| |
 |
 |
| |
Network Design |
| |
 |
Analyze existing infrastructure |
| |
 |
Evaluate the technology budget |
| |
 |
Research current and future technologies |
| |
 |
Perform cost benefit analysis and Return on Investment (ROI) analysis |
| |
 |
Assess the most appropriate network for business process improvement to
meet organization goals |
| |
 |
Plan for network capacity based on number of users and system requirements |
| |
 |
Plan for expansion of network
|
| |
 |
Develop network topology and architecture |
 |
 |
| |
Hardware Installation |
| |
 |
Install network hardware: servers, routers, switches, hubs, bridges, wireless
networking |
| |
 |
Install data protection systems (uninterruptible power supplies (UPS),
redundant array of independent disks (RAID), and tape backup systems)
|
| |
 |
Install storage systems: storage area network (SAN), fibre channel storage,
network attached storage (NAS) |
| |
 |
Set up storage racks to hold network hardware (servers, routers, switches) |
 |
 |
| |
Software Installation |
| |
 |
Migrate operating systems (OS), applications, hardware, drivers |
| |
 |
Install software: operating systems (OS), email server, database server,
web server, file transfer protocol (FTP), internet faxing |
| |
 |
Install redundancy and clustering technologies: network load balancing
and cluster servers |
| |
 |
Implement remote networking: virtual private network (VPN), secure shell
(SSH), remote desktop access |
| |
 |
Install network security: firewalls, demilitarized zone (DMZ), virtual
LAN (VLAN), intrusion detection system (IDS), anti-virus software, secure
socket layer (SSL) |
| |
 |
Install network services: domain controllers, file and print, domain name
system (DNS), dynamic host configuration protocol (DHCP), windows internet
naming service (WINS), proxy servers |
 |
 |
| |
Inspection and Documentation |
| |
 |
Perform a quality assurance (QA) inspection on every component of the
network (cables, connections, etc.) |
| |
 |
Develop network layouts and wiring diagrams |
| |
|
|
| |
|
|
| |
 |
 |
| |
Security Management |
| |
 |
Update firewall software |
| |
 |
Update anti-virus software |
| |
 |
Test network security: firewall, server, internal, external |
 |
 |
| |
Data Management |
| |
 |
Perform routine (daily, weekly, as required) backups of critical data |
| |
 |
Store data backup tapes offsite for disaster recovery capability |
| |
 |
Perform defragmentation (disks, databases) |
 |
 |
| |
User Administration |
| |
 |
Develop and implement workstation usage policies for employees |
| |
 |
Administer authorized access ID’s for new and existing employees |
| |
 |
Set security restrictions and network access for users |
| |
 |
Set end-user rights |
| |
 |
Limit desktop administrative rights |
| |
 |
Maintain domain controllers (logon scripts, profiles, domain policies) |
 |
 |
| |
Network Maintenance |
| |
 |
Schedule network maintenance |
| |
 |
Install network software upgrades |
| |
 |
Install operating system upgrades |
| |
 |
Update service patches and service packs
|
| |
 |
Perform network diagnostics |
| |
 |
Resolve server crashes |
 |
 |
| |
Network Monitoring |
|
|
 |
Monitor firewall for intrusion attacks |
| |
 |
Monitor logs: system, anti-virus, firewall, error, user, application |
| |
 |
Monitor user activity |
| |
 |
Monitor servers for optimal efficiency |
| |
 |
Perform random checks remotely to monitor user compliance |
| |
 |
Monitor network for usage, collision detection and performance |
| |
 |
Monitor back up drives and software |