Upload
baraka-wilson
View
150
Download
10
Embed Size (px)
Citation preview
THE INSTITUTE OF FINANCE MANAGEMENT
Faculty of computing information system and
mathematics
Beauty Plc. Virtual Private Network proposal
Project Members
ELIUD ERICK BIT/09/31017
JULIANA MBUKE BIT/09/29262
YETHROY JEROME BIT/09/29212
MICHAEL GEORGE BIT/09/29268
BEATRICE AYOUB BIT/09/29181
HOKORORO SOPHIA BIT/09/28619
KIDAVA JACKSON BIT/09/29227
KAJIRU ANTONY T. BIT/09/29220
MHANUKA BARAKA BIT/09/29267
MBARUKU ABASI BIT/09/29258
ii
Table of Contents Abstract. ....................................................................................................................................................... iii
Chapter 1 ....................................................................................................................................................... 1
Introduction .............................................................................................................................................. 1
Current problems of Beauty Plc. ............................................................................................................... 1
Ways to overcome the problems. ............................................................................................................. 2
Implementing of organization .................................................................................................................. 2
Chapter 2. ...................................................................................................................................................... 3
Project Goals ............................................................................................................................................. 3
Objectives. ............................................................................................................................................ 3
Project Scope ....................................................................................................................................... 3
Project deliverables. ............................................................................................................................ 3
Importance of VPN to the organization ............................................................................................. 4
Risks associated with Virtual Private Network ......................................................................................... 4
Client ......................................................................................................................................................... 5
The project team ....................................................................................................................................... 5
Chapter 3. ...................................................................................................................................................... 6
Proposed approach ................................................................................................................................... 6
Proposed Approach .................................................................................................................................. 6
Chapter 4 ....................................................................................................................................................... 8
Project implementation ............................................................................................................................ 8
Activity Plan ......................................................................................................................................... 8
Resource plan ...................................................................................................................................... 8
Proposal budget ................................................................................................................................. 11
Conclusion and Recommendations ........................................................................................................ 12
References .................................................................................................................................................. 13
iii
Abstract. This proposal intends to explain the activities that will be conducted in the implementation of the
VPN network in the Beauty Plc. The proposal consists of four chapters namely; Introduction, Project
goals and objectives Proposed Approach, and Implementation.
In Introduction, there is current problem facing beauty Plc., Priority needs, and implementing
Organization
Project goals consist of objectives, project deliverables, project scope, importance of Virtual Private
Network, and risk evaluation on VPN.
Proposed approach explains the methodologies that will be used to create the VPN, and the
proposed technologies.
In addition, the last chapter explains the activity plan, resource plan, and the financial plan
(Budget).
1
Chapter 1
Introduction
The proposal explains the development of the VPN in the Beauty plc. Company. The
network will help the beauty Plc. To solve their current problems they are facing.
A virtual private network (VPN) is the extension of a private network that encompasses
links across shared or public networks like the Internet. A VPN enables user to send data
between two computers across a shared or public internet work in a manner that emulates
the properties of a point-to-point private link. Before the Beauty Plc. has no VPN (Virtual
Private Network) so the company is doing its activities manually such as sharing of data
(Files), exchanging of information within an organization. So the VPN (Virtual Private
Network) technology come with the solution to the problem.
Current problems of Beauty Plc.
Currently the company facing are the following;
Competition due to the entrance of new companies and individuals in cosmetic
industry
Technological advancement since Beauty Plc. uses the old technologies in the
operations.
Market share is reduced since consumer are now aware and exposed to different
products in cosmetics industry
Security issues that include the inventory control and the transaction control are
done physically that set the risk/threat to Beauty Plc.
Large number of employees in the company cause more of the company income or
profit to be used to pay the employees of the two industry they have
2
Ways to overcome the problems.
One of the way to solve the current problems is to establish the Virtual private Network,
which solve the problems ;trough the following;
i. Will automate all the operations that ware done manually hence increase
efficiency and accuracy.
ii. The network also will increase the network share through reducing production
and goods costs
iii. Will improve security of company’s data or information as well as security of
transactions they done in their companies
iv. Also will lead to the reduction of the number of employees because most of the
duties will be done automatically.
v. Gaining the competitive advantage over other companies in the cosmetic
industry by introducing new technologies in the productions and operations
Implementing of organization
We as Cloud Networking and consultancy Co. Ltd we deals with issues such as
network(ing) configuration and connections, hardware and software maintenance and
repair, as well as computing(ICT) consultancy. Our organization deals with these activities
for several years so we are capable of doing any activity regarding with the above
mentioned. We had already done tender with many companies such as Africa Barrick
Company ltd, Mtibwa sugar co. ltd, Mtakuja Foundation and most of the project were
succeed.
3
Chapter 2.
Project Goals
To develop VPN that will connect Beauty plc. and their braches to overcome business
challenges via the use the application of ICT.
Objectives.
1. Improve quality of cosmetic product and packaging, this will attract new customers
and hence enable winning competitive advantages over other competitors.
2. Implementing automated security facilities, data security, and network security will
enable easy control of materials and proper keeping of transaction records.
3. To reduce operation cost through automating production activities.
4. To reduce number of employees that in turn will lead to increase income.
5. To save the organization money by means of eliminating the need for expensive
long-distance leased lines and reducing long distance telephone charges.
6. To align technology with business in order to create values like customer
awareness, reduce cost efficient.
Project Scope
This project is focused entirely on the alignment of the Information and communication
technology with organization business functions that is how VPN can be positioned to
support organization goals and business objectives.
Project deliverables.
The project deliverables that are expected to be presented are;
The completely working Virtual Private Network and
Network Documentation
User training for the entire Network
4
Importance of VPN to the organization
Implementation of VPN technology will benefits Beauty Plc. in the following manner;-
Extend geographic connectivity.
Improve security where data lines have not been ciphered.
Reduce operational costs.
Reduce transit time and transportation costs for remote users.
Simplify network topology in certain scenarios.
Provide global networking opportunities.
Provide telecommuter support. .
Provide faster ROI (return on investment) than traditional carrier leased/owned
WAN lines.
Risks associated with Virtual Private Network
Although the organization will get the benefit form VPN bit, also a VPN technology is
critically associated with security issues. Security must be dealt appropriately to ensure the
confidentiality and integrity of data and information, as well as overall corporate network
security. It may be in either of the following;-
User-credential-related risks VPNs provide easy access from the Internet into a corporate network and its internal resources. VPN security is only as strong as the methods used to authenticate the users (and the devices) at the remote end of the VPN connection. Simple authentication methods based on static passwords are subject to password “cracking” attacks, spy, or even social engineering attacks.
Spread of viruses, worms, and Trojans from remote computers to the internal network Remote access is a major threat issue to network security. Every remote computer that does not meet corporate security requirements may potentially forward an “infection” from its local network environment to an organization’s internal network. Up-to-date antivirus software on the remote computer is required to alleviate this type of risk.
Split tunneling Split tunneling takes place when a computer on the remote end of a VPN tunnel simultaneously exchanges network traffic with both the shared (public) network and the internal (private) network without first placing all of the network traffic inside the VPN tunnel. This provides an opportunity for attackers on the shared network to compromise the remote computer and use it to gain network access to the internal network. A host-based firewall is an effective way to defend against network-based attacks. Furthermore, many organizations have chosen to disallow split tunneling.
5
Client
The client of this proposal is Beauty plc.
The project team
The proposed development team members are
ELIUD ERICK (Project Manager)
JULIANA MBUKE (Assistant project Manager)
YETHROY JEROME (System Analyst)
MICHAEL GEORGE (Network Engineer)
MHANUKA BARAKA (ICT Operational Officer)
BEATRICE AYOUB (Network Engineer)
HOKORORO SOPHIA (Computer consultancy)
KIDAVA JACKSON (Computer Technicians)
KAJIRU ANTONY (Computer Technicians)
MBARUKU ABASI (Computer Technicians)
6
Chapter 3.
Proposed approach
So many methodologies can be used in developing a certain system. For examples;
Traditional and Enhanced Waterfall SDLC (System Development Life Cycle), prototype,
Joint Application Design (JAD), Rapid Application Development (RAD), Agile Methodologies
and others.
Proposed Approach
There are many methodology as mentioned above, there are strong reasons of having them
but the major and important reasons is that; One system development methodology is not
necessarily suitable for use by all projects. Each of the available methodologies is best
suited to specific kinds of projects, based on various technical, organizational, project and
team considerations.
Due to the fact that the nature/kind of project (VPN) and various techniques use in the
project development, the methodology that will be suitable in this project will be Enhanced
Waterfall SDLC (System Development Life Cycle),SDLC has been divided into six(6) phases,
phases are shown in the diagram below;
Within each phases there are different activities that are carried on, thing that done
in each phase are;
Analysis; Establishes a high-level view of the intended project and determines its
goals. (requirements definition) Defines project goals into defined functions and
operation of the intended application. Analyzes end-user information needs.
7
Logical design; Describes desired features and operations in detail, including
screen layouts, business rules, process diagrams, pseudo code and other
documentation.
Physical design; the real code is written here.
Implementation; Brings all the pieces together into a special testing environment,
then checks for errors, bugs and interoperability. The final stage of initial
development, where the software is put into production and runs actual business.
Testing, the code is tested at various levels in software testing. Unit, system and
user acceptance tastings are often performed. This is a grey area as many different
opinions exist as to what the stages of testing are and how much if any iteration
occurs. Iteration is not generally part of the waterfall model, but usually some occur
at this stage. In the testing, the whole system is test one by one.
Operation and Maintenance; what happens during the rest of the software's life:
changes, correction, additions, and moves to a different computing platform and
more. This, the least glamorous and perhaps most important step of all, goes on
seemingly forever.
Why did we choose Enchased system Development Life Cycle (SDLC) as the best
methodology to be used in conducting this project?. Reasons are shown as important of
SDLC below. The important of Enhanced System Development Life Cycle are;
1. Allow iteration process; if your organization has been plagued by problems resulting from
poor requirements management, then a robust requirements management methodology i.e.
Enhanced System Development Life Cycle (SDLC) e would be well advised. Once this
problem has been solved, through a repeatable process, the organization might then
streamline its process, while ensuring that quality is maintained.
2. The orderly sequence of development steps and strict controls for ensuring the
adequacy of documentation and design reviews helps ensure the quality, reliability,
and maintainability of the developed software.
3. Progress of system is measurable.
8
Chapter 4
Project implementation
Activity Plan
This part specifies a project schedule with respect to project activities as followed from a chosen
methodology of development, System development life cycle. The schedule point out each activity
i.e. Analysis, Design, Implementation, Testing and Operation and Maintenance with its sub tasks and
their estimated time range.
Resource plan
This part elaborates all resources to be used in the development process, which are network
engineer, analyst, user, software’s and hardware’s. These are allocated on the activity plan based on
which process is undertaken. In addition, these allocated resources will be used in assisting
estimation of project budget from analysis to maintenance phase.
Below is a Gantt chart showing the project schedule that includes project activities with its specific
time range and allocated resources;
Figure 1: A Gantt chart for project schedule indicating activity and resource plan.
Elaboration of project activities from a chart;
9
Analysis
Tasks to be done in this phase include a feasibility study of an organization to know its
capabilities in terms of finance, technical support it can offer, cost/benefit factors and
overall current state of an organization.
Another task is requirement gathering and analysis, this will determine clients needs.
Requirements are of two types, Functional requirements (VPN operations) and Non-
functional requirements (extent to which VPN will operate i.e. its constraints, speed,
accuracy)
Analysis phase will take 15 days in which feasibility will take 5 days, requirement gathering
6 days and requirement analysis 4 days.
Design
In design, there is logical design and physical design. Under logical design, the logical
structure of the network will be designed. This includes the diagrams of the network
structure and infrastructure.
In physical design, process of physical allocation of all locations where the equipments will
be installed is undertaken.
The design phase will take 8 days of implantation, in which logical and physical design will
take 4 days each.
Implementation
This phase involves two main stages, namely;
I. Hardware installation
Networking equipments are installed in the area, every device is well configured
and make sure that they communicate to each other. This involves the configuration
of computers, routers, switches, cables, servers, network dishes and other devices.
II. IP and security configuration
IP configuration, process of assigning IP addresses to all the devices connected to
the network is done for devices to communicate with each other.
Security configuration , process where all the protocols are assigned to the
particular network in order to limit the access level of the users and the intruders
from outside the network.
This phase will take 17 days in which 12 days is for hardware installation and 5
days is for IP and security configuration.
10
Testing
Testing is done to know performance and if requirements are met. Testing include
integration system testing. In integration testing, individual software modules are
combined and tested as a group. In system testing, testing is conducted on a complete
taking all integrated systems to evaluate system's compliance with its specified
requirements. In this test, the network engineer makes sure that the users are able to access
the network according to their levels. System testing can be performed by number of groups
including users and bring feedback to the engineer if everything is working properly.
This phase will take 10 day. Integration and system testing will take 5 days each.
Operation and Maintenance.
In this phase a process of putting the networking system into working is done. After testing
and ensure that all units are working properly, then users are allowed to use the network.
Maintenance is a continuous activity, but the system will be under developers hand for 10
days afterwards organization will become responsible for the continuous maintenance.
Generally, the whole activity will expected to take total of 60 days to complete.
11
Proposal budget
This is a financial plan made for a proposed project; it is represented in tabular form. It indicates in
values in cost of each resource to be used during the implementation of the proposed Virtual
Private Network (VPN) in that business. The budget includes the operational costs and equipment
cost which will be used on the implementation of the VPN.
The following figure shows an estimation of the costs;
Figure 2: A table for budget schedule of a project
12
Conclusion and Recommendations
In the completion of the project, it is estimated that the project will increase the organization
advantages. The project will help in reduction of the production cost, hence the reduction of the
reduction of the product price, which will attract more customers. Also, the automation of the
services also will lead to the high quality of goods produced hence that will meet the customer
satisfaction.
The reduction of the number of the employees will also lead to the increase of the organization
profit because the amount of money that will be used to pay the employees will remain to the
organization as a profit.
13
References
BRANDON D, 2006, Project management for Modern information Systems, IRM Press, 701 E.
Chocolate Avenue, Suite 200.
Project Management Institute, 2004, A Guide to the Project Management Body of Knowledge (PMBOK Guide), Third Edition, Newtown Square, PA 19073-3299 USA NEBIU B, 2002, Developing Skills of NGOS Project Proposal Writing, Ady Endre ut 9-11, 2000 Szentendre, Hungary , The Regional Environmental Center for Central and Eastern Europe. Available from: http://documents.rec.org/publications/ProposalWriting.pdf [Accessed on 15th December 2011.] Bournemouth University, 2011. BU guide to citation in the Harvard style. Poole: Bournemouth University. Available from: http://www.bournemouth.ac.uk/library/citing_references/docs/Citing_Refs.pdf [Accessed on 15th December 2011].