Edudorm Facebook

370-Windows Network Proposal

370-Windows Network Proposal

Introduction

Crete LLC is one of the prime manufacturing companies located in the USA.  The corporation is involved primarily in the production as well as the distribution of Solar panels for the existing customer market. The corporation has three primary branches that are situated in Dallas, Los Angeles and Huston and it is making considerations on expansion to the rising demand for solar panels in its markets and beyond.  The prime management of the organization will situate management employees in both Dallas and Houston offices for effective management of operations.  In this context it is more likely for the corporation to highly benefit from the implementation of a robust 2012 windows server. In that, the corporation will be utilizing the features offered by the server on the subject of management and administration.  Data security is an important feature that is needed by the corporation in saving public reputation (Carpenter, 2011).

Windows server 2012 offers more features that will directly benefit the corporation by addressing its needs (Carpenter, 2011). The implementation will, therefore, offer the corporation with authoritative new opportunities that will be associated with agility, flexibility as well as success.  The serve is additional effective in cutting costs and it is more flexible since it will permit the corporation to move serves at ease without moving their physical structures or systems (Carpenter, 2011). The servers come with a large storage which will highly benefit the administration since the necessity to purchase SAN which is normally expensive will be eliminated.  The current network proposal is an analysis of server 2012 implementation at Crete LLC which will include a design for handling domains, data security, windows setting maintenance and remote offices access while simultaneously focusing on the objectives of the corporation.

Active Directory

Crete LLC has numerous sites which are located in a large and a beneficial geographic satiation.  The geographical location, therefore, necessitates the utilization of a regional model for domains.  Since the corporation has three locations this means that the domains will thus be broken into the working environment of the users in its three different branches.  From this it is clear that there will be three distinct domains which are a representation of Dallas, Houston and Los Angeles city.  The utilized strategy will, therefore, enhance the capability of maintaining regional administration that will be responsible only for the users within their location network (Finn, Lownds, Luescher, & Flynn, 2013).  With this deployment strategy it will challenge to develop decisions on the forest root domain which may create biases.  In order  to  increase fairness  of the developed  decisions the  corporation may  utilize a domain that  acts as the forest root which will only contain the administrators accounts without  representing the users. Other locations will therefore be selected as regional domain branches in the structures of domain. 

The root office, in this case, will be Houston administration office while LA and Dallas domains will remain to be regional branches.  This strategy will permit the corporation’s domain to acquire and sustain environmental stability in the long-term. In regard to the names of the domains, the Houston one will be regarded as Houston.crete.com, Dallas.crete.com for the domain in Dallas and LA.crete.com for the Los Angeles domain.  The regional domain allows the creation of a fresh forest domain each time after introduction of a fresh location thus permitting free flow of connection (Finn, Lownds, Luescher, & Flynn, 2013).

To allow the corporation in reducing its general cost WAN lines domains traffic will be reduced which will be attained through the utilization of the three locations as the controllers.  This will be useful in reducing the procedures of accessing the domains which will, in turn, play a part in the increase of productivity.  Since the primary offices of the corporation are situated in Houston and well as the office in Dallas the domain controller in LA will be a read only. This controller is beneficial to the company branches that necessitate reliable, speedy and vigorous clarification services.  The security necessity in the domains will be useful in the prevention of consumption of domain controller.  The Houston office will accommodate the prime controller domain with the utilization of an Access server Remote as the primary administrator of all the operations. For recovery as well as data backup a backup aspect is required from the Window’s server which should situate on and offsite or a more secure location site.  In order to avoid the occurrence of errors, data loss and misrepresentation backups should be conducted on an often basis to increase flexibility, accuracy and reliability (Finn, Lownds, Luescher, & Flynn, 2013). This will also be essential in offering protection to data which is highly needed by the corporation in attaining efficiency and a good image in its market and beyond which will facilitate its objective to expand (Finn, Lownds, Luescher, & Flynn, 2013).

Group Policy

A group policy is a crucial component that is required in enhancing the security of a network.  The accounts should have the ability to rename the administrator’s account for flexibility if any physical change is required in the three locations which can be achieved with the utilization of a GPO feature (Hester & Henley2013).  However, this feature is highly opposed by managers since it is termed to be providing better grounds for a win for the hackers (Hester & Henley2013). However, this strategy is not as vulnerable as it may seem since the corporation will install full security measures to ensure that the change of account name is accomplished by providing several personal and security details.  It will, therefore, be very hard to hackers to prosper since the information will only be available to those responsible.  Understanding the account's username does not solve the existing puzzles for the hackers.  In addition, guest accounts will be disabled since the accounts hold no feature for installation of security passwords.  The GPO strategy is additionally useful because it have the capability of blocking user’s passwords thus enhancing data protection (Hester & Henley2013).

The application of group policy permits administrators easy management of operations throughout their networks (Hester & Henley2013).  Crete LLC will primarily necessitate tools suite from a Microsoft office any particular designing software’s for unique solar panels that are needed by the users.  The applications, as well as more others,  can be pushed  through the utilization of a group policy while maintaining hierarchical accuracy to ensure that only the authorized computers and users make the installation of such applications (Hester & Henley2013).

DNS

Crete LLC will be utilizing a DNS that is broken-down in offering protection for data and well as the corporation’s integrity.  The DNS that is fully broken will ensure that it is easy for the clients as well as the users in surfing through the intranet as well as the internet. This is an approach that is objected at increasing the general efficiency of the project.  The effectiveness of this strategy will necessitate the implementation of virtual servers which will be two for the case. The Namespace DNS will utilize a simplified design that is easy to memorize and access for both the corporation's staffs who are the users as well as the consumers in the market.  The namespace that the corporation should implement is Crete.SolarEnergy.com. The applications distribution with the utilization of server 2012 will automatically be simplified.

File Services

The system file will be situated on a distinct server which will have a specified IP address. Every user will be having their individual virtual drive which will primarily be for personal utilization.  The files network will be stored on a shared drive which will then be accumulated prior to the logging in by any particular user before starting.  The utilization of the resource manager file server will play an essential section in the general administration of the user’s drive as well as shares (Sivarajan, 2015). Each of the server’s users will generally be limited to a drive space of only 1.5 GB without any extension for their individual use to avoid misplacing the corporation’s data.  In regard to the share drive concerns, each of the involved department will be provided with the actual space amount that is necessary for the department based on the general needs and operations of each.  For instance, it should be noted that the sales department’s needed space cannot be compared to that required by the HRM department nor the finance department.  Each section has its own specified needs which will be handled accordingly by offering adequate space. This will ensure that data is not lost which may result in the rise of inaccuracies (Sivarajan, 2015). 

When the Quota limit is in the range of 85 percent volume a logging program will be designed for transfer of data which will include sending a direct email to the information department for immediate actions. FSRM can hinder the ability to save sounds and video documents which may be needed by some departments (Sivarajan, 2015).  FSRM will, therefore, be configured to suit the needs of those departments in need of both Sound and video sounds such as the development and research department. If the documented documents are over the limit of 500MB of the stored data a script can be implemented in order to erase the unutilized as well as the old data files that may not be required for operations in the organization. 

Remote Services

Moreover, there will be printers that will be located in all the sites with the capability of making prints from either site without compromising operations. This means that for instance, a sales department employee can  be able to make a print of a document in LA’s  location when they are in a different location as this will only  require security details  of their log ins. Crete LLC will, therefore,  be equipped fully  in order  to ensure that the competitors are fully  challenged to copy the strategy since  it will be utilizing the  latest form of technology that offers it a more competitive position.  Information availability is one of the primary reasons that results in the success of any business since this increases the capability of the corporation to implement strategies quickly before the competitors (Tulloch, 2014).  The above design will, therefore, offer the corporation with the capability to succeed in the competitive industry.  Crete LLC is highly equipped and ready for the energy market’s future.

WSUS

The servers will be stated in at a single location which will help in maintaining security and confidentiality of data. However, DNS servers will be allocated in all the three locations to enhance efficiency.  The primary servers will be situated at Houston which has less negative weather experiences which may impact the flow.  The deployment of servers will be achieved through the utilization of manual operation. This is useful at it enables a corporation’s network can be able to deal with certain issues which may rise in the process (Tulloch, 2014).  Clients and services will automatically be updated through direct email and posts made by the organization as notices on the operations.

 

 

 Figures

Figure 1: Domain Names and Location

 

 

 

 

 

 

 

 

Figure 2: The Working of DNS

 

 

           

 

 

 

 

 

 

            References

Carpenter, T. (2011). Microsoft Windows server administration essentials. Indianapolis, Ind: Wiley.

Finn, A., Lownds, P., Luescher, M., & Flynn, D. (2013). Windows Server 2012 Hyper-V Installation and Configuration Guide. New York: Wiley.

Hester, M., & Henley, C. (2013). Microsoft Windows Server 2012 administration: Instant reference.

Sivarajan, S. (2015). Getting started with Windows Server Security: Develop and implement a secure Microsoft infrastructure platform using native and built-in tools. Packt Publishing Ltd.

Tulloch, M. (2014). Training guide: Installing and configuring Windows Server 2012 R2. Redmond, Wash: Microsoft Press.

 

 

 

 

 

1948 Words  7 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...