Network infrastructure of Miles High Stadium
Network infrastructure of Miles High Stadium
Name:
Institution:
Date:
Summary
Currently, large organizations have organized network infrastructures in technology towers for their servers and storages, databases network as well as end users. Most of these technology domains are often integrated with smaller towers having their own department interfacing with different associates in their organization to develop and support their operations (Davies, 2012). However, as the business become more global, this models that are put in place becomes less effective and efficient and seems to be reaching their limits.
This is mainly because the customers’ expectations grow each time as the technologies advances. Owing to this, the organizations are slowly turning away from sophisticated network infrastructures to more efficient plan-built- run models for organization (Davies, 2012). This helps in facilitating a wide set of performance and eventually improving the objectives of transformation. Consolidating information technology network infrastructure by large organizations across different business, the model designs are combined with central and regional infrastructure tower elements (Clemm, & Walter, 2013). Therefore to avoid duplication of activities in an organization and improve efficiency, the network infrastructure helps in the diagnosis of issues pertaining to application performance in terms of proper information management. A study on a stadium domain service as conducted and its entire network infrastructure reviewed.
Task one
Mile high stadium is located in the city of Denver, Colorado. This is modern stadium that embraces network infrastructure in its operation in terms of information technology (Desmond, 2013). The stadium is independently operating its own domain name service (DNS) that enable easy access to the information via the website. HYPERLINK “http://www.sportsauthorityfieldatmilehigh.com/stadium-information/”http://www.sportsauthorityfieldatmilehigh.com/stadium-information/ is the domain service name used to retrieved information about mile high stadium.
This information represents the names used to locate internet addresses and active directory which is a private network. The domain name service helps in performing the name resolution from every client that arrives at the server of the stadium (Desmond, 2013). This is then converted to an IP address that gives a correspondence to that particular website that is hosting the server and a response is re-laid depending on the content that is requested in the web. In this case this case the information concerning the stadium is displayed (Jeffrey & Piyasat, 2012). If this is not done correctly, an error message is displayed on the site by the browser.
The domain name service has root which is denoted by a dot coming at the end of the URL and a top level domain that is represented by ‘com’. The top level domain is followed by the lower domain that makes the word ‘sportsauthorityfieldatmilehigh’ to be identified. The DNS server operates using a referral to perform the task of search resolution (Jeffrey & Piyasat, 2012). It exchanges the information required from the stadium with the root name server to the top level domain authoritative server that eventually retrieve information about the top level domain (Motta et al, 2011). For instance, the DNS of the stadium successfully retrieved stadium information, the packing and directions, host and event, event tickets and the stadium contact among other details (Minasi, 2014).
For an organization network infrastructure to operate, the components such as primary domain controller must be effectively configured (Mankell & Segerberg, 2012).In the domain system, the primary domain controller act as the controller for organization clients that do not have active directory software for clients. In addition, the organization network requires a router which helps in forwarding data packets within a given network using the address of required destination (Clemm, & Walter, 2013). The information obtained from the pocket data is important in retransmitting the data packet in the network. The firewalls regulate the access to organization procedures and policies that guide network operations. This is executed through proxy service, packet filtering, creating a perimeter network and tasteful inspection among others (Mankell & Segerberg, 2012).
Task two
The stadium has many departments that ensure objectives and goals are achieved. These departments include department of corporate entertainment, guest services department and ticketing section among others (Minasi, 2014). The organization structure of Mile high stadium is organized into a central system with the board of directors occupying the upper most level of the management and the hierarchy descends down to the general workers who also ensure that the objectives of the stadium are achieved. Different departments operate in an integrated manner in carrying out their functions. For instance, the head of department of guest services is charged with the responsibility of ensuring that the client’s needs are fulfilled in terms of food and accommodation (Theiss et al 2013). The department ensures that the customers orders are attended to by delegating duties to the sections in this department for example the food department in their docket provides catering services to the client at the stipulated time. The accommodation department directs the client to places they can relieve themselves and even change their attires.
The communication flows from the top management to the bottom through the use of computer network in the organization (Rudolph & Schneider, 2013). The head of corporate and entertainment department also in collaboration with the top management of the stadium ensures that clients are promptly attended to. The head of department communicates its request from the clients to the employees that work under his/her docket through the use of the computer network. The tasks are them performed by the employees and the feedback communicated to other corresponding departments to enhance the leadership responsive to client’s requirement (Motta et al, 2011). The entire organization department in the stadium is integrated so that every department is involved in the organizations operations.
