Creating cut-over plan for alternate processing site

Assignment Help Basic Computer Science
Reference no: EM1347086

Create cut-over plan for alternate processing site based on given below.

Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the Web, file & print sharing, email, database, and a small 3D render farm, a rack of 20 dual processor Xeon servers running Red Hat Linux that generates the actual high-resolution video animations that Pixel produces for its clients. The desktop systems consist of Apple Mac Pro desktops running Mac OS X Leopard for the creative staff, and Windows Vista PC computers for general use. The servers are Windows Server 2003 running Microsoft Exchange, Web server, and file & print service. The network is gigabit Ethernet and the network hardware is a mixture from Cisco and Hewlett-Packard.

Employees, business partners, and clients may visit Pixel's office with laptop computers in order to collaborate on projects. The laptops will obtain their IP configuration from the DHCP server at Pixel.

Pixel has 10 megabit/second Internet access, and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access Pixel's servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

Pixel produces short animation movies for advertiser clients. These clients are located worldwide and need to communicate securely with Pixel as they collaborate on their advertising shorts. Pixel uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

The network has the following additional specifications:

1. The network is all TCP/IP based
2. The network is based on Cisco routers and switches
3. All desktop computers include email, Web, database access, and office productivity software
4. Creative users also have multimedia authoring software installed
5. All server and critical network equipment is in a secure server room
6. Printers are located around the office area
7. The multimedia department uses high-end workstations for video rendering and animation
8. A load-balancing dual firewall connects the network to the Internet
There is a wee security policy in place:
1. All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted
2. All network resources and equipment must be password protected
3. Company equipment may not be used for personal business
4. All Windows-based PCs must run approved anti-virus and anti-spyware programs
5. All servers and desktops should run host-based intrusion detection software
6. Clients may use the Secure FTP (SFTP) server to send or receive multimedia files but under no circumstances should one client be able to view the files of any other client
7. The mail server must be configured not to forward email that originated on the Internet
8. Password aging must be enforced on all servers and desktops
9. All server configurations must be readily available to rebuild a failed system
10. Off-site backup is required, with 24x7 access to that location
11. All employees will demonstrate they understand the security policy
12. The security officer reports directly to Pixel's CEO

Reference no: EM1347086

Questions Cloud

Taxation, financial disclosure and ownership structure : Discuss and explain the differences between businesses in the United State & in other countries with respect to financial disclosure, taxation, and ownership structure.
What is the magnitude of change in momentum : An ideal monatomic gas at first has a temperature of 311K and a pressure of 7.57atm. It is to expand from volume 571 cm3 to volume 1390 cm3.
Content theories and process theories : Content Theories And Process Theories - Show some differences between content theories and process theories, include how these relate to validity and reliability.
Explain by how much would it have to increase government : Explain by how much would it have to increase government purchase to achieve this goal.
Creating cut-over plan for alternate processing site : Create cut-over plan for alternate processing site based on given below. Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building.
What would be ultimate impact on the equilibrium price : What would be ultimate impact on the equilibrium price also quantity in the market for oak tables if the price of maple tables.
How far must loudspeakers be moved to repeat the condition : A car started frm rest and accelerated for 5s at 6.00m/s2.Then it stayed at a constant speed for 20 s. It next slowed down at 3m/s2 until it came to a stop? how far did it travel during the first 5 s.
Examining financial statements of a corporation : Suppose you are examining financial statements of a corporation. You observe patent amortization cost of $1.5m and a loss on impairment of goodwill for $25m.
Facilitate assembly of information for business decisions : This module is about "business intelligence" and tools which facilitate assembly of information/knowledge in ways which enable "better" business decisions to be made.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Servlet to return randomly chosen greeting

Write a servlet that returns a randomly chosen greeting from a list of five different greetings.

  Sequence diagram for field officer

Draw a sequence diagram for the following use case. Draw only the first five messages sent. The FieldOfficer activates the "Report Emergency" function of her terminal. The system responds by presenting a form to the officer.

  Cloud computing to the rescue

Cloud Computing to the Rescue,  Describe the hardware, software, and network architectural design of the infrastructure used to build cloud computing infrastructures. Use Microsoft Visio to generate the architectural diagrams.

  Cores on computer systems

Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency,

  Finding vertices of polygon stored in array-clockwise order

Assume that n ≥ 3 and the n vertices of P are stored in an array in clockwise order around P. Describe how to determine efficiently whether exactly one of the points q and r falls within P. Analyze the time for your algorithm.

  Policies and provisions to unbundled network elements

What are some of the major policies and provisions under the 1996 Act in regards to unbundled network elements (UNEs).

  Finding different sizes of newspaper for local newspaper

Comprise a specific recommendation regarding how many different sizes newspaper must offer.

  Training data from gaussian distribution of variance

Suppose we have training data from a Gaussian distribution of known covariance S but unknown mean Mu.

  Receiver initiated distributed scheduling algorithms

Receiver initiated distributed scheduling algorithms suppose task pre-emption at the sender site.

  Assigning value to last array of array list

Write a statement that assigns the value 160000 to the last element of the ArrayList salaryStep.

  Rating of vital for page with highest utility

Rating of Vital is always given to the page with the highest utility.

  Relative risk comes form inside the organisation

Write a report on relative risk that comes form inside organisation as opposed to risk which comes from external sources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd