Reference no: EM132302222
Install and manage complex ICT networks Assignment -
Instruction - You are required to perform the weekly arranged activities per the Architecture 2 Study Guide. Most of the activities are not mandatory tasks but are rather helpful when you need assistance in doing the Portfolio.
Tread carefully if you choose not to do some of the activities as they are associated with the Portfolio requirements. They will assist you in doing the Portfolio tasks by providing well designed practices along with step by step guidance. In fact, most of the time, when you finish the activities, you may almost finish the correspondent parts of the portfolio as well. You are expected to:
1. Finish each week's activities.
2. Finish the respective parts on the portfolio.
3. Grab the signature of those parts scheduled for the week.
Week 1 -
When you finish Activity 1 & 2, you may have the following findings:
- Activity 1 Flat Switched Network design would not allow you to divide VLANs based on the departments. Otherwise communication between department VLANs is impossible as there are no layered three network devices to help forward the traffic across VLANs.
- Without VLANs to help restrict the broadcast domain size, when the network expands with more and more devices added to the same VLAN, the network congestion will increase drastically and eventually the network becomes inaccessible.
- You may also notice in the Flat Switched Network design, the access layer switches are deployed in bus topology where redundancy in network architecture can hardly be implemented. When the access ports on the switches are all used, the only way the network can be expanded is to join a new access layer switch in the bus topology although this will increase the risk of single point of failure. Therefore, the Flat switched Network design is not flexible nor reliable for network expansion.
- Lastly, in the Flat Switched Network design, all the end devices are in the same IP subnet as they are all in the same VLAN. It is impossible to deploy security control policy such as ACL based on the IP network addresses or the VLANs.
1. Part 1 - 3.1: Based on the activities and the analysis above, you should be able to finish Portfolio Part 1 section 3.1 with your own language.
2. Part 1 - 4.1: Based on the VLAN creation in activity 2, you should be able to design the security strategy in Portfolio Part 1 - 4.1.
3. Part 1 - 4.3: Based on the port security configuration in activity 1, you should be able to design the security strategy in Portfolio Part 1 - 4.3.
4. Part 1 - 4.5: Based on the redundancy design in activity 2, such as etherchannel, two core layer/distribution layer switches, HSRP etc. , you should be able design the redundancy strategy in Portfolio Part 1 - 4.5.
5. Part 1 - 5.1: Based on activity 2 network topology, you should be able to search on the internet for multiple layered switches and suggest the make and model of your suggestion. Describe where the multilayered switches will be placed in the network logical topology. Briefly explain the reasons of your selection from the aspects of functions, quality, and cost. Attach the price and the web link.
6. Part 2 - 2: Based on the activity 2 Network Topology, you should be able to finish the Network Topology design in Part 2. Actually, the network topology should be the first thing to be considered and designed for a network project.
7. Part 1 - 2.1, 2.2, 2.3: According to the information you collected from the portfolio requirements and the answers provided by your teacher, you should be able to summary the business requirements in these sections.
8. Part 1 and Part 2 Introduction: Briefly introduce the purposes of these two documents.
Week 2 -
This week's focus on the security design of the project.
1. Part 1 - 2.9: Summarize the security requirements in regards to authentication, firewall for the business network, anti-virus on end devices, intranet security control over telnet attacks, port security control, etc.
2. Part 1 - 3.3: Explain why you want to deploy ADDS to manage the network resources and authentication. What is the current status of the network, draw backs, and solution.
3. Part 1 - 3.4, 3.5: Follow the template instructions.
4. Part 1 - 4.2: Based on the activity 5, you should be able describe what is the purpose of placing a firewall on the border of the business network to the internet.
5. Part 1 - 4.4, 4.7: Based on activity 3 and 4, you should be able to finish these sections.
6. Part 1 - 4.6, 5.3: Follow the template instructions.
7. Part 1 - 5.2: Search on the internet for physical firewall product. Remember to select a firewall with remote access feature, such as site-to-site VPN and remote access VPN. Because remote access is one of the business requirements. Describe where the firewall will be placed in the network logical topology. Briefly explain the reasons of your selection from the aspects of functions, quality, and cost. Attach the price and the web link.
Week 3 -
This week's focus on DHCP and DNS set up on Ubuntu.
1. Part 2 - 3 & 4: Based on the activity 5 & 6, you should be able to finish these two sections according to the IP address scheme you deployed for the project.
2. Part 1 - 3.9 : Based on this week's theory, you should be able to analyse what are the draw backs without DHCP & DNS and propose your suggestion.
3. Part 1 - 5.4: Follow the template instructions.
Week 4 -
This week's focus on Remote Access. This week's Activity is mandatory assessment.
1. Part 1 - 2.4, 2.5, 3.11, 3.12 & 5.7: Based on the week's theory, follow the template instructions to finish these parts.
2. Part 2 - 7: Follow the template instructions.
Week 5 -
This week's focus on VoIP and SNMP protocol to monitor network performance. This week's VoIP Activity is mandatory.
1. Part 1 - 2.6, 2.7 & 2.8: follow the template instructions to finish these parts.
2. Part 1 - 3.6, 3.7, & 3.10: Based on the week's theory, you should be able to analyse how
VoIP, Videoconferencing, and Network Monitoring will help the business to achieve its goal.
3. Part 1 - 5.5, 5.6: follow the template instructions to finish these parts.
4. Part 2 -6 & 8: Follow the template instructions to finish this part.
Week 6 -
This week is catch up week.
1. Part 2 - 5: Based on the knowledge from Stage 1 Server, you should be able to do this part on your own.
Assessment - Portfolio Part 2 - Initiating services, VPN and the final report
This task is designed to assess your knowledge and skills for initiating services. You will be advised by your instructor when to take this assessment.
This assessment has four parts:
1. Describe commands and processes required to setup a DHCP server.
2. Describe commands and processes required to setup a DNS server.
3. Describe commands and processes required to setup other services.
4. Configure a Windows Server to be a domain controller and enable Active Directory.
5. Provide information to the manager of Mavis Car Rental.
6. Configure remote access.
7. Finalise the design and deliver it to Mavis.
First you should review the case study. Again, take notes of important points and refer to your notes during the assessment.
1. Describe commands and processes required to setup a DHCP server.
The first time that a Windows client (with DHCP enabled) attempts to join a network, it automatically follows an initialization process to obtain a lease from a DHCP server. What is the lease process?
2. Describe commands and processes required to setup a DNS server.
3. Describe commands and processes required to setup other services. Consider the following services.
a) SMTP
b) Windows active directory services and how to promote a Windows server to be a Domain Controller.
4. Configure a Windows Server to be a domain controller and enable Active Directory. Consider the following questions.
a) What is the command to start the process?
b) What is the procedure for adding users?
c) How would you test the new user accounts?
d) How would you set permissions for the new users private files?
5. Provide information to the manager of Mavis Car Rental.
a) Explain how the Mavis network can be monitored.
b) Describe the required protocols for monitoring and appropriate monitoring software.
c) Recommend software that Mavis can use to transmit voice and video over internet.
6. Configure remote access.
List the steps required to configure a VPN server:
7. Finalise the design and deliver it to Mavis.
In this task you will put all of the work that you have done into a single, final document which will be submitted to Mavis for consideration. Mavis has asked several companies to submit proposals, so you are competing for the contract to build the network. Your goal is to submit a report which will earn the contract for your consulting firm.
To complete this task, you will submit a final design proposal to Mavis which will include:
a) a 1-2 page document describing your proposed perimeter security design
b) a simple logical diagram of your proposed perimeter security design
c) a simple physical diagram of your proposed security design which shows what equipment is on what racks in what server rooms.
Attachment:- Assignment Files.rar