Documente Academic
Documente Profesional
Documente Cultură
Table of Contents
1. Document Details ................................................................................................. 5 1.1 1.2 1.3 1.4 1.5 Document History .................................................................................................... 5 Document Purpose ................................................................................................... 5 Document Audience ................................................................................................. 5 Document Task Breakdown ...................................................................................... 5 Quality Assurance .................................................................................................... 6
2. Problem Analysis .................................................................................................. 7 2.1 Background ............................................................................................................. 7 2.2 Core Problem ........................................................................................................... 7 2.3 Problem Analysis ...................................................................................................... 7 3. Proposed solution ................................................................................................. 9 3.1 3.2 3.3 3.4 Common Goals ........................................................................................................ 9 LAN & WLAN ........................................................................................................... 9 Server Design ........................................................................................................ 10 Client Design ......................................................................................................... 11
4. Solution 1 ........................................................................................................... 11 4.1 System Overview ................................................................................................... 11 4.1.1 Server Hardware .............................................................................................. 12 4.1.2 Workstations and Laptops ................................................................................ 12 4.1.3 Network Hardware ........................................................................................... 12 4.1.4 Printers ........................................................................................................... 12 4.1.5 Software ......................................................................................................... 12 4.1.6 Ongoing Maintenance ...................................................................................... 13 4.1.7 Personnel Costs ............................................................................................... 13 4.2 Technical Feasibility ............................................................................................... 13 4.2.1 Network Structure............................................................................................ 13 4.2.2 Internet and Remote access ............................................................................. 14 4.2.3 Server hardware .............................................................................................. 15 4.2.4 Server Operating System .................................................................................. 15 4.2.5 Domain Controller ............................................................................................ 15 4.2.6 Mail Server ...................................................................................................... 15 4.2.7 File Server ....................................................................................................... 16 4.2.8 Database Server .............................................................................................. 16 4.2.9 Backup Approach ............................................................................................. 16 4.2.10 Clients Hardware ........................................................................................... 16 4.2.11 Clients Operating System................................................................................ 17 4.2.12 Additional Applications ................................................................................... 17 4.2.13 Security ......................................................................................................... 17 4.2.14 Printing Facilities ............................................................................................ 17 4.3 Economic Feasibility ............................................................................................... 18 4.3.1 Table of Costs ................................................................................................. 18 4.3.2 Net Present Value (NPV) .................................................................................. 19 4.3.3 Return On Investment (ROI) ............................................................................ 19 4.3.4 Payback Analysis ............................................................................................. 20 4.3.5 Final Overview ................................................................................................. 20 4.4 Legal Feasibility ..................................................................................................... 20 4.5 Operational Feasibility ............................................................................................ 21 4.5.1 Final Overview ................................................................................................. 23 4.6 Schedule Feasibility ................................................................................................ 24 4.6.1 Project Time constraint .................................................................................... 24 4.6.2 Task Duration Estimate Justification .................................................................. 24
4.6.3 Schedule Analysis ............................................................................................ 26 4.6.4 Assumptions of Schedule Analysis ..................................................................... 27 4.6.5 Final Overview ................................................................................................. 27 5. Solution 2 ........................................................................................................... 28 5.1 System Overview ................................................................................................... 28 5.1.1 Server Hardware .............................................................................................. 28 5.1.2 Workstations and Laptops ................................................................................ 28 5.1.3 Network Hardware ........................................................................................... 28 5.1.4 Printers ........................................................................................................... 29 5.1.5 Software ......................................................................................................... 29 5.1.6 Ongoing Maintenance ...................................................................................... 29 5.1.7 Personnel Costs ............................................................................................... 29 5.2 Technical Feasibility ............................................................................................... 29 5.2.1 Network Structure............................................................................................ 29 5.2.2 Remote Access ................................................................................................ 30 5.2.3 Server Hardware .............................................................................................. 30 5.2.4 Server Operating System .................................................................................. 31 5.2.5 Mail Server ...................................................................................................... 31 5.2.6 Database Server .............................................................................................. 31 5.2.7 Backup Approach ............................................................................................. 31 5.2.8 Client Hardware ............................................................................................... 31 5.2.9 Client Operating System ................................................................................... 31 5.2.10 Additional Applications ................................................................................... 32 5.2.11 Security ......................................................................................................... 32 5.2.12 Printing Facilities ............................................................................................ 32 5.3 Economic Feasibility ............................................................................................... 33 5.3.1 Table of Costs ................................................................................................. 33 5.3.2 Net Present Value (NPV) .................................................................................. 34 5.3.3 Return On Investment (ROI) ............................................................................ 34 5.3.4 Payback Analysis ............................................................................................. 35 5.3.5 Final Overview ................................................................................................. 35 5.4 Legal Feasibility ..................................................................................................... 35 5.5 Operational Feasibility ............................................................................................ 36 5.5.1 Final Overview ................................................................................................. 38 5.6 Schedule Feasibility ................................................................................................ 38 5.6.1 Project Time constraint .................................................................................... 38 5.6.2 Task Duration Estimate Justification .................................................................. 38 5.6.3 Schedule Analysis ............................................................................................ 40 5.6.4 Assumptions of Schedule Analysis ..................................................................... 41 5.6.5 Final Overview ................................................................................................. 41 6. Solution 3 ........................................................................................................... 42 6.1 System Overview ................................................................................................... 42 6.1.1 Server Hardware .............................................................................................. 42 6.1.2 Workstations and Laptops ................................................................................ 42 6.1.3 Network Hardware ........................................................................................... 43 6.1.4 Printers ........................................................................................................... 43 6.1.5 Software ......................................................................................................... 43 6.1.6 Ongoing Maintenance ...................................................................................... 43 6.1.7 Personnel Cost................................................................................................. 43 6.2 Technical Feasibility ............................................................................................... 44 6.2.1 Network structure ............................................................................................ 44 6.2.2 Remote Access ................................................................................................ 44 6.2.3 Server Hardware .............................................................................................. 44 6.2.4 Server Software ............................................................................................... 45 6.2.5 Backup Approach ............................................................................................. 45 6.2.6 Client Hardware ............................................................................................... 45
6.2.7 Client Operating System & Additional Applications ............................................. 45 6.2.8 Printing Facilities .............................................................................................. 45 6.3 Economic Feasibility ............................................................................................... 46 6.3.1 Table of Costs ................................................................................................. 46 6.3.2 Net Present Value (NPV) .................................................................................. 47 6.3.3 Return On Investment (ROI) ............................................................................ 47 6.3.4 Payback Analysis ............................................................................................. 48 6.3.5 Final Overview ................................................................................................. 48 6.4 Legal Feasibility ..................................................................................................... 48 6.5 Operational Feasibility ............................................................................................ 49 6.5.1 Final Overview ................................................................................................. 51 6.6 Schedule Feasibility ................................................................................................ 51 6.6.1 Project Time constraint .................................................................................... 51 6.6.2 Task Duration Estimate Justification .................................................................. 51 6.6.3 Schedule Analysis ............................................................................................ 53 6.6.4 Assumptions of Schedule Analysis ..................................................................... 54 6.6.5 Final Overview ................................................................................................. 54 7. Cost/Benefits Analysis ....................................................................................... 55 7.1 7.2 7.3 7.4 7.5 7.6 Costs ..................................................................................................................... 55 Benefits ................................................................................................................. 55 Payback Analysis .................................................................................................... 56 Net Present Value (NPV) ......................................................................................... 58 Return On Investment (ROI) .................................................................................. 58 Final Overview ....................................................................................................... 58
8.General outline of approximate Budgets, Timing and Risks ............................... 58 8.1 Budgets ................................................................................................................. 58 8.1.1 Defining project costs ...................................................................................... 58 8.1.2 Budget Risk Assessment ................................................................................... 60 8.1.3 Project Estimated Budgets ................................................................................ 60 8.1.4 Final Overview ................................................................................................. 60 8.2 Timing................................................................................................................... 61 8.3 Risks ..................................................................................................................... 61 8.3.1 Risks Evaluation tool ........................................................................................ 61 8.3.2 Risk Identification ............................................................................................ 62 8.3.3 Final Overview ................................................................................................. 66 9. Recommended System Solution for implementation ......................................... 66 10. Bibliography ..................................................................................................... 68
1. DOCUMENT DETAILS
1.1 DOCUMENT HISTORY
Date 2nd June 2008 16th June 2008 20th June 2008 31st July 2008 Revised By Alpha Omega IT Christine Zhou Jeff Dagher Stuart Alexander Changes Made Initial Document Collated Document Standards applied Review Document Review Document. Tech Feas. Updated. Spelling and grammer Version 1.0 1.1 1.2 1.3
Name Christine Zhou Stuart Alexander Jeff Dagher Christine Zhou Christine Zhou Jeff Dagher Stuart Alexander Stuart Stuart Alexander Christine Zhou Stuart Alexander Christine Zhou Jeff Dagher Jeff Jeff Jeff Jeff Jeff Jeff Jeff Jeff Jeff
-5-
Section Server Console switch UPS Server rack ADSL modem Appendix B Software Costs Minimisation Table Windows server 2008 Exchange server 2007 & CAL Symantec Anti-virus XP Professional Edition Office Professional 2007 Fedora Core 8 OpenOffice SQL Server 2005 Express Red Hat Enterprise Postfix Mail Server MySQL Appendix C External Services Next G wireless broadband x 1 Business Broadband ADSL 2+ Next G Mobile Broadband Domain Name Hosting Website Hosting
Name Christine Zhou Christine Zhou Christine Zhou Stuart Alexander Jeff Dagher Jeff Dagher Jeff Dagher Jeff Dagher Jeff Dagher Jeff Dagher Jeff Dagher Stuart Alexander Stuart Alexander Christine Zhou Christine Zhou Christine Zhou Stuart Alexander Stuart Alexander Stuart Alexander Christine Zhou Christine Zhou
-6-
Alpha Omega IT
2. PROBLEM ANALYSIS
2.1 BACKGROUND
Eastcoast Contracting has decided to start a branch in Sydney. The company works in the field of nursing contracting which belongs to a highly competitive environment. Today, Information Technology (IT) is vital to most companies. Computers, computer-based systems and computer networks are necessary parts of an enterprise. The IT systems help business to conduct their core business and to increase profits.
-7-
Alpha Omega IT
Internet connection Internet connection is the precondition of E-mail using, Web surfing, Web presence and remote access. Eastcoast Contracting need an Internet connection with high speed and high quality. Remote access Remote access is a critical request for Eastcoast Contracting because the staff need to frequently use data when they are not in the office. Eastcoast Contracting heavy demands the technology of Remote access is secure and low cost. Issue of security Eastcoast Contracting work in a highly competitive filed. The data which include personal details and job details is confidential. This data could be used by competitors for inappropriate reasons such as unwanted mailouts or blackmailing. These potential problems might come from computer virus, unsafe web searching, unauthorized system access and low level network administration. Besides the above reasons, the weakness of wireless LAN compared to a wired LAN might result in serious security problem. Wireless radio signal is transmitted through the air and easier to intercept by hackers and snoopers. Eastcoast contracting requires apply appropriate strategies and technologies to avoid these security problems. IT staff training The whole IT system will be maintained by an IT staff of Eastcoast contracting. The person is not being appointed now. Sometimes, the project documentation might get a lot skimpier. This situation is anxious when the system Iis in operation. Eastcoast contracting need sufficient documentation to record this project so that the IT staff can use the documentation for further troubleshooting, system modifications and avoiding needless repetition of work. Minimising initial outlay cost Budget problems are one of the common problems of most projects. Eastcoast Contracting needs to keep the budget to the minimum and present it to higher management. However, many factors cause the budget problem- equipment, personnel, development and technology. Eastcoast Contracting is aware that estimates and guesswork are the frequent source of budget problems. Eastcoast contracting require a thorough investigation of the project cost and so avoid the potential budget problem.
-8-
Alpha Omega IT
3. PROPOSED SOLUTION
3.1 COMMON GOALS
All three solutions provided have common functionalities that fulfil the goals set out in the Project Charter and Project Management plan. The proposed solutions include the following functionalities: Scalable infrastructure by selecting hardware with spare capacity within each part of the network. File security by taking a multi-level approach to security such as centralised storage of data, software and hardware firewalls, anti-virus software, IP management and monitoring, security based policies and procedures. Communication and collaboration opportunities between employees, suppliers and customers through a relational database and web technologies such as a company webpage. A standard and integrated environment where data can be utilised by each software package. Hardware devices have been chosen to minimise the potential conflict that can occur. Minimise or eliminate areas of redundancy by employing an SOE on the desktops, multiple printers, and separate servers for each server function and technical documentation in case replacement is necessary for a piece of hardware. System reliability by selecting reputable brands, reducing the complexity of system operation and employing maintenance policies. In addition to common functionalities there are several design features that make up the system.
-9-
Alpha Omega IT
- 10 -
Alpha Omega IT
4. SOLUTION 1
4.1 SYSTEM OVERVIEW
Solution 1 is based on a Windows operating environment both for the servers and for the client machines. All servers incorporate the latest version of Microsofts server platform, ie. Windows Server 2008 with the addition of Exchange 2007 and SQL Express for the mail server and database server respectively. Client machines have the following software installed as a basis for the SOE: Operating System - Microsoft Windows XP Office Suite - Microsoft Office 2007 Standard Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen due to these factors and their positive reputation. The servers are rack mounted and run Intel Dual Core Xeon processors. Both laptops and desktops use Intel Core 2 Duo processors. This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 1 gigabit Ethernet cabling for maximum network speed while the client machines use wireless connections for flexibility in where they can be located. All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and black and white printers and ADSL 2+ internet connection for the office and Telstra Next G for offsite VPN connections. Domain name and website hosting is also the same across all solutions.
- 11 -
Alpha Omega IT
4.1.4 Printers
HP LaserJet 3050 Multifunction HP LaserJet P2015 B&W Printer
4.1.5 Software
Microsoft Windows Server 2008 OEM Microsoft Exchange 2007 Microsoft Exchange Server CAL Microsoft SQL Server 2005 Symantec Endpoint Small Business Edition Microsoft Windows XP Professional Edition OEM Microsoft Office 2007 Professional CA ARCserve Backup Email Suite r12 CA ARCserve Backup r12 Client Agent for Windows/Linux Website Design
- 12 -
Alpha Omega IT
- 13 -
Alpha Omega IT
Having a dedicated function for each server will result in easier diagnosis of problems and minimise disturbance to the business operations if one server is not functioning in its full capacity. There are two distinct parts to this network, wired and wireless. The servers, switch, router and modem are connected via cat 6 cable ensuring a 1000Mbs speed at 250MHz is maintained between each component. They will be located physically close to each other to minimise the cost of cabling. If circumstances change the cabling allows the signal to reach up to 100 metres without requiring a signal booster. The wireless part of the network consists of the clients and printers. All wireless traffic travels through the Wireless Access Point incorporated into the router. The 802.11N wireless protocol that has been chosen for this option operates at speeds of up to 300Mbs depending on location and frequency (2.4 5 GHz) that it is set at. The benefits of choosing this protocol over older versions which include: Greater speeds (up to 12x greater than 802.11G) The strength of the signal it transmits is significantly broader allowing receivers to be dispersed further away Protocol allows backward forward compatibility with the existing protocols. Incorporating a wireless client infrastructure into the network allows the easy addition of more clients in the future with only minor changes required on the domain controller and router. Ensuring a secure network is a primary focus in this option. The Linksys WRVS4400N Router is a critical part of the network as all traffic will pass through it. A key security feature of this component is the built in firewall which will be configured to only allow legitimate traffic through. Another main function this Router provides is VPN Access with authentication for users offsite. Wireless traffic is secured using WPA2 authentication and encryption and by specifying set MAC and IP addresses. Other security features implemented into the maintenance and culture of the business will be monitoring network traffic and educating end users. The printers will also be set with static IP addresses and WAP keys which are configured between the router and print server. The router will only allow specific traffic to the print servers and restrictions will be set up according to IP addresses.
- 14 -
Alpha Omega IT
- 15 -
Alpha Omega IT
- 16 -
Alpha Omega IT
4.2.13 Security
Symantec Antivirus combines industry-leading software, real-time malware protection with graphical reporting, centralized management and administration capabilities. This helps administer the network from viruses which tend to attack via email, external storage devices which are shared among PCs or contaminated websites. Symantec Antivirus will also update daily ensuring the latest virus definitions are installed to protect the system from the latest viruses/malware. The updates are automatically downloaded from Symantecs web page allowing real time protection.
- 17 -
Alpha Omega IT
- 18 -
Alpha Omega IT
Table of costs cont Category Item Operating System for Servers Email Server Email Client Access License Database Server Anti-virus software Operating System for workstation Office software for workstation Front end database Tape Backup software Software Website Design Labour Personnel User Training Domain Name Hosting Business Broadband ADSL 2+ Mobile Broadband Website Website Hosting Maintenance TOTAL Quantity 4 1 8 1 1 8 8 1 2 1 600 1 60 60 120 60 1 Total $4,800.00 $1,330.00 $800.00 $0.00 $2,500.00 $0.00 $4,000.00 $500.00 $1,870.00 $3,000.00 $18,000.00 $1,000.00 $835.00 $5,400.00 $7,080.00 $2,461.00 $22,490.00 $99,996.00
- 19 -
Alpha Omega IT
3 Project Year
As shown in the table, by the end of year 3 the benefits are higher than the cost of the system. Shown graphically the system has paid itself back around halfway between years two and three. A payback period before the end of the third year is considered justifiable.
- 20 -
Alpha Omega IT
Other software will be purchased through a supplier. All licenses will be recorded in a centralised location to ensure proper auditing procedures can be followed. Aside from ensuring all software is licensed appropriately, there are no legal implications on the use any of the software in this Solution. Microsoft software used in the prototype is licensed and fully covered under the MSDN Academic Alliance, except for Office 2007. Tafe NSW is part of the MSDN Academic Alliance. For software not covered under this licensing scheme, opensource software will be selected that is as close to the recommendation as possible. All opensource agreements will be adhered to. The wireless hardware selected confers to all laws regarding wireless transmission standards. Ensuring wireless security is covered elsewhere in this report.
- 21 -
Alpha Omega IT
automatic client updates. The previous version feature once set up allows the user to easily return a file to a previous saved state. There are no limitations on the type of file and the benefit of this feature is in reducing the need to retrieve data from backup sources. Updates on Windows systems are provided automatically by Microsoft and are designed for the particular operating system in use. It is possible for the system administrator to set up an update server to manage these automatic updates before deploying them to the client PCs. Operating system patches include the latest security and feature updates and bug fixes to ensure it is running at its highest level. When the time comes to replace the system administrator the benefits of having a Windows operating environment are twofold. First because there are many system administrators with experience in managing Windows environments available to hire and secondly because it would not take long for a new system administrator to understand how the system is designed and managed. It is a fairly simple process to create and manage Standard Operating Environments (SOEs) within a Windows environment. By implementing an SOE the system administrator will be able to troubleshoot user problems quicker or if need be reimage the pc easily to restore it back to the default state. The majority of third party software is designed to be integrated with Microsoft Windows and run on Intel processors. If the business decides to purchase third party software in the future there is the reassurance that it will run on the hardware components and the Windows operating environment. Nearly all office workers have had experience with Microsoft Office products which should equate to less time spent on training users on the software and peace of mind by using a familiar system. Although Microsoft Office 2007 has only been available for a year or two, the uptake of the newest version has been significant and many people have had the opportunity to use it. Included in SQL Server Express is a client front end that can be used out of the box or configured for the businesss needs. Also included is a complete, server-based platform for creating, managing, and delivering reports. Further options are available such as embedding reports in applications if required. With SQL Server Express it is easy for the end user to access nursing details and run reports. The System Administrator is recommended to user the GFS (Grandfather, Father, Son) strategy for system backups. This involves having daily differential backups, Monday through to Thursday, these are considered the son, and then a full weekly backup on Friday, this is considered the father. At the end of every month there is a full system backup, this is the grandfather. Backups can be scheduled to occur during the night when there are no staff working. In the morning the previous nights backup will be available to use if required. The daily backup tapes are recycled each week; the weekly backups are recycled after the full monthly backups. This can be seen in the table below:
- 22 -
Alpha Omega IT
(Diff=Differential backup,Full-W=Weekly backup, Full-M=Monthly backup) Sun 1 None Mon 2 Diff Tape 1 Tue 3 Diff Tape 2 Wed 4 Diff Tape 3 Thu 5 Diff Tape 4 Fri 6 Full-W Tape 5 Sat 7 None
Sun 8 None
Sat 14 None
Sun 15 None
Sat 21 None
Sun 22 None
Sat 28 None
Sun 29 None
Mon 30 Diff
Tue 31 Diff
All tapes will be stored offsite with the monthly tapes being permanently stored. Correct storage procedures should be followed when storing tapes. The downside of having a Windows environment is generally it is targeted by hackers and people with malicious intent because of the areas of weakness within the operating system that can be exploited. Although steps are taken to reduce this risk, it still exists. Hosting email onsite can increase the maintenance required to manage spam and other unsolicited email.
- 23 -
Alpha Omega IT
- 24 -
Alpha Omega IT
Task 2.2.6 Schedule Feasibility Study 2.2.7 Cost/Benefits Analysis 2.2.8 General outline of approximate budget, timing and risks 2.2.9 Recommended solution for implementation 2.2.10 Documentation and Approve Feasibility Report 3.0 System Analysis 3.1 Define Project Drivers 3.2 Define Project Constraints 3.3 Define Non-Functional Requirements 3.4 Define Functional Requirements 3.5 Define Project Issues 3.6 Ducument Approve Requirements Specification Report 4.0 System Design 4.1Develop Design Report 4.1.1 Infrastructure Design 4.1.2 Hardware Design 4.1.3 Soft ware Design 4.1.4 Network Design 4.2 High Level Design 4.2.1 Web Site Design 4.2.2 E-mail Design 4.2.3 Database Design 4.3 Document and Approve Design Report 5.0 System Development 5.1 Develop System 5.1.1 Build Prototype 5.1.2 Prototype Testing 5.2 Testing Plan 5.2.1 Prototype Testing Plan 5.2.2 Implementation Testing Plan 5.2.3 User Acceptance Testing Plan 5.2.4 Test Logs 5.3 Document Approve Testing Plan 6.0 System Implementation 6.1 Develop Deployment Plans 6.1.1 Implementation plan 6.1.2 Disaster Recovery plan 6.1.3 Maintenance plan 6.1.4 Training Plan & User Documentation
Optimistic (Hour) 4 6 5 4 4
Realistic (Hour) 6 7 6 5 5
Pessimistic (Hour) 7 8 7 6 7
110 8 8 25 25 10 6 125 10 10 10 20 10 8 8 6 60 8 8 6 6 5 6 5 140 5 5 5 8 7 7 7 12 10 10 10 14 7.17 7.17 7.17 11.67 10 10 8 8 6 7 7 20 20 12 12 10 8 10 11.33 11.33 8.33 8.33 6.50 7.00 7.17 15 15 15 30 15 12 10 10 22 25 22 45 20 16 16 14 15.33 15.83 15.33 30.83 0.00 15.00 12.00 10.67 10.00 12 12 30 30 15 10 18 18 37 37 18 14 12.33 12.33 30.33 30.33 14.67 10.00
- 25 -
Alpha Omega IT
Task 6.1.5 Client Support Plan & Procedures 6.2 Approve Deployment Plans 6.3 Implement System 6.3.1 Deploy Hardware 6.3.2 Deploy Network 6.3.3 Deploy Software 6.3.4 Implementation Testing 6.4 User Training 6.5 User Acceptance Testing 7.0 Project Evaluation 7.1 Post Implementation Review 7.2 New User Requirements 7.3 Approve Project Evaluation Complete 8.0 Project End 8.1 Internal Presentaiton 8.2 External Presentation 8.3 Project Complete Sign-off 8.4 Celebrate Total
Optimistic (Hour) 5 1 14 10 15 10 10 5
PERT Weighted Average 7.17 1.50 18.50 12.67 24.17 15.00 20.00 7.83 5.83 3.17 1.00
- 26 -
Alpha Omega IT
Project schedule outline The following table shows the summarized project schedule:
Code 1.0 2.0 3.0 4.0 5.0 Task Project Start-up Project Management System Analysis System Design System Development Target Start 11-Feb -2008 10-Mar-2008 21-Jul -2008 25-Aug -2008 31-Oct -2008 Target End 10-Mar-2008 23-Jun-2008 25-Aug-2008 31-Oct-2008 1-Dec -2008 Human Resource Required (Hour) 40 110 110 125 60 Non-HR Required clients documents clients documents 40% software 30% hardware 100% network 50% external services 100% software 100% hardware 100% network 100% external services
140 10 7
- 27 -
Alpha Omega IT
5. SOLUTION 2
5.1 SYSTEM OVERVIEW
Solution 2 is based on a Unix/Linux operating environment both for the servers and for the client machines. All servers incorporate the latest version of Redhat Enterprise with the addition of Postfix and MySQL for the mail server and database server respectively. Client machines have the following software installed as a basis for the SOE: Operating System Fedora Core 8 Office Suite Open Office 2 Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen due to these factors and their positive reputation. The servers are tower form and run AMD Athlon processors. These servers are a lower cost than the servers selected in the other solutions. Both laptops and desktops use Intel Core 2 Duo processors. This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 10/100Mbs Ethernet cabling while the client machines use wireless connections for flexibility in where they can be located. All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and black and white printers and ADSL 2+ internet connection for the office and Telstra Next G for offsite VPN connections. Domain name and website hosting is also the same across all solutions.
- 28 -
Alpha Omega IT
5.1.4 Printers
HP LaserJet 3050 Multifunction HP LaserJet P2015 B&W Printer
5.1.5 Software
Red Hat Enterprise Linux Postfix Mail Server MySQL 5.1 x 1 Symantec Endpoint Small Business Edition Linux Fedora Core 8 Openoffice CA ARCserve Backup File Server Suite r12 CA ARCserve Backup r11.5 for Linux Agent for MySQL CA ARCserve Backup r12 Client Agent for Windows/Linux Website Design
- 29 -
Alpha Omega IT
Network Layout:
The Linksys Router WRV200 includes enhanced security features like access control, build in firewall, WEB/WPA protection which protects the wireless connection from being accessed by unauthorised users. the router can run at speeds Wired 1000 Mbps and wireless using the 802.11G wireless protocol 54 Mbps which is the maximum rate and reduces the further you are from the router, although if they are looking at expanding they should either consider going wired which runs at a greater speed but defeats the purpose of their requirements or later on upgrade to a newer wireless protocol which supports a greater bandwidth. The Linksys Switch SD216 positioned between the servers and router supports LAN speeds of 100 Mbps. This speed is sufficient as they are only running between 6 8 machines at a time but will run as a bottle neck if they obtain additional machines onto the network which will put more strain on the unit and not allow full server and network utilization.
- 30 -
Alpha Omega IT
The server for Solution two is the HP ProLiant ML115 G5 Tower which is the entry level server meaning basic server, will meet minimal requirements for businesses needs. They contain a Dual-core AMD Athlon 2.3GHz processor, 2 x 250 GB SATA hard drives with 512 MB of memory running at 800 MHz. Along with the UPS system and RAID 1 will also be enabled on the server ensures data loss and stability of the network is maintained.
- 31 -
Alpha Omega IT
manage/user friendly hence giving a great freedom to configure your computer exactly as you wish. It has being build by thousands of certified professionals around the world who helped contribute in its
5.2.11 Security
Security within this option is split between network/client security. Network security is enabled via the router and user policies setup on the domain controlling server. The software allocated to deal with viruses/malware/spyware is primarily controlled with Symantec Antivirus which is installed onto each client (like option 1 and 3).
- 32 -
Alpha Omega IT
- 33 -
Alpha Omega IT
Table of costs cont Category Item Operating System for Servers Email Server Database Server Anti-virus software Operating System for workstation Office software for workstation Front end database Backup Software Software Website Design Labour Personnel User Training Domain Name Hosting Business Broadband ADSL 2+ Mobile Broadband Website Website Hosting Maintenance TOTAL Quantity 4 1 1 1 8 8 1 3 1 800 1 60 60 120 60 1 Total $3,980.00 $0.00 $0.00 $2,500.00 $0.00 $0.00 $500.00 $2,160.00 $4,000.00 $24,000.00 $1,000.00 $835.00 $5,400.00 $7,080.00 $2,461.00 $22,490.00 $94,568.00
- 34 -
Alpha Omega IT
3 Project Year
As shown in the table, by the end of year 3 the benefits are higher than the cost of the system. Shown graphically the system has paid itself back around the first third of the year between years two and three. A payback period before the end of the third year is considered justifiable.
Anti Virus software will be purchased through a supplier. All licenses will be recorded in a centralised location to ensure proper auditing procedures can be followed. Aside from ensuring all software is licensed appropriately, there are no legal implications on the use any of the software in this Solution. Any opensource software can be sourced from the internet for use in the prototype. For software requiring licensing opensource software will be selected that is as close to the recommendation as possible. All opensource agreements will be adhered to. The wireless hardware selected confers to all laws regarding wireless transmission standards. Ensuring wireless security is covered elsewhere in this report.
- 36 -
Alpha Omega IT
Each server open source product has been designed to integrate well with each other meaning allocation of data resources are easily maintained on a server running Red Hat Enterprise Linux. Fedora Core has been designed to operate with Red Hat and other Linux distributions resulting in less errors occurring on the users workstation. Overall from a system administrators point of view having all open source software will be easier to maintain. Updates on Linux systems require the system administrator to install the updates manually. This is an additional task that they will need to perform. Another high maintenance task is ensuring security for the email server is closely monitored as hosting email onsite requires a more in-depth anti-virus, malware and spyware solution. There are not as many system administrators with Red Hat Linux server and Fedora Core knowledge than there are Windows knowledge. It may prove difficult to find a system administrator with the appropriate skills. It is a fairly simple process to create and manage Standard Operating Environments (SOEs) within a Linux environment. By implementing an SOE the system administrator will be able to troubleshoot user problems quicker or if need be reimage the pc easily to restore it back to the default state. Various third party software is not designed to be integrated with Linux platforms. This could pose a problem for users if they require a new piece of software to be installed on their machines or if they are transferring data between a home Windows environment and the work Linux environment. The business may need to be more selective in third party software selection to ensure it is compatible with their operating environment. Not many office workers have had experience with Linux systems which would mean in addition to more training being required some functionalities they expect may not be available. There may be more user frustration until they are aware of how it is different to a Windows environment. Openoffice has many of the capabilities of its Windows equivalent yet there are functions that arent included such as a desktop publishing suite. Additional software will need to be sourced for these features. MySQL includes a basic client front end that can be used as is or further configured for the businesss needs. Also included is a complete, server -based platform for creating, managing, and delivering reports. Further options are available such as embedding reports in applications if required. With MySQL it is easy for the end user to access nursing details and run reports. The System Administrator is recommended to user the GFS (Grandfather, Father, Son) strategy for system backups. This involves having daily differential backups, Monday through to Thursday, these are considered the son, and then a full weekly backup on Friday, this is considered the father. At the end of every month there is a full system backup, this is the grandfather. Backups can be scheduled to occur during the night when there are no staff working. In the morning the previous nights backup will be available to use if required. The daily backup tapes are recycled each week; the weekly backups are recycled after the full monthly backups. This can be seen in the table shown in solution 1. All tapes will be stored offsite with the monthly tapes being permanently stored. Correct storage procedures should be followed when storing tapes.
- 37 -
Alpha Omega IT
Linux distributions are seen as being more secure than a windows environment and provided the proper security measures are taken there is less chance of the servers being accessed unlawfully.
Task 1.0 Project Start-up 1.1 Set up Project Team 1.2 Develop Project Charter 1.2.1 Initial Client Interview 1.2.2 Define project Scope and Purpose 1.2.3 Analyse Client Problem 1.2.4 Define the Client Basic Requirements 1.2.4 Detail Stakeholders 1.2.5 Define Deliverables 1.2.6 Documentation and Sign Off
- 38 -
Alpha Omega IT
Task 2.0 Project Management 2.1 Develop Project Management Plan 2.1.1 Define Project organisation 2.1.2 Define Managerial Process 2.1.3 Define Technical Process 2.1.4 Define Work package, Schedule and Budget 2.1.5 Define Human Resources 2.1.6 Develop Quality Assurance 2.1.7 Develop Project Gantt Chart 2.1.8 Document and Approve Project Management Plan 2.2 Develop Feasibility Report 2.2.1 Provide Three Solutions 2.2.2 Technical Feasibility Study 2.2.3 Operational Feasibility Study 2.2.4 Economic Feasibility Study 2.2.5 Legal Feasibility Study 2.2.6 Schedule Feasibility Study 2.2.7 Cost/Benefits Analysis 2.2.8 General outline of approximate budget, timing and risks 2.2.9 Recommended solution for implementation 2.2.10 Documentation and Approve Feasibility Report 3.0 System Analysis 3.1 Define Project Drivers 3.2 Define Project Constraints 3.3 Define Non-Functional Requirements 3.4 Define Functional Requirements 3.5 Define Project Issues 3.6 Ducument Approve Requirements Specification Report 4.0 System Design 4.1Develop Design Report 4.1.1 Infrastructure Design 4.1.2 Hardware Design 4.1.3 Soft ware Design 4.1.4 Network Design 4.2 High Level Design 4.2.1 Web Site Design 4.2.2 E-mail Design 4.2.3 Database Design 4.3 Document and Approve Design Report 5.0 System Development 5.1 Develop System
Optimistic (Hour)
Realistic (Hour)
Pessimistic (Hour)
2 3 3 3 3 3 3 4
3 5 5 6 6 6 6 5
4 7 7 7 7 7 7 6
16 6 6 7 5 6 7 6 5 5
25 7 7 8 6 7 8 7 6 7
16.83 5.83 5.83 6.83 5.00 5.83 7.00 6.00 5.00 5.17
22 15 35 35 20 10
30 30 45 45 26 14
50 15 40 40 15 12 15 10
70 25 70 60 20 16 23 14
- 39 -
Alpha Omega IT
Task 5.1.1 Build Prototype 5.1.2 Prototype Testing 5.2 Testing Plan 5.2.1 Prototype Testing Plan 5.2.2 Implementation Testing Plan 5.2.3 User Acceptance Testing Plan 5.2.4 Test Logs 5.3 Document Approve Testing Plan 6.0 System Implementation 6.1 Develop Deployment Plans 6.1.1 Implementation plan 6.1.2 Disaster Recovery plan 6.1.3 Maintenance plan 6.1.4 Training Plan & User Documentation 6.1.5 Client Support Plan & Procedures 6.2 Approve Deployment Plans 6.3 Implement System 6.3.1 Deploy Hardware 6.3.2 Deploy Network 6.3.3 Deploy Software 6.3.4 Implementation Testing 6.4 User Training 6.5 User Acceptance Testing 7.0 Project Evaluation 7.1 Post Implementation Review 7.2 New User Requirements 7.3 Approve Project Evaluation Complete 8.0 Project End 8.1 Internal Presentaiton 8.2 External Presentation 8.3 Project Complete Sign-off 8.4 Celebrate Total
Optimistic (Hour) 15 10 10 12 10 6 5
Realistic (Hour) 24 15 12 16 15 7 8
Pessimistic (Hour) 36 30 16 24 20 8 10
PERT Weighted Average 24.50 16.67 12.33 16.67 15.00 7.00 7.83
200 10 10 10 18 5 1 14 10 15 10 30 5 10 3 2 0.5 7 1 1 1 1 807 2 2 2 1 2.5 3 3 1.5 1.92 2.00 2.00 1.08 6 3 1 8 5 1.5 5.83 3.17 1.00 12 12 12 20 7 1.5 18 12 25 15 55 8 16 16 16 30 9 2 25 18 30 20 80 10 12.33 12.33 12.33 21.33 7.00 1.50 18.50 12.67 24.17 15.00 55.00 7.83
- 40 -
Alpha Omega IT
For the sub-phases, we adopt the tasks overlap or parallel technique to compress overall project duration. Resource Levelling Resource is the most important element which impacts the project schedule. The incorrect resource allocation will cause the project schedule to overrun. Resources include Human and Non-Human Resources. The Non-Human resource consists of software, hardware, network facilities, clients documents and external services. Project schedule outline The following table shows the summarized project schedule:
Code 1.0 2.0 3.0 4.0 5.0 Task Project Start-up Project Management System Analysis System Design System Development Target Start 11-Feb -2008 10-Mar-2008 21-Jul -2008 25-Aug -2008 31-Oct -2008 Target End 10-Mar-2008 23-Jun-2008 25-Aug-2008 31-Oct-2008 1-Dec -2008 Human Resource Required (Hour) 40 110 140 200 100 Non-HR Required clients documents clients documents 40% software 30% hardware 100% network 50% external services 100% software 100% hardware 100% network 100% external services
200 10 7
- 41 -
Alpha Omega IT
6. SOLUTION 3
6.1 SYSTEM OVERVIEW
Solution 3 is based on a Unix/Linux operating environment for the servers and a Windows operating environment for the client machines. This solution incorporates the stability of Linux servers and user-friendliness of Windows clients. All servers incorporate the latest version of Redhat Enterprise with the addition of Postfix and MySQL for the mail server and database server respectively. Client machines have the following software installed as a basis for the SOE: Operating System - Microsoft Windows XP Office Suite - Microsoft Office 2007 Standard Anti-virus - Symantec Endpoint Backup Client - Computer Associates ARCserve Hardware selection balances cost, power and scalability. HP, Dell and Linksys were chosen due to these factors and their positive reputation. The servers are rack mounted and run Intel Dual Core Xeon processors. Laptops in this solution use Intel Core 2 Duo processors while the desktops use Intel Quad Core which are higher specifications than in the other two options. This network incorporates both wired and wireless connections. Network hardware such as the router, switch and broadband modem are connected using 1 gigabit Ethernet cabling for maximum network speed while the client machines use wireless connections for flexibility in where they can be located. All solutions incorporate the same hardware for the printing, faxing and copying functions and the same contracts for internet and VPN connectivity. These include HP multifunction and black and white printers and ADSL 2+ internet connection for the office and Telstra Next G for offsite VPN connections. Domain name and website hosting is also the same across all solutions.
- 42 -
Alpha Omega IT
6.1.4 Printers
HP LaserJet 3050 Multifunction HP LaserJet P2015 B&W Printer
6.1.5 Software
Red Hat Enterprise Linux x 2 (Domain Controller, File Server) Postfix Mail Server x 1 (Mail Server) MySQL 5.1 x 1 (Database Server) Symantec Antivirus Corporate Edition (Server + 25 Users) Microsoft Windows XP Professional Edition OEM x 8 (Desktops & Laptops) Microsoft Office 2007 Professional x 8 (Desktops & Laptops) CA ARCserve Backup File Server Suite r12 CA ARCserve Backup r11.5 for Linux Agent for MySQL CA ARCserve Backup r12 Client Agent for Windows/Linux Website Hosting
- 43 -
Alpha Omega IT
- 44 -
Alpha Omega IT
- 45 -
Alpha Omega IT
$270.00 $290.00 $60.00 $0.00 $600.00 $200.00 $190.00 $90.00 $500.00 $600.00
- 46 -
Alpha Omega IT
Table of costs cont Category Item Operating System for Servers Email Server Database Server Anti-virus software Operating System for workstation Office software for workstation Front end database Backup Software Software Website Design Labour Personnel User Training Domain Name Hosting Business Broadband ADSL 2+ Mobile Broadband Website Website Hosting Maintenance TOTAL Quantity 4 1 1 1 8 8 1 3 1 800 1 60 60 120 60 1 Total $3,980.00 $0.00 $0.00 $2,500.00 $0.00 $4,000.00 $500.00 $2,160.00 $3,000.00 $24,000.00 $1,000.00 $835.00 $5,400.00 $7,080.00 $2,461.00 $22,490.00 $105,736.00
- 47 -
Alpha Omega IT
3 Project Year
As shown in the table, by the end of year 3 the benefits are higher than the cost of the system. Shown graphically the system has paid itself back around the third of the year between years two and three. A payback period before the end of the third year is considered justifiable.
Anti Virus software and Microsoft Office 2007 will be purchased through a supplier. All licenses will be recorded in a centralised location to ensure proper auditing procedures can be followed. Aside from ensuring all software is licensed appropriately, there are no legal implications on the use any of the software in this Solution. All opensource software can be sourced from the internet for use in the prototype. For software requiring licensing such as Red Hat Enterprise and Office 2007, opensource software will be selected that is as close to the recommendation as possible. All opensource agreements will be adhered to. The wireless hardware selected confers to all laws regarding wireless transmission standards. Ensuring wireless security is covered elsewhere in this report.
- 49 -
Alpha Omega IT
Enterprise Linux. Having Windows XP on the desktops may increase the difficulty of managing the whole operating environment due to possible compatibility issues and some features wont be available such as Previous Version file retrieval as outlined in Solution 1. Updates on Linux systems require the system administrator to install the updates manually. This is an additional task that they will need to perform. Another high maintenance task is ensuring security for the email server is closely monitored as hosting email onsite requires a more in-depth anti-virus, malware and spyware solution. There are not as many system administrators available to hire with Red Hat Linux server and Windows desktop knowledge than there are either open source or purely Windows knowledge. It may prove difficult to find a system administrator with the appropriate skills. Creating and managing Standard Operating Environments (SOEs) within the Linux/Windows environment may prove challenging and decrease operational efficiency. There should not be many problems with third party software since most server applications are designed to run on either open source or Windows servers and most desktop software is designed to run on Windows platforms. If the business decides to purchase third party software in the future there is the reassurance that it will run on the hardware components and the server or workstation operating environment. Nearly all office workers have had experience with Microsoft Office products which should equate to less time spent on training users on the software and peace of mind by using a familiar system. Although Microsoft Office 2007 has only been available for a year or two, the uptake of the newest version has been significant and many people have had the opportunity to use it. There are features of Vista that are common to all Windows products which users will also be familiar with. MySQL includes a basic client front end that can be used as is or further configured for the businesss needs. Also included is a complete, server -based platform for creating, managing, and delivering reports. Further Solutions are available such as embedding reports in applications if required. With MySQL it is easy for the end user to access nursing details and run reports. The System Administrator is recommended to user the GFS (Grandfather, Father, Son) strategy for system backups. This involves having daily differential backups, Monday through to Thursday, these are considered the son, and then a full weekly backup on Friday, this is considered the father. At the end of every month there is a full system backup, this is the grandfather. Backups can be scheduled to occur during the night when there are no staff working. In the morning the previous nights backup will be available to use if required. The daily backup tapes are recycled each week; the weekly backups are recycled after the full monthly backups. This can be seen in the table shown in solution 1. All tapes will be stored offsite with the monthly tapes being permanently stored. Correct storage procedures should be followed when storing tapes.
- 50 -
Alpha Omega IT
Task 1.0 Project Start-up 1.1 Set up Project Team 1.2 Develop Project Charter 1.2.1 Initial Client Interview 1.2.2 Define project Scope and Purpose 1.2.3 Analyse Client Problem 1.2.4 Define the Client Basic Requirements 1.2.4 Detail Stakeholders 1.2.5 Define Deliverables 1.2.6 Documentation and Sign Off 2.0 Project Management 2.1 Develop Project Management Plan
- 51 -
Alpha Omega IT
Task 2.1.1 Define Project organisation 2.1.2 Define Managerial Process 2.1.3 Define Technical Process 2.1.4 Define Work package, Schedule and Budget 2.1.5 Define Human Resources 2.1.6 Develop Quality Assurance 2.1.7 Develop Project Gantt Chart 2.1.8 Document and Approve Project Management Plan 2.2 Develop Feasibility Report 2.2.1 Provide Three Solutions 2.2.2 Technical Feasibility Study 2.2.3 Operational Feasibility Study 2.2.4 Economic Feasibility Study 2.2.5 Legal Feasibility Study 2.2.6 Schedule Feasibility Study 2.2.7 Cost/Benefits Analysis 2.2.8 General outline of approximate budget, timing and risks 2.2.9 Recommended solution for implementation 2.2.10 Documentation and Approve Feasibility Report 3.0 System Analysis 3.1 Define Project Drivers 3.2 Define Project Constraints 3.3 Define Non-Functional Requirements 3.4 Define Functional Requirements 3.5 Define Project Issues 3.6 Ducument Approve Requirements Specification Report 4.0 System Design 4.1Develop Design Report 4.1.1 Infrastructure Design 4.1.2 Hardware Design 4.1.3 Soft ware Design 4.1.4 Network Design 4.2 High Level Design 4.2.1 Web Site Design 4.2.2 E-mail Design 4.2.3 Database Design 4.3 Document and Approve Design Report 5.0 System Development 5.1 Develop System 5.1.1 Build Prototype 5.1.2 Prototype Testing
Optimistic (Hour) 2 3 3 3 3 3 3 4
Realistic (Hour) 3 5 5 6 6 6 6 5
Pessimistic (Hour) 4 7 7 7 7 7 7 6
PERT Weighted Average 3.00 5.00 5.00 5.67 5.67 5.67 5.67 5.00
16 6 6 7 5 6 7 6 5 5
25 7 7 8 6 7 8 7 6 7
16.83 5.83 5.83 6.83 5.00 5.83 7.00 6.00 5.00 5.17
22 15 35 35 20 10
30 30 45 45 26 14
50 15 40 40 15 12 15 10
70 25 70 60 20 16 23 14
24 15
36 30
24.50 16.67
- 52 -
Alpha Omega IT
Task 5.2 Testing Plan 5.2.1 Prototype Testing Plan 5.2.2 Implementation Testing Plan 5.2.3 User Acceptance Testing Plan 5.2.4 Test Logs 5.3 Document Approve Testing Plan 6.0 System Implementation 6.1 Develop Deployment Plans 6.1.1 Implementation plan 6.1.2 Disaster Recovery plan 6.1.3 Maintenance plan 6.1.4 Training Plan & User Documentation 6.1.5 Client Support Plan & Procedures 6.2 Approve Deployment Plans 6.3 Implement System 6.3.1 Deploy Hardware 6.3.2 Deploy Network 6.3.3 Deploy Software 6.3.4 Implementation Testing 6.4 User Training 6.5 User Acceptance Testing 7.0 Project Evaluation 7.1 Post Implementation Review 7.2 New User Requirements 7.3 Approve Project Evaluation Complete 8.0 Project End 8.1 Internal Presentaiton 8.2 External Presentation 8.3 Project Complete Sign-off 8.4 Celebrate Total
Optimistic (Hour)
Realistic (Hour)
Pessimistic (Hour)
12 16 15 7 8
16 24 20 8 10
12 12 12 20 7 1.5 18 12 25 15 20 8 6 3 1 2 2 2 1
12.33 12.33 12.33 21.33 7.00 1.50 18.50 12.67 23.33 15.00 20.83 7.83 5.83 3.17 1.00 1.92 2.00 2.00 1.08
- 53 -
Alpha Omega IT
Resource Levelling Resource is the most important element which impacts the project schedule. The incorrect resource allocation will cause the project schedule to overrun. Resources include Human and Non-Human Resources. The Non-Human resource consists of software, hardware, network facilities, clients documents and external services. Project schedule outline The following table shows the summarized project schedule:
Code 1.0 2.0 3.0 4.0 5.0 Task Project Start-up Project Management System Analysis System Design System Development Target Start 11-Feb -2008 10-Mar-2008 21-Jul -2008 25-Aug -2008 31-Oct -2008 Target End 10-Mar-2008 23-Jun-2008 25-Aug-2008 31-Oct-2008 1-Dec -2008 Human Resource Required (Hour) 40 110 140 200 100 Non-HR Required clients documents clients documents 40% software 30% hardware 100% network 50% external services 100% software 100% hardware 100% network 100% external services
165 10 7
- 54 -
Alpha Omega IT
7. COST/BENEFITS ANALYSIS
The financial costs of all Solutions are split into three broad categories, start up costs, personnel costs and ongoing costs. These are summed up in the table below:
7.1 COSTS
Type of Cost Start Up Costs incurred only once: Equipment including hardware, software and networking components. Personnel Includes labour costs and training Ongoing Recurrent costs which are incurred over the life of the project: Maintenance, domain name hosting, internet connections, website hosting Total costs over 5 years (apx) Solution 1 Solution 2 Solution 3
$42,730.00
$31,302.00
$42,470.00
$19,000.00
$25,000.00
$25,000.00
$38,266.00
$38,266.00
$38,266.00
$99,996.00
$94,568.00
$105,736.00
The cost of not implementing a computerised system, especially the database containing nurse details is unimaginable. It is not feasible to have a paper based system as productivity levels of staff would be extremely low and communication between clients and colleagues is virtually nil. The financial benefits of all these solutions have been estimated at $31,000.00 per year based on current projections from the Melbourne office. It is very likely that revenue will be higher than this amount due to greater potential client base. As well as the direct financial benefits the intangible benefits of all systems include staff satisfaction with a fast capable system allowing sharing of information and better business reputation due to efficient customer service being delivered by a competent IT system.
7.2 BENEFITS
Type of Benefit Current revenue generated by the business Total Benefits over 5 years (apx) Solution 1 $31,000.00 / yr $155,000.00 Solution 2 $31,000.00 / yr $155,000.00 Solution 3 $31,000.00 / yr $155,000.00
- 55 -
Alpha Omega IT
Solution 2
Discount rate Year Costs Discount factor Discounted costs Benefits Discount factor Discounted benefits 8% 1 $59,576.40 1.00 $59,576.40 $31,000.00 1.00 $31,000.00 2 $6,967.40 0.93 $6,451.30 $31,000.00 0.93 $28,703.70 3 $8,313.40 0.86 $7,127.40 $31,000.00 0.86 $26,577.50 4 $10,935.40 0.79 $8,680.87 $31,000.00 0.79 $24,608.80 5 $10,935.40 0.74 $8,037.85 $31,000.00 0.74 $22,785.93 $133,675.93 $89,873.82 $155,000.00 Total $96,728.00
Solution 3
Discount rate Year Costs Discount factor Discounted costs Benefits Discount factor Discounted benefits 8% 1 $70,744.40 1.00 $70,744.40 $31,000.00 1.00 $31,000.00 2 $6,967.40 0.93 $6,451.30 $31,000.00 0.93 $28,703.70 3 $8,313.40 0.86 $7,127.40 $31,000.00 0.86 $26,577.50 4 $10,935.40 0.79 $8,680.87 $31,000.00 0.79 $24,608.80 5 $10,935.40 0.74 $8,037.85 $31,000.00 0.74 $22,785.93 $133,675.93 $101,041.82 $155,000.00 Total $107,896.00
This information has been combined into a single table and graphed below.
Documentation Standards Ver 1.0 - 56 Alpha Omega IT
3 Year
All solutions have a payback period between 2 and 3 years and can be clearly seen above.
- 57 -
Alpha Omega IT
- 58 -
Alpha Omega IT
The following table lists the all expected expenditure for the project implementation. All costs are necessary to complete the project objective. Estimated Costs Categories Personnel User Training Hardware Software Network Hardware Internet related Website hosting Total Estimated Costs Solution 1
$18,000.00 $1,000.00 $22,230.00 $18,800.00 $1,700.00 $2,731.00 $543.40 $65,004.00
Solution 2
$24,000.00 $2,000.00 $18,350.00 $12,140.00 $812.00 $2,731.00 $543.40 $60,576.40
Solution 3
$24,000.00 $2,000.00 $24,630.00 $16,140.00 $1,700.00 $2,731.00 $543.40 $71,744.40
Comments: 1. Personnel: This is the direct cost for professional staff and consultants who are working on the project. The average personnel hourly cost is $30/hour. Estimated working hours are: Solution one: 600 Hours Solution two: 800 Hours Solution three: 800 Hours The personnel involve in project plan, system analysis, system design and system implementation. Exclude the business website design and individual program development. User training: Items which should be budgeted under this category include: End-user training and network administrator training. Hardware Items which should be budgeted under this category include: Servers, Workstations (with Operating System), Laptops (with Operating System), Printers, Backup Device, Server Rack, UPS (Uninterruptible Power System) and KVM (Keyboard, Video, Mouse) Control Switch. Software Items which should be budgeted under this category include: Operating System for Servers, application software, website development and individual program development. Network devices Items which should be budgeted under his category include all networks relevant equipments. Internet related Items which should be budgeted under his category include: First two years Domain Name registration fee, First year four static IP costs, First year Broadband costs, First year Mobile Broadband costs. Estimated Costs The estimated cost is an educated assessment based on business requirements and average marketing price.
2. 3.
4.
5. 6.
7.
- 59 -
Alpha Omega IT
The estimated maintenance costs of this system are list below Budget Categories Hardware maintenance Software upgrade Business Broadband Next G Mobile Broadband Domain Name Website Hosting Total Costs (1st Year) $0 $0 $0 $0 $0 $0 $0 Costs (2ed Year) $3,302 As requirement $1,080 $1,416 $150 $ 479.40 $ 6,427.40 Costs (3rd Year) $4,648 As requirement $1,080 $1,416 $150 $ 479.40 $7,773.40 Costs (after 4th Year) $7,270 As requirement $1,080 $1,416 $150 $ 479.40 $10,395.40
The detailed project estimated costs are provided in the Solutions Spreadsheet at Appendix D
It is reasonable for the risk assessment of an IT project to be between 15 and 30 percent of the total project cost. Therefore, the overall estimate percentages of all three solutions are justified.
- 60 -
Alpha Omega IT
8.2 TIMING
The estimated delivery timing of this project is stated below Code 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 Project Activities Project Start-up Project Management System Analysis System Design System Development System Implementation Project Evaluation Project End Target Start 11-Feb -2008 10-Mar-2008 21-Jul -2008 25-Aug -2008 31-Oct -2008 09-Feb -2009 01-Jun -2009 15-Jun -2009 Target End 10-Mar-2008 23-Jun-2008 25-Aug-2008 31-Oct-2008 1-Dec -2008 01-Jun -2009 15-Jun -2009 22-Jun -2009
8.3 RISKS
A risk is a potential problem that will lead to an adverse impact on the success of the project. It is one of the major factors in all projects. This section outlines risk factors of this project.
- 61 -
Alpha Omega IT
3. Risk Rating The risk rating is classified five level below Low: If this risk occurs it will not affect many people and may not even be worth fixing. Normal: A risk strategy may not need to be put in place as it may not even occur. Medium: A workaround should be available or it will take a short amount of time to fix. High: Multiple users affected, the project may not be able to continue if this problem occurs. Critical: A solution has to be found to mitigate this risk before further development can proceed on the project. 4. Risk category The category of risk include: Project Management, Schedule, Technical, Economic, Personnel, Resource and User.
- 62 -
Alpha Omega IT
Project Management
1. Have an agreement of scope of project at the beginning 2. Arrange all sub-objects at each stage throughout the project 3.Offer a clear guideline for both Eastcoast Contracting and Alpha Omega staff to follow. 1. Avoid assuming the customer requirements be adequately known. 2.Early invovement of users. 1. Use the evolutionary and incremental prototype cycles method. 2.Use one of the schedule compression techniques or take corrective action to bring schedule back on track. 3. Carry out sufficient communication process between project team and Eastcoast contracting users. 1.Avoid using the exceeding new or unproven technologies. 2.Conduct a detailed costs estimation. 3.Avoid Hidden costs. 1.Foresee risks and estimate the effectiveness before each phase of project 2.Monitor, identify, assess, quantify and response all potential project threats
Project Management
1.5
4.5
1.5
4.5
Ignore risks
Project Management
- 63 -
AlphaOmega IT
Schedule
1. Carry out sufficient communication process within project team member 1.Have a strict contract with vendors 2.Paying extra for fast shipment purchased materials 1.Complete definitions of scope and requirements of project. 2.Asking team members to work for extra hours against compensatory off or overtime It is a inherent risk 1.Avoid using the exceeding new or unproven technologies. 2.Configure the system completely. 3.Introduce anti-virus and antimalware software. 1.Use the VPN for the outside users strict 2.Adopt strict authorized access to WLAN Adopt mainstream technology
are
not
Schedule Resource
1.5
4.5
1.5
4.5
Schedule
Technical
System Secure
Technology
1.5
4.5
WLAN Security
Technology
1.5
4.5
Technician skills insufficient for correct implementation Employee Turnover Natural Disasters
1.5 1 1
2 3 2
3 3 2
2 1 1
3 3 2
6 3 2
2 1 1
2 3 2
4 3 2
- 64 -
AlphaOmega IT
Comments Likelihood: 1 = Unlikely, 2 = Likely, 3 = Definitely Impact: 1 = Minor, 2 = Moderate, 3 = l Catastrophic Risk Rating = Likelihood Impact 1 = Low, 2 - 3 = Normal, 4 - 6 = Medium, 7 - 8 = High, 9 = critical
- 65 -
AlphaOmega IT
- 66 -
Alpha Omega IT
Unlike Solution three whereby uses half Microsoft half Linux would have been quiet an ordeal to mange and configure. Microsoft XP Professional SP2 is the second release therefore all errors or bugs that have been detected have been rectified with the release of service pack 2. Having a network built based on Microsoft products it gives the organisation more confidence in the product you have chosen. Integrating Microsoft products together while keeping compatibility problems to a minimal. It also making it easier to diagnose problems and obtain support if a fault to occur. Microsoft provides constant auto updates ensuring all its security policies are up to date unlike Linux which are required to be inserted manually. Solution one was built with scalability in mind, it uses superior clients and servers with specifications that will not require any modification for about 5 years. Features including 802.11N, wireless infrastructure and individual servers, allows the network to reach soaring speeds therefore optimising productivity. Unlike Solution two which will suffers from a vastly slower network infrastructure and servers constrains. Communication is maximised through the use of wireless connectivity, VPN access, email including communication via their online website. Solution two and three software components cost less compared to option one, although when taking implementation, training and management of a Linux based system into consideration it works out to be about the same. Implementation of a Linux based system requires more time due to the limited skill and knowledge available. As mentioned above Linux certified staffing demand higher salaries due little about of people certified in their field. Solution one has been built to minimise disruptions which was overcome by ensuring all parts are capable of running at its full potential without having to worry about system failures. Linux products are known to be more secure then Microsoft systems, this issue has been balanced out with the use of security updates, Symantec antivirus, the routers built in firewall and policies setup on the domain controller. Solution one is the most feasible Solution in most aspects, one its more user friendly and easier to manage. Two its scalability outlives solutions two and three in regards to software and technology bases infrastructure. Three costs a little more but will equal out as other solutions require more funding in future for upgrades and acquiring of Linux certified staff. Overall its the most flexible, efficient and practical Solution to implement of East Coast Contracting.
- 67 -
Alpha Omega IT
10. BIBLIOGRAPHY
Rights Replacing Needs" in Hauritz, M., Justice for People with Disabilities, Sydney : Federation Press, 1998 Project Management Institute, Project Risk Management in A Guide to the Project Management Body of Knowledge (Third Edition), Four Campus Boulevard, USA,2004 Cath, G, Conceptual design in Systems analysis & design, Pearson Education Australia Pty. Microsoft Corporation, (2008). Use a PERT analysis to estimate task durations, http://office.microsoft.com/en-us/project/HA101130821033.aspx Tim,B., Estimating by Percentages http://www.projectsmart.co.uk/estimating-by-percentages.html Schedule Compression Techniques, http://leadershipchamps.wordpress.com/2008/04/02/schedule-compression-techniques/ Jorge D., Project Scheduling And Resource Levelling, http://www.projectsmart.co.uk/project-scheduling-and-resource-levelling.html Shelley, D, 17, May, 2002, Creating your project budget: Where to begin? http://articles.techrepublic.com.com/5100-10878_11-1045600.html
- 68 -
Alpha Omega IT