IT MANAGER essay

8

ITMANAGER

Foremployees within a corporation, personnel in various workplaces, andbusiness organizations to operate efficiently with each other, propernetworking is required to be installed. With this contact, the officeand the entire network system are enabled in an entirely newenvironment at different levels. Virtually all employees should haveaccess to the Internet and Corporate information network that willeventually lead to the rapid growth in complexity of informationsystems. Depending on the business type, information systems carryvarious amounts of data, and the versatility of this data onlychanges with the increase in services operated through the network.This leads to enterprise IT departments, where there is an increasedamount of new requirements as well as the data network administratorsand managers.

Forlarge multinational corporations, network management has becomesophisticated, which only calls for centralization of ITinfrastructure management solutions. A study by Thomas Mendel statesthat, on average, 15% of all the problems leading to downtime arecaused by information networks at over a billion additionalcompanies. However, 2% only are caused by failures in actualnetworking hardware: 13% are due to different issues like humanerrors, routing failures, misconfiguration, and unmanaged changes andnetworking software problems.1

SOLUTIONTO BE IMPLEMENTED

Theapproach to be employed entails a well-balanced combination ofdistributed user support and centralized infrastructure management.This will allow enterprise administrators to focus on thefunctionality of the network and managers to solve non-seriousissues. The Design is demonstrated in the figure below.

Fig:System Architecture

Source:Carl,Wahlberg. Developmentof an Internet Operators Network Management,(Helsinki University of Technology, 2006), 85.

MANAGEMENTOF USER ACCOUNTS

Rheniumwill use Microsoft Active Directory technology to store its activeusers. It will consist of a root domain to store data and otherseveral child domains for the sub-offices.

Eachsphere will enclose three Microsoft Windows 2003 R2 Servers – onemember server used for management and two other area forcontrollers.2

UserAccounts

Theuser folder will be orchestrated every day as new users are formed,old users deactivated or removed. The exploiters of the network willalso be arranged or grouped in a particular manner to make out theirapplicability.

STORAGEOF USER DATA

Inthe Active Directory User database, every person using the networkcreated will have a roaming exploiter profile that will be created onthe first sign up. Every time the user signs into a computer theirprofile will be downloaded and admissions, application settings, anddocuments will be provided to his/her desktop. Any apprises on theprofile will be loaded back to the primary storage for keeping theactual database.3The central memory will comprise of Hewlett-Packard MSA-1000 diskmemory of 4 TB emulated, served by two servers using MicrosoftCluster Service technology, to allow changing the servers in case onefails to operate.

MANAGEMENTOF COMPUTERS

The500 computers will be connected to child domains according to thefacilities they belong to. Local service administrators will beresponsible for their functionality, minimization of the hardwaremaintenance, reinstallation of computers, and conveying software tothem. Installations will be completed using a new tech and use of PXEnetwork boot so that on starting the computer and entering thepassword, the computer will automatically download the installedfiles and completes the OS installation.

Thememory of operating system installation files will be once againintegrated. Thanks to the centralization, because updates of variousfacilities will be automatically completed in case of harmful andsecurity purposes. The memory of the server will manifest itselfconsists of two clustered servers, both functioning to heighten theperformance. Storage of MSI packages will use Distributed File Systemtechnology, repeating data to each facility’s servers for them todeploy the suites using Local Area Network (LAN) (DFS node in theroot domain is only used in case of facility DFS node is notfunctional).4The DFS duplication should be assembled as Hub-and-Spoke with thecore domain as the dominant node. This entails that each domain willonly require to communicate and repeat with DFS node in the core areaand not any other child domains, which makes the management of thenetwork easier and the system itself more protected.

GROUPPOLICIES

Groupplans will be allowed to create the environment for users,restricting the part of Microsoft Windows functionality that couldcause damage to the set-up, and to install software to workplaces.Local facility administrators will have the duty of generating andapplying their own Group Strategies Objectives, use any of the corepolicies, and relate them the policies to workplaces of theirfacility.

MicrosoftUpdates

TwoWindows System Update Services Servers bundled via Network LoadBalancing technology will be used for disseminating Microsoft Updatesto computers. Servers will be structured to coordinate with Microsoftservers every night, installing and saving all product apprises.Every computer in the set-up is assigned to update on against anycluster in which critical and security updates are permitted forinstallation.5

SECURITY

Thedrawbacks that every administrator will face is to keep theinfrastructure safe. Strict firewall regulations and rules will beput in place inside the set-up, consenting only required traffic,especially among servers and workplaces. Child domains will also bestrictly separated. There will be no demand for them to interconnectbecause they all have a standard information they need accesses inthe main domain.

TheAnti-virus software

ESETNOD32 anti-virus software and its network license will be installedthe system from any virus or malware. Overly, all CPUs in all domainswill be structured to frequently look for any information about theproduct and install them automatically or with administratorauthorization. The ESET server also contains a folder with dataconcerning computers and updates connected to them.6

TERMINALSERVERS

Toincrease the “user-friendliness” of the setting, a set ofterminal servers should be put in place to operate. The set willcomprise of five Hewlett-Packard servers clustered via Network LoadBalancing technology. These will guarantee the users to operate withtheir information stored at Rhenium from any place with networkconnectivity.7Users will just plainly sign in using the Remote Desktop solicitationand acquire the identical user profile and documents. A respectiveset of software installed and will be able to make the settingsimilar while there will also be several products, which areconsecrated and too big to be mounted on all workplaces. They canonly be installed using terminal servers, solving the difficult oflicensing and installing them on each workplace at Rhenium.

BUDGET

ITEM

UNIT PRICE

UNITS

TOTAL

Servers

$ 49,500.00

12

$ 594,00.00

Microsoft Windows and Licensing

$ 11,155.00

1

$ 11,155.00

ESET NOD32 anti-virus software

$ 11,870.00

1

$ 11,870.00

Hewlett-Packard MSA-1000 disk 4TB

$ 33,575.16

6

$ 201,450.96

CONCLUSION

AtRhenium, there will be two initiative administrators managing thecentral set-up and its functionality while local managers will bespread on faculties take care of workplaces and give user’s supportrequired. Successful management of the 500 machines spread in variousgeographic locations will be achieved through a well-balancedcombination of distributed workstation and user support andcentralized infrastructure management.8

Bibliography

Barber,Brian. Howto Cheat at Managing Windows Server Update Services.Rockland: Syngress Pub, 2006.&lthttp://public.eblib.com/choice/publicfullrecord.aspx?p=254848&gt.

Carl,Wahlberg. Developmentof an Internet Operators Network Management,85 Helsinki University of Technology, 2006.

Haojin,Wang. TelecommunicationsNetwork Management, 3rdedition, 687p., McGraw-Hill Professional Book Group, 1999.

Heppler,M., Rychnovský, L., Šeděnka. VPNBased Approach to Centralized Management of Notebook Access toMasaryk University Network.2007.

MicrosoftDFS. DistributedFile System Overview.2006.&lthttps://technet.microsoft.com/en-us/library/cc738688%28v=ws.10%29.aspx&gtMay 7, 2016.

Palmer,Michael J. MCITPGuide to Microsoft Windows Server 2008, Server Administration.Boston, MA: Course Technology, Cengage Learning, 2011.

ThomasMendel. ABig Step Toward Automating Network Management.Forrester Inc., 2004.

1Thomas Mendel. A Big Step Toward Automating Network Management. Forrester Inc., 2004.

2 Palmer, Michael J. MCITP Guide to Microsoft Windows Server 2008, Server Administration. Boston, MA: Course Technology, Cengage Learning, 2011, 15.

3 Barber, Brian. How to Cheat at Managing Windows Server Update Services. Rockland: Syngress Pub, 2006, 58.

4 Microsoft DFS. Distributed File System Overview, 2006.

5 Barber, Brian. How to Cheat at Managing Windows Server Update Services. Rockland: Syngress Pub, 2006.

6 Carl, Wahlberg. Development of an Internet Operators Network Management, 85 Helsinki University of Technology, 2006

7 Heppler, M., Rychnovský, L., Šeděnka. VPN Based Approach to Centralized Management of Notebook Access to Masaryk University Network, 2007.

8 Haojin, Wang. Telecommunications Network Management, 3rd edition, 687p., McGraw-Hill Professional Book Group, 1999