Advanced Networking Concepts: Network Systems Administration Report

Verified

Added on  2022/08/20

|59
|3164
|15
Report
AI Summary
This report details the implementation and analysis of a network system, focusing on various network services within an Ubuntu environment. The assignment covers the setup and configuration of DHCP and DNS servers, including the creation of real and virtual hosts. It explores client-server interactions, Quality of Service (QoS) implementation, SSH security measures, and iptables firewall configuration. The report also includes testing and evaluation procedures to assess the performance of the implemented services. Furthermore, it reviews the protocols, mechanisms, and tools used in the network design, such as Apache web server and nslookup for testing. The objective is to provide a clear understanding of network system administration concepts and practical implementations for delivering network services.
Document Page
NETWORK SYSTEM ADMINISTRATION
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Abstract
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.
Document Page
Table of Contents
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52
Document Page
Abbreviation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Introduction
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
1
Document Page
3. Literature Review
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
2
Document Page
3.5 Used Tools in the Implemented Network
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
improvise the network service to increase the productivity and business
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
2) DNS server’s installation and configuration
3) Real host and virtual hosts set up
4
Document Page
4) Configuration and interactions of client/server
5) QoS implementation
6) SSH’s securing
7) iptables firewall configuration
8) Testing and evaluating the designed network and the implemented services.
This proposed network is designed with the help of the existing network infrastructure
in lab E250 and E251.
6. Experimental Work & Analysis
This section show the investigation of the network system services by using Ubuntu,
and suitable mechanisms and protocols (Sverdlov, 2012).
6.1 DHCP Server Installing & Configuring
For DHCP server installation on Linux, first type the following command (Shahriar
Shovon, 2019):
5
Document Page
Restart DHCP server (Wallen, 2019).
6
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Type the following command for opening the DHCP configuration file (How to Setup a
DHCP Server on Ubuntu 18.04, 2019):
7
Document Page
Type the below shown command for modifying the DHCP configuration file.
8
Document Page
Then, in DCHP configuration add the net mask address.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Type the following command displayed in the screenshot for starting the DHCP server, and
the system’s IP address must be checked.
At last, utilize nslookup method for checking the working ability of the DHCP server.
Thus, on a Linux machine the DHCP server installation is completed using the nslookup
method.
6.2 DNS Server Installing & Configuring
Here, DNS and SSH servers are installed and configured on a virtual machine one.
DNS server installing Process
In the beginning, complete Ubuntu virtual machine updating and then ensure DNS
server’s installation (Raj, 2020).
10
Document Page
After the installation, complete the configuration of a DNS server on a virtual machine as
displayed in the following screenshot:
11
Document Page
12
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Next, continue the configuration of primary and secondary DNS server.
Primary DNS Server Configuring Processes
13
Document Page
14
Document Page
Forward Zone File Creation Processes
15
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
16
Document Page
Reverse Zone File(s) Creation Processes
17
Document Page
18
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BIND Configuring Syntax Checking Processes
19
Document Page
The restarting BIND Process is shown below (Ellingwood and Anicas, 2018).
Secondary DNS Server Configuration Processes
20
Document Page
21
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
22
Document Page
DNS Clients Configuration Process
23
Document Page
24
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
25
Document Page
DNS client Testing Process
Forward zone
Reverse Zone
Perform DNs configuration file testing as follows:
26
Document Page
27
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
6.3 Real Host and Virtual Hosts Settings
Apache Virtual Hosts permit hosting multiple websites on a single server/machine
(Kumar Jaiswal, 2019; How to Setup Apache Virtual Hosts on Ubuntu 16.04 LTS, 2017).
Apache Web Server Installation
28
Document Page
29
Document Page
30
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
31
Document Page
32
Document Page
Next, new virtual host files must be created.
33
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
File must be now copied to the first domain (Edwards, 2013):
# sudo cp /etc/apache2/sites-available/000-default.conf
/etc/apache2/sites-available/ubuntu.biz.conf
With the help of nano the new file must be opened (Helmke, Hudson and Hudson, 2017).
# sudo nano /etc/apache2/sites-available/ubuntu.biz.conf
In the configuration file do necessary modifications.
After saving, the configuration file must be existed.
Open the web browser and check the following URL:
34
Document Page
The first virtual host is now functioning. Next, check the second virtual host.
But, this time visit the following URL of virtual host: https://debian.edu
6.4 Client/server Configuration and Interactions
DNS Clients Configuration Process
35
Document Page
36
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
37
Document Page
38
Document Page
6.5 Implementing Quality of Service (QoS)
On individual ports, or for a specific tenant network apply the QoS policies, where the
ports that have no policy will actually inherit these policies. Then tenants must be reviewed
and determine their id of creating the QoS policy (Chapter 10. Configure Quality-of-Service
(QoS) Red Hat OpenStack Platform 14, 2020):
QoS policy called bw-limiter must be created in admin tenant:
bw-limiter policy’s policing rules must be configured:
Neutron port must be configured for applying bw-limiter policy:
Continue reviewing of QoS rule, for instance:
39
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
6.6 Securing SSH
Installing and configuring the SSH server is displayed as follows (L, 2018).
SSH Installation Process
Start by updating the Ubuntu virtual machine, and continue SSH server’s installation
(Thomas and Vugt, 2011).
40
Document Page
SSH Configuration Process
41
Document Page
42
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
43
Document Page
44
Document Page
6.7 Firewall Configuration of iptables
By default, the Ubuntu servers have no restrictions, however for future reference, with
the help of the following command see the rules of the current iptable (Ruostemaa, 2019):
45
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
For utilizing the iptables, add the rules for the permitted inbound traffic for the needed
services. Now, it is possible for the iptables to track the connection status. Thus, to continue
utilize the following command for establishing connections.
Various ways are available for making the rules permanent, among all select package,
iptables-persistant, which takes care of iptable saving and restoring.
46
Document Page
Choose “Yes” option for the package to save the configuration.
7. Testing and Evaluation
DNS Testing Process
Forward zone
Reverse Zone
47
Document Page
Test DNS configuration file as follows.
48
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
49
Document Page
DHCP Testing
Utilize nslookup method for checking whether the DHCP server is functioning well or not, by
following the below step:
As per the method like nslookup, DHCP server is installed effectively on a Linux machine
(Congleton, 2017).
Virtual Server Testing
After virtual hosts’ configuring, complete the necessary verification. Start, by
checking the two virtual hosts’ accessibility on a terminal with a ping command.
50
Document Page
Open the browser and check the following link:
Thus, the first virtual host is now functioning. Next, check the second virtual host
But, this time visit the following URL of virtual host:
https://debian.edu
8. Conclusion
The report has completed the investigation of network system services and thus has
met the objective of developing an implemented network design. It has successfully
illustrated the steps required for setting up and configuring the implemented network for
51
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
delivering the network services. Ubuntu was used for this investigation, along with the other
suitable protocol like SSH and firewall mechanism.
52
Document Page
References
Afonso, J. and Veiga, P., 2012. Improving DNS Security Using Active Firewalling with
Network Probes. International Journal of Distributed Sensor Networks, 8(5), p.684180.
Allin, C., 2020. The Importance Of Customization In Network Monitoring Software. [online]
Park Place Technologies. Available at: <https://www.parkplacetechnologies.com/knowledge-
center/blog/network-monitoring/the-importance-of-customization-in-network-monitoring-
software/> [Accessed 3 April 2020].
B Patil, M. and Kulkarni, D., 2017. Role of DHCP Server in Network. International Journal
of Research in Advanced Engineering and Technology, 3(2), pp.26-29.
Congleton, N., 2017. How To Secure Your Linux Desktop With Iptables. [online] Make Tech
Easier. Available at: <https://www.maketecheasier.com/secure-linux-desktop-with-iptables/>
[Accessed 3 April 2020].
Edwards, C., 2013. Instant Ubuntu. Birmingham, U.K.: Packt Pub.
Ellingwood, J. and Anicas, M., 2018. How To Configure BIND As A Private Network DNS
Server On Ubuntu 18.04. [online] Digitalocean.com. Available at:
<https://www.digitalocean.com/community/tutorials/how-to-configure-bind-as-a-private-
network-dns-server-on-ubuntu-18-04> [Accessed 3 April 2020].
Garimella, A. and Kumar, D., 2015. SECURE SHELL- ITS SIGNIFICANCE IN
NETWORKING (SSH). International Journal of Application or Innovation in Engineering
& Management (IJAIEM), 4(3), pp.187-190.
Graspingtech.com. 2017. How To Setup Apache Virtual Hosts On Ubuntu 16.04 LTS. [online]
Available at: <https://graspingtech.com/apache-virtual-hosts-ubuntu/> [Accessed 3 April
2020].
Graspingtech.com. 2019. How To Setup A DHCP Server On Ubuntu 18.04. [online]
Available at: <https://graspingtech.com/configure-dhcp-server/> [Accessed 3 April 2020].
Kumar Jaiswal, P., 2019. How To Set Up Apache Virtual Hosts On Ubuntu 18.04. [online]
JournalDev. Available at: <https://www.journaldev.com/30055/apache-virtual-hosts-ubuntu-
18-04> [Accessed 3 April 2020].
53
Document Page
L, M., 2018. Quick Tip: Enable Secure Shell (SSH) Service In Ubuntu 18.04. [online]
Available at: <https://tipsonubuntu.com/2018/05/31/enable-secure-shell-ssh-service-ubuntu-
18-04/> [Accessed 3 April 2020].
Modern Data. 2020. Network Services. [online] Available at:
<https://www.moderndata.com/network-services/> [Accessed 3 April 2020].
Moravejosharieh, A. and Lloret, J., 2019. Performance Analysis of Quality of Service in
Software-Defined Networking. Network Protocols and Algorithms, 10(4), p.1.
Parmar, M., 2015. Firewall: A Security Point of a Network. International Journal of Science
and Research (IJSR), 4(12), pp.1568-1570.
Pollard, D., Chuo, S. and Lee, B., 2016. Strategies For Mass Customization. Journal of
Business & Economics Research (JBER), 14(3), pp.101-110.
Raj, 2020. How To Configure DNS Server On Ubuntu 18.04 / Ubuntu 16.04. [online]
Available at: <https://www.itzgeek.com/how-tos/linux/ubuntu-how-tos/how-to-configure-
dns-server-on-ubuntu-18-04.html> [Accessed 3 April 2020].
Red Hat Customer Portal. 2020. Chapter 10. Configure Quality-Of-Service (Qos) Red Hat
Openstack Platform 14. [online] Available at: <https://access.redhat.com/documentation/en-
us/red_hat_openstack_platform/14/html/networking_guide/qos> [Accessed 3 April 2020].
Ruostemaa, J., 2019. How To Configure Iptables On Ubuntu. [online] Available at:
<https://upcloud.com/community/tutorials/configure-iptables-ubuntu/> [Accessed 3 April
2020].
SDxCentral. 2020. What Is A Network Service. [online] Available at:
<https://www.sdxcentral.com/resources/glossary/network-service/> [Accessed 3 April 2020].
Shovon, S., 2020. How To Install And Configure DHCP Server On Ubuntu 18.04 LTS.
[online] Available at: <https://linuxhint.com/install_dhcp_server_ubuntu/> [Accessed 3 April
2020].
Sverdlov, E., 2012. How To Set Up Apache Virtual Hosts On Ubuntu 12.04 LTS. [online]
Digitalocean.com. Available at: <https://www.digitalocean.com/community/tutorials/how-to-
set-up-apache-virtual-hosts-on-ubuntu-12-04-lts> [Accessed 3 April 2020].
Thomas, K. and Vugt, S., 2011. Beginning Ubuntu Linux. 6th ed. New York, NY: Apress.
54
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Tutorialspoint.com. 2020. DCN - Network Services. [online] Available at:
<https://www.tutorialspoint.com/data_communication_computer_network/
network_services.htm> [Accessed 3 April 2020].
Wallen, J., 2019. How To Set Up A DHCP Server With Ubuntu Server 18.04. [online]
Available at: <https://www.techrepublic.com/article/how-to-setup-a-dhcp-server-with-
ubuntu-server-18-04/> [Accessed 3 April 2020].
Wolf, T., 2010. In-network services for customization in next-generation networks. IEEE
Network, 24(4), pp.6-12.
55
chevron_up_icon
1 out of 59
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]