Manage and secure windows infrastructure to satisfy bluesky

Assignment Help Computer Engineering
Reference no: EM13462049

To improve efficiency in its current infrastructure, Blue Sky Systems decided to upgrade their current infrastructure of Microsoft 2003 Servers to Windows Server 2008 R2. The move is designed to improve over all server performance, security, application and data provisioning, monitoring, and business continuity. Current Infrastructure: Blue Sky has a main site located in Tucson Arizona with one remote site located Phoenix, Arizona. The two are connected via a VPN connection between two routers. The two sites are configured as follows. The Blue Sky domain (called bluesky.local has two domain controllers). All servers run Microsoft Windows Server 2003, Enterprise Edition. All client computers run Windows XP, and Windows 7. Rosa Ruiz, director of technology at Blue Sky has asked you to design a networking infrastructure for the company. The requirements are: 1) Allocate IP addresses appropriately. Use the following table as your guide.

SUBNET 192.168.0.1

192.168.1.1 LOCATION Tucson

Phoenix Server Name BlueskyDNS1 BlueskyDNS2 BlueskyData BlueskyPhoenix Server IP 192.168.0.2 192.168.0.2 192.168.0.3 192.168.1.2 ROUTER IP 192.168.0.1

192.168.1.1 BEGINNING IP 192.168.0.25

192.168.1.25 ENDING IP 192.168.0.254

192.168.1.254

2) All clients should obtain IP addresses automatically.

3) All workstations and servers need name resolution capabilities for the intranet and the Internet.

4) BlueskyDNS1 holds the primary DNS zone for the bluesky.local network and is used for name resolution internally and externally.

5) BlueskyDNS1 is the forest root and the DHCP server for the Tucson location.

6) BlueskyDNS2 is a DC for the network and the secondary DNS server for bluesky.local.

7) BlueskyPhoenix is the DC, file server, print server, DNS and DHCP server for the Phoenix location.

8) Both sites are connected via a VPN connection between the routers. The VPN is used for replication traffic between the sites.

Requirements

1. Plan for Windows Server deployment to meet the Bluesky business goals

2. Manage and secure Windows infrastructure to satisfy Bluesky business requirements

3. Implement IT business continuity by monitoring and maintaining the Bluesky Windows 2008 Server environment

4. Plan for application and data provisioning to achieve high availability

Windows Server Deployment Proposal Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario. The proposal will include deployment, security policy, application and data provisioning, monitoring, and continuity plans. It should be at least 1,000 words. Diagrams, answer files, log files, and other attachments will not count toward the word count.

Your proposal may be based on one of two possible designs:

1. A parallel network installation deploying new hardware and/or virtualization is used to replace the existing infrastructure. The existing network is left in place until a time that the network is no longer needed.

2. All proposals should have the following services and server roles present. a. DNS b. DHCP c. WSUS d. AD e. Security policy f. Auditing g. Backup and recovery h. Continuity planning

3. Your proposal should begin with an executive summary of the proposed Server 2008 deployment. For BlueSky Systems.

4. Your responsibilities for the server deployment begins at the clients demark. No changes to the router or VPN connections are needed.

Reference no: EM13462049

Questions Cloud

You are a private computer consultant and a new client has : you are a private computer consultant and a new client has approached you about upgrading his small business network.
List and briefly discuss the four stages of consumer buying : list and briefly discuss the four stages of consumer buying decision process.how might a manufacturer of automatic
Gem infosys a small software company has decided to better : gem infosys a small software company has decided to better secure its computer systems after a malware attack shut
How can individuals most effectively mitigate potential : social categorization as a mental shortcut can be relatively simple and it can be harmful if individuals do not
Manage and secure windows infrastructure to satisfy bluesky : to improve efficiency in its current infrastructure blue sky systems decided to upgrade their current infrastructure of
Include a cover page containing the title of the : you have been tasked with building a payroll program for a large organization with offices spread across the united
It is widely known that knowledge management systems are : it is widely known that knowledge management systems are the key to success in multinational companies. imagine that
How is a field name qualified how is this used when using a : sql built-in functionsanswer the following questions1. what is the simplest sql retrieval?2. what is the purpose of the
Recognize the major issues of concern to voters and compare : despite commonly held beliefs about the popularity of presidents presidents are elected by the electoral college. this

Reviews

Write a Review

Computer Engineering Questions & Answers

  Computer forensics investigation

As a new computer forensics investigator and as a matter of the forensics policy and procedure, you will require to understand the procedures for processing incident scene for the digital and the logical evidence.

  Why is the documentation plan important

What are three essential system components that may be used to devise an implementation strategy in your workplace.

  Explain java programming with commented code

Java Programming with Commented Code, A marketing research company has hired you to develop a program. Analytics Nation, Inc. has gathered information from about five different products. They would like to follow up with 1% of these households.

  Which sort of graphic is the right choice, vector or bitmap

When your boss or client hands you a job, how would you make the determination which type of graphic is the right choice, Vector or Bitmap, in your response, define what parameter you would use and what variable you would have to weigh in your dec..

  Provide the menu interface to get to all the rest

Square foot to acreage and acreage to square foot conversion, this function must take a numeric value and an alphabetic value and convert from one to the other. use calculations in square footage for final pricing.

  Give description of the network design plan

For the equipment price list, make up price list based on fair market value for each peice of equipment. Do the same for the labor costs.

  Study on distributed system architectures

We have learned a lot in 15 years. We now know that we need to revisit Deutch's list. We are savvier on what it takes to implement a distributed system. Distributed System Architecture.

  Listing the values that have been inserted

Write down a Java program that loads 12 random integers with the values between 1 and 100 into a tree. Apart from building the tree.

  Ai and intelligent agents supporting knowledge management

Explain how the AI and intelligent agents provide support to the knowledge management. Explain it in the 1 paragraph with source.

  How many fragments are generated

Consider sending a 4800-byte IP datagram into a link that has an MTU of 820 bytes.

  You have been asked to be the project manager for the

you have been asked to be the project manager for the development of an information technology it project. the system

  What will be the list assumptions for the scope of project

What will be the list assumptions for the scope of project? Give detailed and measurable non functional requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd