Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

As part of the formal assessment for the HNC/D programme you are required to submit an assignment for each module. Full details of the programme assessment scheme and general information on preparing and submitting assignments are given below.

After completing the module you should be able to:

1. Understand the principles of network infrastructure management.

2. Design complex network infrastructure systems

3. Implement complex network infrastructure systems

4. Test complex network infrastructure systems.\\

Scenario

Edinburgh Zoo is a major tourist attraction based in the capital city of Scotland and run by The Royal Zoological Society of Scotland. As well as allowing visitors to see a wide range of animals (including endangered species such as Giant Pandas), the zoo works with many partners around the world in conservation, research and breeding programmes. The zoo is located on the western side of the city. Further details can be found at http://www.edinburghzoo.org.uk/.

This assignment is about the infrastructure needed to run the zoo business. The entire network is built on Microsoft?s Windows servers running Active Directory. All employees have AD user names and passwords which give access to the required services at the zoo.

Note: Edinburgh Zoo is a real establishment and is run by the Royal Zoological Society of Scotland. However, the remainder of the material in this assignment is fictitious, being designed to provide a suitable scenario for the tasks. Do not contact the Royal Zoological Society of Scotland or the zoo about this assignment as they will not know what you are talking about!

Assignment Task

Task 1 -Guideline length 500 words

As a visitor to the zoo, I wish to use their web site to find information about how to get there. To do this, I type in the URL: http://www.edinburghzoo.org.uk/visiting/getting-here/.

Assuming the YOU are doing this from you own computer where you normally do your RDI studies, provide a detailed description of how the zoo?s Domain Name Service (DNS) name (www.edinburghzoo.org.uk) is resolved into an IP address so that the request can be sent to the server. You should include a description of how the DNS lookup works, using this particular case as an ex. Your answer must be detailed and specific, mentioning as appropriate: the zoo, its DNS server, its web site and your own Internet Service Provider?s DNS service as well as any other DNS servers used. Assume that the zoo runs its own DNS server. Also include the full result of doing a DNS lookup on this particular address together with an explanation of all the items in this result. Note that there are many DNS lookup tools available either to use directly from web pages or to download and use locally.

Briefly describe the purpose of the following components in the organisations network:

§  Primary Domain Controller (PDC)

§  Router

§  Wireless access point

 

Outline how the organisation would use a firewall to protect its network. 

Task 2 -Guideline length diagrams (notional 600 words) plus 600 words 

The zoo business has a number of departments including Guest Services (running catering, cleaning etc.), Corporate Events (running evening visits for private groups such as company parties etc.) and various animal departments such as Mammals. Although there are other departments, you only need to consider these three for the assignment.

Each department has a head of department in charge with a number of staff working under them.

For each of the following, you must provide the actual design or structure asked for as a diagram, together with an explanation of your structure describeing how it fulfils the requirements given. You may make reasonable assumptions to cover the lack of detail in the scenario but these must be clearly stated and justified.

For the organisational structure given, draw an organisation diagram to be used in developing the required directory structure and using your organisation structure, devise a directory structure using Microsoft Active Directory as the target.

Within your directory structure, identify the groups that can be used to allocate access rights to zoo staff.

For this Active Directory structure, devise a file storage (i.e. folder) structure that will allow appropriate people to access appropriate files and for this to be controlled using the access rights and groups.

 

Task 3 -Guideline length 500 words

Outline how you would implement the Active Directory (AD) structure devised in task 2. You should provide the implementation information, explanations and justifications to show how your solution fulfils the requirements of the zoo. You should cover the following:

a) Identify appropriate objects including users, end user computers, printers and servers for one department in the structure. As mentioned in task 2, each department has a head of department in charge with a number of staff working under them.

b) For each of these objects identify the AD attributes of that object in detail, matching against the standard schema for that type of object. Provide an ex set of data that can be used to populate each object. (You can make up appropriate names and other details for each object.)

c) Briefly describe how you would implement the domain controller system, including how many DCs you would have, how they would be related to each other and physically where you would site them.

This task 3 covers the single assessment criterion in this section, 3.1.

 

Task 4 -Guideline length 800 words

Your newly designed and implemented system must be tested before it becomes the production system at the zoo. This is a "mission critical" system whose operation directly impacts the day to day business of the zoo.

Produce a detailed test plan that will demonstrate that a head of department has access to all the required facilities within the system. Include the tasks to be done during the tests and (made up) appropriate test results together with comments and appropriate actions. A new system never works correctly and completely first time so some of the tests should fail, with appropriate problems and suggested fixes included. This should be in the form of test documentation covering the tests to be done, reason for the test, exact input used, expected results, actual results and any remedial action required.

This should test:

a) logging in

b) access to the head of department?s private files (i.e. only available to this person).

c) access to the department?s records, which should be available to all staff in the department.

d) access to appropriate network resources such as printing.

 

The tests you discuss cover assessment criterion 4.1.

The documentation of the testing covers assessment criterion 4.2.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M913787
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question? 


Related Questions in Computer Engineering

1 what kind of legislation can be effective to prevent

1. What kind of legislation can be effective to prevent hacking? 2. List and discuss the types of hacker crimes. 3. Discuss the major sources of computer crimes. 4. Why is crime reporting so low in major industries? 5. I ...

Construct a 3-bit counter using three d flip-flops and a

Construct a 3-bit counter using three D flip-flops and a selection of gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc. The output ...

Do you feel that social media should be used as a basis for

Do you feel that Social Media should be used as a basis for hiring or firing an employee (why or why not)? Answer in about two paragraphs with reference. Must be 100-200 words and show an understanding and full developme ...

How do i use ratio data to reconstruct an income statement

How do I use ratio data to reconstruct an income statement? Managerial Accounting, Horngren's 11th edition. Do we have access to a solutions manual?

The section on public key cryptosystems discussed

The section on public key cryptosystems discussed nonrepudiation of origin in the context of public key cryptosystems. Consider a secret key system (in which a shared key is used). Bob has a message that he claims came f ...

1 some have sounded an apocalyptic voice as far as finding

1. Some have sounded an apocalyptic voice as far as finding solutions to system vulnerabilities. Should we take them seriously? Support your response. 2. What is innovative misuse? What role does it play in the search fo ...

1 what is a vulnerability scanner how is it used to improve

1. What is a vulnerability scanner? How is it used to improve security? 2. What is the difference between active and passive vulnerability scanners? 3. What kind of data and information can be found using a packet sniffe ...

1 what is a discontiguous subnet why do some enterprise

1. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don't classful routing protocols support discontiguous subnets? 2. Discuss the configuration of IP addresses. When manual ...

1 implement a new version of the gameoflifepy program to

1. Implement a new version of the gameoflife.py program to use your SparseLifeGrid class from the previous question. 2. Repeat Exercise 2.5 from Chapter 2 but use your new version of the gameoflife.py program from the pr ...

The system administrators on the development network

The system administrators on the development network believe that any password can be guessed in 180 days of continuous trial and error. They set the lifetime of each password at a maximum of 90 days. After 90 days, a pa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro