ICTNWK504 Design & Implementation: Integrated Server Solution

Verified

Added on  2024/05/17

|25
|6864
|76
Practical Assignment
AI Summary
This document presents a student's solution for the ICTNWK504 assignment, focusing on the design and implementation of an integrated server solution. It covers various aspects, including the use of LDAP and Kerberos for authentication, different types of network operating systems (NOS) such as Peer-to-Peer and Client-Server, and application server compatibility issues and resolution procedures. The assignment also discusses error and event log types, real-time and log-based tools for performance monitoring, and security considerations such as Windows NTLM Challenge/Response authentication. Furthermore, it delves into workstation configuration, security policy implementation, network design considerations, troubleshooting tools and techniques, and server status monitoring. The document concludes with discussions on server configuration, operational parameters, and documentation for the LAN network.
Document Page
ICTNWK504
Design and implement an integrated server
solution
ASSESSMENT
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
Contents
Written Activity...............................................................................................................................2
Observation/Demonstration.............................................................................................................5
Questions.......................................................................................................................................12
References......................................................................................................................................22
Student Name ICTNWK504 Date
Document Page
2
Written Activity
Question 1
Integrated server solutions are used in LDAP (Lightweight Directory Access Protocol) as the
authentication protocol. It uses for retrieving server resources over an intranet network. LDAP
offered a centralized user database. Database access by the user through the password and
offered number of severing access on the network. It supports Windows Server 2008, Linux, and
Unix platforms (marklogic, 2018).
Kerberos is an authentication protocol which is work on ticket-based approach. This
authentication protocol used by untrusted networks and trusted hosts. It encrypted the user's
tickets with the help of a particular server. Kerberos works on ticket-based approach so user and
server user authentication process to recognize each other but the user does not pass their
password on the network due to the security issue (marklogic, 2018).
Question 2
NOS (network operating systems) control or manage the number of computers system in the
network that helps to run the network smoothly.
Peer-to-Peer
P2P is NOS system which allowed the user to share the files, documents, and resources on the
computer network. It is a distributed system. P2P network is designed for medium-sized local
area network which is support Linux, Macintosh OSX, and Windows (Fcit, n.d.).
Client-server
Client/server is a centralize NOS system which offered security and access to the resource. The
client can be accessed the resource that is available on the servers. It integrated with network
components and multiple users than allowed accessing the resource any physical location.
Client/server NOS supports Microsoft family and UNIX/Linux operating system (Fcit, n.d.).
Question 3
The application server is a framework which provides an environment for sever running and
creates the web application. It works on the dynamic page creations, load-balancing, and
implementing the business logic.
Compatibility Issues:
HTTP File Caching
File Formats
Application Client Interoperability
Student Name ICTNWK504 Date
Document Page
3
Default Admin Port
Cluster Scripts
Primary Key Attribute Values (Docs, n.d.)
Resolution Procedures:
Application servers collect all information in the SystemOut.log. which help to solve the
performance issue.
PMR (problem record) and SR (service request) are used to solve communications issue.
WebSphere is used for the solve security problem (Austin, 2015).
Question 4
Error and Event log types
Miscellaneous: It does not report the operating system. Miscellaneous is available to all user in
the Informational manner.
Informational logs: It reports the operating system in the Informational (does not hidden)
manner. Informational logs available for all user.
Hidden logs: It reports the operating system in NOT Informational (does not hidden) manner
Hidden logs available for all user.
Error logs: It reports the operating system which may be hidden or not. Error logs Available only
to the authorized service provider (IBM, n.d.).
Question 5
Real-time based Tools
Process Monitor
It monitors the system performance on the real timing base. System performance is measured
by system counters every five seconds. Process Monitor used command prompt windows for
interfaces with the system.
Process Viewer
It is a subset of the Process Explode which measure the process performance. Process Viewer
used Refresh button for the update its information. It can view, killed, or changed the
priorities process (Jain, n.d.).
Log-based Tools
Performance Data Log Service (PerfLog)
It is a performance tool which measures the performance through the log file, Data Log, and
rate of the log. Perflog offered automation options and schedule for monitoring the system.
Event Viewer and Event Log Service.
Student Name ICTNWK504 Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
Event viewer used to view the contents of logs files and helps to recognize the problem or
system performance. Event Log Service collected security, application, and system events
(Jain, n.d.).
Student Name ICTNWK504 Date
Document Page
5
Observation/Demonstration
Question 1
They need a system which Supported Host Systems, protocols, and Heterogeneous Client. Sever
offered Distributed Link Service, PU Pass-through Service, and SNA Remote Access Service.
For the security, server offer LU Level Security, Data Encryption (between SNA Server
computers and clients) and Password Synchronization (Technet, 2018).
