ICTNWK504 Design And Implement Integrated Server Solution Assessment Task 2 Answer

pages Pages: 4word Words: 890

Question :

ICTNWK504 Design and implement an integrated server solution

Student Assessment Pack 

Assessment Conditions and information’s

Unit purpose/application

This unit describes the skills and knowledge required to design and implement a network authentication model that allows users to log in using the same user credentials between multiple operating system platforms to provide a secure method of sharing files on the same network.

It applies to individuals employed in network or systems engineering roles where they are required to support multiple operating systems in a complex computing environment of medium-to-large organisations.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

What the student can expect to learn by studying this unit of competency
  • Prepare for the design and installation of an integrated server solution
  • Plan and design integrated server solution
  • Install and configure the integrated server solution
  • Test and reconfigure network servers
  • Complete and document network design and installation
Training and assessment resources required for this unit of competency 
  • The student will have access to the following: 
  • Learner guide 
  • PowerPoint presentation
  • Unit Assessment Pack (UAP) 
  • Access to other learning materials such as textbooks

The resources required for these assessment tasks also included:

  • A site where server installation may be conducted
  • Relevant server specifications such as:
  • multiple operating system platforms
  • cabling
  • Networked (LAN) computers
  • Server diagnostic software
  • Switching equipment
  • Client requirements
  • Workstations
  • Relevant regulatory documentation that affects installation activities.

Yourtrainer/assessor will confirm assessment submission details for each assessment task. 

Academic integrity, plagiarism and collusion

Academic Integrity 

Academic Integrity is about the honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas. 

As a student, youare required to:

  • undertake studies and research responsibly and with honesty and integrity
  • ensure that academic work is in no way falsified
  • seek permission to use the work of others, where required
  • acknowledge the work of others appropriately
  • take reasonable steps to ensure other students cannot copy or misuse your work.

Plagiarism

Plagiarism means to take and use another person's ideas and or manner of expressing them and to pass them off as your own by failing to give appropriate acknowledgement. This includes material sourced from the internet, RTO staff, other students, and from published and unpublished work.

Plagiarism occurs when you fail to acknowledge that the ideas or work of others arebeing used, which includes:

  • Paraphrasing and presenting work or ideas without a reference
  • Copying work either in whole or in part
  • Presenting designs, codes or images as yourown work
  • Using phrases and passages verbatim without quotation marks or referencing the author or web page
  • Reproducing lecture notes without proper acknowledgement.

Collusion

Collusion means unauthorised collaboration on assessable work (written, oral or practical) with other people. This occurs when a student presents group work as their own or as the work of someone else.

Collusion may be with another RTO student or with individuals or students external to the RTO. This applies to work assessed by any educational and training body in Australia or overseas.

Collusion occurs when youwork without the authorisation of the teaching staff to:

  • Work with one or more people to prepare and produce work
  • Allow others to copy your work or share your answer to an assessment task
  • Allow someone else to write or edit yourwork (without rto approval)
  • Write or edit work for another student
  • Offer to complete work or seek payment for completing academic work for other students.

Both collusion and plagiarism can occur in group work. For examples of plagiarism, collusion and academic misconduct in group work please refer to the RTO’s policy on Academic integrity, plagiarism and collusion. 

Plagiarism and collusion constitute cheating. Disciplinary action will be taken against students who engage in plagiarism and collusion as outlined in RTO’s policy. 

Proven involvement in plagiarism or collusion may be recorded on students’ academic file and could lead to disciplinary action.

Unit outcome
  • This unit is not graded and the student must complete and submit all requirements for the assessment task for this cluster or unit of competencyto be deemed competent. 
  • Students will receive a 'satisfactorily completed' (S) or 'not yet satisfactorily completed (NS) result for each individual unit assessment task (UAT).  
  • Final unit result will be recorded as competency achieved/competent (C) or competency not yet achieved/not yet competent (NYC). 

Unit Assessment Task 2 

Assessment type:

Unit Project 

Scenario: -

ASMEDA-AUSTRALIA Small and Medium Enterprise Development Authority is a public sector organisation, and its head office is situated in Melbourne. With a futuristic approach and professional management structure it has focus on providing an enabling environment and business development services to small and medium enterprises. ASMEDA is not only an SME-Small and Medium Enterprise policy-advisory body for the government of Australia but also facilitates other stakeholders in addressing their SME development agendas.

ASMEDA is one of the leading intellectual public sector organisations of Australia, offering guidance to SMEs not only by just creating policies and regulations the SMEs but also has developed more than 200 feasibility reports for different business sectors. The feasibility reports help the entrepreneurs and the SMEs to set up their business as per the latest market trends and customer requirements.

As mentioned the Head Office of the organisation is situated in the CBD of Melbourne, therefore all the operational and online activities and facilitations are also hosted at the head office. The server room and the data centre of the organisation is also kept at the head office. The head office and all the regional offices are connected with the network, servers and all the ICT equipment. The email server, file server, proxy server, web server, DNS server, DHCP Server, SQL server all are hosted in the IT department of the Head Office. 

The data in the servers is off immense value due to the copyright of the contents and need to be assessed only by the authorised personal. Also, it has been observed that in the organisations, different operating systems are being used by the employees. For instance, the mid level employees are using Windows Desktop and Laptops, Managerial staff is using MAC OS while IPADS and Andriod Pads are also used by the employees for the presentation and other purposed. 

Graham is working as the IT Manager while assisting the Chief Information Officer-Adam. Both of these are responsible for the integrity of the data along with the smooth setup and working of all the ICT equipment.

It has been observed by the ICT department that due to the versatility in the use of the operating systems and to ensure security of the servers and the network, An integrated server solution needs to be designed and implemented so the secure the ICT resources and most importantly, THE DATA.

The solution will not only help to secure that data but will also provide the authentication mechanism to be implemented across the board for all the operating systems

Graham being the IT Manager will assist the Chief Information Officer Adam in the designing and implementation of the integrated server solution

The job descriptions of both the IT personnel are as under.

Job Description of CIO:

  • Set objectives and strategies for the IT department
  • Select and implement suitable technology to streamline all internal operations and help optimize their strategic benefits
  • Design and customize technological systems and platforms to improve customer experience
  • Plan the implementation of new systems and provide guidance to IT professionals and other staff within the organization
  • Approve purchases of technological equipment and software and establish partnerships with IT providers
  • Oversee the technological infrastructure (networks and computer systems) in the organization to ensure optimal performance
  • Direct and organize IT-related projects
  • Monitor changes or advancements in technology to discover ways the company can gain competitive advantage
  • Analyze the costs, value and risks of information technology to advise management and suggest actions

Job Description of IT Manager:

  • Perform all supervisory responsibilities associated with the IT department including employee related issues. 
  • Enforce company policies and procedures as a member of management for all employees. 
  • Present a professional image as a representative of the company. 
  • Establish and maintain effective professional working relationships with co-workers, and every level of management. 
  • Determine the goals of IT within broad outlines provided by the executive management and contribute to the continuity of computer services by providing necessary technical leadership and project coordination. 
  • Forecast costs, equipment and personnel needs for projects and programs as required and related to MIS operations. 
  • Stay abreast of the latest developments in MIS technology and remain highly technically competent at all levels of data processing while striving for enhanced user productivity through implementation of new software technology where applicable, and the implementation of policies that more effectively utilize MIS resources. 
  • Prepare long and short-range plans for application selection, systems development, and acquisition of the resources needed to support them. Assure responsiveness of long-range plans to corporate objectives. 
  • Establish and maintain relationships with contractors and equipment suppliers.

The network of the ASMEDA is illustrated in the below given network diagram to make it easy to understand the structure of the server room of the integrated server solution:The network of the ASMEDA

Activity 1: :( Role Play on preparation of designing, documentation for the implementation of the integrated server solution)

The IT department needs to correspond with the management of the organisation including the senior management and importantly the finance management who are considered as the major stakeholders of the organisation. Also, the end users are the clients of the solution to be implemented by the IT department. So, the IT Manager under the supervision of the CIO needs to discus and correspond with the clients and the stakeholders of the organisation and will elaborate the planning involved in the designing and documentation of the implementation of the integrated server solution.

You will act as the IT Manager and will elaborate in the meeting (role play) about the preparation and implementation of the integrated solution. Your assessor/trainer will act as the CIO and will correspond with the management and the end users in briefing the requirements. Three of the students will act as the stakeholders and client, including one student will act as General Manager, one as Finance Manager and one student will act as the end user.

Trainer will provide you 10-15 minutes to complete the role play. Additional time will be given as required. Your trainer will observe you during the role play and complete the following performance checklist.

In the role-play you need to discuss the following:

  • Requirements of the server integration solution with the stakeholders and client
  • Management of the process according to the OHS processes and procedures
  • You also need to elaborate the access of the site along with the potential downtime.
    • For downtime you need to verify the substitute for the access and updating of the data to the client 
    • Also, how long with the implementation of the solution will take time.
  • Also, in the meeting you need to ensure that all the related personnel who are directly or indirectly involved in the implementation process are aware of the implementation. Make sure during the role play that all the participants are actively engaged in the discussion.
  • Also, highlight the clean-up process and restoration of the worksite as per the requirements of the end users.

You are required to complete the following meeting minute’s template and submit to your trainer/assessor.

Minutes of Meeting
Meeting Objective:
Attendees:
Venue:
Date:
No
Points Discussed
Actions Suggested
Target Date
















Signature of attendee 1:                                                Signature of attendee 2:
Signature of attendee 3:                                                Signature of attendee 4:

Activity 2: Report - (Documentation of the plan and design of the integrated server solution)

Before initiation of the implementation of the integrated solution, you need to prepare a report including the planning and designing of the solution. You will prepare the report and present the report for final approval from the competent authority i.e. General Manager and Chief Information Officer.

In your report analyse the following points and complete the below given template for the report:

  • Different Authentication Models that will be suitable for the integration of the different operating systems implemented in the network.
  • Reason of the selection of the authenticated method and protocol
  • Investigate the redundancy and replication requirements for the authentication model
  • Prepare the integrated server design, including the authentication, file sharing and security
  • Also, include the configurations made to the server along with the server status
Report on Design and Planning of the integration Server
Purpose:
Department:
Stakeholders:
Supervised by:
Available authentication models:
Reason for selecting the authentication model and protocol:
Design of integrated server:
Server status:
Configurations made to server:
Show More

Answer :

Activity 1 :( Role Play on preparation of designing, documentation for the implementation of the integrated server solution)

Minutes of Meeting
We need 10 – 15 minutes of time to complete this meeting.
Meeting Objective:
In this meeting we are going to discuss about the requirement of integrated server solution. Also, we elaborate the procedure of this upgradation, minimal down time needed to upgrade the servers.
Attendees:
All the members of management are invited to attend the meeting. A formal list of attendees is – 
  • CEO
  • Director
  • CIO
  • General Manager
  • Finance Manager
  • Stakeholders and clients
  • End users
Venue:
The venue of the meeting is:
             ASMEDA
    “Conference hall”
Second floor, CA. Australia.
Date: 01-01-2019
NoPoints DiscussedActions SuggestedTarget Date
1Integrated server service and its benefits in our scenarioListen and approve01-01-2019
2Implementation plan (brief)Listen and approve01-01-2019
3Purchase of service and hardwareReview of budget with comparison 10-01-2019
4Taking down the serverTemporary down all the server services18-01-2019
5Final upgradation Implementation of upgradation18-01-2019
6Resuming services Test the upgradation20-01-2019


Signature of attendee 1:                                                Signature of attendee 2:
Signature of attendee 3:                                                Signature of attendee 4:


Activity 2: Report - (Documentation of the plan and design of the integrated server solution)

Report on Design and Planning of the integration Server

Purpose:
AMEDA-AUSTRALIA is a small to medium size enterprise development authority. Its head office is situated in CBD Melbourne. The organization provide guidance to SMEs by creating guidance, regulation and create more than 200 feasibility reports. That helps the businesses to set up their business to meet latest customer requirements and current market trends. All the activities are done at head office by using the different server roles installed on the server. Different operating systems are used by different employees at different levels like MAC, Androids or Windows. 
Due to the versatility of operating systems, the ICT department has observed the need to implement an integrated server solution. This upgrade implementation is helpful to secure data and other resources on the server. Also, this provide authentication system while accessing the resources from different operating systems.  
  Department:
The new implementation has several departments, some are same as in the previous architecture. A typical list of departments is –
  • HOD 
  • CIO
  • IT manager
  • Senior Employees
  • Junior Employees etc. 
Stakeholders:
The list of possible stakeholders is here –
  • Employees or users
  • Managers
  • Vendors
  • Project team
  • Project sponsor 
Supervised by:
The implementation plan is supervised by the Chief Information Officer (CIO).
Available authentication models:
The available authentication models for the users to access the server and other resources are –
- LDAP - this authentication is done via validating user name and password of users. LDAP directory containing the user credentials that are being validate at the time of accessing resources by the Active directory service of windows or Open LDAP server. 
- PAM or Plug gable Authentication Module - it is a powerful authentication scheme which contains several low level authentication schemes into a high level authentication scheme. This authentication type is mainly used in Linux environment. 
- Samba - this authentication has two types of authentication schemes.one is user level authentication and another is shared level authentication. Shared level security is only implemented in one way. While the user authentication is done in multiple ways such as with active directory, domain or by authentication server.
- NDS or Novell Directory Services - this authentication is done via the Novell server. The user credentials are stored in the directory server that authenticate the user at the time accessing the resources.
- Enterprise single sign-on - it is a session authentication, where a user only once enters its credential and can access multiple services from the single authenticated session. 
- Public key authentication - PKI authentication method has an authentication key that verifies the identity of a user. It is one of the secure authentication methods where instead of entering user-name or password, the user is verified by its authentication key. 
 Reason for selecting the authentication model and protocol:
We choose public key authentication with SSH. PKI with secure shell is become more strong identity. When the user logs in to the server, they need to provide their user authentication key with the correct password or pass-phrase. So, it become more secure authentication mechanism in our server and data protection.   
Design of integrated server:Design of integrated server
We develop a new server design, as shown in the above figure. In this upgradation design, we purchase a racked server that has multiple servers in it. This racked server will replace all the server hardware that are previously installed. All the server roles are installed on different servers mounted in these racks. The previous network configuration is used in this new server upgradation. A router is connected with the firewall and switch. The switch connects all the end user devices installed in the organization. Other details of server configuration are further described in the above section.
Server status:
The previous installed servers are now replaced with the new high configuration server racks, where different servers are mounted and having different server roles. The integration service is installed to combine the different operating system authentication request. The installed server roles are Active directory domain controller, DNS, DHCP, File Server, Mail server, FTP server, SQL server and Application server. 
After the upgradation, all the server roles are configured with the new authentication scheme. We use public key authentication with secure socket layer (SSL). That provide two layers of authentication with the passkey and pass phrase. 
Now the server and it’s all services are live and can be accessed by the clients.  
Configurations made to server:
All the server roles are integrated with the authentication service. The installed server roles are –
  • Active directory domain (DC + DNS) 
  • SQL server
  • Web and FTP server
  • DHCP server
  • File server
  • Mail server
  • Application server
Authentication integration – 
The active directory domain server is installed with the authentication server. This server is the only domain in the hierarchy and has all the users and group details such as user credentials, in its active directory user and computers. So, this server will now become the authentication server for all the connected devices like servers, clients and other resources. Below listed steps are taken to configure the public key authentication on this server –
  • Install SSH on the server.
  • Generate RSA keys with SHA256 key size.
  • Keys are aligned with a complex password for every user to define their access criteria
  • These keys are associated with the user account in active directory
  • When a user try to connect to the server they must have to use the SSH terminal and enter its unique pass phrase to get authenticate.