How will ad organizational units be organized

Assignment Help Computer Network Security
Reference no: EM13192042

Worldwide Advertising, Inc. (referred to as "WAI") has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply WAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern - WAI wishes to implement the "right" solution to fit their needs now and for the next 2-3 years.

There are several details about WAI which will have an impact on your choices:

  • WAI will start with 90 employees, in the following departments:
    • Executives (9 employees) - manage and run the company
    • Accounts and Sales Department (15 employees) - perform market research and maintain accounts
    • Creative, Media and Production Department (49 employees) - advertising
    • Human Resources and Finances (12 employees) - perform HR and financial duties
    • IT (5 employees) - manage IT for the company
    • WAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.
  • Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.
  • Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
  • Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company's financial details). Your team may make assumptions about how data should be shared or kept private.
  • Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:

New Features of Windows Server 2012

  • Describe new features of Windows Server 2012 that WAI can take advantages of.

Deployment and Server Editions

  • How many total servers are needed? Which roles will be combined?
  • What edition of Windows will be used for each server (e.g., Standard, Datacenter)?
  • Will Server Core be used on any servers?
  • Where are each of the servers located (which of the two sites)?
  • How will the servers be deployed? Manual or automated?

Active Directory

  • Number of AD domains?
  • Will there be any Read-Only Domain Controllers?
  • How will the second site factor into domain controller placement? How will AD sites be configured?
  • How will AD organizational units be organized (considering how group policy will be used and users will be organized)?

DNS and DHCP

  • DHCP scope design (e.g., lease times, number of scopes, address range)
  • Will a form of DHCP fault tolerance be implemented?
  • Will DHCP reservations be used for servers?
  • DNS namespace design (e.g., domain name(s) chosen, split DNS for Internet/intranet, zones)
  • How will DNS be handled for the second site?

Application Services

  • How will applications be deployed? If using Group Policy, what are the details on how Group Policy will be used to deploy the software? Which software applications will likely be needed?

File and Printer Sharing

  • What shares might be needed?
  • DFS Needed?
  • How will quotas/FSRM be configures?

Assignment Requirements
There are specific requirements for the assignment: The final submission should contain at least 6 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

  • At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.
  • The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.
  • The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.
  • At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.
  • Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Reference no: EM13192042

Questions Cloud

Find the total distance it travels : A ball drops from a height of 20 feet. Each time it hits the ground, it bounces up 70 percents of the height it fall. Assume it goes on forever, find the total distance it travels.
Temperature and the solution remaining in the eudiometer : A student collected hydrogen in a eudiometer as described above. Barometric pressure is 765.5 Torr, the vapor pressure of water is 22.0 Torr at this temperature and the solution remaining in the eudiometer is 5.75 cm above the water in the beaker
Determine the total cost for each manufacturing : The predetermined overhead rate is based on machine hours. The expected machine hour use for the year is 2.112 hours, and the anticipated overhead costs are $840,576 for the year. The machine were used by workers on projects K52 and J57 on Decembe..
How far have you traveled : You are traveling to your mothers house that is 234 miles away. If you are currently twice as far from your home as you are from your mothers house, how far have you traveled? Round your answer to the nearest tenth mile.
How will ad organizational units be organized : How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized
Which of these equations represents this problem : Julie is a math tutor in the academic center. She charges $210 for the first 7 hours of tutoring and $20 for each additional hour of tutoring. If she earned $410 tutoring 1 student, how many total hours did she spent tutoring the student?
Property of dietary fiber : Which of the following is a significant property of dietary fiber?
Explain structure for the unknown organic compound : Based on the 4 attached spectra, propose a structure for the unknown organic compound. Please explain each spectrum (IR, H NMR, C NMR, & Mass Spec)
Explain the process pf factoring a trinomial : explain the process pf factoring a trinomial with a leading coefficient that is not equal to one. why is this process more difficult than when the leading coefficientis equal to one? give example.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  Future of internet anonymity services

Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Procedure to select key uniformly at random from keys-hash

Describe a procedure that selects a key uniformly at random from among the keys in the hash table and returns it in expected time O(L.(1 + 1/α)).

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Cluster architecture for the servers and databases

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Explain it director and staff to how to mange complexities

Host the discussion with IT director and staff and let them know what you believe to be most significant of these extra complexities and reasons why you believe them to be difficult to manage.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd