Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The Case Study Company Name: Anzac Airport Anzac Airport is a small private airport which provides passenger and freight services for local clients and businesses.

The Case Study

Company Name: Anzac Airport

Anzac Airport is a small private airport which provides passenger and freight services for local clients and businesses. Anzac Airport must be compliant with all commonwealth and state laws and regulations regarding airport facilities and operations. The organizational structure of Anzac Airport consists of three departments which support five areas of operational activity: Administration, Information and Technology, Security, Finance, and Airport Operations.

The Information Technology team is under the Information and Technology department. They currently spend 80% to 90% of their time dealing with a constant stream of desktop support issues.

20XX IT Budget

Staff salaries and professional development $230,000

Hardware purchases $140,000

Software Purchases $140,000

There is some flexibility in this budget but the overall budget of $510,000 for the year must be met.

Responsibilities of the Information Technology department

  • Internet access
  • Wi-Fi
  • Voice over IP
  • Local Area Networks
  • Desktop computers in administration offices
  • Video conference facilities
  • Corporate information systems: Payroll, Email, Personnel, Records management
  • Security physical and systems

Current Configuration:

  • There are no servers, only peer-to-peer networks
  • Wired LAN is 10/100 Ethernet with an ad-hoc topology
  • The storage of files on staff computers is unstable and unreliable
  • The desktop computers in the admin areas have several different operating systems installed
  • The company pays an Internet service provider to host web services
  • Staff members use email rarely; all mailboxes are at internet sites
  • The internet works for admin staff only. Wi-Fi is used by IT staff only
  • One member of the IT team has been experimenting with VOIP but no implementation yet

Business Needs:

  • The CEO is concerned that the old technology is costing them money and has decided that it is time to upgrade
  • The IT Manager has stated that the company wants to introduce a Microsoft LAN for administration staff and customers
  • Full wireless integration
  • On-site web and email services
  • Web services and network administration to run on a Intel/Linux server
  • Directory services and email to run on an Intel/Microsoft server
  • An additional $20,000 has been allocated for network improvements
  • The IT team has been asked to devise a strategic plan for growth of the IT infrastructure
  • The new IT infrastructure must be based on clearly defined business requirements

Technical Requirements:

  • The clients are currently using a peer-to-peer network design which needs to be replaced by an up-to-date Ethernet client/server network
  • Many staff members complain that the peer-to-peer network is too slow, the network needs to be more reliable
  • The CEO has stated that she wants State-of-the-art technology on every desk
  • The company has purchased a new software package for running accounts receivable and accounts payable which needs to be made available to members of the Administration and Finance departments
  • Error messages on desktop workstations suggest that memory and disk upgrades are needed
  • All Microsoft operating systems on both servers and workstations need to be upgraded to current versions
  • The proposed server & network must be agile and redundant (easily recoverable think server clustering)
  • Linux servers are to be introduced into the network and fully integrated so that Microsoft and Linux systems can share disk resources
  • Single-sign on authentication must be configured so that anyone logging on to the network will be able to access both Microsoft and Linux resources.

Company Policies:

  1. Anzac Airports commitment to professionalism, ethical practices, equity and social accountability implies a duty of care in relation to the use of information resources. Finite resources are applied to information facilities, and their use for business purposes must not be diminished by use for other purposes. Anzac Airport also values its reputation, including that which is conveyed on information networks. Therefore we are committed to procedures which:
    1. monitor the quality of information on computer networks
    2. make users aware of company policy on the use of information resources
    3. lead to action arising from such monitoring through as appropriate. Misuse is dealt with through performance management and/or staff misconduct processes, depending on the nature of the breach in question.
    4. routinely logs network activity and may use this information to investigate faults, security breaches and unlawful activity
  2. Members of the Information Technology team are responsible for:
    1. data quality - accuracy, integrity, cleanliness, correctness, completeness, consistency and timeliness;
    2. data security - control of access to data sets to known individuals, and monitoring of the data's subsequent exposure as it flows through corporate systems and records;
    3. data standards - ensuring compliance with relevant laws, government and regulatory standards and any policies and standards imposed internally;
    4. data management - definition of the authoritative source of data and of the data to be provided from that source, and ensuring that duplication of data is kept to a minimum.
  3. Members of the Information Technology team are to monitor and evaluate business processes to ensure that these are consistent with best practice principles for data management, and are responsible for approval of the 'rules' which are used to determine user access to information resources and services (though this approval can be delegated to another officer in the business area).
  4. The company will endeavour to align IT operations with specific business goals and objectives, company vision, and long term strategies.
  5. The company will apply standards in their use of technology to assure ease of support and the effective application of hardware and software to core systems.
  6. The procurement of technology will be based on a comprehensive assessment of vendor offerings. All purchases in excess of $2000 must have at least 3 separate vendor quotes.

Assessment 1 task 6 Troubleshooting and site related issues

Task 6 is the final stage of the server deployment. This is essentially an extension of task 5 (testing), and is intended to familiarize you with the process of testing and troubleshooting followed by more testing and troubleshooting until all tests consistently produce the expected results without anomalies. Task 6 also addresses site related issues such as OHS, consultation, and site access.

In preparation for task 6 students will need to:

  • Refer to action plan from task 2 to confirm that your test plan addresses the original business requirements
  • Refer to the test plan from task 5 to make sure that all necessary tests are done until all problems have been resolved.

For task 6 students are required to complete the following activities:

  1. Apply troubleshooting tools and techniques including network diagnostic utilities, and problem solving methods:
  1. Examine the evidence
  2. Use a process of elimination
  3. Use known good components
  4. Consider the usual suspects
  5. Beware of problems with multiple causes
  1. Test each component multiple times under different conditions to identify hidden anomalies. For example:
  1. Does your DHCP service deploy dynamic address to hosts and static addresses to the Servers?
  2. Are file resources accessible to allowed users but inaccessible to disallowed users?
  3. Does your firewall scan email attachments as well as files in the file system?
  4. Does Active Directory have user objects for all users and groups, and computer objects for computers?
  5. Is there a secondary DNS service running for redundancy?
  6. Have you tested it?
  7. Have you assumed the role of a hacker when testing security settings?
  8. Update the test plan to reflect configuration changes and additional tests that have been made.
  9. Formalize the test plan into a report that shows:
    1. server configuration
    2. operational changes
    3. current server status
  1. Address site conditions and consultation requirements.
  2. Draft an email to key stakeholders requesting feedback on requirements for the server and requesting signoff to proceed with server installation.
  3. Compose a risk assessment focusing on OHS considerations
    1. Electricity hazards
    2. Lifting hazards
    3. Cabling and furniture hazards
  4. Draft an email which addresses the following issues
    1. to assure access to the site
    2. to notify key stakeholders of the downtime
    3. to ensure the task is coordinated effectively with others involved at the worksite
    4. clean-up and restoration of worksite to clients satisfaction
  5. Prepare an agenda and conduct a meeting to address the following issues (each of these items must be on your agenda). Notify your teacher or when the meeting begins as they will attend. Each student must participate in the meeting discussion to demonstrate an understanding of the subject matter. You will be expect to participate in the discussion by listening, observing, and questioning to clarify and revise your understanding. You should be able to communicate clearly using appropriate technical language.
    1. business problems and opportunities
    1. scope, objectives and budget
      1. confirming details with appropriate person
      2. how the project should be managed i.e. formal project management software etc.
      3. assessment of project risks
      4. ergonomic and OHS assessment with risk assessment

This is predominately a practical activity therefore you will be expected to submit screenshots of your various testing activities. The completed work must be observed by your teacher to show that all testing and troubleshooting tasks are completed.

  1. Apply troubleshooting tools and techniques including network diagnostic utilities, and problem solving methods
  2. Test each component multiple times under different conditions to identify hidden anomalies
  3. Update the test plan to reflect configuration changes and additional tests that have been made.
  4. Complete final documentation of system for handover (use the template provided).

To successfully submit your work you must:

Copy the following electronic documents into your dropbox

    1. The further various screenshots of testing performed
    2. OHS risk assessment performed
    3. Draft email to stakeholders re servers and signoff
    4. Draft email re access, downtime, etc
    5. Meeting agenda and outcomes
    6. Updated test plan
    7. Final documentation (template) including Exec Sum, all sections, Sign-off of implemented servers, network, security, DR and final costings.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions