Plan and implement various application servers

Assignment Help Computer Networking
Reference no: EM132224237 , Length: word count:2000

Design, Installation and Configure Enterprise Network Servers.

Learning Outcomes

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:
a. Analyse human usability in systems and documentation within the context of constantly changing modern industry requirements
b. Plan and implement various application servers for an organisation

Assignment Description

Form a group of two students and inform your lab tutor of the names and student IDs of your group members. Choose one (1) requirement scenario given in the list below. Assume that your group has been hired by the client company to develop a networked system for their required services as described in your chosen scenario. Your task in this assignment is to analyse client requirements, design the solutions, implement, configure, and troubleshoot implemented solutions, and finally to prepare a system documentation report meeting the client requirements and following a standard industry template. Detailed requirements are provided below:

1. For your chosen scenario, (i) analyse client requirements, (ii) identify and propose the required servers and server roles (services), and (iii) provide required configurations for your chosen scenario.

2. Perform the configurations using either virtually or physically installed server OS to realise the scenario. Students can use Windows Server 2008 or a higher version, or Linux server if appropriate, which will depend on the scenario chosen. Your submission should include screenshots of each important step.

3. Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template. You have the freedom to create a template, with company name, logo, etc., for your client and use that for your documentation report. This report will serve as an important part of backup and disaster recovery documentation for the organisation in your chosen scenario, and can be used for training new IT staff in the organisation. As such, you must consider human usability factors and include the configurations using description of each important step, and screenshots corresponding to those in a way that will be useful to the target users of the document. Essential sections of the documentation are provided in the marking guide, however, you can include additional sections if deemed useful.

You must configure the domain(s) using group members' names (e.g., sajeen-joy-sam). If the chosen scenario requires a web server, the group must create a simple webpage (using html header tag only) to display the student ID numbers of the group members, which needs to be stored on and displayed from the created IIS (web server).

This documentation report (one report per group) is to be submitted on Moodle in Week-11.

4. Use your configured system to demonstrate individually the implemented scenario during your week-12 lab. Individual understanding will be tested during your demonstration.

Scenarios (Choose one only for your group to work on):

Scenario 1: Local Area Network (LAN) to support Windows Server and Client Environment

People Softwareis a software development company requiring the setting up of a LAN for their office located in Sydney. They have four departments: Developers, Marketing, Operations, and Finance. All objects (e.g., users, computers, etc.) belonging to these departments need to be created within their respective OU for their own department. People Software requires the following LAN services:

1) Centralised user authentication
2) Print server for users
3) All computers should acquire the IP addresses automatically from a server
4) Hosting of their own website using their own server
5) The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files, and state your assumption clearly.

Scenario 2: Local Area Network (LAN) to support Windows Server with multiple domains

TrueColour is a paint wholesale company needing to setup a LAN for their main office which is located in Perth. They have three different departments named Operations, Sales and Marketing. All objects (e.g., users, computers, etc.) belonging to those departments should have their own OU. The Clients require the following technologies to be implemented within their LAN:

1. Two different domains. One is allocated for the administrator and the other is allocated for everyone else (users).
2. Centralised user authentication for different domains
3. All computers should acquire their IP addresses automatically from a server
4. The Company should host a website from their own server
5. Your configuration should reflect the above criteria and display different privileges assigned to the different domain's users belonging to these domains.

Scenario 3: Local Area Network (LAN) to support Windows Sever and Linux Client Environment

With the growing base of users of Linux, People Software, a software company which was planning to create a Windows server based LAN decided to also support Linux clients to authenticate using the Active Directory. The company has three different departments named Operations, Finance and Marketing. All objects (e.g., users, computers, etc.) belong to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN:

1. The company requires a centralised user authentication support for Linux clients

2. All computers should acquire IP addresses from a server

3. The Company should host a website through their own server

4. There should be hardware virtualisation platform

Scenario 4: Setting up technology/features for Linux Server and Windows Client Environment

A Canberra based new company is looking at setting up a LAN for their office. They have three different departments named General, Finance, and Marketing. All objects (e.g., users, computers, etc.) belonging to these departments should have their own different OU. The users require the following technologies to be implemented within their LAN:

1. The client wants to use the Linux operating system as a server side operating system with the LDAP/SAMBA service to communicate between windows client machines and a Linux server

2. Centralised user authentication for Windows clients

3. The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files; state your assumptions clearly, as well as configure accordingly.

Reference no: EM132224237

Questions Cloud

Prepare a detailed system documentation report : Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template. You have the freedom
Company is organized into mainly profit-center divisions : A large electronics company is organized into mainly profit-center divisions.
Consider buying to protect their business and customers : What type of insurance policies should they consider buying to protect their business and their customers?
Incentive plan align employee incentives with firm : How does this incentive plan align the employee’s incentives with the firm’s? Is the inspection necessary?
Plan and implement various application servers : Analyse human usability in systems and documentation within the context of constantly changing modern industry requirements
Prepare functional benchmarking of internet service : Prepare a functional benchmarking of internet service between Verizon’s internet and Adelphia’s Interet.
Describe your consumer market using characteristics : Describe your consumer market using the characteristics indentified in your text.
About your employer on social media : What Can You Say About Your Employer on Social Media?? The rights of employees to use social media on their work breaks.
Database management systems and data-warehousing techniques : Database Management Systems and Data-Warehousing techniques are the greatest threat to individual privacy in modern times,

Reviews

len2224237

1/29/2019 1:40:21 AM

Demonstration /10 Demonstrate the full understanding of the system implemented using a real system. Demonstrate the full understanding of the system implemented using the report. Demonstrate partial understanding of the system implemented using a real system. Demonstrate partial understanding of the system implemented using the report. Inadequate demonstration of understanding. Conclusion /3 Clear conclusion covering of all that has been achieved in this assignment. Clear conclusion covering most of what has been achieved in this assignment. Clear conclusion, but missing some of the important points. Conclusion somewhat clear. Inadequate conclusion. Reference Style /2 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2224237

1/29/2019 1:40:16 AM

Summary /5 Clear and concise summary of implementations of all required configurations for the chosen scenario. Clear and concise summary of the implementations of mostof the required configurations for the chosen scenario. Summary of the implementations of most of the required configurations for the chosen scenario is provided, but clarity needs improvement. Summary of the implementations covers up to two (2) of the required configurations for the chosen scenario. Summary is not relevant to the implemented configurations, or summary covers only one (1) of the required configurations for the chosen scenario.

len2224237

1/29/2019 1:40:10 AM

Configuration screenshots or commands /10 Screenshots of commands and GUI configurations for all required technology/feature are provided, using labelled diagrams with caption. Screenshots of commands and GUI configurations for most of the required technology/feature are provided, using labelled diagrams with caption. Screenshots of commands and GUI configurations for most of the required technology/feature are provided, but missing either diagram labels or captions. Screenshots of commands and GUI configurations for most of the required technology/feature are provided, but missing diagram labels and captions. Inadequate/absent configuration screenshots.

len2224237

1/29/2019 1:40:05 AM

Configuration process description /8 Clarity /2 All steps are described for the implementation of all required technology/feature/server role(s). Description refers to the corresponding diagrams /screenshots using figure numbers. Description is clear and easy to follow. All steps are described for most of the required technology/feature/se rver role(s). Description refers to the corresponding diagrams /screenshots using figure numbers. Description is clear and easy to follow. Steps are described for mostof the required technology/feature/se rver role(s), but some important steps are missing. Some of the description lacks the reference to the corresponding diagrams /screenshots using figure numbers. Description is clear and easy to follow. Steps are described for up to two (2) of the required technology/feature/server role(s), some steps are missing. The description does not include the reference to the corresponding diagrams /screenshots using figure numbers. Description is unclear and not possible to follow.

len2224237

1/29/2019 1:39:53 AM

Grade Mark HD >80% DI 70%-79% CR 60%-69% P 50%-59% Fail <50% Introduction /2 Clear and relevant purpose of the documentation report, with a clear road map of the report. Clear and relevant purpose of the documentation report, with unclear road map of the report. Purpose of the documentation report has some relevance but lacks clarity, and unclear road map of the report. Either purpose of the documentation report is not relevant, or road map is not provided. Irrelevant introduction. Requirement analysis and identification of server roles and technologies /8 Identification and analysis of all requirements, listing of correct server roles/features/technologies for ALL of the requirements. Identification and analysis of most of the requirements, listing of correct server roles/features/technologies for all identified requirements. Identification and analysis of most of the requirements, listing of correct server roles/features/technologies for some of the identified requirements.

len2224237

1/29/2019 1:39:39 AM

Demonstrations Demonstrate the understanding of the system implemented on a virtual or real system, and/or the report. 10 Will take place during Week-12 lab) Conclusions Conclusion of what has been achieved in this assignment 3 Reference style All resources referenced properly using IEEE format 2 Total 50

len2224237

1/29/2019 1:39:33 AM

Configuration process description All steps are described for the implementation of each identified technology/feature/server role(s). Description refers to corresponding diagrams /screenshots using figure numbers. Description is clear and easy to follow. 8 2 Configuration screenshots or commands Screenshots of commands and GUI configurations for each identified technology/feature are provided using labelled diagrams with caption. 10 Summary Summary of all configuration performed. 5

len2224237

1/29/2019 1:39:27 AM

Marking criteria: Table 1: Marking criteria for Assignment 2 Section to be included i the report n Description of the section Marks Introduction Introduces the purpose of the documentation report, and a clear road map of the report (which section presents which topic). 2 Requirement Analysis and identification of server roles & technologies Analysis of requirements, clear identification & listing of server roles/features/technologies needed for realising the scenario. 8

len2224237

1/29/2019 1:39:17 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.

Write a Review

Computer Networking Questions & Answers

  Discuss improvement and new features found in html5

Share at least three improvements in HTML5. Then, find an example of at least one website that exemplifies one of those three features you highlighted.

  Determine performance of upgraded processor

If 30% of instructions need one memory access and another 5% need two memory accesses per instruction, determine the performance of upgraded processor with compatible instruction set.

  Security and privacy risks and vulnerabilities

What are the security and privacy risks and vulnerabilities in using the Internet?

  Wireless access points in your company''s warehouse

As the Project Manager, you have been assigned a project to deploy ten (10) wireless access points in your company's warehouse and break room within the next ninety (90) days. You are free to make assumptions that satisfy the scope of the proje..

  Find out about desktop virtualisation

Describe your reasoning for choosing the Virtualisation technology and what advantages this technology gives you in this scenario?

  What are the seven layers of the osi model

Which OSI layer is responsible for adding a header that includes routing information?

  Difference between a parent route and an ultimate route

Refering to figure below: You are the network administrator for the network depicted in the diagram. You have been assigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. What is the ..

  Explaining registration department becoming decentralized

A consulting firm has narrowed the choice of programming language to Java and C#. Which language do you think would be more appropriate for this application and why?

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  List and briefly define the key areas comprise network

List and briefly define the key areas that comprise network management. Explain succinctly the difference between the database of a network management system and its MIB. How do you implement each in a network management system

  Advantages of large number of simultaneous tcp connections

Can you configure your browser to open multiple simultaneous connections to a Web site? What are the advantages and disadvantages of having large number of simultaneous TCP connections?

  Modify hosts file to map yahoo-s ip address

Modify the hosts file to map www.google.com to yahoo's IP address and try to do a google search. Remove the modification to the host file and repeat.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd