1 / 19

Rathan /Woody’s IT Consolidation

Rathan /Woody’s IT Consolidation. Contents. Current architecture Desired architecture Proposed solution Critical areas Planning Milestones Implementation/Evaluation. Current Architecture / Issues. Rathan Inc. Laptops w/wireless cards to access database. Must prepay for air time

harva
Download Presentation

Rathan /Woody’s IT Consolidation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Rathan/Woody’s IT Consolidation

  2. Contents • Current architecture • Desired architecture • Proposed solution • Critical areas • Planning Milestones • Implementation/Evaluation

  3. Current Architecture / Issues • Rathan Inc. • Laptops w/wireless cards to access database. • Must prepay for air time • Woody’s, LLC • Utilizes secure FTP to access database • Main office must update database • Customer data accessed via phone

  4. Woody’s Architecture

  5. Desired Architecture • One primary customer database • Backup database on same network • Wireless access for all employees • Eliminate air cards • Reduce size of mobile devices

  6. Solution • Requirements Table • Business problem • Requirements • Technology solutions • Project steps • Issues and security risks • Testing

  7. Business problem • Consolidated customer database • Wireless access to database by all employees • Backup consolidated customer database • Reduce the size of the equipment carried by employees • Putting all employees under one network. • Eliminate air card use.

  8. Requirements • Provider to set up the consolidated database e.g Oracle • Adapters, routers and access points, antennas and repeaters in creating the wireless network. • Servers that are up and running to enable backup through the use of mirroring and fail-over cluster. • Strong network that should enhance quick access to the database.

  9. Technology solutions • The use of strong wireless network that connects the database and hence the data directly to the database without using the FTP protocol. • Strong and adequate servers that are up and running implementing the fail-over strategy and mirroring techniques that ensure consistency of data by backup. • Employing proper authentication mechanisms that will enhance database and network security.

  10. Project steps • Stepping up the wireless network thus employee having wireless access to database. • Setting up of consolidated database thus enabling the employees to access directly without using FTP protocol. • Setting up of a consolidated backup database that should be made use incase of any catastrophic event.

  11. Issues and security risks • Concurrency control issue in terms of database. • Strong authentication of database access issue • Catastrophic events problem and hence leading to loss of essential information. • Network authentication security risk.

  12. Testing • You can measure and improve the bandwidth. • Measuring throughput. • For database you can employ: • Stress testing • Scale-up testing

  13. Critical Areas • Secure access / protect customer information • Firewalls • Access/Authentication • Wireless device controls • Standardize database management structure • Consolidation of current databases • Wireless device cost/benefit analysis

  14. Planning Milestones • Develop detailed current architectures • Determine desired capabilities • Ensure all business goals addressed • Consolidate databases • Develop administrative processes / procedures • Distribution of wireless devices

  15. Cont. • Training / policies / procedures dissemination • Evaluation of system effectiveness

  16. Implementation/Evaluation • Compare information integrity across databases • Evaluate password strength of users/administrators • Evaluate firewall effectiveness • Test backup database

  17. Conclusion • One safe database for all customer files • All employees will have wireless access • Smaller mobile devices • Eliminated air cards • Better cost and time proficiency • Long-term business success

More Related