How will dns be accessed by the lsdg systems

Assignment Help Basic Computer Science
Reference no: EM13856396

HACKD, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with HACKD, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

HACKD, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7: Processor:

Intel Core i3 Second Generation

Memory: 4GB RAM

Hard Drive: 350GB

Network Card: 10/100/1000 Mbps

USB Ports: 4 USB 2.0

Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:

Processor: Intel Core 2

Memory: 2GB RAM

Hard Drive: 80GB

Network Card: 10/100 Mbps

USB Ports: 4 USB 2.0

Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux of your choosing but with ample explanation.

Requirements

The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be doublespaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options.

• How will users log onto the systems? Explain.

• How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain.

• Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What are the manpower estimates to complete this project? Explain.

• What, if any, data will be encrypted? Explain

Reference no: EM13856396

Questions Cloud

Disadvantages of a paper- based shipping container : You are going to compare and contrast the advantages and disadvantages of a paper- based shipping container, a wood-based shipping container and a plastic-based shipping container for use as a distribution package
Balance sheets for byron manufacturing : Problem: The balance sheets for Byron manufacturing at December 31, 2012 and 2013 are shown:
Discuss the use of pallets in a shipping system : Discuss the use of pallets in a shipping system. What considerations must be taken when deciding whether or not a pallet is required for a specific shipment of boxes?
Write a report on the ethical issues in merger : You are required to write a report on the ethical issues in merger and takeover in Australia. You need to write 1250 words excluding references,tables and appendices.
How will dns be accessed by the lsdg systems : How will systems receive IP addresses. Explain. How will DNS be accessed by the LSDG systems. Explain. Explain how files on the network may be accessed by LSDG.
Challenges for the improvement of the device : Consider that you are a senior consulting engineer and that you need to explain the topic in a written report to your customer, who is the managing director of a large company, and a commerce or law graduate.
What was the original price of the boat : His bank charged 6% per year compounded monthly and his monthly payments were $400. What was the original price of the boat?
Write about is criminal profiling : The topic you will write about is criminal profiling, Each student should select one item or subject of their choice from the forensic materials covered in this week's class materials, including lectures and/or reading assignment, and write a 1200..
Write an application that computes all of the amicable : The code should be written in Ruby and answers are displayed in the command prompt. Write an application that computes all of the amicable numbers less than the upper bound that is read in using a gets statement.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Web page makes effective and consistent use of headings

Use search engine to determine the example of Web page which makes effective and consistent use of headings to organize Web page content.

  Php application programming with javascript

For this task, you will be creating 2 separate applications. One application will be using PHP, the other will be designed using Ruby on Rails.

  Demonstrate an understanding of existing strategic impact

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations. Explain how to develop reasoned responses to the major forces shaping the role of IT in organizations competing in a ..

  Define homomorphism

Let ? = {a,b} and ? = {0,1}. Define homomorphism as h(a) = 01, h(b) =0

  What types of databases are used by companies like google

What types of databases are used by companies like Google in implementing worldwide search engines

  What do you think of ai

What do you think of AI. Do you exalt AI? Do you think that there are also dangers involved? Please discuss the benefits and the perils of artificial intelligence and everything about AI.

  Compare and contrast freeware and shareware

Compare and contrast freeware, shareware and commercial software. What are the characteristics of each? Discuss examples.

  Research job boards for project manager positions

Research job boards for project manager positions. Take note of the various industries that hire project managers. Then, research statistics from the project management institute on the rate of success of projects in different industries including..

  Information assets to estimate for risk management

If organization has three information assets to estimate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first?

  Create a behavioral state machine for complex classes

Create a behavioral state machine for each of the complex classes in the class diagram. Perform a CRUD analysis to show the interactivity of the objects in the system.

  What do you recommend he do about making a backup

What do you recommend he do about making a backup - The chief financial officer (CFO) of NCWR keeps a huge number of reports, spreadsheets, and other critical financial information on his computer

  Work breakdown structure

A written paper and a Work Breakdown Structure (WBS). You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd