StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Window Server 2012 - Research Proposal Example

Cite this document
Summary
The author of this proposal "Window Server 2012" casts light on the Windows Server deployment proposal as an Information Technology consultant for Shiv LLC. It is stated that the company is primarily involved in the manufacturing and distribution of solar panel for the consumer market. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Window Server 2012
Read Text Preview

Extract of sample "Window Server 2012"

Window Server 2012 Network Proposal 1. Introduction The present report intends to put forward a Windows Server deployment proposal as an Information Technology consultant for Shiv LLC. The company is primarily involved in the manufacturing and distribution of solar panel for the consumer market. The company has been operating within three locations namely Los Angeles, Dallas and Houston and is planning to undergo fast expansion by taking into consideration the increasing demand of their solar panel product. Moreover, the company has got a systematic setup of all their technological gadget requirements such as wide area network (WAN) and data carrying bandwidth, all of which can be considered necessary for maintaining an appropriate communication between their operational facilities. Accordingly, in order to improve the effectiveness of the communication procedure and secure the integrity of the brand image along with the operational data, the company wants to implement the concept of Windows Server 2012 within all aspects of their data protection and communication setup. Thus, this proposal will mostly remain focused towards understanding the aspect regarding how Windows Server 2012 can be implemented within the areas of active directory, group policy setup, domain naming system (DNS), file services, remote services and windows server update services (WSUS) in order to reinforce the functionality of Shiv LLC. 2. Discussion 2.1. Active Directory The concept of domain model demarcates the availability of usable networking resources that remain stored within multiple server machines in a network setup. The users just have to log in within the domain system through a specific id and password after which they can attain access to the stored data and other resources in an appropriate manner. Moreover, different domain models have been created by Microsoft that finds applicability to a platform depending on the version of server operating system installed within it. Since in the case of Shiv LLC the considered version of server operating system is Windows Server 2012, thus two specific categories of domain models can be found applicable in this context. The first model is the’ Single Domain Model’ and the second one is the ‘Regional Domain Model’. The diagrammatic representation provided below will help in gaining a lucid comprehension about the concepts of these two models in an appropriate manner. Single Domain Model Figure 1: Single Domain Model The single domain model can be found applicable for small business organizations where the number of users along with the resource sharing necessity is low. Moreover, this model is applicable to the network setups having lower bandwidth due to the fact that the data replication process for this model is quite low. Users can easily log on to the domain system and can easily access the shred resources that remain stored within the main domain server platform (Microsofte, 2014). Regional Domain Model Figure 2: Regional Domain Model The regional domain model can also be considered as the integrated form of the single domain model. This domain model is essentially applicable for organizations which have got multiple offices within separate regional areas. These types of domains require greater bandwidth as compared to the single domain model. Moreover, this type of model is highly effective in terms of reducing the load of replication traffic over the WAN network. This model also supports the concept of data isolation which might be effective for the three separate offices of Shiv LLC in order to avoid data complexities and risk of departmental data mix and match (Microsoftf, 2012). Consequently, by understanding the advantages and disadvantages of both the domain models, Shiv LLC can be suggested to implement the regional domain model instead of the single domain model which will help them in managing their operations and stored data in a systematic manner. The domain names for each of the regional offices have been mentioned in the diagram provided above. Figure 3: Location of Main domain Controller in Red Box Besides, by taking into consideration the provided fact that the main staffs of Shiv LLC are located within the Houston and Dallas branch along with the sales team only being confined to the LA branch which requires remote access to the Houston branch, it can be suggested that the main domain controller needs to be placed within the Houston branch. Additionally, it is also suggestible that Shiv LLC should implement the ‘Read-only Domain Controller (RODC)’ concept within their system which will give them the option of placing active directory domain database replicas within each of their regional forest roots for the purpose of being accessed by the users. Furthermore, in case of any data damage, the RODC can also be used to control the spreading of the corrupt data replicas on other regional forests as well (Savill, 2008). Apart from the above considerations, it is also suggested that since the workload within the regional offices of Shiv LLC might increase in the coming future by taking their expansion plan into consideration, they must also establish the ‘Flexible Single Master Operations (FSMO)’ within their system which will gradually help in effectively regulating the data updating, deletion and all other functions of the related domain controllers. In simple words, it will be like a parent system to all the domain controlling systems (Zoho Corporation Pvt. Ltd., 2014.). Figure 4: Flexible Single Master Operations (FSMO) Diagram Since Shiv LLC does not want to get into any sort of compromise regarding the integrity and safeguard of their organizational data and their brand image, thus they need to plan regarding utilizing the distributive architectural nature of the active directories (AD) in order to recover and backup their data in the situation of natural calamity or domain controller malfunction. They can use the virtual directory cloning feature of Windows Server 2012 for recovering the last auto saved data configuration from the domain controllers that have sustained damage (Pentonb, 2014). 2.2. Group Policy It will be an added advantage for Shiv LLC to implement the concept of group policy within their server system. This is due to the fact that through the structuring of appropriate group policy, the organization can effectively regulate the procedure of backing up and recovering their organizational data in order to prevent unauthorized upgradation and access to the restricted data that might put the brand’s image at risk. Besides, the settings within the group policy must contain attributes regarding the regulation of the connected regional domain controllers along with allowing the Los Angeles to exchange and access necessary data from the main Houston branch. Moreover, the information regarding recovery procedure of damaged data from the regional servers in case of any hardware malfunctioning will also have to be mentioned within the group policy (Microsoftg, 2011). 2.3. Domain Name System (DNS) In the context of attaining a domain namespace, the organization can be categorized within one specific domain name i.e. www.ShivLLC.com. Moreover, for Shiv LLC, both the primary and the secondary domain zones will be required for categorizing the hierarchy (Microsoftd, 2014). Figure 5: DNS Namespace 2.4 File Services Since high level of privacy and security is needed to be maintained in relation to online sharing of data, so in case of Shiv LLC, the concept of virtual private network (VPN) tunnelling can be suggested for effectively maintaining the security of the shared data. Through the tunneling process, the data to be transmitted can be encapsulated into certain encrypted form and embedded in the carrier protocol before transmission and at the receiver side, the data can be appropriately decoded (Made In Malta, 2013). Moreover, the suggestion of quota implementation can also be made for Shiv LLC due to the fact that the volume of daily operational and accessible data can be large and thus a restriction factor will have to be implemented regarding the amount of space being consumed on the server platform (Lynn, 2012). In the similar context, suggestion regarding configuration of the ‘File Server Resource Manager (FSRM)’ can also be done with the intention of providing ease to the server administrator with regard to appropriately classifying and managing the stored data within the server (TechTarget, 2014). Apart from all these, the DFS replication engine will also have to be implemented for keeping appropriate replicas of similar data within all the regional servers of Shiv LLC. Through this way, the network traffic load will gradually become less which in turn will further reduce the chances of system hang. Figure 6: DFS Replication Process (Microsoftc, 2009) 2.5. Remote Services The Virtual Private Network (VPN) can be suggested as an appropriate technological tool for providing remote access to the users of Shiv LLC. Generally, in this context, the sales team within the Los Angeles branch of Shiv LLC should be provided the facility of remotely accessing the data within the Dallas and Houston branches. Specifically in the case of Windows Server 2012, an appropriate setting known as the ‘Anywhere Access’ will have to be enabled so that the sales personnel within the Los Angeles branch can have the remote access to their client platforms with the network domain of the other two branches and can easily access the required data (Pentona, 2014). 2.6. Windows Server Update Services (WSUS) The Windows Server Update Services (WSUS) system can be used by the system administrators operating within the Houston branch of Shiv LLC in relation to distributing the server and the client machines, latest updates that get released by Microsoft Corporation within their network on a periodic basis. The system administrators can easily carry out this process from the management console which gets used regularly for controlling all the updating and recovery operations within the regional servers. One necessity for this updation procedure is that at least one of the WSUS servers should remain connected to the Microsoft updates for attaining the required information. All the remaining WSUS servers within the network can use that specific connected server for attaining upgrades based on the network configuration and security protocols (Microsoftb, 2012). Contrary to the server procedure, the client system updation procedure will require the structuring of appropriate group policy based on which, activities such as client system rebooting, downloading of upgrade file and installation will be carried out. If the group policy is set to ‘automatic update’ mode, all these activities will be directly carried out without prior notification to the administrator. Figure 7: WSUS Server Functioning Procedure Moreover, it is also quite easy to deploy new servers using the WSUS. The FSMO operator functioning in the Houston branch of Shiv LLC will just have to add up the host name or the internet protocol (IP) address of the new server to the group policy setting of this system and undertake a reboot. Once the system restarts, exchange of sharable resources between the FSMO system and the new server can easily take place (Microsofta, 2011). 3. Summary Based on the foregoing discussion, it can be stated that the Windows Server 2012 version of server OS has got multiple new features which can be used by Shiv LLC for reinforcing their file sharing and protection protocols. The implementation of this new version of server OS, gradually provides the system administrators of Shiv LLC, the advantage of maintaining the integrity and utility of the organizational data in a much more appropriate way. Recommendations can also be made to Shiv LLC for utilizing the DNS features in the context of providing appropriate domain names to their regional servers. Moreover, the utilization of the VPN protocols embedded within Windows Server 2012 is also recommended for Shiv LLC in terms of providing effective remote access to its sales team within the LA branch. Moreover, for the regional server updation procedure within Shiv LLC, it is also applicable that they use the WSUS server and client updation technique. References Lynn, S. (2012). Windows Server 2012: Up and Running. United States: O Reilly Media, Inc. Microsofta. (2011). Configure client updates. Retrieved from http://technet.microsoft.com/en-us/library/dd939830%28v=ws.10%29.aspx Made In Malta. (2013). What is VPN Tunneling? Retrieved from https://www.ivpn.net/what-is-a-tunnel Microsoftb. (2012). Windows Server Update Services Overview. Retrieved from http://technet.microsoft.com/en-us/library/hh852345.aspx Microsoftc. (2009). Overview of DFS replication. Retrieved from http://msdn.microsoft.com/en-us/library/cc771058.aspx Microsoftd. (2014). Understanding zone types. Retrieved from http://technet.microsoft.com/en-in/library/cc771898.aspx Microsofte. (2014). Reviewing the domain models. Retrieved from http://technet.microsoft.com/en-us/library/cc731718(v=ws.10).aspx Microsoftf. (2012). Reviewing the domain models. Retrieved from http://technet.microsoft.com/en-us/library/cc731718(v=ws.10).aspx Microsoftg. (2011). Group policy for beginners. Retrieved from http://technet.microsoft.com/en-us/library/hh147307(v=ws.10).aspx Oracle Corporation. (2013). Introducing the DNS Namespace. Retrieved from http://docs.oracle.com/cd/E19455-01/806-1387/6jam692f3/index.html Pentona. (2014). Windows Server 2012 Essentials: Access the Server Remotely. Retrieved from http://winsupersite.com/article/windows-server/windows-server-2012-essentials-access-server-remotely-144435 Pentonb. (2014). How windows server 2012 improves active directory disaster recovery. Retrieved from http://windowsitpro.com/windows-server-2012/how-windows-server-2012-improves-active-directory-disaster-recovery Savill, J. (2008). What is a read-only domain controller (RODC)? Retrieved from http://windowsitpro.com/windows-server/q-what-read-only-domain-controller-rodc TechTarget. (2014). File Server Resource Manager (FSRM). Retrieved from http://searchwindowsserver.techtarget.com/definition/File-Server-Resource-Manager-FSRM Zoho Corporation Pvt. Ltd. (2014). FSMO Roles. Retrieved from http://www.windows-active-directory.com/active-directory-fsmo-roles.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Window Server 2012 Research Proposal Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1653138-window-server-2012-network-proposal
(Window Server 2012 Research Proposal Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/information-technology/1653138-window-server-2012-network-proposal.
“Window Server 2012 Research Proposal Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1653138-window-server-2012-network-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Window Server 2012

Windows Server Deployment: New Features of Windows Server 2012

It includes New Features of Windows server 2012, Deployment and Server Editions, Active Directory, DNS and DHCP, Application Services.... hellip; According to (Schaefer 112-140) the new features of Windows server 2012 that WAI can take advantages of are.... According to (Schaefer 112-140) the new features of Windows server 2012 that WAI can take advantages of are.... Storage Spaces: This is a new feature in Windows server 2012 that enables one to use cheap hard drives to make a storage pool which is then divided into spaces used like physical disks....
7 Pages (1750 words) Assignment

Comparing the Windows 2003 Server and Windows 2008 Server Operating System

Windows Servers do this by building Windows server also manages domain and its client's creation, maintenance and security.... The entire data of the domain is stored within the server giving physical protection and control of the users, their activities, authority, rights, positions and privileges.... (Theosfiles) The family of Windows server 2008 includes Windows server 2008 R2 Standard, Enterprise, Datacenter and Windows Web server 2008 R2 each one has its own long list of cost and benefits which can be studied separately at Microsoft Website....
3 Pages (750 words) Essay

Advantages and Disadvantages of Windows Server 2008

indows Server 2008 conserves power usage more than any other window server.... If the system will not be compatible with the hardware in place, there will be a need for new hardware (TechGrant, 2012).... The paper "Advantages and Disadvantages of Windows server 2008" highlights minimum hardware requirements and costs, new features of server 2008 that can contribute to the effectiveness of Wingtip Toys' business of manufacturing and selling toys, Strategies to provide secure network access....
8 Pages (2000 words) Case Study

Windows Server 2008 and Windows 7

It has new optimization tools that assist in decreasing battery… On the other hand, windows 7 has new options that enable an individual to look for keywords in storage devices attached, documents and emails (Krebs, 2009). In addition, this operating system can be Windows server 2008 and Windows 7 Windows 7 This is one of the greatest desktop operating systems and it is not a server operating system.... Windows server 2008This operating system has been designed in powering the next generation of web services, networks and applications....
1 Pages (250 words) Essay

Windows Server 2008 as the Advantage of Higher Performance and Scalable Growth

This paper "window server 2008 as the Advantage of Higher Performance and Scalable Growth" focuses on a server operating system produced by Microsoft.... hellip; window server 2008 was created by the manufacturing operating system in 2009, 22nd July, and launched on October 22nd same year.... Windows server 2008 supports up to 64 physical processors or up to 256 logical processors per system.... Windows server 2008 has a number of requirements and specifications that must be met before its installation....
12 Pages (3000 words) Assignment

Investigation of Crytolocker: Trace Analysis With Wireshark and Windows 2003 Server

It s software that gets into a computer system and then bars the owner of the computer from accessing the services or the system until a ransom is paid (Kevin, 2012).... In setting up the virtual image, below are therefore considered as necessities that have to be there: (Kevin, 2012).... This coursework "Investigation of Crytolocker: Trace Analysis With Wireshark and Windows 2003 server" discusses the Investigation of Cryptolocker.... This could be seen in the former eras whereby one windows server 2000 could support the operation of Windows 2003 besides others such as Linux, Each managing its applications....
18 Pages (4500 words) Coursework

Cloud Computing - Windows Server 2012

The author of this paper "Cloud Computing - Windows server 2012" discusses the release of windows server 2012, the issues and consequences, providing for the administrators and users, the domain design, the main group policy, the DNS servers, file services, and remote services.... This has been marked with the release of windows server 2012, a version that came out with a mix of editions targeting various segments of their customers.... For years, Microsoft has released different versions of their windows server....
10 Pages (2500 words) Assignment

Choosing an Appropriate Windows Server 2012 and Features

The author of this paper "Choosing an Appropriate Windows server 2012 and Features" discusses the benefits of using Windows server 2012 Disk Storage Technologies, printing problems, and Networking implications of the Windows server 2012, core skills, and transformational mindset.... Therefore the Windows server 2012 was not left out to address this critical issue.... This organization chose the Standard server edition over the other three Windows server 2012 editions....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us