You are on page 1of 24

Project Summary

6/18/17

NET 471 Advance Topics in Networking

Professors Name: Prof. Alan Bowen

Contents
Page

LIST OF ILLISTRATIONS 3
EXECUTIVE SUMMARY

INTRODUCTION
Virtualization 4-5
History 6-7

REASONING
Problem 8
Solution 9

NETWORK
Current Network 10
Proposed Network 11

THEORY
Technological Imperative 12
Strategic Choice 13
Social Construction of Technology 14
Integrated Perspective 15-16
Critical theory 17-18

CONCLUSIONS AND RECOMMENDATION


Conclusions 19-20
Recommendations 21-22

REFERENCES 23-24
Running head: Final Project

EXECUTIVE SUMMARY

This document is broken down into five sections. First the section is that of the

introduction. The introduction covers what virtualization is and the history of virtualization. This

section starts the process and gives you a little background on virtualization and the starting

point of virtualization. The second section is that of reasoning this section has two parts the

problem and the solution area. It shown what our expanding company will face in the future with

the servers and what they have to do for the company. It also goes into how virtualization will be

the solution for the company and how it can solve these problems. The third section covers the

network. It covers the existing network servers and the new proposal for the network servers.

The fourth section covers some of the different network technology theories and how they can be

used in the decision-making process. The last section covers the conclusion and the

recommendation that are made for the use of virtualization.


Final Project 1

INTRODUCTION

DeVry University is one the best known private-sector institution that offers both online

and onsite education. DeVry University delivers practitioner-oriented education integrating

technology, business, science and the arts. DeVry University has over (90) ninety locations to

accommodate its students. Business wire stated that DeVry University is one of the largest

private sector universities in North America, with more than 63,000 students enrolled on campus

and online in the United States and Canada.(Business Wire,2013).Having all this locations and

students scattered into different geographical location is a good strategy for the institution to

reach and provide good education to more students but this service can also be a challenging

one.

While DeVry University as we know it has been around since 2002, the school first

launched in one location in 1931 (Reference for Business, 2015). The primary function of DeVry

University is to offer higher education to a diverse group of students. DeVry University offers

associates, bachelors, and masters programs ranging from accounting to networking and

communications management. One of the primary advantages of DeVry University has over

other higher learning institutions is flexibility. Classes start every eight weeks and run year

round. Furthermore, students have the option to take class on-site, online, or a combination of

both. This means that DeVry serves a high number of adult students seeking a degree while also

working full-time. A second function that DeVry University serves is as an option for high

school students. In some urban communities, for example Chicago, DeVry offers a high school

and college dual credit curriculum. High School students are able to begin taking college courses

at DeVry University while still in high school. With about 5,700 employees, DeVry also serves

as a place for employment for those in various fields looking to share their expertise in various
Final Project 2

fields (Reuters, 2016). The University prides itself on employing professors that have real-world

experience that can be passed down to students.

The primary customers for DeVry University are the aforementioned students.

Students tuition is the primary source of income for the university. The university does a few

business partners. One business partner that the university utilizes is with the technology giant,

Cisco. Cisco and DeVry have partnered so that DeVry University offers classes that teach

students specifically to the Cisco curriculum. In turn, Cisco has graduates that are well versed in

their language, products, and curriculum. DeVry University is a sponsor for the United States

Olympic team.

DeVry University has a supply management organization which is dedicated to

working with various vendors to ensure that the total value combines timely deliveries, excellent

services, competitive pricing and good ideas. Also, there is a mutual relationship between the

vendors and the organization; this has been evidently shown by the working relationship they

have maintained for quite some time.

The growing demand for higher education from all walks of life has made DeVry

University a popular choice for students. DeVry University, like few other universities, relies

heavily on a strong network. Even students that take classes on-site will find themselves doing

much of their work, assignments, and assessments via the internet. This all means that the

information technology department at DeVry University must be prepared, and one of the best.

With thousands of students accessing course information, an outage would causes massive

issues. DeVry University must consider an internal, on-site network. This includes servers,

switches, routers, and workstations for on-site classes and for student use on campus. There must

be adequate bandwidth, workstation availability, classroom availability, and cloud storage. On


Final Project 3

the other hand, DeVry University also must maintain the network so that students can access

university resources from their homes and workplaces. One concern that must be constantly

monitored is network traffic so that all students accessing university resources from their homes

are able to do so without an issue. Furthermore, there must be enough storage for university

resources and for students to upload assignments and projects. If the university is unable to meet

these technological demands, the university will quickly begin to fold. DeVry University relies

on technology like few other universities around today.

Furthermore, the network outage might be caused by the failure in the network due to the

interference of the network infrastructure. Network failure in such a big institution will mean that

no activity is going to continue. More so, there will be a waste of money, effort and time trying

to recover it to its initial stage. Network redundancy is the perfect solution to this problem which

acts as a quick respond backup plan. There is always a need to have a redundant network in any

organization which requires a high availability. The redundant network should always be from a

different Internet Service Provider. Also, the switches, routers, hubs and cables should be

configured in a different location from the other network (Miclot, Belden, & Mower, 2011).

After conducting audits and surveys on DeVrys campuses across the country, it was

discovered that some of DeVrys locations are in need of major improvements. As a result of our

finding there were some routers and switches that are approaching end of life and will need to be

replaced because Cisco will no longer offer support for these devices. Another issue that was

discovered was the cabling at some locations. We notice that some locations were still using

outdated Cat5 cables. Our plan is to upgrade the cabling to a Category 6 which much will be a

better fit than previous Cat5. Plus, it gives DeVry a better quality from a converged network

which will be a win win situation for everyone that will utilize the network.
Final Project 4

We want to also improve and secure the way that current and future students learn. So

what we are proposing is improve the wireless network by replacing the current access points

with better access points that gives better signals. By doing this we can ensure that student as

well as staff are able to conduct their school duties without interruption no matter where they are

in the building. Next we want to add more security features to DeVry infrastructure to protect

the information of both the teachers as they teach and the students as they focus on learning

without the fear their information being compromised.

In regards to security, we want to come up with lasting solutions to ensure no data is lost

or altered. We are aware that as the time goes by hackers come up with new ideas and

technologies to get into a companys network ending up with sensitive data from the

organization. Therefore, there is need to ensure the network is protected using the latest

technologies. In the case of a wireless network, we want to make sure that WPA2, which is the

most recent encryption standard, is used to encrypt the password. More, so the firewall should be

enabled in each router to filter any attack from getting into the institutional network. By doing all

these, we are sure the students data together with the University data are in safe hands.

Alternative Solution to the Problem

DeVry University is known for having several locations all across the 18 states in

the United States. This fact alone create a challenge in having an excellent Quality of Service

(QoS) .This means that all of these campuses should be able to communicate and have access to

a database without problem. Other issues are the outdated networking equipment like the routers,

switches and the cables that were terminated at the campus.

Several solutions were suggested in the previous pages .This research will try to

provide an alternative to the solution that was suggested beforehand. An alternative solution to
Final Project 5

the use of database would be virtualization. In an article that discussed about virtualization the

author narrated that Virtualization enables consolidation of physical servers by allowing many

virtual servers to run concurrently on one physical server .(B. Goldworm & Shamrock,2007).It

basically is defining the ability of device or a server to run an entire virtual machine including its

own operating system. Just by reading this statement means that it is a better investment since

the institution would be using less servers and less server would mean less equipment to be

maintained. To explain an overview of its operation, even though the virtual servers are on a

parent operating system they still have different the same kernel and can therefore be running

different operating system.

There are various advantages that virtualization provides to a company. Among these

advantages are Better use of existing hardware, reduction of new hardware cost, reduction in IT

infrastructure costs, simplified systems administration and simplified installation and

deployment. Another thing that virtualization has to offer to any company would be the

reduction of power consumption. According to a McKinsey report, Electricity represents about

2540 percent of the operational expenditures for a typical datacenter. Gartner estimates that, on

average, 4060 percent of server rack space is underutilized or wasted, and up to 30 percent of

available power is stranded, which can lead to organizations outgrowing datacenters

prematurely.(Deka, G.C., 2014 ).This data clearly can explain that by just minimizing the

energy consumption can really help a company to make those expenses to additional income to

the company. An implementation issue that may arise would be a failure of a single physical

server that is hosting multiple virtual servers but this problem can be solved by detailed planning

on the enterprise infrastructure. An excellent solution would be to replicate virtual machines that
Final Project 6

host critical services across multiple physical systems to be able to absorb the failure of a single

physical machine.

Implementation Issues of Virtualization Technology

Despite the above mentioned advantages, virtualization has several implementation

issues. First, there will be storage concern, given the fact that DeVry University has several

Campuses across the country means that a large volume of data will be handled. With small

storage spaces, this implementation will prove to be a challenge in this case and therefore, there

will be a need of having large storage spaces. Additionally management of these large data is

another issue since it will require well-skilled personnel to operate it (Vanover, 2008).

Secondly, another common concern is the recovery process in the case of a disaster

occurrence. For organizations that embrace virtualized database technology, the common

denominator is the disaster recovery. Disaster recovery is made easy when storage and

networking can accommodate a mobile virtual machine (Vanover, 2008).

Thirdly, performance is also another concern. The performance of a virtualized server

will be high given that a very large database is to be hosted. Therefore, database server

configuration will require ample resource to ensure it performs to the expectations (Vanover,

2008).

DeVry University takes pride in preparing their students to be warriors in the fight

against cybercrime. They also teach students the latest in network security that specializes in

Cisco networking fundamentals. So its only fitting for DeVry to stand behind what they are

proud of by making improvements to their security infrastructure by updating some of their

switches to the latest products. Along with improving in other areas from a security standpoint to
Final Project 7

ensure that both DeVrys staff and students are able to conduct their duties of teaching and

learning without the fear of their information being stolen.

As mention in the previous report an audit of DeVry network infrastructure was

conducted and there was some issue that needed to be address. The important issues that stuck

out more than the others were the holes in the security sector. In order to address the concerns of

DeVry security infrastructure we will need to take a look at it from various elements. They are

protect, detect, defend, recover and managed. So first things first we will need to start with

protecting the infrastructure from virus and malware that can enormous problems all. The best

tool to counter this is McAfee data protection and encryption to ensure that staff and students

personal information is protected. Secondly, security monitoring which is highly important

because DeVry University needs to be aware of a security breach the moment it happens. There

is too much at stake with thousands students and teachers locate throughout the nation that

utilizing DeVrys network.

Thankfully DeVry has a partnership with Cisco which is well known as the top

company that specializes in network functions from top to bottom. So DeVry will not have to

look far for a solution on detections aspects. One of the products from Cisco that assists with the

security monitoring is Cisco Network Assistant that works with both of DeVry wired and

wireless networks. This tool would send nonfictions of network errors that may arise from time

to time along with alarm threshold notifications. DeVry would also be able to obtain a health

report of all routers and switches to ensure that they are up and operating at their best. In the

event of a security breach DeVry will have the backups stored off by Iron Mountain that

specializes in the data backup and recovery.


Final Project 8

In order to make this improving its a must that DeVry updates to it routers and

switches to the latest. Which are the Cisco Catalyst 3850-48P-S switch 48 ports managed

desktop, rack-mou and the Routers would be a Cisco ISR 2901 Rack Mountable Router. As for

the management phase it would be handled by DeVrys I.T. department with help from students

that are taking information technology majoring in computer science. By doing this, it will

expose them to real life situations within the IT world and better prepare them for their careers in

information technology.

The Benefits of Security

By implementing good security measures in DeVry Universities, the students,

professors, and all the stakeholders will have an assurance of working in an environment where

they have no fear of losing their data. The following are some of the major benefits alighted.

First, there will be a reduction in insider fraud, theft and data leakage. Through the

implementation of good security measures, there is no doubt that the attackers will lack the holes

to get into the network. Therefore, they are not able to carry any attack on the corporate network

of the institution. Secondly, good security will simplify operation and reduce the effort puts

towards maintaining the data. A good security setup will simplify security operations and reduce

the burden on security and network professionals. Finally, there will be faster detection and

remediation of the threats. There is usually a risk of insider thefts in cloud data and mobile

computing but having the right security in place, the network administrator will be able to detect

and mitigate such attacks (Burnham, 2011).

Implementation Issues of Security.

There are some challenges in the implementation of network security because todays

corporate network have become complex. First, with the increase of users and the campus
Final Project 9

supporting BYOD policies, the demands on corporate networks will be more complex than ever,

and security teams will struggle to keep pace with the fast-changing, hard-to-control

environment. Secondly, the students themselves may decide to hack into the system since some

of them may have the knowledge on the network infrastructure, therefore, making their work

easier. The challenge, in this case, is to curb this threat. Finally, not all the security measures

provide 100% security protection. Therefore, there might still be a risk of losing data even

though the security measures are in place (Kontzer, 2014).

Overview and Availability of Virtualization

Virtualization is extremely valuable technology that is now emerging on the scene at

many enterprises looking to improve their networks. The basic idea of virtualization is to allow

one physical server or computer to perform multiple functions, applications, or operations

(Dziak, 2016). One of the primary reasons for the emergence of virtualization in enterprise

networks is because of the increased efficiency and therefore, financial benefit (Dziak, 2016). By

allowing one physical machine to perform many functions the organization can save money on

hardware. Another important aspect of virtualization, especially when it comes to

implementation at DeVry, is storage virtualization. Storage virtualization allows users to store

data virtually in a cloud atmosphere (Dziak, 2016).

The emergence of virtualization in the last decade has made virtualization readily

available to enterprise organizations and even individual consumers. The benefit of virtualization

is that, in most cases, there is not any special hardware required which makes the availability of

virtualization higher. Virtualization software is the second component and is also easily available

in todays market. The specific virtualization software will likely depend on the needs and

requirements of the organization as well as the hardware being utilized. Finally, and potentially
Final Project 10

most difficult, is the configuration of the virtualization hardware, software, and functions (Dziak,

2016). Configuring virtualization can be complex and difficult which makes this component the

biggest challenge in terms of availability. However, with a knowledgeable IT staff it is nothing

that cannot be overcome.

Overview and Availability of Security

At the heart of any long standing, successful network is strong security implementation.

The amount of data and information that large organizations store makes them very vulnerable

targets. Some of the most common security threats include viruses, spam/phishing,

spyware/malware, spoofing, and denial of service attacks. These are all potential threats to the

DeVry network as well. DeVry is particularly vulnerable because of the number of users on the

network and using the hardware. For example, one workstation may be accessed by more than

ten people on a given day. This means that proper authorization and policies must be

implemented to ensure that everyone is secure. Finally, one of the other major concerns that must

be addressed in regards to security is the amount of personal data and information stored on the

network. DeVry University stores the financial information, social security numbers, addresses,

and classwork of every student and faculty member. This data must be secured with a firewall,

but even a strong firewall leaves the possibility of an attack from the inside. As Marc Sokol

mentions, We have met the enemy and he is us. Regardless of technology, it is important to

protect against people on the inside. This means a system of checks and balances, authorization

systems, and most importantly security training for employees (Gentile, 2016).

Fortunately for DeVry University, security software, hardware, training, and overall

information is widely available. The most comprehensive and state of the art security measures

can be implemented at the enterprise level. The more problematic availability issues will come
Final Project 11

with effective training of all stakeholders and constant re-evaluation of the security measures.

Potential attackers are always trying to be one step ahead which means that while security

measures are available, it is up to the organization to consistently evaluate the security in place

and proactively implement additional, or entirely new, security measures.

Cost

Implementing virtualization costs less than actually having all of the hardware.

Depending on the software and hardware that is being used, the cost can be between $500.00-

1000.00. Having that security on the network to make sure that even when you switch from the

hardware to virtualization, there will be no security issues. When you stop using the hardware

you will save on electricity and maintenance of the hardware. This makes virtualization a better

route to go when it comes to a school. Virtualization does not have that costs like having the

actual hardware. The school also saves on the cost of always having the IT available.

Work breakdown Structure

Task Mode Task Name Duration Start Finish


Auto <New Summary Task> 22 days Mon 5/1/17 Tue 5/22/17
Scheduled
Auto Feasibility Study of the 1 day Mon 5/1/17 Mon 5/1/17
Scheduled Campus Network Topology
Manually Assessment of the existing 3 days Tue 5/3/17 Thu 5/5/17
Scheduled WAN Technology, Software
and Storage infrastructure
Manually Assessment of the Licensing 2 days Fri 5/6/17 Mon 5/7/17
Scheduled information, defining SLA,and
equipment that needed to be
replaced for the proposed
project
Manually Prepare Cost for the 1 day Tue 5/13/17 Tue 5/13/17
Scheduled Proposed Proposal
Final Project 12

Auto Execution Phase 1 day Wed 5/14/17 Wed 5/14/17


Scheduled
Manually Approval of Proposed 1 day Wed 5/14/17 Wed 5/14/17
Scheduled Project
Manually selection of sub-contractors 3 days Thu 5/15/17 Mon 5/17/17
Scheduled
Manually Selection of vendors 3 days Tue 5/19/17 Thu 5/21/17
Scheduled
Manually Creation of shared storage 1 day Fri 5/22/17 Fri 5/22/17
Scheduled logical Design
Manually Pre-positioning of tools and 1 day Mon 5/25/17 Mon 5/25/17
Scheduled equipment necessary for the
proposed project
Manually procurement of software 1 day Tue 5/26/17 Tue 5/26/17
Scheduled and hardware equipment for
the proposal
Manually Replacement and 3 days Wed 5/27/17 Fri 5/29/17
Scheduled Installation of network
infrastructure suitable for the
virtualization
Manually Configuration of the security 2 days Mon 6/2/17 Tue 6/3/17
Scheduled and virtualization Scheme for
the proposal
Auto Acceptance 5 days Wed 6/4/17 Tue 6/8/17
Scheduled
Manually Quality Inspection 3 days Mon 6/4/17 Wed 6/6/17
Scheduled
Manually Completion Acceptance 1 day Fri 6/9/17 Fri 6/9/17
Scheduled
Manually Handover of Project 1 day Sun 6/11/17 Sun 6/11/17
Scheduled Documents

The interest in virtualization has been growing rapidly in the IT industry because of

inherent benefits like better resource utilization and ease of system manageability. During the

implementation of the virtualization there is some concern that the non-technical staff and the

student might encounter. Not everyone is going to understand the reasoning into the changes that
Final Project 13

are being made. Its a known fact that people have a tendency to fear what they dont understand.

All though the changes are for the better there are going to be some staff that will be slow with

going along with the transitioning that will be taking place. The solution for that would a lot of

patience and plenty of training, in some cases some may need more than others. Students on the

other hand may not be as difficult as the staff to embrace the new changes. Sure we may have

some students here and there that are not taking the technical courses that might have some

concerns about the changes that are being made. There may be extra steps that they might to take

when logging into their student portals but everything should run smoothly. Our way of

countering that is sending out emails notifications will be sent out on a weekly basis to notify

every one of the improvement that will occur over the following weeks.

Short-term challenges

During the implementation, there are several challenges which we need to tackle. First,

there is a big challenge in planning the implementation on a busy schedule of the university

without disrupting their daily routines. Therefore, we need to come up with a strategy of working

when the entire network is not in use by anybody. Secondly, another challenge is the finance.

Some unplanned expenses might arise in the actual implementation of that project leading to the

shortage of the funds needed to complete the project. This will eventually stop the project for

some time and therefore interfering with the project completion time. More so, the devices

required for the project are the latest and better versions like new versions of routers, switches,

hubs, and cables. These devices are a bit expensive, thus straining the initial budget.

Long-term benefits
Final Project 14

The project will benefit the university in the following ways. With the implementation of

virtualization technology, it will reduce the energy consumption. Migrating physical servers over

to virtual machines and consolidating them onto far fewer physical servers means lowering

monthly power and cooling costs in the data. Also, virtualization increases the uptime; a

virtualized environment offers some advanced features which will increase the productivity in

the institution and increases the uptime. Through this, the University will be able to

accommodate the increasing number of students joining the university day by day.

Furthermore, improving the network infrastructure as mentioned in the previous proposal

will change how things are done for the better in the institution. By DeVry updating their routers

switches and cables to the latest versions, they will be increasing their network capacity as well

as improving its performance. Additionally, the plan to enhance the network security by

involving large companies such as Cisco will create a conducive environment for students and

the lecturers in the sense that they can carry their activities without the fear of losing their data to

malicious parties.

Stakeholders integration considerations - Virtualization

There are three primary areas of consideration regarding implementation: storage,

disaster recovery, and performance. DeVry University relies heavily on the ability to download

upload information in order to work through the curriculum. Virtualizing many of the

applications and programs requires even more storage which is expensive. Virtualization will be

an expensive upgrade to DeVry University particularly in the short-term, but should increase

utilization and capabilities in the future (Dziak, 2016). Secondly, this increased amount of data

due to virtualization means that there is even more concern for a disaster situation. While a
Final Project 15

disaster recovery plan should already be in place it is important the IT staff at DeVry University

immediately incorporates the newly implemented virtualization. Finally, the performance of the

DeVry University network should dramatically increase. Utilization of the machines and devices

can increase from 15% to 80% with virtualization (Dziak, 2016).

Stakeholders integration considerations - Security

There will be two major implications regarding the security implementation at DeVry

University. The first implication is that there needs to be availability so that student devices can

connect to the DeVry network while on campus, but also connect remotely while at home. This

is particularly critical because of the high number of students that complete their degree online.

Ensuring this accessibility along with the new security measures requires a highly skilled IT

team that can configure the network to allow access to DeVry resources remotely, but not allow

other access. Secondly, DeVry must understand the implications the increased security will have

on the number of students that bring their own devices. By nature, it is important that DeVry

University allows a BYOD policy. However, the new security measures must be implemented to

allow the foreign devices access to the network, but to access any of the networking devices.

Operational Concerns - Virtualization and Security

As with any upgrade or change in the network there will be operational concerns. While

virtualization serves as a way to decrease physical devices and increase utilization, there will

undoubtedly be operation issues. One potential operational concern is lack of hardware that can

support virtualization. Despite selecting hardware that should be able to handle the new

virtualization, DeVry has an ever increasing base of users that could cause operational problems.
Final Project 16

One example is that students may see lagging and slowness when accessing a remote lab

environment. Also, setting up virtualization is an expensive and complicated task. Therefore, it is

possible various configuration issues may take place (Dziak, 2016). Even after the virtualization

technology is in place, the management staff must continue to monitor both the hardware and

software. The management team is responsible for ensuring the hardware has the ability to

handle the demands of the network; and if it doesnt that must be communicated prior to critical

problems. It is important to understand there will be operational issues in the beginning stages of

implementing and utilizing virtualization (Dziak, 2016). Nevertheless, the operational problems

should subside as the IT staff becomes more familiar with the technology.

Implementing new security measures and protocol certainly opens the door for

operational issues. As mentioned previously, DeVry University relies on the ability of students to

remotely access their course resources. New security measures should be able to continue to

allow this access while keeping the network secure, however, not without operational concerns.

The most common issue will be that some users may be wrongfully denied access to the course

resources. The technical staff must be mindful of authentication measures and will need to

monitor and alter the authentication process as the operational issues arise. The BYOD policy at

DeVry also adds a wrinkle to the potential operational concerns. Students bring a wide variety of

devices and the security measures in place must allow all types of devices to access the network

securely. The technical staff will need to configure the network to allow such devices while still

ensuring a secure network. Lastly, the technical staff and management must be mindful of other

people. The most significant threat to the new security measures is humans (Gentile, 2016). The

technical staff and management team have a higher level of access and therefore must be careful

to not let other people steal passwords, equipment, change configurations, etc. Unfortunately, the
Final Project 17

newly implemented security is worthless if the integrity of the network is compromised by

students, faculty, or even people in the IT team.

Schedule and Operational concerns

Making the necessary improvements to DeVrys infrastructure is not going to be an easy

task. DeVry has over 60 locations located across the U.S. with some states having more than 10

locations. So are a there are quite a bit of things to consider when taking on a project of this

magnitude. Its highly important to make sure that vendors are going to have Cat 6 cables,

wireless access points, switches, routers in stock to complete the task. Secondly, making sure

that they (vendors) are going to be able to deliver the tools in a timely matter that complies with

DeVrys improvements. If theres going to be a problem with the vendor delivering supplies on

time, then we will need to have a plan B in place in the event this does happen. Thirdly,

preforming the task of the project while not interfering with DeVrys faculty and student body.

Due to the various locations throughout the U.S. we have to rely on scheduling a great

deal to ensure thing go as smoothly as it possibly can. DeVrys academic calendar is going to

play important role in making the improvements to the infrastructure while enhancing both from

a learning and teaching standpoint. The duration of the project is expected to last 22 day with no

room for error so we will have ensure that we get things right the first time around. The plan is to

break project into phases, East coast, Midwest, and West coast. We would start with the schools

on the east coast and work our way through the Midwest and finish on the West coast. We have

reached out to licensed contractors with excellent track records in performing the specific task

within line of our project and willing to assist us with completing the project.
Final Project 18

DeVry holds classes twice a day once in the morning and another in the afternoon. Day

time classes are held between the hours of 8 a.m. and 12 p.m., than there are the evening classes

which are from 6 p.m. to 10:30 p.m. We have ensured that DeVry University that a majority of

work will be conducted at night and they are an agreement with that plan. With that being said

we will begin our work at 11 oclock at night and work until 7 oclock in the morning. By doing

this we would not interfere with teachers as they teach and students as they learn. Some locations

may take longer than others and thats where the outside resources would come into the picture.

We will have a sixteen-person crew broken into four. While one team is removing the out dated

cables and access points the other teams will be running new lines and install new wireless

access points. Other would be working server room handling the replacement of routers,

switches and configurations.

As stated in the previous reports the goal is to enhance the learning and teaching

experience for both teachers and students. Updating the cabling and access point would improve

the communications for the whole school and allow students to be more mobile throughout the

campus. This will be implementing better encrypting tools to protect school data for everyone

and tighten up those holes in the security structure that were there before.

Impact of the Companies employees

Most of the employees will not be affected by the changes that are being made. The

biggest impact will be on the tech support. They will need to be taught how to use the new

security and be able to learn the new switches, routers, and access points that will be placed.

Once the equipment and the virtualization are in place they will have to learn how to

troubleshoot these in case of any interruptions. These will make it easier for students to access
Final Project 19

the labs and the internet on campus. It will also take most of the issues, such as lag and no

internet access, away once the virtualization and wireless technology is in place. The other part

that the tech support will have to be taught is how to monitor the hardware and software for any

updates that need to be done. All other employees will have to have a class on the new security

updates that will be put into place for a more secure network.

Conclusion

In this paper, we have critically analyzed DeVry University to try and come up with its

functions and services offered. We went further to find out who are the major stakeholders in this

institution and found out the students are the leading customers. After our analysis, we found out

some areas which need to be improved to enhance its productivity. Wireless networking was one

of the things which needed to be improved to enhance the performance of the students. The

wireless can be improved by replacing access point to better ones that give better signals.

Another area which needed concern is the cables used. It was noted that the University uses Old

Cat5 cables instead of the latest Cat6 cables which offer better speeds when it comes to data

transfer. Finally, on top of everything security took the order of the day. The university needs to

implement better security measures to counter the ever increasing number of hackers in the

world today.
Final Project 20

Resources

Durr, B. (2007). The Basics of Project Implementation. A Guide for Project Managers .

Marshall, D. (2011). Top 10 Benefits of Server Virtualization. Retrieved from infoworld.com:

http://www.infoworld.com/article/2621446/server-virtualization/server-virtualization-top-10-

benefits-of-server-virtualization.html

Dziak, M. (2016). Virtualization (computing). Salem Press Encyclopedia,

Gentile, M. C. (2016). The Human Factor in Enterprise Security. People & Strategy, 39(1), 6-7.

Company Profile | Reuters.com. (n.d.). Retrieved May 15, 2016, from

http://www.reuters.com/finance/stocks/companyProfile?symbol=DV.N

DeVry, U. (0005, March). Three DeVry University Campuses Ranked in Top 100 for Best

Return on Investment by PayScale, Inc. Business Wire (English).

DeVry Inc. - Company Profile, Information, Business Description, History, Background

Information on DeVry Inc. (n.d.). Retrieved May 15, 2016, from

http://www.referenceforbusiness.com/history2/18/DeVry-Inc.html

Miclot, M., Belden, & Mower, J. (2011, January). Network redundancy reduces risk,

downtime. Retrieved from controleng.com: http://www.controleng.com/single-

article/network-redundancy-reduces-risk-

downtime/fbb380911a5b1769eb01347fdc8c30c7.html

Burnham, J. (2011, October). What Are the Benefits of Security Intelligence. Retrieved from

securityintelligence.com:https://securityintelligence.com/what-are-the-benefits-of-

security-intelligence/
Final Project 21

Deka, G. C. (2014). Cost-Benefit Analysis of Datacenter Consolidation Using Virtualization. IT

Professional, 16(6), 54-62. doi:10.1109/MITP.2014.89

Dziak, M. (2016). Virtualization (computing). Salem Press Encyclopedia,

Gentile, M. C. (2016). The Human Factor in Enterprise Security. People & Strategy, 39(1), 6-7.

Goldworm, B., & Skamarock, A. (2007). Blade Servers and Virtualization : Transforming

Enterprise Computing While Cutting Costs. Indianapolis, IN: Wiley.

Kontzer, T. (2014). Network Security: Three Biggest Challenges. Retrieved from dell.com:

https://powermore.dell.com/technology/network-security-three-biggest-challenges/

Vanover, R. (2008, March). Evaluating Virtualized Databases. Retrieved from techtarget.com:

http://searchservervirtualization.techtarget.com/tip/Evaluating-virtualized-databases

Von Hagen, W. (2008). Professional Xen Virtualization. Indianapolis, IN: Wrox.

You might also like