logo

Network System Administration | Report

   

Added on  2022-08-20

59 Pages3164 Words15 Views
NETWORK SYSTEM ADMINISTRATION

Abstract
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.

Table of Contents
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52

Abbreviation

1. Introduction
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
1

business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
3. Literature Review
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
2

In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
3.5 Used Tools in the Implemented Network
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
3

not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
improvise the network service to increase the productivity and business
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network System Administration Real and Virtual Report 2022
|43
|1288
|26

Network System Administration Australia Report 2022
|48
|3703
|25

Advance Networking Concept Report 2022
|52
|1342
|16

Network System Administration Report 2022
|46
|2645
|21

Advanced Networking Concepts Assignment
|19
|1817
|34

Installation of Network in Linux Server
|12
|1168
|75