Advanced Networking Concepts: Network Systems Administration Report
VerifiedAdded on 2022/08/20
|59
|3164
|15
Report
AI Summary
This report details the implementation and analysis of a network system, focusing on various network services within an Ubuntu environment. The assignment covers the setup and configuration of DHCP and DNS servers, including the creation of real and virtual hosts. It explores client-server interactions, Quality of Service (QoS) implementation, SSH security measures, and iptables firewall configuration. The report also includes testing and evaluation procedures to assess the performance of the implemented services. Furthermore, it reviews the protocols, mechanisms, and tools used in the network design, such as Apache web server and nslookup for testing. The objective is to provide a clear understanding of network system administration concepts and practical implementations for delivering network services.

NETWORK SYSTEM ADMINISTRATION
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Abstract
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.

Table of Contents
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52

Abbreviation
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1. Introduction
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
1
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
1

3. Literature Review
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
2
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
2

3.5 Used Tools in the Implemented Network
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
3
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

improvise the network service to increase the productivity and business
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
2) DNS server’s installation and configuration
3) Real host and virtual hosts set up
4
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
2) DNS server’s installation and configuration
3) Real host and virtual hosts set up
4

4) Configuration and interactions of client/server
5) QoS implementation
6) SSH’s securing
7) iptables firewall configuration
8) Testing and evaluating the designed network and the implemented services.
This proposed network is designed with the help of the existing network infrastructure
in lab E250 and E251.
6. Experimental Work & Analysis
This section show the investigation of the network system services by using Ubuntu,
and suitable mechanisms and protocols (Sverdlov, 2012).
6.1 DHCP Server Installing & Configuring
For DHCP server installation on Linux, first type the following command (Shahriar
Shovon, 2019):
5
5) QoS implementation
6) SSH’s securing
7) iptables firewall configuration
8) Testing and evaluating the designed network and the implemented services.
This proposed network is designed with the help of the existing network infrastructure
in lab E250 and E251.
6. Experimental Work & Analysis
This section show the investigation of the network system services by using Ubuntu,
and suitable mechanisms and protocols (Sverdlov, 2012).
6.1 DHCP Server Installing & Configuring
For DHCP server installation on Linux, first type the following command (Shahriar
Shovon, 2019):
5

Restart DHCP server (Wallen, 2019).
6
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Type the following command for opening the DHCP configuration file (How to Setup a
DHCP Server on Ubuntu 18.04, 2019):
7
DHCP Server on Ubuntu 18.04, 2019):
7

Type the below shown command for modifying the DHCP configuration file.
8
8

Then, in DCHP configuration add the net mask address.
9
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Type the following command displayed in the screenshot for starting the DHCP server, and
the system’s IP address must be checked.
At last, utilize nslookup method for checking the working ability of the DHCP server.
Thus, on a Linux machine the DHCP server installation is completed using the nslookup
method.
6.2 DNS Server Installing & Configuring
Here, DNS and SSH servers are installed and configured on a virtual machine one.
DNS server installing Process
In the beginning, complete Ubuntu virtual machine updating and then ensure DNS
server’s installation (Raj, 2020).
10
the system’s IP address must be checked.
At last, utilize nslookup method for checking the working ability of the DHCP server.
Thus, on a Linux machine the DHCP server installation is completed using the nslookup
method.
6.2 DNS Server Installing & Configuring
Here, DNS and SSH servers are installed and configured on a virtual machine one.
DNS server installing Process
In the beginning, complete Ubuntu virtual machine updating and then ensure DNS
server’s installation (Raj, 2020).
10

After the installation, complete the configuration of a DNS server on a virtual machine as
displayed in the following screenshot:
11
displayed in the following screenshot:
11

12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Next, continue the configuration of primary and secondary DNS server.
Primary DNS Server Configuring Processes
13
Primary DNS Server Configuring Processes
13

14

Forward Zone File Creation Processes
15
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

16

Reverse Zone File(s) Creation Processes
17
17

18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

BIND Configuring Syntax Checking Processes
19
19

The restarting BIND Process is shown below (Ellingwood and Anicas, 2018).
Secondary DNS Server Configuration Processes
20
Secondary DNS Server Configuration Processes
20

