Premium Essay

Ubuntu Dns Server

In:

Submitted By vr7marauder
Words 1296
Pages 6
Assessment 3 Course Name | Managing Network Operating Systems | Credits | 15 | Code | NW701 | Level | 7 | Id | | Name | | Date | | Signature | |

Aims: 1. To equip students with the skills necessary to enable them to manage network operating systems. Date | 6/08/2014 | Time | 9:30 | Learning Outcomes | 1, 2,3 | Assessment Weightings: | 100 Marks in total converted to 40% of final grade | Conditions: | In class individual test. Closed book. Practical task in laboratory conditions, and presentation | Time Allowed: | 1 Hours (practical not included) (plus 15-30 minutes practical time for each student) | Learning Outcomes Assessed:

Learning outcomes assessed | Questions | Marks | Assessment Weighting % | 2 | Perform and evaluate tasks that will deploy and configure a network operating system | Task1 Task 2Task 3 | 30 2020 | 50% | 4 | Evaluate how a networking operating system uses the OSI model | Task 1 | 30 | 20% | 5 | Compare and contrast two network operating systems | Task 4 | 30 | 30% |

Task Number | Marks allocated | Marks obtained | 1 | 30 | | 2 | 20 | | 3 | 20 | | 4 | 30 | | Total Marks | 100 | |

Instructions: 1. You should attempt ALL the questions in this test. 2. Check all the tasks in the assessment 3. Task One is an individual project. 4. Task Two ,Three and Four are practical tasks 5. Read instructions carefully. 6. Write your full name and student ID number on the cover sheet of the answer booklet. 7. Write your full name on EACH page of the answer booklet. 8. Write in blue or black ink only; no red or green ink, and no pencil. 9. If you need more paper, please put up your hand and ask the exam supervisor 10. This is a closed book assessment or as stated otherwise for presentation and practical tasks 11. No notes,

Similar Documents

Free Essay

Contoh Laporan Drp

...LAPORAN DISASTER RECOVERY PLAN DOMAIN DAN SUBDOMAIN PEMERINTAH KABUPATEN MALANG OLEH: I Putu Gede Dharma Pradita Putu Teja Putra I Wayan Anggayuda Gede Suryanatha Gede Pandityana (120010098) (120010082) (120010120) (120010086) (120010103) SEKOLAH TINGGI MANAJEMEN INFORMATIKA DAN TEKNIK KOMPUTER (STMIK) STIKOM BALI 2015 DAFTAR ISI Pendahuluan ................................................................................................................................. 1 1. Daftar Mesin ............................................................................................................................. 3 2. Traceroute ............................................................................................................................... 16 3. Analisa Aset ............................................................................................................................ 18 4. Network Vulnerabilities Assessment .................................................................................. 25 5. Service Level Requirement .................................................................................................. 27 6. Bussiness Impact Analysis(BIA) .......................................................................................... 30 7. Disaster Recovery Plan (DRP) ............................................................................................ 32 i Pendahuluan Pada zaman yang modern seperti sekarang...

Words: 6026 - Pages: 25

Premium Essay

Systems Administration

...Q1. Outline the installation process of the Ubuntu Server Edition? Ans. * By using a pen drive or from a VMware network * By using a CD-ROM or do a bootable disc and slot it into the device * Q2. Describe the installation process of Ubuntu from a CD or a bootable disc. Ans. * First, download and burn the appropriate ISO file from the Ubuntu web site3. * Boot the system from the CD-ROM drive. * At the boot prompt you will be asked to select the language. This is default and it will show up immediately you install the server. * After, select an installation language. This is what will see you through the installation process. * Choose the continent and country. This is very important because there are servers all over the world that the Ubuntu or Linux system can go in for updates. It looks for servers available in the specified region and relays you to that server. This makes updating quite easy. * You will then asked to select your keyboard layout or the keyboard detection. * It will load the components from the CD or bootable drive onto the system. * The installer then discovers your hardware configuration, and configures the network settings using Dynamic Host Configuration Protocol (DHCP) which will make everything automatic and find your local host name by default * However, if you want to configure the network manually, you will need a static IP address since it is a server. You can use the ipconfig command in the command...

Words: 611 - Pages: 3

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic...

Words: 1059 - Pages: 5

Premium Essay

Scenario Analysis Report

...Custom Designed Server Room 3 3. Project Management 4 4. Computer Hardware 5 5. Computer Software 6 6. Security 7 7. Naming and Directory Services 8 8. Business Continuity 9 9. On-going Management 10 10. Overall Summary 11 11. Bibliography 12 1. Introduction The main focus of this report is to detail the necessary resources and preparations that would be necessary in order to create and manage the ICT systems for this University. By using information from outside sources, I will make observations as to the various aspects that will be necessary to create and manage our network in an efficient and efficient manner and in a way that allows the ease of use to the various users who will be using the network and its resources. These resources would include both the hardware that would be running and managing the network such as the mail and web servers in addition to the hardware that the users will be interacting with such as the desktop computers, printers amongst others. 2. Custom Designed Server Room As this room would function as the nerve centre for the entirety of our network, stringent security measures should be implemented to protect the room itself as well as the equipment stored within it. As detailed both in a further section of this report a high priority should be placed on the security and maintenance of it. From what I have read from the mentioned reference points, I have determined that while situating the server room in a basement...

Words: 5666 - Pages: 23

Premium Essay

It530 Assignment Unit 1

...Running Head: DOMAIN NAME SERVERS AND INTERNET PROROCOL Domain Name Servers and Internet Protocol Awaz Barwari Kaplan University Abstract Domain Name System (DNS) is central to the Internet and networking. It converts the host name into an Internet Protocol (IP) addresses. Domain names are in alphabetic form easy for human to remember. Nonetheless, the World Wide Web (WWW) is run based on IP addresses. Therefore, without the DNS the internet would be very difficult to access. Today, there are two versions of IP 4 and 6 that use DNS. With the growing number of devices with internet IP address, IPv4 is running out of addresses and will eventually be replaced by IPv6. But until then, it is important to understand the many similarities and contrast between both versions. Domain Name Servers and Internet Protocol The core of how the internet works is the DNS, which was created to simplify the unmanageable computer naming. Thus, allowing us to use a more human friendly host name while exchanging email or accessing web pages. An IP address is a numerical label assigned by the Internet Assigned Numbers Authority (IANA) to every host in order to communicate. (Gralla, 2006). The DNS will translate host name like www.google.com into a raw IP address number 173.194.40.197. DNS structure is a hierarchical distributed database. At the top level there is a root server. Many categories were created under the root called the top level domains: .Com, .Net, .Org...

Words: 1390 - Pages: 6

Premium Essay

Using Google Dns

...Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses used by your ISP's domain name servers are automatically set by your ISP via the Dynamic Host Configuration Protocol (DHCP). To use Google Public DNS, you need to explicitly change the DNS settings in your operating system or device to use the Google Public DNS IP addresses. The procedure for changing your DNS settings varies according to operating system and version (Windows, Mac or Linux) or the device (computer, phone, or router). We give general procedures here that might not apply for your OS or device; please consult your vendor documentation for authoritative information. Note: We recommend that only users who are proficient with configuring operating system settings make these changes. Important: Before you start Before you change your DNS settings to use Google Public DNS, be sure to write down the current server addresses or settings on a piece of paper. It is very important that you keep these numbers for backup purposes, in case you need to revert to them at any time. After changing your settings, if you encounter a problem and cannot connect to the Internet, please call our support numbers for troubleshooting instructions. We also recommend that you download this page and print it, in the event that you encounter a problem and need to refer to these instructions. Google Public DNS telephone support...

Words: 2404 - Pages: 10

Free Essay

Miss

...by simonw Brief updates and some advice by kumanna Linux/Ubuntu on an Asus UL30A (QX130V) by mnaumann 1 comment Installing Debian onto an Asus A6Q00KM by ajt 1 comment Ingo Steinke by fraktalisman Popularity vs. stagnation by Steve 11 comments Lenny guest and Hyper-V by e5z8652 Burst of GET / requests on Apache2 by k2 3 comments Munin 1.4.0 alpha released by stab More Weblogs • Archived Weblogs Debian Administration System Administration Tips and Resources [ About | Adverts | Archive | FAQ | Hall of Fame | Search | Tag Cloud | Securely erasing files, by filling your disk Posted by Steve on Sat 2 Jan 2010 at 14:34 Tags: filesystems, secure-delete, security, utilities With modern filesystems securely deleting files isn't always easy, but one approach which stands a good chance of working is to write random patterns over all unused areas of a disk - thus erasing the contents of files you've previously deleted. ( Read 293 more words ~ 11 comments posted ) Creating Bind DNS-Entries with regular dyndns-clients in routers Posted by stefanbauer on Thu 31 Dec 2009 at 10:46 Tags: bind, dynamic dns, perl Recently there was a message posted upon the debian-user-german mailing list asking if there is a way to create BIND-compliant DNS-Updates with regulars dyndns-clients from routers. The Idea behind this is to get rid of dyndns.org services and provide an independent way to maintain dynamic dns entries for boxes without a static ip-address without the...

Words: 987 - Pages: 4

Premium Essay

Server Buil Automation

...CentOS/RHEL/Fedora, if everything goes well here you should be able to build client servers without any manual work using PXE boot. Server setup. For the cobbler server basic requirement is you need two NIC cards if you want to use it for DHCP as well. Why do i need two NIC cards because it allow client servers to initially boot up in the private network where Cobbler will handle the installation. Since Cobbler utilizes DHCP and TFTP, making these services listen on a Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the Firewall It’s possible to have the firewall running — you just need to ensure that the proper ports are opened. For simplicity, and since this server is in a private network, I chose to have the firewall turned off. You can...

Words: 16529 - Pages: 67

Premium Essay

Itech 1005

...ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1- NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .....................................................

Words: 3418 - Pages: 14

Premium Essay

Comparative Analysis of Various Cloud Technologies

...International Journal of Computers & Technology Volume 1 No.1 Dec. 2011 Comparative Analysis of Various Cloud Technologies Dr. Gurdev Singh Professor and Head Department of Computer science & Engineering Adesh Institute of Engineering & Technology Faridkot (India) Akanksha Lecturer Department of Computer science & Engineering Adesh Institute of Engineering & Technology Faridkot (India) singh.gndu@gmail.com 1. ABSTRACT With the increasing prevalence and demand of large scale cloud computing environment, a researcher has to draw more attention towards the services provided by the CLOUD. As the access to the server is increasing, centralized and distributed computing architecture will produce bottlenecks data which affect the quality of cloud computing services and bring the huge support to users. In this paper we are going to propose certain vital aspects such as memory utilization, storage capacity to check the efficiency and performance of various clouds in cloud computing environment. This is based upon the static data. The proposed mechanism enables users to access memories in various systems depending on the predefined criteria. Selection method for accessing the memory of a resource is properly introduced in this paper. Our evaluation results show that the aggregation of various clouds is effective in indicating the better efficiency and also to reduce network traffic sent over cloud networks. er.akanksha1988@gmail.com WAN networking. The interlinking and...

Words: 2356 - Pages: 10

Premium Essay

Essay

...Greenway Bank Capstone Project 1 A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT/Network Systems Administration Program By ADVISOR — Orange, CA December, 2013 Table of Contents Introduction…………………………………………………………………………….……3 Background…………………………………………………………………………….……3 Scope of Work………………………………………………………………………….……3 Evaluation/Analysis...………………………………………………………………………3 Project Situation……………………………………………………………….……3 Network Scope………………………………………………………………….……3 Objectives……………………………………………………………………….……4 Design…………………………………………………………………………..…….4 Equipment…………………………………………………………….………4 Hardware…………………………………………………………………….5 Software………………………………………………………………………5 Services……………………………………………………………….………5 Design Floor………………………………………………………………….……..6 Design Assumptions………………………………………………………….……..6 Network Analysis……………………………………………………………………………7 Data Types…………………………………………………………………...………7 Numbers of Users…………………………………………………………..……….7 Security Requirements…………………………………………………...…………7 Network Diagram……………………………………………………………...……………8 Cost………………..………………………………………………………………………….9 Disaster Recovery Plan………………………………………………………………………………………….10 Acceptance and Authorization……………………………………………………………………………….10 Introduction Greenway Bank is a new St. Louis company that has secured venture capital to take over four failed bank branches in four different cities, New York, Seattle, Orlando, and Los Angeles. The...

Words: 1381 - Pages: 6

Premium Essay

Test

... Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Week 10 Term Paper Cis210 Strayer

...Term Paper System Analysis and Development Professor Blaine Easterwood Chris Donacki September 6th 2015 When beginning to build a web architecture there are several things that need to be kept in mind. Firstly, performance, this is one of the more important considerations, the speed of a website has a direct impact on both the effectiveness of the website and how satisfied the users will be with the website. Not only that, it does play a role in search engine ranking which directly correlates to possible revenue if applicable. Due to this creating an optimized site with low latency is very important. Reliability, any system, every system needs to be if nothing else reliable. I mean this in a sense that data will remain consistent. Scalability, when it comes to any system size is just another aspect that needs to always be considered. Given how fast some businesses can grow on today’s internet this aspect is especially important. Any future growth must be able to be accommodated. Manageability, having a system that can easily diagnose and manage any problems additionally effects any possible revenue, essentially the only time you won’t be able to make money off of a website is when it’s down. Having a system that is highly manageable has an effect on everything else. Finally, cost, this should more or less go without explaining. How much it will cost to build the architecture from the ground up, and how much one would have to make in return for it to be a profitable venture...

Words: 1489 - Pages: 6

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18