28
ACS Project Report Form Australian Computer Society Skills Assessment 2014 Andy移民网www.andyyimin.com Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Embed Size (px)

Citation preview

Page 1: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

ACS Project Report Form

Australian Computer Society Skills Assessment

2014

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 2: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 2

The ACS Project Report Form is required for a Recognition of Prior Learning (RPL) Application INFORMATION ABOUT THE AREAS OF KNOWLEDGE After studying the ACS Key Areas of Knowledge document, tick those Areas of Knowledge that you believe you have learned from your experience. Please Note: None of the areas are mandatory. Applicants will be allowed an opportunity to address areas of knowledge they acquired through their experience.

Required Level of Knowledge Acquisition You are required to demonstrate a clear comprehension of a number of the individual thematic modules within your chosen knowledge areas. You should also be able to demonstrate application in at least one of the units or modules which should be clearly supported by professional references included and the Project Reports submitted in section 4. Please detail the relationship between the selected Areas of Knowledge above and what you have learned from the type of work and qualifications. This section of RPL needs to be specific and detailed as to how and where you have learned the knowledge from. This is one of the most important parts of the assessment and therefore ought to be comprehensive in its content and clarity. It is important that you explain for each chosen area of knowledge: (a) What you have learned, (b) How you acquired the knowledge, and (c) Your experience in applying the knowledge in your working environment. FALSE INFORMATION & PLAGIARISM Information you provide to the ACS may be used for data matching with Australian Government agencies such as the Department of Education, Employment and Workplace Relations, Department of Immigration and Border Protection, and the Australian Tax Office. Misleading and false information is viewed as a major breach of ethical behaviour and will seriously jeopardise your migration prospects. It is your responsibility to indicate when you have drawn on the work of others. Other people’s original ideas and methods should be clearly distinguished, and other people’s words, illustrations and diagrams should be clearly indicated regardless of whether they are copied exactly, paraphrased, or adapted. Failure to acknowledge your source by clear citation and referencing constitutes plagiarism. All plagiarism will be assessed as not suitable and reported to the Department of Immigration and Border Protection.

The ACS reserves the right to use software applications to screen your submitted work for matches either to published sources or to other submitted applications. In some cases you may be asked to submit project reports and other written work submitted with the application for screening by plagiarism detection services. If at any stage in the assessment process plagiarism is detected, the information may be provided to other Australian Government agencies. The assessment will be terminated and the outcome recorded as unsuitable. A refund of the application fee cannot be provided for cases assessed as containing false information or plagiarism. DECLARATION OF AUTHORSHIP

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 3: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 4: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 4

technologies. I also attended the training that provided by vendor, I mastered the techniques about networking hardware. (2) All design works I have carried out included network design and how to use network protocols. I participated the project that included building LAN, MAN and WAN, installing and implementing the microwave equipment, switches, Routers and Security equipment etc. (3) I get the network knowledge from working with networks. I also have more than 13 years work experience in planning/developing/deploying/testing/optimizing network systems. In my career, I always provide troubleshooting and fault-finding services for company or client network problems. (4) I had installed file server to share communal files in office use Samba and Wu-FTPd in Linux server. (5) I implemented and managed company internal and public Webserver use Apache for Linux. I installed company email system using Microsoft Exchange in Windows NT and Windows Server 2003. I also have work experience in developing, supporting and maintaining SAN architecture. I also installed email system using Sendmail and set firewall in Linux. (6) I have more than 5 years work experience in developing, supporting and maintaining SAN storage network and backup systems. (7) I had the capability to do this job well including understanding the requirement of the customer, design of the network and make technical documents, selecting equipment, organizing the working team and planning and implementation. I had the capability to write formal design documents, work report documents and implementation documents. TB. Technology Building TB1. Programming (1) During the university study, I studied the course of “ C Programming Languages”. I got the knowledge and understood algorithms and data structures and the associated design and analysis techniques from this course. I finished an Engineering tolerance calculation program using Fortran language in university in 1998. (2) I learned the Assembler Language in “Computer Platform Technologies” course. (3) I made a program with Visual Basic to finish my graduation design course. (4) In some project that I participated in, I was a tester for some software project. (5) Throughout my IT career I have made some small program with C language and also written some shell script to monitor system status. TB2. Human-computer interaction (1) I studied this courses in university. The course name is 3D Software Design, Computer Aided Design, Multimedia Computer Technology, Computer Platform Technologies. I got knowledge and understood Graphic design, user interaction design. TB3 & TB4.System development and acquisition(1) I got the certificate of Project Manager; I got the knowledge about five project management process groups and knowledge. (2) I used the project management knowledge in any project that I participated in and mastered that. (3) I used the project management knowledge to control project life cycle and quality. I was appointed as project manager for more than 8 system integration projects, mainly to project schedule and resource allocation. The project management tools that I used included Microsoft Project and Visual Source Safe. (4) Our company got “certificated of conformity of quality management system certification (ISO 9001:2008 standard) ”, I joined in the training for this certificate, and I implemented the quality assurance policy in any project that I participated in. SM. Services Management SM1. Service management (1)Our company carried out the ITSM system in some IT outsourcing projects. We made a system named “IT service management”, it used B/S mode, consisted of service desk, incident management, problem management, knowledge base management, vendor management, Inflow Inventory management etc. It was based on my sql database. I was the member of this team to build this system. SM2. Security management

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 5: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 5

(1) I passed the CIW 470 exam, I also got the certificate of CISP, the two certificates have successfully fulfilled the requirements by professional information technology security evaluation center. The course I studied included the system security, security technologies and security management. (2) I have more than 8 years work experience in designing developing, supporting and maintaining SAN storage network and backup systems. (3) I have more than 12 years work experience in designing developing, supporting and maintaining system/network security. (4) I had knowledge of encryption technique such as DES, RSA and developed some user authentication program used DES encryption functions in my e-business application project. (5) In recent years, I kept constructing the network security project. These projects usually included access control, identification and authentication, operating systems security etc. OM. Outcomes Management OM1. Organisational and Management Concepts (1) In our company, we made the project management methods to manage our projects. It includes nine areas: project integration management, project scope management, project time management, project cost management, project quality management, project human resource management, project communications management, project risk management, and project procurement management. (2) We always aggregated our projects into five groups: initiating process group, planning process group, executing process group, checking process group, and maintaining process group. (3) I was the member of making project method team. (4) I was also appointed as project manager for more than 10 system integration projects. OM2. Change management

A brief summary of how you have learnt the area of knowledge

In summary, I have learned the knowledge of hardware and software fundamentals, programming in my university studying and my work experience. I got a chance to be employed by Beijing Bluewave Broadband Co., Ltd. As a network engineer in 2001 I started my career as a computer professional. Then I got a lot of computer systems and networks technical trainings which also help me to improve my computing knowledge a lot. I have learned the knowledge of data and information management through my work experience and some technical training. In Bluewave Broadband, I was in charge of company e-mail systems and web server. In some project, I was responsible for troubleshooting system fault including database. I have been as a system and network engineer for near 13 years. I worked as a system integration project manager for over 5 years. During this period, by doing system integration under different hardware, systems and network, I have become a professional engineer in system and network. I got the knowledge of service management and security management when I worked for some network security projects and some technical training. I have learnt the knowledge of organisational and management concepts through making, changing and managing plans. With over 13 years engineer on IT related projects, I learned and practiced the core knowledge related to the CBOK in all these project experiences. Also, I joined the BBS of www.chinaunix.net, www.itpub.net, http://www.linuxsir.org etc.. I can learn or communite the knowledge from these website or BBS. Also, I took the course in www.coursera.org, including Computer Networks by University of Washington , Informaiton Security and Risk Management in Context by University of Washington and Operating System and virtualizaiton security by PeKingUniversity. With long years’ computer network and systems working experience , network security and project management ability, I hope I can get access to be the 263111- Computer Network and System Engineer. I got the CCNA certification in 2000, and there are only few engineers got this certification in China at that time.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 6: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 6

For my company’s request, I must get the certification in China. So, I got the HCSE certification, which is the same as Cisco CCNP. I got the CISP certification, which is the same as CISSP. I got the PM certification, which is the same as PMP.

Evidence of applying claimed knowledge to a working situation

I have got the certificate that includes CCNA, CIW 470, HCNE, HCSE, PM, CISSP. These certificates should prove my related skills level. During my work in my company, I applied the claimed knowledge as follows: (1) I had setup, configured, and troubleshot Personal Computers when I got my first job. I applied the knowledge of hardware and software fundamentals. (2) To perform design, optimization and audit of a network to meet the customer requirements, I applied the knowledge of networking and information management. (3) In some projects, in order to solve some system problem, I programmed some small program or script, and I applied the knowledge of programming. (4) Our company provides network maintenance service outsourcing for many customers, we used ITIL model to manager our service outsourcing team, I taught them some course, and I applied the knowledge of service management. (5) In our network security project, I was in charge of planning, designing and implementing the project, I built the PKI systems, installed and configured the firewall, audit, scanner, IDS etc.. I applied the knowledge of security management. (6) To assist in the actual operation of the projects, I applied the knowledge of organizational and management concepts.

RPL PROJECT REPORTS A project report is a coherent written description of a project or engagement that provides you with the opportunity to show how you perform as an IT (Computing) Professional, and enables assessors to understand and question your thought processes and decisions. Each report is to relate to a significant project or work episode undertaken by the applicant during his or her professional career. The purpose of these reports is to enable applicants to demonstrate their command and implementation of the areas of knowledge claimed in Sections 2 and 3 of your application. Please note: Applicants are required to provide two project reports. Of the two reports, one must pertain to project undertaken within the last three years, and the other for project within the last five years. Projects over two years long may be used for both reports under either of the following conditions:

The project has clearly-defined work efforts which took place in parallel, each with their own solution development and design activities and their own deliverables.

The project had clearly-defined phases that were executed in succession, each with its own solution development and design activities and deliverables. Note that a second project phase that constructs and implements the solution developed by the first phase does not meet this requirement.

Depending on the nature of the applicant’s role in the project, this would be expected to cover a selection of such factors as:

System analysis and design and software engineering methodologies used;

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 7: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 7

Contribution to the processes involved in the design and implementation of enterprise-wide computer systems;

Programming languages, design paradigms and implementation procedures adopted;

Database and/or file design and management techniques employed;

Network topologies, including size, distribution and security facilities installed;

Project management and quality assurance techniques followed;

Internet application design, including database interactivity and security measures implemented;

ICT managerial activities, demonstrating the nature and extent of responsibilities The following pages provide a template for your reports. When writing your reports please provide your own thoughts – do not just copy project documentation. Diagrams from the project documentation may be helpful, but the text should be in your own words. Please use the first person in your discussion, so it is clear to the assessors what you did versus what others did – say “I did X” rather than “X was done”. Diagrams may be helpful, but please ensure that they are relevant, readable, and help the assessors to understand what you did on the project. Focus on quality rather than quantity.

Project Summary: Project Name Start Date End Date

Project 1 IT System for Organization Department of Liaoning Province

07/2010 10/2010

Project 2 IT System for unit 61517 PLA 05/2013 12/2013

Project 1: IT System for Organization Department of Liaoning Province i. Project Summary 1. Identification

Client’s Company Name

Organization Department of Liaoning Province

Trading Name/s /

Company Size 1000

Business Address No.45 Heping South Street, Heping District, Liaoning Province, 110006, China

Contact Numbers Tel: +862423128308 Fax: +862423128308

Web Address /

Email Address [email protected]

Nature of project /

Location of project Liaoning Province, China

Name of your employer

BEIJING SUPERRED CO., LTD.

2. Duration

From To

Total project duration 07/2010 09/2010

Your involvement 07/2010 09/2010

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 8: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 8

3. Resources

Your Team Client

Project team size 12 10

Size of team led by you 8 /

4. Personal Involvement

Please list the phases of the project in which you were personally involved

Start Completion Phase Description

07/2010 07/2010 System proposal

07/2010 08/2010 Staffing, project assessment

08/2010 10/2010 Implement

10/2010 10/2010 Testing and delivery

5. Describe your role(s) and responsibilities, including the leadership aspects.

Roles and Responsibilities

The whole project is divided into two stages: the first stage is the preparatory work for the project, including understanding of user’s requirements and project design and planning; the second stage is the implementation and acceptance of the project. As the project manager for the second stage, I was mainly responsible for implementation and acceptance of the project. (1) In the first stage, I was responsible for designing and preparing schemes for network system. (2) In the implementation stage, I served as the project manager and was mainly responsible for team

management, server system migration, installation, debugging and technical support of backbone routers.

(3) In the implementation process, as the project manager, I developed the work plan for the project team, regularly inspected and supervised the implementation of the project and wrote the project report in accordance with actual implementation.

(4) In the implementation process, I was also the key technical staff and was responsible for installation and debugging of network equipment, safety equipment, servers and applications as well as the migration of the original equipment, servers and applications.

(5) In the acceptance stage, I was responsible for preparing and arranging project documents as well as the final acceptance and report of the project.

ii. Business Opportunity or Problem 1. Describe the business opportunity or problem(s) this project addressed and how it related to the

(internal or external) client’s needs.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 9: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 9

Many branches of customer Unit are scattered around the country. In order to achieve network communication through Internet, they currently use electronic mail system to transfer files and exchange information. To improve the network environment, the user puts forward the following requirements: (1) In order to ensure the security of communication, the information under transmission should be

encrypted to prevent unauthorized access and eavesdropping and achieve safe and controlled communication.

(2) Set up a set of file transfer system in the System for more than 50M file sharing service. (3) Set up a video conferencing system in the System. (4) As issues occurring in monitoring and management of network equipment, safety equipment,

servers, storage devices and business applications are more and more prominent, the unified monitoring and management of the above equipment and applications are an important means to guarantee the safe and stable operation of network.

(5) Based on reliable communication, with the increase in users and applications, it is very important to guarantee the authenticity of both parties' identities, the confidentiality of content and the integrity of data, and confirm the non-repudiation of information in data exchange.

(6) As the terminal computers are in great numbers, due to the vulnerability of the computer operating system, unified management of computers and unified configuration of security strategies also become the top priority.

By analyzing the user’s requirements, I put forward the following solutions: (1) The customer network uses the technology which must be advanced, mature, stable, and reliable, so

I chose the VPN design network. (2) Built the FTP Server in Head Quarters. (3) The video conferencing system shall adopt QOS strategy in terms of bandwidth to guarantee normal

conference video streaming. (4) Deployed the network management system. (5) Setup the unified authentication system which can complete unified authentication, authority and

administer. (6) Deployed the firewall, IDS, and Desktop security to ensure the safety and stability of the system.

2. Describe the scope and complexity of the problem.

According to user’s requirements, the following issues are summarized: (1) To ensure the security of information transmission, we intended to adopt VPN technology to

construct network communication, but we did not know how to select appropriate VPN protocol. (2) We had no idea about how to ensure that the users can master relevant technology and guarantee

the normal operation of the system after the network is completed. (3) As there are more than 100 implementation sites and only 8 engineers, how to complete the project

within the specified time was a problem.

3. Describe your relationship and communications with client management / user management / end

users.

1. In the preparatory stage, I served as the pre-sales engineer and assisted the sales manager in estimating the cost of network system and preparing tender documents. 2. In the implementation stage, I served as the project manager and was responsible for regularly reporting the project progress to the head of the Unit and communicating with them about major issues in the implementation. 3. In the installation and debugging of equipment, I was responsible for communicating with end users about the policy configuration and final goals of the System.

iii. Solution

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 10: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 10

1. Discuss your contribution to the solution, project or engagement including the rationale behind key choices. Please enumerate the alternatives you considered and your reasons for their rejection.

When confirming the project scope, I found that large differences existed between the parties. This project involved more than 100 nodes, which were scattered around the country. The installation and debugging work should be done not only in the host room but also in various nodes. But the contract did not specify whether this work should be done by the client or by the project team. At that time, in order to get the sales contract, the sales personnel did not put forward. The client thought that although the contract did not specify this point, it shall be completed by Party B because the objective of the project was to "ensure that the System can be normally used by the client", which obviously included installation, debugging and technical support. If this work should be done by Party B, it would take at least two months for all the personnel in the project team to do the installation and debugging work at all nodes. Besides, the sales personnel had promised one year of free maintenance. If a single node experiences a failure, on-site maintenance would be required. So it was impossible for the project team to finish the work. As a result, I convened a special meeting within the project team. All the members agreed that the installation and debugging work shall be done together with the client. I communicated with the person in charge of this matter about this and he explicitly told me that we should be responsible for the installation, debugging and smooth transfer of this System and complete all the work. I told the client in a frank manner that it was very difficult to implement the work. And we all hoped to get their help and an appropriate solution could be reached. Through communication, we found that the client was also confronted with a problem: specialists responsible for system operation and maintenance and technical support were not available in each node; if the period of service expired, the system operation and maintenance would be a big problem. Our goals at this point were consisted of: reducing the technical requirements of each node as much as possible; if remote operation and maintenance management could be achieved, it would not require a lot of technical personnel to carry out on-site installation, debugging and maintenance. Through consultations, I proposed the following solutions: (1) Party B should establish a set of communication platform for technical support personnel on the

basis of the video conferencing system, providing remote technical support environment for future operation and maintenance.

(2) In terms of network management system, we should not only monitor the equipment but also need to configure WEB installation and debugging interface for the equipment at each node. Thus, the staff at each node would just need to connect the equipment and do not need professional technical ability. Should the equipment fails, the new equipment would be well configured by technical staff at the central node and then sent to the corresponding node. After the technical staff at the node connected the equipment, the staff at the central node would conduct detailed configuration.

(3) The network system adopted a dynamic routing protocol ospf to reduce the configuration work of work staff at each node.

(4) We would prepare detailed technical manual for the installation, debugging, configuration and connection of each equipment and system.

Through communication, the client finally accepted this proposal and assigned some technical staff to participate in our project team and join the installation and debugging work of each node. At last, we signed a supplementary agreement with the client on the above matters and made a written record. Thus, without increasing the implementation personnel, our project team successfully completed the tasks within specified time and the client also reduced the pressure brought by future operation and maintenance. The Network Topology Map can be seen in Attachment 1.

2. Enumerate and describe the key decisions you made, and the reasons for making them as you did.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 11: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 11

The client needed to set up a file server within the network of the central node to provide services of file sharing and file transfer. But this point was not specified in the contract, so no budget amount and procurement plan were available. The client hoped that we could use a free software to achieve this function. As the project manager of the implementation stage, I put forward FTP Server to solve this problem so as to meet the client's business needs and improve user’s satisfaction for this project. In the implementation process, by comparing Windows and Linux operating systems, I finally chose Linux one because of the following reasons: (1) Both Windows and Linux operating systems provide a free file service software. However, as the

server provided by the client had low configuration, the system operation would get slower if Windows 2008 Server is used, which did not meet the requirements. Finally, after installation and testing, I chose Red Hat Linux9.0 as the operating system of the server and the operation speed of the server was significantly faster than that of Windows system.

(2) The free FTP file service under Linux operating system provides more functions than that under Windows operating system and is safer.

(3) The current use environment of the client had no Windows domain, so new accounts would be both needed for Windows and Linux operating systems. Their workload would be the same.

(4) The problem encountered in Linux operating system was that the engineers of the client were not familiar with Linux. Therefore, it would be difficult for them to independently complete system operation and maintenance after the completion of the project. In order to solve this problem, I prepared detailed installation manual, operation and maintenance manual.

(5) Through testing and demonstration, I persuaded the client to use Linux operating system to set up FTP Server.

3. Describe the design method you used on this project and the rationale for its selection.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 12: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 12

The whole network of the client contained more than 100 nodes and about 1,000 users. The safety strategies should be implemented from the perspectives of identification and authentication, data integrity and non-repudiation. In this project, I designed the public key infrastructure (PKI) that is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The main design methods were as follows: 1. System Architecture (1) Authority Center is consisted of CA and RA. A certificate authority (CA) is that issues and verify the

digital certificates. A registration authority (RA)verifies the identity of users requesting information from the CA.The PKI Digital Certificate System Structure can be seen in Attachment 2.

(2) LDAP is used to fast and highly efficiently access the information on the net, it provides a standard method of communication between different directories and the communication between users and directories.

(3) Desktop Login System, combines Smart Card PKCS11 criterion with PKI technique, a dual factor authentication system was designed and implemented based on user password (PID) authentication and digital certificates certificate personal identification.

(4) SSL Gateway, in order to achieve fine-grained control of network resources and network security, SSL Gateway need to identify the identity of the visitor effectively and ensure that the digital identity operator is just the legal owner of the digital identity.

(5) Authority management’s mainly working mechanism is based on the functions of each staff member’s digital identity, assigned the appropriate permissions on Applications.

(6) Application layer, the combination of digital identity and Application, includes WEB, E-mail and other application.

2. Scalable Design: (1) Scaling up PKI Authentication System established by the client could be regarded as subordinate CA of a higher level of security authentication system to meet the unified management requirement of the trust system. (2) Scaling down PKI Authentication System could set up subordinate CA and RA center for subordinate nodes. 3. System deployment The System Development Diagram can be seen in Attachment 3. (1) Deploy CA, RA, Desktop Login System, SSL Gateway and LDAP System at head quarters. (2) Deploy RA, Desktop Login System, SSL Gateway and LDAP System at Level 2. (3) Deploy LRA at Leverl3. (4) Every end user has one digital identity and USB KEY. (5) There are six properties with digital identity, including name, gender, ID number, Birthday,

Organization, and State.

4. List the design tools you selected for use on this project and discuss the rationale for their

selection.

In this process, I mainly used the following tools for design program, implementation program and project planning: (1)Microsoft Visio: to complete the charting work of network topology diagram, cabinet planning diagram and equipment wiring diagram in the project. (2) Microsoft Visual Source Safe: to manage the project files, which can save different versions of a file, compare the differences between files and control the modification work done by different persons for the same file. I used this tool to manage all the controlled files in the project, including project design programs, implementation documents, minutes of meetings and review reports. (3) Ultraedit: to write the running script, achieve the automation of some operation commands and implement related procedures on a regular basis. (4)Microsoft Project: to analyze plan resources, budgets, timelines, and what-if scenarios. Enabled Project teams to see tasks, enter timesheets, and flag issues and risks. Empowered teams to drive the business with real time reporting on project statuses and resource allocation.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 13: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 13

5. List the major deliverables of the project that you were responsible for or contributed to, and

summarize the reason for their inclusion.

(1) Network security system, including various products procured in this System and the entire computer

network security system built according to the implementation program. (2) Project documents, including implementation programs and acceptance reports. (3) Training materials, including training handouts, training materials and lab manual. (4) Design drawings, including network topology diagram and equipment connection diagram. (5) Technical support manuals, including the installation, operation and maintenance manuals of various

systems.

iv. Results 1. Was your solution implemented? If so, describe the role, if any, you had in the implementation. If not

explain why not.

My proposals were all implemented: (1) In the implementation process of each node, I persuaded the client to assign engineers to participate

in the implementation. Because of their participation, our project team finally completed the installation and debugging work of each site in the shortest time. With the training and operation manuals prepared by us, by using the video conferencing system, the non-technical staff of each node could quickly complete troubleshooting and general maintenance work under the remote guidance of headquarters.

(2) The FTP server established under Linux operating system was very convenient to use for end users and fully met the requirements of end users to share and transfer large files. In addition, the system administrator could set different access permissions in accordance with different user permissions so as to meet the requirement of sharing files.

2. Assess the overall success or failure of the project. Comment on client satisfaction, attainment of

objectives, and ultimate versus proposed cost and schedule.

1. The project was completed as scheduled and the client's future work arrangement was not affected. After communication with the client and the confirmation of division of work, we strictly complied with the schedule arrangement of the project, communicated with the client about the execution of the schedule on a daily basis and solved the problems in a timely manner. At last, we completed the project implementation and acceptance as agreed and won the client's praise. 2. We could communicate with the client about various issues and report the statuses to them in a timely manner. We had established a good communication mechanism with the client. (1) When the implementation work started, we held a kick-off meeting for the project. (2) We held weekly meetings every Monday and the participants were the client, the supervisor and our

staff. We reported and summarized the work of the last week and put forward the work plan for this week.

(3) We also held thematic meetings for the problems arising from the project. Leaders of the client, the supervisor and Party B would participate in these meetings to discuss and solve problems.

(4) We implemented weekly report system. The project submitted weekly work report every week; in the critical period of the project, the weekly report would be replaced by daily report in accordance with actual needs so as to summarize the execution situation of the project.

3. In the execution period, as the design program differed from the actual situation, we needed to make some modifications. After communication with the client, we implemented the alternative solutions and did not increase the project cost.

v. Lessons Learned

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 14: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 14

In retrospect, what you might have done differently on this project and what lessons did you learn?

1. Make adequate preparatory work for the project Before a project is implemented, adequate preparatory work shall be made, which can be divided into document preparation and site preparation. Document preparation includes network topology diagram, cabinet planning diagram, network security policy planning sheet, equipment installation wiring diagram, IP address list, server planning sheet, database partition table, user list, implementation program, label list, equipment environment requirement sheet, network connectivity test manual, functional test manual of equipment and manufacturer schedules. In this project, the documents prepared only included network topology diagram, cabinet planning diagram and implementation program, and many documents were prepared in the implementation process of the project. Site preparation includes shelf equipment handling, power cord or plug preparation and other arrangements in accordance with site

environment. 添加此项目中相关的 site preparation 2. Knowledge Learned (1) How to communicate effectively with the clients (2) Principles of Status Authentication System (3) How to design Status Authentication System

vi. References References are required to substantiate the experience cited in the above project report. Please include verifiable certified statements from your referees. Network Working Group .Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework .Feb 2003 Cisco.Press.CCIE.Professional.Development.Network.Security.Principles.and.Practices. USA: Cisco press 2002 Cisco. Securing Networks with PIX and ASA (SNPA) v4.0 Volume 2: USA: Cisco press 2005

Cisco. Securing Networks with Cisco Routers and Switches (SNRS) v2.0 Volume 2: USA: Cisco press 2008

Project 2: IT System for unit 61517 PLA i. Project Summary 1. Identification

Client’s Company Name

unit 61517 PLA

Trading Name/s unit 61517 PLA

Company Size 300

Business Address Taiping Road No.24 , Haidian District Beijing China 100036

Contact Numbers Tel: +86 10 51950268 Fax: +86 10 51950268

Web Address /

Email Address [email protected]

Nature of project

Location of project Beijing China

Name of your employer

BEIJING SUPERRED CO., LTD.

2. Duration

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 15: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 15

From To

Total project duration 05/2013 12/2013

Your involvement 05/2013 12/2013

3. Resources

Your Team Client

Project team size 10 4

Size of team led by you 5 /

4. Personal Involvement

Please list the phases of the project in which you were personally involved

Start Completion Phase Description

05/2013 05/2013 Initiating process

06/2013 07/2013 Planning process

08/2013 12/2013 Executing process

12/2013 12/2013 Testing and acceptance process

5. Describe your role(s) and responsibilities, including the leadership aspects.

Roles and Responsibilities

I served as a pre-sale engineer during the pre-sale stage and the team leader of system group and network group during the stage of project implementation. Main responsibilities were as follows during the pre-sale stage: (1) Understood the background of the project (2) Estimated the cost of project (3) Developed project proposal and project design (4) Participated in business negotiation to provide technical support for sales manager Main responsibilities were as follows during the implementation stage of the project: (1) Prepared implementation programs and project documents (2) Conducted installation and commissioning for server, operation system, virtualization software,

storage backup system and safety equipment (3) Developed time schedule (4) Guided and supervised the specific work of team members (5) Coordinated to finish project acceptance

ii. Business Opportunity or Problem 1. Describe the business opportunity or problem(s) this project addressed and how it related to the

(internal or external) client’s needs.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 16: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 16

61517 Unit is a large-scale engineer design agency; the existing network was built in 2000 with simple two-layer network only used switch. There is no VLAN division and no safety measures. The network outlet is only simply arranged Router and deployed some business application. Users have now faced the following questions: (1) The network equipment has used for more than 10 years and often broke down; besides, the

network equipment has congested seriously without any configuration. (2) There would be several applications online in the coming months, but the computer room is too

small and critical business systems are operated separately without any security mechanism. (3) The original database system needs to be optimized and transferred. (4) The security and emergency recovery of critical business data need to be strengthened. (5) There are about 300 existing users now and no any technical measures for users management, which

needs to conduct unified management for users. (6) There are no any security measures for the existing network and the problems like outbreak of virus,

paralyzed network and abnormal of server often occurred here. We have proposed the following solutions: (1) Updating network equipment, re-planning network structure and optimizing network configuration (2) Updating and improving server operation system, deploying server virtual system to realize the flat

transfer from traditional IT infrastructure to dynamic IT infrastructure. (3) Optimizing and transferring database. (4) Deploying a set of storage backup system to realize centralized storage of data and backup regularly. (5) Building Windows domain to conduct unified management for users. (6) Building unified safety defense system based on the characteristics of users.

2. Describe the scope and complexity of the problem.

(1) Only 300 terminal computers are connected to the network with sparsely distribution. It distributes

in 8 buildings, users are more concentrated in some buildings, for other buildings, only several connected to the terminal. It is a question for us to select the network structure.

(2) The server of the existing website has used for a long time and it needs to be transferred, the database of network is Microsoft Sql 2000, the question we need to be solved is how to transfer the network smoothly and meanwhile not affect the utility of users.

(3) A large number of data of users need to be stored and we should know how to guarantee the security of these data.

3. Describe your relationship and communications with client management / user management / end

users.

I served as a pre-sale engineer during the pre-sale stage, coordinated sales manager to estimate the cost of project, finish the compilation of proposal, and participate in bidding and business negotiation to provide support for sales manager. In order to get detailed data to complete design proposal during the pre-sale stage, I have conducted site survey and communication with system administrator of users and end-users. During the stage of project implementation, I was responsible for network group and system group and regularly reporting to project manager. At the meantime, I would submit the weekly report of two groups to project manager. If any exclusive questions happened, I would communicate with project manager separately. During the stage of project implementation, I was responsible for developing the specific implementation strategies. I would communicate with system administrator of users. Normally, it would be site communication. The meeting minutes would be written after meeting if encountered key questions.

iii. Solution

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 17: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 17

1. Discuss your contribution to the solution, project or engagement including the rationale behind key choices. Please enumerate the alternatives you considered and your reasons for their rejection.

Users have used 4 physical host in the system configured 8 virtual machine. After deploying the virtual machine, the virtual machine was unable to connect, the working procedures that I checked were as follows: 1. Problem description Host and memory array could build connection normally, projecting one LUN A to ESX host, multiple virtual machines built in the VMFS storage, and volume generated by LUN A. The memory of ESX host was 8G, distributed the memory of physical host to virtual machine for using. HBA host driver reported errors constantly, leading to the interruption of virtual machine. 2. Failure checking (1) Firstly, check whether the working condition of physical server of virtual machine was normal or not (2) Check the changes of the configuration of virtual machine (3) Check product manual and check whether any same fault happened through website searching (4) Check system log of virtual machine to define fault point 3. Fault handling Rearrange memory configuration of virtual machine and reserve 4G memories and 2 cores of CPU for physical host. Suggested configuration: reserve 23-4G memories for host and 2-3 cores of CPU. Login vCenter to check the memory of physical host and the CPU cores. 4. Problem analysis According to the system log(Can be seen in Attachment 4), the driver error was H:0x7, and the memory of physical host were totally provided to virtual machine through checking the configuration of virtual machine. When the pressure of IO is greater, HBA driver would lead that IO can’t pass to virtual machine due to the lack of memory. 5. Results Virtual machine could operate normally after configuration.

2. Enumerate and describe the key decisions you made, and the reasons for making them as you did.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 18: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 18

1. Network architecture design In the preliminary design stage of the project, as the existing network used for a long time and based on the actual situation of users, network structure was needed to be re-planned IP address, VLAN was needed to be divided and routers also were needed to be planned. The following issues were considered when I designed the network structure for users: (1) Internet Outlet In order to guarantee the stable operation of outlet route, outlet accesses two telecom operators, thus, how to select route mode of two outlets need to be considered. In a bid to prevent the unable to access to the network due to the interruption of one route, two routers as backup would be applied to realize redundant backup through the configuration of VRRP. (2) Network System architecture design Users’ network includes the access layer of network part for main office building and eight branch buildings. As the whole scale of users was not too much, and convergence layer couldn’t be arranged separately, the function of convergence layer and core layer could be finished through core layer, two layer structures would be applied for the whole network. Core layer: as the core node of park, two core interchangers were deployed at main office building, gigabit internet were applied for between two interchangers, and connected with various access layer node through gigabit network. Access layer: all access interchangers were interconnected with interchangers at core layer of two gigabits optical interfaces; in terms of network property, gigabit was applied for all access layers to desktop design. Data area: According to the study of business system at data area and based on business demands, business data flow, IT safety requirements and post maintenance and management, data center network could be divided into the following two areas: External server area: only providing external business application; Internal server area: only providing internal departments with exclusive business application. (3) Dual core and IRF technology are applied in core area Dual core design structure is adopted for the network; IRF technology (unique technology of H3C, this virtualized technology can integrate the hardware resources and software handling capacity of multiple devices to realize the cooperative work, unified management and continuous maintenance of multiple devices) is used for core layer and access layer to virtualize the interchanger. Compared with traditional STP+VRRP, the application of IRF2 cannot only realize device redundancy to effectively keep the network stable, but also simplify network structure, device configuration and management to greatly reduce convergence tine of network. Two core interchangers are connected through megabit cables, the upper firework would be transparent mode, the access interchanger of lower part also arrange IRF, and OSPF dynamic router is applied for the whole network. Through the configuration of IRF, when single device of interchanger at core layer breaks down, other switches can immediately undertake forward the task and meanwhile Trunk link binding for between network layers to make the load of flow between links are balanced and improve the availability of link bandwidth. (4) Network management After completing the network, due to the limits of persons for the daily maintenance of network of user units, professional network management system is used for the centralized management of network device, safety device, server device and business application to comprehensively solve network visualization and fine management, realize fast positioning and business deployment in a fast and flexible way as a way to meet the demands of users to manage, control and operate the network.The Network Topology Map can be seen in Attachment 5. 2. Database transfer Users have a set of website system in its internal system, mainly providing the access and inquire service of internal and relevant business unit. The used database of the existing website system is Microsoft Sql Server 2005. In this project, as the website server has used for a long time and aged seriously, it needs to be transferred to new server. During the period of transferring, it needs to upgrade Sql server 2005 to Sql server 2008. Here we have prepared the following two options: Option 1: backup the original database and restore in new server;

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 19: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 19

Option 2: stop the old database, directly copy data to the new server and then attach the newly built database to new server. As the database is too big, it is unrealistic to backup and restore, it will takes too much time, thus, we reject option 1. For option 2, it is mainly about the attachment, due to the original documents is a mess, and it needs to change to route when attaching the database. No matter which option you choose, the original database users shall be considered, for example, access permission and password. The permission can be subdivided it into each text fields of each chart, it is impossible to rebuild manually. In order to solve this problem, I have written two scripts, the first script is to build login name, the second script is to map database users to login name. The specific working procedures are as follows: 1. Preparation (1)collect old SQL Server configuraiton (2) check Server configuration (3)install Windows 2008 server r2 64bit (4)Install Sql Server 2008 on new Server 2. Operating old database (1) Stop WEB server, stop old databse (2) Backup master, msdb,model three database (3) Copy old databse file to new database 3. Operating new database (1)Run two scripts one by one. 4. Testing (1) Restart the WEB server service (2) To test the WEB server is available and accessible to the client (3) WEB load testing. 5. Result I lead the team finished the mission successfully ,the WEB server runs well.

3. Describe the design method you used on this project and the rationale for its selection.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 20: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 20

The network of users has built for many years and accumulated a large number of data information. As the data increases constantly, how to store and backup these large numbers of data has become an important part of this project. The service environment of users is as follows: (1) There are 10 Servers which is Windows Operating System (2) There are 2 Servers which is Linux Operating System, the 2 Server need not to be backup (3) There are 3 Microsoft Sql Server Database (4) There is data storage in single server and data storage is relatively sparse (5) Due to the utility of media system, data is growing rapidly In the system, database, knowledge base and other important data are its core data, as regards these important data and the storage and backup of key equipment, we have proposed the following design method: 1. Data storage The results are as follows after being conducted the analysis for the flow of data storage through using sniffer software and network management software: (1) The data in users‘ system can be mainly divided into two category, one is website data, the storage

space is about 3TB, another is the data of other business application, the storage space is 5TB, the needed storage space of total basic data is about 8TB.

(2) According to the data flow analysis of network, the daily data increment of website is about 200MB, the daily data increment of business application is about 480 MB, according to the statistics of 22 working days every month, the monthly data increases 14.6 GB and the annual data increment is about 175.3 GB.

(3) The data flow needs to be stored and backup and keep within 100M/S. Based on the above-analyzed results and the planning requirements for the fund of users, the proposal with cost performance shall be adopted here. Integrated the characteristics of data storage technology, I have decided to adopt the storage mode of IP SAN to build storage system. IPSAN adopts separate storage network and is equipped with Ethernet Switch and SATA 2T hardware as its storage device. For storage capacity, as the business and storage space in the future would be expanded, thus, the data storage would also increase, and it needs to meet the demands of data increment in the next 5 years. The storage array for this project is 20TB with dual controller and the disk would be RAID5. 2. Data backup (1) Backup environment Here are 10 Servers need to be backup online including 8 virtual Servers, 2 Databases, 1 SQL Server and 1 Mysql, the operation system of server is Windows 2012. (2) Backup demands The basic data needed to be backup for users mainly is the 8TB website on storage array and other application data, 10 Servers need to backup the data increment that generated every day. (3) Backup software As the system of users needed to be backup is Windows operation system, the Symantec Backup Exec 2012 would be adopted as backup software. (4) Backup method As these data are not required to be backup in real time and the backup basically can be finished at non-working time, thus, the demands for bandwidth is not too much, the mode of LAN-BASE would be used for backup and set one backup server separately to manage the data. (5) Backup medium Compared with the traditional tape backup technology and virtual tape library backup system, virtual tape library backup system is equipped with many advantages including high performance, low fault rate, high reliability, low investment and operation cost. The main backup medium of this project is Virtual Tape Library; others include Mobile HDD and disk. (6) Backup strategy The backup of the system can be done based on time sequence; it would be daily backup, monthly backup and annual backup, and the specific backup strategy can be seen in Attachment 4.

4. List the design tools you selected for use on this project and discuss the rationale for their selection.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 21: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 21

1. Vulnerability Scanning System After the security system is successfully deployed, practical vulnerability scanning system should be adopted to test all the servers, user terminal computers and databases so as to help customers eliminate the possible security risks to the greatest extent, identify security vulnerabilities and repair them, make effective use of existing system, optimize resources and improve the operational efficiency of the network. 2. Data Analysis Tool: Sniffer pro In the implementation process, I used sniffer to carry out real-time network monitoring, data packet capture and fault diagnosis and rapidly diagnose the network and application problems on the site. 3. Stress Testing Tool: Apache Jmeter In the implementation process, Apache Jmeter was used to simulate heavy load on the server or network system to test its resistance or to analyze all operating conditions under different loads. 4. Other Tools (such as Microsoft project, vss, visio) These tools had the same usage and function with the report of the IT System for Organization Department of Liaoning Province project.

5. List the major deliverables of the project that you were responsible for or contributed to, and

summarize the reason for their inclusion.

Final deliverables to the client were mainly as follows: (1) Requirement analysis stage: Requirement analysis report (2) Design stage: project proposal (3) Procurement stage: contract, hardware, etc. (4) Implementation stage: network system, security system, server system, AD domain system, storage

backup system, implementation program, network topology diagram, cabinet deployment diagram, equipment wiring diagram, IP address allocation table and system test report.

(5) Training stage: training programs, training materials (6) Acceptance stage: acceptance report, etc. (7) Operation and maintenance stage: operation and maintenance manual

iv. Results 1. Was your solution implemented? If so, describe the role, if any, you had in the implementation. If not

explain why not.

All my proposals were implemented and received good feedback. 1. Virtualization of network equipment: compared to the initially selected VRRP technology, this

technology has better results. 2. Database transfer: after adopting my implementation program, the migration work of network

system and database was successfully done within specified time and the normal access to the user was not affected. In subsequent operation process, user access speed was significantly enhanced.

3. After the implementation of storage backup system, the test suggested that it could satisfy the backup needs of the client.

2. Assess the overall success or failure of the project. Comment on client satisfaction, attainment of

objectives, and ultimate versus proposed cost and schedule.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 22: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Australian Computer Society | ACS Project Report Form | May 2014 Page 22

1. Shining Points (1) The successful implementation of the project improved the customer's satisfaction for the overall

service of the project team and the whole company. Thus, it enhanced the company's overall image and created more potential business opportunities for the company.

(2) The project cost did not go over budget in the implementation process. (3) The project was done within the contract period, and the milestone time for each project was strictly

executed in accordance with the original schedule and no delay occurred. (4) The application of new technologies (including virtualization of switch and server) ensures a more

stable and efficient operation for the client's network. 2. Points of Failure In terms of communication with customers, there is still room for improvement. In the stage of server migration, due to SQL keyword filtering issue in WEB firewall and inaccessibility of WEB site resulting from the modification of website backend, the client did not know the cause of the website interruption because the communication between the client and I was inadequate. During the implementation of the project, I would go to the client to explain the work content every morning, but the client was not on the implementation site. Therefore, some implementation work was not conveyed to the client in a timely manner. For instance, standby function test of the equipment would cause temporary interruption of the network.

v. Lessons Learned In retrospect, what might you have done differently on this project and what lessons did you learn?

The experience I learned from this project is that fallback plan and specific backup measures shall be prepared for the network or system migration. If there is no fallback plan and the system fails, the data will be lost. Then, the losses to the project will be immeasurable and directly lead to the failure of the whole project. I learned the technologies of IRF network virtualization and vmware server virtualization. In the synchronous construction, the network and system team led by me participated in the design and common construction together with security team and development team. During this process, I learned some knowledge about software engineering, such as construction of OA system, development environment of JAVA language and simple programming.

vi. References References are required to substantiate the experience cited in the above project report. Please include verifiable certified statements from your referees. <A Guide to the Project Management Body of Knowledge>

<Windows Server 2008 Hyper-V Unleashed,by Rand Morimoto and Jeff Guillet.> H2database http://www.h2database.com/

《How we tested Cisco's VSS - Network World》(January 3, 2008)David Newman

H3C IRF www.h3c.com

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 23: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 1: Network Topology Map

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 24: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 2: PKI Digital Certificate System Structure Chart

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 25: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 3: System Development Diagram

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 26: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 4: System Log

2013-10-21M16:11:14.835Z cpu1:556267)WARNING: ScsiDeviceIO: 3076: Failing command 0x2a to

device naa.60022a110005ec520002e9d400000010 issued by worldID 556267. This command has

been issued without opening the device OR the world that has issued a[0$

2013-10-21M16:11:14.835Z cpu1:556267)ScsiDeviceIO: 2316: Cmd(0x4124003bc600) 0x2a,

CmdSN 0x80000038 from world 556267 to dev "naa.60022a110005ec520002e9d400000010"

failed H:0x7 D:0x0 P:0x0 Possible sense data: 0x5 0x20 0x0.

2013-10-21M16:11:14.835Z cpu1:556267)WARNING: ScsiDeviceIO: 3076: Failing command 0x2a to

device naa.60022a110005ec520002e9d400000010 issued by worldID 556267. This command has

been issued without opening the device OR the world that has issued a[0$

2013-10-21M16:11:14.835Z cpu1:556267)ScsiDeviceIO: 2316: Cmd(0x4124003bc600) 0x2a,

CmdSN 0x80000011 from world 556267 to dev "naa.60022a110005ec520002e9d400000010"

failed H:0x7 D:0x0 P:0x0 Possible sense data: 0x5 0x20 0x0.

2013-10-21M16:11:14.835Z cpu1:556267)WARNING: ScsiDeviceIO: 3076: Failing command 0x2a to

device naa.60022a110005ec520002e9d400000010 issued by worldID 556267. This command has

been issued without opening the device OR the world that has issued a[0$

2013-10-21M16:11:14.835Z cpu1:556267)ScsiDeviceIO: 2316: Cmd(0x4124003bc600) 0x2a,

CmdSN 0x80000052 from world 556267 to dev "naa.60022a110005ec520002e9d400000010"

failed H:0x7 D:0x0 P:0x0 Possible sense data: 0x5 0x20 0x0.

2013-10-21M16:11:14.835Z cpu1:556267)WARNING: ScsiDeviceIO: 3076: Failing command 0x2a to

device naa.60022a110005ec520002e9d400000010 issued by worldID 556267. This command has

been issued without opening the device OR the world that has issued a[0$

2013-10-21M16:11:14.835Z cpu1:556267)ScsiDeviceIO: 2316: Cmd(0x4124003f3f40) 0x2a, CmdSN

0x80000079 from world 556267 to dev "naa.60022a110005ec520002e9d400000010" failed H:0x7

D:0x0 P:0x0 Possible sense data: 0x5 0x20 0x0.

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 27: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 5: Network Topology Map

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;

Page 28: ACS Project Report Form Australian Computer Society …¨¡板资料/Andy移民网-ACS... · The ACS reserves the right to use software applications to screen your submitted work

Attachment 6:System Structure Drawing

Andy移民

网www.andyyim

in.com

Email:[email protected]; FEAC中国400电话:400 622 8284 飞克教育留学移民总站:www.feac.cn; Andy技术移民网:www.andyyimin.com; Andy工程师评估工作室: www.ea-au.com;