System and network administration project

Assignment Help Computer Networking
Reference no: EM132317872

System and Network Administration Project

Overview of the Project

The final project tests your ability to put together the skills learned in previous weeks and present it as an application of your knowledge and skills to a small business network. So as you read through the requirements, consciously relate it to relevant work you've already completed.

The small business network represents the capstone of this course - it is what all the previous assignments have led to, and is the reason that it takes the bulk of the assessment weighting. Some additional research and reading may still be required.

Scenario
You are the sysadmin for a software development startup company, called cqunix, that is moving into a new building. The company has 10 full-time employees, as well as up to another 10 that either work part-time or perform short-term contract work at the company. Each full-time employee will have a dedicated workstation; most also have a laptop. The part-time/contract staff have their own or company-supplied laptops. There will also be several spare workstations. The company develops Unix and Linux software, and they are an (Ubuntu) Linux exclusive company for all their computers.

Workstations, Laptops and Servers

The company has grown quite quickly. Initially when there was just a few friends, they used all online services (e.g. Google Docs, GitHub, DropBox). But now as they move into the new building, they have decided to use their own infrastructure. Most of the employees work in a distributed mode, working on their own computers and sharing resources direct with colleagues, however there are several centralised services required. Specifically, they have identified the need for the following. Included are the selected names.

1. Apache-based web server, called adelaide, to host a simple company website. The website is developed using HTML, CSS, Javascript and PHP by one full-time employee, with assistance by one contractor.

2. Secure shell server, called sydney, to allow employees and contractors to login and compile code. All people involved in the company should have accounts, and be able to access the SSH server from both internal network and from external (public) networks.

3. Git server, called gladstone, to store all code and documents. Everyone is experienced in using git on the command line on their own computers (they don't use the web interface), however in the past they used GitHub as the server. Now they will use this internal server, instead of GitHub. The access requirements are the same as for the SSH server.

4. Backup server, called bundaberg, to store a backup of the web, SSH and Git servers. The backup requirements are described in detail below.

5. DHCP server, called darwin, to provide dynamic IP addresses to workstations and laptops, and fixed IP addresses to other servers (based on MAC addresses). Only necessary full-time staff have access.

Each of the above will run on separate hardware within the internal network. That is, there are five computers, one for each of the above server applications.

Network
The company has an NBN business connection coming into the building. A single internal network is needed, using DHCP to configure all networked devices. The internal network is to be connected to the Internet via a single router, called rocky. This router is the gateway, performing NAT and acting as a firewall.

Backup
The current plan is to have automated back ups of important content and configurations of adelaide, sydney and gladstone to the backup server, bundaberg. The back up must be implemented as a set of scripts, and each backup of a server must generate a text file listing all files that were backed up, with details including timestamp and ownership details. This output text file should be stored within or with the back up file.

Additional backup of bundaberg to external storage (e.g. tape drive, external disk) is planned, but not needed in this initial project setup.

Security

The firewall, using iptables, must implement appropriate network access control.

All accounts with passwords must be configured in a secure manner, including with password ageing.
Servers should be hardened.

The SSH server should implement an auditing mechanism, that at minimum provides a regular summary of unsuccessful login attempts in a user friendly format. Optionally, unsuccessful attempts may trigger blocking or banning of IP addresses or accounts.

HTTPS and certificates must be supported on the web server.
The major section headings below (A, B, C, D) are mapped to the project marksheet for easier reference.
A. Task Description
In this project you need to consider the above scenario and:

1. Design the internal network (including router) for the entire company.

2. Implement the server portion of the network (i.e. adelaide, sydney, gladstone, bundaberg, darwin and rocky) within a virtual network.

3. Test the network, demonstrating that the implementation meets the key requirements.

4. Document the design, implementation and testing, submitting a report named cqunix-sysadmin-<student ID>.docx. Put your actual student ID in place of <student ID>.

Attachment:- Project Requirements.rar

Reference no: EM132317872

Questions Cloud

Supply of healthcare different than other economic goods : Why is the demand for healthcare different than other economic goods? Why is the supply of healthcare different than other economic goods?
Maximum price dylan is willing to pay for peanuts : Dylan offers his personal preference as a suggestion, so what is the maximum price Dylan is willing to pay for peanuts?
Define consumer surplus and producer surplus : 1. Define consumer surplus and producer surplus. What purposes do they serve?
When talking about macroeconomics : When talking about macroeconomics, are we in a boom phase, recovery, or recessionary phases? Explain why?
System and network administration project : System and Network Administration Project - You are the sysadmin for a software development startup company, called cqunix, that is moving into a new building
Discuss the importance of stakeholder engagement : Discuss the importance of stakeholder engagement in policy making. The author presented several benefits and an analysis of five cases in which stakeholder.
How does an argument paper differ from a personal essay : It is important to think about writing as a process. In Week 1, you begin the process of creating the argument paper that you will submit in Week 5.
What impact the law has on employees and employers currently : Research the law and discuss its history and what impact the law has on employees and employers currently and in the future.
Discuss greatest physical threat to information systems : What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide.

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss the role icmp plays the ip protocol architecture

Discuss the role ICMP plays in extending the IP protocol architecture -  what is the purpose of including the IP header and first 8 bytes of datagram data?

  Why is CSMA preferred over CSMA-CD in the given systems

Besides the CSMA/CD protocol, there is a CSMA protocol. In what kind of systems is the CSMA protocol used? Why is CSMA preferred over CSMA/CD in these systems?

  What is the purpose of arp protocol

Describe the method by which you obtained ARP packets - What is the purpose of ARP protocol? Explain with the help of a diagram.

  Analyse and compare various server management systems

MN506 System Management Assignment - Server Availability Monitoring and Metrics, Melbourne Institute of Technology, Australia

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Why are the core and communication fundamentals important

Do not use technical term or complicate sentences. Make it simple and easy so that people have no prior to wireless security can understand.

  Find out why ip addresses cannot replace cookies

Find out why IP addresses cannot replace cookies. Find out about Web mirroring, in which caching is done at the server site instead of the client site.

  Current or future security issues in iot

MN502 - Overview of Network Security - Identify and report network threats, select and implement appropriate countermeasures for network security

  Discuss issues of setting permission and polices on a server

List two purposes of clicking "My Network Places" on a Windows-based PC.

  Discuss advantages and disadvantages of pricing differences

Discuss the advantages and disadvantages of each type, the pricing differences, and where you recommend each type be used and why. Explain your reasoning.

  Analyze the network protocols and security mechanisms

Analyze the network protocols and security mechanisms in wireless networks

  When should distance-vector routing be used and how do

question 1 when should distance-vector routing be used and how do distance-vector routing protocols work? can you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd