logo

Networks Infrastructure Assignment

This text discusses the consequences of plagiarism, late submission of work, and the referral process for assignments. It also mentions the specific tasks and requirements for achieving different grades in the assignment.

35 Pages9953 Words256 Views
   

Added on  2020-06-04

Networks Infrastructure Assignment

This text discusses the consequences of plagiarism, late submission of work, and the referral process for assignments. It also mentions the specific tasks and requirements for achieving different grades in the assignment.

   Added on 2020-06-04

ShareRelated Documents
Network Infrastructure
Networks Infrastructure Assignment_1
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1TASK 1............................................................................................................................................1P1.1 Evaluation of DNS in MS windows and active directory in MS windows....................1P 1.2 The technologies that support network infrastructure management.............................6P 1.3 The security resources available in network infrastructure management.....................8TASK 2..........................................................................................................................................10P 2.1 Designing a network infrastructure.............................................................................10M2 Evaluation of server with respect to network infrastructure..........................................14P 2.2 Addressing and deployment solutions for the network...............................................15P 2.3 Evaluating rights and security requirements...............................................................16TASK-3 ........................................................................................................................................203.1 The implementation of network infrastructure ..............................................................20M3 Implementation of potential security threats in a network ............................................23TASK 4..........................................................................................................................................24P 4.1 Review and testing the network implementation........................................................24P 4.2 Evaluation of the network and user assurance of the network....................................27CONCLUSION..............................................................................................................................28REFERENCES..............................................................................................................................30
Networks Infrastructure Assignment_2
INTRODUCTIONNetwork infrastructure is considered as the resources of a complete network, with thehelp of which the network connectivity can be enabled. The resources can be software's as wellas hardware's. It also involves the internal and external operations along with the communicationwithin an enterprise network (Xu and et.al., 2011). The entire structure of network is connectedinside the network, which means all the systems are connected to the servers and producesinternal as well as external communications. Along with the hardware and software, there arevarious network services as well that are implied in the network infrastructure. The report isabout understanding the principles of the management of network infrastructure and representingthe same for Net Enterprise Solutions as they are recruiting for surging their client's needs. TASK 1To a group of connected computer systems the term of network infrastructure is used. Theparts of computers such as cables , switches, wireless access points etc are included in thisnetwork infrastructure. The global intranet and corporate intranets are most probably samebut in a closed network architecture they operates. Within it only they are both areaccessible.On a central data storage they are reliable and also included computers which after called assevers (Agyapong and Benjebbour, 2014.). The central storage is accessed by routers,switches, Ethernet cabling etc. In order to be functional the network architecture also needssoftware requirements aside from having suitable hardware.P1.1 Evaluation of DNS in MS windows and active directory in MS windowsThe set of rules that is known as internet protocols are the most prominent among theservices in order to handle network infrastructure .Within networks and over the internetthey govern the formation which transfer of data that takes place. In every networkinfrastructure the most common internet protocols that is sued in the domain nameservice(DNS).In the IP address it is primary services that discovers and translated internet1
Networks Infrastructure Assignment_3
domain names into IP addresses. The name that is been typed in the web browser isconverted automatically by DNS to the corresponding web sites servers IP addresses inorder to store name and address information of all public hots the service make use ofdistributed database on the internet .As it an easier way to get connected to distinctwebsites(Gupta and Jha, 2015).The caching request and redundancy is also provided by DNS services. With primary,secondary and tertiary DNS serves it is not uncommon to discover operating systemconfigured in order to allow recreation. With the computers the service itself works onclient/server architecture. The clients of DNS want to make use of service that are neededto have service configured on their network. The static IP addresses are assigned to theDNS servers thus making it simpler for users to access the service during any query. Inorder to discover the right severs for delivering internet e-mails the DNS is also used. Thedomain names is covered back from IP addresses by making use of reverse look ups(Zhengand Lei, 2016.).In order to handle communication and request that is been sent over the network theinternet protocols such as DNS that is been used. Also it is important to have some insidetools that can be sued to mange and con troll the resources over the network. In order tocentralize the network information most of the organization make use of directory service.With Windows’s Active directory most of the vendors offer this .Most probably these arebeing deployed in smaller business. The web-based relationships and the internal relationsare been manged by using service software such as Novell’s e- directory. This morepreferred by corporate people and also it is used as centralising agent. It can also beutilized as web service that can be accessed by both internal and external users throughauthentic logons. From an added access to web service both active directory and e-directory have much more to provide.The main difference between them is as follows-:2
Networks Infrastructure Assignment_4
ManageabilityThe windows active directory providers straightforward and manageable consoles thatcan be expanded .So, over the infrastructure of organization it offers a greater converge.However in comparison with Novell’s e Directory to provided differ types of tools in orderto make easy the management across various platforms.ScalabilityIn Windows active directory, the multiple directory servers host the similar directory thatis allowed by multi-master model. In the event of master failures the limited managementfunctionalities is been offered by Windows’s FSMO (Kasapaki and Sparsø, 2016.).However, in Novell e-directory the multi-master model is also offered but only thecertified employees are giving permission for performing tasks such as updation ofschemes etc.SecurityThe small attack service is provided by both services bout through properdirectory implementation it can be available. In order to manage network client’s the activedirectory is offered by group policy. For the clients of windows only it is applicable.However on other hand, the client/desktop management is offered by e-directoryZENworks suite. Arcos various platforms the Novell’s security tools are capable ofmonitoring and administrating clients.CompatibilityOn the windows OS only active directory can be installed and the endpoint-to end-pointsolutions frae been provided by them .So, this make installation across various devices andOS very easy(King and Farrel, 2015). However on other hand, for its support for multi-platform Novell is known.Reliability3
Networks Infrastructure Assignment_5
The Novell’s up time reputations is not been able to catch up by windows. Anarray of service packs , hotfixes etc have been offered by windows. However on otherhand it is highly reliable to install novell’s e-directory on a Novell NetWare server.The networking architecture the additional management concern is also faced.The rights are either accessed to management of users or resources etc. Through differenttools different operating systems deal with these concerns. In order to tackle with eachSusie windows server OS provides a variety of feature. These features handle these type oftasks which are as follows-:Resource management By large IT corporation and the infrastructure resource management is beenused. The high-end resource management is been required by large IT corporations such asdata centres. In order to deliver established level of service this resources are been used.The extensive management methods are not used by smaller organization. For an instancethe allocation of resources is enables by CPU and memory by making use of window’ssystem resource manager. The limits are being addressed by the administrators .Amongmultiple applications that are running in a network WSRM is able to allocate resources.User managementIn order to build a network the most essential task is to secure a network on theoutside. But it is necessary to protect the network from inside. The network securitypolices need to be configured and also the user permissions ned to be granted. To theresources of organization the same level of access to all in the organization is not beenprovided. Through proper user-management a lot of issues can be handled byadministratorsNovice internet users4
Networks Infrastructure Assignment_6
There are chances that sensitive private information of the organization can beexposed to the world outside. These people are not expertise but there they are not havingany dangerous intentions.Intensive bandwidth users In the workflow of organization, the serious threat is been posed by bandwidthlogging (Merolla and Brezzo, 2014.). The bandwidth network is been clogged byunnecessary downloads. By allocating bandwidths can also be handled by this.Password assignments For the organization a serious threat is been posed by weak passwords. In orderto make sure that certain needs are been met by the passwords the polices are alsoapplauded to it.Within the organization the Windows’ active directory can also be utilized in order tocrate and centralised users (Krienen and Sherwood, 2016.).Access control In order to protect internal network the additional features are been proved. Theseinvolve access control. The polices to users, group and computers are being assignedthrough access control administrators. The various methods such as permission, user-rightsobject auditing etc. can be implemented by using access controlPermissionsThe access to a user, group or object are defined by the type of access that isdefined in permissions. For objects such as files, registry, process NTFS permission is setby administrators through access control. On the type of object the permission that isviable for an object can change .The read, modify, change owner etc are been assigned tomost of the objects. The inherited permission is also given to access control users. All theinherited permission that is there in containers is inherited by that containerUser rights5
Networks Infrastructure Assignment_7
Within the network the specific privileges and logon rights are been granted byuser rights. To a group or individual user-accounts administrations can assign particularrights. The specific actions are been authorized from these rights .The actions such aslogging in the system, backing up the fields etc are been done .The permissions and theuser rights are not same they differ from each other. The permissions are attached toobject’s. However, user rights are attached to users.Object auditing Within the network by using this feature one can monitor and examine thepolicies and permissions that is been assigned. In order to access attempts to object it allowsadministration to log both successful and unsuccessful access.P 1.2 The technologies that support network infrastructure managementThe most of the functions of the organization is bene supported by the server which is anetwork hardware(Zhao, Mathieu and LeCun, 2016). It also known as the backbone of theinfrastructure. The networking hardware need to be selected in a way that is compatible with theinfrastructure. The organization collection of serves is not just referred by the terminfrastructure but also all the devices that is connected to the network. On the requirements ofhardware the functionality of a network structure is dependent(Szegedy and Wojna, 2016) .It isessential that hardware on the network need to be implemented properly so that infrastructure tobe functional. It can be done by continuing monitoring it and also the operations and serves needto be managed.The powerful servers are been required in larger infrastructures such as data centres. Themost of them settle for rack servers. The smaller tower severs can be used by small organizationsdepending on the size they can make use of these servers. The tasks that is been deployed by the6
Networks Infrastructure Assignment_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Large Networking Connect: Cabling, Hardware Setup, DNS, DHCP Design
|55
|4359
|461

Transmission Control Protocol/Internet Protocol PDF
|88
|24971
|186

System Administration and Management | Assignment
|19
|1311
|59

System Management Assignment | Local Area Network (LAN)
|21
|2615
|254

Basic Requirements of a Network
|13
|822
|11

UMUC Library Network Design Proposal Part 3.
|4
|929
|234