Question 2
For the safety, welfare, and health, the workplace is defined the OHS Policies and Procedures. It
is used to define the boundaries and guidelines for the Server integration operation. It uses long-
term in the organization that saved the cost and money. OHS Policies and Procedures include the
challenges or issues during the Server integration design and the installation (Ohspolicy, 2018).
Question 3
Network improved during down times through:
The user can install low-cost sensors for the predictive maintenance.
Manufacturing software for the reporting system and data.
Designed alternative system for the current automation systems and equipment
Maintained the network schedule (McHatton, 2018).
Question 4
In the LAN network, more than one CPU has executed the program which affects the network
performance. User workstation is executed parallel which managed lightly loaded processors.
Network synchronize operation is used on the slave nodes. Network server performance
communication, scheduling, synchronization times, and TCP/IP communication overhead
(Wang, 2002).
Question 5
Windows NTLM Challenge /Response is a secure authentication method for the integrated
authentication. Kerberos v5 is an authentication security method for Windows Server 2008 OS
and Windows 2000 OS. For the SSL and digital certificates, authentication uses X.509 Client
Certificate. Digest authentication is used for the user's password which is Hypertext Transfer
Protocol and supported by IIS (Msdn, 2018).
Student Name ICTNWK504 Date
Document Page
6
Question 6
I have used Windows NT Challenge/Response authentication. NTLM secure authentication
because it does not share the username and password on the network. NTLM use hash or
message digest for the data encryption which is not feasible to decrypt the message. It can use
Directory Services installation. NTLM offer a trusted connection between the client and server
(Msdn, 2018).
Question 7
Windows NT Challenge/Response authentication used All-in-one Multi-Factor Authentication
Servers for redundancy and replication. There are implemented two MFA Servers for established
the replication. It needs a load balancer, SDK, communication components (such as Fs Adapter,
and MFA AD). For the redundancy and replication, MFA does not need RADIUS authentication.
It stored all data in the PhoneFactor.pfdata (Berkouwer, 2017).
Question 8
Integrated server documents
The integrated server used NTLM authentication model which offered secure authentication for
the username, password, and directory server. User Admin Page and User Access Page used
authentication process.
For an integrated solution, HybridCloud used for file sharing, file storage and file access. It
offered online access so it can be used anytime and anywhere (Egnyte, 2018).
Integrated security used in the server which offered secure connection because it needs
credentials connection.
Question 9
Integrated authentication: There is Connection a domain for LAN network. Explained
Authenticate between Active Directory forests where Authentication domain is defined for
Window OS. Authenticate run on the Windows 2000 but not run in the computer domain. There
is defined a security level for the Authenticate process.
Question 10
Student Name ICTNWK504 Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
Centre stack (placed on the DMZ zone) and file server used for backend storage. front side
firewall used port 443 and port 80 for the remote access and web accessed. backside firewall
used LDAP or Active Directory port and CIFS/SMB port which opened on the Integrated server.
OpenStack Swift can be used as default storage. Then CIFS/SMB ports are implemented as
backside firewall. 80/443 port used for cloud storage service (Gladinet, 2018).
Question 11
Workstation configuration can be done as follow:
First, the user needs Product License Key for the start Configuration program.
Then User creates Optim Directory which connected to the database.
The user creates DB Aliases which given a high-level qualifier for the database table name.
For the Workstation configuration, defined Optim Security in three levels.
Then installed Export Registry Data for the workstation data storage and Configured
Workstation (IBM, 2018).
Question 12
Implementation of the security policy can be done if user enters the data types for the recognized
Secure Perspective which used as Resources for the Actor recognized, user, enter role for each
person. The user enters data interactions for actions of the system.
Question 13
Developer designed a LAN network according to client need. copper fire used as Network
Medium but we can use the optical fire which improves the network speed. It designed the RJ45
port for the network connector. Hub, Switch, and Router is used in the network for the
connection (Cooper, 2016)
Question 14
Error Reporting installed on the system but does not dependent on the operating system. An
application and sever need the MSI (Microsoft Windows Installer) for the file sharing on the
Microsoft Error Reporting which executes a script process. MSI login needs to resolve DLLs and
breaks issued in the other applications (Msdn, 2018).
Question 15
Troubleshooting tools and Techniques
Student Name ICTNWK504 Date
Document Page
8
Ping (checking the connectivty), Tracert (track the path of packet), Ipconfig/ifconfig (ip address
configruation), Nslookup (for the resolve Dynamic Name System issue), Netstat (info to
discovery for a variety of causes), PuTTY/Tera Term (for the connecting to a variety), IP
Calculator and subnet (for the correct IP address configuration), pingtest.net or Speedtest.net (for
the check quality of the Internet connection ) Pathping/mtr (check the path characteristics), and
Route (for the current status of routing table) are used as tools and Techniques for the
Troubleshooting (Willkins, 2011).
Question 16
For the security, developer implemented the SSL. SSL implementation used domain names, self-
signed SSL Certificates, and enterprise CA. after the implementation SSL security, developer
checked LAN network performance, working, connectivity with sever, packet path, and security.
Tester focused on the security of the system.
Question 17
Validation is a behaviour for DNS servers which defined sever properties. It is checked that DNS
Server IP is dynamic issuance so the administrator setting needs correct value. For this DNS
server contained TCP\IP Properties UI. TCP\IP Properties UI is a validation wizard which
disables by default. NDF (Network Diagnostics Framework) is chosen for Validates settings.
Question 19
Server status
Sever load 9.04 (4 CPU)
Memory used 78%
Cpsrvd up
Swap used 0.04%
(/user) 63%
(/temp) 3%
(/boot) 25%
(/home) 20 %
(/var) 89 %
(/) 50%
Student Name ICTNWK504 Date
Document Page
9
Question 18
Server configuration and operational
Defined the IP domain name
Explain the DNS servers for the network
Assigned DHCP excluded-address in the network IP address.
Designed the DHCP Pool for the router and also configuration the mode.
Defined the subnet address in the DHCP pool. It is an optional part.
Import all parameters for the DHCP pool.
Explain the Domain for client and server. Also designed DNS domain.
In the end, do the global configuration (Cisco, 2014).
Question 20
Clean up and restore the worksite.
Enable the vaults before the create Clean up and restore process.
Developed the replicate for the vaults data in the given time.
Then perform the Clean-up and restore operation on database or single site in the multiple
environments.
For the better performance, the network needs a SQL database (Knowledge, 2018)
Question 21
The user used sign Off to attach the digital signature in the documents that offered universal
acceptance and highest levels security. It based on the Channel Islands which defined data access
laws. For the sign Off user use two-step verification. In the two-step verification, the user gets
one-time password their Authentication number or email id. After the entered user can the
network system.
Question 22
Documentation for the LAN network:
Designed the network documentation strategy.
Designed the network topology diagram with IP addresses, Document server names, and
roles
Track each server in the LAN network.
Defined the software versions and licenses key.
It includes hardware components, Active Directory and backup procedures.
Student Name ICTNWK504 Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
At the end Label everything in the LAN network (Posey, 2008)
Question 23
Event log and Error types are as follow:
Miscellaneous: it is accessible to the user in the Informational manner. Miscellaneous does
not explosion the operating system.
Error logs: it is accessible to the authorized service provider. An error logs explosion the
operating system. Error logs are not hidden.
Informational logs: it is accessible to the user in the Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Hidden logs: it is accessible to the user in the not Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Question 24
Authentication methods and protocols:
Password Authentication Protocol: it used at the begging of the application server. PAP protocols
are used for username and password during the connection established.
AAA protocols: it referred for Authentication (verify the user Authentication), Authorization
(control the server data), and Accounting (managed the resource of severing)
Challenge-handshake authentication protocol
It used to initialize the server and host. CHAP used the MD5 hash function for the encryption.
The authentication process may be success or unsuccess.
Question 25
Compatibility issues
It needs to pay for commercial version and the trial version is available for 30 -45 days.
There are compatibility and conflicts with software.
It developed and designed for the program.
The product needs OSI design certification.
It is an open source software so there is a security issue.
Question 26
Student Name ICTNWK504 Date
Document Page
11
Secure File System is a collection of the program which produced and managed encryption disk
volumes that run on window and DOS. DOS storage data in an encryption format the individual-
sector level. DOS managed loaded and unloaded Encrypted volumes. It designed a secure
software design and programming (Cs, 1996).
Question 27
sp_trace_setfilter: it tracked the process event.
Server Distributed Replay: it balanced the load In the network.
Live Query Statistics: it used debugging process in the network.
DBCC: it measures the database logical and physical person (Guyer, 2017).
Question 28
Troubleshooting tools and Techniques for the network diagnostic utilities are as follows:
Ping has checked the connectivity between host and destination.
Tracker used for the track the packet path.
Nslookup resolve Dynamic Name System issue.
Route controlled and monitored routing table.
Speedtest.net measure the quality of the Internet connection.
IP Calculator used to configure the network connection.
Question 29
The application server is designed for the high-end consumer or business applications which is
connected remote and local server.
Compatibility issues and resolution procedures:
Need to install the software.
Vendor solution needs to accessing the software packages.
For the software and hardware compatible, the need for hardware configuration.
Need to copies all document in the correct folder and also need for the recognized correct path.
There is an application software incompatible issue with the operating system (Hart, 2016).
Student Name ICTNWK504 Date
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]