How will dns be accessed by the lsdg systems

Assignment Help Management Information Sys
Reference no: EM132279350

Linux Implementation Proposal

Linx, LLC has a new research and development group called LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC's Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

Linx, LLC also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux.

Requirements

The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used). It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must turn this assignment in to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options.

• How will users log onto the systems? Explain.

• How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain.

• Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What, if any, data will be encrypted? Explain.

Reference no: EM132279350

Questions Cloud

Root of the success of such programs in developing nations : ?What could be the root of the success of such programs in developing nations? Can it work best only in developed countries like the US?
What is the probability of exactly 6 successful rfps : Assume that the outcomes follow the binomial distribution with the probability of success equal to 0.4.
Discuss the cons of moving enterprise-wide applications : Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems.
Deposits into a retirement account : Suppose a person makes equal deposits into a retirement account for 20 years (with each payment at the end of the year), how much must
How will dns be accessed by the lsdg systems : Explain how LSDG can securely share files within their group and other selected groups/users in the company.
How do you define environmental scanning : How do you define environmental scanning? What is the main purpose of conducting an environmental scanning? Why is it important?
What concepts about business continuity have you learned : What concepts or concerns about business continuity or disaster recovery have you learned in recent weeks?
Discuss the vision into performance model : Discuss the Vision into Performance Model and how it relates to the employee selection process?
Making a product or delivering a service : Prices should reflect the value that consumers are willing to pay versus Prices should primarily just reflect the cost involved in making a product

Reviews

Write a Review

Management Information Sys Questions & Answers

  What type of resistance might arise among the staff

What type of resistance might arise among the staff? How might you, as the director of the organization, attempt to overcome the resistance?

  What are the pros and cons of deploying heuristic scanning

What are the pros and cons of deploying heuristic scanning techniques in an operational network?

  Discuss the logical and physical design

In order to ensure optimal database performance, the logical and physical design should consider the user requirements thoroughly.

  Discuss transactional vs transformational leadership

What are some of the ways that cross-cultural teams are distinguished from other types of teams?

  Why are countries and businesses concerned about cyber

Why are countries and businesses concerned about cyber espionage that originates in China and Russia? What are the dangers if the cyber cold war turns into an actual cyber war?Find a recent article concerning Hacking or Cyber espionage.

  Explain the risk management

The Department of Homeland Security (DHS) risk management process serves to strengthen resilient systems within communities.

  Determine which cpu of the two is faster and why

From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instruction sets and clock rates of ..

  Should the local government suspend implementation

Should the local government suspend implementation of the new policy for 90 days (180 days?) to allow members of the public to comment on the new policy?

  Provide an overview of the server-side and client-side

Provide an overview of the server-side and client-side hardware and software requirements of your information system (Defense Travel System).

  Provide a historical example that would be found going back

Provide a historical example that would be found going back several decades. Learning from the past is a great way to succeed in the future.

  Illustrate various security areas

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

  What problem is quantum cryptography solving

What problem is quantum cryptography solving? explain. Detail how quantum cryptography works and compare it to any predecessor.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd