Design and implement a robust windows network

Assignment Help Computer Engineering
Reference no: EM131471850

Windows Application Deployment Proposal

Crete, Inc. is has hired you as an IT consultant for improving on their current Windows Infrastructure. Crete, Inc.is a manufacturing company of automotive fabrics that have locations in Detroit, New York, Atlanta and Mexico. Majority of staff including IT is located in their headquarters in Atlanta. The Detroit and New York office has mostly sales and marketing personnel.

As you a consultant, you are bidding on a lucrative contract to design and implement a robust Windows network. Crete, Inc.has provided details of their current IT infrastructure.

• Main datacenter is located in Atlanta. The Atlanta office has one main data center with three offices converted to data center due to space issues in the main data center.

o Email system which is Microsoft Exchange runs on 4 physical servers.
o 20 SQL Servers
o 12 Oracle Database Servers
o 4 File and Print Servers
o 12 Web Servers
o 40 Application Servers (HR, finance, budget, inventory control, licensing, reporting, etc)

• WAN connectivity is in place between all sites using secure (IPSec) tunnel with redundancy.
• Security in terms of firewalls and IPS and IDS in place and will be handled separately.
• Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover in your Proposal:

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:

Policies and Guidelines

• Develop points to include in policies and guidelines since they are outdated. A detailed policy is not needed.

Monitor

• Implement monitoring plan for critical servers and services. What servers and services should be monitored and why?

Software Update

• Plan to update the servers
• Plan to update desktop
• Plan to update software (Office, Adobe Reader, etc.) and plugins (Java, Flash, etc.)

Clustering and NLB

• Identify, justify and develop a plan for clustering servers. Which service/servers should be clustered?
• Plan for load balancing web servers.

Virtualize

• Since space in data center is issue, plan for using virtual technology. Proposal should including but not limited to networking, storage/SAN, managing.

• Requirements for a virtual template

Single Sign ON

• Automotive manufactures who are Crete, Inc.want to access internal inventory so they can place orders. Develop a plan for ADFS.

Assignment Requirements

There are specific requirements for the assignment:

• The final submission should contain at least 6 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 12 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 12 pages in length.)

• It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font.

• A title page is required; APA format for the title page is optional.

• At least two diagrams must be included (not counted towards the minimum length described above). Additional diagrams, images, or tables are welcome.

• The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure (format) of the final submission will include separate sections for each of the 6 topics required, as well as a summary.

• At least three non-textbook, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end.

Reference no: EM131471850

Questions Cloud

What policy controls would your team recommend : Human Factors and Cyber Policy- What policy controls would your team recommend to help manage each of the 4 cybersecurity issues?
What types of charts would you use the most : What are some ways in which you can use charts in your profession or field of study? What types of charts would you use the most?
What is it that a seller agrees to do by making a warranty : What is it that a seller agrees to do by making a warranty? Does the statement, "I guarantee you will love to wear these shoes," constitute a warranty? Explain.
Does thorin fall under the definition of a hero : Does Thorin fall under the definition of a "hero"? Why or why not? Is the death of this character expected and justified after his actions throughout the novel?
Design and implement a robust windows network : You are bidding on a lucrative contract to design and implement a robust Windows network. Crete, Inc.has provided details of their current IT infrastructure.
Describe the effects of job satisfaction on performance : Define organizational commitment, and briefly describe the three types of organizational commitment. Describe the effects of job satisfaction on performance
How does an implied warranty differ from an express warranty : If a sample is exhibited during negotiation of a sales contract, is the sale a sale by sample? Explain.
Explain the difference in the foreign and natural test : Explain the difference in the "foreign/natural" test and the "reasonable expectation" test as applied to the sale of food or drink.
Incorporate leadership and teamwork : We discussed how to incorporate leadership and teamwork into your résumé. Please explain why highlighting these these can differentiate one person's résumé.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What advice or guidance would offer a company

In times of financial difficulty, companies often resort to trimming the human asset base, without proper prior analysis of the long-term impacts of those actions.

  Conducting the forensic investigation

Describe the purpose of several initial reviews being conducted by forensics investigator (e.g., time lines, technical skills, procedures).

  Write a program for encoding images using the rice algorithm

Write a program for encoding images using the Rice algorithm. Use eight options, including the fundamental sequence, five split sample options, and the two low-entropy options. Use 7 = 16.

  Build a java program named comparefiles.java

make a java program named CompareFiles.java and enter the code to check if the files, TeamProj.txt and TeamProj2.txt, exist.

  Make a list of 10 specific concerns which a consumer might

during the first wave of electronic commerce many established banks opened online branches and a considerable number of

  How to use the ''time'' function and the difftime function

The two searches to use for comparisons are the Linear Search and the Binary Search. You will search for 1000 strings in the array of 3000 strings and find out the average number of probes needed to find a match. The target string would be a rando..

  Design the disk and presents its code to the client

create a script that reads itself from the disk and presents its code to the client. A script where the user needs to enter the name of the file whose contents are to be displayed.

  Nbspthe last stop boutique is having a five-day sale each

nbspthe last stop boutique is having a five-day sale. each day startingnbspon monday the price will drop 10 of the

  Information systems security career path perspective

What is the primary difference between the (ISC)2 SSCP® and CISSP® professional certifications from an information systems security career path perspective

  Discuss what type of protection can be achieved

Discuss what type of protection can be achieved using these capabilities - For example, are data-in-motion, data at rest, or data in use protected? Can bilateral security be achieved using these encryption capabilities?

  Questionuse the following system printprimes for questions

questionuse the following system printprimes for questions a-f below.a illustrate the control flow graph for the

  Calculate the cost of quality according to the pmbok guide

Disclose the contingency or primary budget that has been set aside for these tasks. Calculate the cost of quality according to the PMBOK Guide.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd