ICTNWK504 Design & Implementation: Integrated Server Solution
VerifiedAdded on 2024/05/17
|25
|6864
|76
Practical Assignment
AI Summary
This document presents a student's solution for the ICTNWK504 assignment, focusing on the design and implementation of an integrated server solution. It covers various aspects, including the use of LDAP and Kerberos for authentication, different types of network operating systems (NOS) such as Peer-to-Peer and Client-Server, and application server compatibility issues and resolution procedures. The assignment also discusses error and event log types, real-time and log-based tools for performance monitoring, and security considerations such as Windows NTLM Challenge/Response authentication. Furthermore, it delves into workstation configuration, security policy implementation, network design considerations, troubleshooting tools and techniques, and server status monitoring. The document concludes with discussions on server configuration, operational parameters, and documentation for the LAN network.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

ICTNWK504
Design and implement an integrated server
solution
ASSESSMENT
Design and implement an integrated server
solution
ASSESSMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
Contents
Written Activity...............................................................................................................................2
Observation/Demonstration.............................................................................................................5
Questions.......................................................................................................................................12
References......................................................................................................................................22
Student Name ICTNWK504 Date
Contents
Written Activity...............................................................................................................................2
Observation/Demonstration.............................................................................................................5
Questions.......................................................................................................................................12
References......................................................................................................................................22
Student Name ICTNWK504 Date

2
Written Activity
Question 1
Integrated server solutions are used in LDAP (Lightweight Directory Access Protocol) as the
authentication protocol. It uses for retrieving server resources over an intranet network. LDAP
offered a centralized user database. Database access by the user through the password and
offered number of severing access on the network. It supports Windows Server 2008, Linux, and
Unix platforms (marklogic, 2018).
Kerberos is an authentication protocol which is work on ticket-based approach. This
authentication protocol used by untrusted networks and trusted hosts. It encrypted the user's
tickets with the help of a particular server. Kerberos works on ticket-based approach so user and
server user authentication process to recognize each other but the user does not pass their
password on the network due to the security issue (marklogic, 2018).
Question 2
NOS (network operating systems) control or manage the number of computers system in the
network that helps to run the network smoothly.
Peer-to-Peer
P2P is NOS system which allowed the user to share the files, documents, and resources on the
computer network. It is a distributed system. P2P network is designed for medium-sized local
area network which is support Linux, Macintosh OSX, and Windows (Fcit, n.d.).
Client-server
Client/server is a centralize NOS system which offered security and access to the resource. The
client can be accessed the resource that is available on the servers. It integrated with network
components and multiple users than allowed accessing the resource any physical location.
Client/server NOS supports Microsoft family and UNIX/Linux operating system (Fcit, n.d.).
Question 3
The application server is a framework which provides an environment for sever running and
creates the web application. It works on the dynamic page creations, load-balancing, and
implementing the business logic.
Compatibility Issues:
HTTP File Caching
File Formats
Application Client Interoperability
Student Name ICTNWK504 Date
Written Activity
Question 1
Integrated server solutions are used in LDAP (Lightweight Directory Access Protocol) as the
authentication protocol. It uses for retrieving server resources over an intranet network. LDAP
offered a centralized user database. Database access by the user through the password and
offered number of severing access on the network. It supports Windows Server 2008, Linux, and
Unix platforms (marklogic, 2018).
Kerberos is an authentication protocol which is work on ticket-based approach. This
authentication protocol used by untrusted networks and trusted hosts. It encrypted the user's
tickets with the help of a particular server. Kerberos works on ticket-based approach so user and
server user authentication process to recognize each other but the user does not pass their
password on the network due to the security issue (marklogic, 2018).
Question 2
NOS (network operating systems) control or manage the number of computers system in the
network that helps to run the network smoothly.
Peer-to-Peer
P2P is NOS system which allowed the user to share the files, documents, and resources on the
computer network. It is a distributed system. P2P network is designed for medium-sized local
area network which is support Linux, Macintosh OSX, and Windows (Fcit, n.d.).
Client-server
Client/server is a centralize NOS system which offered security and access to the resource. The
client can be accessed the resource that is available on the servers. It integrated with network
components and multiple users than allowed accessing the resource any physical location.
Client/server NOS supports Microsoft family and UNIX/Linux operating system (Fcit, n.d.).
Question 3
The application server is a framework which provides an environment for sever running and
creates the web application. It works on the dynamic page creations, load-balancing, and
implementing the business logic.
Compatibility Issues:
HTTP File Caching
File Formats
Application Client Interoperability
Student Name ICTNWK504 Date

3
Default Admin Port
Cluster Scripts
Primary Key Attribute Values (Docs, n.d.)
Resolution Procedures:
Application servers collect all information in the SystemOut.log. which help to solve the
performance issue.
PMR (problem record) and SR (service request) are used to solve communications issue.
WebSphere is used for the solve security problem (Austin, 2015).
Question 4
Error and Event log types
Miscellaneous: It does not report the operating system. Miscellaneous is available to all user in
the Informational manner.
Informational logs: It reports the operating system in the Informational (does not hidden)
manner. Informational logs available for all user.
Hidden logs: It reports the operating system in NOT Informational (does not hidden) manner
Hidden logs available for all user.
Error logs: It reports the operating system which may be hidden or not. Error logs Available only
to the authorized service provider (IBM, n.d.).
Question 5
Real-time based Tools
Process Monitor
It monitors the system performance on the real timing base. System performance is measured
by system counters every five seconds. Process Monitor used command prompt windows for
interfaces with the system.
Process Viewer
It is a subset of the Process Explode which measure the process performance. Process Viewer
used Refresh button for the update its information. It can view, killed, or changed the
priorities process (Jain, n.d.).
Log-based Tools
Performance Data Log Service (PerfLog)
It is a performance tool which measures the performance through the log file, Data Log, and
rate of the log. Perflog offered automation options and schedule for monitoring the system.
Event Viewer and Event Log Service.
Student Name ICTNWK504 Date
Default Admin Port
Cluster Scripts
Primary Key Attribute Values (Docs, n.d.)
Resolution Procedures:
Application servers collect all information in the SystemOut.log. which help to solve the
performance issue.
PMR (problem record) and SR (service request) are used to solve communications issue.
WebSphere is used for the solve security problem (Austin, 2015).
Question 4
Error and Event log types
Miscellaneous: It does not report the operating system. Miscellaneous is available to all user in
the Informational manner.
Informational logs: It reports the operating system in the Informational (does not hidden)
manner. Informational logs available for all user.
Hidden logs: It reports the operating system in NOT Informational (does not hidden) manner
Hidden logs available for all user.
Error logs: It reports the operating system which may be hidden or not. Error logs Available only
to the authorized service provider (IBM, n.d.).
Question 5
Real-time based Tools
Process Monitor
It monitors the system performance on the real timing base. System performance is measured
by system counters every five seconds. Process Monitor used command prompt windows for
interfaces with the system.
Process Viewer
It is a subset of the Process Explode which measure the process performance. Process Viewer
used Refresh button for the update its information. It can view, killed, or changed the
priorities process (Jain, n.d.).
Log-based Tools
Performance Data Log Service (PerfLog)
It is a performance tool which measures the performance through the log file, Data Log, and
rate of the log. Perflog offered automation options and schedule for monitoring the system.
Event Viewer and Event Log Service.
Student Name ICTNWK504 Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
Event viewer used to view the contents of logs files and helps to recognize the problem or
system performance. Event Log Service collected security, application, and system events
(Jain, n.d.).
Student Name ICTNWK504 Date
Event viewer used to view the contents of logs files and helps to recognize the problem or
system performance. Event Log Service collected security, application, and system events
(Jain, n.d.).
Student Name ICTNWK504 Date

5
Observation/Demonstration
Question 1
They need a system which Supported Host Systems, protocols, and Heterogeneous Client. Sever
offered Distributed Link Service, PU Pass-through Service, and SNA Remote Access Service.
For the security, server offer LU Level Security, Data Encryption (between SNA Server
computers and clients) and Password Synchronization (Technet, 2018).
Question 2
For the safety, welfare, and health, the workplace is defined the OHS Policies and Procedures. It
is used to define the boundaries and guidelines for the Server integration operation. It uses long-
term in the organization that saved the cost and money. OHS Policies and Procedures include the
challenges or issues during the Server integration design and the installation (Ohspolicy, 2018).
Question 3
Network improved during down times through:
The user can install low-cost sensors for the predictive maintenance.
Manufacturing software for the reporting system and data.
Designed alternative system for the current automation systems and equipment
Maintained the network schedule (McHatton, 2018).
Question 4
In the LAN network, more than one CPU has executed the program which affects the network
performance. User workstation is executed parallel which managed lightly loaded processors.
Network synchronize operation is used on the slave nodes. Network server performance
communication, scheduling, synchronization times, and TCP/IP communication overhead
(Wang, 2002).
Question 5
Windows NTLM Challenge /Response is a secure authentication method for the integrated
authentication. Kerberos v5 is an authentication security method for Windows Server 2008 OS
and Windows 2000 OS. For the SSL and digital certificates, authentication uses X.509 Client
Certificate. Digest authentication is used for the user's password which is Hypertext Transfer
Protocol and supported by IIS (Msdn, 2018).
Student Name ICTNWK504 Date
Observation/Demonstration
Question 1
They need a system which Supported Host Systems, protocols, and Heterogeneous Client. Sever
offered Distributed Link Service, PU Pass-through Service, and SNA Remote Access Service.
For the security, server offer LU Level Security, Data Encryption (between SNA Server
computers and clients) and Password Synchronization (Technet, 2018).
Question 2
For the safety, welfare, and health, the workplace is defined the OHS Policies and Procedures. It
is used to define the boundaries and guidelines for the Server integration operation. It uses long-
term in the organization that saved the cost and money. OHS Policies and Procedures include the
challenges or issues during the Server integration design and the installation (Ohspolicy, 2018).
Question 3
Network improved during down times through:
The user can install low-cost sensors for the predictive maintenance.
Manufacturing software for the reporting system and data.
Designed alternative system for the current automation systems and equipment
Maintained the network schedule (McHatton, 2018).
Question 4
In the LAN network, more than one CPU has executed the program which affects the network
performance. User workstation is executed parallel which managed lightly loaded processors.
Network synchronize operation is used on the slave nodes. Network server performance
communication, scheduling, synchronization times, and TCP/IP communication overhead
(Wang, 2002).
Question 5
Windows NTLM Challenge /Response is a secure authentication method for the integrated
authentication. Kerberos v5 is an authentication security method for Windows Server 2008 OS
and Windows 2000 OS. For the SSL and digital certificates, authentication uses X.509 Client
Certificate. Digest authentication is used for the user's password which is Hypertext Transfer
Protocol and supported by IIS (Msdn, 2018).
Student Name ICTNWK504 Date

6
Question 6
I have used Windows NT Challenge/Response authentication. NTLM secure authentication
because it does not share the username and password on the network. NTLM use hash or
message digest for the data encryption which is not feasible to decrypt the message. It can use
Directory Services installation. NTLM offer a trusted connection between the client and server
(Msdn, 2018).
Question 7
Windows NT Challenge/Response authentication used All-in-one Multi-Factor Authentication
Servers for redundancy and replication. There are implemented two MFA Servers for established
the replication. It needs a load balancer, SDK, communication components (such as Fs Adapter,
and MFA AD). For the redundancy and replication, MFA does not need RADIUS authentication.
It stored all data in the PhoneFactor.pfdata (Berkouwer, 2017).
Question 8
Integrated server documents
The integrated server used NTLM authentication model which offered secure authentication for
the username, password, and directory server. User Admin Page and User Access Page used
authentication process.
For an integrated solution, HybridCloud used for file sharing, file storage and file access. It
offered online access so it can be used anytime and anywhere (Egnyte, 2018).
Integrated security used in the server which offered secure connection because it needs
credentials connection.
Question 9
Integrated authentication: There is Connection a domain for LAN network. Explained
Authenticate between Active Directory forests where Authentication domain is defined for
Window OS. Authenticate run on the Windows 2000 but not run in the computer domain. There
is defined a security level for the Authenticate process.
Question 10
Student Name ICTNWK504 Date
Question 6
I have used Windows NT Challenge/Response authentication. NTLM secure authentication
because it does not share the username and password on the network. NTLM use hash or
message digest for the data encryption which is not feasible to decrypt the message. It can use
Directory Services installation. NTLM offer a trusted connection between the client and server
(Msdn, 2018).
Question 7
Windows NT Challenge/Response authentication used All-in-one Multi-Factor Authentication
Servers for redundancy and replication. There are implemented two MFA Servers for established
the replication. It needs a load balancer, SDK, communication components (such as Fs Adapter,
and MFA AD). For the redundancy and replication, MFA does not need RADIUS authentication.
It stored all data in the PhoneFactor.pfdata (Berkouwer, 2017).
Question 8
Integrated server documents
The integrated server used NTLM authentication model which offered secure authentication for
the username, password, and directory server. User Admin Page and User Access Page used
authentication process.
For an integrated solution, HybridCloud used for file sharing, file storage and file access. It
offered online access so it can be used anytime and anywhere (Egnyte, 2018).
Integrated security used in the server which offered secure connection because it needs
credentials connection.
Question 9
Integrated authentication: There is Connection a domain for LAN network. Explained
Authenticate between Active Directory forests where Authentication domain is defined for
Window OS. Authenticate run on the Windows 2000 but not run in the computer domain. There
is defined a security level for the Authenticate process.
Question 10
Student Name ICTNWK504 Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
Centre stack (placed on the DMZ zone) and file server used for backend storage. front side
firewall used port 443 and port 80 for the remote access and web accessed. backside firewall
used LDAP or Active Directory port and CIFS/SMB port which opened on the Integrated server.
OpenStack Swift can be used as default storage. Then CIFS/SMB ports are implemented as
backside firewall. 80/443 port used for cloud storage service (Gladinet, 2018).
Question 11
Workstation configuration can be done as follow:
First, the user needs Product License Key for the start Configuration program.
Then User creates Optim Directory which connected to the database.
The user creates DB Aliases which given a high-level qualifier for the database table name.
For the Workstation configuration, defined Optim Security in three levels.
Then installed Export Registry Data for the workstation data storage and Configured
Workstation (IBM, 2018).
Question 12
Implementation of the security policy can be done if user enters the data types for the recognized
Secure Perspective which used as Resources for the Actor recognized, user, enter role for each
person. The user enters data interactions for actions of the system.
Question 13
Developer designed a LAN network according to client need. copper fire used as Network
Medium but we can use the optical fire which improves the network speed. It designed the RJ45
port for the network connector. Hub, Switch, and Router is used in the network for the
connection (Cooper, 2016)
Question 14
Error Reporting installed on the system but does not dependent on the operating system. An
application and sever need the MSI (Microsoft Windows Installer) for the file sharing on the
Microsoft Error Reporting which executes a script process. MSI login needs to resolve DLLs and
breaks issued in the other applications (Msdn, 2018).
Question 15
Troubleshooting tools and Techniques
Student Name ICTNWK504 Date
Centre stack (placed on the DMZ zone) and file server used for backend storage. front side
firewall used port 443 and port 80 for the remote access and web accessed. backside firewall
used LDAP or Active Directory port and CIFS/SMB port which opened on the Integrated server.
OpenStack Swift can be used as default storage. Then CIFS/SMB ports are implemented as
backside firewall. 80/443 port used for cloud storage service (Gladinet, 2018).
Question 11
Workstation configuration can be done as follow:
First, the user needs Product License Key for the start Configuration program.
Then User creates Optim Directory which connected to the database.
The user creates DB Aliases which given a high-level qualifier for the database table name.
For the Workstation configuration, defined Optim Security in three levels.
Then installed Export Registry Data for the workstation data storage and Configured
Workstation (IBM, 2018).
Question 12
Implementation of the security policy can be done if user enters the data types for the recognized
Secure Perspective which used as Resources for the Actor recognized, user, enter role for each
person. The user enters data interactions for actions of the system.
Question 13
Developer designed a LAN network according to client need. copper fire used as Network
Medium but we can use the optical fire which improves the network speed. It designed the RJ45
port for the network connector. Hub, Switch, and Router is used in the network for the
connection (Cooper, 2016)
Question 14
Error Reporting installed on the system but does not dependent on the operating system. An
application and sever need the MSI (Microsoft Windows Installer) for the file sharing on the
Microsoft Error Reporting which executes a script process. MSI login needs to resolve DLLs and
breaks issued in the other applications (Msdn, 2018).
Question 15
Troubleshooting tools and Techniques
Student Name ICTNWK504 Date

8
Ping (checking the connectivty), Tracert (track the path of packet), Ipconfig/ifconfig (ip address
configruation), Nslookup (for the resolve Dynamic Name System issue), Netstat (info to
discovery for a variety of causes), PuTTY/Tera Term (for the connecting to a variety), IP
Calculator and subnet (for the correct IP address configuration), pingtest.net or Speedtest.net (for
the check quality of the Internet connection ) Pathping/mtr (check the path characteristics), and
Route (for the current status of routing table) are used as tools and Techniques for the
Troubleshooting (Willkins, 2011).
Question 16
For the security, developer implemented the SSL. SSL implementation used domain names, self-
signed SSL Certificates, and enterprise CA. after the implementation SSL security, developer
checked LAN network performance, working, connectivity with sever, packet path, and security.
Tester focused on the security of the system.
Question 17
Validation is a behaviour for DNS servers which defined sever properties. It is checked that DNS
Server IP is dynamic issuance so the administrator setting needs correct value. For this DNS
server contained TCP\IP Properties UI. TCP\IP Properties UI is a validation wizard which
disables by default. NDF (Network Diagnostics Framework) is chosen for Validates settings.
Question 19
Server status
Sever load 9.04 (4 CPU)
Memory used 78%
Cpsrvd up
Swap used 0.04%
(/user) 63%
(/temp) 3%
(/boot) 25%
(/home) 20 %
(/var) 89 %
(/) 50%
Student Name ICTNWK504 Date
Ping (checking the connectivty), Tracert (track the path of packet), Ipconfig/ifconfig (ip address
configruation), Nslookup (for the resolve Dynamic Name System issue), Netstat (info to
discovery for a variety of causes), PuTTY/Tera Term (for the connecting to a variety), IP
Calculator and subnet (for the correct IP address configuration), pingtest.net or Speedtest.net (for
the check quality of the Internet connection ) Pathping/mtr (check the path characteristics), and
Route (for the current status of routing table) are used as tools and Techniques for the
Troubleshooting (Willkins, 2011).
Question 16
For the security, developer implemented the SSL. SSL implementation used domain names, self-
signed SSL Certificates, and enterprise CA. after the implementation SSL security, developer
checked LAN network performance, working, connectivity with sever, packet path, and security.
Tester focused on the security of the system.
Question 17
Validation is a behaviour for DNS servers which defined sever properties. It is checked that DNS
Server IP is dynamic issuance so the administrator setting needs correct value. For this DNS
server contained TCP\IP Properties UI. TCP\IP Properties UI is a validation wizard which
disables by default. NDF (Network Diagnostics Framework) is chosen for Validates settings.
Question 19
Server status
Sever load 9.04 (4 CPU)
Memory used 78%
Cpsrvd up
Swap used 0.04%
(/user) 63%
(/temp) 3%
(/boot) 25%
(/home) 20 %
(/var) 89 %
(/) 50%
Student Name ICTNWK504 Date

9
Question 18
Server configuration and operational
Defined the IP domain name
Explain the DNS servers for the network
Assigned DHCP excluded-address in the network IP address.
Designed the DHCP Pool for the router and also configuration the mode.
Defined the subnet address in the DHCP pool. It is an optional part.
Import all parameters for the DHCP pool.
Explain the Domain for client and server. Also designed DNS domain.
In the end, do the global configuration (Cisco, 2014).
Question 20
Clean up and restore the worksite.
Enable the vaults before the create Clean up and restore process.
Developed the replicate for the vaults data in the given time.
Then perform the Clean-up and restore operation on database or single site in the multiple
environments.
For the better performance, the network needs a SQL database (Knowledge, 2018)
Question 21
The user used sign Off to attach the digital signature in the documents that offered universal
acceptance and highest levels security. It based on the Channel Islands which defined data access
laws. For the sign Off user use two-step verification. In the two-step verification, the user gets
one-time password their Authentication number or email id. After the entered user can the
network system.
Question 22
Documentation for the LAN network:
Designed the network documentation strategy.
Designed the network topology diagram with IP addresses, Document server names, and
roles
Track each server in the LAN network.
Defined the software versions and licenses key.
It includes hardware components, Active Directory and backup procedures.
Student Name ICTNWK504 Date
Question 18
Server configuration and operational
Defined the IP domain name
Explain the DNS servers for the network
Assigned DHCP excluded-address in the network IP address.
Designed the DHCP Pool for the router and also configuration the mode.
Defined the subnet address in the DHCP pool. It is an optional part.
Import all parameters for the DHCP pool.
Explain the Domain for client and server. Also designed DNS domain.
In the end, do the global configuration (Cisco, 2014).
Question 20
Clean up and restore the worksite.
Enable the vaults before the create Clean up and restore process.
Developed the replicate for the vaults data in the given time.
Then perform the Clean-up and restore operation on database or single site in the multiple
environments.
For the better performance, the network needs a SQL database (Knowledge, 2018)
Question 21
The user used sign Off to attach the digital signature in the documents that offered universal
acceptance and highest levels security. It based on the Channel Islands which defined data access
laws. For the sign Off user use two-step verification. In the two-step verification, the user gets
one-time password their Authentication number or email id. After the entered user can the
network system.
Question 22
Documentation for the LAN network:
Designed the network documentation strategy.
Designed the network topology diagram with IP addresses, Document server names, and
roles
Track each server in the LAN network.
Defined the software versions and licenses key.
It includes hardware components, Active Directory and backup procedures.
Student Name ICTNWK504 Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
At the end Label everything in the LAN network (Posey, 2008)
Question 23
Event log and Error types are as follow:
Miscellaneous: it is accessible to the user in the Informational manner. Miscellaneous does
not explosion the operating system.
Error logs: it is accessible to the authorized service provider. An error logs explosion the
operating system. Error logs are not hidden.
Informational logs: it is accessible to the user in the Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Hidden logs: it is accessible to the user in the not Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Question 24
Authentication methods and protocols:
Password Authentication Protocol: it used at the begging of the application server. PAP protocols
are used for username and password during the connection established.
AAA protocols: it referred for Authentication (verify the user Authentication), Authorization
(control the server data), and Accounting (managed the resource of severing)
Challenge-handshake authentication protocol
It used to initialize the server and host. CHAP used the MD5 hash function for the encryption.
The authentication process may be success or unsuccess.
Question 25
Compatibility issues
It needs to pay for commercial version and the trial version is available for 30 -45 days.
There are compatibility and conflicts with software.
It developed and designed for the program.
The product needs OSI design certification.
It is an open source software so there is a security issue.
Question 26
Student Name ICTNWK504 Date
At the end Label everything in the LAN network (Posey, 2008)
Question 23
Event log and Error types are as follow:
Miscellaneous: it is accessible to the user in the Informational manner. Miscellaneous does
not explosion the operating system.
Error logs: it is accessible to the authorized service provider. An error logs explosion the
operating system. Error logs are not hidden.
Informational logs: it is accessible to the user in the Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Hidden logs: it is accessible to the user in the not Informational manner. Hidden logs
explosion the operating system. Logs are not hidden.
Question 24
Authentication methods and protocols:
Password Authentication Protocol: it used at the begging of the application server. PAP protocols
are used for username and password during the connection established.
AAA protocols: it referred for Authentication (verify the user Authentication), Authorization
(control the server data), and Accounting (managed the resource of severing)
Challenge-handshake authentication protocol
It used to initialize the server and host. CHAP used the MD5 hash function for the encryption.
The authentication process may be success or unsuccess.
Question 25
Compatibility issues
It needs to pay for commercial version and the trial version is available for 30 -45 days.
There are compatibility and conflicts with software.
It developed and designed for the program.
The product needs OSI design certification.
It is an open source software so there is a security issue.
Question 26
Student Name ICTNWK504 Date

11
Secure File System is a collection of the program which produced and managed encryption disk
volumes that run on window and DOS. DOS storage data in an encryption format the individual-
sector level. DOS managed loaded and unloaded Encrypted volumes. It designed a secure
software design and programming (Cs, 1996).
Question 27
sp_trace_setfilter: it tracked the process event.
Server Distributed Replay: it balanced the load In the network.
Live Query Statistics: it used debugging process in the network.
DBCC: it measures the database logical and physical person (Guyer, 2017).
Question 28
Troubleshooting tools and Techniques for the network diagnostic utilities are as follows:
Ping has checked the connectivity between host and destination.
Tracker used for the track the packet path.
Nslookup resolve Dynamic Name System issue.
Route controlled and monitored routing table.
Speedtest.net measure the quality of the Internet connection.
IP Calculator used to configure the network connection.
Question 29
The application server is designed for the high-end consumer or business applications which is
connected remote and local server.
Compatibility issues and resolution procedures:
Need to install the software.
Vendor solution needs to accessing the software packages.
For the software and hardware compatible, the need for hardware configuration.
Need to copies all document in the correct folder and also need for the recognized correct path.
There is an application software incompatible issue with the operating system (Hart, 2016).
Student Name ICTNWK504 Date
Secure File System is a collection of the program which produced and managed encryption disk
volumes that run on window and DOS. DOS storage data in an encryption format the individual-
sector level. DOS managed loaded and unloaded Encrypted volumes. It designed a secure
software design and programming (Cs, 1996).
Question 27
sp_trace_setfilter: it tracked the process event.
Server Distributed Replay: it balanced the load In the network.
Live Query Statistics: it used debugging process in the network.
DBCC: it measures the database logical and physical person (Guyer, 2017).
Question 28
Troubleshooting tools and Techniques for the network diagnostic utilities are as follows:
Ping has checked the connectivity between host and destination.
Tracker used for the track the packet path.
Nslookup resolve Dynamic Name System issue.
Route controlled and monitored routing table.
Speedtest.net measure the quality of the Internet connection.
IP Calculator used to configure the network connection.
Question 29
The application server is designed for the high-end consumer or business applications which is
connected remote and local server.
Compatibility issues and resolution procedures:
Need to install the software.
Vendor solution needs to accessing the software packages.
For the software and hardware compatible, the need for hardware configuration.
Need to copies all document in the correct folder and also need for the recognized correct path.
There is an application software incompatible issue with the operating system (Hart, 2016).
Student Name ICTNWK504 Date

12
Questions
Question 1
A computer server is used for an interaction between an application and operating system. This
interaction process is completed across an external and internal network of a computer system. It
has two architecture or types, Hub and Spoke model and Network-Centric bus model, which is
also known as message-bus-model. These both types used to discuss with stakeholder and client.
Question2
For preparation, the work of design and implemented an integrated server solution, it is required
to have the knowledge about the server and its components. The knowledge of network operating
system is required for implementing a network. The issues regarding the application and
compatibilities are required to solve by knowledge. Various tools and techniques used to monitor
the system.
Question 3
It is required to take the permission for approval to access the website from the administrator. An
administrator is the admin of a website and during arranging the website, user have access the
website until it will upload on the server after uploading the website on the server, it can access
by administrator only.
Question 4
System deployment is a part of SDLC (software development lifecycle). The client advised to
potential down and deployment with four factors like,
Identify deployment strategy and understand audience who are deployment
Installation testing and release regularly with start planning
Recognise deployment, reduce pre-production and testing the software
Remember the data and announce the deployment
Question 5
The developer makes the websites and wants the authentication of the website. If the other
person involved in the development or in a process that time it will effective by the other
Student Name ICTNWK504 Date
Questions
Question 1
A computer server is used for an interaction between an application and operating system. This
interaction process is completed across an external and internal network of a computer system. It
has two architecture or types, Hub and Spoke model and Network-Centric bus model, which is
also known as message-bus-model. These both types used to discuss with stakeholder and client.
Question2
For preparation, the work of design and implemented an integrated server solution, it is required
to have the knowledge about the server and its components. The knowledge of network operating
system is required for implementing a network. The issues regarding the application and
compatibilities are required to solve by knowledge. Various tools and techniques used to monitor
the system.
Question 3
It is required to take the permission for approval to access the website from the administrator. An
administrator is the admin of a website and during arranging the website, user have access the
website until it will upload on the server after uploading the website on the server, it can access
by administrator only.
Question 4
System deployment is a part of SDLC (software development lifecycle). The client advised to
potential down and deployment with four factors like,
Identify deployment strategy and understand audience who are deployment
Installation testing and release regularly with start planning
Recognise deployment, reduce pre-production and testing the software
Remember the data and announce the deployment
Question 5
The developer makes the websites and wants the authentication of the website. If the other
person involved in the development or in a process that time it will effective by the other
Student Name ICTNWK504 Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
involvement to the website. For stopping this involvement of another person, the developer
creates a code that is open to only the developer.
Question 6
There are various authentication methods for a server or a website like,
Password authentication protocol
Challenge-handshake authentication protocol
Enabling CHAP
Enable authentication protocol
DNIS Authentication
Enable ANI authorization
An operating system that design to support, personal computer, workstation, and an older
terminal which are connects to LAN (local area network).it provides common file system,
database sharing a printer and many more techniques
Question 7
Authentication methods are used to identify some like, user, device, an entity. It has different
types like,
Password Authentication Protocol
Challenge Handshake Authentication Protocol
Microsoft challenge Handshake authentication protocol
Microsoft challenge Handshake authentication protocol Version 2
Extensible Authentication Protocol
DNIS Authorization
ANI Authorization
Question 8
There are some compatibility issue regarding the window seven operating system, these are
User account control
Windows resource protection
Internet Explorer protected
Operating system and IE version
Session 0 isolation
New folder location (Microsoft, 2018)
Student Name ICTNWK504 Date
involvement to the website. For stopping this involvement of another person, the developer
creates a code that is open to only the developer.
Question 6
There are various authentication methods for a server or a website like,
Password authentication protocol
Challenge-handshake authentication protocol
Enabling CHAP
Enable authentication protocol
DNIS Authentication
Enable ANI authorization
An operating system that design to support, personal computer, workstation, and an older
terminal which are connects to LAN (local area network).it provides common file system,
database sharing a printer and many more techniques
Question 7
Authentication methods are used to identify some like, user, device, an entity. It has different
types like,
Password Authentication Protocol
Challenge Handshake Authentication Protocol
Microsoft challenge Handshake authentication protocol
Microsoft challenge Handshake authentication protocol Version 2
Extensible Authentication Protocol
DNIS Authorization
ANI Authorization
Question 8
There are some compatibility issue regarding the window seven operating system, these are
User account control
Windows resource protection
Internet Explorer protected
Operating system and IE version
Session 0 isolation
New folder location (Microsoft, 2018)
Student Name ICTNWK504 Date

14
Question9
The process to test and access the compatibility test with the resolution process is as follows:
Establishing the testing scope
Define the testing methodology
Identifying resource requirements
Defining Pass-Fail criteria
Testing application
Testing strategies
Commercial and custom application
Test deployment scenarios
Upgrade scenario, clean installation scenario, access data, test printing (Microsoft, 2017)
The resolution process:
Upgrade the operating system
Windows easy transfer
Question 10
Redundancy used to control the system in fault conditions. It has various types:
Cold Redundancy
Warm redundancy
Hot redundancy
Coding redundancy
Inter-pixel spatial redundancy
Psych visual redundancy (Ques, 2016)
The types of replication for authentication models:
Snapshot replication
Transactional replication
Merge replication
Locally redundant storage
Zone-redundant storage
Geo-redundant storage
Read-access-geo-redundant storage (Microsoft, 2018)
Student Name ICTNWK504 Date
Question9
The process to test and access the compatibility test with the resolution process is as follows:
Establishing the testing scope
Define the testing methodology
Identifying resource requirements
Defining Pass-Fail criteria
Testing application
Testing strategies
Commercial and custom application
Test deployment scenarios
Upgrade scenario, clean installation scenario, access data, test printing (Microsoft, 2017)
The resolution process:
Upgrade the operating system
Windows easy transfer
Question 10
Redundancy used to control the system in fault conditions. It has various types:
Cold Redundancy
Warm redundancy
Hot redundancy
Coding redundancy
Inter-pixel spatial redundancy
Psych visual redundancy (Ques, 2016)
The types of replication for authentication models:
Snapshot replication
Transactional replication
Merge replication
Locally redundant storage
Zone-redundant storage
Geo-redundant storage
Read-access-geo-redundant storage (Microsoft, 2018)
Student Name ICTNWK504 Date

15
Question 11
The High availability term is used to define the time-period of availability of the services. It
contains the time which required by a system for responding the user request. It requires
specialised configuration and software to work. The high availability options for the server are:
Microsoft SQL
Oracle Database High Availability
Database Cluster
Question12
To produce an integrated full server design, there is some information requires which are as
follows:
Required good communication skills for business related and operational matters
Literacy and numeracy skill for interpreted results and documentation with measurement
Skill for planning, priorities, and monitor the work
Technical skills like design, integrated solution of server, implementation and diagnostics
network and server
Also required knowledge about,
LDAL and Kerberos
Resolution process and compatibility issues with knowledge of NOS (network operating system)
File system security and event reporting and logging
Question 13
Some actions are required to implement an integrated authentication solution which is as
follows:
Multi-factor is hard to secure
Multi-factor authentication is hard to develop in java
Multi-factor authentication is hard to test in Java
Multi-factor authentication is tough to support
Question 14
A client-server application in which user saves and update the files as they are working on their
own computer system. The NFS protocol is a distributed file system standard which uses for
(NAS) network-attached storage.
Student Name ICTNWK504 Date
Question 11
The High availability term is used to define the time-period of availability of the services. It
contains the time which required by a system for responding the user request. It requires
specialised configuration and software to work. The high availability options for the server are:
Microsoft SQL
Oracle Database High Availability
Database Cluster
Question12
To produce an integrated full server design, there is some information requires which are as
follows:
Required good communication skills for business related and operational matters
Literacy and numeracy skill for interpreted results and documentation with measurement
Skill for planning, priorities, and monitor the work
Technical skills like design, integrated solution of server, implementation and diagnostics
network and server
Also required knowledge about,
LDAL and Kerberos
Resolution process and compatibility issues with knowledge of NOS (network operating system)
File system security and event reporting and logging
Question 13
Some actions are required to implement an integrated authentication solution which is as
follows:
Multi-factor is hard to secure
Multi-factor authentication is hard to develop in java
Multi-factor authentication is hard to test in Java
Multi-factor authentication is tough to support
Question 14
A client-server application in which user saves and update the files as they are working on their
own computer system. The NFS protocol is a distributed file system standard which uses for
(NAS) network-attached storage.
Student Name ICTNWK504 Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16
Question 15
File-sharing services provide facility to share the files to another system or device by the
internet. There are various kinds of file sharing solution which are as follows:
ShareFile
Dropbox Business
Google Drive
Apple I Cloud
Egnyte
SugarSync
ShareFile: it is Citrix’s one-stop-shop for transferring the business file. It has features like sync
data from a variety of application, manage file transfer in own way.
Google Drive: it provides services to share file, photos, and videos from a single location.
Automatically syncs the data from the device with linked accounts (Hilsberg, 2018).
Question 16
The workstations have different operating system and configuration. Here are some actions
which required following for configuring a workstation:
Specify product license key
Create optim directory
Create DB Aliases
Optim Security
Configure Options
Export registry data
Configure the workstation
Question 17
The security features are important for an integrated server to making secure the server of an
organization. It includes the features like:
Remote access
Remove unnecessary services
Separate development/production environment/testing
Web application server and content-side scripting
Permission and privileges
Install all security patches
Audit and monitor the server
Remove unused module and use security tool for web server software (Acunetix, 2018)
Student Name ICTNWK504 Date
Question 15
File-sharing services provide facility to share the files to another system or device by the
internet. There are various kinds of file sharing solution which are as follows:
ShareFile
Dropbox Business
Google Drive
Apple I Cloud
Egnyte
SugarSync
ShareFile: it is Citrix’s one-stop-shop for transferring the business file. It has features like sync
data from a variety of application, manage file transfer in own way.
Google Drive: it provides services to share file, photos, and videos from a single location.
Automatically syncs the data from the device with linked accounts (Hilsberg, 2018).
Question 16
The workstations have different operating system and configuration. Here are some actions
which required following for configuring a workstation:
Specify product license key
Create optim directory
Create DB Aliases
Optim Security
Configure Options
Export registry data
Configure the workstation
Question 17
The security features are important for an integrated server to making secure the server of an
organization. It includes the features like:
Remote access
Remove unnecessary services
Separate development/production environment/testing
Web application server and content-side scripting
Permission and privileges
Install all security patches
Audit and monitor the server
Remove unused module and use security tool for web server software (Acunetix, 2018)
Student Name ICTNWK504 Date

17
Question 18
The software testing used to check the performance in terms of stability and responsiveness
under a workload. It can also do the investigation, validation, measurement and verify the
attribute of other quality. The various testing tool is
WebLOAD
LoadUI NG Pro
SmartMeter.io
Apache JMeter
LoadRunner
Appvance
NeoLoad (Softwaretestinghelp, 2018)
Question 19
A test plan is used to test the speed, scalability and stability of the server or network. It has
various types, load testing, stress testing, endurance testing, spike testing, volume and scalability
testing. It included varies process to ensure the running status of the server.
Identify the environment of testing
Identify the performance criteria
Plan and design test of performance
Configuration the test environment
Implementation and run the test with analysing, tune and retest (Guru99, 2018)
Question 20
Sometimes few errors occur during server implement or establishment. It can occur in
connectivity or at any point. An error report generates after resolving the error. If the error
regarding the connectivity of server then it can be resolved by maintaining or check the hardware
like, router, switch. Such kinds of response, each error can resolve by the solution and analysis of
error report.
Question 21
The troubleshooting tool is necessary for network administrator on the starting of networking
field. There are various types of tools as follows:
Ping: the ping utility used to provide connectivity test between destination host and requesting
host. Used ICMP (Internet control message protocol) to complete the process
Subnet and IP calculator: it is used at senior level engineer to calculate more experience in the
field.
Student Name ICTNWK504 Date
Question 18
The software testing used to check the performance in terms of stability and responsiveness
under a workload. It can also do the investigation, validation, measurement and verify the
attribute of other quality. The various testing tool is
WebLOAD
LoadUI NG Pro
SmartMeter.io
Apache JMeter
LoadRunner
Appvance
NeoLoad (Softwaretestinghelp, 2018)
Question 19
A test plan is used to test the speed, scalability and stability of the server or network. It has
various types, load testing, stress testing, endurance testing, spike testing, volume and scalability
testing. It included varies process to ensure the running status of the server.
Identify the environment of testing
Identify the performance criteria
Plan and design test of performance
Configuration the test environment
Implementation and run the test with analysing, tune and retest (Guru99, 2018)
Question 20
Sometimes few errors occur during server implement or establishment. It can occur in
connectivity or at any point. An error report generates after resolving the error. If the error
regarding the connectivity of server then it can be resolved by maintaining or check the hardware
like, router, switch. Such kinds of response, each error can resolve by the solution and analysis of
error report.
Question 21
The troubleshooting tool is necessary for network administrator on the starting of networking
field. There are various types of tools as follows:
Ping: the ping utility used to provide connectivity test between destination host and requesting
host. Used ICMP (Internet control message protocol) to complete the process
Subnet and IP calculator: it is used at senior level engineer to calculate more experience in the
field.
Student Name ICTNWK504 Date

18
In other tools, tracer or traceroute, Ipconfig or ifconfig, Nslookup, Netstat, Putty/Tera Term and
many more (Wilkins, 2018)
Question 22
A Verification of active human-machine transfer with required credentials for user confirmation
and authenticity is known as user authentication. It performs human-machine or computer
interaction on both type’s network, wired and wireless. To make secure communication, it
provides ID and password to authentication (Rouse, 2014).
Question23
A customizable information store which works as a single point where user locates and
distributed the services throughout the network. It also allows the administrator to manage its
attributes and objects. In the features of directory services,
There is no dependency of the system on physical location
Both (administrator and user) can search information from various sources or locations
(dummies, 2018).
Question24
The testing processes it just to check the product during coding stage or development phase. The
changes required on client demand as addition or alteration to deliveries of the project. The client
pays for the changes and satisfies by the work done. Changes in management are quite difficult
on the basis of agreement and details documentation.
Question25
To validate the changes, there are some validation techniques which are used for changes:
Formal Methods: it is both validation and verification technique which used the logical and
mathematical technique to analyse and express the verification.
Fault Injection: use software or hardware to observe the system operation.
Hardware/Software fault injection
Risk/Hazard analysis
Dependability analysis
Question 26
Student Name ICTNWK504 Date
In other tools, tracer or traceroute, Ipconfig or ifconfig, Nslookup, Netstat, Putty/Tera Term and
many more (Wilkins, 2018)
Question 22
A Verification of active human-machine transfer with required credentials for user confirmation
and authenticity is known as user authentication. It performs human-machine or computer
interaction on both type’s network, wired and wireless. To make secure communication, it
provides ID and password to authentication (Rouse, 2014).
Question23
A customizable information store which works as a single point where user locates and
distributed the services throughout the network. It also allows the administrator to manage its
attributes and objects. In the features of directory services,
There is no dependency of the system on physical location
Both (administrator and user) can search information from various sources or locations
(dummies, 2018).
Question24
The testing processes it just to check the product during coding stage or development phase. The
changes required on client demand as addition or alteration to deliveries of the project. The client
pays for the changes and satisfies by the work done. Changes in management are quite difficult
on the basis of agreement and details documentation.
Question25
To validate the changes, there are some validation techniques which are used for changes:
Formal Methods: it is both validation and verification technique which used the logical and
mathematical technique to analyse and express the verification.
Fault Injection: use software or hardware to observe the system operation.
Hardware/Software fault injection
Risk/Hazard analysis
Dependability analysis
Question 26
Student Name ICTNWK504 Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19
Documentation is a written material which used to define the hardware and software application
of a computer system. It makes the relation between system and their configurations. Here are
the types of documentation which need to make a relation.
Project Documentation
Test Documentation
Team Documentation
User Documentation
Technical Documentation (Hanks, 2017)
Question27
The information regarding complete the client report is as follows:
Organization need to create individual report or record of the client. The purpose of the report is
to maintain information and records with the provided information. The client can’t access these
records because it’s the property of the organization. An authentication process is required to
maintain the records of the client.
Question28
A project is made on client’s requirement and it needs to be complete the worksite for client
satisfaction. The security concern on the server or website is the first requirement to complete,
the flexibility and responsiveness quality of the server is demanding by the clients. The facility
of backup and restore provided for client satisfaction. These are some need to complete for client
satisfaction.
Question29
The documentation is required for each process of an organization. It is valid permission to do
any task. The signoff from any application or work or may be any organization, it is required to
take a clean slip from the organization. If you are signoff from a server or website, then check
data properly and take a back-up in every week. Delete the history and cache memory from the
browser after signoff.
Question 30
Print Management: it is used in a particular to provide the access to printers. The administrator
controls the print device and manages the network printing with the availability of printers.
Student Name ICTNWK504 Date
Documentation is a written material which used to define the hardware and software application
of a computer system. It makes the relation between system and their configurations. Here are
the types of documentation which need to make a relation.
Project Documentation
Test Documentation
Team Documentation
User Documentation
Technical Documentation (Hanks, 2017)
Question27
The information regarding complete the client report is as follows:
Organization need to create individual report or record of the client. The purpose of the report is
to maintain information and records with the provided information. The client can’t access these
records because it’s the property of the organization. An authentication process is required to
maintain the records of the client.
Question28
A project is made on client’s requirement and it needs to be complete the worksite for client
satisfaction. The security concern on the server or website is the first requirement to complete,
the flexibility and responsiveness quality of the server is demanding by the clients. The facility
of backup and restore provided for client satisfaction. These are some need to complete for client
satisfaction.
Question29
The documentation is required for each process of an organization. It is valid permission to do
any task. The signoff from any application or work or may be any organization, it is required to
take a clean slip from the organization. If you are signoff from a server or website, then check
data properly and take a back-up in every week. Delete the history and cache memory from the
browser after signoff.
Question 30
Print Management: it is used in a particular to provide the access to printers. The administrator
controls the print device and manages the network printing with the availability of printers.
Student Name ICTNWK504 Date

20
File Management: it kept the data secure in a central location and access by an only authorised
person. It permits the user to save file remote server, local hard disk or sharing with other users
(Sqa, 2018).
Question31
The file system maintains the security in a various way like,
Provide the access to selected users
Access the system or delete, modify a file is control by the list of access control or
capabilities
Use backup and recovery operation
To make more secure the file system, capabilities used by the operating system as ext3 or
NTFS (mobark, 2017).
Question32
The network configuration of VNFs has following steps:
Click on HOME for design and toolbar
Click on Edit service to configure it
Click function configuration to build pages
Change the setting of base configuration tab
Click on Apply and repeat to change again (juniper, 2018)
Question 33
The various security measures to protect the server are as follows:
SSH Keys
Firewalls
VPNs and Private Networking
TLS/SSL Encryption and Public Key Infrastructure
Service Auditing
Intrusion Detection System and File Auditing
Isolated Execution Environment (Ellingwood, 2015)
Question 34
System software is called utility software which is design to help the computer to analyse,
maintain and optimise it. The list of support utilities are as follows:
Student Name ICTNWK504 Date
File Management: it kept the data secure in a central location and access by an only authorised
person. It permits the user to save file remote server, local hard disk or sharing with other users
(Sqa, 2018).
Question31
The file system maintains the security in a various way like,
Provide the access to selected users
Access the system or delete, modify a file is control by the list of access control or
capabilities
Use backup and recovery operation
To make more secure the file system, capabilities used by the operating system as ext3 or
NTFS (mobark, 2017).
Question32
The network configuration of VNFs has following steps:
Click on HOME for design and toolbar
Click on Edit service to configure it
Click function configuration to build pages
Change the setting of base configuration tab
Click on Apply and repeat to change again (juniper, 2018)
Question 33
The various security measures to protect the server are as follows:
SSH Keys
Firewalls
VPNs and Private Networking
TLS/SSL Encryption and Public Key Infrastructure
Service Auditing
Intrusion Detection System and File Auditing
Isolated Execution Environment (Ellingwood, 2015)
Question 34
System software is called utility software which is design to help the computer to analyse,
maintain and optimise it. The list of support utilities are as follows:
Student Name ICTNWK504 Date

21
Anti-virus, backup software, disk cleaner, data compression, cryptography, data synchronization,
disk compression or defragmenters, file managers, package managers and many more
Question 35
The project management has various steps to manage it and its task. The steps to manage a
project:
Be Agile
Do Not Micromanage
Improve project management practice
Ongoing planning
Communicate and visualise all activities and project deliverables
Step by step deliveries
Risk management
Open communication (Ahn, 2016)
Question 36
Task scheduler is used to execute a task like, start the application, show a message and send an
email. A project management is based on the task scheduling. It divides the task into short terms
and manages well. There is some limitation of task scheduling like:
Server Sprawl
Custom Scripting
Dependencies
Reporting
Student Name ICTNWK504 Date
Anti-virus, backup software, disk cleaner, data compression, cryptography, data synchronization,
disk compression or defragmenters, file managers, package managers and many more
Question 35
The project management has various steps to manage it and its task. The steps to manage a
project:
Be Agile
Do Not Micromanage
Improve project management practice
Ongoing planning
Communicate and visualise all activities and project deliverables
Step by step deliveries
Risk management
Open communication (Ahn, 2016)
Question 36
Task scheduler is used to execute a task like, start the application, show a message and send an
email. A project management is based on the task scheduling. It divides the task into short terms
and manages well. There is some limitation of task scheduling like:
Server Sprawl
Custom Scripting
Dependencies
Reporting
Student Name ICTNWK504 Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22
References
Acunetix. (2018). Keeping Web and Database Servers Secure. [online] Available at:
https://www.acunetix.com/websitesecurity/webserver-security/ [Accessed 7 Mar. 2018].
Ahn, L. (2016). 10 Rules of Highly Successful Project Management. [online] Project Smart.
Available at: https://www.projectsmart.co.uk/10-rules-of-highly-successful-project-
management.php [Accessed 7 Mar. 2018].
Austin, J. (2015). Better, Faster, and more Reliable problem resolution for distributed
WebSphere Application Server (Application Integration Middleware Support Blog). [online]
Ibm.com. Available at:
https://www.ibm.com/developerworks/community/blogs/aimsupport/entry/
better_faster_more_reliable_problem_resolution_for_distributed_websphere_application_ser
ver?lang=en [Accessed 7 Mar. 2018].
Berkouwer, S. (2017). The things that are better left unspoken. [online] Available at:
https://dirteam.com/sander/2017/02/07/supported-azure-mfa-server-deployment-scenarios-
and-their-pros-and-cons/ [Accessed 8 Mar. 2018].
Cisco. (2014). Configuring a LAN with DHCP and VLANs [Support]. [online]
Available at:
https://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/
dhcpvlan.html [Accessed 8 Mar. 2018].
Cooper, S. (2016). 6 Required Components of a LAN. [online] Available at:
http://smallbusiness.chron.com/6-required-components-lan-26555.html [Accessed 8 Mar.
2018].
Cs. (1996). Secure FileSystem Information. [online] Available at:
https://www.cs.auckland.ac.nz/~pgut001/sfs/ [Accessed 8 Mar. 2018].
Docs. (n.d.). Chapter 1 Application Server Compatibility Issues (Sun GlassFish Enterprise
Server 2.1 Upgrade Guide). [online] Available at: https://docs.oracle.com/cd/E19879-
01/820-4331/abmaq/index.html [Accessed 7 Mar. 2018].
dummies. (2018). Defining Terms: What Is a Directory Service? - dummies. [online]
Available at: http://www.dummies.com/programming/networking/defining-terms-what-is-a-
directory-service/ [Accessed 7 Mar. 2018].
Egnyte. (2018). Cloud File Server features: online storage, file sharing, FTP, file transfer,
security and access control, user management - Egnyte Cloud File Server. [online] Available
at: https://www.egnyte.com/file-server/online-file-server-features.html [Accessed 8 Mar.
2018].
Ellingwood, J. (2015). 7 Security Measures to Protect Your Servers | DigitalOcean. [online]
Digitalocean. Available at: https://www.digitalocean.com/community/tutorials/7-security-
measures-to-protect-your-servers [Accessed 7 Mar. 2018].
Fcit. (n.d.). Chapter 6: Software. [online] Available at:
https://fcit.usf.edu/network/chap6/chap6.htm [Accessed 7 Mar. 2018].
Gladinet. (2018). Enterprise Private File Sharing Solution. [online] Available at:
http://www.gladinet.com/CloudEnterprise/PrivateShare.aspx [Accessed 8 Mar. 2018].
Student Name ICTNWK504 Date
References
Acunetix. (2018). Keeping Web and Database Servers Secure. [online] Available at:
https://www.acunetix.com/websitesecurity/webserver-security/ [Accessed 7 Mar. 2018].
Ahn, L. (2016). 10 Rules of Highly Successful Project Management. [online] Project Smart.
Available at: https://www.projectsmart.co.uk/10-rules-of-highly-successful-project-
management.php [Accessed 7 Mar. 2018].
Austin, J. (2015). Better, Faster, and more Reliable problem resolution for distributed
WebSphere Application Server (Application Integration Middleware Support Blog). [online]
Ibm.com. Available at:
https://www.ibm.com/developerworks/community/blogs/aimsupport/entry/
better_faster_more_reliable_problem_resolution_for_distributed_websphere_application_ser
ver?lang=en [Accessed 7 Mar. 2018].
Berkouwer, S. (2017). The things that are better left unspoken. [online] Available at:
https://dirteam.com/sander/2017/02/07/supported-azure-mfa-server-deployment-scenarios-
and-their-pros-and-cons/ [Accessed 8 Mar. 2018].
Cisco. (2014). Configuring a LAN with DHCP and VLANs [Support]. [online]
Available at:
https://www.cisco.com/en/US/docs/routers/access/800/850/software/configuration/guide/
dhcpvlan.html [Accessed 8 Mar. 2018].
Cooper, S. (2016). 6 Required Components of a LAN. [online] Available at:
http://smallbusiness.chron.com/6-required-components-lan-26555.html [Accessed 8 Mar.
2018].
Cs. (1996). Secure FileSystem Information. [online] Available at:
https://www.cs.auckland.ac.nz/~pgut001/sfs/ [Accessed 8 Mar. 2018].
Docs. (n.d.). Chapter 1 Application Server Compatibility Issues (Sun GlassFish Enterprise
Server 2.1 Upgrade Guide). [online] Available at: https://docs.oracle.com/cd/E19879-
01/820-4331/abmaq/index.html [Accessed 7 Mar. 2018].
dummies. (2018). Defining Terms: What Is a Directory Service? - dummies. [online]
Available at: http://www.dummies.com/programming/networking/defining-terms-what-is-a-
directory-service/ [Accessed 7 Mar. 2018].
Egnyte. (2018). Cloud File Server features: online storage, file sharing, FTP, file transfer,
security and access control, user management - Egnyte Cloud File Server. [online] Available
at: https://www.egnyte.com/file-server/online-file-server-features.html [Accessed 8 Mar.
2018].
Ellingwood, J. (2015). 7 Security Measures to Protect Your Servers | DigitalOcean. [online]
Digitalocean. Available at: https://www.digitalocean.com/community/tutorials/7-security-
measures-to-protect-your-servers [Accessed 7 Mar. 2018].
Fcit. (n.d.). Chapter 6: Software. [online] Available at:
https://fcit.usf.edu/network/chap6/chap6.htm [Accessed 7 Mar. 2018].
Gladinet. (2018). Enterprise Private File Sharing Solution. [online] Available at:
http://www.gladinet.com/CloudEnterprise/PrivateShare.aspx [Accessed 8 Mar. 2018].
Student Name ICTNWK504 Date

23
Guru99. (2018). Cite a Website - Cite This For Me. [online] Available at:
https://www.guru99.com/performance-testing.html [Accessed 7 Mar. 2018].
Guyer, C. (2017). Performance Monitoring and Tuning Tools. [online] Available at:
https://docs.microsoft.com/en-us/sql/relational-databases/performance/performance-
monitoring-and-tuning-tools [Accessed 8 Mar. 2018].
Hanks, G. (2017). Different Types of System Documentation. [online] Bizfluent. Available at:
https://bizfluent.com/facts-4962524-different-types-system-documentation.html [Accessed 7
Mar. 2018].
Hart. C, (2016). Common Support Problems. [online] Available at:
http://slideplayer.com/slide/9023319/ [Accessed 8 Mar. 2018].
Hillsberg, A. (2018). Top 10 File Sharing Services: Which One Is The Best? -
Financesonline.com. [online] Financesonline. Available at: https://financesonline.com/top-
10-file-sharing-services/ [Accessed 7 Mar. 2018].
Ibm. (2018). IBM Knowledge Center. [online] Available at:
https://www.ibm.com/support/knowledgecenter/en/SSMLNW_8.1.0/com.ibm.nex.optimd.ins
tall.doc/04Workstations/opinstall-r-configure_the_first_workstation.html [Accessed 8 Mar.
2018].
Ibm. (n.d.). IBM Knowledge Center. [online] Available at:
https://www.ibm.com/support/knowledgecenter/en/POWER8/p8hby/displayerrlog.htm
[Accessed 7 Mar. 2018].
Jain, R. (n.d.). Operating System and Process Monitoring Tools. [online] Cse. Available at:
https://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html [Accessed 7 Mar.
2018].
Juniper. (2018). Configuring Network Services - Technical Documentation - Support -
Juniper Networks. [online] Available at:
https://www.juniper.net/documentation/en_US/cso1.0/topics/task/configuration/nsd-network-
services-configuring.html [Accessed 7 Mar. 2018].
Knowledge. (2018). Back Up or Restore a Vault. [online] Available at:
https://knowledge.autodesk.com/support/vault-products/learn-explore/caas/CloudHelp/
cloudhelp/2018/ENU/Vault-Admin/files/GUID-B9EDA55D-EEC3-4CA4-B8C3-
F5C6F0B72290-htm.html [Accessed 8 Mar. 2018].
marklogic. (2018). Understanding and Using Security Guide. [online] Available at:
https://docs.marklogic.com/8.0/guide/security/external-auth [Accessed 7 Mar. 2018].
McHatton, D. (2018). 10 ways to reduce downtime with preventative maintenance. [online]
Gotosage.com. Available at: https://www.gotosage.com/blog/10-ways-to-reduce-downtime-
with-preventative-maintenance [Accessed 8 Mar. 2018].
microsoft. (2017). [online] Available at:
https://support.microsoft.com/en-us/help/244632/how-to-test-programs-for-compatibility-
with-windows [Accessed 7 Mar. 2018].
microsoft. (2018). Data replication in Azure Storage. [online] Available at:
https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy [Accessed 7
Mar. 2018].
Student Name ICTNWK504 Date
Guru99. (2018). Cite a Website - Cite This For Me. [online] Available at:
https://www.guru99.com/performance-testing.html [Accessed 7 Mar. 2018].
Guyer, C. (2017). Performance Monitoring and Tuning Tools. [online] Available at:
https://docs.microsoft.com/en-us/sql/relational-databases/performance/performance-
monitoring-and-tuning-tools [Accessed 8 Mar. 2018].
Hanks, G. (2017). Different Types of System Documentation. [online] Bizfluent. Available at:
https://bizfluent.com/facts-4962524-different-types-system-documentation.html [Accessed 7
Mar. 2018].
Hart. C, (2016). Common Support Problems. [online] Available at:
http://slideplayer.com/slide/9023319/ [Accessed 8 Mar. 2018].
Hillsberg, A. (2018). Top 10 File Sharing Services: Which One Is The Best? -
Financesonline.com. [online] Financesonline. Available at: https://financesonline.com/top-
10-file-sharing-services/ [Accessed 7 Mar. 2018].
Ibm. (2018). IBM Knowledge Center. [online] Available at:
https://www.ibm.com/support/knowledgecenter/en/SSMLNW_8.1.0/com.ibm.nex.optimd.ins
tall.doc/04Workstations/opinstall-r-configure_the_first_workstation.html [Accessed 8 Mar.
2018].
Ibm. (n.d.). IBM Knowledge Center. [online] Available at:
https://www.ibm.com/support/knowledgecenter/en/POWER8/p8hby/displayerrlog.htm
[Accessed 7 Mar. 2018].
Jain, R. (n.d.). Operating System and Process Monitoring Tools. [online] Cse. Available at:
https://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html [Accessed 7 Mar.
2018].
Juniper. (2018). Configuring Network Services - Technical Documentation - Support -
Juniper Networks. [online] Available at:
https://www.juniper.net/documentation/en_US/cso1.0/topics/task/configuration/nsd-network-
services-configuring.html [Accessed 7 Mar. 2018].
Knowledge. (2018). Back Up or Restore a Vault. [online] Available at:
https://knowledge.autodesk.com/support/vault-products/learn-explore/caas/CloudHelp/
cloudhelp/2018/ENU/Vault-Admin/files/GUID-B9EDA55D-EEC3-4CA4-B8C3-
F5C6F0B72290-htm.html [Accessed 8 Mar. 2018].
marklogic. (2018). Understanding and Using Security Guide. [online] Available at:
https://docs.marklogic.com/8.0/guide/security/external-auth [Accessed 7 Mar. 2018].
McHatton, D. (2018). 10 ways to reduce downtime with preventative maintenance. [online]
Gotosage.com. Available at: https://www.gotosage.com/blog/10-ways-to-reduce-downtime-
with-preventative-maintenance [Accessed 8 Mar. 2018].
microsoft. (2017). [online] Available at:
https://support.microsoft.com/en-us/help/244632/how-to-test-programs-for-compatibility-
with-windows [Accessed 7 Mar. 2018].
microsoft. (2018). Data replication in Azure Storage. [online] Available at:
https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy [Accessed 7
Mar. 2018].
Student Name ICTNWK504 Date

24
microsoft. (2018). Understand Compatibility Issues and why some Apps Fail on Windows 7.
[online] Available at: https://technet.microsoft.com/en-us/library/ee851680.aspx [Accessed 7
Mar. 2018].
mobark, A. (2017). File system security. [online] Slideshare. Available at:
https://www.slideshare.net/AmmArmobark/file-system-security-71767322 [Accessed 7 Mar.
2018].
Msdn. (2018). 2.2.4 Authentication Methods. [online] Available at:
https://msdn.microsoft.com/en-us/library/cc239679.aspx [Accessed 8 Mar. 2018].
Msdn. (2018). How to: Configure Microsoft Error Reporting. [online] Available at:
https://msdn.microsoft.com/en-us/library/bb219076(v=office.12).aspx#MicrosoftErrorReport
ing_AboutMicrosoftErrorReporting [Accessed 8 Mar. 2018].
Msdn. (2018). IIS Authentication Methods. [online] Available at:
https://msdn.microsoft.com/en-us/library/ee825205(v=cs.10).aspx [Accessed 8 Mar. 2018].
Ohspolicy. (2018). OHS Policies and Procedures. [online] Available at:
http://ohspolicy.com.au/ohs-policies-and-procedures/ [Accessed 8 Mar. 2018].
Posey, B. (2008). Ten steps for network documentation: Channel checklist. [online]
Available at: http://searchitchannel.techtarget.com/feature/Channel-Checklist-10-steps-for-
network-documentation [Accessed 8 Mar. 2018].
Ques10. (2016). What are different types of redundancies in digital image? Explain in
detail.. [online] Available at: http://www.ques10.com/p/7293/what-are-different-types-of-
redundancies-in-digi-1/ [Accessed 7 Mar. 2018].
Rouse, M. (2014). What is user authentication? - Definition from WhatIs.com. [online]
SearchSecurity. Available at: http://searchsecurity.techtarget.com/definition/user-
authentication [Accessed 7 Mar. 2018].
Softwaretestinghelp. (2018). Top 15 Performance Testing Tools and Load Testing Tools of
2018 — Software Testing Help. [online] Available at:
http://www.softwaretestinghelp.com/performance-testing-tools-load-testing-tools/ [Accessed
7 Mar. 2018].
Sqa. (2018). File and Print Servers. [online] Available at: https://www.sqa.org.uk/e-
learning/NetInf201CD/page_40.htm [Accessed 7 Mar. 2018].
Technet. (2018). Network Integration Services. [online] Available at:
https://technet.microsoft.com/en-us/library/cc976850.aspx [Accessed 8 Mar. 2018].
Wang, Y. (2002). Parallel task execution in LANs and performance analysis - IEEE
Conference Publication. [online] Available at: http://ieeexplore.ieee.org/document/472458/
[Accessed 8 Mar. 2018].
Wilkins, S. (2018). Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know.
[online] Pluralsight. Available at: https://www.pluralsight.com/blog/it-ops/network-
troubleshooting-tools [Accessed 7 Mar. 2018].
Wilkins, S (2011). Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know.
[online] Available at: https://www.pluralsight.com/blog/it-ops/network-troubleshooting-tools
[Accessed 8 Mar. 2018].
Student Name ICTNWK504 Date
microsoft. (2018). Understand Compatibility Issues and why some Apps Fail on Windows 7.
[online] Available at: https://technet.microsoft.com/en-us/library/ee851680.aspx [Accessed 7
Mar. 2018].
mobark, A. (2017). File system security. [online] Slideshare. Available at:
https://www.slideshare.net/AmmArmobark/file-system-security-71767322 [Accessed 7 Mar.
2018].
Msdn. (2018). 2.2.4 Authentication Methods. [online] Available at:
https://msdn.microsoft.com/en-us/library/cc239679.aspx [Accessed 8 Mar. 2018].
Msdn. (2018). How to: Configure Microsoft Error Reporting. [online] Available at:
https://msdn.microsoft.com/en-us/library/bb219076(v=office.12).aspx#MicrosoftErrorReport
ing_AboutMicrosoftErrorReporting [Accessed 8 Mar. 2018].
Msdn. (2018). IIS Authentication Methods. [online] Available at:
https://msdn.microsoft.com/en-us/library/ee825205(v=cs.10).aspx [Accessed 8 Mar. 2018].
Ohspolicy. (2018). OHS Policies and Procedures. [online] Available at:
http://ohspolicy.com.au/ohs-policies-and-procedures/ [Accessed 8 Mar. 2018].
Posey, B. (2008). Ten steps for network documentation: Channel checklist. [online]
Available at: http://searchitchannel.techtarget.com/feature/Channel-Checklist-10-steps-for-
network-documentation [Accessed 8 Mar. 2018].
Ques10. (2016). What are different types of redundancies in digital image? Explain in
detail.. [online] Available at: http://www.ques10.com/p/7293/what-are-different-types-of-
redundancies-in-digi-1/ [Accessed 7 Mar. 2018].
Rouse, M. (2014). What is user authentication? - Definition from WhatIs.com. [online]
SearchSecurity. Available at: http://searchsecurity.techtarget.com/definition/user-
authentication [Accessed 7 Mar. 2018].
Softwaretestinghelp. (2018). Top 15 Performance Testing Tools and Load Testing Tools of
2018 — Software Testing Help. [online] Available at:
http://www.softwaretestinghelp.com/performance-testing-tools-load-testing-tools/ [Accessed
7 Mar. 2018].
Sqa. (2018). File and Print Servers. [online] Available at: https://www.sqa.org.uk/e-
learning/NetInf201CD/page_40.htm [Accessed 7 Mar. 2018].
Technet. (2018). Network Integration Services. [online] Available at:
https://technet.microsoft.com/en-us/library/cc976850.aspx [Accessed 8 Mar. 2018].
Wang, Y. (2002). Parallel task execution in LANs and performance analysis - IEEE
Conference Publication. [online] Available at: http://ieeexplore.ieee.org/document/472458/
[Accessed 8 Mar. 2018].
Wilkins, S. (2018). Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know.
[online] Pluralsight. Available at: https://www.pluralsight.com/blog/it-ops/network-
troubleshooting-tools [Accessed 7 Mar. 2018].
Wilkins, S (2011). Top 10 Basic Network Troubleshooting Tools Every IT Pro Should Know.
[online] Available at: https://www.pluralsight.com/blog/it-ops/network-troubleshooting-tools
[Accessed 8 Mar. 2018].
Student Name ICTNWK504 Date
1 out of 25
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.