100% found this document useful (1 vote)
56 views

Document 1

Uploaded by

tekiletsegaye441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
56 views

Document 1

Uploaded by

tekiletsegaye441
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Task 1:Disaster recovery plan

R.N Expected disaster Types/category of Disaster Recovery plan/action


1 Corona Pandemic Consider remote
work options and
flexible scheduling to
minimize
transmission risk
2 Network failures Technology issue Conduct regular
maintenance and
upgrade of
technology system
3 Flood, storm Natural Develop emergency
response plan
4 Power interrupt Technology issue Active power source
or uninterruptible
power supply/UPS
Task 2:project phase and activities
Phases Activities to be performed Duration Responsible body
Planning Study business requirements 3 months Manager
Allocate budget Supervisor
Net Admin

Requirement specification HW requirements 4 months Net technician


SW requirements DB Admin
Net Admin
Purchasing
Design Surveying the site 2 weeks Net technician
Select network topology Net Admin
Design network diagram

Implementation Install HW 3 months Net technician


Install SW DB Admin
Configure HW and SW Net Admin
Configure security Labors

Testing & maintenance Test Cable functionality 1 month Net technician


Test network devices DB Admin
Test servers and PCs and SWs Net Admin
Test firewall Labors
Troubleshoot HW malfunction
Maintain SW errors
Documentation Users HW and SW manuals 2 week Net Admin
Users support and training Manager

TASK 1: HARDWARE REQUIREMENTS

No Item Specification Quantity Unit Total


price(birr) Price
1 Server Dell PowerEdge R740 Server 2x 5 200000 1000000
12-Core Silver 4116,
2.4Ghz ,8GB Ram 4TB HDD
2 PC Hp , 10th Gen Intel Core i5, 8GB 105 30000 1920000
RAM,1 TB HDD, 256GB SSD,
Windows 10
3 Distribution Cisco Catalyst 9300X Fiber 1 250000 250000
switch
4 Access switch Cisco catalyst WS-C2960S-F48TS- 3 120000 360000
L,48 port
5 Network cable 1 UTP 5 roll 5000 25000
6 Network cable 2 Fiber optics 100m
7 Firewall Cisco ASA5525-K9 1 200000 200000

8 Router Tp-link 7 3200 22000


9 Network RJ45 1000 10 10000
Connector
10 Crimper
11 Tester
12 Rack
13 Trunk
14 Network RJ 45 Keystone jack
connector
15 Outlet
16 Cutter/Pressor
17 UPS
18 Fan
19 Sensor/ camera
20 Backup device External HDD
21 Patch panel
22 Patch cord
23 Splicer machine 1
24 Divider 100 300 30000
TASK 4: SOFTWARE REQUIREMENTS

No Item Specification Quantity Unit price Birr Total Price


1 MS Windows server 2019 3 CD 700 2100
2 Windows OS 10 3 CD 400
3 Driver Pack solutions
4 Utility SW Kaspersky
5 App SW MS Office
6 Browsers Chrome
7 Database SW MS SQL Server 2016 3 CD 250
8 Email SW
9 Player
10

Total Man power

R.N Man power /name Quantity Salary in birr


1 Manager 1 20,000
2 Net Admin 1 15,000
3 Net technician 3 12,0000
4 DB Admin 1 12,0000

5 Labors 6 4,000
Total birr
Broad band internet ,band width, and cost

R.N Internet service type Bandwidth Cost per month


1 Fiber optic 50 Mbps 40,000
2 ADSL 8mbps 6,000
3 Cable 10mbps 12,000

Task . 1Maintenance strategy plan


Preventive Maintenance
 Clean PCs, servers, net devices, etc.
 Disk Defragmentation
 Install antivirus and scan computers
 Update and upgrade HW and SW
 User training
Corrective maintenance
 Correct Corrupted SW
 Correct HW failure
Regular system check
Service availability monitoring

Task.2 Data back strategy


Regular data back up
- Perform daily back up, automated back up
Redundant storage
-store data in multiple location
Incremental back up
-back up modified or new data since the last back up

Task.3 phase able to response security incident


Phase -1 incident identification
Implement intrusion detection
2- incident contentment
Isolate affected system
3- incident eradication
-investigate the root cause
4-incident recovery
Restore affected system
Conduct post- incident analysis

You might also like