Designing A Linux Implementation Proposal For The Company Linx, Llc

Great Essays
Introduction
I will be writing a Linux Implementation Proposal for the company Linx, LLC. This company has a new research and development group named LSDG. All the systems in the group LSDG will be running the Red Hat Linux operating system. These systems will access and share resources with the existing hardware in place. The existing hardware that Linx, LLC has implemented is a Microsoft active directory domain which contains numerous Windows Server 2012 R2 servers running services like DNS, DHCP, web services, printing and file services for the staff at Linx, LLC. The company overall has about 500 clients that run a mix of Windows 7 and Windows XP configurations. This proposal’s main objective is to replace every Windows XP system with a Linux variant. The Variant I have chosen to replace the Windows XP systems will be Red Hat.

Migration and installation of Red Hat Linux
The Red Hat Linux team has made it super easy for system administrators that have no Linux experience to install or migrate the systems to Red Hat from Windows. The systems that Linx, LLC wants us to update have an Intel Core 2 processor, 2GB RAM and an 80GB hard drive already installed. The Red Hat Enterprise operating system. requires that the hardware meets the following requirements before installing. The CPU should be a Pentium 4 or higher and should be at least 2GHz or higher, 1GB minimum of RAM and 4GB minimum for the hard drive. (Nwosu, 2010) The current Window XP system will be able to run the

Related Documents

  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    The Datacenter edition licenses a company to create multiple virtual instances of the on a single device [51]. The first virtual machine will be configured as a Domain Controller (DC). The DC is responsible for access control to all services for all users in the domain, and establishes the security policies followed by all users and devices joined to the domain. All other services not required for the server to perform as the DC will be disabled in order to reduce the server’s attack surface. b) Network Access Control (NAC): Company workstations and devices must have appropriate software, patches, updates and current AV definitions before being allowed to connect to the network.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    For the servers we are recommending that they use the Cisco UCS B230 M2 Blade server, this server is a well-rounded product that features an Intel Xeon E7-2800/8800 processor and can be used with multiple operating systems such as vSphere, Windows 2008R2, 2012, 2012 R2, Linux, and Solaris among others. We are recommending that all servers use Windows Server 2008 R2. The Cisco UCS B230 M2…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Windows 2000 has been out of extended support since 2010 (Short, 2009), as such this operating system puts the company at significant risk. Migrating the infrastructure to 2012 R2 will mitigate vulnerabilities introduced by older operating systems, and enable new capabilities within the infrastructure. Migration Strategy Based on the existing infrastructure there is an opportunity for consolidation, and optimization. There are currently ten DHCP servers, two file servers, and four print servers.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I would suggest to have a windows server 2012 enterprise Depending on the size of the company a minimum of 3 TB of space on raid 10. Use the main server as a host and deploy at least 2…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 4 Paper

    • 551 Words
    • 3 Pages

    The services will be configured and adapted for the development of virtual lab realizations. Therefore, they will be installed as separate components, embedded in other end user tools or centrally used as web services. The communication with other component are developed through various protocols/API, whereas with web services strictly using REST API. Regardless of the underlying communication protocols used, a coherent higher level API are uniformly defined and supported by all…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Software Management, Linux on Your System #2 This week’s critical thinking assignment explores the software and process management capabilities incorporated in the current release of the Fedora operating system. To do this, multiple commands will be used such as rpm, yum, and wget, along with documentation of the install process. Finally, the kill and ps commands will also be used to view and manage running processes on the server.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Software Now that we have explored the hardware components of the Symitar Episys system we will explore the software programs of Symitar and how it is used for Advia Credit Union. Information about the functions and software were gathered from several resources at Advia Credit Union. Eric Sheldon, Symitar core administrator for Advia Credit Union provided the following insight on the core application. Symitar uses both Java programming and a proprietary programming called PowerOn.…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Assuming that 25% of the user population can eliminate one software application from a local hard drive to a central server and that the average application requires 20-80meg, than the organization can save significantly by deferring costly hard drive upgrades estimated at $500 per PC: 25% of users (625) x $500 per PC = $312,500 3. Software license compliance methodology. Organizations have not demonstrated a methodology to effectively manage software licenses. The fines associated with each non-compliant event can be $100,000 to $250,000. In most large organizations, the value of mitigating the risk is measured in terms of a premium paid.…

    • 596 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction In 1999, Neil Davidson and Simon Galbraith founded Redgate, a software company, in Cambridge, United Kingdom. They founded the company with the goals of working together to do something that was self-satisfying and to make a technical contribution by creating software tools (Chapman, 2013). The name Redgate was named after the street in Florence, Italy, Via Porta Rossa, where Neil Davidson once lived in (Red Gate Software Ltd, 2016). Redgate kick-started the company by producing their first software tool, Aardvark, a bug tracker and then moved on to developing other products like SQL and .NET…

    • 2049 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    This project’s goal was to see if the application integration can be used to compile the various types of applications together, such as legacy systems, e-business solutions, databases and ERP applications. The downside of the project was that the IT department spent 60% of total pilot implementation time on system’s design and 40% on system’s development. It took a long time as a number of systems have to be changed or phased out to support an integrated process. Also, it was difficult to collaborate to automate and redesign the…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Perfect Pizza, Inc.

    • 1254 Words
    • 6 Pages

    It is a very effective tool for long term planning and trouble shooting. This study should most essentially support the financial information of an organization. It helps organizations to determine whether the technical resources meet capacity and whether the team is capable of translating the ideas into working systems. Technical feasibility also involves evaluation of the hardware, software, and other technology requirements of the proposed system. Operational Feasibility:…

    • 1254 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays