Planning an application server migration

Assignment Help Computer Networking
Reference no: EM13777374

Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it's a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the "Wild Frontier" network into your domain, "Foghorn Leghorn" and migrate to your current standards.

The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the "Wild Frontier" under the "Foghorn Leghorn" domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your solutions.

The same design requirements specified in the writing assignments (support, hours of operation, remote staff, Internet access, and sensitive file access) still apply, but disk space management is no longer as much of a concern and being part of a large company brings economies of scale to licensing purchases; take advantage of these. Department cost allocation is even more of a priority. Providing shooting targets (large paper reports) for Sam is no longer a need (the managers celebrate).

workstations will all be standardized and provided with Virtual Desktop Infrastructure (VDI). Use those to your best advantage for standardization and support staff man-hour savings while still addressing control over users' access of unapproved media services and applications.
Write a ten to fifteen (10-15) page technical paper which covers the following:
Suggest how to use Terminal Services to help meet criteria for providing applications and support for the remote offices.
Determine how application pools will help to reduce costs. Be specific in your configuration specifications.
Formulate how using AD groups and NTFS permissions should best be configured for security and appropriate access.
Evaluate how you might use Windows SharePoint Services to provide support for the additional remote offices and help prevent duplication of work.
Examine how you can use high-availability technologies to manage costs.
Propose how you will take advantage of the change in licensing considerations.
Provide a plan to manage network load balancing and avoid slowdowns in performance as much as possible.
Determine what considerations you will take into account for your printer requirements.
Use Visio or a similar tool to depict graphically the physical and logical layout of your plan. Note: The graphically depicted solution is not included in the required page length.

Reference no: EM13777374

Questions Cloud

Demographic and insurance information : Identify pertinent information from a first-time patient, including demographic and insurance information.
Conducting an environmental analysis : For all assignments assume that you are the administrator of a fictitious organization of your choice. The organization can be any type of health care organization such as a hospital, nursing home, rehabilitation center, clinic, etc. As the administr..
How reactivity impacts measurement : What issues should be considered when constructing surveys? What are the implications of double-barreled, loaded, and negative questions?
Write paper on crime and justice : Write paper on Crime and Justice
Planning an application server migration : The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the "Wild Frontier" under the "Foghorn Leghorn" domain and make sure production needs are met at all the satellite locati..
Made to enhance the efficiency and effectiveness of abc : 1.What are the refinements that have been made to enhance the efficiency and effectiveness of ABC in managing costs? Why do you think ABC costing is more or less efficient than job order costing? Please provide an example.
Explain claim on genetic and difference being made by watson : Explain the claim about genetics and difference being made by Watson. Explain how genetic explanations for these socially salient categories of difference fail.
Legal and ethical issues simulation : Complete the Addressing International Legal and Ethical Issues simulation located on the student website.
Racial consciousness issues : What can you do to change these stereotypical beliefs in order to become a better manager?

Reviews

Write a Review

Computer Networking Questions & Answers

  Design switched network to compliment routed network

Design a switched network to compliment your routed network. Each department will require five switches that will plug into the router cards.

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  First prepare an abstract of your business recommendations

first create an abstract of your business recommendations for network solutions for large businesses. an abstract is a

  Reserved route takes over when device or connection fails

It determines new tree topology when switch or cable link failures. Reserved route takes over when device or connection fails. To aggregate ....to gather together Which is better, 10x100Mbps or 1Gbps?

  Determine the primary security concerns

Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns

  Explain information security body of knowledge

Look for the information security body of knowledge(CBK). When you review list of 10 areas in CBK, is policy listed? why do you think this is so?

  Discuss consolidate the list of vulnerabilities and assets

Discuss the vulnerabilities, and consolidate the list of vulnerabilities and assets.

  Lan and wireless lan wiring considerations

Section 1: Network Consultation Proposal-Suggest LAN and Wireless LAN (WLAN) wiring considerations. Recommend hardware options and costs

  Recognizing the malicious activity

What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities.

  Question 1refer to figure 1 below all routers are running

question 1refer to figure 1 below all routers are running ripv1. the interfaces on all routers are up and stable. users

  Voip communication infrastructures

What are fundamental differences, from the risk management perspective, between Public switched telephone network (PSTN) and VoIP communication infrastructures

  Implement an ad-integrated dns zone

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd