This report provides information on the development of a computer network system for connecting the head office of an organization with its branches. It covers topics such as requirement gathering, network proposal, IP addressing plan, device requirements, security plan, deployment plan, network design, performance metrics, and hardware setup.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK AND SYSTEM ADMINISTRATION Network and System Administration Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 NETWORK AND SYSTEM ADMINISTRATION Table of Contents 1. Introduction............................................................................................................................2 2. Requirement Gathering..........................................................................................................2 3. Network proposal...................................................................................................................2 3.1. IP addressing Plan...........................................................................................................3 3.2. Device Requirement........................................................................................................4 3.3. Security Plan...................................................................................................................5 3.4. Deployment Plan.............................................................................................................6 4. Network Design.....................................................................................................................7 4.1. Justification.....................................................................................................................8 5. Performance metrics...............................................................................................................8 6. Hardware Setup....................................................................................................................10 6.1. Directory service with centralized user account, computer accounts and groups.........10 6.2. DNS setup.....................................................................................................................10 6.3. DHCP server Setup.......................................................................................................11 6.4. Standard Client OS setup..............................................................................................11 6.5. HTTP Web server Setup...............................................................................................12 7. Conclusion............................................................................................................................13 Bibliography.............................................................................................................................14
2 NETWORK AND SYSTEM ADMINISTRATION 1. Introduction The report is prepared for the development of a computer network system for connecting the head office of the organization with its branches. A simple peer to peer network is used for the connection and sharing data and resources. The current setup of the organization is evaluated for the development of the network framework. The number of devices connected in the network is estimated for the development of IP addressing plan and anetworkdiagramiscreateddemonstratingthetopologyanddevicesusedforthe management of interconnection. A security plan is created for centrally administering the network and the performance metrics and the hardware setup is demonstrated in the report that would help to setup the system. 2. Requirement Gathering For the development of the network solution it is important to gather the requirement and create a network design aligning the requirement. The users of the network is needed to be divided into groups for enabling sharing of data and resources. Privileges are needed to be managed for providing them different services and improving communication, collaboration and threat protection. According to the requirement a hardware is needed to be setup and it is needed to be installed and configured with the DNS, DHCP, HTTP and client OS setup such that a centralized user management is enabled. The number of subnets needed and the number of hosts needed to be connected per subnet is need to be identified. The services that are needed by the user for management of internal communication is also needed to be evaluated for the configuration of the server with the service and align the network following the requirement. A firewall is needed to be deployed for restricting the outside user to access the internal resources of the organization and a VPN connection is also needed to be setup between the branches for increasing the security of the network framework.
3 NETWORK AND SYSTEM ADMINISTRATION 3. Network proposal 3.1. IP addressing Plan Subn et Nam e Need ed Size Allocat ed Size AddressMas k Dec MaskAssignable Range Broadcast Head Offic e 254254192.168.2. 0 /24255.255.255. 0 192.168.2.1 - 192.168.2.25 4 192.168.2.25 5 Bran ch 1 254254192.168.19 0.0 /24255.255.255. 0 192.168.190. 1- 192.168.190. 254 192.168.190. 255 Bran ch 1 254254192.168.19 1.0 /24255.255.255. 0 192.168.191. 1- 192.168.191. 254 192.168.191. 255 Head office – Bran ch 1 2210.1.1.0/30255.255.255. 252 10.1.1.1- 10.1.1.2 10.1.1.3 Head office 2210.2.2.0/30255.255.255.10.2.2.1-10.2.2.3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4 NETWORK AND SYSTEM ADMINISTRATION – Bran ch 2 25210.2.2.2 3.2. Device Requirement For the development of the network a list of the device that are needed for the development of the network. A DHCP, DNS and a RADIUS server is needed to be configured for the management of service that are needed by the users connected in the network. A router is needed to be deployed and configured such that it can help in managementofserviceandoperation.Redundantlinkisneededtobeuserfor interconnecting the device and increasing the performance of the network. A proper network cabling plan is needed to be followed for interconnecting the network device with the host and configuring the server according to the requirement of the user. Device NameDevice TypeRequirement RouterCisco 2811 series routerIt can be used as a VPN gateway and management of deliveryofdatapackets betweenthedifferenthost connected in then network. SwitchCisco 2960 series switchIt is used of distribution of thenetworkandcreating redundant link for ensuring that no packet are lost. ServersWEB Server, DNS Server,Webserverhoststhe
5 NETWORK AND SYSTEM ADMINISTRATION DNS Server, DHCP servercompany’s website DNSservermapstheIp address with the URL DHCPserverisusedfor automaticallyassigningIp addresstothehost connected in the network. Linksys RouterWireless Access PointIt is used for connecting the wirelessdeviceswiththe organizational network. 3.3. Security Plan The security plan is needed for created for guiding the users to appropriately use the electronic device, internet and email. The plan created for the organization is given below: Email Usage – the acceptable standard for receiving, sending and opening emails are needed to be covered and it also define the topics that can be discussed using email. Password Security – the usage of the password for accessing devices, programs or accessing files are needed to be outlined and the users are needed to be educated to create secure password and time span for changing the password. Internet Usage – The websites that are acceptable and the use of internet for shopping, banking and other personal needs are needed to be restricted (White, Fisch and Pooch 2017). A right balance for increasing the employee trust is needed to be maintained such that the misuse of internet is reduced and determine the culture and security needs best fitted for the organisation.
6 NETWORK AND SYSTEM ADMINISTRATION Software / Hardware Protocol – Any third party software or program should not be approved for installation in the PC and they should also be restricted to modify, uninstall or repair the existing the software or hardware component (Hussain, Hasan and Chughtai 2017). The password requirement for protecting files and acceptability for using hardware or software is also needed to be provided. Company and Employee Owned device use – It should define the restriction for utilizing devices of the company for personal usage and the employee using the personal device for professional use. The security requirement for each of the device is needed to be outlined in this section. Incident reporting – A clear understanding is needed to be presented to the employees such that they can report any instance of identified virus, SPAM, account breach and malware to the upper management. SocialMediaUsage–Forincreasingtheproductivityoftheemployeesand preventing breaches of data a no social media policy is needed to be implemented on the devices owned by the company. The privacy and confidentiality issues is needed to be discussed in respect of company, competitor, client, employees and social media for sharing the photos of employees and company (Ballestreroet al.2017). The flexibility of the issue is needed to be managed and risk range for the social media is also needed to be understood. 3.4. Deployment Plan For the deployment of the network the first step is to identify the functional needs and deployment environment. The features and the capabilities for the deployment of the network is needed to be considered for processing applications, modules and toolkits. The components are also needed to be identified and the interaction between the component are needed to be managed in relation with security of the network devices. The capacity and performance of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7 NETWORK AND SYSTEM ADMINISTRATION the workplace environment is needed to be identified for identifying the number of physical servers that are needed for performing specific function (Zebet al.2016). The redundancy needed for the management of operation and improving the performance of the network is also needed for mitigating the failover plan. A design is needed to be created for the deployment environment and the topology pattern is needed to be created for its deployment in the network. The methodology available for the configuration is needed to be analysed for standardizing the deployment environment. The server is needed to be configured with roles and service such that the request can be distributed across different server and expanded depending on the growth of the organization. The DHCP servers are needed to be configured according to the subnet plan and different pools are needed to be created such that the IP address are automatically assigned to the hosts connected in the network (Pirani, Simpson- Porco and Fidan 2017). A wireless access point is also needed to be deployed for supporting BYOD and improving the performance of the employees. The access point is needed to be secured with the application of encryption mechanism such that it risk of misuse of the network is eliminated and the network is secured form the illegal users. 4. Network Design
8 NETWORK AND SYSTEM ADMINISTRATION 4.1. Justification A site to site VPN connection topology is selected for the development of the network andconnectingtheheadofficewiththeheadquarterandthetwobranchesofthe organization. It helps in creating a secured connection between the two end points and for the establishment the router is used as the VPN gateway device. With the selection of Site to Site VPN the need of VPN client software for establishing the connection is eliminated and here the hosts can send or receive TCP/IP traffic using the VPN gateway. The encapsulation and encryption of the outbound traffic is done by the VPN gateway and it is sent using the VPN tunnel. On the other end the gateway the header is stripped and the content is decrypted for relaying the packet to the targeted host. It is selected since the site to site VPN is capable of handling critical data traffic for example VOIP communication which have the requirement of good service and lower latency. Local Servers are needed to be deployed in the sites for the management of user account and groups such that risk associated with the network is eliminated. For increasing the network security the computers are needed to be installed with antivirus software such that the virus can be detected and network is secured from the external agents. 5. Performance metrics Latency, bandwidth and throughput and responsiveness of the network is needed to be analysed for improving the network performance and eliminating the delays in the network. The network devices are needed to be configured such that there is no latency for transmitting the data packets between different location of the network. The latency may cause problem for the VOIP network since the user may face call drop and jitter and thus it is necessary to divide the network communication channel and increase the efficiency of the network (Lipton et al.2015). Sufficient bandwidth should be available for transmitting data packet between
9 NETWORK AND SYSTEM ADMINISTRATION different host connected in the network. The through put of the network is needed to be analysed for the selection of ISP and improve the network performance. The bandwidth is the measure of amount of data that is transmitted for the certain amount of time. The network responsiveness and uptime should be higher and the connection should be functional. A service level agreement is needed to be signed between the ISP for eliminating the problem. The hardware and software should also be used for monitoring the network performance and tracking the utilization of the memory and other metrices necessary for managing the network performance (Plonka and Berger 2015). There are different data points that are needed to be tracked on the network and it is needed to be documented for reducing the network error and increase the utility of the network. ApplicationRequired Bandwidth Email10 – 100 Kbps Messaging< 10 Kbps Web Browsing64 – 100+ Kbps Audio Streaming96 -160 Kbps VOIP24 – 100+ Kbps Video Streaming96 – 200+ Kbps File Sharing0 – infinity Mbps
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10 NETWORK AND SYSTEM ADMINISTRATION 6. Hardware Setup 6.1. Directory service with centralized user account, computer accounts and groups 6.2. DNS setup
11 NETWORK AND SYSTEM ADMINISTRATION 6.3. DHCP server Setup 6.4. Standard Client OS setup
12 NETWORK AND SYSTEM ADMINISTRATION 6.5. HTTP Web server Setup
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13 NETWORK AND SYSTEM ADMINISTRATION 7. Conclusion From the above report it can be concluded that for the development of the network solution it is important to manage the hosts and the other network peripheral deployed in the network. For the installation of the server a separate room should be considered and the hardware are needed to be protected from accidental damage. Proper cooling and ventilation facility is needed to be arranged along with backup of the servers such that the network is secured from any disaster. The users connected with the network should have separate account and strong password that is used for using the specific resources of the organization. User management is also necessary for centralizing the management and management of roles and responsibility of the users. A design of the network is created and reason for the section of the topology is given in the report. The performance metrics and the hardware setup that is needed for the configuration of the network is also documented in the report along with the screenshot for demonstrating the steps used for configuration of the network.
14 NETWORK AND SYSTEM ADMINISTRATION Bibliography Ballestrero, S., Brasolin, F., Fazio, D., Gament, C., Lee, C.J., Scannicchio, D.A. and Twomey, M.S., 2017, October. ATLAS TDAQ system administration: Master of Puppets. InJournal of Physics: Conference Series(Vol. 898, No. 8, p. 082002). IOP Publishing. Bholebawa, I.Z. and Dalal, U.D., 2016. Design and performance analysis of OpenFlow- enablednetworktopologiesusingMininet.InternationalJournalofComputerand Communication Engineering,5(6), p.419. Deng, G., Yan, Z., Zou, W. and Zhou, J., 2016, February. Application of DNS in the regulation of link traffic flow in multi-outlet networks. In2015 5th International Conference on Computer Sciences and Automation Engineering (ICCSAE 2015). Atlantis Press. DeVoe, C. and Rahman, S., 2015. Incident Response Plan for a Small to Medium Sized Hospital.arXiv preprint arXiv:1512.00054. Gillmore,M.,2016.MulticastProtocolforLow-PowerandLossyNetworks(MPL) Parameter Configuration Option for DHCPv6. Hung, L.H., Kristiyanto, D., Lee, S.B. and Yeung, K.Y., 2016. GUIdock: using Docker containerswithacommongraphicsuserinterfacetoaddressthereproducibilityof research.PloS one,11(4), p.e0152686. Hussain, M.Z., Hasan, M.Z. and Chughtai, M.T.A., 2017. Penetration testing in system administration.International Journal of Scientific & Technology Research,6(6), pp.2277- 8616. Jalalzai, M.H., Shahid, W.B. and Iqbal, M.M.W., 2015, January. DNS security challenges and best practices to deploy secure DNS with digital signatures. In2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)(pp. 280-285). IEEE.
15 NETWORK AND SYSTEM ADMINISTRATION Lipton, Z.C., Kale, D.C., Elkan, C. and Wetzel, R., 2015. Learning to diagnose with LSTM recurrent neural networks.arXiv preprint arXiv:1511.03677. Meek,J.,2018.PERSPECTIVESONGOVERNANCENETWORKSRESEARCH ORIENTATIONSFORASSESSINGCOLLABORATIVEPUBLIC ADMINISTRATION.Revista CientÃfica Foz,1(1), pp.17-17. Pirani,M.,Simpson-Porco,J.W.andFidan,B.,2017,December.System-theoretic performance metrics for low-inertia stability of power networks. In2017 IEEE 56th Annual Conference on Decision and Control (CDC)(pp. 5106-5111). IEEE. Plonka, D. and Berger, A., 2015, October. Temporal and spatial classification of active IPv6 addresses. InProceedings of the 2015 Internet Measurement Conference(pp. 509-522). ACM. Trevisan, M., Drago, I., Mellia, M. and Munafo, M.M., 2016, September. Towards web serviceclassificationusingaddressesandDNS.In2016InternationalWireless Communications and Mobile Computing Conference (IWCMC)(pp. 38-43). IEEE. White, G.B., Fisch, E.A. and Pooch, U.W., 2017.Computer system and network security. CRC press. Zeb, A., Islam, A.M., Zareei, M., Al Mamoon, I., Mansoor, N., Baharun, S., Katayama, Y. and Komaki, S., 2016. Clustering analysisin wireless sensor networks: the ambit of performance metrics and schemes taxonomy.International Journal of Distributed Sensor Networks,12(7), p.4979142. Zhou, Z., Li, Z. and Zhang, K., 2017, March. All Your VMs are Disconnected: Attacking Hardware Virtualized Network. InProceedings of the Seventh ACM on Conference on Data and Application Security and Privacy(pp. 249-260). ACM.