How will dns be accessed by the lsdg systems explain

Assignment Help Computer Networking
Reference no: EM131258457

Linux Implementation Proposal

Linx, LLC. has a new research and development group - LSDG. All systems in LSDG will run the Linux operating system and will access resources, as well as share resources, with Linx, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

Linx, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:

Processor: Intel Core i3 Second Generation

Memory: 4GB RAM

Hard Drive: 350GB

Network Card: 10/100/1000 Mbps

USB Ports: 4 USB 2.0

Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:

Processor: Intel Core 2

Memory: 2GB RAM

Hard Drive: 80GB

Network Card: 10/100 Mbps

USB Ports: 4 USB 2.0

Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all Windows XP systems with Linux. You will implement the Linux variant specified by your instructor.

Requirements

The final submission should contain at least 5 to 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 7 pages' worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether LSDG will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux.

• Determine the hardware to be used and the installation options.

• How will users log onto the systems? Explain.

• How will systems receive IP addresses? Explain.

• How will DNS be accessed by the LSDG systems? Explain.

• Explain how files on the network may be accessed by LSDG.

• Explain how LSDG can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain.

• What, if any, data will be encrypted? Explain.

Reference no: EM131258457

Questions Cloud

Examine the role that each public health agency : From the second e-Activity, analyze two to three (2-3) strategies that your state public health agency would employ in response to a pandemic event. From modifications made to policies in the last five years, infer the related lessons that have be..
Critique on an article-nationalisation of human capital : Summary of the article as you understand it ( do not copy-paste the abstract) and nature of the article (conceptual, descriptive or empirical) - provide the evidence
Identify the true statement about a claim of defamation : Identify the white collar crime that involves a fraudulent entity attracting investors, offering them high returns, and paying these returns, not from profits, but from investments made by subsequent investors.
Research the concepts and technology of data etl : Discuss the various tools that SSIS provides and relate them to the phases within ETL. You should also provide suitable examples from case studies (such as AdventureWorks & AdventureWorksDW) to reinforce your discussions.
How will dns be accessed by the lsdg systems explain : How will DNS be accessed by the LSDG systems? Explain. Explain how files on the network may be accessed by LSDG. Explain how LSDG can securely share files within their group and other selected groups/users in company.
What is the theoretical minimum for the smallest number : What is the theoretical minimum for the smallest number of workstations that Helms can achieve in this assembly line?
Create object called abc by assigning the number three : Create object called "abc" by assigning the number 3. Create different vectors ("a" is numeric, "b" is character and "c" is logical). List all the objects in the current session. Create vector "x" with the values {4, 4, 5, 6, 7, 2, 9}.
How does the decision in this case impact the validity : If auditing of financial statements is required for the protection of public investors, should all members of the PCAOB be taken from the investment community that uses audited financial statements or is there another suggestion for selecting memb..
Internal economies of scale : Discuss the following question: - In the real world, internal economies of scale exist in many industries. However, firms in those industries still prefer to have production in many locations, many countries. Please discuss and explain that situat..

Reviews

Write a Review

Computer Networking Questions & Answers

  Assume that you are a software engineer working on a fixed

imagine you are a software engineer working on a fixed budget and you are tasked to develop a web-based student

  Task of determining available wireless methods

You have been assigned th task of determining the available wireless methods that could be used to connect buildings to each other and presenting these options to executive team.

  Examine the vulnerabilities of an ftp file transfer

Examine the vulnerabilities of an FTP file transfer, perform the activity - Capture network traffic using WireShark or Ethereal

  Describe both remote-access vpns and point-to-point vpns

Describe both remote-access VPNs and point-to-point VPNs

  1outline a plan for the development of an addressing and n

1.outline a plan for the development of an addressing and naming model in an environment of the following scenario ?ten

  Which of the following statements is true in a data center

1. a network engineer is preparing an implementation plan of xumuc. she is not certain as to which layer of the cisco

  The purpose of this two-part project is to compute the

the purpose of this two-part project is to compute the students ability to analyze security requirements and prepare a

  Question 1broadly sort and discuss the types of safekeeping

question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  What is the path between nodes s and d

Describe a solution - discuss node placement, choice of gateway(s), sensing strategy, routing strategy, duty cycling and the cost of your solution. Also explicitly state all assumptions that you make.

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  Describe the ip address classes and ranges

Describe the IP address classes and ranges. Provide examples of internal vs. external address ranges. What configuration changes would you make in a network wireless router to enable a base level of security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd