How will users log onto the systems

Assignment Help Computer Networking
Reference no: EM131996971

Question: Linux Transition Proposal

Background: GuardianTech, LLC. has a new research and development group - Gauntlet. All systems in Gauntlet will run the Linux operating system and will access resources, as well as share resources, with GuardianTech, LLC.'s Microsoft Active Directory domain. The domain consists of several Windows Server 2012 R2 servers running various services (Microsoft Active Directory, DNS, DHCP, web services, printing and file services).

GuardianTech, LLC. also has around 1000 client operating system desktops/laptops that run Windows 7 and Windows XP. There is a mix of desktop and laptop systems.

Current Desktop/Laptop Configuration for Windows 7:

Processor: Intel Core i3 Second Generation

Memory: 4GB RAM

Hard Drive: 250GB

Network Card: 10/100/1000 Mbps

USB Ports: 4 USB 2.0

Monitor: 20inch LCD

Current Desktop/Laptop Configuration for Windows XP:

Processor: Intel Core 2

Memory: 2GB RAM

Hard Drive: 40GB

Network Card: 10/100 Mbps

USB Ports: 2 USB 2.0

Monitor: 13inch LCD

Your boss, the Chief Technical Officer (CTO) Gamora Zen, wants you to come up with a proposal to replace all Windows XP systems with Linux. She also wants to purchase hardware to host a new DNS server on Linux. They are very unhappy with the performance of the DNS server running in Active Directory. You will research and select the Linux distribution of choice for both the Desktop/Laptops and the new DNS server and justify why you picked them. You should write your paper assuming the audience is the CTO, Gamora Zen.

Requirements: In addition the requirements in the grading rubric, the final submission should contain at least 5 pages worth of text written by the student (not counting title page, images, diagrams, tables, or quotations that may be used), but may be longer, not to exceed approximately 9 pages worth of student-supplied text. It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font and adhere to all APA formatting. A title page is also required.

You must turn this assignment to both the assignment area within our LEO classroom as well as to the TurnItIn website. Failure to do so may result in point deductions. Follow the TurnItIn instructions provided within the class.

You must address the following in your proposal. You may make any assumptions which are not specified.

1. Research and justify whether Gauntlet will use existing computer hardware that is being used with the Windows XP systems, or if new hardware will be required.

2. Plan for migration from Windows XP to Linux.

3. Explain how some windows services can interact with Linux services during the transition.

• Printing

• File Sharing

• DNS

• Central Authentication

4. Determine the hardware to be used and the installation options for the workstations/laptops.

5. Provide Hardware Specs for the new DNS server running in Linux.

6. How will users log onto the systems? Explain.

7. How will systems receive IP addresses? Explain.

8. Explain how files hosted on the Windows server on the network may be accessed by Gauntlet. Make sure you cover how both windows and linux can access the same shared files.

9. Explain how Gauntlet can securely share files from a central location within their group and other selected groups/users in the company. This includes access control.

10. How will central authentication be handled in the Linux environment.

11. How will printing be handled? Explain.

12. How files on the share be encrypted.

13. Include some element of cost. It doesn't have to be a lengthy discussion down to the dollar. You should explain the implications of cost of upgrading hardware (if you choose to upgrade), DNS server purchase, and any software licenses.

14. Describe why you selected the Linux distribution for both the DNS server and workstations/laptops.

15. Pick installation method and justify why it's effective for the number of installs that has to be done

16. Dual Boot is NOT an option.

Reference no: EM131996971

Questions Cloud

What is the probability that the mean price per gallon : In a sample of 700 gas stations, the mean price for regular gasoline at the pump was $ 2.806 per gallon and the standard deviation was $0.008 per gallon.
Find an attack that was successful : Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.
How storage vmotion can be used to create greater up-time : Your team has been asked by senior management to cut costs related to the IT infrastructure of your company. Your team does all of the cost analysis.
Identify two key communication issues : BUSN20017 Effective Business Communication - Based upon your analysis of the findings you are to identify two key communication issues that you have identified
How will users log onto the systems : Determine the hardware to be used and the installation options for the workstations/laptops. How will users log onto the systems? Explain.
How the organization will address dynamic cyber risk : How the organization will address dynamic Cyber risk and threat environments. Strategies and tactics the organization will employ.
How to connect to the storage provided : Configuration - Include how vSphere should be configured at a high level, specifically covering: Configuration of virtual switches.
Hai that stating measure of risk : This measure of chance is called probability. But we use decimal instead of percentage when we talk about probability. How do you use probability in your life?
Amount of time watching video on a smartphone : Assume that the amount of time watching video on a smartphone per month is normally distributed and that the standard deviation is 20 minutes.

Reviews

Write a Review

Computer Networking Questions & Answers

  In what ways could each of factor contribute to poor quality

In what ways could each of the factors listed contribute to poor quality? Management, Equipment maintenance.

  Advantages and disadvantages of remote access solution

Describe whether or not your network design will support dial-up or VPN remote access by using descriptions of following aspects: advantages and disadvantages of remote access solution.

  Information security security being a top concern for any

security being a top concern for any organisation choosing the correct security solutions is of utmost importance.

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Explain the purpose and use of mime in an email message

Explain the purpose and use of MIME in an email message. Describe how all three types of network switching (message, circuit, and packet) are used in the email system.

  Collaboration systems at isuzu australia limited

Summarize the main reason(s) that prompted Isuzu Australia Limited (IAL) to use collaboration technologies.

  Build a small network using three switches

ITNE3008 - Advanced Switching Build a small network using three switches and one router and one switch will run as a distribution layer switch, the other two will run as access layer switches

  Discuss three configuration topologies in wireless topology

Wireless Topology Paper: Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint; and (3) multi-point to point. In this paper, (a) define each topology, (b) provide a scenario for usin..

  Determine average streaming media data rate

Assume we can accurately forecast set of WAPs that the taxi will visit. Determine average streaming media data rate that we can sustain by downloading prefetched data from WAPs?

  Setup and install a small network and set of servers

COIT13146 - System and Network Administration - You are required to setup and install a small network and set of servers to support a small company which operates a tomato packing plant. The plant operates in a small regional town and has 10 perman..

  Explaining the approaches to acknowledge packets

In second strategy, packets are not acknowledged individually, but the whole file is acknowledged when it arrives. Explain the two approaches.

  How many packets are to be resent

The sending machine is in the ready state with Sf = 10 and Sn = 15. A time-out occurs. How many packets are to be resent? What are their sequence numbers?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd