1. Overview of the project.
The project requires to develop a secure network infrastructure for Developers worldwide Inc. The new software system must be cost effective and helpful to secure all the data. The nature of the sustainable network must be user friendly as it not only the personnel of the company will use it but the student and visitors will also have a permanent access to it. The aim of the project is too focus on the growth of business by expansion in a secured way. In addition to it, being cost effective is an essential element of this project. For the purpose of completion of the project, four phases of feasibility are identified that are operational feasibility, technical feasibility, economical feasibility, and schedule feasibility. The assessment is important for the system design and implementation . The report highlights the cost required for the completion of project and the issues faced during the completion of the requirements of the client. In addition to the budget of the project, the report also includes Gantt chart, data flow diagram, security issues, and the challenges faced to complete the project.
2. Process to select/design the system
For the purpose of growth the client required an efficient network infrastructure which can be used by the administration, students, and visitors. There is an existence of threat of loss of data therefore, it system should be of a secured nature. The major issue for the completion of the project was its budget as the client had limited resources for this project. In order to complete the project, the group investigated different network systems which were cost efficient, user friendly, and secured. As the data at such places needs huge storage place therefore, the option of cloud was considered. On the analysis of different network infrastructure system, it is observed that one of the integral parts of the cloud computing that is Infrastructure as a System (IaaS) is the most suitable system for the company .
On considering the requirements of the client IaaS was deemed to be the best solution as it hosts hardware, software, storage, servers, and infrastructure component for the users. The system allows the hosts to manage tasks like maintenance and backup. The licensing of this software is provided by several vendors and is provided on different yearly contracts. The total cost of ownership of IaaS for three years can variate depending upon the configuration required. For the project of implementation of the software four physical servers and VMware Licensing, one storage area network (SAN), one server cabinet and PDUs, two network switches, 2000 power and cooling components, and 1.5 systems FTEs to manage the environment. These specifications are obtained from the IBM manual 2010 . The cost of the ownership of all components to implement the cloud software is mentioned below in the table.
There is some indirect cost related to the project. The indirect cost of the project includes payment of system administrators and other IT staff members that are required to maintain hardware and fix bugs of the software. The installation of the program requires 20 hours (cost of installation is $75 per hour and the total cost of installation is $1,500) and analysis of the system requires 48 hours (cost of analysis is $125 per hour and the total cost of analysis is $6,000). Therefore, the total indirect cost is $7,000. The indirect cost is a part of start-up cost, the system requires maintenance which costs around $5,000 per month.
The security issues that can be faced by the new software is the theft of data. Proper licensing of the software and secured passwords will help the company to secure the data. In addition to it, the software user of the company must look at and resolve the issues of software bugs. These are the two major threats that are expected to incur in the software and without taking pre-installation measures they can cause the system failure. In order to protect the data, the company must restrict the access of visitors to a certain extent which will help in protecting the data.
The testing of the system will require 48 hours and continuous maintenance is required to fix bugs. For this purpose, the company will hire a software tester and developer to test the system at the initial stage and will also hire the person on monthly wage to maintain the system throughout its useful life.
The challenge faced to complete the project was hiring of the employees who are efficient in testing, maintaining, and using the system. Therefore, through different channels the right people were hired. There are several infrastructure software that are available and carrying out the research to find the best system that fulfills the requirements and is cheap was difficult. After the selection of the system, selecting a vendor was also an issue that was dealt by the group by taking rates of software from different vendors
3.
Gantt chart
Data Flow Diagram (DFD)
Works Cited
Antani, Ved. Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c. Packt Publishing Ltd: Packt Publishing Ltd, 2013. Print.
Buragga, Khalid A. and Noor Zaman. Software Development Techniques for Constructive Information Systems Design. Hershey: Idea Group Inc (IGI), 2013. Print.
Kim, David and Michael G. Solomon. Fundamentals of Information Systems Security. Sudbury: Jones & Bartlett Publishers, 2012. Print.
Shelly, Gary and Harry J. Rosenblatt. Systems Analysis and Design. Boston: Cengage Learning, 2010. Print.
Tate, Jon, et al. "IBM b-type Data Center Networking: Design and Best Practices Introduction." 2010. Red Books. Web. 22 July 2016 <http://www.redbooks.ibm.com/redbooks/pdfs/sg247786.pdf>.