Assignment 2 Task 1 – Help Document.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Week #3: Configuring and Troubleshooting DHCP
Overview Managing a DHCP Database Monitoring DHCP
Chapter 3: Authentication, Authorization, and Accounting
Module 4: Configuring and Troubleshooting DHCP
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Introduction to Active Directory
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Windows Vista Configuration MCTS : Advanced Networking.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
Dynamic Host Configuration Protocol
Unit 27: Network Operating Systems
Basharat Institute of Higher Education
Configuring DHCP Relay Configuration Example
Instructor Materials Chapter 1: LAN Design
Lab A: Planning an Installation
Troubleshooting a Network
Working at a Small-to-Medium Business or ISP – Chapter 8
CIS 332 Course Experience Tradition / snaptutorial.com
Configuring and Troubleshooting DHCP
Instructor Materials Chapter 9: Testing and Troubleshooting
Introduction to Operating Systems
Planning and Troubleshooting Routing and Switching
Configuring and Troubleshooting Routing and Remote Access
CIS 332 Course Experience Tradition / snaptutorial.com
Lecture 6: TCP/IP Networking By: Adal Alashban
Welcome To : Group 1 VC Presentation
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
IS4550 Security Policies and Implementation
Unit 27: Network Operating Systems
DHCP, DNS, Client Connection, Assignment 1 1.3
Design Unit 26 Design a small or home office network
Server-to-Client Remote Access and DirectAccess
Design Unit 26 Design a small or home office network
Design Unit 26 Design a small or home office network
IS4680 Security Auditing for Compliance
Contact Center Security Strategies
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
AbbottLink™ - IP Address Overview
Chapter 10: Advanced Cisco Adaptive Security Appliance
PLANNING A SECURE BASELINE INSTALLATION
Tonight – Finishing off workshop
Presentation transcript:

Assignment 2 Task 1 – Help Document

LO3: Design efficient networked systems Bandwidth: Expected average load; anticipated peak load; local internet availability; cost constraints, throughput. Users: Quality expectations, concept of system growth. Networking services and applications: DHCP; static vs dynamic IP addressing, reservations, scopes, leases, options (DNS servers, Suffixes), IP helper, DHCP relay, DNS records, Dynamic DNS. Communications: Suited to devices, suited to users, supportive of lifestyle desires, supportive of commercial requirements, security requirements, quality of service needs. Scalable: Able to support device growth, able to support addition of communication devices, able to cope with bandwidth use and trend changes, protocol utilisation, addressing. Selection of components: Supporting infrastructure needs; supporting connectivity requirements.

1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint of your LAN. Installation/Selection of components: Read through the scenario carefully identifying current hardware available to you. Consider if the hardware specified is suitable for use in this new network If upgrading or suggesting new hardware remember it is a small business (consider value and need) and you must justify your selection. Outline and select all hardware, software (Could also include cabling) for the network. Reflect back to assignment 1. Topology, infrastructure? Storage requirements? Which NOS will you use? Include minimum specs of software needed and extra costs involved. Hardware specs and recommendations for upgrades including costs. Include existing hardware and software here along with items to be bought.

Addressing: method eg allocation of addresses for NOS services IP Address list for each hardware. Use of DHCP? Static vs dynamic IP addressing, reservations, scopes, leases Private Netwrok IP address table could be created as below: Device Name I.P address Server E.g 192.168.1.2 Router Eg. 192.168.1.1  DNS Server Client 1 Client 2 Client 3 DHCP Scope for wireless devices Lease length for DHCP scope Reserved IP addresses E.g 192.168.1.255 (Broadcast address) Remember 255 in a IP4 address is always reserved for a broadcast address. This IP address is use to communicate to all devices on the network

Your blueprint should include IP address’s underneath for all devices. Create a Network Layout/blueprint diagram – See end of document for example – MS Visio/www.draw.io/Cisco Packet Tracer could be used

Domain name and local server name. Naming system Domain name and local server name. User name and passwords for users. Make the names up of any you don’t know or just call them user 1, user 2 etc. Use a table. E.g: Network Operating System/ Server services What services need to be configured - DNS, DHCP, Active Directory, Printer services etc. Why? Name Password Sarah Johnson Timothy Smith John Snow

Consider internet speed (fine as it is or needs an upgrade?) Bandwidth Consider local bandwidth (Switch/cabling/router) (fine as it is or needs an upgrade?) Consider internet speed (fine as it is or needs an upgrade?) Cost constraints (If upgrading how much would this cost. Is it worth the cost?) Expected average load; anticipated peak load. Research and estimate bandwidth usage for local and internet needs. We can analyse current bandwidth required using Wireshark: https://www.wireshark.org/ - Good article on using Wireshark When it comes to testing the bandwidth of the network we can use LAN Speed Test software(https://totusoft.com/lanspeed) on the network. Good article on working out bandwidth: https://searchnetworking.techtarget.com/tip/How-to-calculate-network-bandwidth-requirements Formula for identifying bandwidth requirements: N x T = BN Numbers of users (x) Traffic estimate based on usage weight = Bandwidth Needed Using wiresharrk article: http://blog.davidvassallo.me/2010/03/22/measuring-bandwidth-using-wireshark/

Security Policy eg patch management, anti-viral management, access requirement/rights, administrative rights, authentication, password policy Explain your intruder detection system e.g firewall with filers and rules, email monitoring, application and packet monitoring Physical security(Server room access) Explain the router setup(Firewall, encrypted WI- FI) Anti-Virus Security Policies & Procedures to consider Password (timeout, requirements, history) Security (Group policy, CCTV, guards, check points) Vetting (DBS, CRB, references) Physical protection (Doors & locks) Encryption (Bitlocker etc) Timeout (Session, PC, User account) User roles (Admin, non-admin, restricted admin, guest) Backup & Data evacuation Data protection act, GDPR Two factor Authentication (Software, hardware, physical)

2. Justify your choice of devices for your network design. Justify the components you have selected to support the required infrastructure either in its own section or as you list each item. You could consider: Scalability: Able to support device growth, able to support addition of communication devices, able to cope with bandwidth use and trend changes, protocol utilisation, addressing. Selection of components: Supporting infrastructure needs; supporting connectivity requirements.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per user specifications. You could use this test plan to test the design through Cisco: Design testing software by Cisco:  Packet Tracer  (Enroll, download software and follow tutorials to get started) Create a test plan. It should define the objective of testing and should include the following types of testing:   Hardware compatibility testing. Operating system compatibility testing Application compatibility testing. Security testing. Hardware and software assessment. Performance baseline determination.

You should also document all installation, configuration and administrative processes which you are going to utilize. Use a table like below. Include everything you have installed or configured on Windows Server. Include tests at the client end to check services and features have been set up correctly. Check that hardware can communicate with each other. Check bandwidth and transfer speed (Use LAN Speed Test software). Test whether and how the new network design works with the existing network infrastructure. Screenshot’s ideally should be used as evidence. Screenshot any issues and how you fixed them. Have tests that conduct verification with Ping, extended ping, trace route, telnet, etc. Test Expected Result Actual Result Problems Installation of Windows 2012 Successful installation of NOS Successful but had issues creating a new partition. List issues and how you overcame them. Domain created/set up Successful domain creation of ABCMarketing.net domain   PC 1. IP Address 192.168.1.10. Ping router, server, printer and other machines/hardware

The following commands in the CMD Line can be used when testing the network: Use “ping” to test network connections between current used device and other devices.   Use “extended ping” command is used, the source IP address can be changed to any IP address on the router. Use “trace route” to determine the route packets take on the network. Example: tracert 192.168.0.10   Use “telnet” to determine open ports on the network. For example, to verify connection to 192.168.0.10 on port 25, issue the command: telnet 192.168.0.10 25

4. Justify the security requirements and quality of services needed for selection of accessories. Consider: Users/scenario: Quality expectations, concept of system growth. Communications: Suited to devices, suited to users, supportive of lifestyle desires, supportive of commercial requirements, security requirements, quality of service needs. Scalable: Able to support device growth, able to support addition of communication devices, able to cope with bandwidth use and trend changes, protocol utilisation, addressing.

Quality of service considerations: System Quality  Description  Performance  The measurement of response time and throughput with respect to user load conditions.  Availability  A measure of how often a system’s resources and services are accessible to end users, often expressed as the uptime of a system. Scalability  The ability to add capacity (and users) to a deployed system over time. Scalability typically involves adding resources to the system but should not require changes to the deployment architecture.  Security  A complex combination of factors that describe the integrity of a system and its users. Security includes authentication and authorization of users, security of data, and secure access to a deployed system.  Latent capacity  The ability of a system to handle unusual peak loads without additional resources. Latent capacity is a factor in availability, performance, and scalability qualities.  Serviceability  The ease by which a deployed system can be maintained, including monitoring the system, repairing problems that arise, and upgrading hardware and software components.  Further reading: https://docs.oracle.com/cd/E19636-01/819-2326/gaxqg/index.html (Oracle, 2019)

5. Suggest a maintenance schedule to support the networked system. Maintenance schedule/Disaster recovery Disaster recovery setup - Devise a regular backup plan/methodology Consider differential, incremental and/or full backup options. What days and times will updates take place. Where will this data be stored? How? Backup-power supply? Off site management? How will you ensure high availability and fault tolerance? Backup Software? (e.g Windows Server Backup, Acronis. Which and why.)