Identify and describe the processes involved in the

Assignment Help Computer Networking
Reference no: EM13380263

Identify and describe the processes involved in the management of the services, disk quotas and security of both Windows and UNIX operating systems.

Jason is the administrator of a Windows 2008 network.  He manages five Windows 2008 servers, one of which functions as a file server for three departments. Lately, he is faced with two separate problems. First, a research library was just put into the building. It has two computers running Windows 7, and users can log into them while they are doing research. They are automatically connected to a home directory on the server where the users can create documents based on their research findings. However, the users are finding that, when they move from the computers in their offices to the research computers, they have to reset their desktops, and if they create a shortcut on their office computers, they have to create the same shortcut on the research machines. The users are asking for a solution to this problem.

The second issue is one that the users are not complaining about (yet), but that is becoming a problem for Jason. The users' home folders are stored on the file server. He periodically checks storage use and finds that some users are consuming a disproportionate amount of hard drive space on the server. In addition, this space usage is increasing dramatically over time. When he investigates, he finds that many users are downloading quite a large quantity of game demos and pictures, and these items are creating most of the storage consumption.

Jason wants to be able to provide for the ongoing storage needs of the users while enforcing an upper limit on the amount of space any one user can consume. He also wants to be able to separate each department so that if the users in one department consume the maximum amount of space, that will not overrun the free space available to the users in another department. He currently has two hard drives with capacities of 100GB and 200GB, and he would like to allocate 100GB to each department.

Task

  • You have been called in to analyze this situation and make recommendations.
  • Explain how you would implement a similar scenario using UNIX?

Reference no: EM13380263

Questions Cloud

Create a program which operates as a generic simple json : create a program which operates as a generic simple json parser. simple json is our version of json that only supports
Question 1the management of your employer wants to find out : question 1the management of your employer wants to find out about desktop virtualisation and how it works. they think
Task 1in a public-key system using rsa you intercept the : task 1in a public-key system using rsa you intercept the ciphertext c 13 sent to a user whose public key is e 23 n
Investigate the history of the csiro wifi patent which was : investigate the history of the csiro wifi patent which was recently up-held in courts in the united states. this patent
Identify and describe the processes involved in the : identify and describe the processes involved in the management of the services disk quotas and security of both windows
Identify and describe the processes involved in the : identify and describe the processes involved in the management of the active directory infrastructure.identify and
Identify and describe the processes involved in the windows : identify and describe the processes involved in the windows client server environment.explain the role of clientserver
Describe and critically evaluate the similarities between : describe and critically evaluate the similarities between the windows and unix operating systems evaluate the
Describe who the systemsnbspintended usersnbspare and why : describe who the systemsnbspintended usersnbspare and why they will use this software i.e. indicate

Reviews

Write a Review

Computer Networking Questions & Answers

  Deliver voip services also internet radio and tv

In terms of spectrum, does AT&T, Verizon, Sprint, etc...have access to amount of spectrum required to deliver VoIP services as well as Internet radio and TV?

  Initial values of cache tags-accesses lead to hit and miss

Suppose that initial values of cache tags and cache lines are completely arbitrary, illustrate which accesses will lead to hit, and which will cause to miss.

  . label the rows that make good power ciphers and explain

a) Make a power table for numbers mod 11. Indicate how the table shows Fermat's theorem, label the primitive roots mod 11. Explain how you can tell they are primitive roots. Label the rows that make good power ciphers and explain

  Question about tcp networking

A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

  Purpose of key tag in rrsig resource record

Determine the purpose of the key tag in the RRSIG resource record.

  Features to facilitate overcoming limits of security

What features do they incorporate to facilitate overcoming limits of security, merchant risk, cost, etc.? How do they validate cardholder identities?

  Question 1examine the concept of data information and

question 1examine the concept of data information and knowledge in information warfare.question 2the progression of

  Network engineer for abc company

You are the network engineer for ABC company. Business is booming, a lot of new staff has been hired recently, and the company is running out of office space. A new larger building has been purchased and you have been asked to design the network f..

  Employment screening with organizations

Should the viewing or monitoring of social networking cites be considered an appropriate method for preliminary employment screening and continued employment with organizations?

  1 choose one of the media articles or case studies listed

1. choose one of the media articles or case studies listed by the lecturer in interact.2. use the title of the

  Design a lan for firm with five departments in one building

You have been asked to design a LAN for very successful CPA firm with 5 departments in one building and total of 500 employees.

  Adding four servers to network to share file

Manager would like to add four servers to network so employees can share files. Manager would also like to permit VPN access for her employees so they can work remotely.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd