How central authentication be handled in linux environment

Assignment Help Operating System
Reference no: EM131216465

Linux Implementation Proposal

PhelpsTech, LLC. has a new research and development group - Medals. All systems in Medals will run the Linux operating system and will access resources, as well as share resources, with PhelpsTech, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

PhelpsTech, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss, the Chief Technical Officer Katie Ledecky, wants you to come up with a proposal to replace all Windows XP systems with Linux. You will research and select the Linux distribution of choice and justify why you picked it.

Requirements

In addition the requirements in the grading rubric, the final submission should contain at least 5 to 7 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether Medals will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.
• Plan for migration from Windows XP to Linux.
• Explain how some windows services can interact with Linux services during the transition.

o Printing
o File Sharing
o DNS
o Central Authentication

• Determine the hardware to be used and the installation options.
• How will users log onto the systems? Explain.
• How will systems receive IP addresses? Explain.
• How will DNS be accessed by the Medals systems? Where will DNS be hosted and how with the Linux systems be configured to use it?
• Explain how files on the network may be accessed by Medals. Make sure you cover how both windows and linux can access the same shared files.
• Explain how Medals can securely share files from a central location within their group and other selected groups/users in the company.
• How will central authentication be handled in the Linux environment.
• How will printing be handled? Explain.
• How can shared files be encrypted.
• Include some element of cost. It doesn't have to be a lengthy discussion down to the dollar. You should explain the implications of cost of upgrading hardware (if you choose to upgrade) and licenses.

Reference no: EM131216465

Questions Cloud

What is the finance charge : The bedroom set sells for $2,650. The store financing requires a 15% down payment and 42 monthly payments. What is the finance charge?
How an existing rfid standard could be modified to support : If there are no specific standards that you think apply to your selected industry then research how an existing RFID standard could be modified to support your selected industry.
Which of the following best describes bob change of role : Mark, an HR manager, is responsible for the HR planning process in his organization. He has reviewed the organization's strategic plans. Which of the following is most likely to be Mark's next step in the planning process?
Make purchasingthe product more pleasing and rewarding : Which type of diferantation refers to companies sucessfully desing their distribution medium's exposure,proficiency,and perfomanceto make purchasingthe product more pleasing and rewarding?
How central authentication be handled in linux environment : How will central authentication be handled in the Linux environment. How will printing be handled? Explain. How can shared files be encrypted. Determine the hardware to be used and the installation options.
Audit program for the bsf ltd : HI6026 AUDIT, ASSURANCE, AND COMPLIANCE - Discuss the steps that you need to consider before accepting to do an audit and apply them to BSF Ltd and discuss what should be included in an audit program for the BSF Ltd.
Calculate employees raise based on performance rating : Calculate employee's raise based on performance rating. For excellent performance, employees get a 6% raise on their current salary. For good performance, employees get a 4% raise on their current salary.
Identify the key stakeholders in the government : Act as the Council members and provide important leadership considerations for the mayor in preparing to implement the water sustainability plan. In building a stakeholder power base, consider stakeholders in the city government. Once you identify..
Discussing the operating budget and variance analysis : ACC 202: Final Project Budget Variance Report. In your opening paragraph, very briefly introduce the purpose of your paper. Recall that you will be discussing the operating budget and variance analysis as explained in your rubric instructions. Thre..

Reviews

Write a Review

Operating System Questions & Answers

  A lock variable not a good solution for mutual exclusion

why is busy waiting on a lock variable not a good solution for mutual exclusion?

  Develop a profile of your personality characteristics

Assignment: Finding the Leader in You: Self-Assessment / Johari Window, The Johari Window emphasizes that we may not be aware of everything that there is to know about ourselves

  The dining philosophers problem

Assume the Dining Philosophers problem. Explain the problems and assess what will happen if we allow the following code:a) Pick up chopstick on right, If chopstick on left is free, take it; else drop right chopstick. When done, drop both chopsticks.

  Multiple choice - system analysis and design

The primary benefits of the Waterfall Development methodology is needs are completely specified and held relatively constant prior to programming.

  Ddos attack on router

Recently had a DDoS attack on border router. Discuss how would you estimate where the attack came from and what would you put in place to save it from happening again?

  Provide the design and justification for your mechanism

Provide the design and justification for your mechanism that supports process dispatching and discuss the design advantage and disadvantage of each approach throughout the process lifecycle.

  Design principles underlying the operating system

Design principles underlying the operating system. Advantages and disadvantages of this operating system including which environments this operating system works best.

  Virtual machine design where guest operating systems are

virtual machine design where guest operating systems are independent virtual machines supported by a host operating

  Multiplexor and demultiplexor?

statistical time division multiplexing with 24 stations inputting data at 9600 bps, and assuming that only 60 percent of those stations transmit at one time, what is the minimal speed necessary for the high speed link connecting multiplexor and demul..

  How do operating systems recover from failures

Discuss how the functioning of the OS is affected when synchronization fails. Give examples describing what can go wrong. How do operating systems recover from failures and how is this different from a deadlock?

  What is the importance of having enough ram

How does it relate to how fast a computer can process data from a large database residing on ones hard drive?

  1 synchronization within monitors uses condition variables

1. synchronization within monitors uses condition variables and two special operation wait and signal. a more general

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd