How to implement a virtual infrastructure for the company

Assignment Help Other Subject
Reference no: EM132062448

Task

ACL Realty is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. ACL Realty current selfmanaged a small data centre that has the following servers:

- 2 x Active Directory domain controllers on Windows Server 2008 R2, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD). These servers are used for authentication and authorisation;

- 3 x SQL Server 2003 database servers on Windows Server 2003 (2 x Xeon 2.8GHZ, 4GB RAM, 500GB RAID-5 array). These servers are used for database operations for Active

Directory, Exchange, SharePoint and their Client Property application;
- 1 x Exchange 2007 email server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);
- 4 x Windows Server 2003 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID1 array);
- 1 x SharePoint 2007 server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 16GB RAM, 250GB RAID-1 array);
- 1 x RENet Client Property and CRM (Customer Relationship Management) application server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array); - 2 x Red Hat Enterprise 5 Linux servers running Apache and TomCat (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).

The board of ACL Realty knows that their core competency is their understanding of the real estate market in their area of operations, and their understanding of their customers and their needs. They have been advised to retire most of their old physical servers and start moving their operations onto a virtual platform. You have been employed to advise the board on various aspects of virtualisation.

Your Design Report

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the board of ACL Realty. Your design report should include:

1. A one page executive summary,
2. Your proposed virtual infrastructure design for the data centre.

This is to include:
1. Which virtual technology you recommend to be deployed, and
2. Your reasons for that recommendation.
3. An analysis of how virtual applications and desktops, or both, will be delivered to the user's desktops using the new infrastructure.
4. Your designs for:
1. Data and configuration backup,
2. Disaster recovery.
5. Any Information Security changes required and the steps required to implement / monitor these changes.

Rationale

This assessment item is designed to assess the understanding and use of some advanced topics in virtualisation, analytical skills, planning and design capabilities of students under some predefined requirements. In particular, the assessment covers the following learning outcomes:
- be able to communicate the importance of different virtualisation technologies for x86 and Unix based systems;
- be able to evaluate which virtualisation technology should be used in a given set of requirements; be able to identify and evaluate the requirements to create a virtual infrastructure; and
- be able to analyse the requirements for management of a virtual infrastructure.

Presentation

The report should be submitted as a single MS Word document with all images embedded in the document.
Submissions in in *.zip, *.rar or any other format will not be marked.

The report presentation structure is:

Cover page
• Title of Report
• Student Name and Student ID
• Student Email address

Executive Summary
This section provides a brief overview of the scenario, reasoning/findings and concluding remarks on your findings. It must be no more than 1 page in length

Main Report
This section should contain main body of the report. It should discuss all tasks / challenges asked in the case study. You should have a sub-sections that answers each task. Support your answers with solid literature (in-text citations), diagrams and figures (if applicable).

Reference List
You must cite your references using the APA 6th edition referencing style for all material you have used as sources for the content of your work.

Reference no: EM132062448

Questions Cloud

Conductance of the tissue beneath the skin : In the conduction equation Q = (kA T)t/L, the combination of factors kA/L is called the conductance.
What is the maximum possible temperature of the hot water : If the water going into the heater has a temperature of 10°C, what is the maximum possible temperature of the hot water that each showering resident receives?
What is meant by the internal processes of a team : Why is it important to manage both the internal processes and external opportunities/constraints of a team?
Shaft that is rotating with an angular speed : An object of mass = 2.00 kg is attached to a spring with spring constant k = 88.0 N/m whose unstretched length is l = 0.150 m and whose far end
How to implement a virtual infrastructure for the company : ITC314 Virtualisation Technologies - Charles Sturt University - how to implement a virtual infrastructure for the company and prepare a report for the board
Calculate the tension in the rope : A gymnast of mass 70.0 kg hangs from a vertical rope attached to the ceiling. Use the value 9.81m/s2 for the acceleration of gravity.
E-activity-mutually exclusive investment projects to compare : E-Activity. Use the Internet to research two (2) mutually exclusive investment projects to compare.
Use the residual operating income model : Compute the ‘fair price’ for IBM’s PC division at the time of acquisition. Use the residual operating income (ReOI) model. Did Lenovo overpay?
Describe the two basic methods of attacking locks : Describe the two basic methods of attacking locks. Describe the four general categories of manipulation.

Reviews

len2062448

7/23/2018 3:28:00 AM

5. DR plan design A Complete description of the DR plan for the new infrastructure with references A thorough description of the DR plan for the new infrastructure with references A detailed description of the DR plan for the new infrastructure with references An adequate description of the DR plan for the new infrastructure with references An inadequate description of the DR plan for the new infrastructure with references 6. Infossec changes A complete description of the infosec changes needed, with references A thorough description of the infosec changes needed, with references A detailed description of the infosec changes needed, with references An adequate descriptionof the infosec changes needed, with references An inadequate description of the infosec changes needed, with references

len2062448

7/23/2018 3:27:54 AM

Question HD DI CR PS FL with references deploying desktops and applications to users, with references references deploying desktops and applications to users, with references 4. Backup plan design A Complete description of the backup plan for the new infrastructure with references A thorough description of the backup plan for the new infrastructure with references A detailed description of the backup plan for the new infrastructure with references An adequate description of the backup plan for the new infrastructure with references An inadequate description of the backup plan for the new infrastructure with references.

len2062448

7/23/2018 3:27:48 AM

3. Reasoning A thorough discussion of the reasoning behind the infrastructure design, with references A detailed discussion of the reasoning behind the infrastructure design, with references A good discussion of the reasoning behind the infrastructure design, with references An adequate discussion of the reasoning behind the infrastructure design, with references An inadequate discussion of the reasoning behind the infrastructure design, with references 3. Desktop analysis A complete analysis with detailed suggestions for deploying desktops and applications to users, A thorough analysis with detailed suggestions for A good analysis with detailed suggestions for deploying desktops and applications to users, with references An adequate analysis with detailed suggestions for deploying desktops and applications to users, with An inadequate analysis with detailed suggestions for

len2062448

7/23/2018 3:27:41 AM

Question HD DI CR PS FL 1.Executive Summary A complete summary of the solution and main points of the report. A Thorough explanation of the solution and main points of the report. A detailed explanation of the solution and main points of the report. An adequate explanation of the solution and main points of the report. An inadequate explanation of the solution and main points of the report. 2. Technology Selection A concise and welldesigned proposal for a new virtual infrastructure, with references A thorough designed proposal for a new virtual infrastructure, with references A detailed designed proposal for a new virtual infrastructure, with references An adequate designed proposal for a new virtual infrastructure, with references An inadequate designed proposal for a new virtual infrastructure, with references

len2062448

7/23/2018 3:27:15 AM

Question Task Marks Q1. Executive Summary 10 Q2a. Technology Selection 10 Q2b. Reasoning 20 Q3 Desktop analysis 15 Q4a. Backup Design 15 Q4b. DR design 15 5 Infosec Changes 15 Total 100

Write a Review

Other Subject Questions & Answers

  Demonstrate application of relevant concepts

This assignment is focused on the written production of an academic research proposal. Within this proposal students are required to demonstrate application of relevant concepts covered in this unit. Detailed instructions will be available on LMS.

  Community empowers neighbors

Could someone explain to me how getting involved in a neighborhood watch such as this within my community empowers neighbors or my community as well as myself in this story.

  What are some of the important measures you can take

Based on this week's readings, what are some of the important measures you can take to ensure that your home wireless network is safe and secure

  What is buyer power in information service provider industry

what is the buyer power in the information service provider industry such as Google? In addition, what are the job opportunities in this particular industry?

  Discuss protect themselves and all the different identities

You can talk about how Quinn and Peter Stallman Sr. use fictional characters in their writing to hide and protect themselves and all the different identities

  Describe the experience in the project

Answer the following questions in the space provided below: Describe the experience in the project. What were the solutions used to address the problem? Was the case you described a special-cause or common-cause

  Describe the spiritual practice of pilgrimage

Describe the spiritual practice of pilgrimage.

  Provide your opinion on what would be main areas of concern

Provide your opinion on what would be the main areas of concern if the two organizations were to merge and how they could be overcome.

  Explain how race impacts the social institution

Choose a social institution to describe and analyze the effect that the stratification elements of race have on that social institution.

  The economic policies followed by china before 1978

State any two differences between the economic policies followed by China before and after 1978.

  Compare consensus and community organizing

Compare consensus and community organizing. Discuss why this project will be sustainable in the community

  Marx offered a thesis on the fetishism of commodities

Marx offered a thesis on the fetishism of commodities. First, explain Marx's thesis on the fetishism of commodities. Second, what have we fetishized in modern s

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd