Advanced Networking Concepts: Network Systems Administration Report
VerifiedAdded on 2022/08/20
|59
|3164
|15
Report
AI Summary
This report details the implementation and analysis of a network system, focusing on various network services within an Ubuntu environment. The assignment covers the setup and configuration of DHCP and DNS servers, including the creation of real and virtual hosts. It explores client-server interactions, Quality of Service (QoS) implementation, SSH security measures, and iptables firewall configuration. The report also includes testing and evaluation procedures to assess the performance of the implemented services. Furthermore, it reviews the protocols, mechanisms, and tools used in the network design, such as Apache web server and nslookup for testing. The objective is to provide a clear understanding of network system administration concepts and practical implementations for delivering network services.

NETWORK SYSTEM ADMINISTRATION
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.
This report aims to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. The objective is to
investigate the network services. The report will show setting up and configuring a network
for delivering the network services, which includes- DHCP server’s installation and
configuration; DNS server’s installation and configuration; Real host and virtual hosts set up;
Configuration and interactions of client/server; Quality of Service (QoS) implementation;
SSH’s securing; iptables firewall configuration; Testing and evaluating the designed network
and the implemented services. The report also will ensure to review the protocol(s), network
services, mechanism(s), and used tools in the network.

Table of Contents
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52
1. Introduction.......................................................................................................................1
2. Background.......................................................................................................................1
3. Literature Review.............................................................................................................1
3.1 Overview.....................................................................................................................1
3.2 Protocols.....................................................................................................................2
3.3 Customization of Network Services.........................................................................2
3.4 Mechanisms................................................................................................................2
3.5 Used Tools in the Implemented Network................................................................2
3.6 Summary....................................................................................................................3
4. Project Scope & Limitations............................................................................................3
4.1 Scope of the Project...................................................................................................3
4.2 Limitations of the Project.........................................................................................3
5. Proposed and Implemented Network.............................................................................4
6. Experimental Work & Analysis......................................................................................5
6.1 DHCP Server Installing & Configuring..................................................................5
6.2 DNS Server Installing & Configuring.....................................................................9
6.3 Real Host and Virtual Hosts Settings....................................................................27
6.4 Client/server Configuration and Interactions.......................................................34
6.5 Implementing Quality of Service (QoS)................................................................38
6.6 Securing SSH...........................................................................................................39
6.7 Firewall Configuration of iptables.........................................................................44
7. Testing and Evaluation...................................................................................................46
8. Conclusion.......................................................................................................................50
References...............................................................................................................................52
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Abbreviation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1. Introduction
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
1
The computer and computerized systems are beneficial for mankind, as it helps them
to have work efficiency. Once such devices are connected in a network, it offers enhanced
capabilities. The commonly offered network services includes-Directory Services, File
Services, Communication Services and Application Services (DCN - Network Services,
2020).
Thus, in networking the network services refer to a capacity which simplifies network
operations offered by a server (i.e., it runs either one or multiple services), depending on the
network protocols which runs at an application layer in a network’s OSI model, for instance,
DNS, DHCP, VoIP and so on.
The objective of this report is to develop an implemented network design, and provide
unambiguous statement of the implemented Linux network services. This report will show
setting up and configuring the implemented network for delivering the network services. The
network system services will be studied and investigated with the help of Ubuntu, including
suitable protocols and mechanisms.
2. Background
Network service supports the higher layer service’s behavior that represents the low
performance, security specifications and dependability. The behavior of the end-to-end
network service results in combining individual network function behaviors and the network
infrastructure composition mechanism’s behaviors (What is a Network Service, 2020).
Therefore, network service is a mixture of network functions and is defined by its
behavioral and functional specifications, which are highly essential. Because, today all
the companies strive to make sure that their network services meet their
business needs, and has no negative impact, instead improve their
business’s productivity by optimization of connectivity and permissions
(Network Services, 2020).
1

3. Literature Review
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
2
3.1 Overview
This part of the report will ensure to review the protocol(s), network services,
mechanism(s), and used tools in the implemented network.
3.2 Protocols
As per (Moravejosharieh and Lloret, 2019), the need of Quality of
Service (QoS) by the central controllers is presented. It also stresses on
the implementation of network policies on the data plane for satisfying
application’s requirements. Thus, it is understood that a set of effective
network policies are essential and it selecting suitable policies will be a
challenging task. The researchers have concluded that combining various
network policies which has less impact on the rest of the network
applications or services can be beneficial.
3.3 Customization of Network Services
According to (Wolf, 2010), the researcher has proved that it is significant to explore
how the new services work in the network. Even as per (Pollard, Chuo and Lee, 2016), mass
customization helps the companies in providing the required things that are required for their
customers. This method is beneficial as it is cost effective and helps in gaining profit, and
allows satisfaction of customers.
3.4 Mechanisms
This report has implemented the firewall mechanism. As per (Parmar, 2015), firewall
is referred as a software program/hardware containing a software program, which creates a
security perimeter. In a network, its key function includes controlling any kind of
unauthorized access of incoming and outgoing data/information. It offers protection from
attacking software installed by the hackers in your systems. Moreover, when the systems
have internet connection, it becomes an easy target for the hacker and the malicious software.
In such cases, the firewall provides the required security and makes ensures data protection.
Additionally, the firewall protects the traffic flow over internet.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3.5 Used Tools in the Implemented Network
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
3
The following are the used tools in the implemented network:
a) DHCP
b) DNS
c) SSH
d) Apache
As per (B Patil and Kulkarni, 2017), DHCP is considered to have a significant role in
a network and it can only be accessed by the admin. In an organization, it even automatically
assign the IP addresses to various computers dynamically.
According to (Afonso and Veiga, 2012), for a trusted and reliable operation in the
internet, DNS is said to be a complicated application. Today, the DNS servers has a vital role
in the normal functioning of IP networks. Any kind of disturbance to their normal functioning
could have serious impact on the network service.
As per (Garimella and Kumar, 2015), the researchers have concentrated on the SSH’s
evolution, their requirement, working, and its key features and components and features.
With the i9increase in the number of internet users, the data threats are also increasing. In the
insecure network, the remote login and other secure network services are secured by the SSH.
The protocols of SSH are mainly created for supporting various features, including offering
effective security.
3.6 Summary
This part of the report has helped to gain the understanding of the need of protocols,
mechanisms, customization and importance of the used tools for network services. Moreover,
customization helps to increase the productivity and saves cost (Allin, 2020).
4. Project Scope & Limitations
4.1 Scope of the Project
The investigation of network system services intends to determine
whether optimizing the existing network is best for the organization or
not. Irrespective of the size of the business, the investigation will work on
to know the goals and challenges, suggest effective solutions, and
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

improvise the network service to increase the productivity and business
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
2) DNS server’s installation and configuration
3) Real host and virtual hosts set up
4
profit (Network Services, 2020).
4.2 Limitations of the Project
The following are the limitations:
1. It requires efficient handler.
2. It requires expensive set-up.
3. It has the security risks.
5. Proposed and Implemented Network
The proposed and implemented network is represented in the following figure:
Figure: Proposed and implemented network
This requires setting up and configuring the network for delivering the below
mentioned network services:
1) DHCP server’s installation and configuration
2) DNS server’s installation and configuration
3) Real host and virtual hosts set up
4

4) Configuration and interactions of client/server
5) QoS implementation
6) SSH’s securing
7) iptables firewall configuration
8) Testing and evaluating the designed network and the implemented services.
This proposed network is designed with the help of the existing network infrastructure
in lab E250 and E251.
6. Experimental Work & Analysis
This section show the investigation of the network system services by using Ubuntu,
and suitable mechanisms and protocols (Sverdlov, 2012).
6.1 DHCP Server Installing & Configuring
For DHCP server installation on Linux, first type the following command (Shahriar
Shovon, 2019):
5
5) QoS implementation
6) SSH’s securing
7) iptables firewall configuration
8) Testing and evaluating the designed network and the implemented services.
This proposed network is designed with the help of the existing network infrastructure
in lab E250 and E251.
6. Experimental Work & Analysis
This section show the investigation of the network system services by using Ubuntu,
and suitable mechanisms and protocols (Sverdlov, 2012).
6.1 DHCP Server Installing & Configuring
For DHCP server installation on Linux, first type the following command (Shahriar
Shovon, 2019):
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Restart DHCP server (Wallen, 2019).
6
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Type the following command for opening the DHCP configuration file (How to Setup a
DHCP Server on Ubuntu 18.04, 2019):
7
DHCP Server on Ubuntu 18.04, 2019):
7

Type the below shown command for modifying the DHCP configuration file.
8
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 59
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.