please if you can make it on time
Assessment 1 To be administered by the Trainer/Assessor after the completion of all formal information presentation Course and Code: ICT50415 Diploma of Information Technology Networking Unit/s of Competency: ICTNWK504 Design and implement an integrated server solution *Student Name: Assessment Type: Case Study, Practical Demonstration *Student No: Your Submission date will be what is shown in ACCIT Moodle after it is submitted for grading. (Not draft submission date.) *Assessor Name: This fields are required to be filled All questions must be answered. To answer the questions, use this document. Please complete this assessment and submit for marking. This forms part of your assessment for ICTNWK Design and implement an integrated solution. Please go through the following documents before answering: · ICTNWK504 Unit of Competency · ICTNWK504 Learner Guide Word count In this assessment some of the questions include a word count. This is a guideline only, but your answers should not vary substantially (i.e. +/- 10%) from the word count provided. Microsoft Word includes a word count tool. A paragraph means 40-80 words. Reasonable Adjustment Whilst reasonable adjustments can be made in terms of the way in which evidence of performance is gathered, the evidence criteria for making competent/not yet competent decisions (and/or awarding grades) cannot be altered in any way. That is, the standards expected are the same irrespective of the group and/or individual being assessed; otherwise comparability of standards will be compromised. Please consult your trainer or the Director of Studies if you have any Tasks or special needs. Instructions to the Student Please read all the information given to you before you start this assessment. If you do not understand some or all the instruction, please discuss them with your trainer/ assessor. Answer all Tasks in your own words. The instruction is designed to assess your understanding of the unit as well as your underpinning knowledge. Please follow the below mentioned instructions before starting the assessment. · This is not a group assessment. Complete the assessment individually unless instructed otherwise. · Submitted documents must have the following criteria. Font must be Times New Roman, Font Size needs to be 12, line spacing must be Single line. · This Case Study allows you to demonstrate skills and knowledge required to carry out the design and implementation of an integrated server solution to enable multiple operating system platforms to co-exist on the same network. · Tasks 3.1, 3.2, 3.3, 3.4, 4.1, 4.2, 4.3, 4.4 and 4.5 are observation-based tasks, you will have to demonstrate the installation, configuration and testing of integrated server solution to your trainer/assessor. Assessment Requirements Students must attempt at all activities and demonstrate all required skills to a satisfactory standard. If you do not answer a part of the Assessment, and are therefore deemed to be Not Yet Satisfactory, your trainer/ assessor may ask you supplementary Tasks to determine your competence. Should you still be deemed Not Yet Satisfactory, you will have the opportunity to undertake a supplementary assessment or appeal the result. This assessment is intended to be equitable, fair and just. If you feel that the college should change any aspect of this assessment to be fair, equitable or just, immediately contact your assessor who will attempt to make alterative arrangements Performance Objective Design and implement a network authentication model that allows users to log in using the same user credentials between multiple operating system platforms to provide a secure method of sharing files on the same network. Assessment Description · This assessment provides a short instruction to guide you in creating a report for designing and implementing an integrated server solution. · To complete this assessment successfully students are to consider the case study provided below. Submission Details · When you are ready to submit your assessments, upload the files in ACCIT Moodle, either by dragging and dropping your assessment into the space provided or browsing the files on your computer. · Upload this assessment online in ACCIT Moodle once you have completed your assessment with all required evidence attached. · It is important that you keep a copy of all electronic assessments submitted to ACCIT Moodle. Note: Please submit all assessment components in one file, or with as few attachments and separate documents as possible; i.e. do not include templates or emails in separate documents – place them all in the one document. Case Study Company Profile WebNetIn is a leading global financial services firm operates with more than 2,000 employees in over 5 countries. The Customer Service division alone operates some 500 desktop workstations. Introduction WebNetIn was operating a customer service Call Centre in Sydney. The desktop workstations run mix of 300 Windows 10 and 200 Linux based Ubuntu Desktop versions, which the company found to be a cost-effective choice for supporting its call centre workers. As the size of the operation grew to more than 500 desktops, however, it became difficult to manage users, authenticating, file sharing and security on that many Linux based machines. Situation Call centre operations pose a greater security concern in financial services than in some other industries, because the subject matter of the calls is typically sensitive information. That’s why this company was frustrated by the obstacles it faced in implementing standard authenticating, file sharing and security policies across the hundreds of Linux based machines used by its call centre personnel. “The larger our operation grew, the more important it became to implement standard authenticating, file sharing and security policies across all our workstations,” said the chief security information officer. “We needed to enforce single usernames, strong passwords, and locking desktops – these kinds of things. Because authentication was being handled locally on the Linux based machines, there was no easy way for the IT department to verify that any authenticating, file sharing and security policies were being followed. The company lacked the kind of central user account management for its Linux fleet that Active Directory was providing for other Windows machines. In addition, the management of new hires, departures, and changing job roles had become a challenge. A single user might need to be provisioned on one or two different machines locally, plus an Active Directory account. High turnover rates at the call centre just made the problem worse. “We needed to simplify the process. We had people spending all their time doing nothing but setting up new users and getting rid of old accounts,” the security officer said. “The amount of work involved every time a new employee replaced an old one was simply becoming unreasonable.” Suppose a manager leaves the company, an associate is promoted to the manager’s position, and a new hire replaces the associate. “We would typically have to remove accounts and set up new identities manually on three different machines and Active Directory domains,” the security officer said. “This happened all the time.” Since they already have Windows infrastructure the IT Department is considering ‘Likewise Open’ open source integration for Microsoft's Active Directory for authentication and security on Linux based machines and ‘FreeNAS’ an embedded open source network attached storage (NAS) system based on FreeBSD (UNIX) to configure the Microsoft’s Active Directory service so that it can import the account information and imported users can be authorized to access the file sharing. They need further consultation over this matter and approached you. Unfortunately, as our operation grew, enforcing even simple authentication policies in an environment of Active Directory domains and locally managed machines became painful to accomplish. We really needed a better way. Chief Security Information Officer. Activity 1: Prepare for the design and illustration of an integrated server solution Objectives · Consult with client and key stakeholders to identify server integration requirements · Prepare for work, according to site specific safety requirements and enterprise Workplace health and safety (WHS processes and procedures · Arrange access to site and advise client of deployment and potential down times · Consult appropriate personnel to ensure the task is coordinated effectively with others involved at the worksite Task 1.1: Write a memo to the Manager of the IT Department, include details the information about the requirements of the integrated server solution. Your memo should: · Identify the key stakeholders that are related to the project · List the server services (such as Active Directory etc.) that need to be installed and the IP settings to be changed for the existing network configuration prior to any implementation YOUR ANSWER HERE Task 1.2: Apply precautions and required actions to minimise, control or eliminate hazards that may exist during work activities. · List at least 3 precautions and safety measurements you would take while installing server integration for WebNetIn. YOUR ANSWER HERE Task 1.3: Arrange the access to the site and discuss the potential downtimes during the project with the IT Department Manager. · Add these details to your Memo which you created in Task 1.1. YOUR ANSWER HERE Task 1.4: Make an appointment with the Manager (Your Trainer) of the IT Department of WebNetIn and discuss some potential personnel who will be coordinating work at the worksite. Your task is to: · Write “Meeting Minutes” from the meeting where you summarise what has been discussed. YOUR ANSWER HERE Activity 2: Plan design integrated server solution Objectives · Research and review authentication methods available for integration of network operating systems · Select appropriate authentication methods and protocols · Research redundancy and replication requirements for selected authentication model · Produce the integrated server design, including authentication, file sharing and security · Make and document server configuration and operational changes · Complete client report and notification of server status Task 2.1: This task will allow you to demonstrate your knowledge of authentication methods and protocols, compatibility issues and resolution procedures that may be related to current network operating system. You have been asked by IT Department of WebNetIn to research authentication methods and protocols, such as lightweight directory access protocol (LDAP) and Kerberos. · In two (2) or three (3) paragraphs compare three major authentication protocols with their advantages and disadvantages. YOUR ANSWER HERE Task 2.2: This task gives you the skills to identify the technical requirements, constraints and manageability issues for WebNetIn requirements. · In a paragraph, based on comparison of authentication protocols in Task 1.5, evaluate performance and interoperability of current network operating systems with authentication methods (in your case it is Microsoft Active Directory and Linux based operating system). · Select the appropriate authentication method from your research and comparison which satisfies WebNetIn’s requirements. Write a paragraph of your recommendation. YOUR ANSWER HERE Task 2.3: Research redundancy and replication for selected authentication model (Active Directory in your case). · Write a paragraph of requirements which will be implemented in WebNetIn’s environment. YOUR ANSWER HERE Task 2.4: This task allows you to demonstrate your knowledge of documentation required for networks. · Produce a network design/diagram for the IT Department to integrate multiple server operating systems for authentication, file sharing and security using tools