Build Internet Infrastructure
Build Internet Infrastructure
Build Internet Infrastructure
Prerequisite units
Outline
1.1 Select internet infrastructure in line with business and end-user requirements, within budget
limitations
1.2 Evaluate the internet service for satisfactory performance and confirm that the service meets
business and end-user requirements
1.3 Ensure that hardware, software, network and security requirements are in accordance with agreed
business and end-user specifications
1.4 Research internet to source suppliers, technologies, delivery schedules and replacement parts and
document findings
1.5 Evaluate internet service providers and establish their capability to deliver the required connection
service
1.6 Determine internet protocol address allocation based on the number of addresses needed
V Ensure that user accounts are verified for security access and monitored
5.1 Verify user settings to ensure that they conform to security policies
5.2 Have legal notices displayed at appropriate locations for system users
5.3 Check passwords in accordance with business policies and verify with software utility tools
5.4 Plug well-known security gaps with appropriate hardware and/or software
VI Manage and support the internet
6.1 Assist management in developing procedures and policies for maintaining the internet infrastructure
6.2 Obtain, install and use management tools to assist in internet administration
6.3 Monitor traffic, appropriateness of broadcasts, content access and hits over the internet
6.4 Create logs and other reports required to manage and support the internet
6.5 Optimize internet performance
What is Internet Infrastructure?
All the hardware and services required making a web page appear in your browser, or an RSS
feed download into your reader, or VOIP calls / emails get to your desktop. All the underlying
technologies that are unseen, but ‘make the Internet go’.
Data Centre
A Data Centre is basically a specialist building that has the ability to power (and cool) massive
amounts of computer equipment. Typically a Data Centre would also have a very large amount
of network bandwidth to accommodate data transfer in and out of it. Data Centres are built as
highly redundant and resilient facilities – at the base level – you would expect a Data Centre to
have at least N+1 power (this likely comes as a local feed from the national electrical grid as ‘N’,
and a backup generator for the ‘+1′).
The Data Centre is the home for Internet Infrastructure. It is the central point of aggregation and
distribution of data and network services. These facilities tend to include:
- 24 x 7 Staffed Operations Centre (typically called a NOC, the staff monitor all activities of the
Data Centre and ensure smooth operation as well as deal with equipment issues)
- Building Management System (the BMS normally monitors and alerts on temperature zones,
power and cooling usage, outside temp., access control and CCTV)
- Secure Access Controls (i.e biometrics on all entry and DC floor doors)
- Fire Alarm and Suppression (ie. VESDA for detection and Inergen gas for suppression)
The unit of measurement for a Data Centre is space and power. How much space will the
equipment require and how much power will it draw (which is effectively double that, as cooling
a server takes about as much power as just having the device operating).
Network
Possibly to most important foundation block of Internet Infrastructure is the Network. Without a
network connection no data can pass between Data Centres, over the Internet, and ultimately
onto your Desktop, Laptop or Mobile Handset. For the purpose of this post, let’s talk about the
network infrastructure in a Data Centre, where data passed in to computer equipment, is
processed and/or stored, and passed back out of the DC.
So you would expect at least N+1 network connectivity into a Data Centre in the form of at least
2 Fibre Cables from telecommunications providers on diverse rings. Therefore if one had service
cut, the Data Centre’s network connection would not be affected. Some data centres
(Hosting365′s is one) are Carrier Neutral – which means a number of carriers have a Point-Of-
Presence in the facility, so the Data Centre is not affected by any commercial or technical issues
of a single carrier.
Next you would expect redundant switch gear in the Data Centre in separate racks so again if the
switch gear failed, the other set of it would simply take over and no service interruption would be
experienced.
The unit of measurement for network connectivity is megabits per second and available megabits
on the carrier connection. There may be 1 Gigabit available but the DC may only be using, and
paying for, 100 megabits. The ability to meet peak demand is important though, so Data Centres
will have a lot more connectivity available than is required for daily operations.
Computer Equipment
Now that the two basics of Internet Infrastructure are in place – the ability to power your
equipment and the ability to connect it to the Internet, the next thing is the computer hardware
that uses this to process and store the applications and data.
By computer equipment, for this basic post, I really mean Servers. A Server is a more complex
and high-end version of a desktop PC. An average server might consist of 2 power supplies (for
redundancy), 8-12 RAM slots, anything from 2-10 hard drive bays and multiple processors (not
just multi-core!).
Servers are housed in Racks in a DC which are typically 42u in height. (1U is 1-unit and a low-
end server takes up just 1 of these units, other servers scale within these racks to multiple ‘U’).
Racks are normally powered by 2 PDU (Power Distribution Units) which connect to (if
available) multiple power supply units in the server.
A low-end installation may be only a single server, which is the simplest form of Internet
Infrastructure. The server would be connected to the DC Power, the Network, an OS and other
required applications installed on it. Then it is ready to ‘power and push’ data on the Internet.
More complex deployments would include pools of servers, with different applications on each
one, or clusters of pools for multiple clusters with dedicated application requirements.
The unit of measure for Servers is Processor Power and RAM. Although there is a lot more to
selecting a server such as expandability, reliability, network ports, BUS speed, Cache size and
speed. Personally I would like the unit of measure in Servers to change, I think for buyers and
users it should be rated in ‘MIPS’ – which is ‘Millions of Instructions Per Second’ which is
effectively all that matters, and how today’s Mainframe computers (IBM BlueGene is a high end
Mainframe) are measured.
Storage Services
Data Storage is a huge part of Internet Infrastructure. All those emails accessible online, all the
web pages on your favorite web site, all those photos on Facebook … are all stored on a hard
drive in a DC somewhere. The basic level of storage is on-server storage, which means the hard
drives in the computer server. This can cause not just performance and capacity issues, but also
redundancy ones – local storage is inherently as prone to failure as the server it is in.
It is common to use specific storage devices – such as Direct Attached Storage (a dedicated and
dumb storage appliance connected direct to your server), Network Attached Storage (a storage
device that can be accessed by multiple machines over a network connection, and independent of
the server itself) and Storage Area Networks, which are high-end, resilient and redundant set-ups
that give high performance levels and are very scalable. A Storage Area Network may be shared
among many services, applications, servers and customers.
The unit of measure in storage is gigabytes (getting to be more commonly terabytes now) and
IO’s per second (input-output read/writes the device can perform per second).
Server Applications
The final piece of underlying Internet Infrastructure is the server applications themselves. In
order for an web application to be delivered from a server, that server requires an Operation
System (typically Windows or Linux), a Web Server application (like Apache or Microsoft IIS),
and a Database (such as MySQL, MS-SQL or Oracle). There any many more variations here, but
the basic web server has these 3 things. From here you can install blog software, an ecommerce
site, your new web 2.0 application, or any Internet capable piece of software (more include –
Instant Messaging Server, File Storage Server, Message Board)
More complex applications tend to have dedicated servers, or pools or servers, for specific things
– like a cluster of Database Servers, or a pool of Web Server to serve those ‘www.’ page
requests. These may also have more complex network setup such as dedicated routers, load
balancing and firewall devices (for traffic management and security respectively)
Overview
Functional requirements capture the intended behaviour of the system. This behaviour may be
expressed as services, tasks or functions the system is required to perform.
The requirements documents are comprehensive, detailing what is required of an installation to
meet the business needs of users. Such a document can run to considerable length and would
normally be prepared by an IT analyst or project manager. The author of the functional
specification should be able to speak the language of both business and IT.
The functional requirements documents are the ‘blueprint’ for the project implementation.
Anything missed will appear at the end, and just as when building a house, if the plumbing
design is wrong then it will be expensive and time consuming to correct.
Often one of the first steps in large projects is to devise a functional specification, also known
as the functional requirements specification (FRS). After this, a technical specification can be
produced.
Requirements issues
When selecting and employing software and hardware tools, one of the first and most important
activities to embark on is identifying what the client wants and to ensure they sign-off on the
requirements. This may sound easy, but in many cases it is not!
For example, how can a client (who often has limited knowledge of IT architecture) indicate
what they want if they have not seen a working prototype to assess?
In many cases, inexperienced clients advise the developer on what they want, when they may not
really understand what is achievable technically. This issue can also be made more complex if
the process occurs in an organisation that has rigid IT policies, which can raise numerous
compatibility issues.
In addition, this is made even further complicated if you are in a situation where you are trying to
win a contract or compete for work. Others (eg competitors) may have promised the
unachievable and given an impression that ‘anything is possible’. If you are awarded the work or
win the contract, you may now be expected to deliver the impossible. An open and honest
assessment of what will be delivered is essential.
So, one of the tasks is to document the requirements.
This may include identifying or clarifying:
the business case
what the client considers the project’s main objectives are
what IT infrastructure is already in place
basic specifications (eg formats)
conflicting or overlapping requirements
maintenance and backup requirements
bandwidth issues that may affect the project
role definition of parties involved
the nature of the data (eg banking details, multimedia)
security needs (eg if the client needs logins, passwords, lockable sections, etc)
available support resources
costings.
Needs analysis
Various techniques can be used to define and refine the project needs, such as interviews with
the client, online JavaScript surveys/forms, user discussion groups and questionnaires with
samples of the target audience. A very important purpose of this analysis is to develop an
understanding of what is achievable within the project resources of skills, funds and time.
The process of needs analysis may result in a separate needs report, especially on large projects.
On smaller projects, the needs analysis and the information gathered can often be documented
with the proposed solution in the one document: the scope document. This provides information
on which design decisions will be based in the next stages of development.
For most IT applications including multimedia, the needs analysis will need to focus on three
perspectives:
1 Business perspective: An outline of the current business climate, structure of company and
the emerging industry issues that are driving the project.
2 Technical perspective: An outline of existing IT systems/infrastructure of the company
including computer hardware specifications, numbers and locations, details on browsers,
operating systems, servers, security policies, networks, bandwidth capacity and so on.
3 Human perspective: An outline of the motivation of staff to use new IT systems. It may also
cover such considerations as PC literacy, industrial relations issues for staff, legalities and
even language issues for users.
A common criticism over the last decade is that IT developers have focused too heavily on the
technology and not enough on the users’ needs or the long-term business goals. By giving
adequate attention to these different perspectives, you are likely to end up with a solution that
addresses the client’s real needs.
Scope documentation
The aim of the scope document is to identify, control and justify the proposed solution.
Typically, the project manager/developer will normally prepare the document after consultation
with the client and the project team. It should contain most, if not all, of the information that will
form the project contract. Data gathered in the needs analysis can also be included here.
The first draft of the scope document is rarely fully mutually agreed upon. There are usually
numerous negotiations to refine the specifications of the deliverables. These will, of course,
impact on the budget and schedule of the project.
The final scope document should clearly specify the milestones and sign-off points, including
possible points and conditions for revisions to the budget and schedules. A timeframe should be
included in the document, but a full timeline that has agreed delivery dates may not necessarily
be part of the document at this stage. (This depends on the size and complexity of the project).
As part of the scope, there must be clear agreement on issues such as reporting, documentation,
evaluation, testing and delivery requirements. This defines, in quantitative terms, how the client
and the developer/implementer will work together and how, through the process of sign-offs, a
mutual end agreement will be reached. This means that in the end the appropriate product has
been built in the agreed way and via the agreed strategies outlined in the scope document.
The approval of the contract generally involves representatives signing a specified agreement on
the last page of the scope document. Any variations to this agreement will also have to be
approved by authorised representatives of the client and development team.
As you can imagine, once hardware is approved, ordered and functioning it is very difficult for
the client to then request anything else. At this stage, many thousands of dollars in hardware and
software, not to mention IT specialist wages, may have been allocated. The basic plan must be
right at the start!
Throughout the project, the client and the development team must have a strategy in place to
inform each other of any event that may impact on successful progress and timely completion of
the project. The strategy again must be outlined in the scope document.
Functional requirements specification
The functional specification describes what the system will do, as opposed to how it will be
done. This distinction is important, because:
the client may not be interested in the details of how a function is implemented, and the
technical details may simply cause confusion for the client
the implementation details may need to change during the design and development of the
project
you don’t want to have to negotiate changes to the functional specification just to change
details of implementation
the technical specification for large projects will be detailed in a separate document, and
you should not entangle one with the other.
The language of the functional specification should be clear, concise and (as far as possible) non-
technical. It is very important to attend to details in the functional specification. One misplaced
word may commit a vendor company to develop extra functionality that was never intended, and
damage the profitability of the project.
Fixed requirements
Some requirements are fixed, and not derived from the ideal functionality that the product or
system should possess. These are often in the form of constraints set by the client. For example:
A use case is a diagram showing how the proposed system will be used in one particular
scenario, by a particular user. Use cases allow the designer to focus on details, but keep the
design grounded in the basics of how the system will be used. A large system will have many use
cases.
Web research
There are some very good articles on use cases on the Internet. Read these two articles on the A
List Apart website:
User requirements
How many users are expected to use the system?
How many people will be utilising the solution at one time?
Where the users will be located (eg overseas, interstate or at home)?
What navigation model will it use?
What is the range of the content?
How much content will it include?
How will the content be structured?
Technical requirements
What types of computers/operating systems will the users operate?
Are their desktops all the same?
What bandwidth restrictions occur presently?
What security (login) will they need?
What backup policies need to be in place?
Who will have administration rights?
What will the business do if the system fails at any stage?
Who is the project sponsor?
What does management expect the system will do and won’t do?
Hardware
Compatibility: will the solution work with existing systems?
Support for multimedia formats: will the existing systems and architecture support all
types of media?
Will the new system be supported by existing resources within the company?
Is there funding available for new hardware? (eg new servers)
What is the backup strategy? Has this been costed?
Does the system need to be mirrored?
Will there be time delays to purchase and install hardware?
Will you be relying on another group to set up the hardware? If they don’t consider your
project a priority, is that time delay factored into the delivery strategy?
Are there other projects that you may be able to share hardware costs with?
If the system needs to cater for multimedia, does there need to be extra attention paid to
being able to store and transmit large graphic, sound and video files?
If you are a consultant or part time employee, will you be given permissions and rights to
install and support the system fully? (As some computer centres are secure).
Software
What is the true cost of the software?
Are there licensing issues? (As the system is in development, should you pay for all the
licensing now, or when the system is in live mode?)
Can the software be licensed for use by multiple users who use it on different machines?
(Concurrent licensing)
How long has the software been on the market for?
What happens if the software company becomes insolvent? Who supports it?
Who owns the source code?
What happens if the source code is modified; who supports the product then?
Does the solution work with all other company software systems?
If web-based, does the solution function on all common browsers?
If security is a concern, can the software be delivered in a ‘locked down’ format?
Does the software support all file formats? (This is especially important when working on
multimedia tasks.)
Is the software easy to use or are there major training issues/costs?
Support materials
You will need to consider the content and design requirements of all support materials. Support
materials could include:
system specifications
user guides
knowledge banks
intranet/Internet help sites/CD-ROMs
training manuals
general user documentation and print-based help.
You will also need to consider workshops, seminars or briefings you may need to run in order to
support the software/hardware/system.
During the development of the scope document you will have determined the kinds of support
materials that you will need. You will probably also establish who will be responsible for the
production of those materials.
In conclusion, the project manager will generally be responsible for coordinating the
development of the support materials in parallel with the development of the package.
Role definitions
One of the most important tasks a developer must do before moving into the design and
development phases is to clarify roles and responsibilities. If this has not been done it is virtually
impossible to cost a job, as you cannot allocate the funding for staff. As well, this can lead to
problems finishing a project on time.
For example, the main things to clarify (in terms of roles and responsibilities) may include:
Who is responsible for the sign-off? (And if that person leaves the company, who will do
it then?)
Should the roles be described as position titles rather than individuals’ names?
Who approves purchases (eg software)?
Who will support the project after the development team has gone?
Who will collect and collate the content?
Who will check the legality of the content?
Who has responsibility for organising the workspace for the development team?
Who will approve the security systems of the multimedia product?
Who takes final responsibility for the project?
Budget issues
Funding is a tricky area. Sometimes the ‘real’ budget is not disclosed. Sometimes this is done for
valid reasons, sometimes not. It is common knowledge that some clients are reluctant to reveal
their budget as vendors will bid up to available funds. As well, some parts of the IT industry are
still somewhat immature, so it is often difficult to cost a job.
There are many variables. One job could take 2-3 weeks to install and set-up. Once all the bugs
are identified, the task might only take a matter of hours to repeat. Implementing complex IT
projects is not an exact science!
Due to this situation, it’s always worthwhile to seek additional funds. Many large and small
organisations do not appreciate being asked to fund extra amounts after a project has
commenced. It is often wiser to be honest and seek additional funds when completing the initial
project approval.
Another important point is that the client must understand what it is they are paying for. Be
mindful that it is easy to confuse clients with technology terms and acronyms. Ensure the
contract outlines what the deliverables are in plain English. It is also helpful for the client if you
include a breakdown list, as an attachment, that quantifies all the major deliverables.
Finally, remember that if you do not win the contract, you have devoted time to the bid and this
has cost your company money. So ensure this potential loss is a consideration in your overall
business plan!
Sign-off
In the planning phase, the sign-off typically covers an agreement with the client for the following
items:
target platforms
look and feel of the solution (proposed product/system)
graphics standards
navigation and user issues
hardware and software limitations
development tools (if not purchasing a solution off-the-shelf)
client and developer responsibilities
privacy issues
initial timelines
budget.
Again, the major purpose of the sign-off is to prevent problems later in the project. No one wants
disagreement about aspects of the deliverables at the end of the project. The sign-off process
forces all issues to be laid out on the table and discussed.
Summary
A functional requirements document is a critical element of any IT project. It should cover all the
important points, yet still be easy to understand for non-technical people.
Another aim in preparing a comprehensive functional requirements document is to cover
everything and yet keep it brief. While it is the ‘blueprint’ for the project, if it covers everything
in too much detail the key stakeholders may not have time to read it all.
You must ensure that a realistic blueprint is achieved; to avoid confusion occurring late in the
project cycle and help the final result to be a positive experience for both parties.
Progress
Have a look at the next section—Practise. If you have trouble, review this Reading or perhaps
take a look at some of the listed Resources.
When you feel ready, try the Self check section at the end of this topic. This will help you decide
if you are now able to complete the task and attempt assessment.
LO2: INSTALL AND CONFIGURE
INTERNET INFRASTRUCTURE
Network hardware
A great variety of networking devices exist—many more than can possibly be covered here.
Local requirements dictate the types of networks be formed using these devices. This reading
will focus on the most common range of network devices and the main standard that supports
them, Ethernet.
Ethernet
Most network devices commonly-used are based upon the Ethernet protocol. Ethernet speeds
have been slowly increasing over the last decade, from 10 megabits per second (10 Mbps, 10
million bps) up to discussions of 10 gigabits per second (10 Gbps, 10 x 1000 Mbps) and beyond.
Currently, most computer networks work very well with the 100 Mbps range of products, but as
data transfers within a local rea network increase, the higher bandwidth and capacity of faster
networks may be needed. Often the limiting factor is not the network speed but other bottlenecks
(limits) in the overall system, such as processing speed and hard drive access times.
Ethernet uses the concept of CSMA/CD (carrier sense multiple access with collision detection).
Carrier sense means that devices on the network listen first for no network activity on the
network. No activity indicates that no other device is sending information, since they all use a
common medium to transfer data (multiple access). But since just as in a momentarily quiet
room two or more people may start to speak at the same time, the collision detection mechanism
is a method of dealing with this.
Wireless Ethernet devices (based on the IEEE 802.11 standards) have recently become more
available. These include connection devices such as wireless access points (AP) and individual
peripherals, such as printers. Wireless networking devices connect the network by radio waves.
Similar concepts to the wired Ethernet are used to ensure that transmissions don’t conflict
(collisions) and are regulated in some way.
Network devices
Some of the more general types of network devices available are listed in Table 1 on the next
page.
Device Description
Network Often referred to as network interface cards (NICs), they may be installed in
cards a computer or peripheral device and interact with the network medium,
including both wired and wireless networks.
Switches Often switches are used interchangeably with hubs, but they have slightly
different characteristics. The differences will not usually show up as a
performance increase until used in a larger network with multiple servers. A
switch is a better performing device and is only slightly more expensive
than a hub.
Switches operate at layer 2 (data link layer) of the open systems
interconnect—reference model and can make a decision on the destination
of a data packet that they receive. In this way, a switch may send data out to
a port based on the destination media access control (MAC) address that is
included in every frame. In fact, simultaneous data transfer between
computers is possible, which increases overall network capacity.
Device Description
Hubs A hub creates the basic framework for most local area networks used in
business and home environments. They connect the servers, workstations
and other network devices together.
Hubs are also called multi-port repeaters. Hubs work at the OSI open
systems interconnect—reference model Physical (layer 1).
Routers Routers are used to interconnect two or more LANs. The LANs may
communicate through the router or the router may act as a gateway to
connect to the Internet.
Routers operate at Layer 3 (Network layer) of the open systems interconnect
—reference model and make decisions based on the network addresses
which are included in the data packet. In most networks, the network
address will be based on IP addresses but may also include IPX address
information to work with Novell Netware networks.
Access These devices act as a hub in a wireless network and as a connection
points between the wired and wireless network segments in a combined network.
In some configurations, the access point will act as a switch and/or router
and prevent unnecessary data packets from travelling between the wired and
wireless sections of the network. In other configurations, two or more
access points may only act as a repeater (or relay) and connect segments of
a wired LAN, perhaps between buildings or across roads where wired
access would be difficult or expensive to connect.
Broadband These devices connect between a LAN (or single computer) and a
modem/ permanent broadband Internet connection such as ADSL or Cable. Modem
routers versions tend to have USB connections that must connect directly to a
computer. Router versions have an RJ-45 LAN connection and/or a wireless
antenna that may connect to a computer or hub to share Internet access
between many computers.
Printers Many printers are available to connect directly to an Ethernet network.
These include printer with an inbuilt NIC. Examples are of network-ready
printers are: Brother HL-5170DN, Canon IP4000R and Hewlett Packard
DJ6840.
Scanners Some scanners are network-ready and provide access from the network.
Many of these are included in Multi-Function Centres with printer, copying
and fax capabilities as well. Examples are: Brother MFC-620CN, Canon
NSA-01 and Hewlett Packard Photosmart 2710.
Storage These devices offer additional file storage capabilities to a network. They
act as a file server and the storage can be controlled over the network.
Examples of Network Attached Storage devices are: D-Link DSM-624H,
Iomega NAS 100d/160G and Linksys EFG250
Ways of minimising disruption
Internal hardware
Many main system boards come with a network adapter built-in; opening the system unit of a
computer workstation in order to add networking hardware is rarely necessary. You may
otherwise need to add a network card to a system when:
none is built-in to the main system board
replacing or overriding a failed built-in network card
an additional network card is needed for routing purposes
upgrading the network card for one with faster processing.
Regardless of the reasons for installing an internal network card, typical precautions must be
taken. Remember that if the computer is a server of files, printer or other resources on the
network then many people are potentially affected by the outage.
Typical steps to follow when installing a network card, explained in detail to follow, are to:
inform users who will be affected
isolate the system unit by disconnecting the power supply and exterior cables
open the case and take anti-static precautions
identify the location to install card and possibly remove old card
follow manufacturer’s directions
replace case and cables
reconnect the power
install the software drivers, following manufacturer’s instructions.
Informing users
Depending on the system to be opened this may be a single user or a group or everyone.
The only time you do not have to worry about this step is when the system is not working at all
and by working on it, you will restore functionality. If it will take a long time then you still need
to keep people informed of the progress. You can judge the necessity of the progress reports by
the number of people asking you when it will be fixed or even just ‘How’s it going?’
Isolating and disconnecting the unit
You must first isolate the unit for your own safety and that of the equipment and data stored.
Most system units only deal with low voltages within the case (except for the power supply
itself) and safety switches on the mains supply (residual current devices, RCDs) reduce the
chances of electrocution.
The disadvantage of such systems is that the safety switches cover many power points. This
means that if a safety switch trips, many devices and even larger numbers of users will be
affected by the loss of mains power. Disconnection from the supply reduces the possibility of
causing such a power failure. Removing or adding components to a live system may cause
damage to the main board (and potentially larger problems, causing file system damage and data
loss, even application and operating system problems, over a network).
You need to disconnect exterior cables as a further safety practice. Access to the system unit will
be simpler if you can lift the case to a normal work height and into better lighting than found
under most tables. Disconnected cables must then be left out of the way to prevent accidents.
Keep all hardware in its anti-static packaging until ready for installation and keep the anti-static
packaging in contact with an unpainted section of the computer case while removing the
component from packaging. Hardware components removed from the system should be placed in
anti-static packaging while the packaging is in contact with the case, in preparation for storage
and transport.
The additional use of an anti-static (static dissipative) mat will enhance your anti-static working
environment. At client sites this displays your concern for the equipment under your care. Web
links to handling techniques are listed in the Resources section of this Learning Pack.
External hardware
Many devices already come with a network interface installed, such as hubs, printers and storage
devices. You may also choose to install a network interface adapter to an external port, such as
USB (Version 2.0) or FireWire (also known as i.Link or IEEE 1394). The choice of device will
have already been made by this time, so the physical installation is relatively straightforward.
Similarly, the location of the external device and provision of power and suitable network
connections should have been arranged.
Figure 7: Double wall plate with Figure 8: Patch panel showing spare
shuttered sockets and patch cable positions
connected
Figure 9: Hub with patch cable Figure 10: Hub with uplink port in use
Note: The uplink port and the 1X port
cannot both be used at the same time.
In Australia, for patch cables, the colour of the wire’s insulation (in Table 4) and their
interconnection follow the adopted standard is TIA/EIA T568A.
Table 4: Patch cable colours
The connections you produce would resemble those on pages following, shown for:
normal connections with infrastructure (fixed wiring)
normal connections without infrastructure (no fixed wiring)
connecting two devices directly
connecting multiple hubs directly.
Figure 11: Diagram of the network connections used when fixed wiring infrastructure and a wiring cabinet
is available
Figure 12: Diagram of the network connections used when there is no fixed wiring infrastructure available
Figure 13: Diagram of the network connections used when connecting two like devices directly
Figure 14: Diagram showing how two or more hubs may be interconnected either within or outside a
wiring cabinet
Note: Many hubs and switches now come with auto negotiation of the ports as either medium
dependent interface-crossover (MDI-X, normal) or MDI (uplink), this makes it much more fool-
proof to interconnect devices. MDI is an Ethernet port connection that allows network hubs or
switches to connect to other hubs or switches without a null-modem, or crossover cable.
However with the increased ease of interconnection, more care needs to be taken to ensure that
you keep a hierarchical structure to minimise the number of hubs between any two devices on a
LAN to four.
Configuration
Once new hardware is connected, the equipment is then integrated into the existing network or a
new network begins. Integration includes the naming and addressing schemes for the protocols
used on the network, which may be specified by the organisation.
Many new network devices such as routers or switches include a small web-server that allows
you to log in to the device and change settings using a web browser. In this way devices can be
configured using any operating system with a web browser.
When making changes you must keep track of the IP address of the device, if you change it to
suit the network you are working on, you will not be able to connect using the IP address in the
browser address bar. Factory defaults are usually in place for username and password, so at a
minimum the password needs to be changed to prevent unwanted access. There is often a button
to reset factory defaults if the password is lost or forgotten. Unfortunately, this also wipes any
configuration changes, so documenting the settings, including any changes made over time, is
essential. The reset switch also requires the device to be physically secured, to prevent
tampering.
Table 5 outlines the basic configurations added network hardware.
If any settings were modified at the start of the installation phase then these need to be
reconfigured to their original settings, or to new settings if they are affected by the changes you
have made.
Many ADSL routers now incorporate a DHCP server so smaller networks are using dynamic IP
addressing. The DHCP server also allocates the configuration details for accessing the Internet
through the router, making re-configuration and Internet access easy.
To set the IP address as either static
or dynamic as per organisational policy and
standards you must:
Login with an administrator level
account.
Select Start then select the My
Network Places option.
In Network Tasks on the left select
View network connections if they
are not currently shown.
In the right panel under the LAN or
High-Speed Internet section right-
click the Local Area Connection
and select Properties from the pop-
up menu to display the following
dialog.
You may need to scroll down the
Figure 15: Local Area Connection Properties
Protocols and Clients list to view
the Internet Protocol (TCP/IP) item.
Select this and click on the
Properties button.
For dynamic IP addressing select
both the Obtain an IP address
automatically and Obtain DNS
server address automatically, as in
Figure 16.
Figure 17: Setting for static IP addressing For Static IP addresses you need to
(substitute values for your own network and set all of the information except an
Internet service provider)
Alternate DNS server in order to
access the Internet, as in Figure 17.
You need to set the computer name of all the computers in your network. This allows you to
organise how the network interacts with various devices and also allows shares to be re-shared
from a central source such as a server.
Setting the computer name
To change the computer’s name to
conform to organisational policy and
standards you must:
Login with an administrator level
account.
Select Start then right-click on the
My Computer option.
From the pop-up menu select
Properties.
Click on the Computer Name tab of
the dialog. You should have a
dialog like that in Figure 18.
Click on the Change button to
show the Computer Name Changes
dialog in Figure 19.
Now that everything is in place as planned, you must undertake a systematic (if not complete)
test of the network system.
You must confirm that the network functions as designed.
Can users login? Note that the questions
Can users reach the server to store and start with ‘Can users…’
retrieve files? You might be able to do
these things while
Can users run applications that need
logged on as an
access to the server?
administrator, but the
Can users print to all of the printers they test is ‘regular users’,
should have access to? probably with more
restrictive accounts.
Can users reach the Internet?
You should have a checklist available with the functions you will test and the expected outcomes
of the test. Leave room for comments, which allows you to log the actual results, problems and
solutions.
It is impractical to test every login account and every function on every workstation. You need to
access all combinations of user groups and functionality with at least one network function from
each workstation. This ensures that all devices are physically connected to the network and that
group based policies and scripts are working. This only leaves doubt about a few possible non-
standard (often undocumented) modifications that exist in an existing network system. These
will be highlighted by help desk calls and allow them to be integrated into the standard system or
documented properly as exceptions if they are really necessary.
Table 6 on the next page has a sample checklist. Note the testing is planned to cover all the
workstations and both the sales and admin groups. Access to the H: drive, Internet and both
printers is confirmed from each group.
Table 6: Sample checklist
Identify requirements
Hardware
Network
Security
Determine IP
Database
Document
File
Summary
In this reading you have briefly considered the Ethernet protocol, the ISO reference model and
some of the broad range of network devices Ethernet supports, before some general notes on
ways of minimising disruption to clients when installing and configuring hardware devices.
A look at safe and professional installation procedures covered those involved for internal and
external hardware. Basic device configurations were outlined for setting IP address and computer
names, before testing was discussed, with the use of the ping command to test the connectivity of
network devices.
Remember that no installation should be done without first checking with the people who may be
affected; have plans for configuration and testing, and contingency plans in the event of failure.
Care also needs to be taken to keep things safe during the installation since business may be
continuing while you are working.
Before you begin installing server hardware or software you need a plan. Some installations have
evolved into a simple task, based on user-friendly menus—they may not require any real
technical knowledge; but what about the existing IT and network environment? It may be very
tempting to get in and start installing without an approved plan because you think you’ll save
time. Yet an installation can interfere with or even stop other network hardware, services or
applications from working, and your working without a plan is tantamount to working blind.
Installation plans and the schedules ensure that disruptions to business operations are kept to a
minimum and that issues of installation requirements, interoperability and compatibility are all
addressed.
Before commencing installation of server hardware or software you should:
Review the user requirements
Review the installation plan
Review and confirm the existing IT environment
Confirm the availability of required resources and materials
Review technical tasks (for installation and configuration)
Review the testing tasks
Review deployment task
Confirm scheduling and communications
Review all contingency plans.
All these items are considered in detail to follow.
Review tasks
Tasks define what you are required to do and how to do it. You will need to draw upon your IT
knowledge and skills to review individual tasks and confirm they are technically correct and
properly sequenced. Generally, the order of tasks for an installation will be as set out in Table 1.
You need to review tasks to ensure that they are ordered correctly and that you are aware of any
dependencies between tasks. For example you may need to perform a data backup before starting
a configuration task.
You should also confirm that tasks are technically accurate. You may want to research and
practice tasks that are new to you. For example, if you have no experience of installing an
additional hard disk in a Linux server, you might obtain vendor instructions to install and
configure the disk and perform the task on a test computer, away from the client’s IT
environment.
By reviewing the tasks in an installation plan you make yourself familiar with what you need to
do, before you do it. You will be able to undertake the tasks with confidence and without
wondering what comes next.
Scheduling and communication
A part of knowing what to do and when to do it is the need to confirm the start and end date and
duration of tasks and activities (the schedule). You also need to confirm schedules to confirm
resource availability.
Scheduling is usually approved by organisational management, an appropriately authorised
person or end user groups, and broadly overseeing it can be the responsibility of a project
manager.
All parties involved in an installation need to be informed of the schedule and of any impact on
normal business operations must be clearly communicated. For example, the users of a corporate
database may require five working days notice before any work on the database can start.
Some of the most fundamental parts of communication can sometimes be overlooked—always
confirm your installation plan, and the schedule for it, are approved before you begin.
Installation means to place computer hardware or software in place, ready for use. Once you
have reviewed the installation plan, confirmed the scheduling and are familiar with the task, you
can start. To follow are some specific considerations for server hardware and software
installation.
To install server hardware you will need to follow the installation plan along with any vendor or
manufacturer’s instructions. Generally you will need to:
Unpack new hardware and/or assemble server hardware
Site or mount the server hardware
Power on server hardware
Run hardware diagnostics.
Remote installation
Remote installation is when the operating system software is installed by remote access from
another computer on the network. This also means that your server hardware does not require a
local keyboard, mouse and monitor and you do not need to physically attend to perform the
installation. The Mac OSX Server – Remote Installation option is an example of this. (For
applications software: using either the server operating system features or third-party remote
control software, the server is accessed from a remote location and the application or other
software installed, again without physically visiting the server. This method may also use
application packaging and delivery technology.)
Image installation
Image installation uses hard disk imaging to install the operating system on to the server
hardware. It may be performed locally or remotely and ensures consistent and identical
installations. Installation by disk imaging is much quicker than other methods. However, the
initial image creation may be time-consuming as a manual installation on server hardware is
usually required to create the initial disk image for installation on other servers.
Once the server operating system is installed it must be configured.
Application software installation
Application or other software is installed on the server only after the server operating system is
configured and tested. Other software and can be installed by manual, automated and remote
installation (as described above).
Configuring server hardware and
software
Configuring server hardware and software means setting up the way the hardware and software
operates to suit the IT environment and organisational or user requirements.
Generally, server hardware is configured before the server operating system is installed, or
afterwards if hardware components in an operating server are being changed or added. Software
may be configured when installed, as part of the installation process, or afterwards, if a default
installation has been performed.
Some specific considerations for configuring server hardware and software configuration follow.
Storage
Options like the hardware redundant array of independent disks (RAID), the system which uses
multiple hard drives to share or replicate data among the drives, are configured independently of
operating systems. You may need to configure RAID options and logical volumes. You may be
using remote storage with special adapter cards that may need configuration.
Boot sequences
A boot sequence is the set of operations the computer performs when it is switched on which
load an operating system. Usually you have the option to select boot orders such as network, CD,
which hard disk and so forth. The Intel WFM (Wired for Management) options may need to be
set.
Specific device configurations
Things like the addresses for small computer system interface (SCSI), which is a standard
interface and command set for transferring data between devices on both internal and external
computer buses, may need to be set on old SCSI devices. Generally bus, port, interrupt request
(IRQ) and other settings are usually automatically determined for you with current server
hardware. There may be external devices (for example tape drives) that require hardware
configuring to connect to the main server hardware.
Redundant components
Hardware such as that for standby power supplies or network adaptors may need configuration.
You may need to consult the hardware manufacturer or vendor for information and configuration
instructions.
Once a server has been installed and configured you need to ensure it will operate as expected
and will meet client requirements. Basic hardware testing should have been done on installation.
You now need to test the combination of server hardware and server software before the server is
made available for use.
It is important that you know what the expected results of a test should be. If the actual results do
not match those expected, the test for the selected function and item has failed. This failure is
known as a defect or deficiency that will need to be rectified. Defects or deficiencies can be rated
in terms of severity or importance and this can help you create a priority list of defects to rectify.
Once you have rectified a deficiency or defect you need to redo the failed test to confirm the test
is passed.
After testing
A new server should be free of defects or deficiencies before it is put into production. Results of
the testing process should be documented, and documentation then reviewed and analysed to
confirm that all required testing is complete and that all defects and deficiencies are resolved.
In some cases that documentation (along with other information) may need to be presented to
confirm the results of the user acceptance tests, so to authorise the next step of deployment or
placing the server into production. Clients can also decide to deploy or implement the server with
minor defects or deficiencies, if that a plan exists to rectify them, especially if there is a need to
implement the server quickly.
Deployment and implementation
Deploying of implementing the server means making it available for use in a working
environment. How you deploy the new server will depend on the existing IT environment and
whether the server is a completely new installation or a replacement or addition for an existing
server. You may need to test your deployment methods in conjunction with your server testing.
To follow are some considerations for deployment. The method you use may affect how you
undertake server testing prior to deployment.
New servers
Deploying new servers is generally a simple process because you are implementing all new
services. The server is usually connected to the production network and existing client computers
connect and use the new server, depending on its configured role.
There may be a need to install client software or reconfigure client computers to enable use of
the new server. This type of activity should have been included in the installation plan and
testing of client software and client connections would be done before deployment.
For example, if you deploy a new dynamic host configuration protocol (DHCP) server in a
network where client computers have static Internet protocol (IP) addresses, you need to
reconfigure client computers to dynamic IP addressing. You could use the following options:
connect the new server to the production network, then
visit each client computer to manually reconfigure or
employ remote access technology (like Altiris, RDP) to reconfigure each computer, or
create an executable configuration file that is sent to the computer and the user executes.
In the above example, connecting the server to the network was the easy part of the deployment.
Parallel implementation
Parallel implementation takes place where the old server and software run alongside the new
server and software. This is done for a period of time to ensure any problems not detected in the
prior testing phase are resolved. The old server and software are then terminated either abruptly
or phased out.
This method allows the organisation to keep functioning as normal, and it also allows much more
time for the users to become familiar with the new software. The disadvantage is that it is costly
and time consuming for the users to run both operating systems and applications simultaneously.
(To counter that disadvantage, a small group or section may pilot the proposed changes, as
below.)
Abrupt implementation
Abrupt implementation is when the old server and software are completely removed and the new
server and software put in place immediately. It requires no transition costs and is very fast, yet
there is the risk of costly data loss if the new system fails, or if existing data is not correctly
transferred to the new server. Operations can be seriously disrupted if this happens, or if the
users have not been adequately trained (with abrupt implementation users are under a lot of
pressure to learn the system before the change over).
Phased implementation
Phased implementation is used with larger applications that can be broken down and installed
separately at different times. An example of a phased implementation could be a server
providing an accounting application, with the accounts receivable, accounts payable, general
ledger and payroll modules all installed separately in phases with the new operating system. If
something does not work it may be only the (general ledger) that has problems or, since the
(general ledger) has just been installed, it can be quickly identified as the cause of other
problems.
Pilot implementation
Pilot implementation is where the new server and software are installed and used by one
department in the organisation, to be tested. Once this pilot site is working as expected, other
departments convert, using one of the above mentioned deployment methods.
It is wise to have a phased implementation process. This may include the following steps:
Backing up important data in case there is a problem during installation
Selecting a sample area to use the new server and software first. Document any problems
and considerations that arise from this ‘pilot site’.
Break up the installation into smaller, more manageable units.
Plan the installation timetable to cover different sections.
Alert staff to the planned installation and training.
Regardless of implementation method, deployment should be addressed in the installation plan
and not run as an ad hoc process at the end of an installation.
In this reading you’ve considered the importance of having a well developed installation plan,
which is also used after installation to judge effectiveness and to check that user requirements
have been met.
You looked at preparatory work including the need to review user requirements and the
installation plan before an installation begins (including review and survey of the existing IT
environment). Considerations and issues related to the installation of hardware and software and
its configuration were outlined. The process of testing was then discussed, followed by a
summary of methods of deployment and implementation.
Planning is the first step and foundation of any project. Planning requires thinking about what
you need to achieve. Having clear goals or outcomes is a starting point to knowing exactly what
must be done. You can then decide a sequence of activities to meet those goals, and assign
resources and timelines to each task and to the project as a whole.
Planning is the key to a successful installation. Installing a new file server, upgrading old
network hubs, or installing software on a network, all need an installation plan. While the details
and activities are different in each case, the steps in developing a plan are the same.
Smart installation plans, most importantly, help avoid disrupting business. Without good
planning you may need to reinstall components due to missing information or have unforseen
compatibly issues. While formulating a plan may take time, it will also save you time, not to
mention money, reputation, goodwill and even lost sleep, in the long run.
Task sequences
Generally, the sequence of tasks for an installation will be:
Procurement of resources
Installation
Configuring
Testing and evaluation
Implementation into the production environment
Contingency plans
Post implementation review.
Tasks can be simplified or broken down into a number of sub tasks. For example the task
‘procure server equipment’ can be broken down into the clearly defined sub tasks of:
Obtain quote from preferred supplier for a HP Compaq DL360 Server (duration one day).
Submit quote to Finance department for approval and the raising of a purchase order
(duration four days).
Send purchase order to supplier with delivery instructions (duration four weeks for
delivery).
Accept delivery of server, check contents of package for correct items and advise finance
department that purchase order has been filled (duration two hours).
Each sub task clearly states what is to be done and the time to complete it. This time will be an
estimate based on your experience or based on tasks in similar installation projects.
Allocating resources
Resources to complete an installation include people to do the work (as above), tools, equipment
and finance. The installation plan must clearly state what resources are needed. You will have
worked out exactly what those resources are by dividing general activities into individual tasks
and costing the time required to do them plus materials and equipment.
The costs you work out will also be determined by organisational constraints. A major constraint
may be the budget—what can the organisation afford? There may be a number of options given
how much money is available in the budget.
An organisation may also have policies for purchasing (such as where to buy equipment) and
staff procurement (such as bringing contractors in).
Staffing can affect both resources and timelines—for example two people may be able to install
computer cables in less time than one.
If a new computer system or software is installed, the users of the new system may need training
or instruction. You need to ask yourself if that training or instruction can take place before,
during or after the installation.
Contingency plans
Even the best-made plans can fail. Unforseen events or circumstances may thwart a successful
installation.
Contingency plans for the whole installation and for parts of the process can limit the affect of
failure on business operations. They may be plans for staff, in case of sickness, plans for other
suppliers in the event of non-delivery, or implementation plans to ensure that business operations
are not disrupted in the event of failure while installing, configuring or testing.
For example the objective may be to install a new network database. Should the installation fail,
the business may be left with no database or corrupt records in a new version. Any business
would find it difficult to operate without its database. The contingency plans may include:
having the business work from back-ups of the old database in the event of failure—
having backed-up to another networked computer and testing that version to ensure data
validity and access
doing the installation on the weekend and allowing for time before start of business on
Monday to fix any problems
having a technical support person from the database vendor on call for technical support
via phone during the installation.
Notes on installing network software
All software applications have minimum system requirements for the server or PC processor,
amount of RAM, and available hard disk space. Network software will also have requirements
related to bandwidth, protocol and the network file system. You need to verify these are met
prior to installation.
You need also to ensure the organisation has licenses for software to be installed, and that all
terms and conditions of the license are adhered to, such as the number of clients that can use the
software. You should record any serial numbers or product keys required during the installation.
Installation methods
Knowing the various methods used to install network software will help you develop the
required tasks in the installation plan. The method used will depend on the existing network
environment and resources, including the budget.
Remote deployment
The term ‘deployment’ refers to the distribution of software to end users. Remote deployment
usually involves ‘packaging’ the software. The software is first manually installed on a test
computer and configured as required. The resulting changes (new files, folders, changed files and
registry entries) made by the installation and configuration of the software are recorded and
become the packaged software. This package can then be delivered and written to other
computers on the network.
Other remote deployment methods use hard disk imaging to create disk images of a computer
with the installed software. This disk image may be deployed to other computers creating a
standard environment and reducing the time required to install software.
In these ways, networked computers can have software delivered, installed and remotely
configured (if needs be) from a central location without user intervention or technical staff
visiting target computers.
Remote deployment and management can be a part of a network operating system, for example
Microsoft Remote Installation Server (RIS) and System Management Server (SMS). Third party
software such as ZenWorks (for windows and Linux), Alteris and Symantec Ghost provide
remote desktop management, imaging and software deployment.
Hardware, of course, cannot be installed remotely. Someone must physically connect it—while
once installed, computer and network hardware can usually be remotely configured.
Network hardware
In planning an installation you need to identify existing hardware. Computer hardware broadly
categorised into network infrastructure is as follows.
Switches providing connection ports for devices to connect to the network.
Routers providing the correct data paths and IP addressing between devices connected to
the network.
Connectivity devices and media providing the physical path for a data signal to travel
along. It includes all physical cabling like UTP and optical fibre and also devices that
convert a data signal to travel along different media, such as wireless transceivers.
Storage provides a location on the network where data can be stored. This includes hard
disks, magnetic tape and optical storage devices that are attached to the network but not
directly attached to specific computers.
Servers provide the network services such as domain name system (DNS) and dynamic
host configuration protocol (DHCP), or applications for users such as email.
Workstations and terminals provide the user interface.
Installation planning
When developing an installation plan you need to apply what you know about network hardware.
You also need to be able to find appropriate information and people with the required skills for
the installation. Your installation plan will indicate who has responsibility for what part of the
installation.
When planning a hardware installation, consider the points in Table 1 on the next page.
The planning of your installation is important to minimise the disruption to the client and ensure
a successful outcome for all concerned.
You will need to work closely with your client to ensure you meet their requirements. Making
sure you provide all the mandatory information that is required in an advance installation plan
will ensure you have taken all the necessary steps to give your installation the best chance of
success.
Developing a good installation plan is usually the most difficult part of any project. If it’s done
well, implementing the plan should be a simple task.
Reading: Install and test network
software
The installation
Once the planning is complete, the actual task of installation can be very boring. You often just
load the CD-ROM, answer a few questions and off it goes. The supplier may try to make the
activity a bit more interesting by showing you a progress bar or by giving you screens of
advertisements that tell you all the great features of the product.
However, there are a few issues that are important and will impact on the planning and
implementation of the installation process. For the home user the installation process is normally
from a CD to a single computer. In a business environment there may be several decisions to be
made especially if the software being installed or upgraded is an operating system and there are
many users.
How software will be installed in a network will depend upon:
Software installation requirements. Does the software need to be installed in a certain
way?
Software configuration requirements. Is the software configured globally or are settings
required for each individual user or installation.
Network environment, including the types of hardware, number of users, network
connections, bandwidth, and so on.
Resources available for software installation. What people, skills, tools and budget are
available to install the software?
Organisational requirements and constraints. Are there deadline dates to have the
software installed? Can any disruptions to business operations be allowed?
The software evaluation process and the installation planning process should have included a
process for testing the installed software. Software is usually evaluated before it is installed in a
working network. Testing in the evaluation process is essential to determine if the software
meets the organisational and business requirements. This type of testing may include estimating,
testing and reviewing things like:
Disruption to business operations during installation
Time, resources and budget required for complete installation
Technical performance of installed software in a network environment
Functional test as per requirement statement
Security testing and backup
Ongoing maintenance procedures
Evaluation testing is usually conducted by installing software on an isolated network that
replicates the production network as best as possible. This ensures that there is not possibility of
disrupting the working network. The installation of the software will test and confirm
installation requirements and what installation method works best. Technical testing is then
conducted looking at things like transaction speeds, response times, interoperability with existing
software and operating systems, impact on network bandwidth and so on. Functional testing is
also conducted. This looks at the software features, user interfaces, how the users actually use
the software and how it will fit into existing business processes.
Thorough testing will highlight software deficiencies. These deficiencies may be referred to the
software vendor who may be able to provide solutions or rectifications. Any solution or
rectification should be tested to confirm it does what it claims to do.
The results from evaluation testing are used to determine if the software meets the business
requirements. If it does a pilot or test installation should be undertaken.
A pilot or test installation is undertaken to ensure that the installation methods work as expected
(proof of concept) and that the installed software will work as expected in the production
network. A pilot installation involves selecting a small section of the working network where
you will install the software. This may be a couple of couple of computers for a small network
up to an entire department for a large organisation. This installation will test your installation
methods as planned in the working network.
Once the pilot installation is complete, testing using specific criteria should be conducted before
rolling out of the software for the rest of the organisation. The test criteria are based upon the
organisational requirements for the installation. The main criteria will be things like disruption
to the network during the installation, time required for installation, resources required for the
installation. The functional and technical tests results are compared to that expected and
determined by the evaluation testing.
Following the pilot installation testing and reviewing, any necessary changes should be made to
installation plan before moving forward with the software deployment on the entire network.
Once this is done software can be rolled out across the entire network. With the software
installed, final testing can occur. This is usually termed ‘acceptance testing’ and is performed by
both technical staff and the users of the software. The purpose of this testing is to ensure that the
installed software performs as expected by the user – that is, the user accepts the software
installation is complete with no problems.
Documentation
Documentation is the most import thing to be done following the installation of software on a
network. This makes our job as network and system administrators much easier and not so
taxing on the memory.
The documentation for the installation should contain:
Software description including serial and licensing details and media storage location
along with any maintenance agreements or contracts.
Inventory of install locations (number of computers and location)
Detailed method for the installation including how the deployment package was created,
and how to perform the installation. Of course, the deployment packages used should be
kept in a secure location specified in these instructions.
Software configuration details. This may include screen shots of configuration options.
Change management history for changes in configuration or installation locations, or
methods.
Detailed instructions for any required preventative or scheduled maintenance.
This documentation remains in the organisation and is used as a reference should there be a need
for any configuration changes or installation of the software on new or additional computers.
Summary
It’s tempting to just rush in and install software if we are short of time or under pressure to get
things done. However without a proper plan and knowledge of software installation methods,
installation may take longer and have adverse effects upon business operations.
The practical installation of network software involves an initial test or pilot installation with
testing and review of the process and outcomes. This will reduce potential problems with
network software roll out across an organisation.
Documenting the installation process is required to maintain the network software. This
becomes a reference for any future installation or configuration changes.
Evaluate network security status
Network Security
What is network security? Before we can evaluate the status of network security we need to
understand what network security is.
Security refers to the measures taken to protect certain things or elements of information. There
are three main elements.
Confidentiality
This means keeping information secret and safe. It means controlling access to information so
that only the people with authorisation will access the information. No one else should have
access to the information.
With Network Security this means keeping all information stored in a network environment
confidential and safe. This means keeping unauthorised people off the network and preventing
them from browsing around and accessing thing they have no authority to access.
Integrity
This refers to the correctness of information. It means making sure that the information is kept as
it should be and not altered or changed by unauthorised people. It also means protecting the
information from changes or corruption by other things like system or program failures or
external events.
With Network Security this means keeping all information stored in a network environment as it
should be. Information includes user generated data, programs, computer services and processes
(email, DNS, etc). This means protecting information from unauthorised changes and deletion by
people, network devices or external influences.
Availability
This refers to the ability to access and use information. It means making sure that the information
can be accessed whenever it’s required. If information is not available it is useless.
With Network Security this means keeping all information stored in a network environment
ready and accessible to those who need it when they need it. Information includes user-generated
data, programs, computer services and processes (email, word processing application, etc).
Evaluating Network Security Status
Knowing what network security refers to means we now know what to look for when assessing a
network. We need to look at what measures are in place to ensure that the confidentiality,
integrity and availability of network data, applications, services and processes are maintained to
the organisation’s requirements.
Threats
Threats are actions or events that could occur to compromise an organisations network security.
The threat will compromise confidentiality, integrity and/or availability of network information.
People or organisations that have possible access to the network may present threats. Threats
may be presented by people or organisations that have some reason for compromising network
security and have the knowledge and resources to pose a threat. Some examples of threats could
be hackers gaining access to confidential files, or a disgruntled employee deleting corporate data,
or virus infections corrupting data. Joy riders also pose a threat. They have no particular reason
for gaining access except for the challenge and a bit of fun or perhaps prestige within their peer
group.
Threats may also arise through circumstance. For example using second hand or old hardware
may pose a threat to network security.
Vulnerability
This refers to potential ways or avenues that could be used to compromise network security. For
a network to be vulnerable it must be accessed in some way. For example, Internet connection,
user workstations, wireless access via user laptops are all means of accessing the network. All
these access points use various systems such as firewall, computer operating systems,
transmission protocols to authenticate and authorise network access. Various methods can be
used to gain unauthorised access if vulnerabilities exist in the systems.
Operating system bugs, shortcomings in the authentication mechanism, and no security checks
for people entering the workplace are examples of vulnerabilities.
Countermeasures
Countermeasures are used to reduce the level of vulnerability in the organisation. They can be
physical devices, software, policies and procedures. Examples of countermeasures include
firewalls, antivirus software and security guards checking employee IDs as they enter the
building. In most cases, countermeasures are implemented at network access points or where the
vulnerability exists.
Impact
Impact means what will happen to the organisation if a threat actually happened. The
consequence of a threat occurring is usually measured in financial terms because the result may
be loss of business productivity, stolen equipment replacements and repairs, costs for
investigation and expert contractors. Other consequences may be damage to reputation, loss of
business or time and resource related.
Assessing impact can be an involved process and a topic in its self. However, in brief terms,
assessment is usually done by identifying systems or resources in the organisation. Then by
analysing usage patterns, business processes and work flow the importance of a system can be
determined. Finally, with user and management questionnaires, analysis of usage, business
processes and workflow, the consequence of the system or resource being unavailable or
compromised can be determined in financial and other terms.
Likelihood
Likelihood refers to the probability of an event occurring. Whether an event is likely to occur
depends upon a number of factors such as degree of technical difficulty and knowledge required
to cause the event, potential gain to the perpetrators and opportunity. Countermeasures reduce
the likelihood of occurrence. For example procedures ensuring that operating systems have the
latest security patches installed will reduce the likelihood of hackers compromising the system.
Risk
Risk refers to the potential or possibility for some form of loss. With network security this means
loss of confidentiality, integrity and/or availability of information or services. Risk is determined
directly by threats and vulnerabilities. For there to be a risk, a threat AND some vulnerability
must exist.
For example virus infection may compromise the integrity of information on a network. The
vulnerability or ways virus infection can occur may include the using of CDs or disks from
outside the organisation on local network computers. In this case a risk exists. If a
countermeasure or mitigation strategy such as using diskless workstations was employed, users
could not use external media. This means that there is no vulnerability and therefore no risk.
However, another vulnerability associated with virus threats may be the network’s Internet
connection. So the risk of virus infection via the Internet may exist depending upon firewall and
antivirus countermeasures employed.
Evaluate Findings
Once we have completed the task of looking for risks and checking configurations, we need to
compile our findings and determine if any improvements or changes are needed.
We need to record the findings for each of the systems or network components we reviewed. In
summary, these were the things listed in the 'Looking for Threats and Vulnerabilities' section
above.
Using a table can help you evaluate your findings. Once you have listed your findings you need
to consider what issues or concerns result from your findings. These concerns may become
threats and risks. From the concerns and issues consider what you can do to remove the issue or
concern.
Take a look at the sample Risk Evaluation table on the next page. Note: You can also download
this table as a separate document from the Reading section of this online learning pack.
Table: Sample Risk Evaluation table.
System or Results and findings Concerns or Issues Recommended Action
Network
Component
Identify the Physical environment (Example: Anyone can walk (Example: Lock the
network
system or in and access the computer computer room and only
(List here your findings
component and console. They could copy authorised people have
about the physical security
or delete information and keys)
of the system)
damage the hardware)
(Example:
(Example: insecure
Finance
computer room)
database server,
windows 2000)
Quantifying Risk
We know that risk is the result of threats and vulnerabilities, but how do we measure the risk?
One useful way is to scale risks based on impact and likelihood. Using this method
organisational management can identify the most likely and most damaging risks.
Consider table on the following page. Risk is calculated by multiplication of impact and
likelihood. Risk is now scaled between 0=no risk and 25= extreme risk. (Note: You can also
download this table as a separate document from the Reading section of this online learning
pack)
Threat Vulnerability Impac Likeli Risk Comments Possible Countermeasures
t hood Factor and Mitigation Strategy
0-5 0-5 0-25
In the above example both impact and likelihood are equally weighted. If an organisation is only
concerned with impact, then likelihood may use a smaller scale or not be used at all to calculate
the risk factor.
It is a management decision to accept the risk with consequences and potential cost to the
organisation. The alternative is to implement countermeasures or mitigation strategies to reduce
the impact or likelihood. These measures usually come at a cost and management need to decide
if they wish to spend potentially lots of money to prevent something that is unlikely to occur.
Prepare Report
As mentioned, your risk assessment findings must be presented using clear documentation. The
report presented to management regarding the status of network security should include:
Your summary of concerns and recommendation in plain English
Summary of findings should include your main concerns, possible consequences and
current network security compliance with existing organisation policy and standards
Recommendations need to include implementation costs, resources required, time
required, potential impact on continuing business or systems access.
A risk summary table including impact and likelihood (weighted if required)
Your methods of evaluation and investigation of network security status.
Any other relevant supporting documentation.
As an IT professional, management will be relying on your skills and judgement in presenting a
clear picture of the current network security status. Key points to remember here is that
management want to know if the organisation is exposed to potential risk, what is really at risk
and how much it will cost in financial terms, time and material to mitigate the risk.
As IT professionals, some times we may not look at the big picture and think in technical terms.
What you present must be understood by non technical people so that they can make valid and
justifiable business decisions using your information.
Summary
There is a lot of hype about network security and with it comes the potential to spend big dollars
in securing a network. We now know how to assess and evaluate the status of network security
by identifying real and valid threats. Without vulnerabilities to the threat there is no risk to
network security.
We have learnt that there must be some form of access to the network for security breeches to
occur. Evaluating network security means looking at the individual components that make up the
network, investigating how they are accessed specifically looking for vulnerabilities in
confidentiality, integrity and availability. Third party security evaluation tools are a most useful
resource when used in conjunction with our other findings to formulate recommendations.
Most importantly, our findings need to be interpreted and presented in a meaningful way with
recommendations that are easily understood. Management make decisions on acceptable risk not
administrators.
Notes
User Access
You’ve probably heard someone say that the most secure system is the one that has no users! It is
probably also one of the most useless systems. We do want our users to access the system; it’s
just that we want them to have the appropriate access.
The control of user access can take many forms and apply at several levels. Once a computer is
physically accessed, the user usually logs on to gain access to applications. These applications
will access data in files and folders.
We can simplify the process down to 3 things.
Physical access
Authentication
Authorisation
Physical access
The first layer of management and security is the physical access to the computer. To prevent
unauthorised access, a company may make use of:
locks on the front doors
locks on each floor
locks on offices, etc
security guards
cameras
keys on computer systems.
Only those who have permission and keys will be able to access a computer in the company’s
premises. The Internet, however, presents issues concerning access to corporate information or
systems because physical restrictions cannot be imposed.
Authentication
Authentication is the process of verifying the identity of people who are attempting to access the
network or system. Typically, a user identifies themself to the system, then is required to provide
a second piece of information to prove their identity. This information is only known by the user
or can only be produced by the user.
The most common method used to authenticate users is the Username and Password method.
Using this method a user identifies itself with a username. They are then prompted for a
password. The combination of name and password are then compared by the system to its data
on configured users and if the combination matches the system’s data information the user is
granted access.
Other authentication methods include:
Username with static passwords—the password stays the same untill changed by the user
at some time
Usernames with dynamic passwords—the password is constantly changed by a password
generator synchronised with the user and system.
Other challenge response systems—this may involve PINs, questions to the user
requiring various answers or actions
Certificate Based—this requires the user to have an electronic certificate or token. This
may also need to be digitally signed by a trusted authority. Kerberos is an example.
Physical devices—these include the use of smartcards and biometrics. Generally the
entire authentication process occurs on the local workstation, thus eliminating the need
for a special server.
Whatever method is used is determined by the organisational policy and security requirements.
Identity Management
In large organisations there may be thousands of users for a network. These users could be
employees, contractors, partners, vendors and customers. Being able to identify and manage each
of these users is most important because each user has different requirements and levels of
access.
This information is managed using either the Network Operating System, Directory Services or
specialised Identity Management Software. Essentially, all of these use a central repository or
database that contains all the user information and credentials. This presents a single location for
all applications and services to use when authenticating users as required.
Authorisation
Once a user has been authenticated (that is their identity validated) they are granted access to the
network or system. For the user to then access data or an application or execute some task or
command they need be authorised to do so. The authorisation process determines what the user
can do on the network. In other words it enforces the organisation policy as applicable to the
user.
The Network and System administrators are responsible for the technical configuration of
network operating systems, directory services and applications. Part of the configuration includes
security settings that authorise user access. The administrators use an organisational policy to
determine these settings.
User Authorisations
Once again, organisational policy and procedures provide the necessary information for the
administrators. There should be procedures in place that inform the appropriate people that a
person requires a new user account or changes to an existing account or a deletion of accounts.
The notification procedure should cover circumstances such as new employees joining the
organisation, employees changing positions in the organisation and employees leaving the
organisation. These notifications must come from authorised people in the organisation
(managers, etc) as stated in the policy and procedures.
Notifications also need to specify what information, data, resources etc the account is permitted
to access. The request for access must be authorised by an appropriate person in the organisation
(usually department managers). The access permissions for users should be carefully planned
and determined in writing by appropriate people who have the authority to allocate the access.
Procedures should address:
which managers can authorise a new user
standards for user id and passwords
groups that users can belong to and authority required for each group
basic accesses that all users are allowed
authorisation requirements to access sensitive data
application accesses
ability to install additional software
email and Internet accesses
special accesses that may be required.
Summary
How user accounts are managed is principally determined by organisational policy.
Administrators need to use policies and procedures to determine how to configure accounts and
how to set appropriate access permissions to application and data.
Once accounts are established, again policies and procedures will clearly define how the
accounts will be managed with regard to changes, disabling and
General Comment
Session plan
Operation sheet
Self check
Lap test