Introductionbluesky systems is a software development

Assignment Help Computer Engineering
Reference no: EM13347751

Introduction

Bluesky Systems is a software development company that builds software components for a variety of private and government clients. Their current infrastructure is outdated and has been prone to being attacked by hackers that have exploited vulnerabilities in their current DNS causing serious down time. In the last 4 years Bluesky has had to recover from numerous disasters due to a lack of any good business continuity planning. Remote access to the two existing sites is allowed using Cisco VPN technology. This has caused numerous security issues because of missing security patches, outdated AV signatures and missing OS patches and updates.

Bluesky currently has 45 employees in their Tucson location and 15 in their Phoenix location. Bluesky is preparing to add another remote site in Sierra Vista to support their military contracts scheduled to be awarded in 2014. The Sierra Vista location will add another 12 employees to the network. Bluesky needs to bring their current infrastructure into strict compliance with government security as a trusted network with access to government data. Bluesky Systems needs to upgrade their current infrastructure of Windows Server 2003 to Windows Server 2008. The move is designed to improve over all server performance, security, application and data provisioning, monitoring, and business continuity. This is will also begin the process of bringing Bluesky into compliance as a trusted government network. Executive Summary - Provide a high level executive summary of your Infrastructure proposal. Imagine that you have 20 minutes to present your proposal to the board of directors. Explain to the board the issues with their current infrastructure; highlight the key aspects of your design and how your proposal will benefit Bluesky Systems. Close out your executive summary by summarizing why Bluesky should select your proposal and not your competitors'. Assume that the board of directors is not technical. Be careful of the technical jargon you use. This is your one chance to shine before the executive committee and convince them that you are the right chose for their network up grade. Be persuasive! (Three paragraphs- Half page)
The Appendix A details the current network configuration along with the proposed Sierra Vista site.
Appendix B details the layout of the wiring closet located at the main site in Tucson.

Required Proposal Responses

1) Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure. Tucson location has 2 Domain Controllers. The Phoenix location has a single Domain Controller. You can make changes to the forest, domain and OUs based on how it will benefit your design. Also include an overview of your design in paragraph form. (1 page, including charts and/or diagrams)

2) All clients should obtain IP addresses automatically. Develop a DHCP configuration. Include what servers will have the DHCP Server role on them. Describe all the components such as: scopes, leases, reservations, options and relay agents. Also include IP address scheme for organization. (1page)

3) The following chart describes Bluesky's current IP scheme. Use the following table as your guide or create of your own.

SUBNET

192.168.0.1

 

 

192.168.1.1

N/A

LOCATION

Tucson

 

 

Phoenix

Sierra Vista

Server Name

BlueskyDNS1

BlueskyDNS2

BlueskyData

BlueskyPhoenix

N/A

Server  IP

192.168.0.2

192.168.0.3

192.168.0.4

192.168.1.2

N/A

ROUTER IP

192.168.0.1

 

 

192.168.1.1

N/A

BEGINNING IP

192.168.0.25

 

 

192.168.1.25

N/A

ENDING IP

192.168.0.254

 

 

192.168.1.254

N/A

4) All workstations and servers need name resolution capabilities for the intranet and the Internet. DNS - Develop a DNS namespace for Bluesky. What servers will contain the DNS Server role and describe where DNS servers will be located.  Describe what the DNS namespace structure will look like.

5) BlueskyDNS1 currently holds the primary DNS zone for the bluesky.local network and is used for name resolution internally and externally.

6) BlueskyDNS1 is the forest root and the DHCP server for the Tucson location.

7) BlueskyDNS2 is a backup domain controller for the network and the secondary DNS server for bluesky.local.

8) BlueskyPhoenix is a domain controller, file server, print server, DNS and DHCP server for the Phoenix location.

9) All sites will connect via a VPN connection established between three Cisco ASAs. The VPN is used for replication traffic between the sites and secure remote access.  

10) The proposed Sierra Vista will need the same configuration as the Phoenix location.

Reference no: EM13347751

Questions Cloud

Problems1the file myinputfiletxt is an encrypted file your : problems1.the file myinputfile.txt is an encrypted file. your assignment is to decrypt this file and hopefully answer
As a senior in a professional services firm you have been : as a senior in a professional services firm you have been assigned to plan the financial statement audit of a private
Problem 1 if purchasing power parity applied to big macs : problem 1. if purchasing power parity applied to big macs and a big mac cost 2.50 in the united states while the
Auditing project overviewnbsp casenbsp you will be asked to : auditing project overviewnbsp casenbsp you will be asked to address a accounting failure from american insurance group
Introductionbluesky systems is a software development : introductionbluesky systems is a software development company that builds software components for a variety of private
Gary and sally decided to go on a holiday they consulted : gary and sally decided to go on a holiday. they consulted their local tour company fly by night tours who advertised a
The objective of this case is to estimate the cost of : the objective of this case is to estimate the cost of capital the occ that ameritrade should use in evaluating
Question 1a doubly linked list is like a linked list except : question 1a doubly linked list is like a linked list except that each node has a pointer both to the next node in the
You are required to prepare a program for assessment system : you are required to prepare a program for assessment system of a university. the main idea is to evaluate the gpa

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make perl script in order to display a basic web page

design a Perl script in order to display a basic Web page and display system information that is dynamic using Perl on the screen such as date and time as well as the host and how long system has been up.

  How a first responder will identify and preserve evidence

the video South Tower Falls, Shot Front of Trinity Church, describe your concerns as a first responder. (For the purpose of your response assume that you do NOT know whether this is a chemical, biological, radiological, nuclear, or simple explosiv..

  Use ezcountour to create a contour map of z

Generate a combination surface and contour plot of Z, using ezsurfc.

  Make a script that uses the following components

design a script that uses the following components: an array, sub procedure, explicit declaration, RUNAT=Server, and a function.

  Implementing compstat

Explain how COMPSTAT, as an information system (IS), implements the four basic IS functions Calculate how information systems have enabled the police departments which implement tools like COMPSTAT in order to respond to the crime faster.

  Diiference between elements are tests of equality

imagine that the only comparisons allowed between elements are tests of equality. Give an algorithm that uses no more than 2n comparisons to determine whether the array A contains a majority element and, if so, find it.

  Intrusion detection system or intrusion prevention system

Your company is deciding whether to employ the intrusion detection system (IDS), or an intrusion prevention system (IPS).

  Why prepaid cell phones make forensic investigation hard

Discuss about how can you quickly investigate and collect digital evidence for a crime what involves a phone call (e.g., you checked the victim's cell phone and you find a phone call from a phone number, this phone number could be a VoIP phone, a ..

  Average access time of memory system

The access time to cache is 30 nanoseconds. The access time to memory is 120 nanoseconds. The data bus between cache and main memory is 128 bits wide. The hit rate on cache is 95%. 25% of the cache blocks are dirty.Specify the average access time o..

  Sketch a basic network suggesting how many routers

plan a basic network suggesting how many routers and hubs etc for each floor. As well, find out what to use to connect i.e. Cat5 wire,etc.

  Choose three or more types of testing

Write down the discussion as if you are the systems analyst briefing your CIO as the two of you are walking over to the steering committee meeting in which a "go/no go" decision will be made whether to go live with your new enterprise system (this..

  Explain the actions you will take to correct

A user calls to report that she is unable to log on to email. You respond with a couple of quick questions. Because you know that no one else is using the network right now, you cannot find out whether the problem is unique to her machine or affec..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd