised. Workstation security relies on proper security procedures such
as strong passwords being selected by users in addition to the wireless security outlined in the LAN section above.
4. SOLUTION 1
4.1 SYSTEM OVERVIEW Solution 1 is based on a Windows operating environment both for the servers and for the client machines. All servers incorporate the latest version of Microsofts server platform, ie. Windows Server 2008 with the addition of Exchange 2007 and SQL Express for the mail
server and database server respectively. Client machines have the following software installed as a basis for the SOE:
Operating System - Microsoft Windows XP
Office Suite - Microsoft Office 2007 Standard
Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve
Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen
due to these factors and their positive reputation. The servers are rack mounted and run Intel Dual Core Xeon processors. Both laptops and desktops use Intel Core 2 Duo processors.
This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 1 gigabit Ethernet cabling for
maximum network speed while the client machines use wireless connections for flexibility in where they can be located.
All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and
black and white printers and ADSL 2+ internet connection for the office and Telstra Next G for offsite VPN connections. Domain name and website hosting is also the same across all
solutions.
Documentation Standards Ver 1.0 - 12 - Alpha Omega IT
4.1.1 Server Hardware
HP ProLiant DL120 G5 Rack x 4 - Dual-Core Intel Xeon 2.33 GHz HP Server Rack 10636 G2 Pallet HP UPS (Uninterruptible Power Supply) R3000 VA 2U L6 20 HP Port Console Switch
LCD monitor (for server)
Keyboard (for server) Mouse (for server)
HP StorageWorks LTO-2 Ultrium 448 SCSI External Tape Drive 400GB
4.1.2 Workstations and Laptops
Dell Vostro 200 Slim Tower Workstation x 6 - Core 2 Duo E6550 2.33GHz Dell XPS M1530 Laptop x 2 - Centrino Core 2 Duo T7250 2.0GHz
4.1.3 Network Hardware
Linksys Router WRVS4400N Linksys Switch SR2016 Linksys PC Adapter WMP300N Linksys Notebook Adapter WPC300N Linksys Printer Server WPSM54G Cabling x 12m CAT6 Linksys AM300 ADSL 2+ Modem Telstra MF332 Laptop Next G card
4.1.4 Printers
HP LaserJet 3050 Multifunction
HP LaserJet P2015 B&W Printer
4.1.5 Software
Microsoft Windows Server 2008 OEM Microsoft Exchange 2007
Microsoft Exchange Server CAL
Microsoft SQL Server 2005 Symantec Endpoint Small Business Edition
Microsoft Windows XP Professional Edition OEM Microsoft Office 2007 Professional
CA ARCserve Backup Email Suite r12
CA ARCserve Backup r12 Client Agent for Windows/Linux Website Design
Documentation Standards Ver 1.0 - 13 - Alpha Omega IT
4.1.6 Ongoing Maintenance
Hardware replacement & extended warranties Telstra - .com.au domain and website hosting
Business ADSL 2+ Broadband 10GB/month Mail and Web Protection
Next G Broadband
4.1.7 Personnel Costs
Design and Installation $30 per hour x 600 hours
User training session outlining key features of system
4.2 TECHNICAL FEASIBILITY Today business relies extensively on their IT systems, due mainly to the fact that it processes
and stores all their information. Therefore it is vital that the system is efficient and reliable.
To make a system that fits into those criteria it will need to be built using quality parts and software that has been tested and proven to work. Due to that fact we have chosen three of
the major brands to source out our hardware required to build and implement this network. We have chosen Dell for all our PCs and laptops, HP for our servers and Linksys for our entire Network infrastructure needs.
4.2.1 Network Structure
The network design has been kept simple so as to help in the implementation of the system as shown in diagram below:
Documentation Standards Ver 1.0 - 14 - Alpha Omega IT
Having a dedicated function for each server will result in easier diagnosis of problems and
minimise disturbance to the business operations if one server is not functioning in its full capacity.
There are two distinct parts to this network, wired and wireless. The servers, switch, router
and modem are connected via cat 6 cable ensuring a 1000Mbs speed at 250MHz is
maintained between each component. They will be located physically close to each other to minimise the cost of cabling. If circumstances change the cabling allows the signal to reach
up to 100 metres without requiring a signal booster.
The wireless part of the network consists of the clients and printers. All wireless traffic travels through the Wireless Access Point incorporated into the router. The 802.11N wireless protocol
that has been chosen for this option operates at speeds of up to 300Mbs depending on
location and frequency (2.4 5 GHz) that it is set at. The benefits of choosing this protocol over older versions which include:
Greater speeds (up to 12x greater than 802.11G)
The strength of the signal it transmits is significantly broader allowing receivers to be dispersed further away
Protocol allows backward forward compatibility with the existing protocols.
Incorporating a wireless client infrastructure into the network allows the easy addition of more clients in the future with only minor changes required on the domain controller and
router.
Ensuring a secure network is a primary focus in this option. The Linksys WRVS4400N Router is a critical part of the network as all traffic will pass through it. A key security feature of this
component is the built in firewall which will be configured to only allow legitimate traffic
through. Another main function this Router provides is VPN Access with authentication for users offsite. Wireless traffic is secured using WPA2 authentication and encryption and by
specifying set MAC and IP addresses. Other security features implemented into the maintenance and culture of the business will be monitoring network traffic and educating end
users. The printers will also be set with static IP addresses and WAP keys which are
configured between the router and print server. The router will only allow specific traffic to the print servers and restrictions will be set up according to IP addresses.
4.2.2 Internet and Remote access
Internet connectivity on the network is achieved through the Linksys AM300 ADSL 2+
USB/Ethernet Modem. This is connected to the router which will then share the connection amongst the entire network. Speed is achieved by the combination of a fast broadband plan
and 802.11N protocol. Security is maintained at the ISP, router and client level by utilising antivirus software and only allowing genuine traffic through. This minimises virus and Trojan
attacks and other forms of illegitimate access.
VPN access is achieved through a combination of Telstra Next G cards providing the internet
connection and establishing a virtual private network with the router. The Next G cards have uploads speeds between 300Kbs to 1Mbs and require minimum configuration. User accounts
are authenticated at the router using their network logon username.
Documentation Standards Ver 1.0 - 15 - Alpha Omega IT
4.2.3 Server hardware
Servers selected for this project are HP ProLiant DL120 G5 Rack x 4, Dual-Core Intel Xeon 2.33 GHz (64 BIT processor), running 1 GB of memory (RAM). These specifications allow
plenty of opportunity for future development as they are more adequate for the business operations being administered and allow for future expansion. The servers are stored in a
server cabinet which is beneficial because it requires less space and is easier to manage and
maintain. In addition servers will be under constant air conditioning which helps to stabilise and helps efficiency.
RAID 1 will be enabled upon the servers which hold 2 x 250 GB SATA hard drives, thus
working as a fail safe, if one hard drive was to fail the system will remain operational. Both
hard drives will contain identical images therefore reducing down time, for instance if one fails you can replace it without powering down the server and it will recreate the image. In an
event of power failure the system is backed up via the HP Uninterruptible Power Supply system which will activate and help prevent hardware faults, loss of data and loss of
productivity.
4.2.4 Server Operating System
Each server plays an independent role which includes (domain controller, file server, database server and mail server). Benefits of having them running independently include one
allows the network/servers to breath better, two places less stress upon the servers therefore making them more efficient and three if a server failed the system will not have such a
dramatic affect on the business as they will still be able to operate and still use full
functionality of the other servers.
The operating system which will be installed on all servers is Microsoft Windows Server 2008. This operating system is well known for its stability and simplicity to be able to setup and
manage, with it providing large amounts or support and compatibility with the Microsoft
products.
4.2.5 Domain Controller
Once the operating system is installed onto the servers they will then be configured to run
their allocated role. Domain Controlling Server which is one of the most important roles to
secure in any active directory environment, this unit contains all the security policies for all users, files, groups, etc. if anything was to compromise this server it could affect users not
being able to log in, not being able to access files or put the organisations data at risk. Windows/Linux Base ARCserve Server Suite Backup agent is loaded onto this server.
4.2.6 Mail Server
The Mail Server which is a critical part of communication within any organisation, it allows
communication between stake holders and documents, files, images etc to be transmitted from user to user instantly. The server will be running Microsoft Exchange 2007, which
contains built-in protective technologies to keep your business operational, reduce spam and
viruses, enable confidential communications, and help your company to be compliant with todays security standards. It can be configured to suit individual needs, in regards to modifying their mail file, or
settings up various rules etc. along with it being a Microsoft product which includes large amount of support and information. ARCserve Backup Email Suite r12 agent installed onto
this server which will allow all emails to be backed up on a daily basis according to the
backup plan.
Documentation Standards Ver 1.0 - 16 - Alpha Omega IT
4.2.7 File Server
The File Server which is dedicated to the one function storing data. Data such as users profiles, data/information and media files are all stored upon this server. Controlled via active
directly policies which outline which user has access to what data. The File server also runs RAID 1 which will increase the access speeds by reading from two drives concurrently,
making it more prone to data redundancy.
4.2.8 Database Server
The Database Server which will be built upon Microsoft SQL Server 2005. Also known as a Relational database management system, it allows the administrator / users to build and
modify the database according to East Coast contracting demands. The system administrator
in charge of the branch will perform daily maintenance to the database via removing unnecessary or data entries which are out of date and backing it up using ARCserve.
Consultants at the branch will be able to directly feed data to the database from the clients installed on their workstations. End users (Customers) will be able to input their requests via
East Coast web page. Data it will contain such as jobs, client information, location, contact
details, responsibilities etc.
4.2.9 Backup Approach
CA ARC serve provides the perfect backup solution that East Coast contracting requires. CA
ARC serve is a enterprise class application which uses a conjunction of both hardware and
software which enables East Coast to backup all their data on the network. Together with the HP StorageWorks LTO-2 Ultrium 448 and CA ARC serve clients which will on a daily basis
perform a backup of the network using tape drives. Each server will receive a specific client depending on its role. This facility provides centralized management, encrypting the backup
files so that the information is protected from unauthorised users and keeps data loss to a
minimal, in an event of a disaster all data can be restored to the last backup.
The HP StorageWorks LTO-2 Ultrium 448 uses a SCSI connection and is an External Drive allowing up to 400 GB of data to be stored onto a single tape drive. Along with the drive
comes the Ultrium 400GB storage media Kit containing 20 tapes, cleaning kit, one media case and coloured labels. All backups will be kept with the system administrator or manager of
east coast contracting who will be responsibility of the tapes by storing on a remote location
of his choice.
4.2.10 Clients Hardware
The desktops and Laptops in this Solution are supplied by Dell which include:
Dell Vostro 200 Slim Tower Workstation x 6 - Core 2 Duo E6550 2.33GHz
Dell XPS M1530 Laptop x 2 - Centrino Core 2 Duo T7250 2.0GHz
They both meet todays standards which contain 64 bit processing along with a minimum of 1 GB of ram. 32 bit processors will start to become redundant as the new OS are going 64 bit.
The laptops contain a Centrino processor which is used in laptops to be highly efficient and
use less power compared to other processors. For office use these desktops and laptops are adequate for the operations they are to be performing which are mainly data entry,
processing information and communicating with stakeholders. The laptops contain built in web cameras which can be used for online video conferencing when they are out and about,
keeping communication at a high. The laptops contain long lasting lithium batteries which are a necessity for users that do not have one designated location.
Linksys Wireless Adapter WMP300N and WPC300N will be supplied and installed onto all systems so they will be capable of running at 802.11N protocol networks which run as
already mentioned above at 300+ Mbps therefore making the most out of the network infrastructure put into place.
Documentation Standards Ver 1.0 - 17 - Alpha Omega IT
4.2.11 Clients Operating System
All clients (PCs and Laptops) will contain Windows XP SP2 which is been used and recommended highly from of organizations of all sizes. Windows XP SP2is known for its
stability and efficiency over the existing versions, along with the user friendly GUI design which promotes user confidence which allows use without much discomfort. Service Pack 2
(SP2) provides enhanced security measures that will hopefully improve defences against
viruses, worms and hackers, along with increased manageability and an improved experience for users which provides more security and stability to the system administrator of East Coast
contracting.
For small businesses, Windows XP SP2 will help keep PCs running smoothly and more
securely so you will be less reliant on dedicated IT support. Windows XP is a 32 bit runs at half the capacity that the processor is capable of although the majority of the applications
where developed in 32 bit, therefore will not be compatible if 64 bit operating systems where in use. Microsoft also provides automatic updates whereby all the PCs automatically download
their latest security updates and patches directly as long as they have a internet connection.
4.2.12 Additional Applications
Microsoft Office 2007 has been selected for documentation and office needs. Office 2007 contains features such as an intuitive interface and preconfigured templates which help
reduce the amount of time spent on training and formatting documentation. Its compatibility with previous versions of Microsoft Office and with current office suites will allow users to edit
a wide variety of documents. Another feature is files sizes are reduced and there is an
improvement in corrupt file recovery.
4.2.13 Security
Symantec Antivirus combines industry-leading software, real-time malware protection with graphical reporting, centralized management and administration capabilities. This helps
administer the network from viruses which tend to attack via email, external storage devices which are shared among PCs or contaminated websites. Symantec Antivirus will also update daily ensuring the latest virus definitions are installed to protect the system from the latest viruses/malware. The updates are automatically downloaded from Symantecs web page allowing real time protection.
4.2.14 Printing Facilities
The primary printer utilised for printing in the office will be a HP LaserJet P2015 Black and White printer which is dedicated to office reports and documentation. It reaches speeds of 26
pages per minute. A secondary backup multifunction printer is a HP LaserJet 3050
Multifunction capable of printing 18 pages per minute and includes fax and scanning facilities.
Both these units will connect to the network wirelessly using Linksys Printer Server WPSM54G. This will allow the printers to be located anywhere in the office without the need
for cabling. Configuration of the router will be necessary to allow network traffic to be sent to
the print servers. Adding the printer to clients is the same as adding a wired printer.
Documentation Standards Ver 1.0 - 18 - Alpha Omega IT
4.3 ECONOMIC FEASIBILITY Outlined below are several tools used to help evaluate if the IT solution is economically viable. Also included is a table of costs associated with this solution. Included are hardware,
software, maintenance and personnel implementation costs.
4.3.1 Table of Costs
Category Item Quantity Total
Server Hardware
Server 4 $5,440.00
Server Rack 1 $1,200.00
Uninterruptible Power Supply 1 $1,380.00
Server Console Switch 1 $1,020.00
LCD Monitor for server 1 $400.00
Keyboard for server 1 $30.00
Mouse for server 1 $30.00
Tape Drive 1 $1,600.00
Tape Drive Media Kit 1 $830.00
User Hardware Workstation 6 $6,000.00
Laptop 2 $3,200.00
Network Hardware
Router 1 $270.00
Switch 1 $290.00
ADSL 2+ Modem 1 $60.00
Next G Laptop Modem 2 $0.00
PC Adapter 6 $600.00
Notebook Adapter 2 $200.00
Printer Server 2 $190.00
Cabling 12 $90.00
Printers Multi-function Printer 1 $500.00
Black and White Laser Printer 1 $600.00
Documentation Standards Ver 1.0 - 19 - Alpha Omega IT
Table of costs cont
Category Item Quantity Total
Software
Operating System for Servers 4 $4,800.00
Email Server 1 $1,330.00
Email Client Access License 8 $800.00
Database Server 1 $0.00
Anti-virus software 1 $2,500.00
Operating System for workstation 8 $0.00
Office software for workstation 8 $4,000.00
Front end database 1 $500.00
Tape Backup software 2 $1,870.00
Website Design 1 $3,000.00
Personnel
Labour 600 $18,000.00
User Training 1 $1,000.00
Website
Domain Name Hosting 60 $835.00
Business Broadband ADSL 2+ 60 $5,400.00
Mobile Broadband 120 $7,080.00
Website Hosting 60 $2,461.00
Maintenance 1 $22,490.00
TOTAL $99,996.00
4.3.2 Net Present Value (NPV)
The project is assumed to have a lifespan of five years. It has been calculated that the Net
Present Value (NPV) at the end of the project will be $40,162.67. A positive NPV means the project is still providing income to the business.
4.3.3 Return On Investment (ROI)
The Return On Investment (ROI) has been calculated at 43%. If the costs of the project were
invested in stocks or other financial schemes then it wouldnt return anywhere near this figure. An ROI figure of above 20% is considered a sound investment.
Documentation Standards Ver 1.0 - 20 - Alpha Omega IT
4.3.4 Payback Analysis
A discount rate of 8% was used as this is the average interest rate at the current time. The discounted costs and benefits have been included in the table below. For more information
regarding the discounted costs and benefits see the Costs/Benefits Analysis later in this document.
Year 1 2 3 4 5
Discounted Costs $65,004.40 $70,955.70 $77,620.13 $85,872.34 $93,513.27
Discounted
Cumulative Benefits $31,000.00 $59,703.70 $86,281.21 $110,890.01 $133,675.93
As shown in the table, by the end of year 3 the benefits are higher than the cost of the
system. Shown graphically the system has paid itself back around halfway between years two and three. A payback period before the end of the third year is considered justifiable.
4.3.5 Final Overview
Each hardware and software component has been factored into the cost of the overall
solution. By taking into account the high NPV, ROI and low payback period this option is economically viable.
4.4 LEGAL FEASIBILITY The factors that may affect the legality of this Solution include the software licensing and use
of wireless devices. Windows XP operating system included in this Solution will be purchased as OEM as part of the price of the desktops and laptops. The server software, Windows
Server 2008, SQL 2005 and Exchange 2007 is purchased from the supplier of the server hardware.
Payback Period - Solution 1
$0.00
$20,000.00
$40,000.00
$60,000.00
$80,000.00
$100,000.00
$120,000.00
$140,000.00
$160,000.00
1 2 3 4 5
Project YearSolution 1 Costs
Cumulative Benefits
Documentation Standards Ver 1.0 - 21 - Alpha Omega IT
Other software will be purchased through a supplier. All licenses will be recorded in a
centralised location to ensure proper auditing procedures can be followed. Aside from ensuring all software is licensed appropriately, there are no legal implications on the use any
of the software in this Solution.
Microsoft software used in the prototype is licensed and fully covered under the MSDN
Academic Alliance, except for Office 2007. Tafe NSW is part of the MSDN Academic Alliance. For software not covered under this licensing scheme, opensource software will be selected
that is as close to the recommendation as possible. All opensource agreements will be adhered to.
The wireless hardware selected confers to all laws regarding wireless transmission standards.
Ensuring wireless security is covered elsewhere in this report.
4.5 OPERATIONAL FEASIBILITY The overall operational requirements of the proposed system are for it to be quick, secure
and easy to use. This is to ensure nurse details can be recorded correctly and the nurses can be assigned to the required hospital or home. Both the system administrator and the end
user require a solution that allows them to carry on their day to day work effectively.
Fast network speed is implemented through the combination of fast wired and wireless connections. End users will be able to retrieve data quickly from the servers, especially the
database and file server when required. There will be no noticeable drop in network
throughput if more clients are added in the future.
The wireless aspect of the LAN allows the users more flexibility in where they are physically located in the office. The benefits of this setup are when more users are added to the
network it reduces the time spent setting up the client pc. There is also no cabling needed in
the meeting room as the presenter is still connected to the network wirelessly. Time is not wasted connecting to the network.
Scalability of the system is required for the long term objectives of the business. The servers
chosen allow future scalability by including options for upgrading individual parts and
incorporating design features such as spare units in the rack and spare connections on the console switch. Network scalability has been addressed by ensuring there is spare capacity in
each part of the system. Areas of spare capacity include:
Router allowing up to 5 VPN connections, currently 2 will be utilised.
Wireless connectivity allows client pcs to be easily added to the network. Switch allowing up to 16 Ethernet connections, currently 5 will be utilised.
Security on the system is easily managed by implementing a centralised anti-virus, spyware,
malware software solution. The system administrator will be able to monitor threats on the
system from a single location rather than individually configuring each client pc and network device. Since information from the client pcs can be collected on the server it allows areas of security risks to be identified and managed appropriately. Symantec is a recognised security application provider with many years of experience who provide up to date virus definitions
on the latest threats.
Windows Server 2008 allows a server to be set up as a file server and makes allocation of
data resources easy to create and maintain. By having Windows based operating systems on the server and client pcs it reduces the risk of problems occurring when writing data onto the file server.
Another benefit of a whole Windows based system is functionality features to make
administering the whole system easier. Two features include Previous Version enabling and
Documentation Standards Ver 1.0 - 22 - Alpha Omega IT
automatic client updates. The previous version feature once set up allows the user to easily
return a file to a previous saved state. There are no limitations on the type of file and the benefit of this feature is in reducing the need to retrieve data from backup sources.
Updates on Windows systems are provided automatically by Microsoft and are designed for
the particular operating system in use. It is possible for the system administrator to set up an
update server to manage these automatic updates before deploying them to the client PCs. Operating system patches include the latest security and feature updates and bug fixes to
ensure it is running at its highest level.
When the time comes to replace the system administrator the benefits of having a Windows operating environment are twofold. First because there are many system administrators with
experience in managing Windows environments available to hire and secondly because it
would not take long for a new system administrator to understand how the system is designed and managed.
It is a fairly simple process to create and manage Standard Operating Environments (SOEs) within a Windows environment. By implementing an SOE the system administrator will be
able to troubleshoot user problems quicker or if need be reimage the pc easily to restore it back to the default state.
The majority of third party software is designed to be integrated with Microsoft Windows and
run on Intel processors. If the business decides to purchase third party software in the future there is the reassurance that it will run on the hardware components and the Windows
operating environment.
Nearly all office workers have had experience with Microsoft Office products which should
equate to less time spent on training users on the software and peace of mind by using a familiar system. Although Microsoft Office 2007 has only been available for a year or two, the
uptake of the newest version has been significant and many people have had the opportunity
to use it.
Included in SQL Server Express is a client front end that can be used out of the box or configured for the businesss needs. Also included is a complete, server-based platform for creating, managing, and delivering reports. Further options are available such as embedding reports in applications if required. With SQL Server Express it is easy for the end user to
access nursing details and run reports.
The System Administrator is recommended to user the GFS (Grandfather, Father, Son)
strategy for system backups. This involves having daily differential backups, Monday through to Thursday, these are considered the son, and then a full weekly backup on Friday, this is considered the father. At the end of every month there is a full system backup, this is the grandfather.
Backups can be scheduled to occur during the night when there are no staff working. In the morning the previous nights backup will be available to use if required. The daily backup
tapes are recycled each week; the weekly backups are recycled after the full monthly backups. This can be seen in the table below:
Documentation Standards Ver 1.0 - 23 - Alpha Omega IT
(Diff=Differential backup,Full-W=Weekly backup, Full-M=Monthly backup)
Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
None Diff Diff Diff Diff Full-W None
Tape 1 Tape 2 Tape 3 Tape 4 Tape 5
Sun Mon Tue Wed Thu Fri Sat
8 9 10 11 12 13 14
None Diff Diff Diff Diff Full-W None
Tape 1 Tape 2 Tape 3 Tape 4 Tape 6
Sun Mon Tue Wed Thu Fri Sat
15 16 17 18 19 20 21
None Diff Diff Diff Diff Full-W None
Tape 1 Tape 2 Tape 3 Tape 4 Tape 7
Sun Mon Tue Wed Thu Fri Sat
22 23 24 25 26 27 28
None Diff Diff Diff Diff Full-M None
Tape 1 Tape 2 Tape 3 Tape 4 Tape 8
Sun Mon Tue
29 30 31
None Diff Diff
All tapes will be stored offsite with the monthly tapes being permanently stored. Correct
storage procedures should be followed when storing tapes.
The downside of having a Windows environment is generally it is targeted by hackers and people with malicious intent because of the areas of weakness within the operating system
that can be exploited. Although steps are taken to reduce this risk, it still exists.
Hosting email onsite can increase the maintenance required to manage spam and other
unsolicited email.
4.5.1 Final Overview
Pros
High network data transfer speeds
Microsoft Windows based operating systems are easily integrated together
Network hardware is easily integrated since it is the same manufacturer
Users have knowledge of Windows based systems
Third party software is designed to be run on Microsoft Windows
Scalable infrastructure
Cons
More prevalent to unauthorised access attempts
Locked into using Windows software, expensive to change operating systems
Documentation Standards Ver 1.0 - 24 - Alpha Omega IT
4.6 SCHEDULE FEASIBILITY This section deal with a specified schedule analysis for project proposed solution. The purpose of the study is to help evaluate whether the IT solution is schedule viable.
4.6.1 Project Time constraint
The project deadline is set on 19th June, 2009 and the deadline is fixed and cannot be
changed. The project has started on 11th February 2008 and it will be complete within 17 months. The project schedule is moderatly flexible.
4.6.2 Task Duration Estimate Justification
We adopt PERT (Project Evaluation and Review Technique) method to identify the minimum
time needed to complete solution one.
We basically take a weighted average of an optimistic, realistic and pessimistic for the activity
duration. The estimate is in the form of (Optimistic +4 (Realistic) + Pessimistic) / 6.
The Table below shows the task duration estimate for solution one.
Task Estimated Task Time
(Hour)
Optimistic (Hour)
Realistic (Hour)
Pessimistic (Hour)
PERT Weighted Average
1.0 Project Start-up 40
1.1 Set up Project Team 2 3 4 3.00
1.2 Develop Project Charter
1.2.1 Initial Client Interview 2 3 5 3.17
1.2.2 Define project Scope and Purpose
5 4 7 4.67
1.2.3 Analyse Client Problem 4 7 10 7.00
1.2.4 Define the Client Basic Requirements
4 5 6 5.00
1.2.4 Detail Stakeholders 3 4 5 4.00
1.2.5 Define Deliverables 2 3 4 3.00
1.2.6 Documentation and Sign Off 6 10 15 10.17
2.0 Project Management 110
2.1 Develop Project Management Plan
2.1.1 Define Project organisation 2 3 4 3.00
2.1.2 Define Managerial Process 3 5 7 5.00
2.1.3 Define Technical Process 3 5 7 5.00
2.1.4 Define Work package, Schedule and Budget
3 6 7 5.67
2.1.5 Define Human Resources 3 6 7 5.67
2.1.6 Develop Quality Assurance 3 6 7 5.67
2.1.7 Develop Project Gantt Chart 3 6 7 5.67
2.1.8 Document and Approve Project Management Plan
4 5 6 5.00
2.2 Develop Feasibility Report
2.2.1 Provide Three Solutions 12 16 25 16.83
2.2.2 Technical Feasibility Study 4 6 7 5.83
2.2.3 Operational Feasibility Study 4 6 7 5.83
2.2.4 Economic Feasibility Study 5 7 8 6.83
2.2.5 Legal Feasibility Study 4 5 6 5.00
Documentation Standards Ver 1.0 - 25 - Alpha Omega IT
Task Estimated Task Time
(Hour)
Optimistic (Hour)
Realistic (Hour)
Pessimistic (Hour)
PERT Weighted Average
2.2.6 Schedule Feasibility Study 4 6 7 5.83
2.2.7 Cost/Benefits Analysis 6 7 8 7.00
2.2.8 General outline of approximate budget, timing and risks
5 6 7 6.00
2.2.9 Recommended solution for implementation
4 5 6 5.00
2.2.10 Documentation and Approve Feasibility Report
4 5 7 5.17
3.0 System Analysis 110
3.1 Define Project Drivers 8 12 18 12.33
3.2 Define Project Constraints 8 12 18 12.33
3.3 Define Non-Functional Requirements
25 30 37 30.33
3.4 Define Functional Requirements 25 30 37 30.33
3.5 Define Project Issues 10 15 18 14.67
3.6 Ducument Approve Requirements Specification Report
6 10 14 10.00
4.0 System Design 125
4.1Develop Design Report
4.1.1 Infrastructure Design 10 15 22 15.33
4.1.2 Hardware Design 10 15 25 15.83
4.1.3 Soft ware Design 10 15 22 15.33
4.1.4 Network Design 20 30 45 30.83
4.2 High Level Design 0.00
4.2.1 Web Site Design 10 15 20 15.00
4.2.2 E-mail Design 8 12 16 12.00
4.2.3 Database Design 8 10 16 10.67
4.3 Document and Approve Design Report
6 10 14 10.00
5.0 System Development 60
5.1 Develop System
5.1.1 Build Prototype 8 10 20 11.33
5.1.2 Prototype Testing 8 10 20 11.33
5.2 Testing Plan
5.2.1 Prototype Testing Plan 6 8 12 8.33
5.2.2 Implementation Testing Plan
6 8 12 8.33
5.2.3 User Acceptance Testing Plan
5 6 10 6.50
5.2.4 Test Logs 6 7 8 7.00
5.3 Document Approve Testing Plan 5 7 10 7.17
6.0 System Implementation 140
6.1 Develop Deployment Plans
6.1.1 Implementation plan 5 7 10 7.17
6.1.2 Disaster Recovery plan 5 7 10 7.17
6.1.3 Maintenance plan 5 7 10 7.17
6.1.4 Training Plan & User Documentation
8 12 14 11.67
Documentation Standards Ver 1.0 - 26 - Alpha Omega IT
Task Estimated Task Time
(Hour)
Optimistic (Hour)
Realistic (Hour)
Pessimistic (Hour)
PERT Weighted Average
6.1.5 Client Support Plan & Procedures
5 7 10 7.17
6.2 Approve Deployment Plans 1 1.5 2 1.50
6.3 Implement System
6.3.1 Deploy Hardware 14 18 25 18.50
6.3.2 Deploy Network 10 12 18 12.67
6.3.3 Deploy Software 15 25 30 24.17
6.3.4 Implementation Testing 10 15 20 15.00
6.4 User Training 10 20 30 20.00
6.5 User Acceptance Testing 5 8 10 7.83
7.0 Project Evaluation 10
7.1 Post Implementation Review 3 6 8 5.83
7.2 New User Requirements 2 3 5 3.17
7.3 Approve Project Evaluation Complete
0.5 1 1.5 1.00
8.0 Project End 7
8.1 Internal Presentaiton 1 2 2.5 1.92
8.2 External Presentation 1 2 3 2.00
8.3 Project Complete Sign-off 1 2 3 2.00
8.4 Celebrate 1 1 1.5 1.08
Total 602
4.6.3 Schedule Analysis
Schedule Dependency Schedule dependencies help us to perform project in the appropriate order. Incorrect
dependencies will impact the schedule of whole project and will result in unnecessary
constraints.
We use waterfall methodology for the project development. According to this model, one major phase can not start until predecessor phase has finished. There is all Finish-to-Start
dependency between two major phases.
For the sub-phases, we adopt the tasks overlap or parallel technique to compress overall
project duration.
Resource Levelling Resource is the most important element which impacts the project schedule. The incorrect
resource allocation will cause the project schedule to overrun.
Resource include Human and Non-Human Resources. The Non-Human resource consists of
software, hardware, network facilities, clients documents and external services.
Documentation Standards Ver 1.0 - 27 - Alpha Omega IT
Project schedule outline
The following table shows the summarized project schedule:
Code Task Target Start Target End
Human Resource Required
(Hour)
Non-HR Required
1.0 Project Start-up 11-Feb -2008 10-Mar-2008 40 clients documents
2.0 Project Management 10-Mar-2008 23-Jun-2008 110 clients documents
3.0 System Analysis 21-Jul -2008 25-Aug-2008 110
4.0 System Design 25-Aug -2008 31-Oct-2008 125
5.0 System Development 31-Oct -2008 1-Dec -2008 60
40% software 30% hardware 100% network
50% external services
6.0 System Implementation 09-Feb -2009 01-Jun -2009 140
100% software 100% hardware 100% network
100% external services
7.0 Project Evaluation 01-Jun -2009 15-Jun -2009 10
8.0 Project End 15-Jun -2009 22-Jun -2009 7
4.6.4 Assumptions of Schedule Analysis
The following assumptions are taken into account when analysing the project task schedule
At least 80% Resources of each activity will be available.
All stakeholders are often taking delight in contributing for the project.
Management time is taken into account.
The Schedule risk is at a minimum.
The contingency is at the average level.
The milestone of each stage of project will be periodically reassessed for completion date.
4.6.5 Final Overview
In conclusion, the total estimated duration will add up to 602 hours. Our estimation of the
time frame would be from 50 to 54 weeks, the actual work hours would be from 560 to 980 hours. Therefore, this solution meets the schedule requirement of Eastcoast Contracting, the
future business operations will be deployed in advance. From the schedule aspect, this solution would be recommended.
Documentation Standards Ver 1.0 - 28 - Alpha Omega IT
5. SOLUTION 2
5.1 SYSTEM OVERVIEW Solution 2 is based on a Unix/Linux operating environment both for the servers and for the client machines. All servers incorporate the latest version of Redhat Enterprise with the
addition of Postfix and MySQL for the mail server and database server respectively. Client
machines have the following software installed as a basis for the SOE:
Operating System Fedora Core 8 Office Suite Open Office 2 Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve
Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen due to these factors and their positive reputation. The servers are tower form and run AMD
Athlon processors. These servers are a lower cost than the servers selected in the other solutions. Both laptops and desktops use Intel Core 2 Duo processors.
This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 10/100Mbs Ethernet cabling
while the client machines use wireless connections for flexibility in where they can be located.
All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and
black and white printers and ADSL 2+ internet connection for the office and Telstra Next G
for offsite VPN connections. Domain name and website hosting is also the same across all solutions.
5.1.1 Server Hardware
HP ProLiant ML115 G5 Tower x 4 - Dual-core AMD Athlon 2.3GHz
HP UPS (Uninterruptible Power Supply) R3000 VA 2U L6 20 HP Port Console Switch LCD monitor (for server)
Keyboard (for server) Mouse (for server)
HP StorageWorks LTO-2 Ultrium 448 SCSI External Tape Drive 400GB
5.1.2 Workstations and Laptops
Dell Vostro 200 Slim Tower x 6 - Core 2 Duo E6550 2.33GHz Dell XPS M1530 x 2 - Centrino Core 2 Duo T7250 2.0GHz
5.1.3 Network Hardware
Linksys Router x 1 WRV200 Linksys Switch x 1 SD216 Linksys PC Adapter x 6 WMP54G Linksys Notebook Adapter x 2 WPC54G Linksys Printer Server x 2 WPSM54G Cabling x 12m CAT5e Linksys AM300 ADSL 2+ Modem Telstra MF332 Laptop Next G card
Documentation Standards Ver 1.0 - 29 - Alpha Omega IT
5.1.4 Printers
HP LaserJet 3050 Multifunction
HP LaserJet P2015 B&W Printer
5.1.5 Software
Red Hat Enterprise Linux Postfix Mail Server
MySQL 5.1 x 1 Symantec Endpoint Small Business Edition
Linux Fedora Core 8 Openoffice
CA ARCserve Backup File Server Suite r12
CA ARCserve Backup r11.5 for Linux Agent for MySQL CA ARCserve Backup r12 Client Agent for Windows/Linux
Website Design
5.1.6 Ongoing Maintenance
Hardware replacement & extended warranties Telstra - .com.au domain and website hosting
Business ADSL 2+ Broadband 10GB/month
Mail and Web Protection Next G Broadband
5.1.7 Personnel Costs
Design and Installation $30 per hour x 770 hours
User training session outlining key features of system
5.2 TECHNICAL FEASIBILITY
5.2.1 Network Structure
Solution two contains the same network structure design as Solution one, but still has a few changes amongst them. Main factors include, one the Ethernet cabling used in this Solution is
CAT5E which is capable of running at 100/1000 Mbps at 100 MHz which provides a good basis to start a small medium business on, but only operates at full speed if the remanding network related objects are compatible with it. They connect from the servers threw to the
switch followed by the router.
Documentation Standards Ver 1.0 - 30 - Alpha Omega IT
Network Layout:
The Linksys Router WRV200 includes enhanced security features like access control, build in
firewall, WEB/WPA protection which protects the wireless connection from being accessed by unauthorised users. the router can run at speeds Wired 1000 Mbps and wireless using the
802.11G wireless protocol 54 Mbps which is the maximum rate and reduces the further you are from the router, although if they are looking at expanding they should either consider
going wired which runs at a greater speed but defeats the purpose of their requirements or
later on upgrade to a newer wireless protocol which supports a greater bandwidth. The Linksys Switch SD216 positioned between the servers and router supports LAN speeds of 100
Mbps. This speed is sufficient as they are only running between 6 8 machines at a time but will run as a bottle neck if they obtain additional machines onto the network which will put
more strain on the unit and not allow full server and network utilization.
5.2.2 Remote Access
Users of East Coast contracting will be able to connect remotely to the network using VPN (same concept in option 1). The users must connect using their Next G internet connection
which is capable to connecting users anywhere within Australia which then gets authenticates via the network which are commanded by the policies placed on the Linksys WRV200 Router.
5.2.3 Server Hardware
The servers will be running same tasks as Solution one which runs the same design to help
eliminates/reduces network activity to one centralised area as well as placing less stress upon the servers, which will then overall operate more reliably. The servers in this Solution contain
different specification hardware and software which are as followed:
Documentation Standards Ver 1.0 - 31 - Alpha Omega IT
The server for Solution two is the HP ProLiant ML115 G5 Tower which is the entry level server
meaning basic server, will meet minimal requirements for businesses needs. They contain a Dual-core AMD Athlon 2.3GHz processor, 2 x 250 GB SATA hard drives with 512 MB of
memory running at 800 MHz. Along with the UPS system and RAID 1 will also be enabled on the server ensures data loss and stability of the network is maintained.
5.2.4 Server Operating System
The Operating systems which are equipped onto these servers is Red Hat Enterprise Linux. It
provides compatibility with the HP ProLiant ML115 G5 servers and software (Openoffice & Symantec AV) gives administrator flexibility and control over the system via the use of a
domain controller. Thus allows Policy configuration, which will prevent any unauthorized
attempts to execute, read or write restricted files. Another server will be designated as file server which contains all data, and backed up accordingly. Windows/Linux Base ARCserve
Server Suite Backup agent is loaded onto this server.
5.2.5 Mail Server
Postfix Mail Server (Mail Server) which is open source and compatible with Linux Red hat. It contains functions such as SquirrelMail, a standards-based Web mail package written in PHP
4; Spam Assassin, a powerful open source spam filter; and ClamAV, a GPLed virus scanner. To tie everything together it uses amavisd-new, a high-performance interface between MTAs
and content checkers such as virus scanners and spam filters. The Server will be configured by network administrator so that users will have POP, secure POP, IMAP, and secure IMAP
(IMAPS) access, users will have SquirrelMail associated to their systems to be able to access
mail files. ARCserve Backup Email Suite r12 installed amongst it so it is in sync with the backup client.
