LAN Implementation for Groovy Movie: System Administration and Management
Verified
Added on  2023/06/11
|15
|1953
|373
AI Summary
This article discusses the LAN implementation for Groovy Movie, a company in the entertainment field. It covers the development of the LAN, requirement planning, authentication techniques, DHCP configuration, IIS server setup, and more. The article also explores functional and non-functional needs, and provides references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
System administration and management
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents 1. Overview......................................................................................................................................3 2. Development of the LAN............................................................................................................3 3. Requirement Planning.................................................................................................................3 4. Authentication techniques...........................................................................................................3 5. DHCP configuration....................................................................................................................4 6. IIS server in LAN........................................................................................................................6 7. ADMINSTRATOR DOMAIN....................................................................................................6 8. Functional Needs.......................................................................................................................10 9. Non-functional requirements.....................................................................................................10 10. Conclusion...............................................................................................................................13 References......................................................................................................................................14 2
1. Overview In Perth there is a company and its name was “Groovy Movie”. They do business in entertainment field. They rents out the CD or DVD that contains the movies or popular TV shows. As like all company they also have various subdivisions. They are Consumer services, Finance, and Inventory. The overall strength of the company was 50 members. The CEO of the company decided to implement the LAN for enriching their potential. Because that improves the effectiveness of communication as well as data sharing among the various departments. For this purpose they need a no of domain systems based on the Windows server-OS. Here we would see about the implementation of LAN. 2. Development of the LAN The LAN that must have the mobility. Because that is the very important requirement of the company. The system must be cost effective. The LAN system that must contains the effective information sharing technologies. The security was also very essential in the required LAN. So the LAN design was created by these considerations [1]. In LAN there are two most common technologies are followed. Each has its own advantages as well as dis advantage. They are Wired LAN and Wireless LAN. Wired LAN was most widely used for so far. Wired LAN system uses the RJ-45 fiber cable for the data sharing purpose. So this kind of network was called as RJ-45 Network system. For our requirement the most suited technology was wired LAN. That would be demonstrated in the clients company. 3. Requirement Planning. The main part of the network design involves the selection of appropriate hardware. Because that verify the success of the plan. For our design need we need to select the best suited hardware. Ethernet adapters was the first and foremost need for the network development. After that we need switches for connecting systems. That acts likes a bridge between the computers. That is responsible for sharing the data between the computers. And also the RJ-45 cables are required for the system development [2] [3]. 4. Authentication techniques Active Directory Domain Services (ADDS) is used for user authentication. One main domain is setup with the help of one Windows server 2016 based domain controller. The main domain (Parent domain name) selected is groovimovies.com. Users are in a child domain called users.groovimovies.om. Child domain is setup with the help of one Windows server 2016 based 3
domain controller. One client machine is setup and client OS is installed. This client machine represents the end users computer [2]. OS structure is used to separate each department users. Three Ous will be setup. i.e : Inventory, Finance and Customer Service. Users of the same department will be added in their respective OUs. Parent-Child trust will be implicitely established. It is a two way transitive trust. 5. DHCP configuration One Windows Server 2016 based server will be selected as a DHCP server. Except main domain controller other servers and end users will get IPs from the DHCP Server. Following configuration can be used Main Domain Controller : 192.168.1.1 / 24 ( Static IP) DNS Server : 192.168.1.2 / 24 (Static IP) DHCP Server : 192.168.1.3 / 24 (Static IP) Scope-1 : 192.168.1.10 / 24 to 192.168.1.100 / 24 Scope-1 IPs will be automaticaly used by child domain controller and all other domain computers. Here the step by step process of DHCP configuration was showed below. The below showed screen shots allow higher understanding of the concepts. Figure1Step1-DHCP Configuration 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure5Step5-DHCP Configuration 6. IIS server in LAN One Windows Server 2016 based server will be selected as a web server and IIS server will be installed. Groovimovies.com domain can be used in the internet. The home directory files for this website will be stored in the webserver. Usually the webservers will be kept in De- Militarized zone. One firewall will be introduced between outside network and inside network. Then web server will be connected in the DMZ zone. All the public facing servers will be in the DMZ zone [4] [5][6]. 7. ADMINSTRATOR DOMAIN Groovimovies.com is the administrative domain. It is the parent domain. That was controlled by the domain controller. Administration domain system was responsible for the overall control of the network systems. That decides the action of the entire network system control. So this is the authority for the client users in the network. They were controlled by the administration system. That is called as admin-territory. That is responsible for the entire control system of the network. That have the capability to control the entire system. In the network head assignment was done by the realm controller. By this system the administrator or the controller of the network can perform the operations like insert, modifications, etc.In the organizer zone that gives the static permissions. Client domains are just follow the instruction given by the administrator. In these system some devices are employed to do this activity. So it carries the power to control the no of systems under its control. That enables the standard structure in the network. 6
Configure of server access points, For establish the network we need to do the below stated steps, and they are listed below. Provide IP for the devices in the network systems Implement the NAT Implement the firewall Here the process of configuring the administrator was showed below. Figure6Virtual Windows server start page Figure7Add roles & features wizard Figure8Installation type selection wizard 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure16Domain service configuration 8. Functional Needs They are necessary needs of the system. That is responsible for the overall function of the system. They have the higher amount of preferences because the actual performance of the system was depends on this needs. For the network design some are the main parameters are discussed below. And they are connecting wires, Computers, and Switches. Among these needs the switch was considered as the main need. Because the entire system needs this think for the successful operation of the system [7]. Switches They are used in the network system to establish the connection among the computers. In the typical LAN system consists hub for the same action. But that has some major drawbacks. So we use the switches. They are the active element of the system. We can’t assume the network system without the switch [8]. 9. Non-functional requirements Nonfunctional needs are also required needs of the network system. They doesn’t participate actively on the system. But it enhances the actual quality of the system. So that are called as quality needs [8] [9] [10]. Developed design of the LAN was showed below, Screenshots 11
Figure19Switch configuration 10. Conclusion The network design was developed to the need of project with the Visio software. In this creation the local area network completed by the usage of software such as netsim and Visio. In the local area network it had two domain such as administrator and another one is for people whohavetheaccess.For thatdomainitneedtheauthentication.Inthatdynamichost configuration protocol is used to design the local area network and it is used to provide IP dynamically and for the host configuration is done by ISS server and from the scenario it has three departments like customer finance and inventory and in that working employees count as 50. And it works as organizational unit. By the way the administrator is used to provide the data about company and it is used for the second domains for the vision. 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
References [1]D. Verma, "Simplifying network administration using policy-based management",IEEE Network, vol. 16, no. 2, pp. 20-26, 2002. [2]V. StoÄŤka, "DEVELOPMENT OF LINUX-BASED NETWORK ADMINISTRATION AND CONTROL SYSTEM",Environment. Technology. Resources. Proceedings of the International Scientific and Practical Conference, vol. 1, p. 284, 2001. [3]K. Athota and A. Negi, "A topology preserving cluster-based channel assignment for wireless mesh networks",International Journal of Communication Systems, vol. 28, no. 12, pp. 1862-1883, 2014. [4]S. Islam and M. Amanul Islam, "SysProp: A Web-based Data Backup, Synchronization and System Administration",International Journal of Computer Network and Information Security, vol. 6, no. 9, pp. 1-11, 2014. [5]Y. YIN, Z. LIU and L. XU, "Cache System Based on Disk Media for Network Storage",Journal of Software, vol. 20, no. 10, pp. 2752-2765, 2009. [6]Z. Rao and T. Pu, "Decision Diagram-Based Modeling of Network Reachability",Applied Mechanics and Materials, vol. 513-517, pp. 1779-1782, 2014. [7]A. Yengui and M. Neji, "Ontology-based System for Semantic Visio-conference Information Retrieval and Annotation",Communications of the IBIMA, pp. 1-10, 2011. [8]J. SIDERA CASAS, "Visio artis, Simbolismo, AnalogĂa y OntologĂa en el Arte de Ramon Llull / Visio artis, Symbolism, Analogy and Ontology in the Art of Ramon Llull",Revista Española de FilosofĂa Medieval, vol. 22, p. 11, 2015. [9]R. Geist and K. Trivedi, "Queueing Network Models in Computer System Design",Mathematics Magazine, vol. 55, no. 2, p. 67, 1982. [10]X. Wei, "Design and Implementation of Network Management System Based on Mixed- mode",Physics Procedia, vol. 24, pp. 871-876, 2012. 14