Build and implement DNS server in Linux using UDP

Assignment Help Computer Networking
Reference no: EM133107762 , Length: word count:3000 + labs

Advanced Computer Networks - OTHM Level 6 Diploma in Information Technology

Reference Number - R/617/3034

Unit Level - 6

Aim: This unit supports learners to develop a critical understanding of relevant and modern concepts in networking technologies within the IT industry. This unit also introduces learners to the detection of threats and vulnerabilities in physical and IT security, and how to manage risks relating to organisational security.

Learning Outcome 1: Understand the concepts of servers, clients, and processes.

Learning Outcome 2: Be able to create a client/server model in a Linux system with User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Application Layer protocols.

Learning Outcome 3: Be able to design and configure a secure network for a corporate environment.

Case Scenario

Global ISP is a leading high-end systems integrator with a proven background in complex, advanced integrated security systems. Global ISP excels in delivering innovative solutions to complex and technically challenging problems to clients in both the government and commercial sectors. By December 2018, it had over 290,000 customers across the UK. Global ISP is now expanding further and recently they have secured a contract of creating a new technology hub in Huddersfield, UK. You are in charge of a pool of network analysts who will be designing a range of network systems in the project.

Your line manager Alex Wood has asked you to provide upskilling training to this group of analysts. You have the following tasks for your new assignment with the company.

Task 1: You need to create a report that will cover the following:

a. First part of the report covers the concepts of servers, clients, and processes. You will start by, explaining the client and server environment and the communication between clients and servers. Then you will define the terms: Process ID (PID), Parent Process ID (PPID) and ‘init'. The first part will be concluded with a comparison of the operation of parent processes and child processes.

b. Second part of the report covers Linux server basics. Start this section by explaining the features of Linux server configurations. To finish this section you need to explain the concepts of UDP and TCP systems.

c. To conclude the report, critically evaluate Network Security protocols that are relevant to Global ISP. Conclude the report with a critical analyse of the purpose and requirements of a secure network for Global ISP where they face imminent threats from hackers who want to use DDoS attack to bring its services down. Also, as you are aware that Global ISP systems are prone to phishing attacks, you should include concerning issue in your analysis.

Task 2
All analysts have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to demonstrate them how to plan, design, setup and configure a secure Linux based network system.

Instructions

a. Build and implement DNS server in Linux using UDP and TCP.

b. Design a secure network for a corporate environment that will protect Global ISP from imminent hacker attacks.

c. Configure Network Security for a secure network in a corporate environment. (Your lab instructor may give you additional security concerning scenarios.)

Attachment:- OTHM Level 6 Diploma in Information Technology.rar

Reference no: EM133107762

Questions Cloud

Creating a garden for a gardening program : Disability school creating a garden for a gardening program for disability students that grows fruits and vegetables - develop cultural understanding and help
Developing policy changes : Your department has been developing policy changes. During this time, your colleague was on vacation and did not participate in the process.
Prepare all necessary journal entries made by Florists : Prepare all necessary journal entries made by Florists International to account for its investment in Nursery Supply Company
Compute the gross earnings due to the group : The company engages three grades of workers who are paid a bonus of the excess of time allowed over time taken. Compute the gross earnings due to the group
Build and implement DNS server in Linux using UDP : Build and implement DNS server in Linux using UDP and TCP and Design a secure network for a corporate environment that will protect Global ISP from imminent
Long term objectives and business strategies : Discuss in scholarly detail how organization can influence or impact both long term objectives and business strategies.
Eomen candidates for government employment : -What resource or publication would be the most effective for finding qualified minorities and women candidates for government employment?
Evaluate the applicability of each of concepts : Evaluate the applicability of each of the concepts that you've selected to a business environment in which you have worked in the past
What is human resource management : 1. What is Human Resource Management, and why is it important?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd