CIS 345 Operating System Principles Assignment

Assignment Help Computer Networking
Reference no: EM133033619

CIS 345 Operating System Principles - Cleveland State University

You will be required to build your local area network only in "RH235" with Gateway (NAT), DHCP-DNS, Web servers and one client (windows 10) on VMware vSphere, based on the network diagram you made at the project. However, you can use Pfsense as Gateway with NAT/DHCP service so that you have no DHCP server in your network for project2.

1. Find "CIS345-Project" Resource Pool in VMware vSphere.
2. You are required to save all VMs for project 2 in the folder "Project-LAN0x-username" under CIS345-Project.
a. Your virtual machines will be checked by the instructor for grading.

3. Create the clones of, pfsense, Windows10, and Windows Server 2016 as you need.
a. Changing the virtual machine names "Clone of ..." to the name of computer in your design such as "iis" and "PC-0".
b. Change the computer names of the virtual machines. (Not virtual machine names.)
i. Change your gateway's computer name to GateWay_yourlastname
c. Make sure you have at least one windows10, two windows 2016, and one Pfsense

4. After making the four virtual machines, take snapshots for each VMs. (You name the snapshots "Project 2 Initial state".)

Design Project 2

Without looking at the Design Project 1 instruction sheet, try to build your local area network only for RH235(Gateway, DomainSrv, iis, and PC0) on VMware vSphere, based on the network diagram you made at the project 1. However, you can use the DHCP service on Pfsense (Gateway) so that you have no DHCP server in your network. Update your network diagram with those changes.

Additional requirements for project 2:
1. Your domain name should include your last name (e.g., KanamoriProject.net)

2. Make your web server have a welcome webpage and the URL with your Lastname (e.g., www.kanamoriProject.net) for the webpage.

3. Change your gateway's computer name to GateWay_yourlastname (e.g., GateWay_kanamori).

4. Change the IP address of the DNS server in the building's LAN outside of your rooms (i.e., RH235 and RH240) to
192.168.1.2/24 from 192.168.182.2/24

5. Set up an Active Directory to manage users and computers.
a) All computers except the Gateway server are joined in your domain (e.g., KanamoriProject.net).
b) Create a user account cis345student for you with the password W3passwd in your domain.
i. Enter your last name and your first name for the Last name and First name fields in the account properties, respectively.
c) Make sure that cis345student user cannot log in DomainSrv, iis, and GateWay servers.
d) All user passwords for all of your VMs should be W3passwd.

Summary
1. Build the LAN on VMware vSphere with the new virtual machines you cloned in Project2 preparation.
2. After you complete building your LAN, check if your LAN satisfies the requirements specified by Project1 and Project 2 instruction sheets.
a. For example, check if your PC0 can:
• Receive a correct IP address dynamically.
• Access the Internet using URLs.
• See your web page with the URL.

3. Write or update your network diagram (including RH235 and RH240) by using VISIO. In the new diagram, correct all errors pointed out by the instructor in project 1 and add all the necessary information you needed to build your LAN for project2 following this instruction sheet.

4. Submit your updated diagram to the blackboard by 5:30 pm on Nov. 22.
a. If you correct the errors in your original project 1 diagram, partial credits (up to 70% of your lost points for each error) will be added to the project1 score. (The new information and the changes you made in the new diagram must be highlighted in order to be graded.)

5. Show the LAN you built to your instructor on Nov. 22.
a. All the login passwords should be W3passwd.
b. Make sure the reboot of the system won't change the configurations of the system.

Attachment:- Operating System Principles.rar

Reference no: EM133033619

Questions Cloud

Develop security strategy : Information systems security involves a number of phases to be carried out. Three of the phases of information systems security are:
Making globalization work : 1. What are some of the ways globalization has not worked out? What are the principle causes?
Prepare the entry to record Nichols investment : Ripley invests $19,500 cash, and Nichols contributes $18,000 cash and equipment having a book value of $3,900. Prepare the entry to record Nichols investment
Should Simple Simon enter the loan agreement : The cost of forgoing the discount is 2%. Should Simple Simon's enter the loan agreement with the bank and begin taking the discount
CIS 345 Operating System Principles Assignment : CIS 345 Operating System Principles Assignment Help and Solution, Cleveland State University - Assessment Writing Service
Understanding of ethics : You and your family love the beach and decide to spend a weekend at an isolated beach cabin. Your teenager daughter often gets bored on your getaways
Make a list of at least five business ideas : Make a list of at least 5 business ideas that interest you. Then explain which one you think is the best opportunity for you. Give at least 3 reasons why this o
What the grant revenue that the city should recognize : The city purchased one bus for $85,000 and issues a purchase order for another van for $80,000. What the grant revenue that the city should recognize
By What amount would OHara total stockholder equity increase : The market value of O'Hara Co.'s common stock on June 30, 2022, was 24 per share. By What amount would OHara total stockholder equity increase

Reviews

len3033619

11/22/2021 10:34:57 PM

You will be required to build your local area network only in “RH235” with Gateway (NAT), DHCP-DNS, Web servers and one client (windows 10) on VMware vSphere, based on the network diagram you made at the project. However, you can use Pfsense as Gateway with NAT/DHCP service so that you have no DHCP server in your network for project2.

Write a Review

Computer Networking Questions & Answers

  ITNE2003 Install, Configure, Operate and Troubleshoot Medium

ITNE2003 Install, Configure, Operate and Troubleshoot Medium-Size Networks Assignment and Solutions-Victorian Institute of Technology Australia.Configure RIPv2.

  How given needs collaborative benefit provided by the suite

Create a PPT about a cloud-based office productivity suite. Identify how each of the above need can be met and the collaborative benefits provided by the suite.

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

  What should you know about website privacy

What should you know about website privacy? How do you know when an online transaction is secure? Why is Anti-spyware software important to my online security?

  Draw a diagram of your proposed network showing devices

Draw a diagram of your proposed network showing devices, network types and media and Design relevant subnetting for the proposed network, by considering

  At which layer of osi model should you begin troubleshooting

A user complains that he cannot access a particular Web site, although he is able to access other Web sites. At which layer of the OSI model should you begin.

  CI7150 Wireless Communications and Networks Assignment

CI7150 Wireless Communications and Networks Assignment Help and Solution, Kingston University, UK. Create a local area network and place the zigbee protocol

  What are the benefits of implementing a server in terms of

you are the network administrator for a group of 24 groundwater hydrologists who work in two adjacent buildings. their

  What is the minimum packet size

In the IEEE 802.3 frame format, what is the PAD field used for? What is the minimum packet size?

  Configure a dns server with both forward and reverse lookup

Configure a DNS server with both forward and reverse lookup. You should configure a domain name zone of your_surname .itc514.edu, and a reverse name mapping zone of 192.168.15.0/24.

  Implementing wireless technologies

it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd