Be able to create a client/server model in a Linux system with User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Application Layer protocols.

R/617/3034 Advanced Computer Networks, OTHM Level 6 Diploma in Information Technology

Aim: This unit supports learners to develop a critical understanding of relevant and modern concepts in networking technologies within the IT industry. This unit also introduces learners to the detection of threats and vulnerabilities in physical and IT security, and how to manage risks relating to organisational security.

Learning Outcome 1: Understand the concepts of servers, clients, and processes.

Learning Outcome 2: Be able to create a client/server model in a Linux system with User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and Application Layer protocols.

Learning Outcome 3: Be able to design and configure a secure network for a corporate environment.

Scenario
Global ISP is a leading high-end systems integrator with a proven background in complex, advanced integrated security systems. Global ISP excels in delivering innovative solutions to complex and technically challenging problems to clients in both the government and commercial sectors. By December 2018, it had over 290,000 customers across the UK. Global ISP is now expanding further and recently they have secured a contract of creating a new technology hub in Huddersfield, UK. You are in charge of a pool of network analysts who will be designing a range of network systems in the project.
Your line manager Alex Wood has asked you to provide upskilling training to this group of analysts. You have the following tasks for your new assignment with the company.

Task 1 Report
Instructions
You need to create a report that will cover the following:
a. First part of the report covers the concepts of servers, clients, and processes. You will start by, explaining the client and server environment and the communication between clients and servers. Then you will define the terms: Process ID (PID), Parent Process ID (PPID) and `init`. The first part will be concluded with a comparison of the operation of parent processes and child processes.
(ACs 1.1, 1.2, 1.3)
b. Second part of the report covers Linux server basics. Start this section by explaining the features of Linux server configurations. To finish this section you need to explain the concepts of UDP and TCP systems.
(ACs 2.1, 2.2)
a. To conclude the report, critically evaluate Network Security protocols that are relevant to Global ISP. Conclude the report with a critical analyse of the purpose and requirements of a secure network for Global ISP where they face imminent threats from hackers who want to use DDoS attack to bring its services down. Also, as you are aware that Global ISP systems are prone to phishing attacks, you should include concerning issue in your analysis.

Task 2 Lab demonstration
All analysts have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to demonstrate them how to plan, design, setup and configure a secure Linux based network system.
Instructions
a. Build and implement DNS server in Linux using UDP and TCP. (ACs 2.1, 2.2)
b. Design a secure network for a corporate environment that will protect Global ISP from imminent hacker attacks.
c. Configure Network Security for a secure network in a corporate environment.