THE INSTITUTE OF FINANCE MANAGEMENT
Faculty of computing information system and mathematics Beauty Plc. Virtual Private Network proposal
Project Members
ELIUD ERICK JULIANA MBUKE YETHROY JEROME MICHAEL GEORGE BEATRICE AYOUB HOKORORO SOPHIA KIDAVA JACKSON KAJIRU ANTONY T. MHANUKA BARAKA MBARUKU ABASI BIT/09/31017 BIT/09/29262 BIT/09/29212 BIT/09/29268 BIT/09/29181 BIT/09/28619 BIT/09/29227 BIT/09/29220 BIT/09/29267 BIT/09/29258
Table of Contents
Abstract. ....................................................................................................................................................... iii Chapter 1....................................................................................................................................................... 1 Introduction .............................................................................................................................................. 1 Current problems of Beauty Plc. ............................................................................................................... 1 Ways to overcome the problems.............................................................................................................. 2 Implementing of organization .................................................................................................................. 2 Chapter 2....................................................................................................................................................... 3 Project Goals ............................................................................................................................................. 3 Objectives. ............................................................................................................................................ 3 Project Scope ....................................................................................................................................... 3 Project deliverables. ............................................................................................................................ 3 Importance of VPN to the organization ............................................................................................. 4 Risks associated with Virtual Private Network ......................................................................................... 4 Client ......................................................................................................................................................... 5 The project team ....................................................................................................................................... 5 Chapter 3....................................................................................................................................................... 6 Proposed approach ................................................................................................................................... 6 Proposed Approach .................................................................................................................................. 6 Chapter 4....................................................................................................................................................... 8 Project implementation ............................................................................................................................ 8 Activity Plan ......................................................................................................................................... 8 Resource plan ...................................................................................................................................... 8 Proposal budget................................................................................................................................. 11 Conclusion and Recommendations ........................................................................................................ 12 References .................................................................................................................................................. 13
ii
Abstract.
This proposal intends to explain the activities that will be conducted in the implementation of the VPN network in the Beauty Plc. The proposal consists of four chapters namely; Introduction, Project goals and objectives Proposed Approach, and Implementation. In Introduction, there is current problem facing beauty Plc., Priority needs, and implementing Organization Project goals consist of objectives, project deliverables, project scope, importance of Virtual Private Network, and risk evaluation on VPN. Proposed approach explains the methodologies that will be used to create the VPN, and the proposed technologies. In addition, the last chapter explains the activity plan, resource plan, and the financial plan (Budget).
iii
Chapter 1
Introduction
The proposal explains the development of the VPN in the Beauty plc. Company. The network will help the beauty Plc. To solve their current problems they are facing. A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables user to send data between two computers across a shared or public internet work in a manner that emulates the properties of a point-to-point private link. Before the Beauty Plc. has no VPN (Virtual Private Network) so the company is doing its activities manually such as sharing of data (Files), exchanging of information within an organization. So the VPN (Virtual Private Network) technology come with the solution to the problem.
Current problems of Beauty Plc.
Currently the company facing are the following; Competition due to the entrance of new companies and individuals in cosmetic industry Technological advancement since Beauty Plc. uses the old technologies in the operations. Market share is reduced since consumer are now aware and exposed to different products in cosmetics industry Security issues that include the inventory control and the transaction control are done physically that set the risk/threat to Beauty Plc. Large number of employees in the company cause more of the company income or profit to be used to pay the employees of the two industry they have
Ways to overcome the problems.
One of the way to solve the current problems is to establish the Virtual private Network, which solve the problems ;trough the following; i. ii. iii. iv. Will automate all the operations that ware done manually hence increase efficiency and accuracy. The network also will increase the network share through reducing production and goods costs Will improve security of companys data or information as well as security of transactions they done in their companies Also will lead to the reduction of the number of employees because most of the duties will be done automatically. v. Gaining the competitive advantage over other companies in the cosmetic
industry by introducing new technologies in the productions and operations
Implementing of organization
We as Cloud Networking and consultancy Co. Ltd we deals with issues such as network(ing) configuration and connections, hardware and software maintenance and repair, as well as computing(ICT) consultancy. Our organization deals with these activities for several years so we are capable of doing any activity regarding with the above mentioned. We had already done tender with many companies such as Africa Barrick Company ltd, Mtibwa sugar co. ltd, Mtakuja Foundation and most of the project were succeed.
Chapter 2.
Project Goals
To develop VPN that will connect Beauty plc. and their braches to overcome business challenges via the use the application of ICT.
Objectives.
1. Improve quality of cosmetic product and packaging, this will attract new customers and hence enable winning competitive advantages over other competitors. 2. Implementing automated security facilities, data security, and network security will enable easy control of materials and proper keeping of transaction records. 3. To reduce operation cost through automating production activities. 4. To reduce number of employees that in turn will lead to increase income. 5. To save the organization money by means of eliminating the need for expensive long-distance leased lines and reducing long distance telephone charges. 6. To align technology with business in order to create values like customer awareness, reduce cost efficient.
Project Scope
This project is focused entirely on the alignment of the Information and communication technology with organization business functions that is how VPN can be positioned to support organization goals and business objectives.
Project deliverables.
The project deliverables that are expected to be presented are; The completely working Virtual Private Network and Network Documentation User training for the entire Network
Importance of VPN to the organization
Implementation of VPN technology will benefits Beauty Plc. in the following manner; Extend geographic connectivity. Improve security where data lines have not been ciphered. Reduce operational costs. Reduce transit time and transportation costs for remote users. Simplify network topology in certain scenarios. Provide global networking opportunities. Provide telecommuter support. . Provide faster ROI (return on investment) than traditional carrier leased/owned WAN lines.
Risks associated with Virtual Private Network
Although the organization will get the benefit form VPN bit, also a VPN technology is critically associated with security issues. Security must be dealt appropriately to ensure the confidentiality and integrity of data and information, as well as overall corporate network security. It may be in either of the following;
User-credential-related risks
VPNs provide easy access from the Internet into a corporate network and its internal resources. VPN security is only as strong as the methods used to authenticate the users (and the devices) at the remote end of the VPN connection. Simple authentication methods based on static passwords are subject to password cracking attacks, spy, or even social engineering attacks.
Spread of viruses, worms, and Trojans from remote computers to the internal network
Remote access is a major threat issue to network security. Every remote computer that does not meet corporate security requirements may potentially forward an infection from its local network environment to an organizations internal network. Up-to-date antivirus software on the remote computer is required to alleviate this type of risk.
Split tunneling
Split tunneling takes place when a computer on the remote end of a VPN tunnel simultaneously exchanges network traffic with both the shared (public) network and the internal (private) network without first placing all of the network traffic inside the VPN tunnel. This provides an opportunity for attackers on the shared network to compromise the remote computer and use it to gain network access to the internal network. A host-based firewall is an effective way to defend against network-based attacks. Furthermore, many organizations have chosen to disallow split tunneling.
Client
The client of this proposal is Beauty plc.
The project team
The proposed development team members are ELIUD ERICK (Project Manager) JULIANA MBUKE (Assistant project Manager) YETHROY JEROME (System Analyst) MICHAEL GEORGE (Network Engineer) MHANUKA BARAKA (ICT Operational Officer) BEATRICE AYOUB (Network Engineer) HOKORORO SOPHIA (Computer consultancy) KIDAVA JACKSON (Computer Technicians) KAJIRU ANTONY (Computer Technicians) MBARUKU ABASI (Computer Technicians)
Chapter 3.
Proposed approach
So many methodologies can be used in developing a certain system. For examples; Traditional and Enhanced Waterfall SDLC (System Development Life Cycle), prototype, Joint Application Design (JAD), Rapid Application Development (RAD), Agile Methodologies and others.
Proposed Approach
There are many methodology as mentioned above, there are strong reasons of having them but the major and important reasons is that; One system development methodology is not necessarily suitable for use by all projects. Each of the available methodologies is best suited to specific kinds of projects, based on various technical, organizational, project and team considerations. Due to the fact that the nature/kind of project (VPN) and various techniques use in the project development, the methodology that will be suitable in this project will be Enhanced Waterfall SDLC (System Development Life Cycle),SDLC has been divided into six(6) phases, phases are shown in the diagram below;
Within each phases there are different activities that are carried on, thing that done in each phase are;
Analysis; Establishes a high-level view of the intended project and determines its goals. (requirements definition) Defines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
Logical design; Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudo code and other documentation. Physical design; the real code is written here. Implementation; Brings all the pieces together into a special testing environment, then checks for errors, bugs and interoperability. The final stage of initial development, where the software is put into production and runs actual business. Testing, the code is tested at various levels in software testing. Unit, system and user acceptance tastings are often performed. This is a grey area as many different opinions exist as to what the stages of testing are and how much if any iteration occurs. Iteration is not generally part of the waterfall model, but usually some occur at this stage. In the testing, the whole system is test one by one. Operation and Maintenance; what happens during the rest of the software's life: changes, correction, additions, and moves to a different computing platform and more. This, the least glamorous and perhaps most important step of all, goes on seemingly forever.
Why did we choose Enchased system Development Life Cycle (SDLC) as the best methodology to be used in conducting this project?. Reasons are shown as important of SDLC below. The important of Enhanced System Development Life Cycle are; 1. Allow iteration process; if your organization has been plagued by problems resulting from
poor requirements management, then a robust requirements management methodology i.e. Enhanced System Development Life Cycle (SDLC) e would be well advised. Once this problem has been solved, through a repeatable process, the organization might then streamline its process, while ensuring that quality is maintained.
2. The orderly sequence of development steps and strict controls for ensuring the adequacy of documentation and design reviews helps ensure the quality, reliability, and maintainability of the developed software. 3. Progress of system is measurable.
Chapter 4
Project implementation
Activity Plan
This part specifies a project schedule with respect to project activities as followed from a chosen methodology of development, System development life cycle. The schedule point out each activity i.e. Analysis, Design, Implementation, Testing and Operation and Maintenance with its sub tasks and their estimated time range.
Resource plan
This part elaborates all resources to be used in the development process, which are network engineer, analyst, user, softwares and hardwares. These are allocated on the activity plan based on which process is undertaken. In addition, these allocated resources will be used in assisting estimation of project budget from analysis to maintenance phase. Below is a Gantt chart showing the project schedule that includes project activities with its specific time range and allocated resources;
Figure 1: A Gantt chart for project schedule indicating activity and resource plan. Elaboration of project activities from a chart;
Analysis Tasks to be done in this phase include a feasibility study of an organization to know its capabilities in terms of finance, technical support it can offer, cost/benefit factors and overall current state of an organization. Another task is requirement gathering and analysis, this will determine clients needs. Requirements are of two types, Functional requirements (VPN operations) and Nonfunctional requirements (extent to which VPN will operate i.e. its constraints, speed, accuracy) Analysis phase will take 15 days in which feasibility will take 5 days, requirement gathering 6 days and requirement analysis 4 days.
Design In design, there is logical design and physical design. Under logical design, the logical structure of the network will be designed. This includes the diagrams of the network structure and infrastructure. In physical design, process of physical allocation of all locations where the equipments will be installed is undertaken. The design phase will take 8 days of implantation, in which logical and physical design will take 4 days each.
Implementation This phase involves two main stages, namely; I. Hardware installation Networking equipments are installed in the area, every device is well configured and make sure that they communicate to each other. This involves the configuration of computers, routers, switches, cables, servers, network dishes and other devices. II. IP and security configuration IP configuration, process of assigning IP addresses to all the devices connected to the network is done for devices to communicate with each other. Security configuration , process where all the protocols are assigned to the particular network in order to limit the access level of the users and the intruders from outside the network. This phase will take 17 days in which 12 days is for hardware installation and 5 days is for IP and security configuration.
Testing Testing is done to know performance and if requirements are met. Testing include integration system testing. In integration testing, individual software modules are combined and tested as a group. In system testing, testing is conducted on a complete taking all integrated systems to evaluate system's compliance with its specified requirements. In this test, the network engineer makes sure that the users are able to access the network according to their levels. System testing can be performed by number of groups including users and bring feedback to the engineer if everything is working properly. This phase will take 10 day. Integration and system testing will take 5 days each.
Operation and Maintenance. In this phase a process of putting the networking system into working is done. After testing and ensure that all units are working properly, then users are allowed to use the network. Maintenance is a continuous activity, but the system will be under developers hand for 10 days afterwards organization will become responsible for the continuous maintenance.
Generally, the whole activity will expected to take total of 60 days to complete.
10
Proposal budget
This is a financial plan made for a proposed project; it is represented in tabular form. It indicates in values in cost of each resource to be used during the implementation of the proposed Virtual Private Network (VPN) in that business. The budget includes the operational costs and equipment cost which will be used on the implementation of the VPN. The following figure shows an estimation of the costs;
Figure 2: A table for budget schedule of a project
11
Conclusion and Recommendations
In the completion of the project, it is estimated that the project will increase the organization advantages. The project will help in reduction of the production cost, hence the reduction of the reduction of the product price, which will attract more customers. Also, the automation of the services also will lead to the high quality of goods produced hence that will meet the customer satisfaction. The reduction of the number of the employees will also lead to the increase of the organization profit because the amount of money that will be used to pay the employees will remain to the organization as a profit.
12
References
BRANDON D, 2006, Project management for Modern information Systems, IRM Press, 701 E.
Chocolate Avenue, Suite 200. Project Management Institute, 2004, A Guide to the Project Management Body of Knowledge (PMBOK Guide), Third Edition, Newtown Square, PA 19073-3299 USA NEBIU B, 2002, Developing Skills of NGOS Project Proposal Writing, Ady Endre ut 9-11, 2000 Szentendre, Hungary , The Regional Environmental Center for Central and Eastern Europe. Available from: http://documents.rec.org/publications/ProposalWriting.pdf [Accessed on 15th December 2011.] Bournemouth University, 2011. BU guide to citation in the Harvard style. Poole: Bournemouth University. Available from: http://www.bournemouth.ac.uk/library/citing_references/docs/Citing_Refs.pdf [Accessed on 15th December 2011].
13