Requirements Specification(ALBURY)

Name- MANKARANBIR SINGH

Student ID-11556274

According to the project requirement all the sites Albury, Wagga Wagga and Griffith are assumed to be connected to each other in a mesh network which is secured with firewalls and intrusion prevention system installed to it.

Site Requirements: (ALBURY)

  • Physical server
  • Wireless sensor networks
  • Physical adapters
  • Virtual LANs
  • Virtual private network/tunnel
  • Virtual router
  • Virtual switches
  • Virtual load Balancer
  • Port groups
  • Virtual machines
  • Hypervisor
  • Antivirus software licenses
  • Firewall
  • SAN Storage
  • Backup disk
  • Tape
  • Dedicated machine running hyperv/esxi (Core i3/5/7 + 8GB);

User Requirements

For Albury site of Globex Corp. has three set of users. Each set of users have their own set of requirements.

1. Administrator

2. Staff

3. Clients

Administrator: Amongst the above three categories of users, administrators are the upper level users of this project. CEO, Functional Head, Directors and Branch Managers fall under this category.

NAME / ROLES
Al Jourgensen / CEO
Mike Bordin / Administrator
Mark Hallen / Administrator
John Bechdel / Administrator
Paul Raven / Administrator
Coco Vendeweghe / Project Manager

As per our project we assume that the upper level administration has the following requirements from the proposed network.

Securely communication with the administration of Wagga wagga and Griffith

Ability to form a highly automated agriculture system.

Real-time data can be accessed from the remote sites on the fly and that too by multiple users simultaneously

Ease of access to all the resources from all the sites for all the users.

Data transfer and sharing among the users/computers of all three sites.

Centralized and managed network connectivity.

Staff members: Staff members are the second level users of the proposed network or system. Staff members are responsible for the day to day activities related to the Albury. Their activities include providing parts and services to other two sites in Wagga Wagga and Griffith and also providing administrative assistant to both of them.

Name / Department
Mark Baker / Accountant
Max Brody / Accountant
Name / Department
Duane Buford / HR
John Monte / HR
Name / Department
Billy Gould / IT
Aaron Rossi / IT
Name / Department
Carla Suarez Navarro / Marketing
Casey Orr / Marketing
Chris Connelly / Marketing
Name / Department
FlaviaPennetta / Sales
Howie Beno / Sales
JelloBilch / Sales
Louis Svitek / Sales
LucieSafarova / Sales
Michael Belch / Sales
Name / Department
Nivek Ogre / Parts
Rey Washam / Parts
Paul Barker / Parts
Mike Scaccia / Parts
Name / Department
Tommy Victor / Services
Tony Campos / Services
Sin Quirin / Services
RoddyBottum / Services
Name / Department
ZlatkoHukic / Solution Consultant

As per our project we assume that the second level users have the following requirements from the proposed network.

Able to get the availability of agricultural tools and parts stock from database

Can share data with staff members across the other two sites as well.

Can fetch the required information from the database.

Can use the resources of other sites like Wagga Wagga and Griffith.

Can communicate with staff members across other two sites.

Able to access the query of administration of other .two sites.

Clients : Clients are the third level users of the proposed system.

As per our project we assume that the third level users have the following requirements from the proposed network. In this case clients are other two sites of globlex situated in Wagga Wagga and Griffith which requires parts and service for agricultural equipment and also administrative assistant.

Can send and receive Globex agricultural services and parts information.

Able to use web conferencing tool.

Potential to make exact evaluation of parts required.

Able to share information or data with Albury Site

Easily get assistant for the administration.

Application Requirement

The network will use two routing protocols the star topology protocol and the leach protocol. Using these protocols the WSNs communicate with the gateway and transmit the sensing information to the gateway and thus to the virtual machines. Whole network will be secured by Intrusion prevention System and Firewalls. Following applications will be used

Firewall: Firewall is a security system for networks to get prevention from unauthorized access. They are mostly used in a private network for the prevention from unauthorised users. All the information leaving or entering the network is examined with a special security measures.

Intrusion prevention system: It is also a security system for network which checks flow of network traffic to prevent and detect vulnerability exploits which comes from malicious inputs and target applications or services that is used by attacker to interrupt and then gain control of machine or application. By this attacker can totally interrupt the system and gain all the rights to access the compromised system. For prevention IPS works behind the firewalls and thoroughly checks for harmful contents and drops malicious packets.

All Traffic passes through IPS

j Legitimate + harmful traffic Legitimate traffic passes

INTRUSION PREVENTION SYSTEM

VLAN: It is a broadcast domain which is isolated and partitioned in a computer network at layer 2 of OSI model that is data link layer. Router or network switch is configured to subdivide a network. Partion of network also helps in managing the security of the system without making any major changes to the infrastructure.

Technical Goals

Scalability: In the future there will be increase in customers for Globex corporations so infrastructure will be designed according to it. There should be abillty of the network to expand according to the need. Extra switches, routers and cables will be fitted for future requirement. Network will created in the way that it can easily and efficiently manage the traffic. Using agile approach network will be able to manage the work load according to the need.

Availability:System infrastructure will be designed in a way that if all user are using the system still it will work smoothly and without any lag. That is ,it will be available to all at any time. In the new network architecture REAP principle(Redundancy, Entanglement, Awareness and Persistence) will be implemented by having multiple storage devices, power supplies, servers, networks so that if there is any failure in the component there is also backup. So system will work smoothly without disruption until the problem is recovered.

Network Performance:Network will be designed so that there is minimum chances of issues regarding performance. Functions will be used such as protocol acceleration, compression and packet shaping which will leads to less chances of performance breakdown. To decrease the network redundancy dedicated network cards will be used. . We will be using load balancing by moving virtual machines to different vSwitches or by adding more NICs to the host depending upon the network load so that the load is equally distributed.

Security:To make data and network more secure firewalls and intrusion prevention system is used. All the pcs that used in the network will be installed with latest softwares to remain protect from malicious codes or programs. Moreover VPN will be used for secure access to network of organisation. We will be having secured environment so that data or information of the users is not compromised.

Manageability:One of the key component of the network is Manageability. Fault management system will be used to alert if there is problem or failure in the system so that admin can easily detect and solve it. Design will also help admin in analyzing the traffic and according to it allowing bandwidth. Intrusion prevention system will make system secure and also more stable.

Usability:Latest hardware and software is used for increase in performance of user and reducing the downtime. Staff will be able to easily share resources, use network and transferring receiving files . By implementing this architecture all the users will be able to do their job efficiently and easily.

Adaptability:The network architecture is designed so that it is easily adaptable in the future. As the users in the future will increase the network will expand automatically and be able to serve each and every user. It supports latest protocols because latest hardware and software are used. Moreover, the network can adapt to changing patterns and Quality of Service (QoS) requirements.

Affordability:As this network is implemented using the best hardware and software, the products are purchased by examining and comparing the market value by different shops and vendors and purchased from the vendors which provides the best price and warranty.

The Existing Environment

The clients already have a working network but it lacks the few features that are mentioned above like availability, scalability, affordability etc.

Overview of the Existing Environment

The existing environment of Globex is not so secure. Network is not so good and has a lot of network vulnerabilities. Because the network data is not so secured so user data can be compromised. Whole is old so there is a lot of need to upgrade the whole network. With the increase of customer in present and future system is lacking in managing the traffic. So there are lots of malfunctions which will be solved in this upgrade.

Technical Details of the Existing Environment

The existing Globex network is pretty outdate, all the locations have got all the computers connected to the bus network in each location with the mainframe computer

In Albury there are 54 computer machines in total and one main frame system out of which 28 are in cubicle offices, there are 3 conference rooms with 2 machines in each that makes 6 and then 1 each in private offices that makes 15 and 6 in the common rooms as 1 in each as there are 6 common rooms and 6 printers in lobby.

The machines are of 4th generation basic configuration that is i3 processor chip with 4 gigabytes of memory and 500 gigabytes of storage for each machine.

Existing Applications

The interface used for the machines is windows 7 professional. The Microsoft Outlook is used for the communication purposes. Zoho Invoices for billing purposes, Microsoft office and project for the projects.

Existing Floor Layout for Albury

  • 15 Private office systems
  • 6 conference room systems
  • 6 common room systems
  • 28 Cubicle Systems
  • 6 Printers
  • Mainframe System

Existing Physical Layout for Albury

REFERENCES:

  • Tarquini, R. P.Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploitsRetrieved from
  • Internet security systems named worldwide leader in intrusion detection and prevention software revenue by leading analyst firm. (2004, Nov 02).PR NewswireRetrieved from
  • Aziz, A.Method and apparatus for key-management scheme for use with internet protocols at site firewallsRetrieved from