Design implement and configure a working system

Assignment Help Computer Networking
Reference no: EM131382718

Network Systems and Administration Assignment

This is an individual assignment delivered as a portfolio with block tasks assigned. You are required to deliver a set of networking services in a fully operational environment using Linux Virtual machines of your choice.

You are also required to demonstrate your work to the unit staff, during the practical sessions.

Assignment Description -

You are an IT consultancy firm that is responsible for designing, implementing and configuring network systems. Your task is to design, implement and configure a working system consisting of a client and a server. The server will be a Linux virtual machine based on a distro of your own choice. The client machine is another Linux virtual machine that must be of a different distro than that used for the main server. Your task is to implement a network using VMware Workstation or VirtualBox an enterprise network server with a number of essential services running on it and providing the client with the necessary access to these services. Some additional services must be configured.

You are required to install, configure and demonstrate the full operation of the server and client access to the resources based on virtualised machines that must be built from scratch. No pre-built VMs will be accepted.

A brief description of the requirements is given below:

PORTFOLIO DELIVERABLES

Block Task 1 - Your Linux server must be statically assigned an IP address in the segment 172.16.114.0/24 with the Windows client being able to communicate with the server. A DHCP and DNS server should be running on your Linux box. Your domain name must be: your_surname.local. Your servers must be fully tested from the client and server sides. All administration work should be clearly documented and added to Task 4 along with the appropriate justifications and citations as required in that task.

Block Task 2 - A directory service using an LDAP implementation is installed, configured with a number of users, groups, organisational units (OUs), and shared folders to mimic an enterprise server. The server should be provide the client with the necessary access to the directory service through its search features. Full testing of all user accounts, groups, OUs, and shared folders containing some documents should be carried out from the client side. All administration work should be clearly documented and added to Task 4 along with the appropriate justifications and citations as required in that task.

Block Task 3 - Install and fully configure a RADIUS server to provide remote access to clients wanting to connect to the directory server in order to work on documents stored in the shared folders. Your server must be fully tested from the client side. All administration work should be clearly documented and added to Task 4 along with the appropriate justifications and citations as required in that task.

Block Task 4 - Write an individual report with all the steps followed to complete the block tasks above. You should provide as much as details as possible in a system administration manner for each service installed and configured in your environment. Use the appropriate diagrams/screenshots to support your work along with details of what is presented in each one of them. All your configurations should be fully justified making sure that any commands issued and appropriate changes to configuration files are fully detailed, commented, and justified.

Attachment:- Assignment.rar

Reference no: EM131382718

Questions Cloud

Find the noise temperature of an antenna : Find the noise temperature of an antenna on a satellite if it looks at the earth (giving it a "sky" noise temperature of 290 K) and is coupled to the reference plane by a waveguide with a loss of 0.3 dB
Determine the primary ways : Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
Discuss in detail the essential features of the three models : Discuss in detail the essential features of the three models (bio, psycho, social) of addiction addressed this module/week. Consider then how the "Disease of the Human Spirit" fits or does not fit within the models already discussed. Discuss the a..
Physical security of the data center : If you were asked to design a data center for your company, what would you recommend to secure the physical security of the data center?
Design implement and configure a working system : CIS114-6 Network Systems and Administration Assignment. You are an IT consultancy firm that is responsible for designing, implementing and configuring network systems. Your task is to design, implement and configure a working system consisting of a..
Show that the particle moves with constant speed : The trajectory of a charged particle moving in a magnetic field is given.- Show that the particle moves with constant speed and find the magnitude of its acceleration.
Find velocity and acceleration vectors of insect at time t : Find the velocity and acceleration vectors of the insect at time t, and show that the angle between these vectors is always π/4.
Shipping department to update an order status : Create a procedure named STATUS_SHIP_SP that allows an employee in the Shipping Department to update an order status to add shipping information. The BB_BASKETSTATUS table lists events for each order so that a shopper can see the current status, d..
Calculate the round-trip time delay for the iridium system : Calculate the path loss for a satellite in the Iridium system on the link from satellite to mobile, assuming that the satellite is directly overhead.

Reviews

len1382718

2/4/2017 12:54:23 AM

No textbook definitions or explanations of services are required in the report. No marks will be given to any such content. If you use screenshots, make sure that these are correctly cropped to clearly show the text. Failure to do so may result in marks deducted. You are also required to demonstrate your work to the unit staff, during the practical sessions or by making arrangement to see them if permitted, when submitting the assignment. Any command, or configurations used from the Internet, software files, and/or textbooks must be clearly cited using Harvard referencing. Failure to correctly cite any materials may result in severe penalties.

len1382718

2/4/2017 12:54:18 AM

I will need you to write down the steps and stages of the work with screen shots ....because I will be asked to demonstrate how I did it to the tutor on the submission date. Please put this in Microsoft word. Pleases don’t forget to document the stages of the configurations with screen shots ......on Microsoft word .. vmware .... centOS 7 .. tutor asked me to use ''vmware ......centOS 7 for the work. my name to use for the lu my name to use for the linux client. samuel adugyamfi.local Your report must be electronically submitted on Turnitin and a copy of the completed system(s) on a USB flash drive submitted to the Unit Coordinator on the Due date.

Write a Review

Computer Networking Questions & Answers

  What happen if two processors try to access the global memoy

Consider a multiprocessor using a shared bus. What happens if two processors try to access the global memory at exactly the same instant?

  Attacks and defenses to session key establishment protocols

Illustrate attacks and defenses to these session key establishment protocols at all levels, including one or both of communicating machines being compromised.

  What is the issue with spanning tree protocol as discussed

What is the issue with spanning tree protocol as discussed by the presenter and how would you deal with the issues identified?

  Task 1 write java or cc udp programs allowing two parties

task 1 write java or cc udp programs allowing two parties to establish a secure communication channel. for simplicity

  Found at the bottom of the screen

Found at the bottom of the screen; Used to shift the screen from left to right so that different sections can be viewed

  Youre logged on locally to a users computer and your

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Fiction corporation is a large national retail chain of

fiction corporation is a large national retail chain of 10000 employees and 500 retail outlets. fiction is moving its

  A residential heat pump uses the ground as an energy source

a residential heat pump uses the ground as an energy source. at a particular operating condition the heat pump delivers

  What is the first step in the boot process

What is the first step in the boot process?What is the first step in the boot process?

  Explain the reasons for your selection

Select a preferred supplier and briefly explain the reasons for your selection - provide the information that you are summarising. Higher marks will be awarded to answers which contain more complete information.

  Explain the primary principle of device failure protection

What are the most common security threats? What are the most critical? Why?- Explain the primary principle of device failure protection.

  Draft a six- to eight-page paper based on a life-changing

draft a six- to eight-page paper based upon a life-changing decision you or someone in your community has had to make.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd