Assessment Details and Submission Guidelines Trimester T1 2017 Unit Code MN506 Unit Title System Management Assessment Type Individual Report Group Demonstration Assessment Title Installation, Configuration and Management of DC Purpose of the assessment (with ULO Mapping) This assignment is aimed to configure and troubleshoot server features such as Active directory, forest and accounts, whilst applying standard and emerging tools and techniques for system management. And to develop and configure server architecture within the context of constantly changing modern industry requirements. This assignment also gives an opportunity to learn to manage servers and resources to support enterprise information systems by installing, configuring, monitoring, testing, troubleshooting and managing various servers for an organisation. Weight 20% Total Marks 50 Word limit 2000 Due Date Mid night Sunday of the 11th Week i.e. 4th of June 2017 Submission Guidelines All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Assignment Description Six scenarios are furnished below, choose a scenario and form the list and following are your tasks: Find your group mates who have selected the same scenario, each group should not be more than three members, two are acceptable. Realise the scenario during demonstration using either virtually or physically installed OS. A demonstration report (actual demonstration or screen shots demonstration) has to be submitted within 12th Week lab, based on the group’s implementation of the scenario. Same report must also be submitted on Moodle. This report should contain: The important steps of how the scenario was implemented / configured. Students need to configure the domain using either his/her own name or a group member’s name. Also, they must create a simple webpage (Using header tag only) using the student ID’s of the group, which shall be displayed using the IIS. Scenarios: Scenario 1: (Windows Sever and Client Environment) There is a company called “ABC” needs to setup a LAN for the main office which is located in Melbourne. They have three different departments named Operations, Finance and Marketing. All objects belonging to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN: Centralised user authentication Roaming Profiles for users All computers should acquire the IP addresses from a DHCP Server The Company should host a website as well, so a separate IIS server is also required The Company also wants to store all the files on a separate file server and only users with appropriate access will able to access them. Scenario 2: Implementation of BDC (Backup Domain Controller) There is a company called “MNO” needs to increase the efficiency of its LAN by adding a backup domain controller (RODC/BDC), so it can provide all the services in case of failure of the primary domain controller (RWDC/PDC). In order to implement this, there should be auto synchronisation between the RWDC/PDC and the RODC/BDC. Centralised user authentication All computers should acquire an IP addresses from a DHCP Server The Company should host a website, so a separate IIS server is also required BDC should be able display the change made in RWDC/PDC. Scenario 3: (Windows Sever and Linux Client Environment) There is a company called “XYZ” that needs to setup a LAN for the main office, which is located in Melbourne. They have three different departments named Operations, Finance and Marketing. All objects belong to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN: Centralised user authentication Roaming Profiles for users All computers should acquire IP addresses from a DHCP Server The Company should host a website, so a separate IIS server is also required The Company also wants to store all the files on a separate file server. Only users with appropriate access will be able to access files on this separate file server. Scenario 4: (Linux Server and Windows Client Environment) There is a company called “DEF” that needs to setup a LAN for the main office, which is located in Melbourne. They have three different department named Operations, Finance and Marketing. All objects belonging to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN: The Client wants to use the Linux operating system as a server side operating system with the LDAP/SAMBA service to communication between windows client machines and a Linux server. Centralised users authentication Company also want to store all the files on a separate file server. Only users with appropriate access will able to access these files. Scenario 5: (Windows Server with multiple domains) There is a company called “GHI” needs to setup a LAN for the main office which is located in Melbourne. They have three different departments named Operations, Finance and Marketing. All objects belong to those departments should have their own OU. The Clients require the following technologies to be implemented within their LAN: Centralised user authentication for different domains. All computers should acquire their IP addresses from a DHCP Server The Company should host a website, so a separate IIS server is also required 4. There will be two different domains. One is allocated for the administrator and the other is allocated for everyone else. Your configuration should reflect the above criteria and display different privileges assigned to the different domains. Scenario 6: (Windows Server and clients using hardware router and switches) There is a company called “JKL” needs to setup a LAN for the main office which is located in Melbourne and another office located in Sydney. They have three different departments named Operations, Finance and Marketing. All objects belonging to these departments should have their own different OU. The Clients require the following technologies to be implemented within their LAN: Centralised user authentication All computers should acquire their IP addresses from a DHCP Server The Company should host a website, so a separate IIS server is also required The Company also wants to store all the files on a separate file server. Only users with appropriate permissions will able to access these files. The Clients in the Sydney office are connected via a router and switch to the Melbourne Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Description of the section Marks Introduction Installation description 5 Configuration process guidelines All steps are described 10 Configuration screenshots or commands Commands and screenshots showing configurations are part of the report 10 Summary Summary of all configuration performed 10 Demonstrations To demonstrate all the configurations in presentation 10 Conclusions Conclusion of what is achieved in this assignment 3 Reference style All resources referenced properly using IEEE format 2 Total 50 Example Marking Rubric for Assignment #: Total Marks 50 Note: The marking rubrics varies for each assignment Grade Mark HD 40-50 DI 35-44 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Configuration process guidelines /10 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately Configuration screenshots or commands /10 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Summary /10 All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure. Demonstrations /10 Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to reference. Lazy effort with inaccuracies Conclusion /3 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /2 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors