| Student Name | Student Number | ||||||
| Unit Code/s & Name/s | ICTNWK539 Design and implement integrated server solutions
ICTNWK540 Design, build and test network servers |
||||||
| Cluster Name If applicable |
Server |
||||||
| Assessment Type | ☐ Assignment ☐ Project ☐ Case Study ☒ Portfolio ☐ Third Party Report (Workplace) ☐ Third Party Report (Peer) ☐ Other |
||||||
| Assessment Name | Design an integrated Server solution | Assessment Task No. |
2 of 3 |
||||
| Assessment Due Date | Week 6 | Date Submitted | / / | ||||
| Assessor Feedback:
AssignmentTutorOnline
|
|||||||
| Attempt 1 | Satisfactory ☐ | Unsatisfactory ☐ | Date | / / | |||
| Assessor Name | Assessor Signature | ||||||
| ☐ Student provided with feedback and reassessment arrangements (check box when completed) | Date scheduled for reassessment | / / | |||||
| Attempt 2 | Satisfactory ☐ | Unsatisfactory ☐ | Date | / / | |||
| Assessor Name | Assessor Signature | ||||||
| Note to Assessor: Please record below any reasonable adjustment that has occurred during this assessment e.g. written assessment given orally. | |||||||
|
|
|||||||
| Assessment Criteria / Benchmarks
The evidence submitted demonstrates that the student has satisfactorily: |
Attempt 1 |
Attempt 2 |
||
|
Date __/__/__ |
Date __/__/__ |
|||
|
Y |
N |
Y |
N |
|
|
Project Proposal |
☐ |
☐ |
☐ |
☐ |
|---|---|---|---|---|
|
Gap Analysis |
☐ |
☐ |
☐ |
☐ |
|
Showed the current IT infrastructure state |
☐ |
☐ |
☐ |
☐ |
|
Produced a gap analysis of the current IT infrastructure state |
☐ |
☐ |
☐ |
☐ |
|
Researched and determined the solutions for each of the issues identified with the target being the desired state as required for the client |
☐ |
☐ |
☐ |
☐ |
|
Server installation plan: Produced 2 design options addressing all the following areas. |
☐ |
☐ |
☐ |
☐ |
|
Identified the number of servers with specifications and workstations that are required |
☐ |
☐ |
☐ |
☐ |
|
Identified the server operating systems that will be implemented and how they will be integrated |
☐ |
☐ |
☐ |
☐ |
|
Identified the server roles to be configure on each server |
☐ |
☐ |
☐ |
☐ |
|
Identified installation media and the process that will be used for installation of the OS |
☐ |
☐ |
☐ |
☐ |
|
Identified the integration, application incompatibility issues and how the issues will be resolved |
☐ |
☐ |
☐ |
☐ |
|
Network Functionalities: the following have been addressed |
☐ |
☐ |
☐ |
☐ |
|
DHCP – IP schema – has shown in scope and out of scope plan |
☐ |
☐ |
☐ |
☐ |
|
DNS |
☐ |
☐ |
☐ |
☐ |
|
Active Directory Domain Services – including users, OUs, groups, and GPOs |
☐ |
☐ |
☐ |
☐ |
|
Update services – WSUS |
☐ |
☐ |
☐ |
☐ |
|
Description of how an OS will be deployed across a network |
☐ |
☐ |
☐ |
☐ |
|
Communications – email (example MS Exchange Server, Zimbra), web and FTP (example Apache) |
☐ |
☐ |
☐ |
☐ |
|
Print management |
☐ |
☐ |
☐ |
☐ |
|
Group policies |
☐ |
☐ |
☐ |
☐ |
|
Proxy server |
☐ |
☐ |
☐ |
☐ |
|
NTP server |
☐ |
☐ |
☐ |
☐ |
|
Network Security: the following have been addressed |
☐ |
☐ |
☐ |
☐ |
|
Server integration and authentication |
☐ |
☐ |
☐ |
☐ |
|
Identified the authentication model to be applied to the network for the integration of multiple server OS platforms that meet the organisation’s network requirements |
☐ |
☐ |
☐ |
☐ |
|
Described how the authentication models between the different server OS integration including AD and Kerberos protocol |
☐ |
☐ |
☐ |
☐ |
|
Explained how high availability can be achieved with redundancy and replication can be applied to the authentication model |
☐ |
☐ |
☐ |
☐ |
|
File Sharing |
☐ |
☐ |
☐ |
☐ |
|
Described the file storage, management and sharing (between different OS s), Identified file and folder protection – included a permissions plan |
☐ |
☐ |
☐ |
☐ |
|
Proposed Folder structure drawn |
☐ |
☐ |
☐ |
☐ |
|
Data migration and backup requirements |
☐ |
☐ |
☐ |
☐ |
|
Identified the storage requirements and how data will be migrated to the new IT infrastructure |
☐ |
☐ |
☐ |
☐ |
|
Considered any continuous confidentiality and integrity during the network installation process |
☐ |
☐ |
☐ |
☐ |
|
Identified the backup process of data that needs to be implemented |
☐ |
☐ |
☐ |
☐ |
|
Firewall security and Virus Protection |
☐ |
☐ |
☐ |
☐ |
|
Identified Firewall options for network security |
☐ |
☐ |
☐ |
☐ |
|
Described how to protect from viruses |
☐ |
☐ |
☐ |
☐ |
|
Drawn a network prototype that meet industry standards for the information that is incorporated |
☐ |
☐ |
☐ |
☐ |
|
Developed a test plan using the test plan template and inserted into document. Test plan to include: |
☐ |
☐ |
☐ |
☐ |
|
Connectivity test |
☐ |
☐ |
☐ |
☐ |
|
Performance test |
☐ |
☐ |
☐ |
☐ |
|
Availability test |
☐ |
☐ |
☐ |
☐ |
|
Plan Approval – Included the following |
☐ |
☐ |
☐ |
☐ |
|
A clear statement of review and approval |
☐ |
☐ |
☐ |
☐ |
|
A signature area that is signed and dated |
☐ |
☐ |
☐ |
☐ |
| The following documents submitted
ICTNWK539_540_AT2_Part1_yourname.docx ICTNWK539_540_Test_Plan_yourname.docx ICTNWK539_540_Project_approval_yourname.docx |
☐ |
☐ |
☐ |
☐ |
|
Task Scheduling |
☐ |
☐ |
☐ |
☐ |
| Student used a software program that is industry recognised, such as Microsoft Excel or Project |
☐ |
☐ |
☐ |
☐ |
|
Project shown in stages that are recognisable |
☐ |
☐ |
☐ |
☐ |
|
Each stage shows multiple tasks |
☐ |
☐ |
☐ |
☐ |
|
Student assigned sufficient time, including network downtimes, and resources (labour, material, and cost) to each task |
☐ |
☐ |
☐ |
☐ |
|
Schedule has been reviewed and approved by the client (teacher) |
☐ |
☐ |
☐ |
☐ |
|
Produced a budget based on labour, material cost) |
☐ |
☐ |
☐ |
☐ |
| ICTNWK539_540_AT2_Part2_yourname submitted |
☐ |
☐ |
☐ |
☐ |
The post Design an integrated Server solution appeared first on My Blog.