21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

22

DNS Clients Configuration Process
23
23

24
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

25

DNS client Testing Process
Forward zone
Reverse Zone
Perform DNs configuration file testing as follows:
26
Forward zone
Reverse Zone
Perform DNs configuration file testing as follows:
26

27
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

6.3 Real Host and Virtual Hosts Settings
Apache Virtual Hosts permit hosting multiple websites on a single server/machine
(Kumar Jaiswal, 2019; How to Setup Apache Virtual Hosts on Ubuntu 16.04 LTS, 2017).
Apache Web Server Installation
28
Apache Virtual Hosts permit hosting multiple websites on a single server/machine
(Kumar Jaiswal, 2019; How to Setup Apache Virtual Hosts on Ubuntu 16.04 LTS, 2017).
Apache Web Server Installation
28

29

30
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

31

32

Next, new virtual host files must be created.
33
33
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

File must be now copied to the first domain (Edwards, 2013):
# sudo cp /etc/apache2/sites-available/000-default.conf
/etc/apache2/sites-available/ubuntu.biz.conf
With the help of nano the new file must be opened (Helmke, Hudson and Hudson, 2017).
# sudo nano /etc/apache2/sites-available/ubuntu.biz.conf
In the configuration file do necessary modifications.
After saving, the configuration file must be existed.
Open the web browser and check the following URL:
34
# sudo cp /etc/apache2/sites-available/000-default.conf
/etc/apache2/sites-available/ubuntu.biz.conf
With the help of nano the new file must be opened (Helmke, Hudson and Hudson, 2017).
# sudo nano /etc/apache2/sites-available/ubuntu.biz.conf
In the configuration file do necessary modifications.
After saving, the configuration file must be existed.
Open the web browser and check the following URL:
34

The first virtual host is now functioning. Next, check the second virtual host.
But, this time visit the following URL of virtual host: https://debian.edu
6.4 Client/server Configuration and Interactions
DNS Clients Configuration Process
35
But, this time visit the following URL of virtual host: https://debian.edu
6.4 Client/server Configuration and Interactions
DNS Clients Configuration Process
35

36
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

37

38

6.5 Implementing Quality of Service (QoS)
On individual ports, or for a specific tenant network apply the QoS policies, where the
ports that have no policy will actually inherit these policies. Then tenants must be reviewed
and determine their id of creating the QoS policy (Chapter 10. Configure Quality-of-Service
(QoS) Red Hat OpenStack Platform 14, 2020):
QoS policy called bw-limiter must be created in admin tenant:
bw-limiter policy’s policing rules must be configured:
Neutron port must be configured for applying bw-limiter policy:
Continue reviewing of QoS rule, for instance:
39
On individual ports, or for a specific tenant network apply the QoS policies, where the
ports that have no policy will actually inherit these policies. Then tenants must be reviewed
and determine their id of creating the QoS policy (Chapter 10. Configure Quality-of-Service
(QoS) Red Hat OpenStack Platform 14, 2020):
QoS policy called bw-limiter must be created in admin tenant:
bw-limiter policy’s policing rules must be configured:
Neutron port must be configured for applying bw-limiter policy:
Continue reviewing of QoS rule, for instance:
39
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

6.6 Securing SSH
Installing and configuring the SSH server is displayed as follows (L, 2018).
SSH Installation Process
Start by updating the Ubuntu virtual machine, and continue SSH server’s installation
(Thomas and Vugt, 2011).
40
Installing and configuring the SSH server is displayed as follows (L, 2018).
SSH Installation Process
Start by updating the Ubuntu virtual machine, and continue SSH server’s installation
(Thomas and Vugt, 2011).
40

SSH Configuration Process
41
41

42
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

43

44

6.7 Firewall Configuration of iptables
By default, the Ubuntu servers have no restrictions, however for future reference, with
the help of the following command see the rules of the current iptable (Ruostemaa, 2019):
45
By default, the Ubuntu servers have no restrictions, however for future reference, with
the help of the following command see the rules of the current iptable (Ruostemaa, 2019):
45
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

For utilizing the iptables, add the rules for the permitted inbound traffic for the needed
services. Now, it is possible for the iptables to track the connection status. Thus, to continue
utilize the following command for establishing connections.
Various ways are available for making the rules permanent, among all select package,
iptables-persistant, which takes care of iptable saving and restoring.
46
services. Now, it is possible for the iptables to track the connection status. Thus, to continue
utilize the following command for establishing connections.
Various ways are available for making the rules permanent, among all select package,
iptables-persistant, which takes care of iptable saving and restoring.
46

Choose “Yes” option for the package to save the configuration.
7. Testing and Evaluation
DNS Testing Process
Forward zone
Reverse Zone
47
7. Testing and Evaluation
DNS Testing Process
Forward zone
Reverse Zone
47

Test DNS configuration file as follows.
48
48
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

49

DHCP Testing
Utilize nslookup method for checking whether the DHCP server is functioning well or not, by
following the below step:
As per the method like nslookup, DHCP server is installed effectively on a Linux machine
(Congleton, 2017).
Virtual Server Testing
After virtual hosts’ configuring, complete the necessary verification. Start, by
checking the two virtual hosts’ accessibility on a terminal with a ping command.
50
Utilize nslookup method for checking whether the DHCP server is functioning well or not, by
following the below step:
As per the method like nslookup, DHCP server is installed effectively on a Linux machine
(Congleton, 2017).
Virtual Server Testing
After virtual hosts’ configuring, complete the necessary verification. Start, by
checking the two virtual hosts’ accessibility on a terminal with a ping command.
50

Open the browser and check the following link:
Thus, the first virtual host is now functioning. Next, check the second virtual host
But, this time visit the following URL of virtual host:
https://debian.edu
8. Conclusion
The report has completed the investigation of network system services and thus has
met the objective of developing an implemented network design. It has successfully
illustrated the steps required for setting up and configuring the implemented network for
51
Thus, the first virtual host is now functioning. Next, check the second virtual host
But, this time visit the following URL of virtual host:
https://debian.edu
8. Conclusion
The report has completed the investigation of network system services and thus has
met the objective of developing an implemented network design. It has successfully
illustrated the steps required for setting up and configuring the implemented network for
51
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

delivering the network services. Ubuntu was used for this investigation, along with the other
suitable protocol like SSH and firewall mechanism.
52
suitable protocol like SSH and firewall mechanism.
52

References
Afonso, J. and Veiga, P., 2012. Improving DNS Security Using Active Firewalling with
Network Probes. International Journal of Distributed Sensor Networks, 8(5), p.684180.
Allin, C., 2020. The Importance Of Customization In Network Monitoring Software. [online]
Park Place Technologies. Available at: <https://www.parkplacetechnologies.com/knowledge-
center/blog/network-monitoring/the-importance-of-customization-in-network-monitoring-
software/> [Accessed 3 April 2020].
B Patil, M. and Kulkarni, D., 2017. Role of DHCP Server in Network. International Journal
of Research in Advanced Engineering and Technology, 3(2), pp.26-29.
Congleton, N., 2017. How To Secure Your Linux Desktop With Iptables. [online] Make Tech
Easier. Available at: <https://www.maketecheasier.com/secure-linux-desktop-with-iptables/>
[Accessed 3 April 2020].
Edwards, C., 2013. Instant Ubuntu. Birmingham, U.K.: Packt Pub.
Ellingwood, J. and Anicas, M., 2018. How To Configure BIND As A Private Network DNS
Server On Ubuntu 18.04. [online] Digitalocean.com. Available at:
<https://www.digitalocean.com/community/tutorials/how-to-configure-bind-as-a-private-
network-dns-server-on-ubuntu-18-04> [Accessed 3 April 2020].
Garimella, A. and Kumar, D., 2015. SECURE SHELL- ITS SIGNIFICANCE IN
NETWORKING (SSH). International Journal of Application or Innovation in Engineering
& Management (IJAIEM), 4(3), pp.187-190.
Graspingtech.com. 2017. How To Setup Apache Virtual Hosts On Ubuntu 16.04 LTS. [online]
Available at: <https://graspingtech.com/apache-virtual-hosts-ubuntu/> [Accessed 3 April
2020].
Graspingtech.com. 2019. How To Setup A DHCP Server On Ubuntu 18.04. [online]
Available at: <https://graspingtech.com/configure-dhcp-server/> [Accessed 3 April 2020].
Kumar Jaiswal, P., 2019. How To Set Up Apache Virtual Hosts On Ubuntu 18.04. [online]
JournalDev. Available at: <https://www.journaldev.com/30055/apache-virtual-hosts-ubuntu-
18-04> [Accessed 3 April 2020].
53
Afonso, J. and Veiga, P., 2012. Improving DNS Security Using Active Firewalling with
Network Probes. International Journal of Distributed Sensor Networks, 8(5), p.684180.
Allin, C., 2020. The Importance Of Customization In Network Monitoring Software. [online]
Park Place Technologies. Available at: <https://www.parkplacetechnologies.com/knowledge-
center/blog/network-monitoring/the-importance-of-customization-in-network-monitoring-
software/> [Accessed 3 April 2020].
B Patil, M. and Kulkarni, D., 2017. Role of DHCP Server in Network. International Journal
of Research in Advanced Engineering and Technology, 3(2), pp.26-29.
Congleton, N., 2017. How To Secure Your Linux Desktop With Iptables. [online] Make Tech
Easier. Available at: <https://www.maketecheasier.com/secure-linux-desktop-with-iptables/>
[Accessed 3 April 2020].
Edwards, C., 2013. Instant Ubuntu. Birmingham, U.K.: Packt Pub.
Ellingwood, J. and Anicas, M., 2018. How To Configure BIND As A Private Network DNS
Server On Ubuntu 18.04. [online] Digitalocean.com. Available at:
<https://www.digitalocean.com/community/tutorials/how-to-configure-bind-as-a-private-
network-dns-server-on-ubuntu-18-04> [Accessed 3 April 2020].
Garimella, A. and Kumar, D., 2015. SECURE SHELL- ITS SIGNIFICANCE IN
NETWORKING (SSH). International Journal of Application or Innovation in Engineering
& Management (IJAIEM), 4(3), pp.187-190.
Graspingtech.com. 2017. How To Setup Apache Virtual Hosts On Ubuntu 16.04 LTS. [online]
Available at: <https://graspingtech.com/apache-virtual-hosts-ubuntu/> [Accessed 3 April
2020].
Graspingtech.com. 2019. How To Setup A DHCP Server On Ubuntu 18.04. [online]
Available at: <https://graspingtech.com/configure-dhcp-server/> [Accessed 3 April 2020].
Kumar Jaiswal, P., 2019. How To Set Up Apache Virtual Hosts On Ubuntu 18.04. [online]
JournalDev. Available at: <https://www.journaldev.com/30055/apache-virtual-hosts-ubuntu-
18-04> [Accessed 3 April 2020].
53

L, M., 2018. Quick Tip: Enable Secure Shell (SSH) Service In Ubuntu 18.04. [online]
Available at: <https://tipsonubuntu.com/2018/05/31/enable-secure-shell-ssh-service-ubuntu-
18-04/> [Accessed 3 April 2020].
Modern Data. 2020. Network Services. [online] Available at:
<https://www.moderndata.com/network-services/> [Accessed 3 April 2020].
Moravejosharieh, A. and Lloret, J., 2019. Performance Analysis of Quality of Service in
Software-Defined Networking. Network Protocols and Algorithms, 10(4), p.1.
Parmar, M., 2015. Firewall: A Security Point of a Network. International Journal of Science
and Research (IJSR), 4(12), pp.1568-1570.
Pollard, D., Chuo, S. and Lee, B., 2016. Strategies For Mass Customization. Journal of
Business & Economics Research (JBER), 14(3), pp.101-110.
Raj, 2020. How To Configure DNS Server On Ubuntu 18.04 / Ubuntu 16.04. [online]
Available at: <https://www.itzgeek.com/how-tos/linux/ubuntu-how-tos/how-to-configure-
dns-server-on-ubuntu-18-04.html> [Accessed 3 April 2020].
Red Hat Customer Portal. 2020. Chapter 10. Configure Quality-Of-Service (Qos) Red Hat
Openstack Platform 14. [online] Available at: <https://access.redhat.com/documentation/en-
us/red_hat_openstack_platform/14/html/networking_guide/qos> [Accessed 3 April 2020].
Ruostemaa, J., 2019. How To Configure Iptables On Ubuntu. [online] Available at:
<https://upcloud.com/community/tutorials/configure-iptables-ubuntu/> [Accessed 3 April
2020].
SDxCentral. 2020. What Is A Network Service. [online] Available at:
<https://www.sdxcentral.com/resources/glossary/network-service/> [Accessed 3 April 2020].
Shovon, S., 2020. How To Install And Configure DHCP Server On Ubuntu 18.04 LTS.
[online] Available at: <https://linuxhint.com/install_dhcp_server_ubuntu/> [Accessed 3 April
2020].
Sverdlov, E., 2012. How To Set Up Apache Virtual Hosts On Ubuntu 12.04 LTS. [online]
Digitalocean.com. Available at: <https://www.digitalocean.com/community/tutorials/how-to-
set-up-apache-virtual-hosts-on-ubuntu-12-04-lts> [Accessed 3 April 2020].
Thomas, K. and Vugt, S., 2011. Beginning Ubuntu Linux. 6th ed. New York, NY: Apress.
54
Available at: <https://tipsonubuntu.com/2018/05/31/enable-secure-shell-ssh-service-ubuntu-
18-04/> [Accessed 3 April 2020].
Modern Data. 2020. Network Services. [online] Available at:
<https://www.moderndata.com/network-services/> [Accessed 3 April 2020].
Moravejosharieh, A. and Lloret, J., 2019. Performance Analysis of Quality of Service in
Software-Defined Networking. Network Protocols and Algorithms, 10(4), p.1.
Parmar, M., 2015. Firewall: A Security Point of a Network. International Journal of Science
and Research (IJSR), 4(12), pp.1568-1570.
Pollard, D., Chuo, S. and Lee, B., 2016. Strategies For Mass Customization. Journal of
Business & Economics Research (JBER), 14(3), pp.101-110.
Raj, 2020. How To Configure DNS Server On Ubuntu 18.04 / Ubuntu 16.04. [online]
Available at: <https://www.itzgeek.com/how-tos/linux/ubuntu-how-tos/how-to-configure-
dns-server-on-ubuntu-18-04.html> [Accessed 3 April 2020].
Red Hat Customer Portal. 2020. Chapter 10. Configure Quality-Of-Service (Qos) Red Hat
Openstack Platform 14. [online] Available at: <https://access.redhat.com/documentation/en-
us/red_hat_openstack_platform/14/html/networking_guide/qos> [Accessed 3 April 2020].
Ruostemaa, J., 2019. How To Configure Iptables On Ubuntu. [online] Available at:
<https://upcloud.com/community/tutorials/configure-iptables-ubuntu/> [Accessed 3 April
2020].
SDxCentral. 2020. What Is A Network Service. [online] Available at:
<https://www.sdxcentral.com/resources/glossary/network-service/> [Accessed 3 April 2020].
Shovon, S., 2020. How To Install And Configure DHCP Server On Ubuntu 18.04 LTS.
[online] Available at: <https://linuxhint.com/install_dhcp_server_ubuntu/> [Accessed 3 April
2020].
Sverdlov, E., 2012. How To Set Up Apache Virtual Hosts On Ubuntu 12.04 LTS. [online]
Digitalocean.com. Available at: <https://www.digitalocean.com/community/tutorials/how-to-
set-up-apache-virtual-hosts-on-ubuntu-12-04-lts> [Accessed 3 April 2020].
Thomas, K. and Vugt, S., 2011. Beginning Ubuntu Linux. 6th ed. New York, NY: Apress.
54
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Tutorialspoint.com. 2020. DCN - Network Services. [online] Available at:
<https://www.tutorialspoint.com/data_communication_computer_network/
network_services.htm> [Accessed 3 April 2020].
Wallen, J., 2019. How To Set Up A DHCP Server With Ubuntu Server 18.04. [online]
Available at: <https://www.techrepublic.com/article/how-to-setup-a-dhcp-server-with-
ubuntu-server-18-04/> [Accessed 3 April 2020].
Wolf, T., 2010. In-network services for customization in next-generation networks. IEEE
Network, 24(4), pp.6-12.
55
<https://www.tutorialspoint.com/data_communication_computer_network/
network_services.htm> [Accessed 3 April 2020].
Wallen, J., 2019. How To Set Up A DHCP Server With Ubuntu Server 18.04. [online]
Available at: <https://www.techrepublic.com/article/how-to-setup-a-dhcp-server-with-
ubuntu-server-18-04/> [Accessed 3 April 2020].
Wolf, T., 2010. In-network services for customization in next-generation networks. IEEE
Network, 24(4), pp.6-12.
55
1 out of 59
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.