Describe commands required to setup a DHCP server

Assignment Help Computer Networking
Reference no: EM132302222

Install and manage complex ICT networks Assignment -

Instruction - You are required to perform the weekly arranged activities per the Architecture 2 Study Guide. Most of the activities are not mandatory tasks but are rather helpful when you need assistance in doing the Portfolio.

Tread carefully if you choose not to do some of the activities as they are associated with the Portfolio requirements. They will assist you in doing the Portfolio tasks by providing well designed practices along with step by step guidance. In fact, most of the time, when you finish the activities, you may almost finish the correspondent parts of the portfolio as well. You are expected to:

1. Finish each week's activities.

2. Finish the respective parts on the portfolio.

3. Grab the signature of those parts scheduled for the week.

Week 1 -

When you finish Activity 1 & 2, you may have the following findings:

  • Activity 1 Flat Switched Network design would not allow you to divide VLANs based on the departments. Otherwise communication between department VLANs is impossible as there are no layered three network devices to help forward the traffic across VLANs.
  • Without VLANs to help restrict the broadcast domain size, when the network expands with more and more devices added to the same VLAN, the network congestion will increase drastically and eventually the network becomes inaccessible.
  • You may also notice in the Flat Switched Network design, the access layer switches are deployed in bus topology where redundancy in network architecture can hardly be implemented. When the access ports on the switches are all used, the only way the network can be expanded is to join a new access layer switch in the bus topology although this will increase the risk of single point of failure. Therefore, the Flat switched Network design is not flexible nor reliable for network expansion.
  • Lastly, in the Flat Switched Network design, all the end devices are in the same IP subnet as they are all in the same VLAN. It is impossible to deploy security control policy such as ACL based on the IP network addresses or the VLANs.

1. Part 1 - 3.1: Based on the activities and the analysis above, you should be able to finish Portfolio Part 1 section 3.1 with your own language.

2. Part 1 - 4.1: Based on the VLAN creation in activity 2, you should be able to design the security strategy in Portfolio Part 1 - 4.1.

3. Part 1 - 4.3: Based on the port security configuration in activity 1, you should be able to design the security strategy in Portfolio Part 1 - 4.3.

4. Part 1 - 4.5: Based on the redundancy design in activity 2, such as etherchannel, two core layer/distribution layer switches, HSRP etc. , you should be able design the redundancy strategy in Portfolio Part 1 - 4.5.

5. Part 1 - 5.1: Based on activity 2 network topology, you should be able to search on the internet for multiple layered switches and suggest the make and model of your suggestion. Describe where the multilayered switches will be placed in the network logical topology. Briefly explain the reasons of your selection from the aspects of functions, quality, and cost. Attach the price and the web link.

6. Part 2 - 2: Based on the activity 2 Network Topology, you should be able to finish the Network Topology design in Part 2. Actually, the network topology should be the first thing to be considered and designed for a network project.

7. Part 1 - 2.1, 2.2, 2.3: According to the information you collected from the portfolio requirements and the answers provided by your teacher, you should be able to summary the business requirements in these sections.

8. Part 1 and Part 2 Introduction: Briefly introduce the purposes of these two documents.

Week 2 -

This week's focus on the security design of the project.

1. Part 1 - 2.9: Summarize the security requirements in regards to authentication, firewall for the business network, anti-virus on end devices, intranet security control over telnet attacks, port security control, etc.

2. Part 1 - 3.3: Explain why you want to deploy ADDS to manage the network resources and authentication. What is the current status of the network, draw backs, and solution.

3. Part 1 - 3.4, 3.5: Follow the template instructions.

4. Part 1 - 4.2: Based on the activity 5, you should be able describe what is the purpose of placing a firewall on the border of the business network to the internet.

5. Part 1 - 4.4, 4.7: Based on activity 3 and 4, you should be able to finish these sections.

6. Part 1 - 4.6, 5.3: Follow the template instructions.

7. Part 1 - 5.2: Search on the internet for physical firewall product. Remember to select a firewall with remote access feature, such as site-to-site VPN and remote access VPN. Because remote access is one of the business requirements. Describe where the firewall will be placed in the network logical topology. Briefly explain the reasons of your selection from the aspects of functions, quality, and cost. Attach the price and the web link.

Week 3 -

This week's focus on DHCP and DNS set up on Ubuntu.

1. Part 2 - 3 & 4: Based on the activity 5 & 6, you should be able to finish these two sections according to the IP address scheme you deployed for the project.

2. Part 1 - 3.9 : Based on this week's theory, you should be able to analyse what are the draw backs without DHCP & DNS and propose your suggestion.

3. Part 1 - 5.4: Follow the template instructions.

Week 4 -

This week's focus on Remote Access. This week's Activity is mandatory assessment.

1. Part 1 - 2.4, 2.5, 3.11, 3.12 & 5.7: Based on the week's theory, follow the template instructions to finish these parts.

2. Part 2 - 7: Follow the template instructions.

Week 5 -

This week's focus on VoIP and SNMP protocol to monitor network performance. This week's VoIP Activity is mandatory.

1. Part 1 - 2.6, 2.7 & 2.8: follow the template instructions to finish these parts.

2. Part 1 - 3.6, 3.7, & 3.10: Based on the week's theory, you should be able to analyse how

VoIP, Videoconferencing, and Network Monitoring will help the business to achieve its goal.

3. Part 1 - 5.5, 5.6: follow the template instructions to finish these parts.

4. Part 2 -6 & 8: Follow the template instructions to finish this part.

Week 6 -

This week is catch up week.

1. Part 2 - 5: Based on the knowledge from Stage 1 Server, you should be able to do this part on your own.

Assessment - Portfolio Part 2 - Initiating services, VPN and the final report

This task is designed to assess your knowledge and skills for initiating services. You will be advised by your instructor when to take this assessment.

This assessment has four parts:

1. Describe commands and processes required to setup a DHCP server.

2. Describe commands and processes required to setup a DNS server.

3. Describe commands and processes required to setup other services.

4. Configure a Windows Server to be a domain controller and enable Active Directory.

5. Provide information to the manager of Mavis Car Rental.

6. Configure remote access.

7. Finalise the design and deliver it to Mavis.

First you should review the case study. Again, take notes of important points and refer to your notes during the assessment.

1. Describe commands and processes required to setup a DHCP server.

The first time that a Windows client (with DHCP enabled) attempts to join a network, it automatically follows an initialization process to obtain a lease from a DHCP server. What is the lease process?

2. Describe commands and processes required to setup a DNS server.

3. Describe commands and processes required to setup other services. Consider the following services.

a) SMTP

b) Windows active directory services and how to promote a Windows server to be a Domain Controller.

4. Configure a Windows Server to be a domain controller and enable Active Directory. Consider the following questions.

a) What is the command to start the process?

b) What is the procedure for adding users?

c) How would you test the new user accounts?

d) How would you set permissions for the new users private files?

5. Provide information to the manager of Mavis Car Rental.

a) Explain how the Mavis network can be monitored.

b) Describe the required protocols for monitoring and appropriate monitoring software.

c) Recommend software that Mavis can use to transmit voice and video over internet.

6. Configure remote access.

List the steps required to configure a VPN server:

7. Finalise the design and deliver it to Mavis.

In this task you will put all of the work that you have done into a single, final document which will be submitted to Mavis for consideration. Mavis has asked several companies to submit proposals, so you are competing for the contract to build the network. Your goal is to submit a report which will earn the contract for your consulting firm.

To complete this task, you will submit a final design proposal to Mavis which will include:

a) a 1-2 page document describing your proposed perimeter security design

b) a simple logical diagram of your proposed perimeter security design

c) a simple physical diagram of your proposed security design which shows what equipment is on what racks in what server rooms.

Attachment:- Assignment Files.rar

Reference no: EM132302222

Questions Cloud

Calculate the amount of each product that hugo will purchase : Calculate the amount of each product that Hugo will purchase - Calculate the total utility that Hugo will get from the purchase you calculated
Attach copy of assignment : Just a shot in the dark here, but I need help on an assignment in C that takes command line arguments and puts them into 2D arrays and sends
Describe your personal commitment to positive social change : Describe your personal commitment to positive social change in your community as a health professional. Explain how your Walden experience might have strengthen
Spam in an effective and nonintrusive manner : Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner
Describe commands required to setup a DHCP server : ICTNWK529 Install and manage complex ICT networks Assignment, TAFE Queensland, Australia. Describe commands required to setup a DHCP server
Increase programmer productivity : You were just hired by a company to increase programmer productivity. You review existing program code and notice that no specific naming
Priority queue using heap : The clients are arriving to get passports. The arriving clients register at the window. Each arriving client has a priority number and name.
What are the ethical issues in information systems : You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest.
Discuss the team dynamics for a highly effective team : You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact.

Reviews

len2302222

5/9/2019 3:42:23 AM

Finish each week’s activities. Finish the respective parts on the portfolio. Grab the signature of those parts scheduled for the week. In doing so, it is easy for you to keep on track with your assessments. For another note, the activities would help you develop the hand on skills which are essential when you seek a job. Good luck with your study. The Instruction will guide you weekly in how to complete the Portfolio Template.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd