Design and draw the network topology

Assignment Help Computer Networking
Reference no: EM132300395

Assignment - Network Design and Implementation

Scenario A

You are a network specialist for ActiveDirectoryxx.com (where xx is the number of your assigned account student-xx to login to VSphere Client). You company have 4 servers running window server 2012 (Root-DC, Com-A, Com-B and Com-C). You are given a subnet 50.50.xx.0 (the value of xx is the same as above), mask 255.255.255.0. You are required to design and configure a network with active directory according to the following requirement:

Two server computers must act as active directory domain controller for the ActiveDirectoryxx.com, to support the high volume of user for your company. Among them, one should be configured as Read Only Domain Controller which does not allow modification of the active directory database. The root Domain Controller is located in Melbourne. Your company opens one branch in Sydney and takes the child domain name as Syd.ActiveDirectoryxx.com. Another computer should be configured as a member computer of the root domain.

Note: You can use the VMware provided in the Labs on campus or setting up your own VWware on your PC for this assignment.

If you choose to use the Labs' computers, before attempting the assignment tasks, you should take a Snapshot of the VMware DC, SYD-A, SYD-B and SYD-Core for backup.

If you choose to use your own PC, you are responsible for installation and maintenance of your own systems.

Task 1: Computer Preparation

If you use your own PC:

• Install fresh window server 2012 R2 on your VMware platform.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly.

If you use the VMware in computer labs:

• Take snapshots of your VMware for backup.
• Remove all Active Directory Installation from all computers.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly, and computers are not in any domain.

Task 2: Active Directory Design and Initial Setup

• Design and draw the network topology based on the above requirement. Clearly label the server computer names, assigned IP addresses, assigned domains, and DNS IP addresses.
• Set up the computers IP address and DNS IP address according to the proposed design.
• Use commands ipconfig /all to verify the configurations and ping to verify connection between computers, take screenshots of the computer information and pings.

Task 3: Active Directory Installation

• Configure the active directory following the proposed design.
• Capture necessary screenshots to demonstrate the steps taken to configure the network, and provide some explanation for your steps.
• After completed the configuration, take screenshot of Computers and Domain Controllers folder in Active Directory User and Computers of the root domain controller to verify the existing domain controllers and member computer in the network.

Task 4: Active Directory Management A - Group Management
• Create a security group named Melbourne_Group. Create a new group Managed Service Account named Sydney. Configure the group Managed Service Account to be used by computers that are members of the Melbourne_Group.

B - User Account Management:

• Create a new user named ADTest_User, and request user must change password at the first logon. Log on using a member computer to verify the setting is working. (Take screenshots of the account creation and log in process)
• Try to logon to the root domain controller using ADTest_User account. Why can't you login? Perform necessary configuration to enable ADTest_User to be able to login onto the root domain controller.

C - Policies Applications:

• Use Group Policy preferences to automatically delete the contents of the c:\Windows\Temp folder each time user ADTest_User signs on to a computer. Create some text files in the Temp folder, then log off and log in again using ADTest_User to verify the policy has been applied.

D - Software Restriction:

• Use a software restriction policy to block ADTest_User from opening iexplore.exe on any computer in the domain ActiveDirectoryxx.com.
• Log into a computer using ADTest_User and verify that ADTest_User cannot open iexplore.exe
• Log on to any computer using Administrator account and verify that iexplore.exe can be opened.

Assignment Specific Requirements

• You are required implement the active directory according to the tasks specified above.
• You will prepare a documentation that provides the network design and describes the steps taken and the screenshots of the system.
• The description of steps does not need to be as detailed as in the lab manual, but it should provide enough information for reader to understand what you did to achieve the desired outcome.
• Mark will be given to screenshot of the system and quality of the step description.

Reference no: EM132300395

Questions Cloud

What is your ultimate career goal : Long-Term Goals: What is your ultimate career goal (e.g., I would like to run my own manufacturing company)? Short-Term Goals: What is your immediate career.
Define what did willy believe was key to successful selling : What did Willy believe was the key to successful selling? Do you agree? Does Willy's brother Ben fit into this? Has the play added anything to how you view.
Impact of two distinctively different styles of management : This case shows the impact of two distinctively different styles of management. describe their impact on the hospital’s effectiveness.
What course of action will benefit company in the long-term : What course of action will benefit the company in the long-term - eliminating all perks, retaining all perks, or eliminating some perks while keeping others?
Design and draw the network topology : NIT3122 - Enterprise Network Management - Victoria University - Network Design and Implementation - Active Directory Design and Initial Setup
Manufactures two types of wooden toys : Giapetto’s Woodcarving, Inc., manufactures two types of wooden toys: soldiers and trains.
How a diverse workforce drives economic growth : The Evolution of HR's Role outsourcing personnel management, (c) repatriating employees from foreign assignments, (d) ethical leadership methods and corporate.
A customer service experience : A lady gets her car serviced at the dealership where she bought it. Using what you know about QFD, what is the voice of the customer saying?
Find an example of bogus or less than credible web site : Find an example of a bogus or less than credible Web site. Indicate why you perceive it to be untrustworthy.

Reviews

len2300395

5/6/2019 11:30:31 PM

C-Policies Applications (4 Marks) + Use Group Policy preferences to automatically delete the contents of the c:\Windows\Temp folder each time user ADTest_User signs on to a computer. (Description of Steps is provided appropriately) + Create some text files in the Temp folder, then log off and log in again using ADTest_User to verify the policy has been applied (Description of verification is provided appropriately) D-Software Restriction (5 Marks) + Describle steps of setting up software restriction policy to block ADTest_User from opening iexplore.exe on any computer in the domain ActiveDirectoryxx.com + Login to a computer using ADTest_User and verify that ADTest_User cannot open iexplore.exe (Description of Steps are shown properly) + Log on to any computer using Administrator account and verify that iexplore.exe can be opened (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:24 PM

B-User Account Management (4 Marks) + Create a new user named ADTest_User, and request user must change password at the first logon. Log on using a member computer to verify the setting is working. (Description and screenshots of the account creation and log in process are provided appropriately) + Explain why you can not login to the root domain controller using ADTest_User account + Perform necessary configuration to enable ADTest_User to be able to login onto the root domain controller (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:16 PM

Task 3 (7 Marks): Active Directory Installation + Capture necessary screenshots to demonstrate the steps taken to configure the network, and provide some explanation for your steps + After completed the configuration, take screenshot of Computers and Domain Controllers folder in Active Directory User and Computers of the root domain controller to verify the existing domain controllers and member computer in the network. Task 4 (17 Marks): Active Directory Management A-Group Management (4 Marks) + Security group Melbourne_Group and group managed Service Account Sydney are created correctly (Description of Steps are shown properly) + Configure the group Managed Service Account to be used by computers that are members of the Melbourne_Group (Description of Steps are shown properly)

len2300395

5/6/2019 11:30:08 PM

Marking Criteria Task 1 (3 Marks): Computer Preparation + Computers are with appropriate names and not apart of any domain. Verification information and description are appropriate. Task 2 (3 Marks): Active Directory Design and Initial Setup + network topology is correctly design according requirement. Labels are shown appropriately (server computer names, assigned IP addresses, assigned domains, and DNS IP addresses) + IP address and DNS IP address are set up correctly. Ping verification is shown and working properly

len2300395

5/6/2019 11:29:59 PM

Submission Requirements You are required to submit a word document containing Assignment Cover Sheet (provided on VU Collaborate) with your name and student ID, together with the screenshot and step description. The content in the document may be compared with the actual implementation. Therefore, you are required to maintain the system after completing and submitting your assignment. You may be requested to present your implementation to verify your work. Your assignment will be marked based on the functionality of the system after implementation and the quality of your documentation. Penalty of 5% will be applied for each day late.

Write a Review

Computer Networking Questions & Answers

  Analyze what information was relevant and why

Develop a brief synthesis and summary of the two articles. How are the topics of the two articles related? What information was relevant and why?

  Show all the user datagrams exchanged between the two hosts

Show all the TFTP commands including commands needed for connection establishment and termination. Show all the user datagrams exchanged between the two hosts.

  Network design diagram that shows an appropriate network

Provide a network design diagram that clearly shows an appropriate network configuration to meet the requirements, with components properly labeled

  Illustrate the concept of batch processing operating system

Discuss multiprocessing systems and explain how multiprocessing increases the utilisation of resources - Illustrate the concept of batch processing

  What protocol do you recommend for the network

Nishida Kitchens is a medium-sized company that makes packaged Japanese foods including noodle and sauce combinations. Their foods are distributed to grocery.

  Name the various options for an enterprise telephony

Name the various options for an enterprise's telephony network to be connected to SIP trunks?

  What is the ip address and tcp port number

What is the IP address and TCP port number used by the client computer that is transferring the file - What is the IP address and TCP port number used by your client computer to transfer the file to gaia.cs.umass.edu?

  What is the last byte number that can be sent without an ack

Which bytes will be sent next? What is the last byte number that can be sent without an ACK being sent by the receiver?

  Construct and build a topology for voice over

a) Construct and Build a topology for voice over IP phone for remote server using Cisco Packet tracer.

  Compare and contrast frame relay atm and ethernet services

How do datagram services differ from virtual circuit services?- How does an SVC differ from a PVC?- Compare and contrast frame relay, ATM, and Ethernet services.

  Divide network in two vlans for clients and server

In your network, you could use layer 3 switch, divide the network in two VLANs, one for clients, another one for  server and route between them using routing capabilities.

  What are the components and network infrastructure and end

1. please write a three page paper on the designbuild of a computer network within a hospital in relations to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd