Nt1330 Unit 3 Assignment 1

Superior Essays
Introduction
The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.
The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).
…show more content…
Windows 2000 has been out of extended support since 2010 (Short, 2009), as such this operating system puts the company at significant risk. Migrating the infrastructure to 2012 R2 will mitigate vulnerabilities introduced by older operating systems, and enable new capabilities within the infrastructure.
Migration Strategy
Based on the existing infrastructure there is an opportunity for consolidation, and optimization. There are currently ten DHCP servers, two file servers, and four print servers. These servers will be migrated as virtual machines, and the number of DHCP servers will be reduced from ten, to five. There are nine DNS servers, which will be decommissioned and the hosted zones will be added to Active Directory as AD integrated DNS zones. The five AD servers should be sufficient enough to support the name resolution requirements of the organization. Figure 1. Server Migration

Related Documents

  • Improved Essays

    to use. These are designed for the typical users to complete normal work, normally in the school’s network they will have limitations on student accounts, for example, there are many sites that they cannot access, and their computer will only hold the essential applications (software), etc. It is very common to see Windows operating system installed in these workstations however they might not be up to date as it can be costly, hence they would use older versions of windows operating system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send the data packet to its destination, however it has very limited functions, it is more advanced than a hub, however it is less compared to a router.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Paper 1 – USF Infrastructure The video describes the core of the University of South Florida infrastructure that is two redundant devices that provides 100Gbps and 10Gbps connectivity to the distribution layer devices. Cat 5e or Cat 6 wires are used for connections throughout the campus. The computers are on the edge of the network meaning they are the closest to the user. The wires are connected to the network by a patch cord going into a wall outlet that then leads into a wiring closest that is call intermediate distribution frame or IDF, which serves as an aggregation point of the network.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Part of this expansion, is the requirement to manage both users and equipment in a better way than the old model. Security for the network needs to be addressed as well as a better way for data to be shared and backed up. Software and operating systems need to be the same version so employees…

    • 1339 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    It also is able to take advantage of a fully managed firewall solution, keeping hackers out of your network and your data safe at all times. You will also be able to take full advantage of completely managed servers that are housed at an offsite center. This provides the ultimate in security of all of your vital servers. In addition to computer tech support, you can take full advantage of remote management, hands-free off-site backup and continuous data protection, at an extremely low cost. You will be able to take advantage of tapeless backup systems, as well as a structurally sound and highly effective firewall, providing fast Internet connectivity and the elimination of a bottleneck.…

    • 535 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Wolftech Case Study

    • 1164 Words
    • 5 Pages

    a. Information Security Risk Assessment System for Wolftech The risk management is a process to identify risks within organization and to further manage the operations through putting up necessary controls in place. The further importance of risk assessment can be ascertained through fact that about 48% of the 283 companies have been victims of the computer crimes over 12 months’ period. In some other incident the internet worm affected the largest and complex network of computer in few hours.…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Computers have taken the world by storm. Thirty years ago, the idea of nearly every home having at least one computer was the stuff made of dreams. In the 1984 US Census it was reported that 8.4% of households had a computer in the home, with the Internet not even being a question asked. The 2012 US Census reports 78.9% of households have at least one computer, and 74.8% have Internet access! Nearly every industry in the United States is now utilizing computers in one way or another, with many having almost all of their business operations taking place online or through computer networks.…

    • 935 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The technological advent has influenced many changes in the organizational information technology setting with more advanced systems being implemented to curb the ever increasing cases of data loss and the invasion of privacy. A recent research has illustrated that the increment of members with advanced skills in the modern day society has increased the rate at which the cybercrime occurs hence prompting the development of higher level security which means that organizations also have had to change to advanced systems that offer better security to organizational data. Although in the past the networks have been essential in giving organizations a chance for computers to share devices such as printers the basic and main advantage of computer networks are sharing of information.…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cloud Migration Case Study

    • 1072 Words
    • 5 Pages

    Mk – Cloud Migration • Introduction/Background Based on the assignment case study, Amoria Bond has known to be the Recruiter FAST 50 list as a result of their rapid expansion. The company employed at least 90 members of staff spread across Manchester head office, London, Amsterdam, Cologne, and Singapore branch office. Due to the incredibly growth, currently the company is having too much strain placed upon the Manchester connections, and the current infrastructure offered little in terms of office resilience, redundancy, or availability. In order to solve the mentioned concern, it is considered to select a suitable cloud deployment model and a cloud service model to solve the four key areas of concern that that are of key importance for the company. By selecting the suitable cloud deployment model and cloud service model, private cloud model and infrastructure as a service model will be the best method to help Amoria Bond company.…

    • 1072 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    IT Security Policy Framework Darryl E. Gennie Professor Kevin Jayne Augusta CIS 462 26 July 2015 Strayer University For the healthcare insurance industry it is important to have an Information Security Policy Framework within the organization. This protects information that is accessed across the network by staff personnel and patients. ISO 27000 includes a series of international standards that provide a model for establishing, operating, maintaining, and improving an Information Security Management System (ISMS). ISO 27001 provides specific best practices for ISMS, which incorporate the information security requirements of many other regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    4.2 Social Sustainability Social sustainability encompasses the ability for wind technology to meet the present needs of the community as well as the ability to provide for future generations. The largest contributor to social sustainability with wind power is that it permits for energy independence. Energy independence allows for resource security within communities, removing the dependency for importing foreign oil or even coal. By limiting the dependency on oil, natural gas, and coal as energy sources, communities are more protected from the fluctuations of supply and demand that follow the non-renewable energy sources. Not only does the technology support resource security, it also plays an important role in maintaining, protecting,…

    • 1087 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 2049 Words
    • 9 Pages

    Each zone is constructed as virtual hierarchical that are geographic -specific. Each zone has a pre-defined number of nodes and a coordinator 〖C(i)〗_11^1to these nodes. The coordinator is assigned based on the proposed IHRW hashing algorithm, as illustrated in heuristic 3. Heuristic 3: The adaptive HRW protocol proposed in figure 5 is implemented in each level of the virtual hierarchical. Suppose the system contains n_od nodes that will be divided into number of Rendezvous geographic Zones (〖RG〗_Z) based on their geographic area.…

    • 2049 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    Customer care Internet interface increased productivity of call centre without increasing staff. Enterprise Network Services -1994 -1997 Implemented corporate Enterprise Network Services globally connected, Unix Continues software development code management system, Back Office administrative computing environment, DNS, NIS, NFS, and DHCP, all in a heterogeneous UNIX/MS computing environment. Global TCP/IP Frame-Relay Network - 1996 Implementation of global frame-relay IP network connecting 21 remote sales and development…

    • 1305 Words
    • 5 Pages
    Great Essays
  • Great Essays

    MSM Team Paper

    • 1460 Words
    • 6 Pages

    MSM Team’s Operational Technology Here at our work center the MSM team has several networks it must maintain. Most of the networks do not interact with each other so in order for the networks to operate correctly they must all have independently working parts. For example, we must have…

    • 1460 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Network Sentry Case

    • 1268 Words
    • 6 Pages

    1. How does this product/service answer the specific market need or application for which it was designed and is being nominated? Network Sentry dramatically reduces security event investigation time and speeds resolution. It logs 100% of actions taken by every endpoint, automates the collection of alerts and contextual data from multiple sources, then uses its two-stage correlation engine, to enhance the fidelity of alerts and increase the accuracy of event triage.…

    • 1268 Words
    • 6 Pages
    Improved Essays