5. Learner Resource-3 - Ttt gghhggh PDF

Title 5. Learner Resource-3 - Ttt gghhggh
Author Preet Saini
Course MASTER OF INFORMATION TECHNOLOGY: THESIS P/T
Institution Federation University Australia
Pages 67
File Size 976.7 KB
File Type PDF
Total Downloads 61
Total Views 137

Summary

Ttt gghhggh...


Description

ICTNWK504 DESIGN AND IMPLEMENT AN INTEGRATED SERVER SOLUTION

LEARNER RESOURCE

This material is developed by Enhance Your Future Pty Ltd for Australian Institute of Science and Technology (AIST)

Developed by Enhance Your Future Pty Ltd ICTNWK504 - Design and implement an integrated server solution Course Code and Name

2 Version 3

TA B L E O F CO N T E N T S TABLE OF CONTENTS..................................................................................................................................... 3 UNIT INTRODUCTION.................................................................................................................................... 6 ABOUT THIS RESOURCE................................................................................................................................. 6 ABOUT ASSESSMENT..................................................................................................................................... 7 ELEMENTS AND PERFORMANCE CRITERIA..................................................................................................... 9 PERFORMANCE AND KNOWLEDGE EVIDENCE.............................................................................................. 11 PERFORMANCE EVIDENCE........................................................................................................................... 11 KNOWLEDGE EVIDENCE............................................................................................................................... 11 ASSESSMENT CONDITIONS.......................................................................................................................... 13 PRE-REQUISITES.......................................................................................................................................... 13 TOPIC 1 – PREPARE FOR THE DESIGN AND INSTALLATION OF AN INTEGRATED SERVER SOLUTION.................14 CONSULT WITH CLIENT AND KEY STAKEHOLDERS TO IDENTIFY SERVER INTEGRATION REQUIREMENTS.........15 CLIENT............................................................................................................................................................... 15 STAKEHOLDERS.................................................................................................................................................... 15 SERVER INTEGRATION REQUIREMENTS......................................................................................................................15 CONSULTATION....................................................................................................................................................16 Consultative processes..................................................................................................................................16 PREPARE FOR WORK, ACCORDING TO SITE SPECIFIC SAFETY REQUIREMENTS AND ENTERPRISE OCCUPATIONAL HEALTH AND SAFETY (OHS) PROCESSES AND PROCEDURES.................................................18 SITE SPECIFIC SAFETY REQUIREMENTS.......................................................................................................................18 HAZARDS........................................................................................................................................................... 18 RISK ASSESSMENT................................................................................................................................................19 CONTROLLING HAZARDS........................................................................................................................................19 Eliminate the risk..........................................................................................................................................20 Substitute the hazard with a safer option....................................................................................................20 Isolate the hazard.........................................................................................................................................20 Use engineering controls..............................................................................................................................20 Use administrative controls..........................................................................................................................21 Use personal protective equipment..............................................................................................................21 ARRANGE ACCESS TO SITE AND ADVISE CLIENT OF DEPLOYMENT AND POTENTIAL DOWN TIMES.................22 REASONS FOR OBTAINING APPROVALS FOR SITE ACCESS................................................................................................22 DETERMINE SITE ACCESS REQUIREMENTS..................................................................................................................22 OBTAIN PERMITS IF REQUIRED................................................................................................................................23 ADVISE CLIENT OF DEPLOYMENT AND POTENTIAL DOWN TIMES......................................................................................23 CONSULT APPROPRIATE PERSONNEL TO ENSURE THE TASK IS COORDINATED EFFECTIVELY WITH OTHERS INVOLVED AT THE WORKSITE....................................................................................................................... 24 ADVICE IS SOUGHT FROM OTHER PERSONNEL DURING CONSULTATION.............................................................................24 Communication.............................................................................................................................................24 Coordination.................................................................................................................................................25 Work task information..................................................................................................................................25 TOPIC 2 – PLAN AND DESIGN INTEGRATED SERVER SOLUTION...................................................................... 26

Developed by Enhance Your Future Pty Ltd ICTNWK504 - Design and implement an integrated server solution Course Code and Name

3 Version 3

RESEARCH AND REVIEW AUTHENTICATION METHODS AVAILABLE FOR INTEGRATION OF NETWORK OPERATING SYSTEMS.................................................................................................................................. 26 NETWORK OPERATING SYSTEMS..............................................................................................................................26 EXPLAIN AUTHENTICATION METHODS AND PROTOCOLS, SUCH AS LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) AND KERBEROS.......................................................................................................................................................... 26 RESEARCH AND REVIEW AUTHENTICATION METHODS...................................................................................................27 SELECT APPROPRIATE AUTHENTICATION METHODS AND PROTOCOLS..........................................................28 AUTHENTICATION METHODS AND PROTOCOLS............................................................................................................28 SUMMARISE COMPATIBILITY ISSUES AND RESOLUTION PROCEDURES................................................................................28 OUTLINE CURRENT NETWORK OPERATING SYSTEMS (NOS)...........................................................................................29 RESEARCH REDUNDANCY AND REPLICATION REQUIREMENTS FOR SELECTED AUTHENTICATION MODEL.......31 REDUNDANCY AND REPLICATION REQUIREMENTS FOR SELECTED AUTHENTICATION MODEL..................................................31 OUTLINE HIGH AVAILABILITY OPTIONS FOR SERVERS.....................................................................................................31 PRODUCE THE INTEGRATED SERVER DESIGN, INCLUDING AUTHENTICATION, FILE SHARING AND SECURITY. .33 INTEGRATED SERVER.............................................................................................................................................33 SERVER DESIGN....................................................................................................................................................33 DESCRIBE CURRENT SERVER APPLICATIONS , COMPATIBILITY ISSUES AND RESOLUTION PROCEDURES........................................33 TOPIC 3 – INSTALL AND CONFIGURE THE INTEGRATED SERVER SOLUTION.................................................... 36 IMPLEMENT INTEGRATED AUTHENTICATION SOLUTION............................................................................... 36 VERIFY AUTHENTICATION REQUIREMENTS ARE MET.....................................................................................................36 SET UP AUTHENTICATION REQUIREMENTS.................................................................................................................36 CREATE A DATABASE FOR USER INFORMATION............................................................................................................36 CONFIGURE THE SERVER TO ACCEPT THE AUTHENTICATION...........................................................................................36 TEST USER AUTHENTICATION..................................................................................................................................37 DOCUMENT THE AUTHENTICATION PROCESS..............................................................................................................37 IMPLEMENT INTEGRATED FILE SHARING SOLUTION..................................................................................... 38 SUMMARISE NETWORK FILE SYSTEMS AND SHARES......................................................................................................38 FILE SHARING......................................................................................................................................................38 Distributed file systems.................................................................................................................................38 Network file system (NFS).............................................................................................................................39 Server messages block (SMB) or Samba.......................................................................................................40 CONFIGURE WORKSTATIONS FOR INTEGRATED ENVIRONMENT.................................................................... 41 SELECTING COMPONENTS THAT ARE REQUIRED...........................................................................................................41 INSTALL THE SERVER............................................................................................................................................. 41 SET UP DATABASES AND DIRECTORIES.......................................................................................................................41 WORKSTATION CONFIGURATION..............................................................................................................................41 CONFIGURING ADDITIONAL WORKSTATIONS...............................................................................................................42 IMPLEMENT SECURITY FOR THE INTEGRATED SERVER ENVIRONMENT.......................................................... 43 THE IMPORTANCE OF EFFECTIVE SECURITY IMPLEMENTATION.........................................................................................43 SECURITY............................................................................................................................................................43 IMPLEMENT SECURITY FOR THE INTEGRATED ENVIRONMENT..........................................................................................44 TOPIC 4 – TEST AND RECONFIGURE NETWORK SERVERS............................................................................... 45 TEST SERVER FOR BENCHMARKING AGAINST CLIENT SPECIFICATION AND REQUIREMENTS ACCORDING TO TEST PLAN, AND RECORD OUTCOMES.......................................................................................................... 45 CLIENT SPECIFICATIONS FOR INTEGRATED SERVER........................................................................................................45 BENCHMARKS......................................................................................................................................................45 Developed by Enhance Your Future Pty Ltd ICTNWK504 - Design and implement an integrated server solution Course Code and Name

4 Version 3

TEST PLAN..........................................................................................................................................................46 ANALYSE ERROR REPORT AND MAKE CHANGES AS REQUIRED...................................................................... 47 OUTLINE ERROR AND EVENT LOGGING AND REPORTING...............................................................................................47 IMPLEMENT CHANGES REQUIRED.............................................................................................................................48 USE TROUBLESHOOTING TOOLS AND TECHNIQUES TO DIAGNOSE AND CORRECT INTEGRATION PROBLEMS. 49 LIST AND DESCRIBE PERFORMANCE MONITORING TOOLS AND TUNING OPTIONS................................................................49 EXPLAIN TROUBLESHOOTING TOOLS AND TECHNIQUES, INCLUDING NETWORK DIAGNOSTIC UTILITIES.....................................50 DESCRIBE USER AUTHENTICATION AND DIRECTORY SERVICES..........................................................................................51 DIAGNOSE AND CORRECT INTEGRATION PROBLEMS.....................................................................................................51 TEST REQUIRED CHANGES OR ADDITIONS.................................................................................................... 52 REQUIRED CHANGES OR ADDITIONS TO INTEGRATED SERVER ENVIRONMENT.....................................................................52 TEST REQUIRED CHANGES OR ADDITIONS..................................................................................................................53 VALIDATE CHANGES OR ADDITIONS AGAINST SPECIFICATIONS..................................................................... 54 VALIDATION........................................................................................................................................................54 SPECIFICATIONS DOCUMENTATION...........................................................................................................................54 TOPIC 5 – COMPLETE AND DOCUMENT NETWORK DESIGN AND INSTALLATION............................................56 MAKE AND DOCUMENT SERVER CONFIGURATION AND OPERATIONAL CHANGES.........................................56 CONFIGURE SERVERS.............................................................................................................................................56 LIST DOCUMENTATION REQUIRED FOR NETWORKS.......................................................................................................56

COMPLETE CLIENT REPORT AND NOTIFICATION OF SERVER STATUS.............................................................. 57 COMPLETE CLIENT REPORT.....................................................................................................................................57 NOTIFICATION OF SERVER STATUS............................................................................................................................57 CLEAN UP AND RESTORE WORKSITE TO CLIENT’S SATISFACTION................................................................... 58 RESTORING THE WORKSITE.....................................................................................................................................58 WASTE DISPOSAL.................................................................................................................................................58 CLEARING THE WORK SITE ACCORDING TO CODES OF PRACTICE......................................................................................59 CLEARING THE WORKSITE ACCORDING TO ESTABLISHED PROCEDURES..............................................................................59 SECURE SIGN-OFF FROM APPROPRIATE PERSON.......................................................................................... 60 NOTIFYING SUPERVISOR OF COMPLETION OF WORK....................................................................................................60 JOB COMPLETION REPORTS.................................................................................................................................... 60 OBTAINING JOB SIGN OFF......................................................................................................................................62 TOPIC 6 – REQUIRED KNOWLEDGE............................................................................................................... 63 DESIGN AND IMPLEMENT AN INTEGRATED SERVER SOLUTION..................................................................... 63 SUMMARISE FILE AND PRINT MANAGEMENT..............................................................................................................63 EXPLAIN FILE SYSTEM SECURITY...............................................................................................................................63 OUTLINE NETWORK SERVICE CONFIGURATION AND SECURITY.........................................................................................64 SUMMARISE OPERATING SYSTEM HELP AND SUPPORT UTILITIES......................................................................................64 DESCRIBE THE PROCESS OF MANAGING A PROJECT, INCLUDING:.....................................................................................65 Process and task management.....................................................................................................................65 Task scheduling utilities................................................................................................................................65 SUMMARY.................................................................................................................................................. 66 REFERENCES................................................................................................................................................ 67

Developed by Enhance Your Future Pty Ltd ICTNWK504 - Design and implement an integrated server solution Course Code and Name

5 Version 3

UN I T I N T R O D U C T I O N This resource covers the unit ICTNWK504 - Design and implement an integrated server solution.

This unit describes the skills and knowledge required to design and implement a network authentication model that allows users to log in using the same user credentials between multiple operating system platforms to provide a secure method of sharing files on the same network.

It applies to individuals employed in network or systems engineering roles where they are required to support multiple operating systems in a complex computing environment of medium-to-large organisations.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

About This Resource This resource brings together information to develop your knowledge about this unit. The information is designed to reflect the requirements of the unit and uses headings to makes it easier to follow.

You should read through this resource to develop your knowledge in preparation for your assessment. At the back of the resource are a list of references you may find useful to review.

As a student it is important to extend your...


Similar Free PDFs