How will the servers be deployed

Assignment Help Computer Networking
Reference no: EM13755991

Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. The firm does not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration.

You are required to supply WAI with a solution that describes the implementation and configuration of their core IT services. The cost of the implementation is not expected to exceed the company's budget and so does not have to be considered in this solution. WAI wishes to implement a solution will meet the company's needs for the next 2-3 years.

There are several details about WAI which will have an impact on your choices:

1. WAI will start with 300 employees, in the following departments:

a. Executives (10 employees) - manage and run the company
b. Accounts and Sales Department (150 employees) - perform market research and maintain accounts
c. Creative, Media and Production Department (100 employees)- advertising
d. Human Resources and Finances (30 employees) - perform HR and financial duties
e. IT (10 employees) -manage IT for the company

2. WAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in Los Angeles with at least 1 person from each of the departments above located in New York City.

3. Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.

4. Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.

5. Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see tl1e company's financial details). Your team may make assumptions about how data should be shared or kept private.

6. Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Your solution should draw on the content presented in the course. The outline below provides points to cover. You are free to provide additional, related information.

Provide technical and justifications reasons for each choice, citing resources as appropriate. Provide rough estimates of scheduling and manpower required for deploying your solution. You may summarize the schedule and manpower at the end of the document or separately for each section.

The Windows Server 2012 operating system should be used for all aspects of the solution.

Your solution should cover the following four numbered areas and associated bulleted items listed under each:

1. Deployment and Server Editions

• How many servers total are needed? Which roles will be combined?
• What edition of Windows Server will be used for each server (e.g., Standard, Data)?
• Should servers be virtualized using Hyper-V?
• Where is each of the servers located (which of the two sites)?
• How will the servers be deployed?

2. DNS

•DNS namespace design (e.g., domain name[s] chosen split DNS for Internet/intranet, zones)
•How will DNS be handled for the second site?

3. Active Directory

•Number of AD domains and names of domains
•Will there be any Read-Only Domain Controllers?
•How will the second site factor into domain controller placement? How will AD sites be configured?

4.File and Printer Sharing

• What shares might be needed? (Consider some of the reasoning supplied in the relevant chapter of the textbook.)
• How will quotas/FSRM be configured? (Consider all aspects, such as thresholds, altering, file screens, and reporting.)
• Will a DFS namespace be implemented?

Reference no: EM13755991

Questions Cloud

Creating an er diagram : Creating an ER diagram, Listing the functional dependencies, confirming that the database is in at least 4NF, Using SQL commands to create the and populate the database (there do not need to be many rows)
Identification of preventative controls : Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis
Analysis of the country viability : The second part of the research paper emphasizes your recommendations based upon your analysis of the country's viability as an opportunity for export / import activities from the U.S. perspective from Assignment 1.
How class structure and gender affect urban political affair : How did class structure, ethnicity, and gender affect urban political affairs?
How will the servers be deployed : Worldwide Advertising, Inc. (WAI) has hired you as an IT consultant. WAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. How will the servers..
What did paul johnson think of monopolies : What did Paul Johnson think of monopolies?
Studying consumer behavior : In this module we are studying consumer behavior. An organization cannot persuade a customer to purchase a product or service without understanding the basics of "how people buy."
Write an essay on beginnings of globalization : Write an essay on beginnings of globalization. Exchange - of people, diseases, foodstuffs, religion - occurred on a level never before reached and linked the peoples of the Eastern and Western hemispheres.
Who is considered the father and mother of the internet : Who is Considered the Father and Mother of the Internet, If alive what is she doing today. What has she done

Reviews

Write a Review

Computer Networking Questions & Answers

  Find maximum number of telephone supported by office

Average telephone is used to make four calls per 8-hour workday, with mean call duration of six minutes. Ten percent of calls are long distance. Determine maximum number of telephones an end office can support?

  Discuss some of the problems nats create for ipsec security

discuss some of the problems nats create for ipsec security. see phifer 2000. can we solve these problems by using

  Which of the given is a cisco ios feature which can collect

question which of the following is a cisco ios feature that can collect timestamps of traffic sent between a particular

  Determine distinct canonical names required-ip multicasting

Let N users participating in the audio/video conference by using IP multicasting. Each user is equipped with the microphone, camera, and speakers. How many distinct canonical names are required?

  Provide a clear set of requirements for the network solution

Analyze the given case and provide a clear set of requirements for the network solution and Identify the information that is to be protected and the related security requirements

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

  He needs to describe the pros and cons of using stp and the

the it manager for a general discount company is considering the implementation of a fully meshed switched environment

  What alternatives telephone company use to increase capacity

This fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

  Your friend has a small design shop with windows nt 40

your friend has a small design shop with windows nt 4.0 windows 2000 and windows xp workstations. he has one older

  Kinds of business applications in networked business office

Write down types kinds of business applications would you deem significant in networked business office? What kinds of network servers and resources would be essential to run these business applications?

  Find possibility of setting up wireless network in building

Assume you are a wireless network contractor, and you are meeting with potential client over lunch to explain possibility of setting up wireless network in client's building.

  What is a domain name how is it used on the internet name

1 describe at least three examples that show the importance of data communications in your daily life. when doing so

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd