Question
The Case Study Company Name: Anzac Airport Anzac Airport is a small private airport which provides passenger and freight services for local clients and businesses.
The Case Study
Company Name: Anzac Airport Anzac Airport is a small private airport which provides passenger and freight services for local clients and businesses. Anzac Airport must be compliant with all commonwealth and state laws and regulations regarding airport facilities and operations. The organizational structure of Anzac Airport consists of three departments which support five areas of operational activity: Administration, Information and Technology, Security, Finance, and Airport Operations. The Information Technology team is under the Information and Technology department. They currently spend 80% to 90% of their time dealing with a constant stream of desktop support issues.
20XX IT Budget Staff salaries and professional development $230,000 Hardware purchases $140,000 Software Purchases $140,000 There is some flexibility in this budget but the overall budget of $510,000 for the year must be met.
Responsibilities of the Information Technology department
Current Configuration:
|
Business Needs:
Technical Requirements:
|
Company Policies:
|
Assessment 1 task 3 - Installation of operating systems
Your teacher will allocate access to physical and/or virtual technology to complete the remaining practical tasks. You will be directed as to how virtual servers will be created and maintained.
If you are an on-line student you will need to arrange access to technology to complete this assessment. Some suggestions:
- Download free Oracle Virtual Box and install on your PC or on a separate computer install a copy of a 180 day evaluation of Windows Server and use the Hyper-V hypervisor that is inbuilt.
- Create virtual machines to complete the operating system requirements must include a Linux system that is running a web server
- Download free - trial of Windows Server OS
- Use scenario descriptions to complete some activities i.e. describe in text what you would expect to occur
In preparation for task 3 students will need to:
- Review design action plan from task 2 for creating servers in a virtual environment
- Your checklist should specify how many servers you need and what operating systems should be installed on them.
- Access the virtual environment (Virtual Box or VMWare or Citrix Xen or Hyper-V)
For task 3 students are required to complete the following activities:
- List consideration for WHS before starting to install your servers and mitigation strategies
- Compose a procedure to show how you will back up system files and data prior to new server installation
- Create the virtual servers
- Install the server operating systems including email, Linux web server, etc. the accounting software mentioned should be provisioned for (have a look at https://www.manager.io/server/), as is the communications server, network monitoring software, etc.
- Install/connect (VMs or physical) 2 workstations to your network to check you access and security
- Logon to each server to confirm installation and test admin accounts
- Update servers and applications
When you encounter problems with installation you may need to use various tools including the operating system rescue environment, help and support utilities, performance monitoring tools, and tuning options. Take the time to understand how these tools should be used, and use them to solve installation and start-up problems, and to optimise the operating system for practical use in the case study company.
This is a practical activity therefore you will be expected to submit screenshots of your various servers. The completed work must be observed by your teacherto show that the following requirements have been met:
- Your list consideration for WHS before starting to install your servers and mitigation strategies
- A backup plan has been devised to show how existing system files and data will be secured
- Create multi-platform virtual servers in a hypervisor
- Install incompatible operating systems into a virtual server
- Logon to servers to confirm installation and test admin accounts
- install and configure the server according to the produced design
- Install an integrated server solution according to the produced design
To successfully submit your work, you must copy your document with the screenshots and comments of your various servers into your drobox
Assessment 1 task 4 - Configuration of server applications and processes
In preparation for task 4 students will need to:
- Review design action plan from task 2 for creating servers in a virtual environment
- Your action plan will specify how the servers should be configured
For task 4 students are required to complete the following activities:
Configure the following services according to your action plan. :
- Network services
- DHCP
- DNS
- Active Directory including users, OUs, show using edited group policies (password and login as a minimum)
- AD Certificate Services
- Update services -configure for auto update
- Backup services
- NTP server
- Implement Kerberos or NTLM for your cross platform authentication.
- File services
- File sharing
- File and folder protection
- Including restoring backed up data
- Applications
- Email server (third party email server)
- Web server
- FTP
- Security
- Authentication including the use of biometric authentication (as per your notes in section 2.3)
- file permissions
- firewall - including proxy server, VPN access, IDS/IPS implementations
- VPN Access once your host sever is active you should be able to access it from your desktop
To successfully submit your work, you must copy your document with the screenshots and comments of your various servers into your drobox. The completed work must be observed by your teacher to show that the following requirements have been met:
- Configure DHCP services to deploy IP address is the extended network
- Configure DNS services to resolve IP addresses in the extended network
- Configure directory services to manage network resources and authentication across the extended network
- Configure file services to provide access and security across the extended network
- Configure email and web services for access from multi-platform devices
- Activate and configure authentication, file permissions and firewall protection across the extended network
- Detail how you implemented Kerberos or NTLM for your cross platform authentication.
- Configure single sign-on authentication across the extended network
- Completed Installation checklist
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started