How will dns be accessed by the lsdg systems

Assignment Help Operating System
Reference no: EM131585398

Assignment: Linux Implementation Proposal

HACKD, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with HACKD, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

HACKD, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux variant specified by your instructor.

Specific Requirements

There are specific requirements for this assignment:

> The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal and may make any assumptions which are not specified:

> Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

> Plan for migration from Windows XP to Linux.

> Determine the hardware to be used and the installation options.

> How will users log onto the systems? Explain.

> How will systems receive IP addresses? Explain.

> How will DNS be accessed by the LSDG systems? Explain.

> Explain how files on the network may be accessed by LSDG.

> Explain how LSDG can securely share files within their group and other selected groups/users in the company.

> How will printing be handled? Explain.

> What, if any, data will be encrypted? Explain.

Reference no: EM131585398

Questions Cloud

Implication of applying accounting concepts wrongly : What is the implication of applying accounting concepts wrongly?
Gamma measures and vega measures : Gamma measures and Vega measures
Discuss the properties of the closed form : Find a closed form and a recurrence relation for the sequence 0, 2, 8, 24, 64, 160, 384, 896, 2048, 4608, 10240,... .
Why build-a-bear is successful at using technology : Examine the fundamental reasons why Build-A-Bear is successful at using technology and nontraditional forms of retailing to increase its image.
How will dns be accessed by the lsdg systems : How will systems receive IP addresses? Explain. How will DNS be accessed by the LSDG systems? Explain. Explain how files on the network may be accessed by LSDG.
Reasons a business person would make an unethical decision : What are some possible reasons a business person would make an unethical decision - What are the risks of doing so?
Compute the profit margin on sales : The 2014 Annual Report of Tootsie Roll Industries contains the following information. Compute the Profit margin on sales
Create risk-free portfolio using only the futures contract : Create a risk-free portfolio using only the futures contract and the index itself.
Online strategy and a promotion strategy : Today's integrated marketing plans include a marcom strategy, an online strategy and a promotion strategy.

Reviews

Write a Review

Operating System Questions & Answers

  Why is situation of wasting resources not really wasteful

it has come to our attention that this is not always the case and thus there is a need to forsake this principle and thus waste resources. Why is this situation of wasting resources not really wasteful?

  Explain the design of your firewall

A simple firewall is a filter which blocks the packets based on the pre-defined filter rules. There are two general strategies to set-up a filter. Explain the design of your firewall (filter rules)

  Why use threads and explain a complication that concurrent

why use threads? and explain a complication that concurrent processing adds to an operating system.provide support for

  Give a brief history about windows systems

MN404 - T1 2017 Fundamentals of Operating Systems and Java Programming Assignment. Give a brief history about Windows systems

  Expansion of network services

Assume you have been hired through your local library to help them setup a LAN to connect their three library sites.

  Compile the code below and test it

This code is not compiling, it consists of a header file (rational.h) and the code itself (rational.c). Please provide comment (like what the while loop does ...etc, so that the program is more understandable by anyone reading it). The original pr..

  Discuss technology related ethical issue

Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?

  Describe the employee and emp_photo tables in detail.

Open the SAMPLE database and its Tables folder, describe what information you see there, using the terms introduced in this module, such as table, schema and key.

  To manufacture dynamo testing machine

Objective- To manufacture "DYNAMO TESTING MACHINE". Implement various advance controls like tachometer, pressure gauge, weight displaying unit etc

  Introduction of the unix operating system

Regular expressions became popular with the introduction of the UNIX operating system in 1960s and its text processing tools such as grep, and ed. Write a two to three (2-3) page paper in which you:

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

  A lock variable not a good solution for mutual exclusion

why is busy waiting on a lock variable not a good solution for mutual exclusion?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd