Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cmit 370 windows network proposal

29/10/2021 Client: muhammad11 Deadline: 2 Day

Correction

Introduction

Fixing Windows LLC is taking steps towards having a technology solution capable of effectively supporting its growing operations. Windows Server 2016 is only succeeded by one generation of the server releases, placing it as a modern solution for organizations that choose to embrace it, and provides solutions that meet the needs of the company. Fixing Windows LLC doesn’t have to worry about implementing different solutions for its different offices, with this solution capable of being effectively deployed to serve these multiple locations.

Active Directory

At both the Dallas and Houston offices will be an active directory forest, and each of them will contain the domain, application, and group policy and configuration data and will operate independently of each other as users will not be capable of accessing the other forest. Each of the active directory forests will consist of domain controllers that will be constantly exchanging files among each other. To determine the extensibility of the system, tasks like data replication will happen within these active directory forests. There will be around six or so domain controllers in an active directory forest and these will be responsible for supporting administrative activities for Fixing Windows LLC. Comment by Serhiy Kuzhanov: This is against every Microsoft best practice Comment by Serhiy Kuzhanov: What files do domain controllers need to exchange and why?

The main domain controller of the company will be located at the Houston offices, with Dallas also being capable of hosting the controller. However, for redundancy purposes, there will also be a read-only domain controller that will be installed at the Los Angeles offices, with backup solutions. As a read-only setup, the Los Angeles domain controller will not be likely to threaten the security of the man controller in Houston. The Los Angeles office will be a sales office, with a small staff and as such will need minimal technical support compared to the Dallas and Houston offices. These offices, given their relatively large sizes in terms of personnel and operations, will be from where the active directory will be managed. With different departments and the employees conducting different roles and responsibilities within the organization, organizational units will be established, with each unit for each of the various departments, and each of them operating independently. User profiles along with their permissions, system privileges and access controls will be managed within these organizational units, ensuring that each of the units is responsible for setting up the credentials for users under them and that the access controls granted to the user are within the limits of the user’s duties. For tracking and auditing purposes, there will be the flexible single master on (FSMO) roles that will be installed on a small number of stations, with the roles ending up on domain controllers from where other stations will access to get a given role (Palmer, 2017). Comment by Serhiy Kuzhanov: If you have two forests, how can you have one mail domain controller? You will at least have two main domain controllers – one for each forest. And how can you say that Dallas is capable of hosting a domain controller if you already said that you will deploy an independent forest at that site, so it MUST include a domain controller

Group Policy

The system administrators of Fixing Windows LLC will use Group Policy to establish user and machine configurations, with settings like determining the limit of user’s failed login attempts before they are locked out of the system, to the deployment of applications. The Group Policy settings are applicable to all levels within the active directory, including the domain, organizational unit, to a site computer. The policy settings can be edited and managed through the Microsoft Management Console or through the PowerShell. The Group Policy Object Editor is responsible for managing the various group policies and is located under the management console and the administrator has the option of browsing the various policies and subsequently making a selection. PowerShell could also be used to make edits to group policies, with a module dedicated solely to the management of group policies, which will however only be available at the Houston office which has been configured as the domain controller (Palmer, 2017).

Group Policy allows for application deployment either through publishing or assigning. Deployment through assigning happens when the particular application can be accessed by users and other workstations. From any of the company’s workstation, the employees of Fixing Windows LLC will be capable of accessing any application that had been deployed by way of assigning. It is a cheap way of deploying applications and will ensure that employees have easy access to basic and essential applications they require to complete their responsibilities. When an application has been deployed via publishing, then the application will only be available to the users, where instead of it being installed within the computer, will be tied to a particular user. Whenever a user needs to access the application, they will log onto any computer and will then be prompted to install the application, which will then be uninstalled when they log off. It is a useful solution when there is a need to restrict the access to certain applications to specific users within the organization. Publishing will then become a part of the company’s data security efforts as it will place restrictions on access to sensitive applications and the data that come with them. The company has a number of trade secrets that it would prefer to be restricted to a few authorized individuals within the organization. Providing access to these applications via assigning would expose them to the risk of being accessed by unauthorized individuals, making publishing the most appropriate solution to maintain confidentiality (Krause, 2016).

Information security is important for any organization, and Fixing Windows LLC has been provided with Windows Firewall with Advanced Security, which is deployable under Group Policy settings. It is a capable tool that can be utilized to screen all traffic moving in and out of the system for potential threats. From the group policy settings, the administrator can also undertake user access control and determine the privileges that various users will be granted within the system. It should prevent unauthorized attempts to access or manipulate data in the system without the express authorization to do so, with any user that seeks such access needing to have been granted the right credentials (Krause, 2016).

DNS

DNS will be used to provide name resolution through the provision of temporary IP addresses to the TCP/IP and to DHCP for the provision of temporary IP addresses to client computers. The activities of DNS will be supported by three servers, with other backup servers that will be deployed to act as failover options in the event that the primary servers are down. The servers will be housed at both the Houston and Dallas offices with a DNS server at each of the offices. The servers will be installed and configured at these offices manually, ensuring there is a direct interaction between the technical team and the server for purposes of making any identification of potential issues with the servers and addressing them as soon as possible. The main server will be responsible for managing the addresses, hosting most of them, with any other addresses being hosted within the backup server. The main server will be the location from which clients will be provided with their IP addresses, with this continuing until such a point that the backup server will need to take over should the primary server experience failure. The backup server has been envisioned as the principal backup solution for the main server, containing similar data and capabilities and could hence easily take over for the main server in the event of failure (Thomas, 2017). Comment by Serhiy Kuzhanov: That is a function of DHCP

As the company seeks or more ways to remain up to date with emerging technology, it will be taking steps towards the use of mobile devices within the organization, which should mobility and allow for employees to access company technology resources even when away from the office. With mobile devices, it can happen much more efficiently, with the devices being highly portable while at the same time possessing capabilities for sophisticated functionalities. These devices will make use of two virtual servers deployed to utilize split DNS, with a much more simplified approach for the DNS namespace design (Palmer, 2017).

File Services

A file system will be installed within its own independent server and will be assigned a unique IP address. Users, on the other hand, will be provided with virtual drives they will use for individual tasks with shared drives deployed for hosting network files. The file server resource manager (FSRM) will be used to administer both the user and the shared drives, with a number of actions taken to ensure the efficient use of the available resources. Individual users will be allocated a limited space size within the drives assigned to them while the different departments given their varying needs will be allocated the space on a case by case basis to ensure each department to have the optimal space allocation for its operations. The same way, should any user or department require additional space, they will place requests for the same and further allocations will also happen on a case by case basis. However, the quota system will be strictly maintained, with an additional request for space needing to be done only at the utmost necessity, with users being more careful with the way they use up the space allocated to them. The administrator will, therefore, be responsible for both setting up and enforcing rules on effective space management within the system, making extensive use of the capabilities provided by the file server resource manager (FSRM). The File Classification Infrastructure (FCI) is a tool within the FSRM that can classify various file formats and subsequently used to restrict certain formats from being stored within the various allocated spaces, whether within individual user drives or the shared drives. As such, users will be prevented from storing certain files types within their drives to ensure they do not use up their allotted space for non-essential storage. The administrator will be alerted whenever a given user or department is close to depleting their allotted space. It should give the administrator to decide on how to handle the situation, which could include analyzing the user space for potential optimization leading to more space being freed up or seeking ways to provide the additional space. FCI could also be used to place encryption on certain files to restrict access to them as well as place expiry dates on other files and ensure they are deleted within a certain period of time. The latter could be a response to dealing with certain file types that are no longer of use to the organization and their effective disposal will lead to the availability of more space to be allocated to users and departments (Thomas, 2017).

With Distributed File Services (DFS) are DFS Replication and DFS Namespaces, providing the availability of a common directory to users. With DFS Replication, there is the capability to conduct folder replication across multiple sites and multiple servers, and do with efficiency. To make effective use of the available space, file compression algorithms are used on files, leaving more space available for further utilization in future. An effective compression method used will be the remote differential compression which instead of making replications of an entire file, will instead seek out the modification that was made to it and retain those modifications. Such an approach should avoid unnecessary redundancies and lead to appropriate use of space. DFS Namespaces provide an administrator with a virtual view of shared folders that have hosted within different servers and consists of a single root that has multiple other targets and links. Multiple root targets can be mapped from a single root, and users are able to view a namespace as a single folder containing multiple subfolders within it. It is a quite effective solution for when data is spread out across multiple servers, making tedious for users to access the different servers individually to access the data. Instead, users get a streamlined solution where all these servers can be viewed as a single folder known as the namespace and allowing for easier conducting of tasks by viewing multiple folders from different servers from a single location (Palmer, 2017).

Remote Services

The remote server access role can be implemented with three role services namely Direct Access, Web Application Proxy and Routing and Remote Access. Remote access provides centralized administration and the monitoring and tracking of Direct Access and Routing and Remote Access Service, which can be deployed on one Edge server. The management of these technologies can be conducted via both Remote Access Microsoft Management Console as well as on the Windows PowerShell. Direct Access provides users with remote access capabilities to applications as well as other shared resources that are located within a restricted internal network, providing such access without the user having to resort to a virtual private network (VPN). Direct Access will launch a connection with another within the network that has been enabled for Direct Access and establishes a two-way connection via the internet, doing away with the need of the remote users to first access the company’s internal network. The system administrator will have their capabilities and reach expanded as they will be able to conduct remote administration tasks without necessarily having to use a virtual private network to achieve that (Krause, 2016).

With an office located thousands of miles away in Los Angeles from the Texas offices, the employees in Los Angeles should easily access the resources within the Houston and even the Dallas offices. This will, however, require that there be a reliable WAN internet connect since the Direct Access remote capabilities will require reliable internet service to successful establish remote access. The system administrators will also benefit, allow for seamless connection to all of the company’ technology resources via an efficient solution (Thomas, 2017).

Windows Server Update Service (WSUS)

The Windows Server Update Service (WSUS) streamlines the capabilities of the administrators to conduct management and distribution of updates to the system via the central management console. Known as an update source, the server responsible will be connected to Microsoft Update, from where it will be getting regular information on available and upcoming updates. The administrator will have the choice of making further additions to the servers in a bid to improve their capabilities. With Windows Server Update Service, Fixing Windows LLC will have streamlined the update management tasks for the whole system by having them done from a centralized console, allowing for a comprehensive view of the system. An automated solution will ensure updates still happen even if the administrators forget to make themselves. The Windows PowerShell enhanced capabilities will extend to the management of The Windows Server Update Service (WSUS) (Krause, 2016).

Summary

The Windows Server 2016 was released with many more features, some new and some Justas they were in the previous iteration as well as many improvements. Fixing Windows LLC has thus being provided with the requisite tools and capabilities that will allow it to continue growing its operations with the right technological tools.

Appendix

Direct Access communication between two sites

C:\Users\Bones\Documents\Mark\Phone\msc\DirectAccess_Wide_Area_Deployment.png

References

Krause, J. (2016). Mastering Windows Server 2016. Packt Publishing Ltd.

Palmer, M. (2017). Hands-On Microsoft Windows Server 2016. Cengage Learning.

Thomas, O. (2017). Windows Server 2016 Inside Out (includes Current Book Service). Microsoft Press.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Smart Homework Helper
Coursework Helper
Math Specialist
Coursework Help Online
Essay & Assignment Help
Financial Assignments
Writer Writer Name Offer Chat
Smart Homework Helper

ONLINE

Smart Homework Helper

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$17 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$47 Chat With Writer
Math Specialist

ONLINE

Math Specialist

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$21 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$40 Chat With Writer
Essay & Assignment Help

ONLINE

Essay & Assignment Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$48 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$49 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to enter global configuration mode in packet tracer - Assignment - Assignment - Search - Silver carbonate on heating gives - SOCW6510 - Advance Pharmacology - Uoa commerce degree planner - Due Sunday by 1 pm - How to write a rebuttal in a persuasive essay - Ebooknews simonandschuster - Common sense in japanese - 1600 words due 9/28/2020- Public and community health impact of driving under the influence of alcohol - Peak by roland smith - Transactional model of communication example - Ups mission statement 2018 - Another word for leach - Round robin average waiting time - Alis kebab house littleport - Pearson business statistics answer key - How do hot packs work - Case study examples of transference and countertransference - Future of Informatics - Aston hall by candlelight - Advocacy Through Legislation - Conchita keena in mexico 2002 - The level of various substances in the blood - Class in america gregory mantsios analysis - Estimate of true proportion - Ikea ps 2014 corner easy chair with cushions - Ohio christian university human resources - Solve 4y 1 2y 8 - Business help needed to make power point - Ghi hmo with carveout rider - Research Paper Big Data and Business Intelligence - Organizational values presentation gcu - Cvp graph break even point - Economic assignment - Does nike use fifo or lifo - I wandered lonely as a cloud worksheet - Ksp for calcium hydroxide lab - Satellite ground station block diagram - Database redesign is fairly easy when ________ - Boy at the window poem analysis - Solucion caso harvard ceres gardening company - Discussion Qstn AC - Week 8 IEP - Strayer university cedar hill tx - Gradualism vs punctuated equilibrium - Film study worksheet for a work of historical fiction answers - MGT 3121 Business Report - What makes posters effective - Smileline inc has an onsite daycare facility - Calculate upper control limit in excel - Labor Relations - NRS-410V-0L191 Pathophisiology and Nursing Management of Client Health. - Math 221 statistics for decision making week 4 ilab - Project in Artificial intelligence - Practical applications in sports nutrition 3rd edition pdf - Cook the longest memory - Definition of the word fatigue - Week 6 Simulation report - Backstage department crossword clue - Accounts clerk job description - Genesis 21 commentary david guzik - 3.4 Assignment: Turnitin-Ethical Dilemmas - Cadbury dairy milk easter bunny 250g - Koondoola child development centre - What is cross cutting symptom measure - Between 1879 and 1880, an estimated 40,000-60,000 african-americans migrated to - One night the moon language identity and culture - Discussion Board Replies - Mathematics for machine technology 6th edition answer key - Working with children check qld - Millward brown digital google vehicle shopper path to purchase study - Speech 1311 Chapter 5: Discussion Board and Reply to a Classmate - Target segment of coca cola - Ionic equation for cocl2 na2co3 - 1.97 miles in km - Carl eugene watts childhood - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - How to make a rectangle with tangrams - Statistic - 360 tomahawk dr maumee oh 43537 - We're going on a bear hunt costume - The drawing shows three point charges fixed in place - How to draw activity on arrow network diagram - Research project - Cleveland clinic growth strategy 2012 - Epq examples aqa medicine - Equations - Health Policy Analysis Paper - Human population growth most closely resembles - Electric field hockey activity answers - Cb enterprise response sensor - Mirror and lens ray diagram worksheet - TCOM_5403 - Hendrich ii fall risk model form - Gregg shields rv haulers - Bsbmgt616 develop and implement strategic plans answers