Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina July, 2017
Assessment Details and Submission Guidelines
Trimester T2 2017
Unit Code MN506
Unit Title System Management
Assessment
Type
Individual Report of group based implementation, and demonstration within
group testing individual understanding.
Assessment
Title
Enterprise Network system management by the installation, configuration and
management of Domain Controllers (DC).
Purpose of the
assessment (with
ULO Mapping)
The purpose of this assignment is to provide students with system
management experiences to address the need of modern organisations. After
successful completion of this assignment, students should be able to:
a. Apply standard and emerging tools and techniques for system management.
b. Develop and configure server architecture within the context of constantly
changing modern industry requirements.
c. Manage servers and resources to support enterprise information systems
d. Install, configure, monitor, test, troubleshoot and manage various servers for
an organisation.
Weight 20%
Total Marks 50
Word limit 2000
Due Date Report: Week-11, on the day of your lecture, 11:55 PM. Demo: Week-12 lab.
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
title Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Your submission must be your own work, and will be checked for
originality using Turnitin originality checking system.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly to the School's Administration Officer,
in Melbourne on Level 6 or in Sydney on Level 7. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/speci.
Prepared by Dr Jahan Hassan Moderated by Dr Fariza Sabrin.docx
1. Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina
July, 2017
Assessment Details and Submission Guidelines
Trimester T2 2017
Unit Code MN506
Unit Title System Management
Assessment
Type
Individual Report of group based implementation, and
demonstration within
group testing individual understanding.
Assessment
Title
Enterprise Network system management by the installation,
configuration and
management of Domain Controllers (DC).
Purpose of the
assessment (with
ULO Mapping)
The purpose of this assignment is to provide students with
system
2. management experiences to address the need of modern
organisations. After
successful completion of this assignment, students should be
able to:
a. Apply standard and emerging tools and techniques for system
management.
b. Develop and configure server architecture within the context
of constantly
changing modern industry requirements.
c. Manage servers and resources to support enterprise
information systems
d. Install, configure, monitor, test, troubleshoot and manage
various servers for
an organisation.
Weight 20%
Total Marks 50
Word limit 2000
Due Date Report: Week-11, on the day of your lecture,
11:55 PM. Demo: Week-12 lab.
Submission
Guidelines
with a
title Page.
-
pt Calibri
3. (Body) font and 2.54 cm margins on all four sides of your page
with
appropriate section headings.
listed
appropriately at the end in a reference list using IEEE
referencing style.
for
originality using Turnitin originality checking system.
a Special Consideration
Application must be submitted directly to the School's
Administration Officer,
in Melbourne on Level 6 or in Sydney on Level 7. You must
submit this
application three working days prior to the due date of the
assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
seriousness of
the case, penalties can vary from a written warning or zero
marks to exclusion
from the course or rescinding the degree. Students should make
themselves
familiar with the full policy and procedure available at:
4. http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-
Policy-
Procedure. For further information, please refer to the
Academic Integrity
Section in your Unit Description.
http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-
Policy-Procedure
6. backup and disaster recovery
documentation for the organisation given in your chosen
scenario, and can be used for training new IT
staff in the organisation.
4. This is due on Week-11 on moodle.
5. Use your configured system to demonstrate in group the
implemented scenario during your week-12
lab. Individual understanding will be tested during the demo.
This report should contain the following:
1. Clear identification of what technology/features will need to
be configured in order to realise your
chosen scenario.
2. The important steps of how the scenario was
implemented/configured with each technology/features
that you have identified, along with labelled screenshots.
3. Students must configure the domain using either his/her own
name, or a group member’s name.
4. Students must create a simple webpage (using header tag
only) to display the student ID numbers of
the group members, which shall be stored on and displayed from
the created IIS (web server).
Scenarios (Choose one only):
Scenario 1: Local Area Network (LAN) to support Windows
Server and Client Environment
7. TridentS is a software development company requiring the
setting up of a LAN for their office located in
Sydney. They have four departments: Developers, Marketing,
Operations, and Finance. All objects (e.g., users,
computers, etc.) belonging to these departments need to be
created within their respective OU for their own
department. TridentS requires the following technologies to be
implemented within their LAN:
1) Centralised user authentication
2) Print server for users
3) All computers should acquire the IP addresses from a DHCP
Server
4) TridentS needs to host a website, thus a separate IIS server is
required
5) The company wants to store all the files on a separate file
server and only users with appropriate
access will be able to access them (not every user should have
access to the files). You can assume
which users/groups will have access to these files, and state
your assumption clearly.
Scenario 2: Increasing LAN efficiency using a Backup Domain
Controller (BDC)
In order to increase the efficiency of its organisational LAN,
SuperAd- a company in the advertising business,
requires you to add a backup domain controller (RODC/BDC) in
addition to a domain controller, so that it can
provide all the services in case of a failure of the primary
domain controller (RWDC/PDC). In order to
implement this, there should be auto synchronisation between
the primary domain controller and the backup
8. domain controller. SuperAd requires the following technologies
to be implemented within their LAN:
1. Centralised user authentication
MN506 System Management Page 3 of 4
Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina
July, 2017
2. All computers should acquire an IP addresses from a DHCP
Server
3. The Company should host a website, so a separate IIS server
is also required
4. A backup domain server, capable of displaying the changes
made in the primary domain controller.
Scenario 3: Local Area Network (LAN) to support Windows
Sever and Linux Client Environment
With the growing base of users of Linux, EduTech, a company
planning to create Windows server based LAN
decided to also support the Linux clients to authenticate using
the Active Directory. The company has three
different departments named Operations, Finance and
Marketing. All objects (e.g., users, computers, etc.)
belong to these departments should have their own different
OU. The Clients require the following
technologies to be implemented within their LAN:
9. 1. Centralised user authentication support for Linux clients
2. All computers should acquire IP addresses from a DHCP
Server
3. The Company should host a website, so a separate IIS server
is also required
4. Hyper-V
Scenario 4: Setting up technology/features for Linux Server and
Windows Client Environment
A Melbourne based company is looking at setting up a LAN for
their office. They have three different
departments named Production, Finance, and Marketing. All
objects (e.g., users, computers, etc.) belonging
to these departments should have their own different OU. The
users require the following technologies to be
implemented within their LAN:
1. The client wants to use the Linux operating system as a
server side operating system with the
LDAP/SAMBA service to communication between windows
client machines and a Linux server
2. Centralised user authentication for Windows clients
3. The company wants to store all the files on a separate file
server and only users with appropriate
access will be able to access them (not every user should have
access to the files). You can assume
which users/groups will have access to these files, and state
your assumption clearly.
Scenario 5: Local Area Network (LAN) to support Windows
Server with multiple domains
10. A company needs to setup a LAN for the main office which is
located in Perth. They have three different
departments named Operations, Management and Marketing. All
objects (e.g., users, computers, etc.)
belonging to those departments should have their own OU. The
Clients require the following technologies to
be implemented within their LAN:
1. There will be two different domains. One is allocated for the
administrator and the other is allocated
for everyone else (users).
2. Centralised user authentication for different domains
3. All computers should acquire their IP addresses from a DHCP
Server
4. The Company should host a website, so a separate IIS server
is also required 4.
5. Your configuration should reflect the above criteria and
display different privileges assigned to the
different domains users belonging to these domains.
MN506 System Management Page 4 of 4
Prepared by: Dr Jahan Hassan Moderated by: Dr Fariza Sabrina
July, 2017
Marking criteria:
Example of marking criteria is shown in following table. Marks
11. are allocated as follows:
Note: The marking criteria varies for each assignment
Section to be included in
the report
Description of the section Marks
Introduction Clear identification of what technology and/or
features
will need to be configured to realise your chosen scenario
5
Configuration process
description
All steps are described for each identified
technology/feature
10
Configuration
screenshots or
commands
Screenshots of commands and GUI configurations for
each identified technology/features that are part of the
report are provided using labelled diagrams
(screenshots).
10
Summary Summary of all configuration performed 5
12. Demonstrations To demonstrate all the configurations using
implemented
system and report
15
Conclusions Conclusion of what has been achieved in this
assignment 3
Reference style All resources referenced properly using IEEE
format 2
Total 50