How will dns be handled for the second site

Assignment Help Computer Networking
Reference no: EM131103117

Deploy and Administer Windows Server 2012

Your solution should draw on the content presented in the course. The outline below lists points/topics to cover. You are free to provide additional, related information.

Provide technical and justification reasons for each choice, citing resources as appropriate. Provide rough estimates of scheduling and manpower required for deploying your solution. You may summarize the schedule and manpower at the end of the document, or include it separately for each section.

The Windows Server 2012 operating system should be used for all aspects of the solution.

Your solution should cover the following four numbered areas and associated bulleted items listed under each:

1. Deployment and Server Editions

o How many total servers are needed? Which roles will be combined?
o Which edition of Windows Server will be used for each server (e.g., Standard, Data)?
o Should servers be virtualized using Hyper-V?
o Where will each of the servers be located (which of the two sites)?
o How will the servers be deployed?

2. DNS

o DNS namespace design (e.g., domain name[s] chosen split DNS for internet/intranet, zones)
o How will DNS be handled for the second site?

3. Active Directory

o Number of AD domains and names of those domains
o Will there be any Read-Only Domain Controllers?
o How will the second site factor into domain controller placement? How will AD sites be configured?

4. File and Printer Sharing

o What shares might be needed? (Consider some of the reasoning supplied in the relevant chapter of the textbook.)
o How will quotas/FSRM be configured? (Consider all aspects, such as thresholds, altering, file screens, and reporting.)
o Will a DFS namespace be implemented?

Your submission will:

• Be in written format, 6-8 pages in length (not counting diagrams).
• Include at least one diagram illustrating your chosen Active Directory design with DNS namespace hierarchy.
• Cite and discuss no fewer than three credible sources, other than course readings and mediaWorldwide Advertising, Inc. (WAI), a new advertising firm, has hired you as an IT consultant. WAI is currently hiring staff and establishing two locations, and they also have a need to get their internal IT services configured. The firm does not yet have an IT staff, but when they do, that staff will take over all aspects of IT administration.

You are required to supply WAI with a solution that describes the implementation and configuration of their core IT services. The cost of the implementation is not expected to exceed the company's budget, so it does not have to be considered in this solution. WAI wants to implement a solution that will meet the company's needs for the next two to three years.

There are several details about WAI that will have an impact on your choices:

1. WAI will start with 300 employees in the following departments:

a. Executives (10 employees) - Manage and run the company
b. Accounts and Sales Department (150 employees) - Perform market research and maintain accounts
c. Creative, Media, and Production Department (100 employees) - Advertising
d. Human Resources and Finances (30 employees) - Perform HR and financial duties
e. IT (10 employees) - Manage IT for the company

2. WAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in Los Angeles, with at least one person from each of the departments above located in New York City.

3. Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic can be securely tunneled over the internet. You may make whatever other assumptions you wish about intra- and inter-site connectivity.

4. Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.

5. Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company's financial details). Your team may make assumptions about how data should be shared or kept private.

6. Assumptions can be made regarding any information not included here; however, all assumptions should be identified.

 

Reference no: EM131103117

Questions Cloud

What is the justification for the following deviations : What is the justification for the following deviations from recognizing revenue at the time of sale?
How does a firm''s dividend policy affect each : How does a firm's dividend policy affect each of the following? a. The value of its long-term warrants. b. The likelihood that its convertible bonds will be converted. c. The likelihood that its warrants will be exercised.
What is the difference between realized and realizable : What is the difference between realized and realizable? Give an example of where the concept of realizable is used to recognize revenue.
What effect does the trend in stock prices : What effect does the trend in stock prices (subsequent to issue) have on a firm's ability to raise funds through (a) Convertibles and (b) Warrants?
How will dns be handled for the second site : How many total servers are needed? Which roles will be combined? Which edition of Windows Server will be used for each server (e.g., Standard, Data)? Should servers be virtualized using Hyper-V? How will DNS be handled for the second site?
Is preferred stock more like bonds or common stock : Is preferred stock more like bonds or common stock? Explain
When should magnus recognize revenue related : When should Magnus recognize revenue related to its catering service?
What is general term for the process of protecting objects : The __________ strategy is when users are told the importance of using hard to guess passwords and provided with guidelines for selecting strong passwords.
What is the nal of the lease : Assume that Big Sky Mining will continue to use the machine beyond the expiration of the lease and must purchase it at an estimated residual value of $250,000 at the end of the 4th year. What is the NAL of the lease?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd