CCSM Assignments
CCSM Assignments
Management
NCC Education, UK
0
Each time you submit and assignment you must attach this statement as the
cover page for both the hard copy and the electronic version. If the statement is
missing your work will not be marked.
Student Declaration
I have read and understood NCC Education’s Policy on Academic Dishonesty and Plagiarism. I
can confirm the following details:
I confirm that this is my own work and that I have not plagiarized any part of it. I have also noted
the assessment criteria and pass mark for assignments.
Student Signature:
1
Contents
Task 1.........................................................................................................................................................3
TASK 2.......................................................................................................................................................7
Task 3.......................................................................................................................................................14
TASK 4.....................................................................................................................................................17
REFERENCES........................................................................................................................................18
2
Task 1
a.
Above diagram is illustration of semantic network of the organization. Communication has been
denoted by lines and their direction by arrows.
Headquarter K9 House (HQ) communicates with facilities using data and voice mode for inquiry
and reports. HQ also communicates VET CENTRAL with data mode for reports. In addition, HQ
also communicates with other third party remote sites for dogs in need.
Each FACILITY and HQ has two way communication using data and voice mode. Each
FACILITY and VET CENTRAL communicates with each other using data and video. Each
FACILITY only sends video clips to VET CENTRAL for diagnosis purpose of dogs and their
conditions. But it has two communications with VET CENTRAL using data mode.
Third party REMOTE SITE is being communicated using their respective web sites over
internet.
3
Data communication is carried out in the organization with the help of interconnection of the
departments in an network. For voice services, PSTN (Public Switch Telephone Network) is
being used and they may also use web services like Skype™ or Google Hangouts. Third party
services like, Skype and Google Hangouts provide SSL encryption techniques to secure the
communication. For video reporting, company uses own internal networks where as they use
third party services for meetings with departments of other facilities.
HQ uses data communication inside the building, whereas for voice and video communication,
they can allocate separate sessions for meetings.
1. Data
The company uses heavy data traffic for communication within. The estimated data sizes
are:
a. 1 standard email size: 5 KB The estimated use of data communication in and out of
the company is 200 emails per day, used by marketing, communication with
customers and internally. Monthly data : 200 emails X 5KB X 30days = 30,000 KB =
29 MB
b. 1 senior manager briefing report: 838 KB
It is assumed that reporting is done twice week therefore, monthly: 2 per week X 838 KB
X 4 weeks X 4 mangers = 26832KB = 26MB
c. Presentation slide by respective department weekly = 10.2 MB
It is assumed that presentation is done weekly, therefore, monthly: 4 managers X
10.2 MB X 4 weeks = 163 MB
Therefore, the estimated data size is 218 MB per month [1].
2. Voice
Average voice size is 10 MB per session. It is estimated that there is 50 sessions per
day. therefore, Monthly: 10 MB * 50 sessions * 30days = 15000MB
3. Video
It is estimated that 100 MB video of
4
b.
In above diagram, additional devices have been indicated in each building for smooth
running of business and security purpose. Surveillance system has been added to
facility to watch over dogs and to IT department for security purpose. IT department in
K9 HOUSE has additional servers, Database server and Web server. It also includes
firewall to monitor the traffic flow in and out of the server. Companies records are
maintained at Database server and all other files are maintained at web server. Web
server also utilizes authentication, verification and encryption to secure the data storage
and transmission.
Additional devices used in the network:
1. Surveillance system / Security Cameras:
Security cameras is being used in the network to track the dogs and secure and log
the physical security in server rooms. Server is main infrastructure of the
organization. It needs to be highly secure physically and logically. Physical security
refers to access of person to the servers to prevent physical damage of its
components, physical thefts and data thefts by physical connection. Logical
connection is discussed in firewall section.
2. Web server
5
Web server is a computer where all the data such as document files and multimedia
files of the organization.
3. Database server
Database server stores all the records of the organization. In addition, customers
and transactions are maintained in this server.
4. Firewall
Firewall is a security gate to restrict the unauthenticated access to the organization
resources. Servers are regularly connected logically within the organization,
therefore, restrictions is a must for unauthorized modification, deletion and use of
data. Firewall has been used to check the valid request in and out of the servers.
5. Switches
Switch connects between different computer inside a building or locally. It supports
internal networks. Switches with basic security such as firewall and SPI inspection
are used to protect the internal network also.
6. Routers
Routers are used to route the data package within the organization. Generally, it
means to connect between the different buildings in the organization. Every building
has their own internal local network and to connect between different local networks,
router is used.
6
TASK 2
a.
In above network diagram, all the computers, inside the Headquarter are connected to the
internet with the help of router, with inbuilt basic firewall protection. Then the connection is
connected to switches, where other devices are connected. Servers are also connected to
switch through a firewall.
7
Figure: Alternative local communication inside K9 HOUSE (HEADQUARTER)
Alternatively, all the computers inside the organization except the servers can be connected
using wireless access points which will help to reduce wires used and mobility of the directors
within the building.
8
Each facility is connected with router via switch. Facility consists of manager with PC and trainer
with laptop, and a security camera to track inside the facility for security purpose.
Alternatively, facility can also be connected with wireless access point will provide mobility to the
staffs. Trainer can be provided with smartphone to regularly connect with the organization,
during training sessions also and for reporting.
9
Figure: local communication inside VET CENTRAL
Communication within the vet central is maintained with wired network, where a person VET1
(manager) and responsible for reporting to the headquarter and others are provided with
laptops, who sometimes need to visit facilities.
10
Figure: Alternative local communication inside VET CENTRAL
Connection can also be maintained by wireless network inside the building, which can reduce
cost of wires and provide mobility.
b.
11
Company may use public internet service to interconnect among different departments
around the city. Internet is open to public and is vulnerable for security flaws. Therefore,
VPN (Virtual Private Network) can be created while using the internet service. VPN
technology creates a fixed route or path to transmit the data so that it can be tracked in
case of security flaws. Remote access VPN, private link over public connection or site to
site VPN, two authenticated routers which can authenticate itself, can also be
established to secure the connection. [2]
12
Leased line is a permanent usage of infrastructure established by private firms for
certain period of time with certain amount. Many ISP (Internet Service Provider) already
establishes their network to provide the connection to general public. They can also be
contacted to deal for leasing their network for certain amount of time. It means using
third party ISPs network for private use for fixed amount of time. Interconnection by
method is highly secure as the leased route cannot be used by general public which
makes it less vulnerable for security attacks or data thefts while transmission. This
method can be expensive for small businesses, whereas, it is very useful for big
organization to establish multiple connection between many departments around or
outside the city.
c.
13
Communication with third party remote sites can be succeeded using public internet
services. Different encryption techniques can be used to protect data confidentiality,
such as, SSL (Secured Socket Layer) encryption can be used while exchange of data.
Furthermore, if the remote sites are contacted frequently then certificates can also be
implemented to authenticate the message source.
Task 3
a.
b.
14
D-Link 5 $130.91 $654.55 http://topbrandinventory.com [3]
Systems- Inc.
$138.17 $690.85 http://ctl.net [4]
Unified
Services
Router (DSR-
250)
Xeon
Processor
15
Bullet Security
Surveillance
16
TASK 4
Dogs are trained in different facilities and supplied for military purpose. ROI (Return Of
Investment) is the profit by investing on the planned system. Business goal is to smooth running
of the system with profits. The proposed network architecture will help company to grow rapidly
while maintaining its reputation. The network will boost the system operations and will even help
minimize the extra expenses of data transfer. Quality devices have been used to manage the
network of the organization, with respect to budget of the company. The optimum budget for
networking is being used for profits of the company.
The budget has been kept in mind so devices have been used as per the current requirement of
the organization. Therefore, company will need to upgrade resources in future when business
increases. Added security can also be used in current network such as, biometric authentication
in different facilities. Security attacks can occur anytime such as Denial of Services and so on.
Disasters can also hamper the network and additional database backups in data warehouses
needs to be used.
17
REFERENCES
1. Email Message Size Limit. 2014. Email Message Size Limit. [ONLINE] Available at:
http://www2.lccc.wy.edu/policies/OperationalStandards/EmailSizeLimit.html. [Accessed
20 May 2014].
2. What Is VPN?: Virtual Private Network (VPN). 2014. What Is VPN?: Virtual Private
Network (VPN). [ONLINE] Available at: http://technet.microsoft.com/en-
us/library/cc739294%28v=ws.10%29.aspx. [Accessed 22 May 2014].
3. D-Link Systems- Inc. Unified Services Router (DSR-250). 2014. . [ONLINE] Available at:
http://topbrandinventory.com/D-Link-DHDSR250-review-B008021NSI-6. [Accessed 25
May 2014].
4. Wired Ssl Vpn Router PCs, Laptops, Monitors and 2go PCs. 2014. Wired Ssl Vpn
Router PCs, Laptops, Monitors and 2go PCs. [ONLINE] Available at: http://ctl.net/wired-
ssl-vpn-router?utm_source=googleshopping&utm_medium=cse. [Accessed 25 May
2014].
5. TRENDnet TPE-1020WS 10-Port Gigabit Web Smart PoE+ Switch - Newegg.com. 2014.
TRENDnet TPE-1020WS 10-Port Gigabit Web Smart PoE+ Switch - Newegg.com.
[ONLINE] Available at: http://www.newegg.com/Product/Product.aspx?
Item=N82E16833156460&nm_mc=OTC-FroogleNEW&cm_mmc=OTC-FroogleNEW-_-
Network%20-%20Switches-_-TRENDnet-_-33156460. [Accessed 25 May 2014].
6. PROVANTAGE: TRENDnet TPE-1020WS 10-Port Gigabit Web Smart PoE+ Switch.
2014. PROVANTAGE: TRENDnet TPE-1020WS 10-Port Gigabit Web Smart PoE+
Switch. [ONLINE] Available at: http://www.provantage.com/trendnet-tpe-
1020ws~7TDW908K.htm?source=googleps. [Accessed 25 May 2014].
7. 469-3777 SERVERS POWEREDGE QUAD CORE XEON 2.2GHz DELL . 2014. 469-
3777 SERVERS POWEREDGE QUAD CORE XEON 2.2GHz DELL . [ONLINE]
Available at: http://www.serversupply.com/products/part_search/pid_lookup.asp?
pid=198445. [Accessed 25 May 2014].
8. PROVANTAGE: Dell 469-3777 Dell PowerEdge T420 Tower x/2.2 8GB 2x500GB SATA
5U. 2014. PROVANTAGE: Dell 469-3777 Dell PowerEdge T420 Tower x/2.2 8GB
2x500GB SATA 5U. [ONLINE] Available at: http://www.provantage.com/dell-469-
3777~7DELZ003.htm?source=googleps. [Accessed 25 May 2014].
9. NETGEAR UTM9S-100NAS ProSecure Unified Threat Management Firewall 16000
Simultaneous Sessions < 250Mbps - Newegg.com. 2014. NETGEAR UTM9S-100NAS
ProSecure Unified Threat Management Firewall 16000 Simultaneous Sessions <
250Mbps - Newegg.com. [ONLINE] Available at:
http://www.newegg.com/Product/Product.aspx?Item=N82E16833122449&nm_mc=OTC-
FroogleNEW&cm_mmc=OTC-FroogleNEW-_-Network%20-%20Firewalls-_-Netgear
%20Inc.-_-33122449. [Accessed 25 May 2014].
10. UTM9S-100NAS Netgear Prosecure Utm9s Firewall Appliance Utm9s100nas :. 2014.
UTM9S-100NAS Netgear Prosecure Utm9s Firewall Appliance Utm9s100nas :.
[ONLINE] Available at: http://www.compsource.com/pn/UTM9S100NAS/Netgear-306/?
src=F. [Accessed 25 May 2014].
18
11. Upgradebay.com | 57312710 Lenovo system 5732710 ideacentre h505s slim amd E2-
1800 4GB 1TB P/N: 57312710 – Lenovo Originals [ONLINE] Available at:
http://www.upgradebay.com/Products/ProductInfo.aspx?rid=22&ProductID=170398744.
[Accessed 25 May 2014].
12. Lenovo IdeaCentre H505s Desktop (Black). 2014. Lenovo IdeaCentre H505s Desktop
(Black). [ONLINE] Available at: http://bigdealsdirectonline.com/lenovo-ideacentre-h505s-
desktop-black-20140226120124. [Accessed 25May 2014].
13. Defender 21005 Wired 600TVL Indoor/Outdoor Bullet Security Surveillance . 2014.
Defender 21005 Wired 600TVL Indoor/Outdoor Bullet Security Surveillance . [ONLINE]
Available at: http://www.atgstores.com/security-cameras/defender-21005-wired-600tvl-
indooroutdoor-bullet-security-surveillance_10986339.html?af=2615&cse=2615.
[Accessed 25 May 2014].
14. DEFENDER 21005 Ultra Resolution Outdoor Security Cameras. 2014. . [ONLINE] Available at:
http://valuewarehouse.net/Defender-21005-review-B007ULT3FK-6. [Accessed 30 May 2014].
15. ASUS X551MA RCLN03 Laptop Computer With 156 Screen Intel Celeron Processor by
Office Depot. 2014. ASUS X551MA RCLN03 Laptop Computer With 156 Screen Intel
Celeron Processor by Office Depot. [ONLINE] Available at:
http://www.officedepot.com/a/products/790652/ASUS-X551MA-RCLN03-Laptop-
Computer-With. [Accessed 25 May 2014].
16. Asus X551MA 15.6'' Laptop | Staples®. 2014. Asus X551MA 15.6'' Laptop | Staples®.
[ONLINE] Available at: http://www.staples.com/Asus-X551MA-156-
Laptop/product_573082. [Accessed 25 May 2014].
17. 100ft CAT6 Ethernet Cable - 550MHz Bare Copper No Boot, Black . 2014. 100ft CAT6
Ethernet Cable - 550MHz Bare Copper No Boot, Black . [ONLINE] Available at:
http://www.firefold.com/100ft-cat6-ethernet-cable-no-boot-black. [Accessed 25 May
2014].
18. 100ft 100 ft RJ45 Cat6 Cat 6 High Speed Ethernet LAN Network Black Patch Cable |
eBay. 2014. 100ft 100 ft RJ45 Cat6 Cat 6 High Speed Ethernet LAN Network Black
Patch Cable | eBay. [ONLINE] Available at:
http://www.ebay.com/itm/like/230719269919?lpid=82. [Accessed 25 May 2014]
19