How will the servers be deployed

Assignment Help Computer Networking
Reference no: EM13755991

Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. The firm does not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration.

You are required to supply WAI with a solution that describes the implementation and configuration of their core IT services. The cost of the implementation is not expected to exceed the company's budget and so does not have to be considered in this solution. WAI wishes to implement a solution will meet the company's needs for the next 2-3 years.

There are several details about WAI which will have an impact on your choices:

1. WAI will start with 300 employees, in the following departments:

a. Executives (10 employees) - manage and run the company
b. Accounts and Sales Department (150 employees) - perform market research and maintain accounts
c. Creative, Media and Production Department (100 employees)- advertising
d. Human Resources and Finances (30 employees) - perform HR and financial duties
e. IT (10 employees) -manage IT for the company

2. WAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in Los Angeles with at least 1 person from each of the departments above located in New York City.

3. Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.

4. Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.

5. Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see tl1e company's financial details). Your team may make assumptions about how data should be shared or kept private.

6. Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Your solution should draw on the content presented in the course. The outline below provides points to cover. You are free to provide additional, related information.

Provide technical and justifications reasons for each choice, citing resources as appropriate. Provide rough estimates of scheduling and manpower required for deploying your solution. You may summarize the schedule and manpower at the end of the document or separately for each section.

The Windows Server 2012 operating system should be used for all aspects of the solution.

Your solution should cover the following four numbered areas and associated bulleted items listed under each:

1. Deployment and Server Editions

• How many servers total are needed? Which roles will be combined?
• What edition of Windows Server will be used for each server (e.g., Standard, Data)?
• Should servers be virtualized using Hyper-V?
• Where is each of the servers located (which of the two sites)?
• How will the servers be deployed?

2. DNS

•DNS namespace design (e.g., domain name[s] chosen split DNS for Internet/intranet, zones)
•How will DNS be handled for the second site?

3. Active Directory

•Number of AD domains and names of domains
•Will there be any Read-Only Domain Controllers?
•How will the second site factor into domain controller placement? How will AD sites be configured?

4.File and Printer Sharing

• What shares might be needed? (Consider some of the reasoning supplied in the relevant chapter of the textbook.)
• How will quotas/FSRM be configured? (Consider all aspects, such as thresholds, altering, file screens, and reporting.)
• Will a DFS namespace be implemented?

Reference no: EM13755991

Questions Cloud

Creating an er diagram : Creating an ER diagram, Listing the functional dependencies, confirming that the database is in at least 4NF, Using SQL commands to create the and populate the database (there do not need to be many rows)
Identification of preventative controls : Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis
Analysis of the country viability : The second part of the research paper emphasizes your recommendations based upon your analysis of the country's viability as an opportunity for export / import activities from the U.S. perspective from Assignment 1.
How class structure and gender affect urban political affair : How did class structure, ethnicity, and gender affect urban political affairs?
How will the servers be deployed : Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. How will the servers..
What did paul johnson think of monopolies : What did Paul Johnson think of monopolies?
Studying consumer behavior : In this module we are studying consumer behavior. An organization cannot persuade a customer to purchase a product or service without understanding the basics of "how people buy."
Write an essay on beginnings of globalization : Write an essay on beginnings of globalization. Exchange - of people, diseases, foodstuffs, religion - occurred on a level never before reached and linked the peoples of the Eastern and Western hemispheres.
Who is considered the father and mother of the internet : Who is Considered the Father and Mother of the Internet, If alive what is she doing today. What has she done

Reviews

Write a Review

Computer Networking Questions & Answers

  What is occurring and why bob now gets a reply

On June 10, 2013, Bob has no problem connecting to devices on Steve's network (everything appears to be working perfectly). When Bob tries to ping any device on Steve's network he gets "Request timed out". Explain what is going on.

  Have you ever visited a web site and wondered what the

have you ever visited a web site and wondered what the company was thinking when they created it? or perhaps youve

  Part ait is often stated that drawing up a good layout

part ait is often stated that drawing up a good layout involves a sense of intuition and experience and is sometimes

  Compute the bandwidth-delay product-r-tpro

Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R =2 Mbps. Compute the bandwidth-delay product, R?tprop.

  Monitoring passing traffic over the networks

How would the routers help in monitoring passing traffic over the networks and Internet under safe and secure conditions? Provide examples of how it would be done and why it would be done in this fashion.

  Question 1a is an intrusion avoidance system more like a

question 1a is an intrusion avoidance system more like a honeypot or a firewall? describe why?b what does the quality

  Write security policy by nstissc model by analyzing cells

Write down the security policy document of less than 1000 words for business which operates web site which sells books.

  What types of cable work to make connection in front office

Although loading dock is nowhere near shop floor, dock is 1100 feet from front office. What types of cable will work to make this connection? What type would you select and why?

  Explain a tcp connection between host a and host b

Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, please be specific in your answer of how this takes place.

  Question 1a describe the term digital evidenceb when

question 1a describe the term digital evidence.b when thinking about the many sources of digital evidence it is often

  Develop a wbs and network diagram

You have been assigned to install workstation, software, and networking equipment for a 250-person call center. Develop a WBS, Network Diagram, and Gantt Chart for the project

  How many periodic, expiration running in router x

Assuming no other route update message has been received, show the updated routing table after router X has received the RIP message shown below from router C after 200s.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd