Your action plan will specify how the servers should be configured
Ask Expert

Be Prepared For The Toughest Questions

Practice Problems

Your action plan will specify how the servers should be configured

The Case Study

Company Name: Anzac Airport

Anzac Airport is a small private airport which provides passenger and freight services for local clients and businesses. Anzac Airport must be compliant with all commonwealth and state laws and regulations regarding airport facilities and operations. The organizational structure of Anzac Airport consists of three departments which support five areas of operational activity: Administration, Information and Technology, Security, Finance, and Airport Operations.

The Information Technology team is under the Information and Technology department. They currently spend 80% to 90% of their time dealing with a constant stream of desktop support issues.

20XX IT Budget

Staff salaries and professional development $230,000

Hardware purchases $140,000

Software Purchases $140,000

There is some flexibility in this budget but the overall budget of $510,000 for the year must be met.

Responsibilities of the Information Technology department

• Internet access

• Wi-Fi

• Voice over IP

• Local Area Networks

• Desktop computers in administration offices

• Video conference facilities

• Corporate information systems: Payroll, Email, Personnel, Records management

• Security – physical and systems

Current Configuration:

• There are no servers, only peer-to-peer networks

• Wired LAN is 10/100 Ethernet with an ad-hoc topology

• The storage of files on staff computers is unstable and unreliable

• The desktop computers in the admin areas have several different operating systems installed

• The company pays an Internet service provider to host web services

• Staff members use email rarely; all mailboxes are at internet sites such as Gmail

• The internet works for admin staff only. Wi-Fi is used by IT staff only

• One member of the IT team has been experimenting with VOIP but no implementation yet

Business Needs:

• The CEO is concerned that the old technology is costing them money and has decided that it is time to upgrade

• The IT Manager has stated that the company wants to introduce a Microsoft LAN for administration staff and customers

• Full wireless integration

• On-site web and email services

• Web services and network administration to run on a Intel/Linux server

• Directory services and email to run on an Intel/Microsoft server

• An additional $20,000 has been allocated for network improvements

• The IT team has been asked to devise a strategic plan for growth of the IT infrastructure

• The new IT infrastructure must be based on clearly defined business requirements

Technical Requirements:

• The clients are currently using a peer-to-peer network design which needs to be replaced by an up-todate Ethernet client/server network

• Many staff members complain that the peer-to-peer network is too slow, the network needs to be more reliable

• The CEO has stated that she wants ‘State-of-the-art’ technology on every desk

• The company has purchased a new software package for running accounts receivable and accounts payable which needs to be made available to members of the Administration and Finance departments

• Error messages on desktop workstations suggest that memory and disk upgrades are needed

• All Microsoft operating systems on both servers and workstations need to be upgraded to current versions

• The proposed server & network must be agile and redundant (easily recoverable – think server clustering)

• Linux servers are to be introduced into the network and fully integrated so that Microsoft and Linux systems can share disk resources

• Single-sign on authentication must be configured so that anyone logging on to the network will be able to access both Microsoft and Linux resources.

Company Policies:

1. Anzac Airport’s commitment to professionalism, ethical practices, equity and social accountability implies a duty of care in relation to the use of information resources. Finite resources are applied to information facilities, and their use for business purposes must not be diminished by use for other purposes. Anzac Airport also values its reputation, including that which is conveyed on information networks. Therefore we are committed to procedures which:

a. monitor the quality of information on computer networks

b. make users aware of company policy on the use of information resources

c. lead to action arising from such monitoring through as appropriate. Misuse is dealt with through performance management and/or staff misconduct processes, depending on the nature of the breach in question.

d. routinely logs network activity and may use this information to investigate faults, security breaches and unlawful activity

2. Members of the Information Technology team are responsible for:

a. data quality - accuracy, integrity, cleanliness, correctness, completeness, consistency and timeliness;

b. data security - control of access to data sets to known individuals, and monitoring of the data's subsequent exposure as it flows through corporate systems and records;

c. data standards - ensuring compliance with relevant laws, government and regulatory standards and any policies and standards imposed internally;

d. data management - definition of the authoritative source of data and of the data to be provided from that source, and ensuring that duplication of data is kept to a minimum.

3. Members of the Information Technology team are to monitor and evaluate business processes to ensure that these are consistent with best practice principles for data management, and are responsible for approval of the 'rules' which are used to determine user access to information resources and services (though this approval can be delegated to another officer in the business area).

4. The company will endeavour to align IT operations with specific business goals and objectives, company vision, and long term strategies.

5. The company will apply standards in their use of technology to assure ease of support and the effective application of hardware and software to core systems.

6. The procurement of technology will be based on a comprehensive assessment of vendor offerings. All purchases in excess of $2000 must have at least 3 separate vendor quotes.

Assessment 1 task 4 - Configuration of server applications and processes

In preparation for task 4 you will need to:

• Review design action plan from task 2 for creating servers in a virtual environment

• Your action plan will specify how the servers should be configured

For task 4 you are required to complete the following activities:

Configure the following services according to your action plan. :

1.Network services

a. DHCP

b. DNS

c. Active Directory – including users, OUs, show using edited group policies (password and login as a minimum)

d. AD Certificate Services

e. Update services -configure for auto update / WSUS

f. Backup services

g. NTP server

h. Implement Kerberos or NTLM for your cross platform authentication.

2.File services

a. File sharing

b. File and folder protection

c. Including restoring backed up data

3.Applications

a. Demonstrate using the server help facilities.

b. Print management

c. Email server (third party email server)

d. Web server

e. FTP

4.Security

a. Authentication – evidence of the use of AD (groups and OUs) and may include the use of biometric authentication (as per your notes in section 2.3). You will also need to demonstrate single sign on the Linux server

b. file permissions – demonstrate having set share and security permissions including access to a share on the Linux server that is part of the single sign on.

c. firewall - including proxy server, VPN access, IDS/IPS implementations

d. VPN Access – once your host sever is active you should be able to access it from your desktop

To successfully submit your work, you must copy your document with the screenshots and comments of your various servers into your Connect drobox. The completed work must be observed by your teacher or tutor to show that the following requirements have been met:

a.Configure DHCP services to deploy IP address is the extended network

b.Configure DNS services to resolve IP addresses in the extended network

c. Configure directory services to manage network resources and authentication across the extended network

d.Configure file services to provide access and security across the extended network

e.Configure email and web services for access from multi-platform devices

f. Activate and configure authentication, file permissions and firewall protection across the extended network

g.Detail how you implemented Kerberos or NTLM for your cross platform authentication.

h.Configure single sign-on authentication across the extended network

i. Completed installation checklist

Hint
ManagementDynamic Host Configuration Protocol refers to a network controller that is used on internet protocol networks. The DHCP assigns an IP address and different network configuration elements to every device on the network, to enable transmission of information with other IP networks....

Know the process

Students succeed in their courses by connecting and communicating with
an expert until they receive help on their questions

1
img

Submit Question

Post project within your desired price and deadline.

2
img

Tutor Is Assigned

A quality expert with the ability to solve your project will be assigned.

3
img

Receive Help

Check order history for updates. An email as a notification will be sent.

img
Unable to find what you’re looking for?

Consult our trusted tutors.

Developed by Versioning Solutions.