Plan and implement application servers for an organisation

Assignment Help Computer Network Security
Reference no: EM132310725

Design, Installation and Configure Enterprise Network Servers

Learning Outcomes

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

a. Analyse human usability in systems and documentation within the context of constantly changing modern industry requirements
b. Plan and implement various application servers for an organisation

Assignment Description

Form a group of three students and inform your lab tutor of the names and student IDs of your group members. Choose one (1) requirement scenario given in the list below. Assume that your group has been hired by the client company to develop a networked system for their required services as described in your chosen scenario. Your task in this assignment is to analyse client requirements, design the solutions, implement, configure, and troubleshoot implemented solutions, and finally to prepare a system documentation report meeting the client requirements and following a standard industry template.

Detailed requirements:

1. For your chosen scenario, (i) analyse client requirements, (ii) identify and propose the required servers and server roles (services), and (iii) provide required configurations for your chosen scenario.

2. Perform the configurations using either virtually or physically installed server OS to realise the scenario. Students can use Windows Server 2008 or a higher version, or Linux server if appropriate, which will depend on the scenario chosen. Your submission should include screenshots of each important step.

3. Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template. You have the freedom to create a template, with company name, logo, etc., for your client and use that for your documentation report. This report will serve as an important part of backup and disaster recovery documentation for the organisation in your chosen scenario, and can be used for training new IT staff in the organisation. As such, you must consider human usability factors and include the configurations using description of each important step, and screenshots corresponding to those in a way that will be useful to the target users of the document. Essential sections of the documentation are provided in the marking guide, however, you can include additional sections if deemed useful.

You must configure the domain(s) using group members' names (e.g., sajeen-joy-sam). If the chosen scenario requires a web server, the group must create a simple webpage (using html header tag only) to display the student ID numbers of the group members, which needs to be stored on and displayed from the created IIS (web server).

This documentation report (one report per group) is to be submitted on Moodle in Week-11.

4. Use your configured system to demonstrate individually the implemented scenario during your week-12 lab. Individual understanding will be tested during your demonstration.

Scenarios (Choose one only for your group to work on):

Scenario 1: Local Area Network (LAN) to support Windows Server and Client Environment

Thinktank company is a Sydney based SME (Small and medium-sized enterprise). They had 10 computers in the office when they started, now they have 50 computers, and their business is rapidly expanding. Thinktank has planned to open up another new branch in Melbourne, and will be connected to HQ (Head Quarter) in Sydney. They hired new staff for these branches. The new branch will have the same number of staff as it does in Sydney. They need to buy new machines, and printers for the new branch. They also need to centralise Authentication, Authorisation, and Data location - so it can be shared across the branches.

One more requirement is that the company want to make sure that the Finance department across the branches have separate folders on the network that can only be accessed by them. In addition, the Sales department need to see their respective folders only. Managers should have authority over the entire Data folder.

Currently, Thinktank stores all their data centrally on two machines. These are workgroup computers, but data is shared with 28 other staff from different departments: 5 in Finance, 20 in sales, and 3 managers.

The IT staff assigning manual IP addresses to each network device, which creates lot of confusion in maintaining records, i.e., which computer holds what IP address; and most of the time ending up with assigning same IP address to two, or more computers that causes duplication, and disruption in network activities.

Users are having problem in accessing central data by computer IP address as it becomes difficult to remember server IP addresses. Thinktank intend to use internet and access resources in internet using names. Each user needs space under the network for storing his own folders that no one else can access. Current workgroup network model does not meet their requirements. There is no accountability in place, Thinktank also, needs to reduce the down time for the important Enterprise Network Services by implementing the fault tolerance, i.e., in-case a server goes down, their business should not be affected.

Thinktank looking into security policy solution for their entire network based on the industry best practices. Based on the information given above, and the requirements of the Thinktank structure, your task is to suggest a suitable design and present the implementation prototype with virtual machines using Oracle VirualBox Tool.

1) Choose a domain name for your organization (e.g. Adatum.com).
2) The network will be constructed as an active directory domain tree with its root domain.
3) Two Domain controller for a chosen Domain in the network for redundancy.
4) Centralised user authentication.
5) Print server for users.
6) All computers should acquire the IP addresses automatically from a server.
7) Hosting of their own website using their own server.
8) Describe how many OUs, Groups, Users and Access Levels will be created.
9) The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files, and state your assumption clearly.
10) Provide a diagram that shows your Active Directory Domain Structure, not limited to the HQ, Branch location, domain tree and the clients in each domain. See Figure 1: Sample Active Directory Design.

Scenario 2: Local Area Network (LAN) to support Windows Sever and Linux Client Environment

With the growing base of users of Linux, People Software, a software company which was planning to create a Windows server based LAN decided to also support Linux clients to authenticate using the Active Directory. The company has three different departments named Operations, Finance and Marketing. All objects (e.g., users, computers, etc.) belong to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN:

1. The company requires a centralised user authentication support for Linux clients
2. All computers should acquire IP addresses from a server
3. The Company should host a website through their own server
4. There should be hardware virtualisation platform

Scenario 3: Setting up technology/features for Linux Server and Windows Client Environment

A Canberra based new company is looking at setting up a LAN for their office. They have three different departments named General, Finance, and Marketing. All objects (e.g., users, computers, etc.) belonging to these departments should have their own different OU. The users require the following technologies to be implemented within their LAN:

1. The client wants to use the Linux operating system as a server side operating system with the LDAP/SAMBA service to communicate between windows client machines and a Linux server
2. Centralised user authentication for Windows clients
3. The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files; state your assumptions clearly, as well as configure accordingly.

Attachment:- Design - Installation and Configure Enterprise Network Servers.rar

Verified Expert

The task is about analyzing the client's requirements and identification of the different servers roles and their specifications with the roles. The existing network of the clients has a lot of limitations in terms of scalability and reliability. All these problems are analyzed and a solution for the same is discussed in the next part of the project.

Reference no: EM132310725

Questions Cloud

Describe the purpose of an acceptable use policy : Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within.
Summarize the purpose of each system database : There are four system databases created: Model, TempDB, MSDB, and Master. Summarize the purpose of each system database. In your opinion, which is the most.
Do recent changes to ER in that country support hypothesis : According to Baccaro and Howell, employment relations in all of the six countries in their study have been transformed in a neoliberal direction.
Explain what the job listings description : You can use jobs with different names, but they should have the words "Public" and "Manager or Analyst" in the job title. Please find at least five jobs on.
Plan and implement application servers for an organisation : Perform the configurations using either virtually or physically installed server OS to realise the scenario. Students can use Windows Server
Choose one feature of windows 10 : Choose one feature of Windows 10 or any other version of Windows (Vista, 7 or 8) that could be helpful to you as a support technician
What is a data api and why do private companies : a. What is a data API and why do private companies offer them? b. Why is it preferable to use an API rather than scrape data from websites?
Draft a short letter to john advising him of the key issues : You have the task of advising clients as an accountant. Draft a short letter to John advising him of the key issues that you consider important.
Analyze the potential threats from ai technology to society : What threats are most serious, and how might they be combated? How do they compare to the potential benefits?

Reviews

len2310725

5/23/2019 3:07:30 AM

Hi there The assignment which i have posted now i want you guys to answer just 1st and 2nd part of it That is introduction and requirment analysis and identification of server roles and responsibilities along with the refrence in the required format

len2310725

5/23/2019 3:06:14 AM

Due Date Report: Week-11, Wednesday, 11:55 PM. Demo: Week-12 lab. Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.

len2310725

5/23/2019 3:06:05 AM

Assessment Title Design, Installation and Configure Enterprise Network Servers. Unit Learning Outcomes covered in this assessment This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes: a. Analyse human usability in systems and documentation within the context of constantly changing modern industry requirements b. Plan and implement various application servers for an organisation

Write a Review

Computer Network Security Questions & Answers

  Describe your cryptanalysis process

Describe your cryptanalysis process. Show all the steps you went through to decrypt message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.

  Provide an introduction to digital forensic analysis

Provide an introduction to digital forensic analysis and Digital forensic analysis is used to review and investigate data collected

  What do you believe are the motives of a cybercriminal

What are the main investigative tools that all cybercrime investigators should have? What are some of the specialty tools that investigators would require for specific type of investigation such as network intrusion or mobile investigation?

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Summary of the applicable government ipv6 mandate

ISSC 640 Case Study - Summary of the applicable government IPv6 mandate and brief description of the networking facility at the branch (LANs, servers, routers, etc.)

  Why is a dos so serious and how can we defend against it

CSIS 343-Why is a DoS so serious and how can we defend against it? Of the five DoS types discussed in the text, is it important to understand the type of DoS in order to most effectively defend against it? Why or why not?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Write paper about stuxnet virus

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Write paper about Stuxnet..

  Discuss the risk of brute force user id and password attacks

The nurses visit their elderly patients in their homes and monitor their health. At the end of the day, the nurses are required to connect back to corporate.

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

  Compare two-tier client-server system configuration

Compare 2-tier and 3-tier client/server system configurations and analyze how they are different. Based on your comparison, suggest the real life scenarios which are suitable for each of them and justify your reasoning.

  Various aspects of outsourcing the it function

Write a 3- to 5-page paper that discusses the various aspects of outsourcing the IT function from an organization. Address the following questions in your paper:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd