StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cloud Computing - Windows Server 2012 - Assignment Example

Cite this document
Summary
The author of this paper "Cloud Computing - Windows Server 2012" discusses the release of windows server 2012, the issues and consequences, providing for the administrators and users, the domain design, the main group policy, the DNS servers, file services, and remote services…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Cloud Computing - Windows Server 2012
Read Text Preview

Extract of sample "Cloud Computing - Windows Server 2012"

IT Project Implementation Proposal and Introduction Technology has witnessed dynamism in the recent past. Developments in the different aspects of computing have seen business increase productivity both in performance and expansion. With proper utilization of the potentials dispensed by use of technology, businesses are in a position to scale higher with little effort (Hernandez, 2013). The growth of technology has been marked by a number of factors all leading to contributive growth of enterprises. New versions of sophisticated software are being released to the market with vast performance capabilities and features to aid in productivity. More versions of user friendly, machine friendly and secure software packages are also released by vendors now and then. For years, Microsoft has released different versions of their windows server. The different versions come with improved features and capabilities that suit the user requirements for competitive advantage. This has been marked with the release of windows server 2012, a version that came out with a mix of editions targeting various segments of their customers. Background Information Shiv LLC is a multinational corporation dealing with the manufacture and distribution of solar panels to a number of distributed consumer markets throughout various states in the United States. They have their operations based in the three locations: Los Angeles, Houston and Dallas. With the increasing growth in demand for solar panels, however, the company has plans for future expansion. Their main offices will be located at the Houston and Dallas Offices from where their support staff will run the business. As such, an integrated system for management of the various aspects regarding their operations should be established. This could include a well-established network environment, sophisticated data management system, a communication system and precise file management system among others. The security of every aspect of the company should be taken into consideration since the organizational corporate information needs the highest levels of security and confidence. The rising issues in security should be a motivation to Shiv LLC as they should also be keen on the deployment of their systems to minimize vulnerabilities. For some time now, the different branches of the company have been connected through a WAN (Wide Area Network), with ample bandwidth being set in place in support of communication and connection for the different workers of the company located in different regions. The available bandwidth is strong enough to support expansion without further investment in the same. The availability of such a resource is, therefore, an advantage to the company as the costs of the expansion will be reduced. The number of client computers available within the organization has sufficient features for implementation and deployment of the Windows Server 2012 Operating System, a framework that supports the different applications and operations intended to enhance the performance and productivity of the organization. A number of technology implementations should be performed for improved efficiency and productivity. Among them include proper implementation of the Active Directory, Group Policy, the DNS (Dynamic Name Servers), the File Services and other applicable Remote Services. All these are services available with the Window Server 2012 operating system and their implementation should be done keenly, with a close look up and consideration. The Active Directory The release of windows server 2012 marked a new revolution of advancements in computing (Taft, 2012). This is not only in the aspects of virtualization, manageability and storage, but can also be associated to the availability of the Active Directory. This has loads of improvements and features that suits the functions of the system administrators for their effective performance. The Active Directory Domain Services (AD DS) forms the basis for the formation of distributed networks, an aspect critical for proper implementation of the new infrastructure for Shiv LLC. These components function through the use of domain controllers to provide structured and hierarchical data storage facility for objects in a more secured way within a network infrastructure. Such components as computers, their users, printers and other services are examples of the objects managed through the Active Directory Domain Service, which acts to provide for their location and support. Administrators and users are provided with a graphical user interface through which they can access data and other objects available within the Active Directory Domain Services. Recommended Domain Model The domain design selected for the organization should be the single domain model. This model is cheaper in terms of implementation, manageability and administration compared to the Regional domain model. The model provides a room for efficient replication of data without having much impact on the bandwidth available in the network (Hernandez, 2013). Recently, the number of users for such a system has been increased making it possible for multiple users to have access to and use the information stored in the directories without any problems. Data replication take place efficiently and with minimal effects on the network making this model a perfect choice for Shiv LLC. The single domain model, when adopted in any organization, proves to be easier to manage and cheap to maintain (Taft, 2012). It is made up of a forest containing a single domain, the forest root domain, which houses all the user and group account details. With this model, a single domain controller has the power to authenticate users within the forest. The domain controllers can therefore act as universal catalogs replacing the need for the administrators plan for them. Furthermore, all directory information is replicated throughout the different locations hosting the domain controllers. As such, the model creates high levels of traffic in the network due to replication. There is, therefore, need for administrators to have RODC (read only domain controllers) in place for remote control of the domain. The Active Directory FSMO (Flexible Single-Master Owner) roles should be placed in the domain to ensure that best performance of operations takes place within a single domain. The FSMO defines targets in which critical operations should be performed to avoid the emergence of conflicts that might result from Multi-Master updates. As such, the FSMO role owner should be available and discoverable to all computers within the network performing operations that are dependent on the FSMO. Backup for the Active Directory should be done as part of the system state in which different constituents of the system that dependent on each other are kept. In other words, backup and restore of the system state should be done together in entirety. This will entail having all the system state components available on a domain controller which comprises of the registry, boot files, the active directory and the SYVOL. Group Policy Presence of user and group accounts within the windows server 2012 environment allows for tracking and management of data and information about the users by the server. User and group accounts should be properly setup and organized for effective performance of the system (Neilson, 2013). It is, therefore, wise to choose the most appropriate policy for creation and management of user accounts. The main policy that should not be left out in the management of these accounts is the naming policy. The display and logon names used in the system should ensure consistency and reduce name conflicts in the event of user base growth. The users of the system should be provided with secure names that are difficult to exploit for their security safety in the use of the system. Such settings as use of a numeric code as the logon name or inclusion of character combinations in the logon space could be a perfect way of ensuring consistency in the system. The organization should therefore ensure an appropriate policy for naming is put in place to reduce conflicts and possibilities for unauthorized user account access. Finally, the use of secure passwords should be put into considerations when setting the group policies. DNS (Domain Name Servers) The DNS servers play a major role in the resolution of windows domain names to IP (Internet Protocol) addresses. These are a critical component within the windows Active directory that aid in location of network resources (Taft, 2012). The DNS (Domain Name Servers) have a ubiquitous nature marked with a complex hierarchical structure. This makes it complex for most administrators to master and use for their management roles. The diagram below is an illustration of the hierarchical nature of Microsoft’s Internet DNS namespace showing how it integrates DNS and Active Directory Namespaces. Figure 1:Illustration of Microsoft’s DNS Server (Adopted from ) The Domain Name System forms a tiered structure used to name computer systems, resources and services involved or connected via the internet. The root domain appears at the peak of the hierarchy. This domain lacks a formal name and is thus represented using a bare string on the hierarchy. Name resolution through the use of Domain Naming is a core course in the administration and operation of the Windows Server 2012 operating system. Proper resolution of names should be ensured therefore. Without this, the resources within a network cannot be accessed. It is thus crucial for designers of the DNS to have in mind a design that includes an Active Directory and also have in mind the namespace existing on the internet to avoid it from conflicting with the internal namespace of the organization. In Shiv LLC, implementation of the domain based namespaces should be opted for. This is should be done to ensure the identity of the namespace server is not visible to the users of the system. Therefore, Migration to different servers is possible without the consent and knowledge of the users. For namespace availability in multiple servers, this option qualifies to be a perfect choice as well. File Services A number of file and printer sharing conventions can be implemented during the deployment of windows server 2012 operating system (Lynn, 2012). These include file sharing, printer sharing, sharing of the public folders as well as password protected sharing. The file sharing option offers administrators and users with privileges to share folders and files that could be saved in computers within the network. In the event of activation to the public folder, all the files and folders can be accessed by any of the users within a network. Printer sharing, on the other hand, ensures that users are in a position to share any installed printer within the network. Allowing the printer share option also allows files sharing option. To ensure security of the shares, implementing password protected use is encouraged. This is a way of restricting access by the unauthorized users to files and folders stored in a computer or in the main server. For access to such files, one should have access to the password and username as set by the administrator. The File Server Resource Manager (FSRM) is a feature in the Windows Server 2012 that offers the capabilities for management of advanced quota and directories (Chandrasekaran, 2013). Presently, the quota system has been made based on the directories unlike the earlier versions where they were set and managed by users of the windows. There is, therefore, faster and more convenient means for restricting the amount of data and content that users upload to the system’s root directory. Configuration of the system per user is also easy to control and manage. Before utilizing the capabilities of the file server resource manager, setting the manager options should be performed. This can be achieved through proper configuration of the files, management of the quota and informed screening of the management of files. The DFS namespace implementation is another aspect that should be considered during the deployment of the windows server 2012 operating system as it gives the system an advantage where replication of files is necessary (Taft, 2012). Where new servers are to be implemented, organizations enjoy the feature of file replication. In the case of growth and expansion of businesses, there will be reduced chances of drive mappings and should thus be included during the deployment of new windows server operating system. Remote services In the windows server 2012, remote services have been seen as a source of single infrastructure and consistently great experience of user access even over Wide Area Networks and at the same time offering different choices for the deployment of the application (Taft, 2012). Some of the options provided for the deployment of the framework include Session, Personal and Pooled virtual desktop collections, all of which have the aim of collecting and reducing the costs to suit users’ needs. This simplifies administration and provides hooks that aid in the extension of partnership for value additions and problem solving. Configuring the remote services in the windows server 2012 operating system for security is very crucial. It is achieved through a number of practices as described herein: first, setting levels for the server encryption and authorization plays a great role. This can be achieved through enhancement of the Remote Desktop Services security (Chandrasekaran, 2013). With this, the system is configured in a manner that it has three security layers and a certificate is used as a verification tool for the Remote Desktop sessions’ clients and hosts. The certificate is based on the TLS 1.0 layer as is described in the table below. The Remote Desktop Services have the utmost heights of encryption. With the Windows server 2012 release, the levels of encryption are higher than previous releases. The remote services should be configured in a manner that the level of network authentication is regulated. Client login to access information within the remote desktop services is also an aspect to be considered while configuring security settings for the remote desktop services. Finally, permissions with regards to user access to remote services should be considered while configuring the connections. Only users with access rights and privileges should be allowed to have access to remote services in a network setup and are thus a perfect tool for ensuring system security. The WSUS (Windows Server Update Services) Windows Server Update Services (WSUS) is an aspect of the windows server 2012 that acts as a server role to enable the deployment of updates to the system by the system administrators (Neilson, 2013). With the help of this feature, administrators can take full charge of updates delivery in the network environment. This can be achieved through utilization of the management console. Besides, the WSUS server can function as the source of updates for other servers in the organization’s network infrastructure to form what is commonly known as “upstream server." Management of system updates entails taking charge of the maintenance and deployment of provisional applications into an existing system. With it, system administrators can achieve efficiency in the operations of the organization, ensure the stability of the organization’s system and also overcome all the possible security vulnerabilities in the system. These aspects contribute towards achieving a stable and sustainable work environment within an organization, enabling organizations to maintain high levels of confidence within their operating systems and other application software. Failure to achieve high levels of security within organization’s system exposes it to attacks that can result to loss of crucial data and revenue. Proper configuration and setup of organizational systems should therefore be ensured, followed with the necessary installation of updates. Conclusion In the modern world, organizations rely greatly on networking for their businesses and operations to thrive. System operation engineers should possess the ability, awareness, and proficiency in the planning and management of organization’s network facility in which more applications are being developed and implemented. To deploy and manage networks running on the windows server 2012 platform, technical knowhow on the way the system works is critical. Many network administrators are presently facing difficulties while attempting to avail resources to the users of their networks due insufficient knowledge on the way the operating system work. The security of resources stored within the networks is compromised putting the users of the system at the risk of possibly losing data. Using the features availed by the windows server 2012 operating system; most of these issues will be solved. It provides features for secure installation as is in the case of the Core installation, troubleshooting, easy and customized administration, and finally the centralized management of elements. Therefore, the system administrator at Shiv LLC should start by selecting the most appropriate edition of the Windows Server 2012 operating system that meets its’ organizational needs. This should be in terms of pricing, performance and features in relation to the available system capabilities. References Chandrasekaran, M. M., Muralidhar, M. M., & Dixit, U. U. (2013). Online optimization of multipack machining based on cloud computing. International Journal of Advanced Manufacturing Technology, 65(1-4), 239-250. Doi: 10.1007/s00170-012-4163-7 Hernandez, P. (2013). Microsoft Releases Windows Server 2012 R2 Essentials Preview. Eweek, 6. Lynn, S. (2012). Windows Server 2012s New Moniker: First of Many Changes?.PC Magazine, 1. Neilson, C. (2013). Securing a Control Systems Network.ASHRAE Journal, 55(11), B18-B22. Taft, K. (2012). Windows Server 8 Is Now Officially Windows Server 2012. Eweek, 16. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cloud Computing - Windows Server 2012 Assignment Example | Topics and Well Written Essays - 2500 words, n.d.)
Cloud Computing - Windows Server 2012 Assignment Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/information-technology/1833109-technical-proposal
(Cloud Computing - Windows Server 2012 Assignment Example | Topics and Well Written Essays - 2500 Words)
Cloud Computing - Windows Server 2012 Assignment Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1833109-technical-proposal.
“Cloud Computing - Windows Server 2012 Assignment Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/information-technology/1833109-technical-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cloud Computing - Windows Server 2012

Analysis of Implementation of New Technology in Servue Corporation

From the paper "Analysis of Implementation of New Technology in Servue Corporation" it is clear that from the technology capabilities point of view the solution offered by the Kwikfix business is most excellent.... This solution will offer excellent support for the business.... nbsp;… The new solution Kwikfix cost too much....
7 Pages (1750 words) Research Paper

Operating Systems That Are Common on the Internet

They are described as follows: eyeOS eyeOS is the web desktop of the open source cloud computing.... “It might mimic the user interface of traditional computer operating systems like Windows, but it doesn't interact directly with the computer's hardware” (Strickland, 2012).... hellip; There is a whole range of mixtures of computers on the Internet on the server as well as the client side of the operating systems.... eyeOS can be either downloaded from the Internet and run on the server or its account can be created to use it....
4 Pages (1000 words) Research Paper

Human-Computer Interaction: Microsoft Sharepoint

This component of the Ms Sharepoint Package is the server in the setup of SharePoint just in accordance with its name.... Since SharePoint server banks on SharePoint Foundation for all its basics it naturally incorporates all it properties along with its own.... Instead of having the need of incorporating the entire massive structure of MS SharePoint within its premises any business can now log onto the cloud server of the application package....
3 Pages (750 words) Coursework

Tablets and Business

windows.... windows.... With the advent of laptops and phones, a new revolution… Tablets are being are the new pinnacle of technology because of the efficient computing, durability, and their fabrication itself.... It is clear that tablets will soon be the new revolution for organizations as they have the amazing increase their capacity to It is believed that the tablets will bring about a great change in business computing in the next decade....
2 Pages (500 words) Essay

IPV6 Security Enhancement

The paper "IPV6 Security Enhancement" discusses that the SMTP server should be configured to disallow emails from unknown recipients.... This will eradicate situations where hackers will send malicious emails to the organization mail server to spoof for information.... hellip; The name server can be accessed by an untrusted host machine leading to infiltration to organization network.... The next measure would be to ensure records are not appearing within the region of the domain name server....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us