+91-9519066910
  • My Account
  • solution

    Programing

    Internet Server Assignment Help

    Rating:
    Internet Server Assignment Help


    Introduction
    A company named as Hyper Net Ltd. Develops corporate websites and host them and now planning to re-build the network. This report covers the account naming convention, terminal restrictions, policy for password change, log on hours. Several types of networks, topologies, and terminals are discussed and difference among them. For the security of the network, IIS is also discussed along with the setting of permission. Some connectivity problems may occur, so utilities are also explained that helps in diagnosing the problems. 
     
     
    LO1
    Produce account naming convention- log on hours - terminal restrictions- password change policy- the structure of global, universal and domain local groups
    The company HyperNet Ltd. Is going to re-build the new network and for this, it will require its account naming convention. The term Account Naming Convention means there should be an active directory where all the members of the company will have unique names and the format of common naming convention is means the display name and user name should be the UnityID of the user. “SolarWinds Admin Bundle for Active Directory” tool is recommended to the company Hyper Net Ltd. (Allen, 2016). By configuring the Logon Hours, the company can set the time-duration of when the employees can log into the network. By doing this, the employees won’t be able to access the network after the working hours and this can protect the company’s network from the malicious user. The procedure of this configuration is that company first need to specify the time during which the employees will have access, then choose the department, specify the employees and then apply the changes (Dishan, 2014). 
     
     
    Figure 1: Log on hours
     
    Terminal restrictions are used to restrict the unauthorized access from the outside or the internal server, and all the terminal sessions can be supported and protected by the UserLock. With UserLock, the company can create or alter the secured account to set the limit for the terminal sessions. While re-building the new network, the company should deploy the desktop agent called UserLock in the network which also defines with respect to the network from which the employee of the specific department opens the terminal session.  
     
     
    Figure 2: Terminal session restrictions
    Password change policy is a rule that is created to increase security in the computer network. The company is making the new network, so to provide the security and prevent the network from the threats, it is essential to update the password policies of the network on the regular basis (Michael,2010). There are some password policies that the company should consider which are:

    Impose password history policy: It is used to implement by how can the old password be again used by using the ten previous passwords.

    Use passphrases: The company can use strong passphrases that should contain at least 15 characters.

    Reversible encryption policy: This policy states that the password should be set that are properly encrypted and can be easily cracked .
     
    Demonstrate how to implement domain user accounts in accordance with the plan 
    Domain users are those users whose name and the password are saved in the domain controlled instead of the computer where the user uses the system. Domain User Account empowers the network service to use the security feature of the Windows and services of active directory domain based on Microsoft. The company Hyper Net Ltd. Can implement the domain user account by configuring the active directory. During the implementation process of the domain user account, there is a requirement of periodic administrative action for maintaining the account password. 
    For the logon on the services, the account password can be cached on the host computer, so when the company changed the password as per the password policy, then the cached password should also be updated on the host computer where it is installing and implemented. There are two common formats of domain user accounts to handle the several different operations, where the first one is distinguished name of the employee and second is “\” format that the local service manager of the network uses (John & Michael, 2018). 
     
    LO2
    2.1 Design a LAN for a specific purpose or assess an existing network for fitness of purpose
    A LAN (Local Area Network) is computed network that is used for the smaller networks and is used to connect the computers and workstations. In the company Hyper Net Ltd., there are presently five departments which are accounts department, admin department, finance department, marketing department, and development of front & back end department. Approximately, 600 employees are working in this department and each uses a computer to work on, so local network area is created so that the employee from one department to other or within the same department can share the documents and files easily. The purpose of creating the LAN is that it allows the employees to communicate with each other via email or chat system and also capable of transmits the data and information at fast rates. For the setup of LAN, ethernet will be required and router and server are also required as router create and manage the network and all the linked devices respectively (Vangie, 2019). 
     
     
    Figure 3: Network diagram
     
    2.2 Identify the various parts (software and hardware) of a network system and relate it to the 7-layered model
    The admin department of the company Hyper Net Ltd. uses low hardware computer while the department of front & end developer uses a high range of systems such as memory, higher processing, and graphics capacity. So, while building and setting the network for the company, there will be requirements of some hardware as well as software.
    List of Hardware requirements are:
     
    Table 1: Hardware requirement
     
     
    Table 2: Software requirements
     
     
     
    The 7-layered model called the OSI model contains seven layers and each layer perform some functions. As shown in the above figure, the layer which is related to the hardware and called hardware layers are network layers, data link layers, and physical layer, among which network layer is usually done on the enterprise level on the hardware like from the cisco. while the software layers are application layer, presentation layer, and session layer. 
     
    2.3 Differentiate between different kinds of network, network topologies, and network operating systems
    There are different types of networks but the main networks are LAN, MAN, and WAN and there is some difference among these networks. When the company re-build a new network, they must be aware of each network and difference among them (Bradley, 2019).
     
    Table 3: Difference between different types of network
     
     
    Network topologies refer to how different nodes and computers are connected to each other in a single network. There are several types of network topologies such as bus topology, ring topology, star topology, and mesh topology. Each topology is different from each other and these differences are shown in the below table. 
     
    Table 4: Difference between network topology
     
     
     
    Network operating system is a computer-based Operating system which is mainly designed to support the computers and workstation and sometimes also to connect the terminal to the local area network. The company Hyper Net Ltd. Can use the network OS in the new network as with the help of this, they can share the common file system, applications, database, and printer sharing. It also provides the ability to the company to manage the security and other facets of the network. Some of the examples of network operating system include Banyan VINES, Microsoft’s LAN, Artisoft’s LANtastic, and Novell’s NetWare, among which company can implement any of the NOS (Margarete, 2019).  
     
    2.4 Diagnose connectivity problems using utilities
    While implanting and designing the new network in the company Hyper Net Ltd., there are chances of occurrence of some connectivity problems. So, to diagnose these connectivity issues, network utilities are used that provides some connectivity test among the requesting and destination host (Roman, 2009).
    There are some utilities that can be used to diagnose different types of connectivity problem which are:
    Ping: For testing the connectivity among two hosts, ping utility is used where it uses protocol ICMP (Internet Control Message Protocol) to find out whether the test packet is received by remote machine or nor. 
     
    Figure 4: Ping Command
    Tracert: It has similar functions like ping but it recognizes pathways which are required along each hop and unlike ping which takes time for the packet to return, it does not take time. for example, if four routers are used but eight responses are returned by the tracert, then an indirect route has been taken by the packet due to down of link.
     
    Figure 5: Tracert

    ARP: ARP means Address Resolution Protocol and this utility is used in diagnosing the problem related to the ARP. For determining the MAC address, ARP is used by TCP/IP host with the particular IP address, then to display the address type arp with -a and it solved the connectivity problem (Roman, 2009).
     
     
    Figure 6: ARP
    Ipconfig: Although it is not TCP/IP part, it can be used to show the settings of current TCP/IP and the complete information regarding the entire network will be shown by ipconfig. 
     
     
    Figure 7: ipconfig
     2.5 For a company requiring 500 computers in 10 segments, optimize IP addressing using class B and C IP addresses 
    An IP (Internet Protocol) address means a number that is used to differentiate the system from each other on the TCP/IP and it helps in the unique identification of network. There are two components in each IP address, first is network address and other is host address. For the company Hyper Net Ltd., there are around 500 computers in ten segments for which network is re-designed. To uniquely identify the network, IP address is required so it is optimized using the IP addresses of class B and class C.
    In class B address, the starting of two octets are allocated to the network ID and host ID received the last two octets. The range of class B addressing is between 128-191 and the starting address is 128.0.0.0 and ending address is 191.255.255.255In class C address, the network ID will be assigned first 3 octets and host ID will assign the fourth octet which means only 254 hosts are accommodated in this class address. The range of class B addressing is between 192-223 and the starting address is 192.0.0.0 and ending address is 223.255.255.255 (Susan, 2016). 
     
    LO3
    Security, compression & encryption mechanisms for file/folder
    The company Hyper Net Ltd. designs, manage and hosts corporate website and there are several departments in this company. Since the company is building a new network, so security should be considered on the top priority. Each department has some host computers and they share the same network to share the files, documents and any kind of information. Although they don’t have access to other department’s documents, account and finance department have access to all departments, so the security of files/folder is very essential. 
    There are some steps that need to be followed by the company for files and folder’s configuration security by setting the permission (University of Wisconsin-Eau Claire, 2018).
    Firstly, create a new folder by selecting the new folder on the menu bar and rename it as per the requirement.
    The second step is to access the dialog box of properties by right-clicking the selected folder and select properties and then a dialog box will appear.
    The third step is to grant access to the folder or files by:
    Open the properties box.
    Select the tab Security
    Click on the Advanced button
     
     
    Figure 8: Ownership tab
    Click Edit.
     
     
    Figure 9: Selecting a group for ownership access
    As the box appears in the above image, in the entry space type the accounts and finance’s group whom the access should be given.
    Click ok for continuing of setting permissions (University of Wisconsin-Eau Claire, 2018)
    After granting the access to the following department, set the permission by selecting the security tab in the properties box and then click Edit, set the user name for which the company needs to set permission. Check the checkboxes for setting the permission level that is appropriate, click apply and then ok.
     
     
    Figure 10: Setting Permission

    DFS root is an object in the directory system of the Microsoft which is used to share the folders and files across the network.  

    java assignment helpjava homework helpprogramming homework helppython assignment helpprogramming assignmentcomputer science assignment helpcomputer science homework helppython homework helpdo my programming homeworkcomputer science assignmentcomputer science homeworkc++ homework help, java programming assignment helpphp assignment helpcoding assignment helpcoding homework helpr programming assignment helpc++ assignment helppay someone to do my programming homeworkc programming assignment helppython programming assignment help