Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Windows network proposal networking

06/01/2021 Client: saad24vbs Deadline: 7 Days

Running Head: WINDOWS NETWORK PROPOSAL


WINDOWS NETWORK PROPOSAL 11


Windows Network Proposal - Networking


Ademola Adebisi


Serhiy Kuzhanov


CMIT 370


03/01/19


Introduction


Fixing Windows LLC is taking steps towards having a technology solution capable of effectively supporting its growing operations. Windows Server 2016 is only succeeded by one generation of the server releases, placing it as a modern solution for organizations that choose to embrace it, and provides solutions that meet the needs of the company. Fixing Windows LLC doesn’t have to worry about implementing different solutions for its different offices, with this solution capable of being effectively deployed to serve these multiple locations.


Active Directory


At both the Dallas and Houston offices will be an active directory forest, and each of them will contain the domain, application, and group policy and configuration data and will operate independently of each other as users will not be capable of accessing the other forest. Each of the active directory forests will consist of domain controllers that will be constantly exchanging files among each other. To determine the extensibility of the system, tasks like data replication will happen within these active directory forests. There will be around six or so domain controllers in an active directory forest and these will be responsible for supporting administrative activities for Fixing Windows LLC. Comment by Serhiy Kuzhanov: This is against every Microsoft best practice Comment by Serhiy Kuzhanov: What files do domain controllers need to exchange and why?


The main domain controller of the company will be located at the Houston offices, with Dallas also being capable of hosting the controller. However, for redundancy purposes, there will also be a read-only domain controller that will be installed at the Los Angeles offices, with backup solutions. As a read-only setup, the Los Angeles domain controller will not be likely to threaten the security of the man controller in Houston. The Los Angeles office will be a sales office, with a small staff and as such will need minimal technical support compared to the Dallas and Houston offices. These offices, given their relatively large sizes in terms of personnel and operations, will be from where the active directory will be managed. With different departments and the employees conducting different roles and responsibilities within the organization, organizational units will be established, with each unit for each of the various departments, and each of them operating independently. User profiles along with their permissions, system privileges and access controls will be managed within these organizational units, ensuring that each of the units is responsible for setting up the credentials for users under them and that the access controls granted to the user are within the limits of the user’s duties. For tracking and auditing purposes, there will be the flexible single master on (FSMO) roles that will be installed on a small number of stations, with the roles ending up on domain controllers from where other stations will access to get a given role (Palmer, 2017). Comment by Serhiy Kuzhanov: If you have two forests, how can you have one mail domain controller? You will at least have two main domain controllers – one for each forest. And how can you say that Dallas is capable of hosting a domain controller if you already said that you will deploy an independent forest at that site, so it MUST include a domain controller


Group Policy


The system administrators of Fixing Windows LLC will use Group Policy to establish user and machine configurations, with settings like determining the limit of user’s failed login attempts before they are locked out of the system, to the deployment of applications. The Group Policy settings are applicable to all levels within the active directory, including the domain, organizational unit, to a site computer. The policy settings can be edited and managed through the Microsoft Management Console or through the PowerShell. The Group Policy Object Editor is responsible for managing the various group policies and is located under the management console and the administrator has the option of browsing the various policies and subsequently making a selection. PowerShell could also be used to make edits to group policies, with a module dedicated solely to the management of group policies, which will however only be available at the Houston office which has been configured as the domain controller (Palmer, 2017).


Group Policy allows for application deployment either through publishing or assigning. Deployment through assigning happens when the particular application can be accessed by users and other workstations. From any of the company’s workstation, the employees of Fixing Windows LLC will be capable of accessing any application that had been deployed by way of assigning. It is a cheap way of deploying applications and will ensure that employees have easy access to basic and essential applications they require to complete their responsibilities. When an application has been deployed via publishing, then the application will only be available to the users, where instead of it being installed within the computer, will be tied to a particular user. Whenever a user needs to access the application, they will log onto any computer and will then be prompted to install the application, which will then be uninstalled when they log off. It is a useful solution when there is a need to restrict the access to certain applications to specific users within the organization. Publishing will then become a part of the company’s data security efforts as it will place restrictions on access to sensitive applications and the data that come with them. The company has a number of trade secrets that it would prefer to be restricted to a few authorized individuals within the organization. Providing access to these applications via assigning would expose them to the risk of being accessed by unauthorized individuals, making publishing the most appropriate solution to maintain confidentiality (Krause, 2016).


Information security is important for any organization, and Fixing Windows LLC has been provided with Windows Firewall with Advanced Security, which is deployable under Group Policy settings. It is a capable tool that can be utilized to screen all traffic moving in and out of the system for potential threats. From the group policy settings, the administrator can also undertake user access control and determine the privileges that various users will be granted within the system. It should prevent unauthorized attempts to access or manipulate data in the system without the express authorization to do so, with any user that seeks such access needing to have been granted the right credentials (Krause, 2016).


DNS


DNS will be used to provide name resolution through the provision of temporary IP addresses to the TCP/IP and to DHCP for the provision of temporary IP addresses to client computers. The activities of DNS will be supported by three servers, with other backup servers that will be deployed to act as failover options in the event that the primary servers are down. The servers will be housed at both the Houston and Dallas offices with a DNS server at each of the offices. The servers will be installed and configured at these offices manually, ensuring there is a direct interaction between the technical team and the server for purposes of making any identification of potential issues with the servers and addressing them as soon as possible. The main server will be responsible for managing the addresses, hosting most of them, with any other addresses being hosted within the backup server. The main server will be the location from which clients will be provided with their IP addresses, with this continuing until such a point that the backup server will need to take over should the primary server experience failure. The backup server has been envisioned as the principal backup solution for the main server, containing similar data and capabilities and could hence easily take over for the main server in the event of failure (Thomas, 2017). Comment by Serhiy Kuzhanov: That is a function of DHCP


As the company seeks or more ways to remain up to date with emerging technology, it will be taking steps towards the use of mobile devices within the organization, which should mobility and allow for employees to access company technology resources even when away from the office. With mobile devices, it can happen much more efficiently, with the devices being highly portable while at the same time possessing capabilities for sophisticated functionalities. These devices will make use of two virtual servers deployed to utilize split DNS, with a much more simplified approach for the DNS namespace design (Palmer, 2017).


File Services


A file system will be installed within its own independent server and will be assigned a unique IP address. Users, on the other hand, will be provided with virtual drives they will use for individual tasks with shared drives deployed for hosting network files. The file server resource manager (FSRM) will be used to administer both the user and the shared drives, with a number of actions taken to ensure the efficient use of the available resources. Individual users will be allocated a limited space size within the drives assigned to them while the different departments given their varying needs will be allocated the space on a case by case basis to ensure each department to have the optimal space allocation for its operations. The same way, should any user or department require additional space, they will place requests for the same and further allocations will also happen on a case by case basis. However, the quota system will be strictly maintained, with an additional request for space needing to be done only at the utmost necessity, with users being more careful with the way they use up the space allocated to them. The administrator will, therefore, be responsible for both setting up and enforcing rules on effective space management within the system, making extensive use of the capabilities provided by the file server resource manager (FSRM). The File Classification Infrastructure (FCI) is a tool within the FSRM that can classify various file formats and subsequently used to restrict certain formats from being stored within the various allocated spaces, whether within individual user drives or the shared drives. As such, users will be prevented from storing certain files types within their drives to ensure they do not use up their allotted space for non-essential storage. The administrator will be alerted whenever a given user or department is close to depleting their allotted space. It should give the administrator to decide on how to handle the situation, which could include analyzing the user space for potential optimization leading to more space being freed up or seeking ways to provide the additional space. FCI could also be used to place encryption on certain files to restrict access to them as well as place expiry dates on other files and ensure they are deleted within a certain period of time. The latter could be a response to dealing with certain file types that are no longer of use to the organization and their effective disposal will lead to the availability of more space to be allocated to users and departments (Thomas, 2017).


With Distributed File Services (DFS) are DFS Replication and DFS Namespaces, providing the availability of a common directory to users. With DFS Replication, there is the capability to conduct folder replication across multiple sites and multiple servers, and do with efficiency. To make effective use of the available space, file compression algorithms are used on files, leaving more space available for further utilization in future. An effective compression method used will be the remote differential compression which instead of making replications of an entire file, will instead seek out the modification that was made to it and retain those modifications. Such an approach should avoid unnecessary redundancies and lead to appropriate use of space. DFS Namespaces provide an administrator with a virtual view of shared folders that have hosted within different servers and consists of a single root that has multiple other targets and links. Multiple root targets can be mapped from a single root, and users are able to view a namespace as a single folder containing multiple subfolders within it. It is a quite effective solution for when data is spread out across multiple servers, making tedious for users to access the different servers individually to access the data. Instead, users get a streamlined solution where all these servers can be viewed as a single folder known as the namespace and allowing for easier conducting of tasks by viewing multiple folders from different servers from a single location (Palmer, 2017).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Homework Guru
Helping Hand
Top Essay Tutor
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$62 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

University of bath campus map - Mystic monk coffee case pdf - One strategy for managing debilitative communication apprehension is to - Nature org greenliving carbon calculator - Calculate floor load width - Sodium borohydride reduction of 2 methylcyclohexanone - How to calculate mirr using financial calculator - Post a description of at least one potential benefit of using big data as part of a clinical system and explain why. - To many the word management suggests 1 - 3sco cipd - Acf v minister for resources - Earth layers model ideas - Alpha beta charlie delta echo - Kenneth w graves 87 tcm 1409 tc memo 2004 140 - Washburn Guitars: Pricing Decisions and Diversity - Www turtlebeach com warranty - Hplc analysis of aspirin lab - Abbreviated electron configuration iridium - Sky chefs inc prepares in flight meals 4000 - Unit VI Assessment, Unit VII Case StudyCollective Bargaining - Hr - Common motifs in literature - Young chan wing yan - Respond to the following in one page - Walden university dissertation prospectus template - Research paper - Emerging Threats counterness - Bill of sale as is no warranty - 978 1 259 29061 9 - Script of the movie titanic - Play script writing format - Which philosopher proposed that nerve pathways allowed for reflexes - Objective section of soap note - Bunsen burner scientific drawing - Tom sawyer characters pictures - 221 mill street lake wendouree - Kotter 8 steps to change - Usc health sciences campus map - What does ethics mean in criminal justice - Answer a questions - Fireeye nx 4400 datasheet - Love vashikaran specialist In kOlkAtA [#+91 9928097710 #]\Top And Best Tantrik Aghori Baba - Here is the summary of our meeting - Why is kevlar so strong chemistry - Certificate iv in compliance and risk management - Mcgraw hill chapter 10 answers - MONOLOGO EN PRIMERA PERSONA TEMA : ASTRONOMIA EN EGIPTO - Sociology (Need within 24 hours) - Trinity mature student application - Download adobe dynamic stamps - How to write a soap note for nurse practitioners - National dish in italy - Recapitulación leccion 3 - Health Assessment Topic Reflection 3( Pulmonary, Cardiac, Peripheral Vascular, and Lymphatic Systems) - Human culture and expression - A rulebook for arguments fourth edition pdf - Pamela hays addressing framework - Java codes - Clinic 16 royal north shore - Express and implied authority - A ucla researcher claims that the life span - Case 7.1 tires for you inc - Below are incomplete financial statements for cyclone inc - Database - chain - 978 0 13 312747 8 - Bettini v gye 1876 case summary - Autocad lt 2013 price - Where do sheldon and leonard live in pasadena - Human Needs Theory and Psychosexual Theory - Bacterial and fungal amylase lab report - Fm 10 67 2 - Scientific method terms worksheet - English writing practical - Mye application form for construction - 149-169 barries road melton - Raging bull oscar winner crossword - Stephen covey seek first to understand - Cadbury dairy milk easter bunny 250g - Short answer - The piano lesson analysis - Physical review letters abbreviation - She's dating the gangster moral lesson - Gateshead gov uk building development planning applications - Week 3 Discussion -2 Business Intelligence - Flextronics case study - Disaster Planning for Public Health - Excel wbs formula - Full time equivalent formula excel - Los baker van a peru sparknotes - Does gatorade conduct electricity - Access control walk through checklist - Alinco dx 70th review - Hope against hope sarah carr - Fenner dunlop engineered conveyor solutions - Social integration and influence in group dynamics - Negligent Tort Liability - Cash drawer breakdown calculator - Rl circuit lab report - Prevention - Sodium hydroxide potassium hydrogen phthalate