Develop a technology proposal - windows network proposal

Assignment Help Computer Network Security
Reference no: EM131949020

Windows Network Proposal

You have been hired by Crete LLC as an Information Technology consultant to develop a technology proposal. Crete LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.

Current Implementation/Concerns:
- The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices.
- Data security is priority since patent and trademarks are at stake.
- Los Angeles sales personnel will need secure remote access to Houston office.
- The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.
- Feel free to make other assumptions but they need to be noted in the paper.

Topics to Cover:
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:
Active Directory:
- What forest/domain model should Crete LLC implement? What is the domain name?
- Where should the domain controllers be place? Should RODC be part of the consideration?
- FSMO Roles placement
- Plan for AD backup and recovery

Group Policy:
- Is Group Policy needed?
- What settings might be considered via Group Policy?


DNS:
- What namespace should Crete LLC implement?
- What types of zones needed?

File Services:
- How will the shares be secured?
- Will quotas be used? FSRM be configured?
- Will DFS be implemented?


Remote Services:
- What technology will be implemented to provide secure remote access for users?
- Who should have remote access?


WSUS:
- How will the servers and clients be updated?
- How will new servers be deployed?

Submission Requirements:

There are specific requirements for the assignment: The final submission should contain at least 6 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

- At least one diagram must be included (not counted towards the minimum length described above). You can have more.

- The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed.

- The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

- At least one non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

- Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Verified Expert

In this assignment, we have discussed Crete LLC case study which is a global manufacturer and distributor of the solar panel. We have discussed requirements an network proposal diagram for the company so that it can handle the increased workload.

Reference no: EM131949020

Questions Cloud

Measurements of orthophosphate : Im currently enrolled in my Limnology laboratory and I have a hard time understanding what the measurements of Orthophosphate
Discuss the types of mental health concerns : Discuss the types of mental health concerns you may likely encounter in counseling a Native American client, couple, family, or group.
What is the significance of descartes cogito argument : What is the significance of Descartes' Cogito argument. How does it relate to the "evil demon" and dreaming doubt arguments?
Explain why the NPV decision rule : Explain why the NPV decision rule might provide Larry with a different decision outcome than the IRR rule when evaluating Larry's three movie deal offer.
Develop a technology proposal - windows network proposal : Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used
Write a lot about history and has the knowledge : Write a lot about history and has the knowledge to write specific examples. I need a very simple tone essay since English is my second language.
Find the price of call option on stock : Find the price of a call option on the stock that has an strike price of $14 and that expires in 6 months.
Write balance sheet and income statement : Write a balance sheet and income statement. Accounts Receivable 250,000 Accounts Payable 260,000
Linda had a grandfather who was diagnosed with melanoma : She is now wondering if she inherited a gene that has caused her to have melanoma, too. Could this be true? Why or why not?

Reviews

urv1949020

12/6/2018 2:29:40 AM

I am affected so much with the assignment that you have provided me. The solutions were exact, and after I received the answer, I was utterly sure of acquiring my dream grades.

Write a Review

Computer Network Security Questions & Answers

  Describe data link control

Describe data link control

  Problems of hacking

Question 1: Describe what hacking of memory or hacking of RAM means. Question 2: Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Implementation of various systems moving forward

Explain how the impact of HIPPA and HITECH regulations will impact the implementation of various systems moving forward. Consider impacts to and from federal, local, software vendors/users, hardware vendors/users, infrastructure, and organizationa..

  Design an algorithm to achieve the byzantine agreement

Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)

  Advocate for and recommend an implementation plan

Your task is to advocate for and recommend an implementation plan to include all 15 CLAS standards over the next 5 years.

  What is your approach to protecting your privacy

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Explain factors that help to influence our nations focus

Describe three factors that help to influence our nation's focus on natural or man-made disasters. Should FEMA fall under DHS, or should it be its own cabinet level organization? Why?

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  Important benefit of asymmetrical encryption

What is the most important benefit of asymmetrical encryption? Contrast with symmetrical encryption - Which part of CAIN is realized through the use of message digest functions and hashes?

  Hashing and bst

Hashing and BST

  Relationships between a trusted and an untrusted network

Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd