How to implement a virtual infrastructure

Assignment Help Computer Engineering
Reference no: EM132218869

Task

ACL Realty is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. ACL Realty current self-managed a small data centre that has the following servers:

2 x Active Directory domain controllers on Windows Server 2008 R2, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD). These servers are used for authentication and authorisation;

3 x SQL Server 2003 database servers on Windows Server 2003 (2 x Xeon 2.8GHZ, 4GB RAM, 500GB RAID-5 array). These servers are used for database operations for Active Directory, Exchange, SharePoint and their Client Property application;

1 x Exchange 2007 email server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID1 array);

4 x Windows Server 2003 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID-1 array);

1 x SharePoint 2007 server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 16GB RAM, 250GB RAID-1 array);

1 x RENet Client Property and CRM (Customer Relationship Management) application server on Windows Server 2008 R2 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);

2 x Red Hat Enterprise 5 Linux servers running Apache and TomCat (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).

The board of ACL Realty knows that their core competency is their understanding of the real estate market in their area of operations, and their understanding of their customers and their needs.

They have been advised to retire most of their old physical servers and start moving their operations onto a virtual platform. You have been employed to advise the board on various aspects of virtualisation.

Your Design Report

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the board of ACL Realty. Your design report should include:

1. A one page executive summary,

2. Your proposed virtual infrastructure design for the data centre. This is to include:

1. Which virtual technology you recommend to be deployed, and

2. Your reasons for that recommendation.

3. An analysis of how virtual applications and desktops, or both, will be delivered to the user's desktops using the new infrastructure.

4. Your designs for:

1. Data and configuration backup,

2. Disaster recovery.

5. Any Information Security changes required and the steps required to implement / monitor these changes.

Reference no: EM132218869

Questions Cloud

How the new benefits will impact their net pay : Your organization, located in Manitoba, will be enhancing the group benefits plan offered to employees in two months by adding accidental death.
Record the purchase of the trucks : On 1 January 2017, Nicolaidis Ltd purchased two identical new machines at a total cost of $700000 plus GST. It was estimated that the machines would have.
What are yost amount of income or gain recognized : What are Yost's amount of income/gain recognized and amount of taxes payable on the grant date, exercise date, and sale date
How ip packet is created from icmp packet at pc-a : SIT202 : Identify two dynamic routing protocols that will work for the routers below. Also mention a dynamic routing protocol that will not work.
How to implement a virtual infrastructure : ITC314 : Consider how to implement a virtual infrastructure for the company and prepare a report for the board of ACL Realty.
How your current employer can change strategies : Detail how your current employer can change strategies within the organization to promote your internal motivation and innovation.
Compare harvard architecture and von neumann architecture : Compare harvard architecture and Von Neumann architecture and also what is both architectureCompare harvard and von neumann architecture and process.
What are two risk factors for intimate partner violence : What are two risk factors for intimate partner violence? What are three community approaches to the prevention of unintentional injuries?
Explain the role of social workers in supporting clients : Consider the notion that an individual with a disability may feel primarily defined by his or her ability status. Also, consider the historical treatment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find the count of all postive numbers in an array a

Write a recursive method that finds the count of all postive numbers in an array 'a' in a method called countOfPositives in a class called RecursiveArray.

  Write a method that will traverse a B-tree in postorder

Define postorder traversal of a B-tree recursively to mean first traversing all the subtrees of root. Write a method that will traverse a B-tree in postorder.

  Research question and contextyou need to describe what your

research question and contextyou need to describe what your research aims to do the objectives that need to be meet to

  How do you fully define a conical or flat taper

How do you fully define a conical or flat taper? How do you tolerance it? Which ASME tolerance rule should you use to show dimension limits on a drawing?

  Find the mflops figures for the processors

Assume that 40% of instructions executed on both P1 and P2 are floating-point instructions. Find the MFLOPS figures for the processors.

  Write a python script to generate 50 files for each

Write a python script to generate 50 files for each of the following courses: MATH222, MATH477, MATH333.

  Write a boolean method called sorted

Write a Boolean method called sorted that takes three int parameters and returns true if the numbers are sorted in ascending order.

  Determine the successor to the throne of france

Define the predicate Successor(Year) giving the solution as the first successor to the crown for the year specified.

  How many ram chips are there per memory word

How many RAM chips are necessary? How many RAM chips are there per memory word? How many address bits are needed for each RAM chip? How many banks will this memory have? How many address bits are needed for all of memory?

  Create a mips asm program that requests for three numbers

Create a MIPS asm program that requests for three numbers from the user. Month, Day, and Year. You may assume that a valid date is given.

  Describe the typical way that project managers organize

Describe the typical way that project managers organize the programmers' work storage areas. Why is this approach useful?

  Which component of the total delay is-are dominant

The length of the link is 2600 km, the speed of light inside the link is 2.2 x 10 8 m/s, the link has a bandwidth of 6 Mbps.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd