Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment Description

Choose one (1) scenario from the list given below, and carry out the following tasks:

1. Find your group mates who have selected the same scenario. Each group should not be more than three members, two are acceptable.

2. Identify required configurations for your chosen scenario, and perform the configurations using either virtually or physically installed OS to realise the scenario. Students can use Windows Server 2008 or any other higher version.

3. Prepare a detailed system documentation report (individually written, but screenshots can be same within the group) of the configurations using description of each step, and screenshots of your configurations. This report will serve as an important part of backup and disaster recovery documentation for the organisation given in your chosen scenario, and can be used for training new IT staff in the organisation.

4. This is due on Week-11 on moodle.

5. Use your configured system to demonstrate in group the implemented scenario during your week-12 lab. Individual understanding will be tested during the demo.

This report should contain the following:

1. Clear identification of what technology/features will need to be configured in order torealise your chosen scenario.

2. The important steps of how the scenario was implemented/configured with each technology/features that you have identified, along with labelled screenshots.

3. Students must configure the domain using either his/her own name, or a group member's name.

4. Students must create a simple webpage (using header tag only) to display the student ID numbers of the group members, which shall be stored on and displayed from the created IIS (web server).

Scenarios (Choose one only):

Scenario 1: Local Area Network (LAN) to support Windows Server and Client Environment

TridentS is a software development company requiring the setting up of a LAN for their office located in Sydney. They have four departments: Developers, Marketing, Operations, and Finance. All objects (e.g., users, computers, etc.) belonging to these departments need to be created within their respective OU for their own department. TridentS requires the following technologies to be implemented within their LAN: 1)Centralised user authentication
2) Print server for users
3) All computers should acquire the IP addresses from a DHCP Server
4) TridentS needs to host a website, thus a separate IIS server is required
5) The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files, and state your assumption clearly.

Scenario 2: Increasing LAN efficiency using a Backup Domain Controller (BDC)

In order to increase the efficiency of its organisational LAN, SuperAd- a company in the advertising business, requires you to add a backup domain controller (RODC/BDC) in addition to a domain controller, so that it can provide all the services in case of a failure of the primary domain controller (RWDC/PDC). In order to implement this, there should be auto synchronisation between the primary domain controller and the backup domain controller. SuperAd requires the following technologies to be implemented within their LAN:

1. Centralised user authentication
2. All computers should acquire an IP addresses from a DHCP Server
3. The Company should host a website, so a separate IIS server is also required
4. A backup domain server, capable of displaying the changes made in the primary domain controller.

Scenario 3: Local Area Network (LAN) to support Windows Sever and Linux Client Environment

With the growing base of users of Linux, EduTech, a company planning to create Windows server based LAN decided to also support the Linux clients to authenticate using the Active Directory. The company has three different departments named Operations, Finance and Marketing. All objects (e.g., users, computers, etc.) belong to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN:
1. Centralised user authentication support for Linux clients
2. All computers should acquire IP addresses from a DHCP Server
3. The Company should host a website, so a separate IIS server is also required
4. Hyper-V

Scenario 4: Setting up technology/features for Linux Server and Windows Client Environment

A Melbourne based company is looking at setting up a LAN for their office. They have three different departments named Production, Finance, and Marketing. All objects (e.g., users, computers, etc.) belonging to these departments should have their own different OU.

The users require the following technologies to be implemented within their LAN:

1. The client wants to use the Linux operating system as a server side operating system with the LDAP/SAMBA service to communication between windows client machines and a Linux server

2. Centralised user authentication for Windows clients

3. The company wants to store all the files on a separate file server and only users with appropriate access will be able to access them (not every user should have access to the files). You can assume which users/groups will have access to these files, and state your assumption clearly.

Scenario 5: Local Area Network (LAN) to support Windows Server with multiple domains

A company needs to setup a LAN for the main office which is located in Perth. They have three different departments named Operations, Management and Marketing. All objects (e.g., users, computers, etc.) belonging to those departments should have their own OU. The Clients require the following technologies to be implemented within their LAN:

1. There will be two different domains. One is allocated for the administrator and the other is allocated for everyone else (users).

2. Centralised user authentication for different domains

3. All computers should acquire their IP addresses from a DHCP Server

4. The Company should host a website, so a separate IIS server is also required 4.

5. Your configuration should reflect the above criteria and display different privileges assigned to the different domains users belonging to these domains.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92452369
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

With smaller companies saving thousands and larger

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer seeking to be more lean, it is important to consider whether this migh ...

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As