128587524130Board of directors
Board of directors
2066925422910 CEO
CEO
-70485045720HOD. Guest services
HOD. Guest services
1838325112395HOD. Entertainment
HOD. Entertainment
4638675183515HOD. Ticketing
HOD. Ticketing
5267960190500Ticket issuance
Ticket issuance
2667000209550Event planning
Event planning
4124325152400Printing
Printing
228600257175Accommodation
Accommodation
1628775257175Security
Security
-829310276225Food
Food
The above diagram represents the general organizational structure of Mile high stadium.
The diagrams below represent the structure of three main department of the stadium which is entertainment, guest services and the ticketing department.
4486275285750HOD. Guest services
HOD. Guest services
285750-219075HOD. Entertainment
HOD. Entertainment
1352550150495Event planning
Event planning
-685800211455Security officer
Security officer
-733425215265Gate guards
Gate guards
1352550215265Address system
Address system
5305425118110Accommodation
Accommodation
3438525118110 Food
Food
3200400344805 Catering
Catering
5543550344805Lodge section
Lodge section
153352522860 HOD. Ticketing
HOD. Ticketing
369570092075Printing
Printing
-34290015875Ticket issuance
Ticket issuance
-342900219710 Accounts
Accounts
369570031115 Distribution
Distribution
Active directory of the organizational structure of Mile high stadium is based on hierarchy from the board of directors to the chief executive officer (Desmond, 2013). It passes further down to the general employees that deal with services ranging from food and accommodation to issuing of tickets at the stadium. For each of the three main departments there several departments that ensures their efficiency (Farnham et al, 2012). For instance, the department of guest services has other two sub departments which are food and accommodation. Corporate entertainment department consist of security section and the section that coordinates all the programs that run in the stadium. Finally the ticketing department which has sections that deals with ticket printing and distribution of the bought ticket. These are just departments among others (Jeffrey & Piyasat, 2012).
Active directory construction depend on application protocol for modifying and querying directory services and a treelike structure for representing a directory of organizations structure, its Domains Groups and individual units (Farnham et al, 2012).. This is then put together with the Domain Name System and helps the organization in naming domains, individual computers and servers. For successful functioning of Active Directory, Domain Name Service must first be configured.DNS enables Active Directory to use the windows DNS service to perform its function faster and efficiently (Motta et al, 2011). Furthermore, the configured active directory can be used to find the domain names, IP addresses and objects and locate services by using their service location records (Farnham et al, 2012).
In the case of the Miles high stadium, the active directory can be derived from its organization structure as follows: widows’ server-board of directors- chief executive officer-guest services- food and accommodation, windows clients-board of directors-chief executive officer-corporate entertainment-security and event planning and windows user-board of directors-chief executive officer-ticketing-printing and issuing (Desmond, 2013).
Task three
Successful implementation of the stadium active directory entirely depends on the management system because it is being accessed by many users that have diverse needs and should therefore acquire access level (Henrie, 2013). This approach should be based on a clearly defined criterion according to the level of the client’s requirement. Before the commencement of the operation, it is prudent to establish legitimate users of the network for proper creation and maintenance of the accounts. Different users should be identified with particular accounts their access levels (Jeffrey & Piyasat, 2012). This process should be based on specific computers and domains. The criteria depend mainly on the privileges the user account has and the ability to access the corresponding network resources.
Predetermined user account for administrator will be the head of departments of guest services, entertainment and ticketing and the sections working under them will access the directory through an account called guest account (Desmond, 2013). However, this guest account is properly designed to match the requirements of the stadiums network infrastructure. In addition, the clients of the stadium that will be making inquiries of the services wills also be granted access of the directory through the guest account (Motta et al, 2011).
These accounts will not require password in order to access because it is developed for the outsiders to access the stadium in formation. However, the administrator account has a password that is keyed in before the access is granted (Desmond, 2013). This is because the information therein relates to security of the stadium and contains vital information about the entire operation of the stadium (Davies, 2012). The password used is only known by the users that can access is often changed to enhance confidentiality of the operation. Network administrator created is also responsible to create network accounts for new clients of the stadium the new account formed must have a user name and a password that conforms to certain standards corresponding to the password strength set by the administrator (Shelly & Vermaat, 2012).
Moreover, additional parameters that may affect access rights and the privileges pertaining to the role of the user and the approved requirement for network resources (Stallings & Lowrie, 2013). The configuration of a default user account provides minimum rights and thus should be must be configured to enable additional privileges to the clients (Svidergol et al, 2013). Each and every new user is added, a manual update of a user account is supposed to be developed even though it may prove to be time consuming (Wu et al, 2013).
In order to implement the domain controller system of the stadium, there are several services that must be installed on the main server which allows access to networked computers and other resources like information shared (Shelly & Vermaat, 2012). The central computer that acts as principle is then connected to the network and controlled only by unauthorized user in accessing the server (Stallings & Lowrie, 2013). However every client should access a number of services such as directory services which is on a system that stores information in a directory. These services helps in supporting the stored information as w ell as enabling its access (Svidergol et al, 2013).
Task four
It is important to subject a new network program to a pilot test to ascertain if it is effective (Basile, 2011). However, before testing a network infrastructure it is important to create a testing environment this help in identification of design problem before the network is fully deployed even though it is time consuming and may need a test network is deployed (Wu et al, 2013). A testing plan is first created alongside a test t cases, the test is then conducted and finally the results are evaluated.
After a test plan has been created. It is important to produce a list of clearly defined objectives that are to be accomplished at the completion of the test (Motta et al, 2011). Moreover, different parameters are checked and specific aspects of the network deployment are assessed of a given network infrastructure. The network infrastructure should be in compatibility with hardware and network devices used, the compatibility of operating systems and applications software is then put to test (Tirgari, 2012). Evaluation of hardware and software components of the network is also done to determine a performance baseline to help in benchmarking certain features of network. The mechanism of testing security is then documented (Rudolph & Schneider, 2013).
Basis of the test case should be on a plan that is given to the tester and is be in the form of identified steps, indicating how to use the network and handling of the computer devices (Basile, 2011). This should be based primly on the network element being tested and attempt to exhaust all functions and any procedure that maybe followed. However, the main focus of the test case should be to identify any errors and weaknesses on the network infrastructure (Motta et al, 2011). The access of administrator directory should be permitted only to the authorized users. Therefore, it is prudent to manage permissions in an efficient and effective manner.
This is done obtained through issuing of different permissions to individual user depending on the part of the network infrastructure (Tirgari, 2012). Moreover, the assigning of permissions should be done according to the specified groups to allow more efficient management approach. This can be connected to the main directory but permissions should be set for specific directory files (Henrie, 2013). Direct permission should be granted on folders of read, change, and full control of the infrastructure. The services such as printing and ticketing should be shared over a network developed .however, configuration should be done to establish how these services are shared between the user network .even through the terms used may differ varies between various stages and versions in the same management system (Motta et al, 2011).
There should be proper when management of the disk space that is available in a network designed (Mankell & Segerberg, 2012). It is also important to assign disk quotas to determine if there is limitation in the space of each user. It also ensures that each user has available resources that do not expand beyond what the expected storage requirements. On top of this file compression should be performed to save space and avoid unnecessary waste of resources. Deciding on which files and folders is necessary to even though it may be more time consuming to use them. (Motta et al, 2011) This process makes it possible for the contents of folders to be kept in a compressed and efficient state. The other more confidential way is by encrypting files and folders to deter unauthorized access to the files (Davies, 2012).
The security of the network is paramount to the organization especially with regards to those who are accessing the network from outside (Sitzabee et al, 2013). Therefore, using a mote access method is important as it is based on the routing and remote access service from the main windows server. This is necessitated through the use of dial-up and visual private network method. Using the internet in connecting to the developed network by applying a tunneling connection involving the users to come up with a visual network that give access to the main network server.
The integration of the remote access server in creating a more safe and secure tunnel for the passing of information from different departments is key to the organization operations (Theiss et al 2013). Visual private network is one of the security approaches that is predominantly applied in large organization because it allows many users to connect to the network. On the other hand it offers a continuous remote access to the network as the remote access server of the organization is permanently connected to the internet (Sitzabee et al, 2013). Implementing the policy of a remote access to the network authorizes the client in accessing the server. The access policy involves conditioning of the policy including the type of authentication, the restriction day, restriction time and data link to the network (Rudolph & Schneider, 2013).
It also include all the protocol that are used, the group of windows permitted to connect to network and type of tunnel used (Davies, 2012). In connection to that, permission of remote access which is either allowed by ensuring that the conditions of the policy are satisfied or the explicit access is granted by an administrator. Finally, the file of the remote access that includes the constraints of dial-in and the configurations of the IP address and the type of encryption used for the network should be clearly defined (Motta et al, 2011).
In conclusion, the stadium should put in place additional measure regarding security of the network infrastructure by installing intrusion detection system which closely monitors every possible intrusion network (Davies, 2012). This kind of network systems may be deployed on a specific network server to check on the server logs for an external intruder or may be installed on Network-based server to monitors network data traffic on the network during the operation (Clemm, & Walter, 2013).
References
Basile, A. (2011) Networking system and innovation outputs: The role of science and technology parks. International Journal of Business and Management, 6(5), 3-15. Retrieved from HYPERLINK “http://search.proquest.com/docview/867071928?accountid=45049″http://search.proquest.com/docview/867071928?accountid=45049
Clemm, A., & Wolter, R 2013. Network-embedded management and applications: Understanding programmable networking infrastructure. New York, NY: Springer.
Davies, J. 2012 Understanding IPv6: Your Essential Guide to IPv6 on Windows Networks.
Desmond, B., 2013. Active directory designing, deploying, and running Active Directory.
Farnham, O’Reilly Jeffrey S. Beasley & Piyasat N 2012. A Practical Guide to Advanced Networking: Third Edition Pearson.
Henrie, M. (2013) Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal,25(2), 38-45. Retrieved from HYPERLINK “http://search.proquest.com/docview/1434438191?accountid=45049″h ttp://search.proquest.com/docview/1434438191?accountid=45049
Mankell, H., & Segerberg, E 2012. Firewall. London, Vintage.
Minasi, M., 2014. Mastering Windows Server 2012 R2. Indianapolis, Sybex.
Motta, G., Barroero, T., Galvani, F., & Longo, A.(2011). IT service level management: Practices in large organizations. Communications of the IBIMA, Retrieved from HYPERLINK “http://search.proquest.com/docview/1437173167?accountid=45049″http://search.proquest.com/docview/1437173167?accountid=45049
Organization for Economic Cooperation and Development 2012. Latin American economic outlook: 2013. [S.l.], Oecd.
Rudolph, S., & Schneider, F. (2013). Political barriers of implementing carbon markets in japan: A public choice analysis and the empirical evidence before and after the fukushima nuclear disaster. Environmental Economics and Policy Studies, 15(2), 211-235. doi:http://dx.doi.org/10.1007/s10018-012-0049-z
Shelly,Gary B., & Vermaat, Misty, E 2012. Enhanced Discovering Computers, Complete 2012 Your Interactive Guide to the Digital World
Sitzabee, William E, Ph D,P.E., U.S., & Harnly, M. T., U.S.A.F. (2013). A strategic assessment of infrastructure asset-management modeling. Air & Space Power Journal, 27(6), 45-68. Retrieved from HYPERLINK “http://search.proquest.com/docview/1503683646?acco%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20Theiss,%20V.,%20Krespi,%20N.%20T.,%20&%20Lavarda,%20C.%20E.%20F.%20(2013).legitimating%20implication%20in%20the%20process%20of%20the%20implimenting%20an%20ERP%20system%20in%20aholding%20company.%20Journal%20of%20Information%20Systems%20and%20Technology%20Management%20:%20JISTEM,%2010(2),%20287-302.%20Retrieved%20from%20http://search.proquest.com/docview/1440824157?accountid=45049%20untid=45049″http://search.proquest.com/docview/1503683646?acco Theiss, V., Krespi, N. T., & Lavarda, C. E. F. (2013).legitimating implication in the process of the implimenting an ERP system in aholding company. Journal of Information Systems and Technology Management : JISTEM, 10(2), 287-302. Retrieved from http://search.proquest.com/docview/1440824157?accountid=45049 untid=45049
Stallings, W., & Lowrie, B 2013. Computer security principles and practices Pearson Edu.
Svidergol, B.,Allen, R., & Hunter, L. E 2013. Active Directory cookbook. Beijing: O’Reilly.
Tirgari, V. (2012). Information technology, policies and procedures against unstructured data:.Academy of Information and Management Sciences Journal, 15(2), 87-106. Retrieved from HYPERLINK “http://search.proquest.com/docview/1037809135?accountid=45049″http://search.proquest.com/docview/1037809135?accountid=45049
Wu, Y., Cegielski, C. G.,Hazen, B. T., & Hall, D. J. (2013). Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud. Journal of Supply Chain Management, 49(3), 25-41. Retrieved from HYPERLINK “http://search.proquest.com/docview/1467435391?accountid=45049″http://search.proquest.com/docview/1467435391?accountid=45049

Leave a Reply
Want to join the discussion?Feel free to contribute!