MN506 System Management Report: Thinktank Network Infrastructure
VerifiedAdded on 2023/03/20
|23
|2963
|87
Report
AI Summary
This report presents an analysis of Thinktank, a growing enterprise company facing challenges with its existing network infrastructure. The report begins with an introduction outlining the need for a new network design to address issues such as manual IP address assignment, data centralization, and scalability limitations. A case problem is provided detailing Thinktank's current setup and future expansion plans, including a new branch in Melbourne. The report then delves into a requirement analysis, identifying key objectives like scalability, centralized management, and enhanced security measures. It identifies essential server roles, including DHCP, web, file, and print servers, and discusses the technologies required. The report details the network configuration process, emphasizing the use of Active Directory, DNS, and LDAP. It also describes the steps involved in setting up the domain controller using Windows Server and Oracle VirtualBox Tool, including the installation of the ADDS role and the configuration of IP addresses, and provides screenshots of the configurations. The report aims to provide a comprehensive guide to restructuring Thinktank's IT infrastructure to meet its business goals and improve overall network efficiency.

System Management
Student Name
Course
Institution
Date
Student Name
Course
Institution
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
Computer networks has become one of the primary needs of any business. A network refers
to an interconnection of many devices including servers, routers, switches, laptops, desktops,
smartphones, among other network components for the purpose of sharing critical resources
and effective communication [1]. Having this in mind, it is important that when designing a
network, it is necessary to carry out and analysis of the situation before coming up with a list
of requirements and objectives [2]. This report focuses on analyzing the requirements of
Thinktank, identifying the different servers required and the roles they play in the network,
and providing configuration information that has been taken in setting up the network.
Case Problem
Thinktank is a small enterprise company that is based in Sydney. The company has grown
over the years and now it has 50 computers from the initial 10 computers. The company also
plans to expand and open up a new branch in Melbourne that will be directly connected to the
head quarters (HQ) in Sydney. More employees will be hired to fill the positions in
Melbourne and will have similar number of employees as those in the HQ. The company
needs to buy new computing equipment for the new branch. The company also hopes to
achieve centralize data management location, authorization, and authentication. Additionally,
the company wants to have separate folders for both offices which can only be specifically
accessed by individual branches. Moreover, the sales departments in both offices will have
separate folders to carry out their respective tasks. Managers in both offices will have access
to the entire data folder.
The current setup within Thinktank is that the data is store on two computers which are
basically workgroup computers; the data is accessible to 28 employees from various
departments: 3 managers, 20 employees from the sales department, and 5 in Finance. The IT
department is also facing a big challenge because IP addresses are assigned manually and
some computers may be assigned similar IP addresses and this often end up disrupting
network services because of duplication issues.
This has made it challenging and difficult for the company to manage and share resources
and communication. This is because the current network infrastructure has been poorly
designed, does not support scalability, or additional of more devices. The company is
Computer networks has become one of the primary needs of any business. A network refers
to an interconnection of many devices including servers, routers, switches, laptops, desktops,
smartphones, among other network components for the purpose of sharing critical resources
and effective communication [1]. Having this in mind, it is important that when designing a
network, it is necessary to carry out and analysis of the situation before coming up with a list
of requirements and objectives [2]. This report focuses on analyzing the requirements of
Thinktank, identifying the different servers required and the roles they play in the network,
and providing configuration information that has been taken in setting up the network.
Case Problem
Thinktank is a small enterprise company that is based in Sydney. The company has grown
over the years and now it has 50 computers from the initial 10 computers. The company also
plans to expand and open up a new branch in Melbourne that will be directly connected to the
head quarters (HQ) in Sydney. More employees will be hired to fill the positions in
Melbourne and will have similar number of employees as those in the HQ. The company
needs to buy new computing equipment for the new branch. The company also hopes to
achieve centralize data management location, authorization, and authentication. Additionally,
the company wants to have separate folders for both offices which can only be specifically
accessed by individual branches. Moreover, the sales departments in both offices will have
separate folders to carry out their respective tasks. Managers in both offices will have access
to the entire data folder.
The current setup within Thinktank is that the data is store on two computers which are
basically workgroup computers; the data is accessible to 28 employees from various
departments: 3 managers, 20 employees from the sales department, and 5 in Finance. The IT
department is also facing a big challenge because IP addresses are assigned manually and
some computers may be assigned similar IP addresses and this often end up disrupting
network services because of duplication issues.
This has made it challenging and difficult for the company to manage and share resources
and communication. This is because the current network infrastructure has been poorly
designed, does not support scalability, or additional of more devices. The company is

growing at a fast rate and need to have a new network infrastructure. As a result, the
company wants to restructure its IT infrastructure to enable central management of resources,
effective communication, and the data center which be located in the headquarters. The new
design will make sure that Thinktank is able to meet the different business goals by
improving communication and business processes.
Other issues currently being experienced by the company is the fact that users need to
remember the IP addresses of the computer holding the data in order to access it.
Remembering IP addresses is very difficult. Also, the company wishes to achieve fault
tolerance.
Requirement Analysis
There are several factors that need to be addressed when setting up the new network
infrastructure. This is important in addressing the network management and administration
challenges in today’s network environment [3]. First, it is important to plan for your network.
This involves understanding the need and the services that the network will provided
including monitoring and management functions. Understanding the reality of the Thinktank
network situation will enable easy planning and implementation [4].
The network should also have the capabilities to avoid outages and offer high availability.
This will be achieved by predicting the growth of the within the company so as to prepare for
any possible rapid configurations and growth to enable integration of reporting and capacity
tools to help in planning for the future needs [5]. Additionally, strategies and guidelines to
implement whenever an outage occurs as a result of unexpected network configuration issues
and growth are necessary.
Scalability: the network should be able to support easy expansion of the network by adding
more devices and users on the network without affecting the normal network operations. This
is an important objective because of the growth that the company is experiencing and thus,
there is need to have a scalable network [6]. Additionally, the company wants to expand its
services to other cities such as Sydney and Perth and wants to ensure that the network should
be able to accommodate the needs of the expected branches without having to setup a new
data center.
Centralized Management: another objective that the company expects is to have all the
monitoring and management of the network critical resources such as servers be done from
company wants to restructure its IT infrastructure to enable central management of resources,
effective communication, and the data center which be located in the headquarters. The new
design will make sure that Thinktank is able to meet the different business goals by
improving communication and business processes.
Other issues currently being experienced by the company is the fact that users need to
remember the IP addresses of the computer holding the data in order to access it.
Remembering IP addresses is very difficult. Also, the company wishes to achieve fault
tolerance.
Requirement Analysis
There are several factors that need to be addressed when setting up the new network
infrastructure. This is important in addressing the network management and administration
challenges in today’s network environment [3]. First, it is important to plan for your network.
This involves understanding the need and the services that the network will provided
including monitoring and management functions. Understanding the reality of the Thinktank
network situation will enable easy planning and implementation [4].
The network should also have the capabilities to avoid outages and offer high availability.
This will be achieved by predicting the growth of the within the company so as to prepare for
any possible rapid configurations and growth to enable integration of reporting and capacity
tools to help in planning for the future needs [5]. Additionally, strategies and guidelines to
implement whenever an outage occurs as a result of unexpected network configuration issues
and growth are necessary.
Scalability: the network should be able to support easy expansion of the network by adding
more devices and users on the network without affecting the normal network operations. This
is an important objective because of the growth that the company is experiencing and thus,
there is need to have a scalable network [6]. Additionally, the company wants to expand its
services to other cities such as Sydney and Perth and wants to ensure that the network should
be able to accommodate the needs of the expected branches without having to setup a new
data center.
Centralized Management: another objective that the company expects is to have all the
monitoring and management of the network critical resources such as servers be done from
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

one central location, the data center. As such, the design should have the capability to support
easy management, monitoring, and troubleshooting [7].
Security: Network security is a very important aspect to any company. Thinktank expects that
the new network infrastructure should be able ensure the security of the network critical
resources such as data and have strategies for mitigating risks and disaster recovery
techniques [8]. There is need to implement network security measures to protect the integrity
and usability of the company data and network. It includes software and hardware
technologies. Having effective network security mechanisms allows better management of
access to network resources [9]. There are several security mechanisms that needs to be
implemented in the network; they are discussed below.
First, access control will be implemented in the network to control access to the company
network resources. This will prevent any potential attackers who may have intentions of
intentions to access the network resources without authorization. Secondly, antimalware and
antivirus programs to prevent spyware, ransomware, Trojans, worms, and viruses from
spreading on the network [10]. Firewalls, intrusion detection and prevention systems, and
data security systems will be installed on the network. All these measures are necessary to
ensure that Thinktank technologies have secured their critical network resources from any
internal or external threats [11].
Identification of Server Roles & Technologies
Often, servers are dedicated network components with superior processing speeds and
performance that carries out only the functions assigned to them [7]. In order to achieve the
objectives of Thinktank, a number of servers are required while setting up the data center
including DHCP server, web server, file server, and print server. All these servers have
specific roles which are discussed below.
DHCP Server: it stands for Dynamic Host Control Protocol. This server is required for to
address the challenge that the company is facing of assigning IP addresses manually. DHCP
server generates and assigns IP addresses automatically to all the network component to
ensure that no IP is duplicated [9]. DHCP is necessary based on the current setup because it
sends the needed network parameters automatically to enable the clients to communicate and
share files properly on the network.
easy management, monitoring, and troubleshooting [7].
Security: Network security is a very important aspect to any company. Thinktank expects that
the new network infrastructure should be able ensure the security of the network critical
resources such as data and have strategies for mitigating risks and disaster recovery
techniques [8]. There is need to implement network security measures to protect the integrity
and usability of the company data and network. It includes software and hardware
technologies. Having effective network security mechanisms allows better management of
access to network resources [9]. There are several security mechanisms that needs to be
implemented in the network; they are discussed below.
First, access control will be implemented in the network to control access to the company
network resources. This will prevent any potential attackers who may have intentions of
intentions to access the network resources without authorization. Secondly, antimalware and
antivirus programs to prevent spyware, ransomware, Trojans, worms, and viruses from
spreading on the network [10]. Firewalls, intrusion detection and prevention systems, and
data security systems will be installed on the network. All these measures are necessary to
ensure that Thinktank technologies have secured their critical network resources from any
internal or external threats [11].
Identification of Server Roles & Technologies
Often, servers are dedicated network components with superior processing speeds and
performance that carries out only the functions assigned to them [7]. In order to achieve the
objectives of Thinktank, a number of servers are required while setting up the data center
including DHCP server, web server, file server, and print server. All these servers have
specific roles which are discussed below.
DHCP Server: it stands for Dynamic Host Control Protocol. This server is required for to
address the challenge that the company is facing of assigning IP addresses manually. DHCP
server generates and assigns IP addresses automatically to all the network component to
ensure that no IP is duplicated [9]. DHCP is necessary based on the current setup because it
sends the needed network parameters automatically to enable the clients to communicate and
share files properly on the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Web Server: the company aims to host the website on their own server. As a result, a web
server is needed to deliver services and contents to the end users over the internet. A web
server is basically a physical server with a software that us required to enable HTTP
communication.
Print Server: this server is responsible for managing print jobs on the network. This is
because the printer alone cannot be able to handle the huge amount of print request from the
different employees. As such, there is need to have a dedicated server that will be able to
manage and prioritize print request.
File server: this is a dedicated server that is the primary role of offering shared disk access
such as share files that can be accessed by authorized users over the network. It is primarily
designed to facilitate storage and retrieval of files over the network.
Other servers that may be implemented but not necessary for the company include:
Proxy server: this server is required to filter to enable sharing of connections, improving
network performance, and filtering traffic and is placed between web browser and another
server on the web (external server).
Mail server: mail servers plays a crucial role in managing email communication amongst the
employees and to the customers. It stores and moves emails over the company network
though LAN and over the internet.
Database server: dedicated server is needed to manage and control permissions to the data
stored in the database. It also has defined security principles on how to access the data
thorough access control policies.
Application server: an application server is required to host applications and related services
needed by Thinktank employees. It delivers high-end business and consumer applications
which are necessary to be used simultaneously and multiple connected remote or local users.
Network Configuration Process
While setting up the network the following requirements need to be considered: the company
domain is thinktank.com, and the network will be created as an active directory domain
which has a root domain. The network should ensure centralized user authentication. DHCP
server is needed to deliver services and contents to the end users over the internet. A web
server is basically a physical server with a software that us required to enable HTTP
communication.
Print Server: this server is responsible for managing print jobs on the network. This is
because the printer alone cannot be able to handle the huge amount of print request from the
different employees. As such, there is need to have a dedicated server that will be able to
manage and prioritize print request.
File server: this is a dedicated server that is the primary role of offering shared disk access
such as share files that can be accessed by authorized users over the network. It is primarily
designed to facilitate storage and retrieval of files over the network.
Other servers that may be implemented but not necessary for the company include:
Proxy server: this server is required to filter to enable sharing of connections, improving
network performance, and filtering traffic and is placed between web browser and another
server on the web (external server).
Mail server: mail servers plays a crucial role in managing email communication amongst the
employees and to the customers. It stores and moves emails over the company network
though LAN and over the internet.
Database server: dedicated server is needed to manage and control permissions to the data
stored in the database. It also has defined security principles on how to access the data
thorough access control policies.
Application server: an application server is required to host applications and related services
needed by Thinktank employees. It delivers high-end business and consumer applications
which are necessary to be used simultaneously and multiple connected remote or local users.
Network Configuration Process
While setting up the network the following requirements need to be considered: the company
domain is thinktank.com, and the network will be created as an active directory domain
which has a root domain. The network should ensure centralized user authentication. DHCP

will be used to assign IP addresses automatically to the clients. The following are necessary
for configuring the network:
Domain name system (DNS) is essential for Active Directory to operate as DNS is used to
establish the services that are available on the domain and what is provided by who [11].
Lightweight Directory Access Control (LDAP) is required to keep track of network activities.
Kerberos will be used to handle single sign on because it facilitates use of one password and
username to access multiple computers.
To build the network we will need Windows Server and Oracle VirualBox Tool. The
specifications are 30GB HDD storage, 2GB RAM, and 2 vCPU. We will create a Host-Only
network for Thinktank.
Configuration Screenshots
Launch the VirtualBox and go to File and select Host Network Manager. On the upper left
side, click on Create button to create a new network interface on the Oracle VirualBox Tool.
Choose the new interface and ensure that the Properties option is chosen from the top of the
panel and assign it an IP address Scheme that is in line with the company requirements. The
diagram below illustrates the above steps.
for configuring the network:
Domain name system (DNS) is essential for Active Directory to operate as DNS is used to
establish the services that are available on the domain and what is provided by who [11].
Lightweight Directory Access Control (LDAP) is required to keep track of network activities.
Kerberos will be used to handle single sign on because it facilitates use of one password and
username to access multiple computers.
To build the network we will need Windows Server and Oracle VirualBox Tool. The
specifications are 30GB HDD storage, 2GB RAM, and 2 vCPU. We will create a Host-Only
network for Thinktank.
Configuration Screenshots
Launch the VirtualBox and go to File and select Host Network Manager. On the upper left
side, click on Create button to create a new network interface on the Oracle VirualBox Tool.
Choose the new interface and ensure that the Properties option is chosen from the top of the
panel and assign it an IP address Scheme that is in line with the company requirements. The
diagram below illustrates the above steps.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 1: Selected Properties (Author, 2019)
Choose the created VM and modify the configurations of the network created.
Figure 2: Change the Settings (Author, 2019)
The next step is to installed windows server 2012 R2 with the graphical user interface.
Choose the created VM and modify the configurations of the network created.
Figure 2: Change the Settings (Author, 2019)
The next step is to installed windows server 2012 R2 with the graphical user interface.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 3: Installing Windows Server (Author, 2019)
In order to do a clean install, it is important to choose custom install.
In order to do a clean install, it is important to choose custom install.

Figure 4: Custom Install (Author, 2019)
Follow the prompts until completion.
The next step is setting up the Domain Controller for Thinktank. Three things will need to be
done. Virtualization Guest Extension will be installed.
Follow the prompts until completion.
The next step is setting up the Domain Controller for Thinktank. Three things will need to be
done. Virtualization Guest Extension will be installed.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 5: Virtualization Guest Extension (Author, 2019)
The Virtualization Guest Extension should be assigned static. The Last IP address on the
subnet will be assigned. The gateway will be set to 10.10.10.2. Google’s DNS server will be
used for internet connection.
The Virtualization Guest Extension should be assigned static. The Last IP address on the
subnet will be assigned. The gateway will be set to 10.10.10.2. Google’s DNS server will be
used for internet connection.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 6: Assign IP address (Author, 2019)
Give the computer a name that will be easy to identify it.
Give the computer a name that will be easy to identify it.

Figure 7: Rename the Computer (Author, 2019)
After renaming, reboot it.
Once the server has been restarted, the domain controller will be configured. This involves
promoting the server and installing the Active Directory Domain Services to the domain
controller. First, install the ADDS Role by launching the server manager from the start menu
and choose Add Roles and features from the quick start.
After renaming, reboot it.
Once the server has been restarted, the domain controller will be configured. This involves
promoting the server and installing the Active Directory Domain Services to the domain
controller. First, install the ADDS Role by launching the server manager from the start menu
and choose Add Roles and features from the quick start.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





