How will systems receive ip addresses

Assignment Help Operating System
Reference no: EM131483001

Assignment: Linux Implementation Proposal

Ecubed, LLC. has a new research and development group - E3-R&D. All systems in E3-R&D will run the Linux operating system and will access resources, as well as share resources, with Ecubed, LLC.'s Microsoft Active Directory domain. The Ecubed, LLC. domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

Ecubed, LLC. also has around 500 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems. The E3-R&D group has 200 of the desktops/laptops.

Current E3-R&D Desktop/Laptop Configuration for Windows 7:
Processor: Intel Core i3 Second Generation
Memory: 4GB RAM
Hard Drive: 350GB
Network Card: 10/100/1000 Mbps
USB Ports: 4 USB 2.0
Monitor: 20inch LCD

Current E3-R&D Desktop/Laptop Configuration for Windows XP:
Processor: Intel Core 2
Memory: 2GB RAM
Hard Drive: 80GB
Network Card: 10/100 Mbps
USB Ports: 4 USB 2.0
Monitor: 15inch LCD

Your boss wants you to come up with a proposal to replace all E3-R&D Windows XP systems with Linux. The Windows 7 systems will remain, so the Linux and Windows systems must be able to interconnect and interoperate. You will implement the Red Hat Enterprise Linux variant for which the licenses have already been purchased. Cost is a factor, so use native Linux solutions (no third party add-ons).

Requirements

The final submission should contain at least 7 to 9 pages of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 12 pages' worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman font. A title page is required. Use the APA format template provided.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address each of the following in your proposal and may make any assumptions which are not specified:

• Research and justify whether E3-R&D will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

• Plan for migration from Windows XP to Linux. Explain how, who will perform the work.

• Provide specifications for the hardware to be used and the installation options.

• How will users log onto the systems? Explain with details.

• How will systems receive IP addresses? Explain with details.

• How will DNS be accessed by the E3-R&D systems? Explain with details.

• Explain, in detail, how files on the network may be accessed by E3-R&D.

• Explain, in detail, how E3-R&D can securely share files within their group and other selected groups/users in the company.

• How will printing be handled? Explain with details.

• What, if any, data will be encrypted? Explain with details.

Reference no: EM131483001

Questions Cloud

Describe the possible losses to our society : Describe the possible losses to our society and the economy when people are unemployed.
Describe the essential elements of a good security policy : How a particular virus has affected one or more organizations. Describe the essential elements of a good security policy for an organization.
Which group would tend to increaseduring deep recession : The Bureau of Labor categorizes unemployed people into several groups including job leavers, job losers, and discouraged workers. During a mild recession.
Stock valuation calculations : This homework submission should include all calculations, completed on the designated tab of the Homework Student Workbook
How will systems receive ip addresses : How will systems receive IP addresses? Explain with details. How will DNS be accessed by the E3-R&D systems? Explain with details.
What is the initial investment outlay : What is the initial investment outlay for the machine? Round answers to nearest dollar. You must show your work to receive full credit.
Critically review current approaches to health promotion : Identify and critically review current approaches to health promotion at a local, national and international level
How many payments will you have made : How many payments will you have made when your account balance reaches $21,334? (Do not round your intermediate calculations.)
Why does the use of passwords put the overall security : Why does the use of passwords put the overall security of the network in jeopardy? Discuss whether additional measures could have been taken.

Reviews

Write a Review

Operating System Questions & Answers

  Operating system security fundamentals

1. Explain the function of an operating system. 2. Describe the operating system security environment from a database perspective.

  Creating the sample database

nstall DB2 Express-C, construct the model database, and validate the installation and write a short paper describing your experience with the installation.

  What happens when you try the overflow c program

Use the gdb debugger to investigate what happens when you try the overflow.c program. You should also describe what happens using your own words.

  Question about database management systems

Assume you are a DBA staff member. determine what data dimensions would you describe to top evel managers to get their support for data administration function?

  Discuss bluetooth technology and different applications

Discuss Bluetooth technology and different applications. Give an overview on emerging trends in wearable computing.

  Categorize the programs as system software

Categorize the programs as system software or application software, and explain your categorization: ? Java Virtual Machine ? Excel

  What are the differences among the computer forensic tools

Discuss some of the various backup tools available in the market. What are the differences among the computer forensic tools discussed within the chapter

  Windows server deployment proposal

Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..

  What if four hexadecimal digits are used

What if four hexadecimal digits are used? Explain your answer.

  Explain the client-server architecture

What are the three different categories of command, support your answer by giving three examples. Give three good reasons, with valid explanation, to justify why partitioning hard disk provides a variety of advantages. Explain the client/server..

  Relative merits of optimistic versus conservative concurrenc

Q/ Describe the  Q/ Describe the relative merits of optimistic versus conservative concurrency control under different rates of contention among updates. under different rates of contention among updates.

  Define what is meant by power efficiency

Order the following modulation types in terms of spectral efficiency (best to worse) and explain why (be specific, show a number and how you got it): 64-QAM, QPSK, 8-PSK, and BPSK. Assume that the r=0, perfect filtering.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd