Organization ad infrastructure

Assignment Help Basic Computer Science
Reference no: EM131355573

For this assignment, assume you have been hired by Kris Corporation as an Information Technology consultant. Kris Corporation manufacturers parts for the automotive industry. Your job is to submit a proposal that meets their criteria (listed below) based on information provided.  You may fill in any gaps in the specifications provided by making assumptions. All assumptions should be clearly identified.

Current Implementation and Concerns:

  • Parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domain, and (2) automobile manufacturers are asking Kris Corporation to use single identity to procure orders in real time.
  • The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San Diego (CA).  The manufacturing plants are in Atlanta and Seattle.
  • Disaster recovery is a big concern.
  • Physical space for servers is an issue at the Atlanta location.
  • Most of the IT staff is in Atlanta, which is the company's headquarters, but other locations have significant IT personnel as well. Business personnel are similarly distributed across the company's locations.
  • Since all locations are independently connected to the Internet, file sharing is difficult among sites.

Your document should integrate the content presented in the course. The outline below provides required points to cover. You are free to add other related information.  

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. Each choice should be explained with technical and business reasoning. Solutions should be reasonably detailed.

Your solution should cover the following five numbered areas and associated bulleted items listed under each.

  1. Active Directory
    • Why and how should the company migrate to 2012 AD?
    • Should the company remain at multi-domain model or migrate to single domain?
    • What technology can provide single sign on? How will it be configured?
  2. DNS
    • Where should DNS servers reside?
    • What kind of DNS security can the DNS servers leverage?
  3. DHCP
    • Will a form of DHCP fault tolerance be implemented?
    • How can DHCP addresses be tracked?
  4. Hyper-V
    • Evaluate the pros and cons of implanting Hyper-V. Would it need clustering?
    • What features of Hyper-V can Kris Corporation leverage?
  5. Routing/Security
    • How can Kris Corporation improve its networking capabilities in terms of file sharing and security?

Submission Requirements:

  • The final submission should provide 8-10 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations). With the required diagram and other images, title page, etc., the final submission may end up being more than 10 pages in length. Document formatting and citations should conform to the CSU-Global Guide to Writing and APA Requirements.
  • Support your proposed solution by citing and integrating at least one credible source that is not LabSim and not Wikipedia. Recommended is a best practice guide or reference from Microsoft or an experienced provider of Microsoft solutions.
  • At least one diagram must be included (not counted toward the minimum length described above). You may include more.

Reference no: EM131355573

Questions Cloud

Calculate the maximum weight that can be sustained : The rope makes 1 1 2 turns around the pole. Calculate the maximum weight that can be sustained if a person exerts a force of 50 lb on the end of the rope.
Implement a solution that offers redundancy : Implement a solution that offers redundancy and site resilience or fault tolerance. Implement a backup solution for server data protection.
What are some of the changes in medicare reimbursement : What, if any, opportunities are there for cost control if the decision to merge with the physician group is made by the hospital? What are some of the changes in Medicare reimbursement that could affect the long-term success of the merger?
How many turns of rope around the pole are necessary : The coefficient of static friction between the pole and the rope is 0.25. How many turns of rope around the pole are necessary to keep the weight aloft?
Organization ad infrastructure : Parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domain, and (2) a..
Calculate the maximum belt tension : A belt is wrapped around a pulley for 180°. The loose-side belt tension is 50 lb and the coefficient of static friction is 0.30. Calculate the maximum belt tension if motion is impending.
Discuss about the post given below : "The Buffalo Soldiers as a group had mixed feelings about participating in the Spanish American War. Who were the Buffalo Soldiers who fought in this war? What were the controversies about?"
Discuss the uses of match : The Boolean expression x==y does not work well for floating-point numbers in that rounding errors may produce a FALSE answer. Compare it with the functions all.equal and identical.
Determine fundamental audit procedures that you should have : Determine the fundamental audit procedures that you should have applied to this investment. Predict the way in which a peer review of Friehling and Horowitz would have uncovered the scheme related to Madoff Securities.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What have been done to stop this unsafe surge in valuation

Suddenly, the overpriced giants crashed. Individual investors lost millions and the NASDAQ (the stock exchange for most Internet companies) came tumbling down. What happened? Why did it happen? What could have been done to stop this unsafe surge i..

  Describe of what the computer considers true or false

For your initial post, provide your own description of what the computer considers "TRUE" and what the computer considers "FALSE." Then, provide at least two code examples (original examples) that would return TRUE

  Differences and similarities between windows 7and windows 8.

Complete steps that cover the differences and similarities between Windows 7and Windows 8.1. In your APA formatted Paper answer the questions below.1. Discuss three differences and three similarities in the configuration of a Windows 7 for a h..

  Explain the difference between auditory icons and earcons

Explain the difference between auditory icons and earcons. Give reasons why and when/where audio can be useful, and give examples.

  What is the precedence graph for the schedule

Are there any serial schedules that must be equivalent (regardless of what the transactions do to the data), but are not conflict-equivalent?

  How to design a new isa

How to design a new ISA? What should take into consideration?

  Are there names or numbers used in internet service addressi

Are there names or numbers used in Internet Service Addressing (websites, and other Internet applications)? Explain your answer.

  Demonstrate how these five criteria are achieved

Review the five criteria for effective OO modularity discussed in Section 22.1.2. Using the design approach described later in the chapter, demonstrate how these five criteria are achieved.

  Write a java program that reads a phrase from the input

Write a Java program that reads a phrase from the input and outputs the WORDS in reverse order.

  Using wireshark note the ip address and tcp port number

Using wireshark note the IP address and TCP port number used by your client computer (source) to transfer the file to any FTP server?

  Give a possible arrangement of subnet masks

Give a possible arrangement of subnet masks to make this possible.

  Find several ways to implement an infinite 2d checkerboard

Find several ways to implement an infinite 2D checkerboard using surface and solid techniques. Which is bes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd