ssignment DescriptionForm a group of a maximum of FIVE students and inform your lab tutor of the names and student IDs of yourgroup members. Assume that your group is hired by a client company to...

1 answer below »
ssignment DescriptionForm a group of a maximum of FIVE students and inform your lab tutor of the names and student IDs of yourgroup members. Assume that your group is hired by a client company to develop a networked system for theirrequired services as described in the scenario.Your task in this assignment is to analyse client requirements, design solutions, implement, configure, andtroubleshoot implemented solutions, and finally to prepare a system documentation report meeting the clientrequirements and following a standard industry template. Detailed requirements are provided below:1. Based on the scenario given below, (i) analyse client requirements, (ii) identify and propose the requiredservers and server roles (services), and (iii) provide required configurations for the scenario.2. Perform the configurations using either virtually or physically installed server OS to realise the scenario.Students can use Windows Server 2016 or a higher version, or Linux server if appropriate. Yoursubmission should include screenshots of each important step.3. Prepare a detailed system documentation report. This report will serve as an important part of backupand disaster recovery documentation. As such, you must consider human usability factors and includethe configurations using description of each important step, and screenshots corresponding to those ina way that will be useful to the target users of the document. Essential sections of the documentationare provided in the marking guide, however, you can include additional sections if deemed useful. Youshould explain how documentation of network changes should be handled and how documentation canaid the troubleshooting process by keeping a record of common issues.This documentation report (one report per group) is to be submitted on Moodle in Week-11.4. Use your configured system to demonstrate individually the implemented scenario during your week-11or latest by 12 lab. Individual understanding will be tested during your demonstration.ScenarioRentals dot com is a renowned business offering home appliances to households for longterm renting at adiscounted price. Rentals dot com requires the setting up of a LAN for their office located in North Sydney.They have four departments: Inventory, Marketing, Sales, and Accounting. All objects (e.g., users, computers,etc.) belonging to these departments need to be created within their respective Organisational Unit (OU) fortheir own department. Rentals dot com requires the following LAN services:Workstations, Laptops and ServersMost of the employees at Rentals dot com work in a distributed mode, working on their own computers andsharing resources direct with colleagues, however there are several centralised services required. Specifically,they have identified the need for the following:1) Centralised user authentication2) Print server for users3) DHCP server, called dhcpRentals, to provide dynamic IP addresses to workstations and laptops, and fixed IPaddresses to other servers (based on MAC addresses).4) All computers should acquire the IP addresses automatically from the DHCP server dhcpRentals.5) Hosting of their own website i.e. Rentals.com using their own web server. The group must create asimple webpage (using html header tag only) to display the company’s name, and student IDnumbers of the group members; this page needs to be stored on and displayed from the createdweb server.6) The company wants to store all the files on a separate file server and only users with appropriateaccess will be able to access them (not every user should have access to the files). You can assumewhich users/groups will have access to these files, and state your assumptions clearly.7) Table of servers, with MAC addresses, allocated IP addresses, client IP address ranges.8) Installation and configuration details of all the servers.9) Details of a password policy and its implementation. The policy should be appropriate to theorganisation, and detail exactly how it is implemented in the system.10) Suppose if Rentals dot com were to open another branch in East Sydney (a) explain with the help of aactive directories tree diagram how would you integrate it with the company Headquarters in NorthSydney. (b) Would you use a two way trust or a one way trust with the Headquarters. Justify youranswer. (c) Give an example of scenario when you would form a forest for Rentals dot com.
Answered Same DayJun 02, 2021

Answer To: ssignment DescriptionForm a group of a maximum of FIVE students and inform your lab tutor of the...

Amit answered on Jun 03 2021
147 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 6/3/2021
Table of Contents
Executive summary    3
1.    Introduction    4
2.    Requirement analysis for Rentals.com Company    4
3.    Roles of different implemented servers for Rentals.com Company    5
4.    Virtual network configuration for all implemented servers and other devices    7
5.    Web hosting for Rentals.com Company    12
6.    Password policy for Rentals.com Company    15
7.    Branch opening related activities and summary of configuration    16
8.    Conclusion    16
9.    References:    17
Executive summary
The renting of home appliances becomes most common in modern time and many online platforms like Rental.com are providing their services in same area. The implementation of online rental platform requires implementation of a well defined network infrastructure so that their operational requirements can be justified. These online platforms makes requirements of different servers so that their database and infrastructure requirements can be justified. This Rental.com is making looking for a LAN based solution so that all of its four departments like Accounting, sales, marketing and inventory can manage their operations. Maintaining the operations of online platform like rental.com requires effective authentication and centralized authentication is preferred by this company. By making implementation of centralized authentication, the effective authentication can be maintained on the print server, DHCP server, web server, file server and IP implementation. All the possible unauthorized accesses to the online platform of rental.com can easily be managed and mitigated with the centralized authentication. The physical implementation is always based on the developed logical implementation, thus, in this presented report, the logical implementation of required network will be presented in front of rental.com officials so that all possible issues can be identified in advance and their mitigation plan can be developed.
1. Introduction
Most of the business organizations like rental.com are maintaining high values and market presence to their customers in modern time. Most of the users wants to rent the home appliances in place of purchasing them. The renting provides an easy solution to the users. The idea of rental.com is great but actual implementation of this idea requires a LAN implementation for this company. The implemented LAN will provide an effective networking solution to the Rental.com company. All the required servers can easily be managed through the proposed LAN and all departments of this company can use these servers based on the proposed authentication. For maintaining the authentication on the LAN services of Rental.com, a well defined password policy will be implemented. By making implementation of password policy, the central authentication can be maintained for this company. The DHCP implementation is carried out to fulfill the IP requirements of this Rental.com Company. The minimum wastage of IP can be possible because of DHCP implementation. The servers of this rental.com company will maintain static addresses. The network connections with branch office of North Sydney can also be managed through the implemented password policy and central authentication. Maintaining two way trust will provide high security, so, encryption implementation with public and private keys will also be recommended to this rental.com company.
2. Requirement analysis for Rentals.com Company
Making the effective implementation of any required network makes it essential that the requirements of the client organization are identified properly. Thus, the requirement analysis is conducted for the provided case of Rentals.com Company and following important LAN requirements are identified:
· The Rentals.com is maintaining implementation of one LAN and in future a new branch will also make connection to it. Thus, central authentication which will be managed by the headquarter of this company is required.
· The implementation of print server is required of all the authorized users so that the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here