Anda di halaman 1dari 8

Build a Server

Class Project

Contents
1.1 Existing Environment....................................................................................2
1.2 The environment / Domain ..........................................................................3
1.3 Getting a domain name for the company.....................................................4
1.4 IP addressing for this new organisation. How to get the IP address.............4
1.5 Number of servers required..........................................................................4
1.6 Types of servers required and how they would be configured (DHCP, DNS,
Print, DC etc)...................................................................................................... 4
Desktop Environment............................................................................................6
1.7 Roll out of the workstations (imaging), (How you would install the OS and
apps on the computers.).....................................................................................6
1.8 Additional peripherals required. You can ask the teacher............................6
1.9 Implementation/ assigning of IP addressing. (Details of IP ranges for each
campus, subnets etc )........................................................................................6
1.10 NAT............................................................................................................. 6
1.11 Drive mappings, logon scripts....................................................................6
1.12 Topology.....................................................................................................6
1.13 Network Security........................................................................................6
1.14 Access restrictions on workstations............................................................6
1.15 Security policy. ..........................................................................................6
1.16 Group Policy............................................................................................... 6
1.17 Computer User Policies...............................................................................6
Restricted internet access, preventing staff from accessing inappropriate sites is
required. ...............................................................................................................7
1.18 Name resolution ( DNS, Zones, WINS if required – (comment on this))......7
1.19 Protocols to be used ..................................................................................7
1.20 Remote Access for Staff..............................................................................7
1.21 Backups...................................................................................................... 7
1.22 Maintenance of Desktops...........................................................................7
1.23 Locations of servers, security.....................................................................7
1.24 Roll out Plan................................................................................................7
1.25 Trouble shooting, Preventive maintenance, ..............................................7
1.26 Monitoring.................................................................................................. 7

1.1 Existing Environment....................................................................................2


1.2 The environment / Domain ..........................................................................3
1.3 Getting a domain name for the company.....................................................4
1.4 IP addressing for this new organisation. How to get the IP address.............4
1.5 Number of servers required..........................................................................4
1.6 Types of servers required and how they would be configured (DHCP, DNS,
Print, DC etc)...................................................................................................... 4
Desktop Environment............................................................................................6
1.7 Roll out of the workstations (imaging), (How you would install the OS and
apps on the computers.).....................................................................................6
1.8 Additional peripherals required. You can ask the teacher............................6
1.9 Implementation/ assigning of IP addressing. (Details of IP ranges for each
campus, subnets etc )........................................................................................6
1.10 NAT............................................................................................................. 6
1.11 Drive mappings, logon scripts....................................................................6
1.12 Topology.....................................................................................................6
1.13 Network Security........................................................................................6
1.14 Access restrictions on workstations............................................................6
1.15 Security policy. ..........................................................................................6
1.16 Group Policy............................................................................................... 6
1.17 Computer User Policies...............................................................................6
Restricted internet access, preventing staff from accessing inappropriate sites is
required. ...............................................................................................................7
1.18 Name resolution ( DNS, Zones, WINS if required – (comment on this))......7
1.19 Protocols to be used ..................................................................................7
1.20 Remote Access for Staff..............................................................................7
1.21 Backups...................................................................................................... 7
1.22 Maintenance of Desktops...........................................................................7
1.23 Locations of servers, security.....................................................................7
1.24 Roll out Plan................................................................................................7
1.25 Trouble shooting, Preventive maintenance, ..............................................7
1.26 Monitoring.................................................................................................. 7

1.1 Existing Environment

The Details are as follows

A new law firm called Bonsai Solicitors is a being setup and your company has won the
contract to design, implement and maintain the IT system for the company.

The Task

Your task as the lead IT consultant, is to produce a detailed project plan for a Windows
2003 Server Network to service this firm. (Which is what you have to submit )

The Requirements and Environment

The details are as follows.

• Abu Dhabi: Head office, 100 staff, database servicing the whole organisation to be
stored here. (includes staff details, client details , case details, etc) Three
departments, HR- 7 staff, Marketing – 3 staff, Accounts, 15 staff, and the rest are
solicitors.

• Dubai: Branch Office

• 95 Staff

• Al Ain: Branch Office

• 50 Staff

• Total Sites = 3

• All staff will need remote access to work from other locations if required.
• The firm should have an intranet which provides resources to staff, including pay and
leave details.
• Use a portal to access the internet

• Desktops/ Laptops will be required by all staff.(you can decide who gets what)

• There will be various applications installed on the Workstation.

• A secure desktop environment with workstations capable of being restored to original


condition at short notice is required.

• The desktop hardware can be contracted out and serviced by Dell.

Please produce the report from the above information and ask if you need any other
info.

As a guide line, some of the points you may have to consider are:

1.2 The environment / Domain


We will use windows 2003 server environment.
Past Diagram of Domain

Bonsai.com

Abudhabi.bonsai.co
Alain.bonsai.com dubai.bonsai.com
m
hr.alain.bonsai.com hr.abudhabi.bonsai.com
hr.dubai.bonsai.com

marketing.alain.bonsai.com marketing.abudhabi.bonsai.com
marketing.dubai.bonsai.com

accounting.alain.bonsai.com accounting.abudhabi.bonsai.com
accounting.dubai.bonsai.com

Parents domains and child domains.

1.3 Getting a domain name for the company


How do you get a domain name and IP ADDRESS?

1.4 IP addressing for this new organisation. How to get the IP


address.
We will use the range (192.168.0.0) and use subnetting
AD 192.168.9.1to 9.150
Dubai .168.9.1to 9.150
Alain .168.9.1to 9.150

1.5 Number of servers required


AD: 1 domain controller (with DHCP), 1 domain controller with DNS, 1email
server, 1 web server, 1 file and print server

Dubai: 1 domain controller with DHCP, 1 domain controller with DNS,1 file and
print server
Alain: 1 domain controller with DHCP, 1 domain controller with DNS,1 file and
print server
Total=8

1.6 Types of servers required and how they would be configured


(DHCP, DNS, Print, DC etc)
DHCP Server – (PASte dhcp server definition). THE SERVER WILL BE SET UP WITH
A FORWORD LOOKUP ZONE (CHECK WHAT IS FORWORD LOOKUP ZONE AND
REVERSE LOOKUP ZONE AND PAST E
HERE) FOR THE DOMIN NAME BONSAI.COM
FILE AND PRINT SERVER
Will have a file and server for the users to store files. All users will have a home
directory on the server .the file server name will be :??? E.g Bonsai Adfes1
Print management software will be used on the server and priner pool
We will configure the server to use the ip range xxx to xxx
DNS –(PAST DEFINITION)
DESKTOP ENVIRONMENT
Secure Desktop Environment needed.
Users cannot change the desktop sittings. i.e. icons, wall paper, etc.
We will use mandatory Profiles for all users so that the desktop sittings are the
same.
We will use the following Antivirus Kaspersky it was found to be the most
suitable for the environment after comparison of various products.
Past Chart Here
Staff should have restricted access on the desktops.

The cannot save things on the desktop. This will achieved by the folder redirection using
group policies

The desktop folder will be redirected to the server and will have only read only permission.

They will only be able to access the data drive and can not save on the desktop which avoid
data lose.

1.7 Roll out of the workstations (imaging), (How you would install
the OS and apps on the computers.)
1.8 Additional peripherals required. You can ask the teacher
1.9 Implementation/ assigning of IP addressing. (Details of IP
ranges for each campus, subnets etc )
1.10NAT
1.11Drive mappings, logon scripts
1.12Topology
1.13Network Security
1.14Access restrictions on workstations
1.15Security policy.
1.16Group Policy
1.17Computer User Policies
RESTRICTED INTERNET ACCESS, PREVENTING STAFF FROM
ACCESSING INAPPROPRIATE SITES IS REQUIRED.

1.18Name resolution ( DNS, Zones, WINS if required – (comment on


this))
1.19Protocols to be used
1.20Remote Access for Staff
1.21Backups
1.22Maintenance of Desktops
1.23Locations of servers, security
1.24Roll out Plan
1.25Trouble shooting, Preventive maintenance,
1.26Monitoring

Due Date: .

Marking

Marks will be awarded for your understanding of the Windows 2003 environment
demonstrated by the overall planning and details provided. The plan may include, diagrams,
pictures, project schedules etc

Pass mark is 50%.


+++++++++++++++++++++

Tips: What is existing? What is required.? What is affected ?

Descriptions Reasons What ?


Who ? affected How? When?

Anda mungkin juga menyukai