ICTNWK540 Design, Build and test Network servers
Project Portfolio
Student Version
ICTNWK540 Design, build and test network servers |2
CONTENTS
Se …
Preview text
ICTNWK540 Design, Build and test Network servers
Project Portfolio
Student Version
ICTNWK540 Design, build and test network servers |2
CONTENTS
Section 1: Server Design Report …………………………………………………………………………………………………… 4
Section 2: Server Installation Preparation …………………………………………………………………………………….. 10
Section 3: Server Build and Configuration ……………………………………………………………………………………. 12
Section 4: Server Testing and Monitoring …………………………………………………………………………………….. 18
Section 5: Server Installation and Management Finalisation …………………………………………………………… 20
ICTNWK540 Design, build and test network servers |3
Student name:
Assessor:
Date:
RTO this assessment is
based on:
ICTNWK540 Design, build and test network servers |4
Section 1: Server Design Report
Client
requireme
nts
Provide a
summary
of client â€s
requireme
nts as per
the
information
as per the
information
provided.
Include
information
regarding
problems
with the
current
server,
scope of
the work,
business
opportuniti
es,
business
objectives,
budget and
data
migration
objectives.
The ever-changing business needs in the contemporary society has culminated into
strenuous business processes necessitating the adoption and implementation of other
techniques of running business processes. In this regard, the existing server is under strain
owing to the changing business needs. Itisthus vital for the company to position itself to
respond to the dynamics via agile and scalable business processes and activities isset to
be strategy to align itself for acompetitive edge in the business world. Availability and
scalability are key attributes of the to-be server system extending to the rest of the system.
These two are non-functional attributes enforcing the specific functional attributes of
storage, shared drives, email services and awireless connection.
Network
Topology
Provide
your
proposed
design
(prototype)
for the
network
services,
server
application
s, security
and
redundanc
Ahybrid topology founded on the star and bus topologies are the central strategies of the
physical implementation of the network. This isessentially the physical layout of network
infrastructure majorly addressing signal strength on Signal-To-Noise Ratio (SNR) as well
as the cost of implementation and operation in different networking and routing protocols
and algorithms. Intending to re-structure the network to minimize the cost of operation as
well as ensuring ultimate efficiency in signal strength especially in wireless networks as
intended in this revamp. In this regard, amaximum budget of $50,000 is set to be used
hence important to keep the project within the respective constraints of finances and time.
ICTNWK540 Design, build and test network servers |5
y.
This
should
include the
proposed
network
topology
diagram,
including
each
network
segment,
routers
and server,
gateways
and all
networking
hardware.
Include
server
names,
roles and
IP
addresses,
as well as
all network
hardware
required.
Costs that
align with
the budget
provided
should
also be
provided.
Include
this in a
simple
table that
shows the
item and
the
associated
cost.
Note one
or more
servers
may be
suggested
to meet the
ICTNWK540 Design, build and test network servers |6
client â€s
requireme
nts.
Attach
diagrams
or
screenshot
sof your
work.
Include the
title of
each
document
here.
Network
Security
and
Redundan
cy
Include
proposed
network
security
and
redundanc
y
measures.
As part of the non-functional attributes of the to-be network and server system, security
and redundancy are vital non-functional aspects tailored towards the Quality of Service
(QoS), redundancy in this regard is essentially tailored to ensure continuity such that there
are multiple links connecting to nodes with respect to the best routing methods for cost
efficiency. Security isalso another major aspect to be implemented in segmentation, VPN
and other diverse layers of security so as the Confidentiality, Integrity and Availability (CIA)
aspects of the system can be upheld.
Installation
checklists
Produce
and
provide
installation
checklists
that will be
used
during the
installation
process to
ensure that
the server
installation
process is
done
correctly
and meets
quality
requireme
To cover all the mentioned functional and non-functional attributes for the whole IT
infrastructure/ network infrastructure, the project is confined within aset of checklist
attributes as listed in this section;
ï‚· Site survey
ï‚· Design &routing protocol
ï‚· Windows server installation
ï‚· Scheduled backup configuration to aremote cloud service provider (CSP)
ï‚· Active Directory configuration
ï‚· Security configuration
ï‚· Testing &validation
ï‚· Deployment &maintenance
ICTNWK540 Design, build and test network servers |7
nts.
Document
the title of
your
installation
checklist
here and
attach itto
your
Portfolio.
Test plan
Include a
proposed
test plan to
be used to
ensure the
server
meets
client and
quality
requireme
nts, as well
as
performan
ce
standards.
As a
minimum
this should
include
hardware
testing,
server
stress
testing and
system
functionalit
ytest.
As one of the aspects in the installation of the server and the entire IT infrastructure in the
deployment of IT system, testing isacritical aspect of the process aiming at ensuring the
functional and the non-functional attributes of the system are attained. In this sense, the
testing plan is as follows;
Functional testing
This testing approaching isspecifically tailored for the specific functional activities.
Identifying the specific business needs as enumerated in the functional requirements
analysis, the testing approach isactual abeta test by deploying the system in the field for
test purposes.
Security testing
This isavital testing aspect specifically tailored for the non-functional aspect of CIA triad.
This isimportant and majorly designed to validate the security of the specific functional
attributes in response to the business needs as enumerated. This isusually in the form of
penetration testing which is asecurity attack in emulation to uncover the security flaws in
the respective IT infrastructure and system.
Reporting
This isavital aspect of the testing processes, itisatheoretical perspective of documenting
the testing process as well as the outcome as itcomes out of the testing processing. This
is crucial for security strategies to be implemented in the server and the entire IT system at
large.
ICTNWK540 Design, build and test network servers |8
Deployme
nt and
down time
Document
the
required
deploymen
tand
potential
down time.
Deployment isthe actual installation of asystem, this involves the network and server
installation as per the design, with respect to the non-functional needs, downtime isa
situation in which the server ispartially unavailable as aresult of atechnical hitch, in most
cases, this can be as aresult of improper design or internet service downtime. In-line with
the design as illustrated, the deployment takes the following procedure:
ï‚· Establishing the routing protocol and algorithm
ï‚· Physical installation
ï‚· Functional testing
Request
for
approval
Include a
request for
approval
for the
Server
Design.
Name …………………………………………………………… .
Sign ………………………………………………………………
Date …………………………………………………………… ..
Attach:
Network topology diagrams/screenshots
â˜
Installation checklists
â˜
Test plan
â˜
ICTNWK540 Design, build and test network servers |9
ICTNWK540 Design, build and test network servers |10
Section 2: Server Installation Preparation
Health
and
safety
hazards
Describe
the
safety
hazards
you
identified
.
What risk
control
measure
swill you
use
througho
ut the
installatio
n
process
to take
account
of the
hazards.
As per the industry and global efforts for workplace safety, the server installation and the IT
infrastructure as awhole is set to adhere to the following framework;
ï‚· Ergonomics (screen and anti-glare) contrast and interfaces
ï‚· Proper cable termination and layout
ï‚· Socket/ wire insulation
Risks control measures
ï‚· Safety evaluation by occupational health and authorities
ï‚· Proper design and implementation of the respective IT systems (termination &
insulation)
ï‚· Proper housing and temperature control for the server room to control radiations
Back up
Provide a
screen
shot of
the
backup
of the
local
data prior
to
installatio
n.
Docume
nt the
title of
the
screensh
ot here
and
attach it
to your
Figure 1:backup
ICTNWK540 Design, build and test network servers |11
Portfolio.
Figure 2:backup ofthe on-premise server
Attach:
Screenshot
Figure 3:backup
â˜
ICTNWK540 Design, build and test network servers |12
Section 3: Server Build and Configuration
Installation
Provide brief written
commentary and an
accompanying screen shot of
all of your work in relation to
the following:
ï‚· Creating relevant
number and size of disk
partitions required for the
installation.
ï‚· Creating file systems
and virtual memory
relevant to the operating
system.
ï‚· Installing the network
operating system.
ï‚· Installing and configuring
server applications and
network services as per
the client requirements
and sever design.
ï‚· Installing any additional
tools or third party
software as per the client
requirements and the
server design.
ï‚· Reconnection and
reconfiguration of the
connectivity devices
(such as switches,
routers, etc).
ï‚· Patching of the network
operating systems and
associated applications.
Make sure you document the
title of each screenshot and
attach itto your Portfolio.
Figure 4:RAM size
Figure 5:Disk partition
ICTNWK540 Design, build and test network servers |13
Figure 6:ROM disk partition
Figure 7:server OS
ICTNWK540 Design, build and test network servers |14
Configuration and
administration
Provide brief written
commentary and an
accompanying screen shot of
all of your work in relation to
the following:
ï‚· Configuration of the:
o Domain name
system (DNS)
o Dynamic host
configuration
protocol (DHCP)
o Web and proxy mail
o File transfer
protocol (FTP)
o Firewall.
ï‚· Configuration of the
network directory
service.
ï‚· Restart.
ï‚· Creation of accounts for
user groups.
ï‚· Grouping of users and
allocating access to
resources.
ï‚· Configuration of the user
environment.
ï‚· Creation of adirectory
structure and quotas.
ï‚· Configuration of print
services and testing.
ï‚· Setting of security,
access and sharing of
system resources.
ï‚· Finalisation of installation
process including:
o Implementation of
the security policy.
o Configuration of
update services.
o Restoration of the
Figure 8:server manager
Figure 9:install DNS
ICTNWK540 Design, build and test network servers |15
local data to the
new server.
o Backup of local
data.
o Backup and
recovery methods
for restoration of
data.
Figure 10:DHCP post-installation
Figure 11:scope configuration
ICTNWK540 Design, build and test network servers |16
Figure 12:scope configuration
ICTNWK540 Design, build and test network servers |17
Figure 13:users and grouping
Figure 14:user and organization
Attach: Screenshots â˜
ICTNWK540 Design, build and test network servers |18
Section 4: Server Testing and Monitoring
Testing and
Monitoring
Provide brief
written
commentary
and an
accompanyi
ng screen
shot of all of
your work in
relation to
the
following:
ï‚· Testing
and
recordin
gof
results.
ï‚· Rectifyi
ng
errors
using
troubles
hooting
tools
and
techniq
ues.
ï‚· Retesti
ng.
ï‚· Validati
on of
change
s.
Make sure
you
document
the title of
each
screenshot
and attach it
to your
Portfolio.
Please also
attach your
Figure 15:performance testing and monitoring ofevents
ICTNWK540 Design, build and test network servers |19
completed
test plan.
Figure 16:firewall monitoring
Attach:
Screenshots â˜
Completed test plan â˜
ICTNWK540 Design, build and test network servers |20
Section 5: Server Installation and Management
Finalisation
Server performance
Save the server configurations and
settings for the client to keep as a
reference and document any
differences to standard
configurations and settings are
documented.
Save acurrent report of the server
status.
Make sure you document the title of
each document and attach itto your
Portfolio.
Walk through
Make notes on the walk through
that you completed and how you
ensured that:
ï‚· No boxes or unwanted
material or equipment have
been left.
ï‚· Power/points are turned on or
switched off according to client
requirements.
ï‚· Cabling -is safely put away.
ï‚· Mounting -isstable.
ï‚· Protections -have been put in
place such as UPS or safety
instructions left.
ï‚· Placement -of additional
access points for monitoring
and sniffing.
You can also include photos to
demonstrate your work too.
Attach: Configurations and settings document â˜
Current report â˜
Photos as relevant â˜