Professional Documents
Culture Documents
Herewith I agree for the given terms and conditions on plagiarism & Academic dishonesty also I declare the work
submitted doesn’t breach these regulation.
Note: Keep the softcopy of the assignment with you until the official results released by ESOFT. ESOFT has all rights to request the softcopy
again at any time.
Signature Date
I will keep the copy of this sheet until I receive the Results of my Submitted work
Signature Date
Assessment Title & No’s : A network solution for Winsoft (Pvt) Ltd Center
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct way. I further understand what it means to copy another’s
work.
Floor 1:
o Reception area
o Marketing Department (10 employees)
o GM’s Room
o Accounts Department (08 employees)
o Customer Interview Area – with Wi-Fi facilities
Floor 2:
o Calling Center for USA clients - 150 computers
o Video conferencing room
o Training Center with 50 computers
Floor 3
o Calling Center for UK clients - 120 computers
o Auditorium – with Wi-Fi facilities
o The Server Room with the IT team
Floor 1:
o Reception area
o Center Manager’s Room
o Calling Center for Australian clients - 100 computers
o Video conferencing room
Floor 2:
o Calling Center for Asian clients - 80 computers
o Training Center with 30 computers
o Auditorium – with Wi-Fi facilities
a) All departments’ computers of the HEAD OFFICE are to be integrated in to a centralized network. Name
– WINSOFT.com.
You are the Chief Network Engineer of Winsoft (Pvt) Ltd, and assigned with the task of plan, design and
implement a network solution for your own organization.
You are free to make assumptions, but all your assumption must be stated in the introduction.
Main Tasks
Task 01:
Discuss the benefits and constraints of different network systems types and topologies, and suggest a
suitable network topology for Winsoft (Pvt) Ltd networks and provide the reasons for your selection.
(LO1.1)
Task 02:
Prepare a report on network related technologies and standards that would be employed to when
implementing the network solution for Winsoft (Pvt) Ltd and discuss how they would impact on your
solution (individually and / or collectively). (LO 1.2)
Task 03:
Discuss the roles of different protocols that you would have to employ in this solution and how they
enable the effective utilization of your networking system. (LO 1.3)
Task 04:
Design a comprehensive network solution for the main and city center and explain how your design meets
the requirements of Winsoft (Pvt) Ltd. (LO 3.1) (M2.1) (3.4)
Task 05:
Critically discuss the role of software and hardware components that you would employ in this solution
and how you would utilize them to create your new network infrastructure. (LO 2.1)
Task 06:
Provide the different types of servers that you would have to utilize in this solution and comprehensively
analyze and compare the different types of servers available in the market (based on the cost and benefits
of them) and make the best selection. Justify your answer. (LO 2.2) (M1.1) (D1.1)
All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 5 of 76
Task 07:
Discuss how workstation hardware inter-dependent with network components in the performance of
network. (LO 2.3)
Task 08:
You are required to obtain the feedback of the users of the network resources in different aspects in order
to stay updated of the performance and many other aspect of the network. Design a feedback form to
obtain the feedback of users. And analyze and summarize them. (LO 3.2) (D1.1)
Task 09:
Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and analyze
with the expected outputs. Evaluate your analysis. (LO4.3)
Task 10:
State the enhancements that you would implement after a period of one year from the implementation of
the solution to improve the aspects including but not limited to bandwidth, quality, security and scalability
(LO 4.4)
Task 11:
Design a comprehensive maintenance schedule for the network which is to be designed for Winsoft (Pvt)
Ltd. (LO 4.5)
Strengths: Weaknesses:
Assessor: Signature:
Date: ____/____/______
Date
By
Mr.Vagish Kirubaharan
Reg.No : COL/A-051935
Batch : HND-COM-065
The Network
The User
Operating
Application
System
Hardware
The Services provided by the servers include printing faxing software hosting and other services etc.
The Workstations are interacted via the network as they do not have human interface or access by the human
users .The Workstations are known as the desktop with the keyboard mouse display or the laptop with
intergrated keyboard .
When it comes to the question in which one of these two is the powerful The Servers are considered as
powerful than the workstation although their configurations are guided by their users.
The Workstation does not need a high storage or a working memory, But the display must be expensive in
order to accommodate the needs of the user. Every Computers on the network must be configured for the
use.
On the single LAN the Servers and Computers are connected by their cables or in a wireless method. The
access is created via wireless access points (WAP).The devices which belong to WAP provide a bridge
between the computers and networks.
All the servers are connected via the cables to the network .Because the connections of the cable still remain
fast
The Usage of WAN in the schools and universities in New Delhi can help to communicate with other
countries like Canada ,London,Paris etc without wasting money on high phone call rates and bills.The WAN
is complicated as it uses multiplexers bridges and routers to connect local and metropolitan networks for
global communications like the internet.
When it comes to the difference These two networks don’t have any difference in their performances.
Advantages
Disadvantages
1. Peer-to-Peer
2. Client/Server
The Operating Systems with the peer to peer network allows the users to share their resources and files
which are located on their computers They don’t have a file server or a centralized management source.
In the peer to peer network all the computers and devices are considered equal . they all have the same
abilities to use the resources available on the network.The Peer-to-peer networks are designed primarily for
small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh
OSX, Linux, and Windows, can function as the peer-to-peer network operating system.
Advantages
Disadvantages
The Client/Server Operating Systems allows the network to centralize the functions and applications in one
or more than thousands of servers which are dedicated. The file servers are the heart of the system,by
providing the access to the resources and providing security.The Networking Operating system provides the
mechanism to intergrate the components of the network and they allow the users to share the same resources
of their irrespective physical location.
Advantages
Centralized - Resources and data security which are controlled through the server.
Scalability - Any or all the elements can be replaced individually as the needs
increase
Flexibility - New technology which can be easily integrated into the system
Interoperability – All the components (client/network/server) work together
Accessibility - Server can be accessed remotely and across the multiple platforms
Disadvantages
Bus Topology
The devices or nodes are connected to the same line or single cable in this toplogy known as Bus
Topology.This is transmitted across the bus which is transmitted across the bus and received by any system
in the network.
Star-topology
the workstations are connected to a central computer or server in a point-to-point connection stream this
topology is known as the star topology. In the star topology each and every node or peripheral is connected
to a central node, which is called “Hub/Switch “via cables. The Hub connects different nodes . which is
present in the Star n/w, & it can manage or control whole network.
Ring–topology
this topology is formed in the circular fashion in which the data travels in one direction & the devices on the
ring act as a repeater in the way to keep the signal strong.The Backbone of the topology ends at the starting
node.
Mesh topology
This node is directly connected to all the other nodes, which are present in the entire network. In this, each
node, not only send its own data but also can broadcast the data from other nodes. This topology is very
expensive just because of there are many needless connections & it is mainly used in wireless-connections.
Tree topology
This includes the features of the Star and Bus Topology. In this topology, a root node is connected to all the
other sub-level nodes, which are connected in the hierarchically node to the other sub-level nodes. The base
of this topology is similar to the Bus & Star-topologies.
Hybrid Topology
In this type of Topology you can formulate two or more than thousands of topologies in the way to form a
consequent topology.
This has the rule that between any two nodes of the there can only be a maximum of five segments which is
connected through four repeaters and connectors. In addition, only 3 of the segments may be populated
(trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes
attached to it.
This rule does not apply to the other network protocols or the Ethernet networks where all fiber optic
cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber
optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule. The speed of networking switches
is vastly improved over older technologies, and while every effort should be made to limit network segment
traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no
impact to the network.
Money: The linear bus network is the expensive component to install a network,
Length of Cable Needed:The linear bus network uses the shorter length of cable
Future Growth: The Star Topology which is expanding a network is done by adding another concentrator
Cable Type : The most common cable in schools is the unshielded twisted pair, which is most often used
with the star topologies.
A call center is operated through an extensive open workspace for call center agents, with work stations that
include a computer for each agent, a telephone set or headset connected to a telecom switch, and one or
more supervisor stations. It can be independently operated or networked with additional centers, often linked
to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice
and data pathways into the center are linked through a set of new technologies called computer telephony
integration.
The purpose of the OSI reference model is to provide guidance the vendors and developers so the digital
communication products and software programs they create will interoperate, and to facilitate clear
comparisons among communications tools.
In this layer The tree topology is used in order to connect the computers which has used cables and the hub
In here Central Device is the main hub. The Computers use cables and internet services which are contolled
by the routers during data transfer.
Each and every Computer has switches and supplies electronic through them .The Data link layer has used
the bridge and WAP as the main devices for data transferring in this Data link layer. The data link layer has
the role maintaining the data link between the computers to enable communications of the Company
Winsoft.
Network layer
This layer known as the Network layer provides the switching and routing technologies, creating logical
paths, known as the virtual circuits, for transmitting data from node to node.
The Central Device in this Network layer is the router and IP, IPX and ICMP are protocols in data link layer
Thw Data is transferred through protocols by using routers in the Company Winsoft. Each departments has
to depend on the network layer of Winsoft.
Transport layer
This layer known as the transport layer provides transparent data between the systems or the hosts.It is
responsible for the end to end error recovery and flow control.
Typically, the transport layer cannot accept large messages, but there are strict message size limits imposed
by the network layer. Message transferring is the major activity in transport layer in Winsoft.
The Session layer enables the communication sessions which is to be established between the processes or
applications which are running on two different computers and establishes, maintains and terminates the
communication sessions between applications in Winsoft (pvt) Ltd.
Presentation layer
This layer known as the Presentation layer provides independence from the differences in data
representation by translating from application to network format.In this layer the gateway and redirector are
the network devices and JPEG/ ASCII/ EBDIC/ TIFF/ GIF and PICT are the main protocols in presentation
layer.
All the different formats from all sources are made into a common uniform format that the rest of the OSI
model can understand.
Application layer
This Application known as the application layer supports application end user processes. The User
applications are the centralized devices in this layer and this layer provides the application services for file
transfers-mail, and the other network software services.
The router has more capabilities than the other network devices such as the hub or the switch that are only
able to perform basic network functions. For Eg a hub is often used to transfer data between computers or
network devices, but does not analyze or do anything with the data it is transferring. By contrast, routers can
analyze the data being sent over a network, change how it is packaged, and send it to another network or
over a different network.
Router
Core Router
Edge Router
Virtual Router
Wireless Router
The Switch Receives a message from any device which is connected and transmits the message only to the
device for which the message is targeted.The Switch has a efficient way of handling and transmitting data
between multiple devices within a LAN.
Managed Switch
Unmanaged Switch
The Unmanaged switches cannot be configured as they are not qualified for configuration.They are just like
the Plug and Play devices and you need to connect your computer or other network devices directly to the
unmanaged switch.
Many Servers are commited to the specific task often referred to as dedicated. As a result, there are many
number of dedicated server categories, like the print servers, file servers, network servers and database
servers. However, many servers today are shared servers which can take on the responsibility of e-mail,
DNS, FTP, and even multiple websites in the case of a web server.
Because they are commonly used to deliver the services that are required constantly, most servers are never
turned off. Consequently, when the servers fail, they create the network users or company many problems.
To alleviate these issues, servers are commonly high-end computers setup to be fault tolerant.
Application Server
Blade Server
Cloud Server
Dedicated Server
Proxy Server
Standalone Server
Web Server
VOIP is used by many people in addition to their telephone service since the VOIP Service provides and
offer lower rates than the traditional phone numbers.
Low Cost
Increased Functionality
Low Cost
The General phone Service via the VOIP costs less than equivalent service from the traditional services.
There are also some cost savings due to using a single network to carry the voice and data. This is especially
true when users have their existing under-utilized network capacity they can use for VOIP without any
additional costs.
In Extreme Cases Users see the VOIP phone calls a free of charge service.While the Internet Service costs a
lot The VOIP via this internet services may not charge you more so the users view the calls as free.
Increased Functionality
The VOIP makes impossible that cannot be impossible with the traditional phone service.
The IP Phones are sometimes called the VoIP telephones, SIP phones or the softphones. These are just
different names for a device/software client that is designed to support the transmission of voice over the
internet, or what is better known as VoIP (or Voice over Internet Protocol) technology. IP Telephones come
in several types. Learn more about the different kinds of IP phones.
The Popular IP Phones are supported by the 3CX Phone System for Windows.
IP telephone system
An IP telephone system uses packet-switched Voice over IP (VoIP), or Internet telephony, to transmit
telephone calls over the Internet as opposed to the circuit-switched telephony used by the traditional Public
Switched Telephone Network (PSTN). Also known as VoIP phone systems, IP telephone systems typically
comprise a VoIP private branch exchange (an IP PBX) and desktop VoIP phones (IP Phones) that connect to
a VoIP service provider via a Local Area Network (LAN).
One of the key advantages to IP telephone systems is that whereas long-distance calls on a regular phone
system can be cost prohibitive, the same calls on an IP phone system are free — there are no fees beyond the
cost of Internet access.
So Its simple implementation has enabled a constant evolution in the terms of reliability range and presence
in corporate environments.
Corporate use of the IP telephony allows calls within the company to have the low cost of 0, even when the
company has branches in different locations.
The Video Centric also provides the hire of SMART Boards, SMART Podiums, SMART Kapp IQ boards,
video conferencing PTZ cameras and LCD displays for events, training sessions or any short term hire
requirements. Some of the video equipment available to hire includes the products below, subject to current
hire stock, however do give us a call to discuss your event or needs – we may have other available hire
equipment that could be better suited, or be able to provide you with a tailored solution based upon your
specific needs.
Wireless Equipment
This Equipment can help you set up a wireless network and helps you to avoid the costly infrastructure costs
associated with wired networks. The Equipment supporting 802.11b (2.4GHz) can travel up to 91 meters
indoors, and are rated up to 11 Mbps, though our experience has been that the maximum effective
throughput is only around 5Mbps. Equipment supporting the new 802.11a (5GHz) has an even longer
distance capability, and is rated up to 54 Mbps, though our experience has been that a maximum effective
throughput is only around 28 Mbps.
How It Works
Wireless Router
You can install the wireless router anywhere on your network. This router has the hard-wired link to the
network, and can be directly connected to the Cable Modem or DSL modem. This unit broadcasts to
wireless components on the LAN (servers, workstations, printers, etc). This unit can also serve as the DHCP
allocator as well. Units like the Linksys wireless router have a built in firewall that we configure through a
web interface. Units like the Delink also have a built in print server.
The 802.11a devices can use 152-bit encryption, but still needs vendor enhancements to keep transmissions
private. Be sure to select a vendor like ACE that understands the difference between what measures like
WEP are supposed to do, and what they really do. Your business depends on it.
VLANs allow network administrators to partition their networks to match the functional and security
requirements of their systems without having to run new cables or make major changes in their current
network infrastructure.
Ports on switches can be assigned to one or more VLANs, allowing systems to be divided into logical
groups -- e.g., based on which department they are associated with -- and rules to be established about how
systems in the separate groups are allowed to communicate with each other. These can range from the
simple and practical (computers in one VLAN can see the printer on that VLAN, but computers outside that
VLAN cannot), to the complex and legal (e.g., computers in the trading departments cannot interact with
computers in the retail banking departments
The Computer Communication Protocol is the agreement which specifies a common language which two
computer uses to exchange messages.It defines the communication precisely. Every LAN has a topology, or
the way that the devices on a network are arranged and how they communicate with each other.
The Protocols exist at the several levels of the OSI layers model. On the internet, there is a suite of
protocols known as TCP/IP protocols that are consisting of transmission control protocol, internet protocol,
file transfer protocol, dynamic host configuration protocol, Border gateway protocol and a number of other
protocols.
Internet Protocol
The key Communnication which is used in the internet is called, the Internet Protocol usually known in the
short form IP. Each computer that connects to the internet must follow the Internet Protocol. IP specifies
exactly how a packet must be formed, and how a router must forward each packet on toward its destination.
Data packets are called IP Datagrams. A datagram travels across the Internet independent of the sender. To
make datagram routing and delivery possible, each computer attached to the internet is assigned a unique
address called as Internet address, often abbreviated IP address.
They are so important and they work together that the entire set of communication protocols the Internet
uses is known as the TCP/IP protocol suite.
IP does not make physical connections between computers but relies on TCP for this function. IP is also
used in conjunction with other protocols that create connections.
A different type of protocol is Internet Control Message Protocol (ICMP). It defines a small number of
messages used for diagnostic and management purposes. It is also used by Ping and Trace route.
VOIP Protocols
Like every other aspect of Internet communications, VoIP has evolved rapidly since its introduction in 1995,
and continues to evolve today. The standards show the influence of their creators: the traditional
telecommunications players, the Internet community, and the communications equipment manufacturers
such as Cisco and 3Com.
In rough chronological order of introduction, the most widely used VoIP systems are
H.323 Developed by the International Telecommunications Union (ITU) and the Internet Engineering Task
Force (IETF)
Reception
Marketing Department(10 Staffs)
The General Manager Room
Accounts Department (8 Staffs)
Customer Meeting Area (With Wifi Facilites)
Switch 2 PCs Connected along with one switch of the pc of general manager
2nd Floor
2 Switch
2 IP Phone
1 Router
2 Wireless End Devices
1 Access Point
3rd Floor
In this third floor server There is Server Room, Calling center, Auditorium
The Servers are connected to the switch Fiber Optical cable for the reason of high rate data transmission
and network administrator pc which is also connected to the same switch. There is a Conference Hall in
with the allocation of 150 persons in there all PCs and Network have Wi-Fi connection.
1st Floor
1 Router
3 Switches
123 PCs
Access Point
Wireless End Device
Wi-fi Connection
Ip phone
The Switch to Switch Connection is using copper-cross device cable router to router and switch to pc
connection using copper straight connection through cable.
Purpose of this cross cable is RX (receiving terminal) connects to TX (transmitting) of one pc to another PC
and vice versa.
In the 2nd floor the Auditorium computer is using fiber optical cable and Wi-Fi connection
There are two choices when choosing the right and required technology for our connection cable.the Copper
or Fiber Optic.
In Here router to switch, switch to IP phone cross over cable, router to Access point using cross-over
through cable and switch to video conference room using fiber optical cable for purpose of high data
transmission and access point use for connecting wireless devices
The first version was ready for preview on October 1, 2014 together with first technical preview of System
Center.The Windows Server 2016 was released on September 26, 2016 at the event of Microsoft's Ignite
conference and became officaily available on October 12, 2016.
The Features
Networking Features
DHCP: As Network Access Protection was initiated Windows Server 2012 The DHCP never
supports NAP in Windows server 2016
DNS Client: Service binding and supports computers with more network interface
DNS Server
Windows Server Gateway
IPAM(Internet Protocol Address Management)
Network Controller
Hyper-V Network Virtulizalition
Supporting Browsers
Microsoft Edge
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Google Chrome (latest released version)
Mozilla Firefox (latest released version plus immediate previous version)
Apple Safari (latest released version)
Component
Domain Controllers
Requirement
Component
Processor
Requirement
Memory
Requirement
Mailbox
Edge Transport
Component
Disk Space
Requirement
At least 30 GB drive
An additional 500 MB of available disk space
200 MB of available disk space on the system drive
A hard disk that stores the message queue database on with at least 500 MB of free
space
The Servers
(The Types of Servers and their Comparisions with Cost and Benefit)
The Server is a computer or a device on a network that manages network resources. There are many types of
servers.
The Web Servers which are connected to the internet are given a unique address made in a series of four
numbers.
Web Server
The Web Server serves static content to a Web browser by loading the file from the disk and serves across
the network to the users web browser. This entire exchange is initiated by the browser and server which
communicates with each other using HTTP.
Mail Server
The Mail Server is a storage area where the email is stored for the local areas.a set of user definable rules
decide how the mail server should react to the destination of a specific message. a database of user accounts
that the mail server recognizes and will deal with locally, and communications modules which are the
components that actually handle the transfer of messages to and from other mail servers and email clients.
There are many free and open source email server products such as Citadel, hMailServer, SmarterMail,
Apache James and Axigen.
HMail : This Server is created for unlimited use and it is easy to install and configure.
When it comes to the Disadvantages This Server lacks of native mobile and the support of web can be
identified.
Citadel : Easy to install and there are no limits on users and it is small foot print. But it may not scale well
for larger organizations
Apache James: Mailets provide modular design and flexibility and there is no GUI in Apache James mail
server
Zarafa : This server has a comprehensive mobile support and a pleasing user interface.
SmarterMail : It has a nice user interface and good support for mobile mail
The best mail server for winsoft is the SmarterMail server .The Company ViUX TM is an authorized lease
reseller of SmartMail licenses, which provide a low cost point of entry to Microsoft Exchange level features
for as little as $ per month. Unlimited Mailboxes price is $100
FTP Server
It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure file
transfer between computers while ensuring file security and transfer control
Proxy Server
It acts as a mediator between a client program and an external server to filter requests, improve performance
and share connections.
DateBase Server
Database server is the term used to refer to the back-end system of a database application using client/server
architecture.
Fax Server
It is one of the best options for organizations that seek minimum incoming and outgoing telephone
resources, but require to fax actual documents. Fax server is essential component for Winsoft because they
need to fax some document to some companies or their clients. Here these sending, receiving or distributing
faxes over the network. Here a fax server is equipped with one fax modem and which is plugged phone line.
A fax server is connected to the LAN and it can communicate with the computers in the network.
Printer Server
A print server is a software application, network device or computer that manages print requests and makes
printer queue status information available to end users and network administrators.
On the other hand The hardware which is produced in the last few years with an efficient architecture or
machines are built for specific purposes which work well.
The CPUS with 64 bit (x86-64) must be fast enough to run Ubuntu and can run the 32-bit (x86) version as
well. However there is a CD available with 64 bits The 32bit seems to be easy to use and it runs into
problems.
The Ubuntu Desktop has 11.4 and it uses Unity as the default Graphic User Interface In order to run thie
Unity feature The System needs a more capable graphics adapter
Visual Effects can be turned off If you have the suitable GPU (Graphics Card or Intergrated Chipset)Which
is Supported.
ATI
Intel
Nvidia
If your System has a less memory of 192 MIB The Installation CD can be used.
The System Requirements for Xubuntu between Ubuntu Server and Desktop
The Feedback
Your Name(Optional)
Your Email ID
Date of Service
Your Comments
Please tell how your internet is describing If any problems I can try to fix it
If any suggestions and Complaints please don’t hesistate to contact me I can give an
answer.
Every Project which we do for your benefits from our comprehensive project management process which
includes the team of engineers, consultants, and project managers who have extensive experience delivering
all types of technology transitions smoothly, with attention to reducing the organizational change and
turmoil that is usually part of the package.
The Process
Budgeting
Planning and testing
Creation and execution of PCP(Project Communication Plan)
Testing
Project Close
Post-Implementation Support
Server Virtualizaton
Server and Workstation Replacements and Upgrades
Network Infrastructure Upgrades
New Network Implementation
Office Moves and Expansions
Server Upgrades and Replacements
Document Management System Implementation and Upgrades
Cloud Computing Implementation and Migration
Security Assessments
Disaster Recovery Planning
This is important for the CSP which is moving to the converged fixed-mobile network because it gives them
the ability to quickly and efficiently resolve problems, reduce customer churn and provide a basis for future
revenue enhancements by offering additional services that scale. Management Systems Solution can be used
as a powerful resource to monitor and control the system.
Mobile data traffic will nearly double in volume annually over the next several years.
The only way that mobile network operators can meet demand for capacity and realize the revenue growth
potential of mobile data – either in the 3G or the 4G environment – is by improving the utilization and
performance of their current and future network resources. That means supporting increasing amounts of
multimedia traffic – more subscribers, more applications and more content – with available network
capacity. It also means delivering a better user experience.
Optimization Service Node Wireless Access enables operators to increase available network capacity by
50% – without adding new spectrum or costly infrastructure. By increasing available network capacity,
operators can
Defer capital expenditures (capex) for network upgrades and control operating expenses (opex) due to
increased efficiency
Maintenance Schedule
Preventative Maintenance is normally included within our standard support packages . however, we also
provide maintenance services to those clients who have an in-house IT team and who want their team to be
allocated to more specialized tasksOur program of pre-defined and fully documented preventative
maintenance tasks uses our qualified staff and industry recommended processes.
Each and every maintenance task is performed at a standard frequency or on a nominated basis which is
appropriate for our environment
Patch Management
Log file review and corrective action
Security Vulnerabilty testing
Anti-Virus and Anti-Spam management
Active directory account review
Archiving and data file management
Routine backup verification and test restores
Threshold trending and management – CPU, RAM, disk, network bandwidth
Application interoperability and alerts
Asset management tasks
Custom maintenance tasks developed to meet unique requirements
Server
Desktop
BackUp
www.ianswer4u.com/2011/05/network-topology-typesof-
network.html#axzz4AxPiFq2d.
www.pccservices.com/network_types.html
https://blog.udemy.com/managed-vs-unmanagedswitch
www.computerhope.com/jargon/s/server.htm
www.voipinfo.org/wiki/view/What+is+VOIP
https://bgnp.wordpress.com/2014/07/26/iptelephone
www.videocentric.co.uk/productcat/hire-equipment/.
http://searchnetworking.techtarget.com/definition/virtual-