Case Study Of ABC Company's Workgroup To Domain Transition

Superior Essays
ABC Company's Workgroup to Domain Transition
James M. Ghastin
ISSC340 Local Area Network Technologies
American Military University

Abstract
The ABC company has been doing extremely well in the app development market. Consumers are downloading the most recent game developed for Android phones at an extremely fast pace. With the success of both this year's game and last year's game, ABC company has had to hire new employees and expand. Part of this expansion, is the requirement to manage both users and equipment in a better way than the old model. Security for the network needs to be addressed as well as a better way for data to be shared and backed up. Software and operating systems need to be the same version so employees
…show more content…
Active Directory is a Windows Server service that holds a database of objects and manages different them; computers, users and groups as well as other servers and printers. This service can be used for a large number of functions and can solve many of the current networking problems. With Active Directory groups of users can have their logon passwords changed at one time or have specific requirements set for password length and complexity. Printers can be automatically assigned as well as mapped drives based off of specific groups created by an administrator. Firewall settings can be assigned per department/branch or can be setup for company wide policies. USB drives can be blocked and unauthorized access can be tracked. Files and folders can be stored on the server versus the users machine which would enable roaming profiles, the user would be able to login at any desk and have access to his or her data. The user would have one login which would give access to Windows as well as Email and other …show more content…
The other main cost will come from the antivirus software and server operating systems. The requested operating systems are Windows 7 and Windows Server 2008. Each group on the network will have specific applications that are requested and those will be stored on the application server and available to any group with the proper access. Licenses will be purchased for each user that requires access to keep costs lower. Using this method will enable users to have the most sought after software while keeping it only stored on one machine. The application server is also capable of doing the logic for the individual workstations. While this increases the load on the application server it decreases the cost of having each individual computer doing the processing and allows ABC company to buy cheaper workstations ultimately saving

Related Documents

  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    As well as paying for the system, investing in additional hardware and software will be necessary in order for it to work effectively. Furthermore, a formal report will need to be signed off to confirm that the manager is happy with the…

    • 577 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are: • Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Since samba domain controller is made specifically for safety, the chances of unauthorized access are significantly…

    • 484 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    A software program could be purchased which suits Atriums needs generically, or a software package could be customized by Atrium to suit its business needs. Either way, the last two options could also be web-based which opens up a lot of possibilities. Web-based solutions could be the smartest route as they are more scalable, which suits growing companies. b. What are the pros and cons of in-house development versus purchasing a…

    • 1517 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Case Study Analysis One: Managing Across Boundaries In January, 2002, Norma M. Riccucci published a case study titled Managing across Boundaries: A Case Study of Dr. Helene Gayle and the AIDS Epidemic. The case study follows the career and accomplishments of Dr. Helene D. Gayle in the field of public health and contagious sexually transmitted diseases. This case study analysis will focus on the main forces Dr. Gayle faced, how these forces were addressed, how the political resources of a public agency administrator were utilized, the means to which Dr. Gayle sought to overcome the coordination crisis, and Dr. Gayle’s overall leadership qualities (Riccucci, 2002). Dr. Helen Gayle is an accomplished, published, and revered doctor, researcher,…

    • 1033 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    They all have different applications and processes from all subsidiaries that are based in its region, and this solution can integrate them together. Therefore, it will be easier to maximize the performance of the integrated system in the business processes, including the functionality, ERP, and e-business applications. After the systems work out, the systems can be phased out and transferred to the regional ERP. This will benefit these three because the time will be reduced and the process will be so much easier than doing them one by one. Also, it is easier for the regional subsystems to integrate all applications since the systems can be customized automated and integrated with custom applications and e-business solutions.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Apple vs. Android If you’ve ever had any doubts regarding the demand for smart phones, research done by IDC states that the global smart phone market has topped 1 billion shipments, covering about one seventh of the world’s population, a new milestone. Most everyone can agree that smart phones are a familiar way of life, but the big debate is whether a user’s best option is to pick out an Apple or Android device. While both Android and Apple dish out portable technology that keeps us connected, they go about it in contrasting ways.…

    • 731 Words
    • 3 Pages
    Improved Essays