Virtual infrastructure design

Assignment Help Computer Networking
Reference no: EM13764792

virtual infrastructure design

Task

Founded in 1990, Century Pharmaceuticals Ltd is a regional Australian pharmaceutical company that delivers pharmaceutical supply chain services to a number of nursing care facilities in regional Australia. The company has some 100 staff, which includes management, administrative staff and other pharmaceutical staff. Century Pharmaceutical has a small data centre at its main site at Wagga where the company's servers and data storage is located. The company has the following server infrastructure at its data centre:

  • 2x Active Directory domain controllers on Windows Server 2008 R2;
  • 3x MySQL database servers on Windows Server 2008 R2;
  • 1x Exchange 2007 Email Server on Windows Server 2008 R2;
  • 4x Windows Server 2003 File and Print Servers;
  • 2x Red Hat Enterprise 5 Linux Server running Apache and TomCat.

The management of the Century Pharmaceuticals Ltd is concerned about the increasing costs of power and cooling to operate their data centre. The management also wants to increase the reliability of the services, reduce the desktop support loads and accelerate desktop provisioning to the staff. They are investigating whether they should employ a virtualisation technology in their data centre to enhance the data centre efficiency while keeping the cost low. They are also considering whether they should use virtualisation to provide an updated desktop environment to their staff.
The Challenge
You are to consider how to implement a virtual infrastructure for the company and prepare a report for the management. Your report should include:

  • One page executive summary
  • Proposed virtual infrastructure for the data centre including which virtual technology is recommended and the reasons for that recommendation
  • Analysis of how virtual applications and desktops or both will be delivered to the user's desktops.
  • Design disaster recovery / backup system
  • Information security changes required and the steps required to implement / monitor these changes
  • Final approximate price for your proposal

 

Reference no: EM13764792

Questions Cloud

Discuss religious implications of darwins theory for victory : Discuss the religious implications of Darwin's theories for Victorians? Do you believe Charles Darwin was a racist? Why or why not?
Develop a plan for your interview and interrogation : Develop a plan for your interview and interrogation. What components will your plan include? Explain. Discuss the specific questioning techniques you would use, and provide a rationale to support your response
Problems related to astronomy : Identify and observe at least two planets. Note the time, position (direction), and approximate elevation above the horizon.
Standards for the manufacture of baseball caps : MadHatter manufactures baseball caps.  The Accounting Faculty of PSU order 150 caps for the Accounting 211 students with ALOE imprinted on them.  MadHatter has the following set of standards for the manufacture of baseball caps.
Virtual infrastructure design : Founded in 1990, Century Pharmaceuticals Ltd is a regional Australian pharmaceutical company that delivers pharmaceutical supply chain services to a number of nursing care facilities in regional Australia.
Explain the title of the importance of being earnest : Explain the title of The Importance of Being Earnest. How does it serve as a central theme for the play? What are the multiple meanings of the word "profession".
What major challenges or barriers exist : How would you recommend a strategy to repair or replace the various aging critical infrastructure? Explain. What major challenges or barriers exist? Explain
Identify what strategic leadership skills : Identify what strategic leadership skills are needed for your entrepreneurial venture to take it to the next growth level. How will you evaluate the leaders in your venture to etermine if they have thestrategic leadership skills needed?
What qualities do you personally prefer in a strong leader : What qualities do you personally prefer in a strong leader, and why do you think these are meritorious. Be specific in your description and rationale

Reviews

Write a Review

Computer Networking Questions & Answers

  Who is considered the father and mother of the internet

Who is Considered the Father and Mother of the Internet, If alive what is she doing today. What has she done

  Recognizing the malicious activity

What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities.

  Find out your stance on issue of drug testing and employee

determine your stance on the issue of drug testing and employee drug usenbspand innbsp3-5 paragraphs write how you feel

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  Operating systems

The figure below shows a tunnel going through a mountain and two streets parallel to each other-one at each end of the tunnel. Traffic lights are located at each end of the tunnel to control the cross flow of traffic through each inter¬section.

  Suppose that you are planning web server computer capacity

assume you are planning web server computer capacity for a business that has 5000 business customers and sells about

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Ciphertext which was encoded with a shift cipher

the following ciphertext which was encoded with a shift cipher: xultpaajcxitltlxaarpjhtiwtgxktghidhipxciwtvgtpilpitghlxiwiwtxgqadds.1. Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify th..

  Configure computers except sus server to connect to server

You wish to configure all the computers except SUS server to automatically connect to SUS server each morning at 7 A.M. to download and install new updates. Which of the given steps must you take to accomplish this goal?

  Write down a 700- to 1050-word business report explaining

scenario your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. your boss also

  Athe keyspace for a cipher is the set all of possible keys

athe keyspace for a cipher is the set all of possible keys that can be used for the cipher. a des key consists of 56

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd