alpha omega project feasibility study

68
Alpha Omega IT Project Feasibility Study Prepared by: Alpha Omega IT Reviewed by: Jeffrey Dagher V1.3

Upload: stuart-alexander

Post on 29-Dec-2015

63 views

Category:

Documents


0 download

DESCRIPTION

Example of a Project Feasibility Study

TRANSCRIPT

  • Alpha Omega IT Project Feasibility Study

    Prepared by: Alpha Omega IT

    Reviewed by: Jeffrey Dagher

    V1.3

  • Table of Contents

    1. Document Details ................................................................................................. 5

    1.1 Document History .................................................................................................... 5 1.2 Document Purpose ................................................................................................... 5 1.3 Document Audience ................................................................................................. 5 1.4 Document Task Breakdown ...................................................................................... 5 1.5 Quality Assurance .................................................................................................... 6

    2. Problem Analysis .................................................................................................. 7

    2.1 Background ............................................................................................................. 7 2.2 Core Problem ........................................................................................................... 7 2.3 Problem Analysis ...................................................................................................... 7

    3. Proposed solution ................................................................................................. 9

    3.1 Common Goals ........................................................................................................ 9 3.2 LAN & WLAN ........................................................................................................... 9 3.3 Server Design ........................................................................................................ 10 3.4 Client Design ......................................................................................................... 11

    4. Solution 1 ........................................................................................................... 11

    4.1 System Overview ................................................................................................... 11 4.1.1 Server Hardware .............................................................................................. 12 4.1.2 Workstations and Laptops ................................................................................ 12 4.1.3 Network Hardware ........................................................................................... 12 4.1.4 Printers ........................................................................................................... 12 4.1.5 Software ......................................................................................................... 12 4.1.6 Ongoing Maintenance ...................................................................................... 13 4.1.7 Personnel Costs ............................................................................................... 13

    4.2 Technical Feasibility ............................................................................................... 13 4.2.1 Network Structure ............................................................................................ 13 4.2.2 Internet and Remote access ............................................................................. 14 4.2.3 Server hardware .............................................................................................. 15 4.2.4 Server Operating System .................................................................................. 15 4.2.5 Domain Controller ............................................................................................ 15 4.2.6 Mail Server ...................................................................................................... 15 4.2.7 File Server ....................................................................................................... 16 4.2.8 Database Server .............................................................................................. 16 4.2.9 Backup Approach ............................................................................................. 16 4.2.10 Clients Hardware ........................................................................................... 16 4.2.11 Clients Operating System................................................................................ 17 4.2.12 Additional Applications ................................................................................... 17 4.2.13 Security ......................................................................................................... 17 4.2.14 Printing Facilities ............................................................................................ 17

    4.3 Economic Feasibility ............................................................................................... 18 4.3.1 Table of Costs ................................................................................................. 18 4.3.2 Net Present Value (NPV) .................................................................................. 19 4.3.3 Return On Investment (ROI) ............................................................................ 19 4.3.4 Payback Analysis ............................................................................................. 20 4.3.5 Final Overview ................................................................................................. 20

    4.4 Legal Feasibility ..................................................................................................... 20 4.5 Operational Feasibility ............................................................................................ 21

    4.5.1 Final Overview ................................................................................................. 23 4.6 Schedule Feasibility ................................................................................................ 24

    4.6.1 Project Time constraint .................................................................................... 24 4.6.2 Task Duration Estimate Justification .................................................................. 24

  • 4.6.3 Schedule Analysis ............................................................................................ 26 4.6.4 Assumptions of Schedule Analysis ..................................................................... 27 4.6.5 Final Overview ................................................................................................. 27

    5. Solution 2 ........................................................................................................... 28

    5.1 System Overview ................................................................................................... 28 5.1.1 Server Hardware .............................................................................................. 28 5.1.2 Workstations and Laptops ................................................................................ 28 5.1.3 Network Hardware ........................................................................................... 28 5.1.4 Printers ........................................................................................................... 29 5.1.5 Software ......................................................................................................... 29 5.1.6 Ongoing Maintenance ...................................................................................... 29 5.1.7 Personnel Costs ............................................................................................... 29

    5.2 Technical Feasibility ............................................................................................... 29 5.2.1 Network Structure ............................................................................................ 29 5.2.2 Remote Access ................................................................................................ 30 5.2.3 Server Hardware .............................................................................................. 30 5.2.4 Server Operating System .................................................................................. 31 5.2.5 Mail Server ...................................................................................................... 31 5.2.6 Database Server .............................................................................................. 31 5.2.7 Backup Approach ............................................................................................. 31 5.2.8 Client Hardware ............................................................................................... 31 5.2.9 Client Operating System ................................................................................... 31 5.2.10 Additional Applications ................................................................................... 32 5.2.11 Security ......................................................................................................... 32 5.2.12 Printing Facilities ............................................................................................ 32

    5.3 Economic Feasibility ............................................................................................... 33 5.3.1 Table of Costs ................................................................................................. 33 5.3.2 Net Present Value (NPV) .................................................................................. 34 5.3.3 Return On Investment (ROI) ............................................................................ 34 5.3.4 Payback Analysis ............................................................................................. 35 5.3.5 Final Overview ................................................................................................. 35

    5.4 Legal Feasibility ..................................................................................................... 35 5.5 Operational Feasibility ............................................................................................ 36

    5.5.1 Final Overview ................................................................................................. 38 5.6 Schedule Feasibility ................................................................................................ 38

    5.6.1 Project Time constraint .................................................................................... 38 5.6.2 Task Duration Estimate Justification .................................................................. 38 5.6.3 Schedule Analysis ............................................................................................ 40 5.6.4 Assumptions of Schedule Analysis ..................................................................... 41 5.6.5 Final Overview ................................................................................................. 41

    6. Solution 3 ........................................................................................................... 42

    6.1 System Overview ................................................................................................... 42 6.1.1 Server Hardware .............................................................................................. 42 6.1.2 Workstations and Laptops ................................................................................ 42 6.1.3 Network Hardware ........................................................................................... 43 6.1.4 Printers ........................................................................................................... 43 6.1.5 Software ......................................................................................................... 43 6.1.6 Ongoing Maintenance ...................................................................................... 43 6.1.7 Personnel Cost................................................................................................. 43

    6.2 Technical Feasibility ............................................................................................... 44 6.2.1 Network structure ............................................................................................ 44 6.2.2 Remote Access ................................................................................................ 44 6.2.3 Server Hardware .............................................................................................. 44 6.2.4 Server Software ............................................................................................... 45 6.2.5 Backup Approach ............................................................................................. 45 6.2.6 Client Hardware ............................................................................................... 45

  • 6.2.7 Client Operating System & Additional Applications ............................................. 45 6.2.8 Printing Facilities .............................................................................................. 45

    6.3 Economic Feasibility ............................................................................................... 46 6.3.1 Table of Costs ................................................................................................. 46 6.3.2 Net Present Value (NPV) .................................................................................. 47 6.3.3 Return On Investment (ROI) ............................................................................ 47 6.3.4 Payback Analysis ............................................................................................. 48 6.3.5 Final Overview ................................................................................................. 48

    6.4 Legal Feasibility ..................................................................................................... 48 6.5 Operational Feasibility ............................................................................................ 49

    6.5.1 Final Overview ................................................................................................. 51 6.6 Schedule Feasibility ................................................................................................ 51

    6.6.1 Project Time constraint .................................................................................... 51 6.6.2 Task Duration Estimate Justification .................................................................. 51 6.6.3 Schedule Analysis ............................................................................................ 53 6.6.4 Assumptions of Schedule Analysis ..................................................................... 54 6.6.5 Final Overview ................................................................................................. 54

    7. Cost/Benefits Analysis ....................................................................................... 55

    7.1 Costs ..................................................................................................................... 55 7.2 Benefits ................................................................................................................. 55 7.3 Payback Analysis .................................................................................................... 56 7.4 Net Present Value (NPV) ......................................................................................... 58 7.5 Return On Investment (ROI) .................................................................................. 58 7.6 Final Overview ....................................................................................................... 58

    8.General outline of approximate Budgets, Timing and Risks ............................... 58

    8.1 Budgets ................................................................................................................. 58 8.1.1 Defining project costs ...................................................................................... 58 8.1.2 Budget Risk Assessment ................................................................................... 60 8.1.3 Project Estimated Budgets ................................................................................ 60 8.1.4 Final Overview ................................................................................................. 60

    8.2 Timing ................................................................................................................... 61 8.3 Risks ..................................................................................................................... 61

    8.3.1 Risks Evaluation tool ........................................................................................ 61 8.3.2 Risk Identification ............................................................................................ 62 8.3.3 Final Overview ................................................................................................. 66

    9. Recommended System Solution for implementation ......................................... 66

    10. Bibliography ..................................................................................................... 68

  • Documentation Standards Ver 1.0 - 5 - Alpha Omega IT

    1. DOCUMENT DETAILS

    1.1 DOCUMENT HISTORY Date Revised By Changes Made Version

    2nd June 2008 Alpha Omega IT Initial Document Collated 1.0

    16th June 2008 Christine Zhou Document Standards applied 1.1

    20th June 2008 Jeff Dagher Review Document 1.2

    31st July 2008 Stuart Alexander Review Document. Tech Feas.

    Updated. Spelling and grammer

    1.3

    1.2 DOCUMENT PURPOSE The purpose of this document is to provide three possible wireless office solutions for Eastcoast Contracting. After performing a feasibility analysis on all three solutions a

    recommendation on the most suitable option will be made to Eastcoast Contracting. This will be used as a basis for the prototype and next project phases such as the Requirements

    Specification, design document and implementation plan.

    1.3 DOCUMENT AUDIENCE This document is intended for Alpha Omega staff to use as a tool within the wireless office

    network project. It will help guide management to decide the most feasible option to adopt in carrying out the project. The manager at Eastcoast Contracting will receive a copy of this

    document and make the final decision on which solution to go ahead with.

    1.4 DOCUMENT TASK BREAKDOWN

    Section Name

    Project Feasibility Study

    a. Problem Analysis Christine Zhou

    b. Explain the solution (broadly) Stuart Alexander

    c. Propose 3 solutions:

    HW solution Jeff Dagher

    SW solution Christine Zhou

    Network solution Christine Zhou

    All Options

    Technical Feasibility Jeff Dagher

    Economic Feasibility Stuart Alexander

    Legal Feasibility Stuart

    Operational Feasibility Stuart Alexander

    Schedule Feasibility Christine Zhou

    d. Cost/Benefits Analysis Stuart Alexander

    e. General outline of approximate budget,

    timing and risks

    Christine Zhou

    f. Recommended solution for implementation Jeff Dagher

    Appendix A Hardware

    Servers Jeff Dagher

    Router Jeff Dagher

    Switch Jeff Dagher

    Desktop Jeff Dagher

    Laptop Jeff Dagher

    Print server Jeff Dagher

    Wireless pc adapter Jeff Dagher

    Wireless notebook adapter Jeff Dagher

    Printer Jeff Dagher

  • Documentation Standards Ver 1.0 - 6 - Alpha Omega IT

    Section Name

    Server Console switch Christine Zhou

    UPS Christine Zhou

    Server rack Christine Zhou

    ADSL modem Stuart Alexander

    Appendix B Software

    Costs Minimisation Table Jeff Dagher

    Windows server 2008 Jeff Dagher

    Exchange server 2007 & CAL Jeff Dagher

    Symantec Anti-virus Jeff Dagher

    XP Professional Edition Jeff Dagher

    Office Professional 2007 Jeff Dagher

    Fedora Core 8 Jeff Dagher

    OpenOffice Stuart Alexander

    SQL Server 2005 Express Stuart Alexander

    Red Hat Enterprise Christine Zhou

    Postfix Mail Server Christine Zhou

    MySQL Christine Zhou

    Appendix C External Services

    Next G wireless broadband x 1 Stuart Alexander

    Business Broadband ADSL 2+ Stuart Alexander

    Next G Mobile Broadband Stuart Alexander

    Domain Name Hosting Christine Zhou

    Website Hosting Christine Zhou

    1.5 QUALITY ASSURANCE

  • Documentation Standards Ver 1.0 - 7 - Alpha Omega IT

    2. PROBLEM ANALYSIS

    2.1 BACKGROUND Eastcoast Contracting has decided to start a branch in Sydney. The company works in the field of nursing contracting which belongs to a highly competitive environment. Today,

    Information Technology (IT) is vital to most companies. Computers, computer-based systems

    and computer networks are necessary parts of an enterprise. The IT systems help business to conduct their core business and to increase profits.

    2.2 CORE PROBLEM The core problem of Eastcoast Contracting is that they do not have a holistic, efficient and

    cost-effective IT system for their day-to-day business in Sydney. Their lack of an IT system would mean they are incapable of operating at all. They require this IT system to allow them

    to be competitive in this market.

    2.3 PROBLEM ANALYSIS Unsuitable paper-based office work processes

    If an IT system is not developed they will need to do their everyday office tasks through a manual process and rely on the Melbourne office for nursing details. This will be a waste of

    time, money and staff resources.

    Eastcoast Contracting urgently need an office automation system to ensure basic office

    procedures are easier and faster than a manual system. These include word processing, storing data, exchanging files, maintaining business information and operating payroll. This

    requirement is of primary importance.

    Low collaborative ability of standalone computer

    Eastcoast Contracting does not have a LAN in their Sydney branch office. Because of this, the staff can not execute programs, share expensive devices and share information with each

    other.

    Eastcoast Contracting requests a high capability LAN to help their office automation more

    efficiently. They hope that the LAN is cost-effective, easy to expand and easy to maintain. Therefore, they really prefer a Wireless Local Area Network (WLAN).

    Large volume of nursing staff detail

    Over the years Eastcoast Contracting has compiled a large amount of data on their clients. It

    has been established that there are more records than will fit in Microsoft Access Database.

    The current data need to be imported into a powerful, secure and fast database system so that Eastcoast Contracting can share, manage, search and organize the information efficiently.

    Lack of electronic communication methods Eastcoast Contracting is aware that a successful business requires multiple ways of

    communication with their clients. The traditional methods such as mails and phones are vital. However, the traditional mail can not provide the Real-time service. Sometimes, the staff are

    not able to respond to customers requests timely by phone. Furthermore, they realize that it will costs much money to connect with headquarter in Melbourne by phone.

    Eastcoast Contracting hope that they have a dependable and secure Electronic mail system. They can gather more customers, build stronger relationship with the existing customers and

    promote their service via emails. Otherwise, Sending and receiving fax directly in personal computer is ideal.

  • Documentation Standards Ver 1.0 - 8 - Alpha Omega IT

    Internet connection

    Internet connection is the precondition of E-mail using, Web surfing, Web presence and remote access. Eastcoast Contracting need an Internet connection with high speed and high

    quality.

    Remote access

    Remote access is a critical request for Eastcoast Contracting because the staff need to frequently use data when they are not in the office. Eastcoast Contracting heavy demands

    the technology of Remote access is secure and low cost.

    Issue of security

    Eastcoast Contracting work in a highly competitive filed. The data which include personal details and job details is confidential. This data could be used by competitors for

    inappropriate reasons such as unwanted mailouts or blackmailing. These potential problems might come from computer virus, unsafe web searching, unauthorized system access and low

    level network administration.

    Besides the above reasons, the weakness of wireless LAN compared to a wired LAN might

    result in serious security problem. Wireless radio signal is transmitted through the air and easier to intercept by hackers and snoopers. Eastcoast contracting requires apply appropriate

    strategies and technologies to avoid these security problems.

    IT staff training

    The whole IT system will be maintained by an IT staff of Eastcoast contracting. The person is not being appointed now. Sometimes, the project documentation might get a lot skimpier.

    This situation is anxious when the system Iis in operation.

    Eastcoast contracting need sufficient documentation to record this project so that the IT staff

    can use the documentation for further troubleshooting, system modifications and avoiding needless repetition of work.

    Minimising initial outlay cost

    Budget problems are one of the common problems of most projects. Eastcoast Contracting

    needs to keep the budget to the minimum and present it to higher management. However, many factors cause the budget problem- equipment, personnel, development and technology.

    Eastcoast Contracting is aware that estimates and guesswork are the frequent source of budget problems.

    Eastcoast contracting require a thorough investigation of the project cost and so avoid the potential budget problem.

  • Documentation Standards Ver 1.0 - 9 - Alpha Omega IT

    3. PROPOSED SOLUTION

    3.1 COMMON GOALS All three solutions provided have common functionalities that fulfil the goals set out in the Project Charter and Project Management plan. The proposed solutions include the following

    functionalities:

    Scalable infrastructure by selecting hardware with spare capacity within each part of the network.

    File security by taking a multi-level approach to security such as centralised storage of data, software and hardware firewalls, anti-virus software, IP management and monitoring, security based policies and procedures.

    Communication and collaboration opportunities between employees, suppliers and customers through a relational database and web technologies such as a company

    webpage.

    A standard and integrated environment where data can be utilised by each software package. Hardware devices have been chosen to minimise the potential conflict that

    can occur.

    Minimise or eliminate areas of redundancy by employing an SOE on the desktops, multiple printers, and separate servers for each server function and technical

    documentation in case replacement is necessary for a piece of hardware.

    System reliability by selecting reputable brands, reducing the complexity of system

    operation and employing maintenance policies.

    In addition to common functionalities there are several design features that make up the system.

    3.2 LAN & WLAN The wired Local Area Network section of the system has speeds between 100Mbs up to

    1000Mbs. The Wireless LAN section has speeds between 54Mbs and 300Mbs. This means network traffic will be sent quickly between the servers and desktop clients with minimal

    delays for the user.

    Security is maintained on the WLAN by enabling WPA authentication, only allowing specific

    MAC addresses to connect to the router, setting static IP addresses on network equipment, monitoring network traffic and educating end users. The printers will also require these

    security measures to be put in place.

    Internet connectivity is achieved through the modem and router and will be discussed later in

    this document. The key factors of the internet connectivity are speed and security. Speed is achieved by the combination of a fast broadband plan and the fast throughput of the network

    hardware. Security is maintained at the ISP, router and client level by utilising antivirus software and only allowing genuine traffic through. This minimises virus and Trojan attacks

    and other forms of illegitimate access.

  • Documentation Standards Ver 1.0 - 10 - Alpha Omega IT

    3.3 SERVER DESIGN The system will consist of 4 servers, each having a specific role. The reasons for this are:

    Allows easier configuration of server setups and management including auditing network traffic

    Reduces the likelihood of errors occurring between conflicting server functions

    Helps maintain a high network speed by separating different server requests e.g. Database requests and email requests

    In the event of a server malfunctioning only one server function is affected allowing staff to still be connected to the other servers.

    The four servers are:

    File Server Storage of all Eastcoast documents and files (not database files) will be on this server. Having

    it in a centralised place ensures staff are able to view their files from any pc, allows backups to be taken and reduces the likelihood of unauthorised access by limiting which folders staff

    have access to.

    Mail Server

    Move and store email across the LAN and VPN. It enables communication between stakeholders of the business. There are more options for filtering and email management that

    can be employed with a mail server onsite.

    Domain Controller

    Manages user logon details, accounts and effective rights. Reports will be run on this server to monitor logon habits and identify unauthorised access.

    Database Server

    All database files will be located on this server. Client machines will run the database client to

    establish connection with this server. By passing SQL (Structured Query Language) requests to the server, the server will be able to user its own processing power to retrieve the data,

    rather than the client finding the data. This helps maintain high speeds over the network. It is similar to the file server in that backups can be done, there is centralised data and access

    levels can be managed.

    Both rack options and standalone servers are included in the Solutions below. All servers will

    have the option of having RAID implemented into their design to give another level of redundancy within the system if required. The software used in the 3 Solutions is either

    Microsoft or Linux based. Both operating systems have the same functionalities but offer varying degrees of support and are implemented differently.

    All servers when set up will have network tools used for monitoring server and network performance and utilisation. These will be set up to notify the system administrator if errors

    occur on the hardware, operating systems or applications. This also makes auditing easier.

  • Documentation Standards Ver 1.0 - 11 - Alpha Omega IT

    3.4 CLIENT DESIGN Since most of the applications run from the client, the PCs chosen have the ability to run current applications and also future applications. Dell has been chosen due to their good

    reputation and support Solutions. They are also considered good value for money.

    A SOE (standard operating environment) will be used for each pc to allow easier

    management and allow users to operate on any pc. One piece of software that is common to all the outlined Solutions is the Symantec Antivirus small business Edition. Although managed

    on the server, each client is equally protected from virus and Trojan attack.

    Wireless connectivity allows workstations to be moved in the office without the need for

    installation or activation of extra ports. This ensures downtime for users and the system administration is minimised. Workstation security relies on proper security procedures such

    as strong passwords being selected by users in addition to the wireless security outlined in the LAN section above.

    4. SOLUTION 1

    4.1 SYSTEM OVERVIEW Solution 1 is based on a Windows operating environment both for the servers and for the client machines. All servers incorporate the latest version of Microsofts server platform, ie. Windows Server 2008 with the addition of Exchange 2007 and SQL Express for the mail

    server and database server respectively. Client machines have the following software installed as a basis for the SOE:

    Operating System - Microsoft Windows XP

    Office Suite - Microsoft Office 2007 Standard

    Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve

    Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen

    due to these factors and their positive reputation. The servers are rack mounted and run Intel Dual Core Xeon processors. Both laptops and desktops use Intel Core 2 Duo processors.

    This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 1 gigabit Ethernet cabling for

    maximum network speed while the client machines use wireless connections for flexibility in where they can be located.

    All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and

    black and white printers and ADSL 2+ internet connection for the office and Telstra Next G for offsite VPN connections. Domain name and website hosting is also the same across all

    solutions.

  • Documentation Standards Ver 1.0 - 12 - Alpha Omega IT

    4.1.1 Server Hardware

    HP ProLiant DL120 G5 Rack x 4 - Dual-Core Intel Xeon 2.33 GHz HP Server Rack 10636 G2 Pallet HP UPS (Uninterruptible Power Supply) R3000 VA 2U L6 20 HP Port Console Switch

    LCD monitor (for server)

    Keyboard (for server) Mouse (for server)

    HP StorageWorks LTO-2 Ultrium 448 SCSI External Tape Drive 400GB

    4.1.2 Workstations and Laptops

    Dell Vostro 200 Slim Tower Workstation x 6 - Core 2 Duo E6550 2.33GHz Dell XPS M1530 Laptop x 2 - Centrino Core 2 Duo T7250 2.0GHz

    4.1.3 Network Hardware

    Linksys Router WRVS4400N Linksys Switch SR2016 Linksys PC Adapter WMP300N Linksys Notebook Adapter WPC300N Linksys Printer Server WPSM54G Cabling x 12m CAT6 Linksys AM300 ADSL 2+ Modem Telstra MF332 Laptop Next G card

    4.1.4 Printers

    HP LaserJet 3050 Multifunction

    HP LaserJet P2015 B&W Printer

    4.1.5 Software

    Microsoft Windows Server 2008 OEM Microsoft Exchange 2007

    Microsoft Exchange Server CAL

    Microsoft SQL Server 2005 Symantec Endpoint Small Business Edition

    Microsoft Windows XP Professional Edition OEM Microsoft Office 2007 Professional

    CA ARCserve Backup Email Suite r12

    CA ARCserve Backup r12 Client Agent for Windows/Linux Website Design

  • Documentation Standards Ver 1.0 - 13 - Alpha Omega IT

    4.1.6 Ongoing Maintenance

    Hardware replacement & extended warranties Telstra - .com.au domain and website hosting

    Business ADSL 2+ Broadband 10GB/month Mail and Web Protection

    Next G Broadband

    4.1.7 Personnel Costs

    Design and Installation $30 per hour x 600 hours

    User training session outlining key features of system

    4.2 TECHNICAL FEASIBILITY Today business relies extensively on their IT systems, due mainly to the fact that it processes

    and stores all their information. Therefore it is vital that the system is efficient and reliable.

    To make a system that fits into those criteria it will need to be built using quality parts and software that has been tested and proven to work. Due to that fact we have chosen three of

    the major brands to source out our hardware required to build and implement this network. We have chosen Dell for all our PCs and laptops, HP for our servers and Linksys for our entire Network infrastructure needs.

    4.2.1 Network Structure

    The network design has been kept simple so as to help in the implementation of the system as shown in diagram below:

  • Documentation Standards Ver 1.0 - 14 - Alpha Omega IT

    Having a dedicated function for each server will result in easier diagnosis of problems and

    minimise disturbance to the business operations if one server is not functioning in its full capacity.

    There are two distinct parts to this network, wired and wireless. The servers, switch, router

    and modem are connected via cat 6 cable ensuring a 1000Mbs speed at 250MHz is

    maintained between each component. They will be located physically close to each other to minimise the cost of cabling. If circumstances change the cabling allows the signal to reach

    up to 100 metres without requiring a signal booster.

    The wireless part of the network consists of the clients and printers. All wireless traffic travels through the Wireless Access Point incorporated into the router. The 802.11N wireless protocol

    that has been chosen for this option operates at speeds of up to 300Mbs depending on

    location and frequency (2.4 5 GHz) that it is set at. The benefits of choosing this protocol over older versions which include:

    Greater speeds (up to 12x greater than 802.11G)

    The strength of the signal it transmits is significantly broader allowing receivers to be dispersed further away

    Protocol allows backward forward compatibility with the existing protocols.

    Incorporating a wireless client infrastructure into the network allows the easy addition of more clients in the future with only minor changes required on the domain controller and

    router.

    Ensuring a secure network is a primary focus in this option. The Linksys WRVS4400N Router is a critical part of the network as all traffic will pass through it. A key security feature of this

    component is the built in firewall which will be configured to only allow legitimate traffic

    through. Another main function this Router provides is VPN Access with authentication for users offsite. Wireless traffic is secured using WPA2 authentication and encryption and by

    specifying set MAC and IP addresses. Other security features implemented into the maintenance and culture of the business will be monitoring network traffic and educating end

    users. The printers will also be set with static IP addresses and WAP keys which are

    configured between the router and print server. The router will only allow specific traffic to the print servers and restrictions will be set up according to IP addresses.

    4.2.2 Internet and Remote access

    Internet connectivity on the network is achieved through the Linksys AM300 ADSL 2+

    USB/Ethernet Modem. This is connected to the router which will then share the connection amongst the entire network. Speed is achieved by the combination of a fast broadband plan

    and 802.11N protocol. Security is maintained at the ISP, router and client level by utilising antivirus software and only allowing genuine traffic through. This minimises virus and Trojan

    attacks and other forms of illegitimate access.

    VPN access is achieved through a combination of Telstra Next G cards providing the internet

    connection and establishing a virtual private network with the router. The Next G cards have uploads speeds between 300Kbs to 1Mbs and require minimum configuration. User accounts

    are authenticated at the router using their network logon username.

  • Documentation Standards Ver 1.0 - 15 - Alpha Omega IT

    4.2.3 Server hardware

    Servers selected for this project are HP ProLiant DL120 G5 Rack x 4, Dual-Core Intel Xeon 2.33 GHz (64 BIT processor), running 1 GB of memory (RAM). These specifications allow

    plenty of opportunity for future development as they are more adequate for the business operations being administered and allow for future expansion. The servers are stored in a

    server cabinet which is beneficial because it requires less space and is easier to manage and

    maintain. In addition servers will be under constant air conditioning which helps to stabilise and helps efficiency.

    RAID 1 will be enabled upon the servers which hold 2 x 250 GB SATA hard drives, thus

    working as a fail safe, if one hard drive was to fail the system will remain operational. Both

    hard drives will contain identical images therefore reducing down time, for instance if one fails you can replace it without powering down the server and it will recreate the image. In an

    event of power failure the system is backed up via the HP Uninterruptible Power Supply system which will activate and help prevent hardware faults, loss of data and loss of

    productivity.

    4.2.4 Server Operating System

    Each server plays an independent role which includes (domain controller, file server, database server and mail server). Benefits of having them running independently include one

    allows the network/servers to breath better, two places less stress upon the servers therefore making them more efficient and three if a server failed the system will not have such a

    dramatic affect on the business as they will still be able to operate and still use full

    functionality of the other servers.

    The operating system which will be installed on all servers is Microsoft Windows Server 2008. This operating system is well known for its stability and simplicity to be able to setup and

    manage, with it providing large amounts or support and compatibility with the Microsoft

    products.

    4.2.5 Domain Controller

    Once the operating system is installed onto the servers they will then be configured to run

    their allocated role. Domain Controlling Server which is one of the most important roles to

    secure in any active directory environment, this unit contains all the security policies for all users, files, groups, etc. if anything was to compromise this server it could affect users not

    being able to log in, not being able to access files or put the organisations data at risk. Windows/Linux Base ARCserve Server Suite Backup agent is loaded onto this server.

    4.2.6 Mail Server

    The Mail Server which is a critical part of communication within any organisation, it allows

    communication between stake holders and documents, files, images etc to be transmitted from user to user instantly. The server will be running Microsoft Exchange 2007, which

    contains built-in protective technologies to keep your business operational, reduce spam and

    viruses, enable confidential communications, and help your company to be compliant with todays security standards. It can be configured to suit individual needs, in regards to modifying their mail file, or

    settings up various rules etc. along with it being a Microsoft product which includes large amount of support and information. ARCserve Backup Email Suite r12 agent installed onto

    this server which will allow all emails to be backed up on a daily basis according to the

    backup plan.

  • Documentation Standards Ver 1.0 - 16 - Alpha Omega IT

    4.2.7 File Server

    The File Server which is dedicated to the one function storing data. Data such as users profiles, data/information and media files are all stored upon this server. Controlled via active

    directly policies which outline which user has access to what data. The File server also runs RAID 1 which will increase the access speeds by reading from two drives concurrently,

    making it more prone to data redundancy.

    4.2.8 Database Server

    The Database Server which will be built upon Microsoft SQL Server 2005. Also known as a Relational database management system, it allows the administrator / users to build and

    modify the database according to East Coast contracting demands. The system administrator

    in charge of the branch will perform daily maintenance to the database via removing unnecessary or data entries which are out of date and backing it up using ARCserve.

    Consultants at the branch will be able to directly feed data to the database from the clients installed on their workstations. End users (Customers) will be able to input their requests via

    East Coast web page. Data it will contain such as jobs, client information, location, contact

    details, responsibilities etc.

    4.2.9 Backup Approach

    CA ARC serve provides the perfect backup solution that East Coast contracting requires. CA

    ARC serve is a enterprise class application which uses a conjunction of both hardware and

    software which enables East Coast to backup all their data on the network. Together with the HP StorageWorks LTO-2 Ultrium 448 and CA ARC serve clients which will on a daily basis

    perform a backup of the network using tape drives. Each server will receive a specific client depending on its role. This facility provides centralized management, encrypting the backup

    files so that the information is protected from unauthorised users and keeps data loss to a

    minimal, in an event of a disaster all data can be restored to the last backup.

    The HP StorageWorks LTO-2 Ultrium 448 uses a SCSI connection and is an External Drive allowing up to 400 GB of data to be stored onto a single tape drive. Along with the drive

    comes the Ultrium 400GB storage media Kit containing 20 tapes, cleaning kit, one media case and coloured labels. All backups will be kept with the system administrator or manager of

    east coast contracting who will be responsibility of the tapes by storing on a remote location

    of his choice.

    4.2.10 Clients Hardware

    The desktops and Laptops in this Solution are supplied by Dell which include:

    Dell Vostro 200 Slim Tower Workstation x 6 - Core 2 Duo E6550 2.33GHz

    Dell XPS M1530 Laptop x 2 - Centrino Core 2 Duo T7250 2.0GHz

    They both meet todays standards which contain 64 bit processing along with a minimum of 1 GB of ram. 32 bit processors will start to become redundant as the new OS are going 64 bit.

    The laptops contain a Centrino processor which is used in laptops to be highly efficient and

    use less power compared to other processors. For office use these desktops and laptops are adequate for the operations they are to be performing which are mainly data entry,

    processing information and communicating with stakeholders. The laptops contain built in web cameras which can be used for online video conferencing when they are out and about,

    keeping communication at a high. The laptops contain long lasting lithium batteries which are a necessity for users that do not have one designated location.

    Linksys Wireless Adapter WMP300N and WPC300N will be supplied and installed onto all systems so they will be capable of running at 802.11N protocol networks which run as

    already mentioned above at 300+ Mbps therefore making the most out of the network infrastructure put into place.

  • Documentation Standards Ver 1.0 - 17 - Alpha Omega IT

    4.2.11 Clients Operating System

    All clients (PCs and Laptops) will contain Windows XP SP2 which is been used and recommended highly from of organizations of all sizes. Windows XP SP2is known for its

    stability and efficiency over the existing versions, along with the user friendly GUI design which promotes user confidence which allows use without much discomfort. Service Pack 2

    (SP2) provides enhanced security measures that will hopefully improve defences against

    viruses, worms and hackers, along with increased manageability and an improved experience for users which provides more security and stability to the system administrator of East Coast

    contracting.

    For small businesses, Windows XP SP2 will help keep PCs running smoothly and more

    securely so you will be less reliant on dedicated IT support. Windows XP is a 32 bit runs at half the capacity that the processor is capable of although the majority of the applications

    where developed in 32 bit, therefore will not be compatible if 64 bit operating systems where in use. Microsoft also provides automatic updates whereby all the PCs automatically download

    their latest security updates and patches directly as long as they have a internet connection.

    4.2.12 Additional Applications

    Microsoft Office 2007 has been selected for documentation and office needs. Office 2007 contains features such as an intuitive interface and preconfigured templates which help

    reduce the amount of time spent on training and formatting documentation. Its compatibility with previous versions of Microsoft Office and with current office suites will allow users to edit

    a wide variety of documents. Another feature is files sizes are reduced and there is an

    improvement in corrupt file recovery.

    4.2.13 Security

    Symantec Antivirus combines industry-leading software, real-time malware protection with graphical reporting, centralized management and administration capabilities. This helps

    administer the network from viruses which tend to attack via email, external storage devices which are shared among PCs or contaminated websites. Symantec Antivirus will also update daily ensuring the latest virus definitions are installed to protect the system from the latest viruses/malware. The updates are automatically downloaded from Symantecs web page allowing real time protection.

    4.2.14 Printing Facilities

    The primary printer utilised for printing in the office will be a HP LaserJet P2015 Black and White printer which is dedicated to office reports and documentation. It reaches speeds of 26

    pages per minute. A secondary backup multifunction printer is a HP LaserJet 3050

    Multifunction capable of printing 18 pages per minute and includes fax and scanning facilities.

    Both these units will connect to the network wirelessly using Linksys Printer Server WPSM54G. This will allow the printers to be located anywhere in the office without the need

    for cabling. Configuration of the router will be necessary to allow network traffic to be sent to

    the print servers. Adding the printer to clients is the same as adding a wired printer.

  • Documentation Standards Ver 1.0 - 18 - Alpha Omega IT

    4.3 ECONOMIC FEASIBILITY Outlined below are several tools used to help evaluate if the IT solution is economically viable. Also included is a table of costs associated with this solution. Included are hardware,

    software, maintenance and personnel implementation costs.

    4.3.1 Table of Costs

    Category Item Quantity Total

    Server Hardware

    Server 4 $5,440.00

    Server Rack 1 $1,200.00

    Uninterruptible Power Supply 1 $1,380.00

    Server Console Switch 1 $1,020.00

    LCD Monitor for server 1 $400.00

    Keyboard for server 1 $30.00

    Mouse for server 1 $30.00

    Tape Drive 1 $1,600.00

    Tape Drive Media Kit 1 $830.00

    User Hardware Workstation 6 $6,000.00

    Laptop 2 $3,200.00

    Network Hardware

    Router 1 $270.00

    Switch 1 $290.00

    ADSL 2+ Modem 1 $60.00

    Next G Laptop Modem 2 $0.00

    PC Adapter 6 $600.00

    Notebook Adapter 2 $200.00

    Printer Server 2 $190.00

    Cabling 12 $90.00

    Printers Multi-function Printer 1 $500.00

    Black and White Laser Printer 1 $600.00

  • Documentation Standards Ver 1.0 - 19 - Alpha Omega IT

    Table of costs cont

    Category Item Quantity Total

    Software

    Operating System for Servers 4 $4,800.00

    Email Server 1 $1,330.00

    Email Client Access License 8 $800.00

    Database Server 1 $0.00

    Anti-virus software 1 $2,500.00

    Operating System for workstation 8 $0.00

    Office software for workstation 8 $4,000.00

    Front end database 1 $500.00

    Tape Backup software 2 $1,870.00

    Website Design 1 $3,000.00

    Personnel

    Labour 600 $18,000.00

    User Training 1 $1,000.00

    Website

    Domain Name Hosting 60 $835.00

    Business Broadband ADSL 2+ 60 $5,400.00

    Mobile Broadband 120 $7,080.00

    Website Hosting 60 $2,461.00

    Maintenance 1 $22,490.00

    TOTAL $99,996.00

    4.3.2 Net Present Value (NPV)

    The project is assumed to have a lifespan of five years. It has been calculated that the Net

    Present Value (NPV) at the end of the project will be $40,162.67. A positive NPV means the project is still providing income to the business.

    4.3.3 Return On Investment (ROI)

    The Return On Investment (ROI) has been calculated at 43%. If the costs of the project were

    invested in stocks or other financial schemes then it wouldnt return anywhere near this figure. An ROI figure of above 20% is considered a sound investment.

  • Documentation Standards Ver 1.0 - 20 - Alpha Omega IT

    4.3.4 Payback Analysis

    A discount rate of 8% was used as this is the average interest rate at the current time. The discounted costs and benefits have been included in the table below. For more information

    regarding the discounted costs and benefits see the Costs/Benefits Analysis later in this document.

    Year 1 2 3 4 5

    Discounted Costs $65,004.40 $70,955.70 $77,620.13 $85,872.34 $93,513.27

    Discounted

    Cumulative Benefits $31,000.00 $59,703.70 $86,281.21 $110,890.01 $133,675.93

    As shown in the table, by the end of year 3 the benefits are higher than the cost of the

    system. Shown graphically the system has paid itself back around halfway between years two and three. A payback period before the end of the third year is considered justifiable.

    4.3.5 Final Overview

    Each hardware and software component has been factored into the cost of the overall

    solution. By taking into account the high NPV, ROI and low payback period this option is economically viable.

    4.4 LEGAL FEASIBILITY The factors that may affect the legality of this Solution include the software licensing and use

    of wireless devices. Windows XP operating system included in this Solution will be purchased as OEM as part of the price of the desktops and laptops. The server software, Windows

    Server 2008, SQL 2005 and Exchange 2007 is purchased from the supplier of the server hardware.

    Payback Period - Solution 1

    $0.00

    $20,000.00

    $40,000.00

    $60,000.00

    $80,000.00

    $100,000.00

    $120,000.00

    $140,000.00

    $160,000.00

    1 2 3 4 5

    Project YearSolution 1 Costs

    Cumulative Benefits

  • Documentation Standards Ver 1.0 - 21 - Alpha Omega IT

    Other software will be purchased through a supplier. All licenses will be recorded in a

    centralised location to ensure proper auditing procedures can be followed. Aside from ensuring all software is licensed appropriately, there are no legal implications on the use any

    of the software in this Solution.

    Microsoft software used in the prototype is licensed and fully covered under the MSDN

    Academic Alliance, except for Office 2007. Tafe NSW is part of the MSDN Academic Alliance. For software not covered under this licensing scheme, opensource software will be selected

    that is as close to the recommendation as possible. All opensource agreements will be adhered to.

    The wireless hardware selected confers to all laws regarding wireless transmission standards.

    Ensuring wireless security is covered elsewhere in this report.

    4.5 OPERATIONAL FEASIBILITY The overall operational requirements of the proposed system are for it to be quick, secure

    and easy to use. This is to ensure nurse details can be recorded correctly and the nurses can be assigned to the required hospital or home. Both the system administrator and the end

    user require a solution that allows them to carry on their day to day work effectively.

    Fast network speed is implemented through the combination of fast wired and wireless connections. End users will be able to retrieve data quickly from the servers, especially the

    database and file server when required. There will be no noticeable drop in network

    throughput if more clients are added in the future.

    The wireless aspect of the LAN allows the users more flexibility in where they are physically located in the office. The benefits of this setup are when more users are added to the

    network it reduces the time spent setting up the client pc. There is also no cabling needed in

    the meeting room as the presenter is still connected to the network wirelessly. Time is not wasted connecting to the network.

    Scalability of the system is required for the long term objectives of the business. The servers

    chosen allow future scalability by including options for upgrading individual parts and

    incorporating design features such as spare units in the rack and spare connections on the console switch. Network scalability has been addressed by ensuring there is spare capacity in

    each part of the system. Areas of spare capacity include:

    Router allowing up to 5 VPN connections, currently 2 will be utilised.

    Wireless connectivity allows client pcs to be easily added to the network. Switch allowing up to 16 Ethernet connections, currently 5 will be utilised.

    Security on the system is easily managed by implementing a centralised anti-virus, spyware,

    malware software solution. The system administrator will be able to monitor threats on the

    system from a single location rather than individually configuring each client pc and network device. Since information from the client pcs can be collected on the server it allows areas of security risks to be identified and managed appropriately. Symantec is a recognised security application provider with many years of experience who provide up to date virus definitions

    on the latest threats.

    Windows Server 2008 allows a server to be set up as a file server and makes allocation of

    data resources easy to create and maintain. By having Windows based operating systems on the server and client pcs it reduces the risk of problems occurring when writing data onto the file server.

    Another benefit of a whole Windows based system is functionality features to make

    administering the whole system easier. Two features include Previous Version enabling and

  • Documentation Standards Ver 1.0 - 22 - Alpha Omega IT

    automatic client updates. The previous version feature once set up allows the user to easily

    return a file to a previous saved state. There are no limitations on the type of file and the benefit of this feature is in reducing the need to retrieve data from backup sources.

    Updates on Windows systems are provided automatically by Microsoft and are designed for

    the particular operating system in use. It is possible for the system administrator to set up an

    update server to manage these automatic updates before deploying them to the client PCs. Operating system patches include the latest security and feature updates and bug fixes to

    ensure it is running at its highest level.

    When the time comes to replace the system administrator the benefits of having a Windows operating environment are twofold. First because there are many system administrators with

    experience in managing Windows environments available to hire and secondly because it

    would not take long for a new system administrator to understand how the system is designed and managed.

    It is a fairly simple process to create and manage Standard Operating Environments (SOEs) within a Windows environment. By implementing an SOE the system administrator will be

    able to troubleshoot user problems quicker or if need be reimage the pc easily to restore it back to the default state.

    The majority of third party software is designed to be integrated with Microsoft Windows and

    run on Intel processors. If the business decides to purchase third party software in the future there is the reassurance that it will run on the hardware components and the Windows

    operating environment.

    Nearly all office workers have had experience with Microsoft Office products which should

    equate to less time spent on training users on the software and peace of mind by using a familiar system. Although Microsoft Office 2007 has only been available for a year or two, the

    uptake of the newest version has been significant and many people have had the opportunity

    to use it.

    Included in SQL Server Express is a client front end that can be used out of the box or configured for the businesss needs. Also included is a complete, server-based platform for creating, managing, and delivering reports. Further options are available such as embedding reports in applications if required. With SQL Server Express it is easy for the end user to

    access nursing details and run reports.

    The System Administrator is recommended to user the GFS (Grandfather, Father, Son)

    strategy for system backups. This involves having daily differential backups, Monday through to Thursday, these are considered the son, and then a full weekly backup on Friday, this is considered the father. At the end of every month there is a full system backup, this is the grandfather.

    Backups can be scheduled to occur during the night when there are no staff working. In the morning the previous nights backup will be available to use if required. The daily backup

    tapes are recycled each week; the weekly backups are recycled after the full monthly backups. This can be seen in the table below:

  • Documentation Standards Ver 1.0 - 23 - Alpha Omega IT

    (Diff=Differential backup,Full-W=Weekly backup, Full-M=Monthly backup)

    Sun Mon Tue Wed Thu Fri Sat

    1 2 3 4 5 6 7

    None Diff Diff Diff Diff Full-W None

    Tape 1 Tape 2 Tape 3 Tape 4 Tape 5

    Sun Mon Tue Wed Thu Fri Sat

    8 9 10 11 12 13 14

    None Diff Diff Diff Diff Full-W None

    Tape 1 Tape 2 Tape 3 Tape 4 Tape 6

    Sun Mon Tue Wed Thu Fri Sat

    15 16 17 18 19 20 21

    None Diff Diff Diff Diff Full-W None

    Tape 1 Tape 2 Tape 3 Tape 4 Tape 7

    Sun Mon Tue Wed Thu Fri Sat

    22 23 24 25 26 27 28

    None Diff Diff Diff Diff Full-M None

    Tape 1 Tape 2 Tape 3 Tape 4 Tape 8

    Sun Mon Tue

    29 30 31

    None Diff Diff

    All tapes will be stored offsite with the monthly tapes being permanently stored. Correct

    storage procedures should be followed when storing tapes.

    The downside of having a Windows environment is generally it is targeted by hackers and people with malicious intent because of the areas of weakness within the operating system

    that can be exploited. Although steps are taken to reduce this risk, it still exists.

    Hosting email onsite can increase the maintenance required to manage spam and other

    unsolicited email.

    4.5.1 Final Overview

    Pros

    High network data transfer speeds

    Microsoft Windows based operating systems are easily integrated together

    Network hardware is easily integrated since it is the same manufacturer

    Users have knowledge of Windows based systems

    Third party software is designed to be run on Microsoft Windows

    Scalable infrastructure

    Cons

    More prevalent to unauthorised access attempts

    Locked into using Windows software, expensive to change operating systems

  • Documentation Standards Ver 1.0 - 24 - Alpha Omega IT

    4.6 SCHEDULE FEASIBILITY This section deal with a specified schedule analysis for project proposed solution. The purpose of the study is to help evaluate whether the IT solution is schedule viable.

    4.6.1 Project Time constraint

    The project deadline is set on 19th June, 2009 and the deadline is fixed and cannot be

    changed. The project has started on 11th February 2008 and it will be complete within 17 months. The project schedule is moderatly flexible.

    4.6.2 Task Duration Estimate Justification

    We adopt PERT (Project Evaluation and Review Technique) method to identify the minimum

    time needed to complete solution one.

    We basically take a weighted average of an optimistic, realistic and pessimistic for the activity

    duration. The estimate is in the form of (Optimistic +4 (Realistic) + Pessimistic) / 6.

    The Table below shows the task duration estimate for solution one.

    Task Estimated Task Time

    (Hour)

    Optimistic (Hour)

    Realistic (Hour)

    Pessimistic (Hour)

    PERT Weighted Average

    1.0 Project Start-up 40

    1.1 Set up Project Team 2 3 4 3.00

    1.2 Develop Project Charter

    1.2.1 Initial Client Interview 2 3 5 3.17

    1.2.2 Define project Scope and Purpose

    5 4 7 4.67

    1.2.3 Analyse Client Problem 4 7 10 7.00

    1.2.4 Define the Client Basic Requirements

    4 5 6 5.00

    1.2.4 Detail Stakeholders 3 4 5 4.00

    1.2.5 Define Deliverables 2 3 4 3.00

    1.2.6 Documentation and Sign Off 6 10 15 10.17

    2.0 Project Management 110

    2.1 Develop Project Management Plan

    2.1.1 Define Project organisation 2 3 4 3.00

    2.1.2 Define Managerial Process 3 5 7 5.00

    2.1.3 Define Technical Process 3 5 7 5.00

    2.1.4 Define Work package, Schedule and Budget

    3 6 7 5.67

    2.1.5 Define Human Resources 3 6 7 5.67

    2.1.6 Develop Quality Assurance 3 6 7 5.67

    2.1.7 Develop Project Gantt Chart 3 6 7 5.67

    2.1.8 Document and Approve Project Management Plan

    4 5 6 5.00

    2.2 Develop Feasibility Report

    2.2.1 Provide Three Solutions 12 16 25 16.83

    2.2.2 Technical Feasibility Study 4 6 7 5.83

    2.2.3 Operational Feasibility Study 4 6 7 5.83

    2.2.4 Economic Feasibility Study 5 7 8 6.83

    2.2.5 Legal Feasibility Study 4 5 6 5.00

  • Documentation Standards Ver 1.0 - 25 - Alpha Omega IT

    Task Estimated Task Time

    (Hour)

    Optimistic (Hour)

    Realistic (Hour)

    Pessimistic (Hour)

    PERT Weighted Average

    2.2.6 Schedule Feasibility Study 4 6 7 5.83

    2.2.7 Cost/Benefits Analysis 6 7 8 7.00

    2.2.8 General outline of approximate budget, timing and risks

    5 6 7 6.00

    2.2.9 Recommended solution for implementation

    4 5 6 5.00

    2.2.10 Documentation and Approve Feasibility Report

    4 5 7 5.17

    3.0 System Analysis 110

    3.1 Define Project Drivers 8 12 18 12.33

    3.2 Define Project Constraints 8 12 18 12.33

    3.3 Define Non-Functional Requirements

    25 30 37 30.33

    3.4 Define Functional Requirements 25 30 37 30.33

    3.5 Define Project Issues 10 15 18 14.67

    3.6 Ducument Approve Requirements Specification Report

    6 10 14 10.00

    4.0 System Design 125

    4.1Develop Design Report

    4.1.1 Infrastructure Design 10 15 22 15.33

    4.1.2 Hardware Design 10 15 25 15.83

    4.1.3 Soft ware Design 10 15 22 15.33

    4.1.4 Network Design 20 30 45 30.83

    4.2 High Level Design 0.00

    4.2.1 Web Site Design 10 15 20 15.00

    4.2.2 E-mail Design 8 12 16 12.00

    4.2.3 Database Design 8 10 16 10.67

    4.3 Document and Approve Design Report

    6 10 14 10.00

    5.0 System Development 60

    5.1 Develop System

    5.1.1 Build Prototype 8 10 20 11.33

    5.1.2 Prototype Testing 8 10 20 11.33

    5.2 Testing Plan

    5.2.1 Prototype Testing Plan 6 8 12 8.33

    5.2.2 Implementation Testing Plan

    6 8 12 8.33

    5.2.3 User Acceptance Testing Plan

    5 6 10 6.50

    5.2.4 Test Logs 6 7 8 7.00

    5.3 Document Approve Testing Plan 5 7 10 7.17

    6.0 System Implementation 140

    6.1 Develop Deployment Plans

    6.1.1 Implementation plan 5 7 10 7.17

    6.1.2 Disaster Recovery plan 5 7 10 7.17

    6.1.3 Maintenance plan 5 7 10 7.17

    6.1.4 Training Plan & User Documentation

    8 12 14 11.67

  • Documentation Standards Ver 1.0 - 26 - Alpha Omega IT

    Task Estimated Task Time

    (Hour)

    Optimistic (Hour)

    Realistic (Hour)

    Pessimistic (Hour)

    PERT Weighted Average

    6.1.5 Client Support Plan & Procedures

    5 7 10 7.17

    6.2 Approve Deployment Plans 1 1.5 2 1.50

    6.3 Implement System

    6.3.1 Deploy Hardware 14 18 25 18.50

    6.3.2 Deploy Network 10 12 18 12.67

    6.3.3 Deploy Software 15 25 30 24.17

    6.3.4 Implementation Testing 10 15 20 15.00

    6.4 User Training 10 20 30 20.00

    6.5 User Acceptance Testing 5 8 10 7.83

    7.0 Project Evaluation 10

    7.1 Post Implementation Review 3 6 8 5.83

    7.2 New User Requirements 2 3 5 3.17

    7.3 Approve Project Evaluation Complete

    0.5 1 1.5 1.00

    8.0 Project End 7

    8.1 Internal Presentaiton 1 2 2.5 1.92

    8.2 External Presentation 1 2 3 2.00

    8.3 Project Complete Sign-off 1 2 3 2.00

    8.4 Celebrate 1 1 1.5 1.08

    Total 602

    4.6.3 Schedule Analysis

    Schedule Dependency Schedule dependencies help us to perform project in the appropriate order. Incorrect

    dependencies will impact the schedule of whole project and will result in unnecessary

    constraints.

    We use waterfall methodology for the project development. According to this model, one major phase can not start until predecessor phase has finished. There is all Finish-to-Start

    dependency between two major phases.

    For the sub-phases, we adopt the tasks overlap or parallel technique to compress overall

    project duration.

    Resource Levelling Resource is the most important element which impacts the project schedule. The incorrect

    resource allocation will cause the project schedule to overrun.

    Resource include Human and Non-Human Resources. The Non-Human resource consists of

    software, hardware, network facilities, clients documents and external services.

  • Documentation Standards Ver 1.0 - 27 - Alpha Omega IT

    Project schedule outline

    The following table shows the summarized project schedule:

    Code Task Target Start Target End

    Human Resource Required

    (Hour)

    Non-HR Required

    1.0 Project Start-up 11-Feb -2008 10-Mar-2008 40 clients documents

    2.0 Project Management 10-Mar-2008 23-Jun-2008 110 clients documents

    3.0 System Analysis 21-Jul -2008 25-Aug-2008 110

    4.0 System Design 25-Aug -2008 31-Oct-2008 125

    5.0 System Development 31-Oct -2008 1-Dec -2008 60

    40% software 30% hardware 100% network

    50% external services

    6.0 System Implementation 09-Feb -2009 01-Jun -2009 140

    100% software 100% hardware 100% network

    100% external services

    7.0 Project Evaluation 01-Jun -2009 15-Jun -2009 10

    8.0 Project End 15-Jun -2009 22-Jun -2009 7

    4.6.4 Assumptions of Schedule Analysis

    The following assumptions are taken into account when analysing the project task schedule

    At least 80% Resources of each activity will be available.

    All stakeholders are often taking delight in contributing for the project.

    Management time is taken into account.

    The Schedule risk is at a minimum.

    The contingency is at the average level.

    The milestone of each stage of project will be periodically reassessed for completion date.

    4.6.5 Final Overview

    In conclusion, the total estimated duration will add up to 602 hours. Our estimation of the

    time frame would be from 50 to 54 weeks, the actual work hours would be from 560 to 980 hours. Therefore, this solution meets the schedule requirement of Eastcoast Contracting, the

    future business operations will be deployed in advance. From the schedule aspect, this solution would be recommended.

  • Documentation Standards Ver 1.0 - 28 - Alpha Omega IT

    5. SOLUTION 2

    5.1 SYSTEM OVERVIEW Solution 2 is based on a Unix/Linux operating environment both for the servers and for the client machines. All servers incorporate the latest version of Redhat Enterprise with the

    addition of Postfix and MySQL for the mail server and database server respectively. Client

    machines have the following software installed as a basis for the SOE:

    Operating System Fedora Core 8 Office Suite Open Office 2 Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve

    Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen due to these factors and their positive reputation. The servers are tower form and run AMD

    Athlon processors. These servers are a lower cost than the servers selected in the other solutions. Both laptops and desktops use Intel Core 2 Duo processors.

    This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 10/100Mbs Ethernet cabling

    while the client machines use wireless connections for flexibility in where they can be located.

    All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and

    black and white printers and ADSL 2+ internet connection for the office and Telstra Next G

    for offsite VPN connections. Domain name and website hosting is also the same across all solutions.

    5.1.1 Server Hardware

    HP ProLiant ML115 G5 Tower x 4 - Dual-core AMD Athlon 2.3GHz

    HP UPS (Uninterruptible Power Supply) R3000 VA 2U L6 20 HP Port Console Switch LCD monitor (for server)

    Keyboard (for server) Mouse (for server)

    HP StorageWorks LTO-2 Ultrium 448 SCSI External Tape Drive 400GB

    5.1.2 Workstations and Laptops

    Dell Vostro 200 Slim Tower x 6 - Core 2 Duo E6550 2.33GHz Dell XPS M1530 x 2 - Centrino Core 2 Duo T7250 2.0GHz

    5.1.3 Network Hardware

    Linksys Router x 1 WRV200 Linksys Switch x 1 SD216 Linksys PC Adapter x 6 WMP54G Linksys Notebook Adapter x 2 WPC54G Linksys Printer Server x 2 WPSM54G Cabling x 12m CAT5e Linksys AM300 ADSL 2+ Modem Telstra MF332 Laptop Next G card

  • Documentation Standards Ver 1.0 - 29 - Alpha Omega IT

    5.1.4 Printers

    HP LaserJet 3050 Multifunction

    HP LaserJet P2015 B&W Printer

    5.1.5 Software

    Red Hat Enterprise Linux Postfix Mail Server

    MySQL 5.1 x 1 Symantec Endpoint Small Business Edition

    Linux Fedora Core 8 Openoffice

    CA ARCserve Backup File Server Suite r12

    CA ARCserve Backup r11.5 for Linux Agent for MySQL CA ARCserve Backup r12 Client Agent for Windows/Linux

    Website Design

    5.1.6 Ongoing Maintenance

    Hardware replacement & extended warranties Telstra - .com.au domain and website hosting

    Business ADSL 2+ Broadband 10GB/month

    Mail and Web Protection Next G Broadband

    5.1.7 Personnel Costs

    Design and Installation $30 per hour x 770 hours

    User training session outlining key features of system

    5.2 TECHNICAL FEASIBILITY

    5.2.1 Network Structure

    Solution two contains the same network structure design as Solution one, but still has a few changes amongst them. Main factors include, one the Ethernet cabling used in this Solution is

    CAT5E which is capable of running at 100/1000 Mbps at 100 MHz which provides a good basis to start a small medium business on, but only operates at full speed if the remanding network related objects are compatible with it. They connect from the servers threw to the

    switch followed by the router.

  • Documentation Standards Ver 1.0 - 30 - Alpha Omega IT

    Network Layout:

    The Linksys Router WRV200 includes enhanced security features like access control, build in

    firewall, WEB/WPA protection which protects the wireless connection from being accessed by unauthorised users. the router can run at speeds Wired 1000 Mbps and wireless using the

    802.11G wireless protocol 54 Mbps which is the maximum rate and reduces the further you are from the router, although if they are looking at expanding they should either consider

    going wired which runs at a greater speed but defeats the purpose of their requirements or

    later on upgrade to a newer wireless protocol which supports a greater bandwidth. The Linksys Switch SD216 positioned between the servers and router supports LAN speeds of 100

    Mbps. This speed is sufficient as they are only running between 6 8 machines at a time but will run as a bottle neck if they obtain additional machines onto the network which will put

    more strain on the unit and not allow full server and network utilization.