5.2.6 Database Server
MySQL 5.1 (open source) will be installed onto one of the HP ProLiant ML115 G5 servers
enabling them to create, maintain their central database. This application is memory hungry, the server offering 250GB of storage will be substantial. It is the most modern version
released with a 15% increase in speed from previous versions. MySQL 5.1 is scalable and can be used for small large organisations. Benefit of this system includes various storage methods and large variety of maintenance, allowing it to be efficient and reliable.
5.2.7 Backup Approach
This Solution also contains the identical backup method used in Solution 1 & 3.
5.2.8 Client Hardware
The physical specifications of the desktops and laptops in this Solution are identical to Solution one with very slight variations which include different wireless adaptors to connect to
network. The adaptors which are used in this Solution are for the PCs Linksys PC Adaptor WMP54G and for the laptops Linksys Laptop Adaptor WPC54G. The network cards enable a maximum of 54 Mbps along with a strong enough radio signal which can be picked up
anywhere in the office, although the signal will drop depending on the amount of objects are between the router and the receiver, therefore they may not receive its full speeds of up to
54 Mbps.
5.2.9 Client Operating System
The Operating system these units will contain is Linux Fedora Core, which is a form of open software which means the source is freely available for anyone to work on, or modify, or
learn from or use in other projects. Fedora Core is the latest Version OS Linux has provided other benefits include being stable, secure due many to the fact it was designed from the
ground up as a result all security aspects have been taken into consideration and ease to
Documentation Standards Ver 1.0 - 32 - Alpha Omega IT
manage/user friendly hence giving a great freedom to configure your computer exactly as
you wish. It has being build by thousands of certified professionals around the world who helped contribute in its
5.2.10 Additional Applications
A further application that will be placed onto these units will be Openoffice which is the
leading open-source office software suite which can perform word processing, spreadsheets, presentation, graphics, databases etc. Benefits of this application are its open source; it
comes in a variety of language packs, compatible with Windows and Linux operating systems and contains a widespread of international standards/formatting. Units are combined along
with the Symantec Anti virus software which protects from viruses, malware and spy ware as
which is in Solution one.
5.2.11 Security
Security within this option is split between network/client security. Network security is
enabled via the router and user policies setup on the domain controlling server. The software
allocated to deal with viruses/malware/spyware is primarily controlled with Symantec Antivirus which is installed onto each client (like option 1 and 3).
5.2.12 Printing Facilities
The printers in this Solution are identical from the ones provided via Solution one, including
their print server which runs at 54 Mbps.
Documentation Standards Ver 1.0 - 33 - Alpha Omega IT
5.3 ECONOMIC FEASIBILITY Outlined below are several tools used to help evaluate if the IT solution is economically viable. Also included is a table of costs associated with this solution. Included are hardware,
software, maintenance and personnel implementation costs.
5.3.1 Table of Costs
Category Item Quantity Total
Server Hardware
Server 4 $2,760.00
Server Rack 1 $1,380.00
Uninterruptible Power Supply 1 $1,020.00
Server Console Switch 1 $400.00
LCD Monitor for server 1 $30.00
Keyboard for server 1 $30.00
Mouse for server 1 $30.00
Tape Drive 1 $1,600.00
Tape Drive Media Kit 1 $830.00
User Hardware Workstation 6 $6,000.00
Laptop 2 $3,200.00
Network Hardware
Router 1 $100.00
Switch 1 $100.00
ADSL 2+ Modem 1 $60.00
Next G Laptop Modem 2 $0.00
PC Adapter 6 $240.00
Notebook Adapter 2 $80.00
Printer Server 2 $190.00
Cabling 12 $42.00
Printers Multi-function Printer 1 $500.00
Black and White Laser Printer 1 $600.00
Documentation Standards Ver 1.0 - 34 - Alpha Omega IT
Table of costs cont
Category Item Quantity Total
Software
Operating System for Servers 4 $3,980.00
Email Server 1 $0.00
Database Server 1 $0.00
Anti-virus software 1 $2,500.00
Operating System for workstation 8 $0.00
Office software for workstation 8 $0.00
Front end database 1 $500.00
Backup Software 3 $2,160.00
Website Design 1 $4,000.00
Personnel
Labour 800 $24,000.00
User Training 1 $1,000.00
Website
Domain Name Hosting 60 $835.00
Business Broadband ADSL 2+ 60 $5,400.00
Mobile Broadband 120 $7,080.00
Website Hosting 60 $2,461.00
Maintenance 1 $22,490.00
TOTAL $94,568.00
5.3.2 Net Present Value (NPV)
The project is assumed to have a lifespan of five years. It has been calculated that the Net Present Value (NPV) at the end of the project will be $43,802.12. A positive NPV means the
project is still providing income to the business.
5.3.3 Return On Investment (ROI)
The Return On Investment (ROI) has been calculated at 49%. If the costs of the project were invested in stocks or other financial schemes then it wouldnt return anywhere near this figure. An ROI figure of above 20% is considered a sound investment.
Documentation Standards Ver 1.0 - 35 - Alpha Omega IT
5.3.4 Payback Analysis
A discount rate of 8% was used as this is the average interest rate at the current time. The discounted costs and benefits have been included in the table below. For more information
regarding the discounted costs and benefits see the Costs/Benefits Analysis later in this document.
Year 1 2 3 4 5
Discounted Costs $59,576.40 $66,027.70 $73,155.10 $81,835.97 $89,873.82
Discounted
Cumulative Benefits $31,000.00 $59,703.70 $86,281.21 $110,890.01 $133,675.93
As shown in the table, by the end of year 3 the benefits are higher than the cost of the system. Shown graphically the system has paid itself back around the first third of the year
between years two and three. A payback period before the end of the third year is considered justifiable.
5.3.5 Final Overview
Each hardware and software component has been factored into the cost of the overall
solution. By taking in
Top Related