Intranet Manager's Technical Guide

 

Introduction

This is a Intranet Manager's Technical Guide which provide useful information about maintaining Intranet. Intranet Managers should consider the following topics when upgrading and maintaining Rich-Kay Technology's Intranet.

 

1.1 Security

Some concerns you may have:

  • How can access to personal data on PCs be restricted?
  • Is it possible for people to damage data on a PC from outside?
  • Are computers connected to a network more vulnerable to viruses?
  • Can a hacker monitor what I am doing on a network?
  • How can I ensure the physical security of the equipment?


Connecting a computer to any sort of network inevitably increases the risk of damage to the data on the computer by malicious or inadvertent access from the network. The security of the data can be protected in two main ways: by requiring passwords to be supplied, and by encrypting data. There is no guaranteed way of making a network-connected computer secure, but the risks should be weighed up realistically according to the sensitivity and value of the data, and the desirability of making the data more accessible (and hence perhaps more valuable).
For someone elsewhere on the network to change your data, it would normally be necessary for your computer to be running some software (usually the Ethercard driver and the intranet software). Merely plugging the computer into the network would not normally make it possible to look at its data.

As well as protecting the data resident on your computer, you need to consider the possibility that data flowing between your computer and somewhere else on the network could be monitored by someone. Because Ethernet sends data from one station to another by 'broadcasting' it, ie by sending data packets which can be received by all stations connected to that segment of the network, there is the possibility that someone could 'listen in' to the network traffic. Encryption is probably the only way round this.

Computers connected to networks are probably more vulnerable to viruses only in the sense that networking allows data and files to move much more freely.

Physical security should also be considered. Servers should be in locked rooms or locked cabinets. Devices should be etched with a security code if possible, but bear in mind that the target of a theft may be particular components, for example memory boards, rather than complete systems.

Top of Page

 

1.2 Cabling

When choosing a suitable cable type for your network, there are several aspects to consider:

  • The cost
  • Ease of installation
  • Compatibility with the University's data network
  • Availability of interfaces to equipment (printers, PCs, etc)
  • Maximum speed capability
  • Lifetime

Top of Page

 

1.3 Hardware

When considering the installation of a network, it is important to make an inventory of all the existing equipment (personal computers, printers, plotters, scanners) which you might like to connect to the network. For PCs, you should find out the following details:

  • Processor type (eg Pentium, 166MHz)
  • Random access memory (RAM)
  • Hard disk size
  • Screen type (eg mono, colour, VGA)
  • Operating system type and version (eg Windows 95, Windows 98)

Although it is quite possible to connect a wide variety of different types of PC and printer to a network, there are strong arguments for taking advantage of the opportunity afforded to rationalize the equipment, because it will create considerably more work both for installation, and for subsequent maintenance, if you are trying to cater for a wide range of equipment. A decision to install a departmental network is partly also a decision to achieve greater integration of your department's computing facilities, and this may well imply imposing some sort of 'standard' arrangement, of both hardware and software, for the majority of your users.

The importance of forming an inventory of your existing equipment is thus that it enables you to make a decision at an early stage about which equipment to keep, and which to throw away (or reuse if possible).

It is recommended that servers be connected to a 24-hour power supply, ie they should normally run continuously, in contrast to workstations, which are normally switched off when not in use, or outside working hours. Note: you must also provide appropriate fire protection for equipment running continuously.

Top of Page

 

1.4 Software and licensing

As for hardware, an important first step in planning a network is to find out which software is already in use and, in particular, that all copies are licensed. It is a criminal offence to use unlicensed software.

A strong motivation for moving to a network is to rationalize software provision so that versions of packages are consistent throughout, and to ensure that software is run legally, ie that its use conforms to any licensing arrangements.

It is not necessary to buy a copy of software for each PC to be connected to the network, unless you actually must have guaranteed access to a particular package at all times from each computer. What you must do is ensure that you buy enough copies to cover the maximum number of simultaneous uses of the package. In practice, this is best done by means of a facility such as SofTrack, which limits the number of copies which can be loaded from the server. A package controlled by SofTrack in this way can then be used from any connected PC, but only up to a defined number of copies.

For ease of maintenance of the network, all packages should be put on to the server if possible, with only the minimum amount of software resident on each PC's own hard disk.

Many software packages are now available in special network versions. Where network versions are not available, you must then buy enough individual copies to cover the maximum number to be in use at once, although you will only actually install one copy on the server.

Top of Page

 

1.5 Peripherals (printers, CD-ROMs, scanners)

1.5.1 Printers
There are effectively three ways of connecting a printer to a network:
  • Directly to the server parallel port
  • Directly via an internal network interface in the printer
  • Via a PC configured as a 'print-server'
  • Via a parallel-to-Ethernet adaptor device

For modern printers the best way is the internal network interface.
Older printers are probably best connected via a PC print-server or parallel-to-Ethernet adaptor.

1.5.2 CD-ROMs
It is likely that you will want to provide access to several CD-ROMs on your network. To do this, you will need a CD-ROM 'tower', ie a set of CD-ROM drives which can be connected to your file-server, allowing you to put several CD-ROMs 'online' at the same time.

1.5.3 Scanners

A scanner must be attached to one of the workstations rather than to the server.

Top of Page

 

1.6 Maintenance

1.6.1 Hardware maintenance
Hardware maintenance refers to the arrangements you make for repair of faulty equipment (including cabling), and to routine preventive maintenance (cleaning components and replenishing consumables).
Equipment which is essential for day-to-day operation of your network is normally put on a formal maintenance contract, which typically guarantees a response to fault reports of 4 hours or 8 hours. Non-essential equipment can instead be repaired by a 'return-to-factory' or 'time-and-parts' arrangement, which may not guarantee the 'turn-round' time.
Items which are so critical that even a loss of service for up to 4 hours is deemed unacceptable - the file server could be put in this category - should have a 'hot-swap' spare available, configured so that it can be put into service as quickly as possible.
You should list the items making up your network, and decide which categories of maintenance you would like them to be in ideally. Moving your department to a networked arrangement makes you more dependent on equipment, compared with a situation where the computers are mainly 'stand-alone'.
 
 
1.6.2 Software maintenance
Software maintenance refers usually to the fixing of faults in software. It may also be taken to mean the provision of upgrades to new versions of the software as they become available.
A software maintenance agreement may offer both 'bug-fixing' and upgrades to new releases, or the upgrades may be charged separately (since new releases tend to appear infrequently, unlike bug-fix releases, which can appear several times a year.)
It is sensible to define a time, say 8am till 9am on a particular day of the week, when changes to software such as fault-fixing or software upgrades are always carried out, with as little disruption to the software taking place at all other times, other than `emergency' work.
It is good practice to advertise any maintenance sessions to all users of the service (preferably by electronic mail) well in advance, say one or two weeks before.

Top of Page

 

1.7 Back-up, recovery and resilience

It is essential that all data held on the server (both the programs themselves, and any data stored by the users of the network) is regularly 'backed-up', that is, copied to an archive (typically a tape cartridge), so that the service can be restored even if the hard disk on the server breaks down completely.

A full back-up of the server's data should be taken weekly, supplemented by daily back-ups only of data which has been changed. This should ensure that, in the event of loss of the server, the data can be restored to its state at the end of the previous day at least.

A good practice to facilitate this policy is to divide the server's disk areas into 'stable' and 'variable' data areas.

Since backup of server data can create a considerable load on the network, it is wise to arrange that the back-up is done overnight, preferably by an automatic procedure.

However you should bear in mind that running any equipment overnight is a fire risk.

Top of Page

 

1.8 Training

When introducing a network into a department, good training in the use of the new hardware and software must be provided to all users and potential users of the network.

It is not sufficient to assume that some measure of computer literacy among the users will enable them to start using a network. The installation of a network, as opposed to a collection of separate computers and printers, entails a shift in the working practice of the whole department which goes beyond learning some new commands and using new items of equipment.

For this reason, training should be provided which brings all users, regardless of their existing level of computer skills, to the same level of skill in using the network. Training should provide both general awareness of the facilities being provided, and an understanding of how the system has been set up in their particular context.

Don't forget the on-going need for training for new staff.

Top of Page

 

1.9 Electronic mail

Electronic mail can be viewed for convenience in two areas:

  • Communications within the department
  • Communications with the 'outside world' (ie outside the department)


While it is possible to provide an electronic mail system which treats both areas in exactly the same way - and this may be the best solution - it is likely that more sophisticated software may be available for email within the department, especially as part of a complete 'office systems' package, whereas email with the outside world tends to have to use a 'lowest common denominator' approach to account for the varity of email standards in use world-wide.

Top of Page

Company Info
Content
Marketing
Message Board
FeedBack
Contact
User Guide
Manager's Guide