    5.2.2 Remote Access

    Users of East Coast contracting will be able to connect remotely to the network using VPN (same concept in option 1). The users must connect using their Next G internet connection

    which is capable to connecting users anywhere within Australia which then gets authenticates via the network which are commanded by the policies placed on the Linksys WRV200 Router.

    5.2.3 Server Hardware

    The servers will be running same tasks as Solution one which runs the same design to help

    eliminates/reduces network activity to one centralised area as well as placing less stress upon the servers, which will then overall operate more reliably. The servers in this Solution contain

    different specification hardware and software which are as followed:

  • Documentation Standards Ver 1.0 - 31 - Alpha Omega IT

    The server for Solution two is the HP ProLiant ML115 G5 Tower which is the entry level server

    meaning basic server, will meet minimal requirements for businesses needs. They contain a Dual-core AMD Athlon 2.3GHz processor, 2 x 250 GB SATA hard drives with 512 MB of

    memory running at 800 MHz. Along with the UPS system and RAID 1 will also be enabled on the server ensures data loss and stability of the network is maintained.

    5.2.4 Server Operating System

    The Operating systems which are equipped onto these servers is Red Hat Enterprise Linux. It

    provides compatibility with the HP ProLiant ML115 G5 servers and software (Openoffice & Symantec AV) gives administrator flexibility and control over the system via the use of a

    domain controller. Thus allows Policy configuration, which will prevent any unauthorized

    attempts to execute, read or write restricted files. Another server will be designated as file server which contains all data, and backed up accordingly. Windows/Linux Base ARCserve

    Server Suite Backup agent is loaded onto this server.

    5.2.5 Mail Server

    Postfix Mail Server (Mail Server) which is open source and compatible with Linux Red hat. It contains functions such as SquirrelMail, a standards-based Web mail package written in PHP

    4; Spam Assassin, a powerful open source spam filter; and ClamAV, a GPLed virus scanner. To tie everything together it uses amavisd-new, a high-performance interface between MTAs

    and content checkers such as virus scanners and spam filters. The Server will be configured by network administrator so that users will have POP, secure POP, IMAP, and secure IMAP

    (IMAPS) access, users will have SquirrelMail associated to their systems to be able to access

    mail files. ARCserve Backup Email Suite r12 installed amongst it so it is in sync with the backup client.

    5.2.6 Database Server

    MySQL 5.1 (open source) will be installed onto one of the HP ProLiant ML115 G5 servers

    enabling them to create, maintain their central database. This application is memory hungry, the server offering 250GB of storage will be substantial. It is the most modern version

    released with a 15% increase in speed from previous versions. MySQL 5.1 is scalable and can be used for small large organisations. Benefit of this system includes various storage methods and large variety of maintenance, allowing it to be efficient and reliable.

    5.2.7 Backup Approach

    This Solution also contains the identical backup method used in Solution 1 & 3.

    5.2.8 Client Hardware

    The physical specifications of the desktops and laptops in this Solution are identical to Solution one with very slight variations which include different wireless adaptors to connect to

    network. The adaptors which are used in this Solution are for the PCs Linksys PC Adaptor WMP54G and for the laptops Linksys Laptop Adaptor WPC54G. The network cards enable a maximum of 54 Mbps along with a strong enough radio signal which can be picked up

    anywhere in the office, although the signal will drop depending on the amount of objects are between the router and the receiver, therefore they may not receive its full speeds of up to

    54 Mbps.

    5.2.9 Client Operating System

    The Operating system these units will contain is Linux Fedora Core, which is a form of open software which means the source is freely available for anyone to work on, or modify, or

    learn from or use in other projects. Fedora Core is the latest Version OS Linux has provided other benefits include being stable, secure due many to the fact it was designed from the

    ground up as a result all security aspects have been taken into consideration and ease to

  • Documentation Standards Ver 1.0 - 32 - Alpha Omega IT

    manage/user friendly hence giving a great freedom to configure your computer exactly as

    you wish. It has being build by thousands of certified professionals around the world who helped contribute in its

    5.2.10 Additional Applications

    A further application that will be placed onto these units will be Openoffice which is the

    leading open-source office software suite which can perform word processing, spreadsheets, presentation, graphics, databases etc. Benefits of this application are its open source; it

    comes in a variety of language packs, compatible with Windows and Linux operating systems and contains a widespread of international standards/formatting. Units are combined along

    with the Symantec Anti virus software which protects from viruses, malware and spy ware as

    which is in Solution one.

    5.2.11 Security

    Security within this option is split between network/client security. Network security is

    enabled via the router and user policies setup on the domain controlling server. The software

    allocated to deal with viruses/malware/spyware is primarily controlled with Symantec Antivirus which is installed onto each client (like option 1 and 3).

    5.2.12 Printing Facilities

    The printers in this Solution are identical from the ones provided via Solution one, including

    their print server which runs at 54 Mbps.

  • Documentation Standards Ver 1.0 - 33 - Alpha Omega IT

    5.3 ECONOMIC FEASIBILITY Outlined below are several tools used to help evaluate if the IT solution is economically viable. Also included is a table of costs associated with this solution. Included are hardware,

    software, maintenance and personnel implementation costs.

    5.3.1 Table of Costs

    Category Item Quantity Total

    Server Hardware

    Server 4 $2,760.00

    Server Rack 1 $1,380.00

    Uninterruptible Power Supply 1 $1,020.00

    Server Console Switch 1 $400.00

    LCD Monitor for server 1 $30.00

    Keyboard for server 1 $30.00

    Mouse for server 1 $30.00

    Tape Drive 1 $1,600.00

    Tape Drive Media Kit 1 $830.00

    User Hardware Workstation 6 $6,000.00

    Laptop 2 $3,200.00

    Network Hardware

    Router 1 $100.00

    Switch 1 $100.00

    ADSL 2+ Modem 1 $60.00

    Next G Laptop Modem 2 $0.00

    PC Adapter 6 $240.00

    Notebook Adapter 2 $80.00

    Printer Server 2 $190.00

    Cabling 12 $42.00

    Printers Multi-function Printer 1 $500.00

    Black and White Laser Printer 1 $600.00

  • Documentation Standards Ver 1.0 - 34 - Alpha Omega IT

    Table of costs cont

    Category Item Quantity Total

    Software

    Operating System for Servers 4 $3,980.00

    Email Server 1 $0.00

    Database Server 1 $0.00

    Anti-virus software 1 $2,500.00

    Operating System for workstation 8 $0.00

    Office software for workstation 8 $0.00

    Front end database 1 $500.00

    Backup Software 3 $2,160.00

    Website Design 1 $4,000.00

    Personnel

    Labour 800 $24,000.00

    User Training 1 $1,000.00

    Website

    Domain Name Hosting 60 $835.00

    Business Broadband ADSL 2+ 60 $5,400.00

    Mobile Broadband 120 $7,080.00

    Website Hosting 60 $2,461.00

    Maintenance 1 $22,490.00

    TOTAL $94,568.00

    5.3.2 Net Present Value (NPV)

    The project is assumed to have a lifespan of five years. It has been calculated that the Net Present Value (NPV) at the end of the project will be $43,802.12. A positive NPV means the

    project is still providing income to the business.

    5.3.3 Return On Investment (ROI)

    The Return On Investment (ROI) has been calculated at 49%. If the costs of the project were invested in stocks or other financial schemes then it wouldnt return anywhere near this figure. An ROI figure of above 20% is considered a sound investment.

  • Documentation Standards Ver 1.0 - 35 - Alpha Omega IT

    5.3.4 Payback Analysis

    A discount rate of 8% was used as this is the average interest rate at the current time. The discounted costs and benefits have been included in the table below. For more information

    regarding the discounted costs and benefits see the Costs/Benefits Analysis later in this document.

    Year 1 2 3 4 5

    Discounted Costs $59,576.40 $66,027.70 $73,155.10 $81,835.97 $89,873.82

    Discounted

    Cumulative Benefits $31,000.00 $59,703.70 $86,281.21 $110,890.01 $133,675.93

    As shown in the table, by the end of year 3 the benefits are higher than the cost of the system. Shown graphically the system has paid itself back around the first third of the year

    between years two and three. A payback period before the end of the third year is considered justifiable.

    5.3.5 Final Overview

    Each hardware and software component has been factored into the cost of the overall

    solution. By taking in