Paper on windows server infrastructure upgrade and redesign

Assignment Help Computer Engineering
Reference no: EM131061988

Write a Proposal paper about Windows Server Infrastructure Upgrade and Redesign at EchoSoft.

Required Proposal Responses

Executive Overview - Provide an executive overview for Infrastructure proposal. How will your proposal help EchoSoft? What are the key aspects of your design? Why should EchoSoft select your proposal over your competitors' proposals?

Develop a Windows Deployment Design and plan an automated client workstation and server installation strategy. This objective can include but is not limited to: images and bare metal/virtual deployment; plan for multicast deployment and plan for Windows Deployment Services (WDS). This solution should enable EchoSoft to deploy client and server operating systems in a timely and cost-effective manner.

Plan and deploy Virtual Machine Manager Services. This objective may include but is not limited to: Design Virtual Machine Manager service templates; plan and deploy profiles including operating system profiles, hardware and capability profiles, application profiles, plan and manage services including scaling out, updating, and servicing services; configure Virtual Machine Manager libraries. This solution should enable EchoSoft to deploy servers in a timely and cost-effective manner.

Windows Server Design - Vienna has two Domain Controllers. All other locations have single Domain Controllers. Vienna's domain controllers are running Windows Server 2012, but the other sites are running Windows Server 2008 Domain Controllers. All other services on the network are running on either older UNIX or Windows Server 2008 and 2003 servers. These legacy servers should be replaced as part of this project. Describe your recommendations for the server environment, focusing on any needed upgrades and the number of servers needed at each location to handle key network infrastructure services and roles (DNS, DHCP, File, Print, RRAS, etc.) You can make any recommendation for the server environment but explain how it will benefit your design.

Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution. This objective may include but is not limited to the following: Design considerations including a highly available DHCP solution including split scope, DHCP failover, and DHCP failover clustering, DHCP interoperability, and DHCP filtering. Describe how you will provide fault tolerance in the event that a primary DHCP server should fail. How will you handle remote users, network devices and printers?

DNS - Design a name resolution strategy. This objective may include but is not limited to: Design considerations, including Active Directory-integrated zones, DNSSEC, DNS Socket Pool, cache locking, disjoint namespaces, DNS interoperability, Single-Label DNS Name Resolution, zone hierarchy, and zone delegation.

Implement a scalable Remote Access solution. This objective may include but is not limited to: Configure site-to-site VPN; configure packet filters; implement packet tracing; implement multisite Remote Access and a DirectAccess solution.

Design an Active Directory topology. This objective may include but is not limited to: Design considerations including read-only domain controllers (RODCs), proximity of domain controllers, replication optimization, and site link; Group Policy, monitor and resolve Active Directory replication conflicts.

Your proposal must incorporate the following items

1. All Domain Controllers must be Windows 2012 2R2 Active Directory.

2. All sites must have Active Directory services available even if a single Domain Controller fails.

3. Client IP address assignment must be automated and manageable for all sites and locations.

4. DNS must be manageable and secure. Clients must be able to resolve DNS even if a single DNS server fails or during an internet connection outage.

5. DHCP should be designed with fault tolerance in mind.

6. Provide secure remote access solution that utilizes Network Access Policy controls.

7. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.

8. Provide easy and manageable server image and software deployments. All servers should be Windows Server 2012 R2.

9. EduTech and EchoSoft Active Directory forests must be able to trust each other.

10. The Austin location needs be integrated into the EchoSoft Active Directory. This solution must cost-effective, manageable and secure.

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 7 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

• At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.

• The submission must cover all of the major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the topics required, as well as a summary.

• At least two non-Lab, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it.

Reference no: EM131061988

Questions Cloud

Identify the types of variables : Identify the types of variables you would need to conduct a Chi-square (last name begins with A-H), one-sample t-test (last name begins with I-P) and paired t-test (last name begins with Q-Z.
The jury trial analogy : Sometimes, the outcome of a jury trial defies the "commonsense" expectations of the general public. Such a verdict is more acceptable if we understand that the jury trial of an accused murderer is analogous to the statistical hypothesis-testing pr..
Determine the force p required to start moving the beam : determine the force P required to start moving the beam.
Bar chart showing the amount of federal spending : Figure provides a bar chart showing the amount of federal spending for the years 2002 to 2008 (USA Today,February 5, 2008). a. What is the variable of interest?
Paper on windows server infrastructure upgrade and redesign : Write a Proposal paper about Windows Server Infrastructure Upgrade and Redesign at EchoSoft. Design and maintain a Dynamic Host Configuration Protocol (DHCP) solution.
Determine the required minimum coefficients of friction at a : If the wrench is to grip the pipe and be self-locking, determine the required minimum coefficients of friction at A and C.
Typical ranges of the women heights : Women's heights average 61 inches with a standard deviation of 2.8 inches in a certain study. Use the 68-95-99.7 rule to determine the typical ranges of the women's heights. In what range will approximately the middle 95% of the women's heights li..
Fiona stanley hospital : List briefly (1-2 sentences for each example) TWO (2) separate examples of either project management good-practice or problems within the case study for each of any FIVE (5) of the following nine (9) project management processes: Integration; Scop..
Determine the range of values of the magnitude p : In Prob. 8.30, determine the range of values of the magnitude P of the vertical force applied at E for which the plate will move downward.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd