In the bid to set up the small office Local Area Network for CharlieChocolates the list of requisite equipment includes desktop Personal Computers (PCs), and laptops according to the number of users in each department. The latter are namely: Marketing, Inventory, Sales, and Accounting. Each laptop in the network will be made to connect through the wireless signal, but also allowed to use LAN cable whenever necessary. As such, designing the network mandated for Windows Server 2008R2 which will utilize Internet connection from a router. The server will be potent for various services required by the company including network IP address allocation using DHCP. Additionally, printer sharing amongst all nodes, an intrasite web. For the reasons of this report, the latter will be implemented, however, a number of other services including file sharing capabilities and access to VPN.
As argued by Bhingarkar and Shah (2017) pp. 325-330, Windows Server is handy in the configuration process because it contains all features internally in its Operating System. The company network needs hardware equipment with powerful multi-core processors. Similarly, the power provisions should be bolstered using the redundant reservoir, as well as swappable drives. The servers ought to be mounted on a tower-structure since the size of the company not substantial. The company is also advised to purchase a convenient Windows Small Business Server (SBS) since it is accompanied by a license that lasts. As depicted on this documentation, the CharlieChoclates Local Area Network implementation uses Windows Server 2012R retrieved from a pile of five user permissions.
The preamble stage of setting up the company’s in-house networking of servers to suffice the four departments required a number of leads as follows. First, in consideration of the business’ size mounting the servers in racks adds up as most suitable. Although it might seem common for an enterprise to stack server hardware, as well as other network equipment on shelves and desks; the strategy hinders for future scaling. Therefore, CharlieChoclates ought to implement the rack-mount design to adequately house all hardware. Similarly, understanding the characteristics of a server rack is important for this network plan. The structure is calculated in units of the rack (RU), thence, a single unit is equivalent to 1.8 inches (Mittal et al., 2018). Therefore, it comes in handy since the required switch amount to around 1RU to 2RU. Secondly, the server hardware range from 5RU to 10RU. The breadth and height of the rack should range from nineteen to twenty-five inches. Lastly, purchasing adjustable racks will prove plausible to mount the company servers.
Another strategy implemented on CharlieChoclates network involve server isolation in the bid to minimize noise. The latter is actuated by allocating a partitioned room with all hardware server equipment, which will also bolster security against physical theft. Scheming to eliminate excess heat in the server room calls for an AC unit and air conditioning since the network is left running over long periods of office hours. Similarly, a five-bay network attached storage (NAS) framework is fitted into the server room with accompanying switches. An equally important relocation involves the right management of cables running to nodes of all workstations, IP cameras, and all equipment in the server room. An appropriate method uses panel patches for RJ45 termination as they offer a substantial twenty-four ports installed in 1RU spaces (Panek 2015).
Finally, the housekeeping setup of CharlieChoclates network employs proper labelling and documentation. Regardless of how simple the deployment is; the act is looked forward to assisting new IT staff when working on the network. The techniques are anticipated to save business of costs emanating from mere catastrophe. The important instrumentation to be labelled include a printer, servers, all network gadgets with specific titles as well as IP addresses. A comprehensive annotation depicting significant processes in relation to the company hardware is supposed to be printed and stuck on the server rack. The former section of this documentation aimed to put across all significant functioning instructions associated with the network plan (Mueller 2016). They assist at times of data backup, network shut down of equipment in case of power surges, or shortages.
The choice of the client-server network was selected based on a Windows operating system and incorporates environments referred to as domains. Therefore, running Windows Server, as well as client computers implementation of Windows 7 and 8 proved yielding for the intended business’ course of action. Through the server software, domains are managed primarily by a controller which data tracks amid all resources in the network. Through an Active Directory (AD), each client workstation is manipulated by the domain controller. As implemented in Windows Server 2012, the AD was first introduced in Windows 2000 (Couto et al., pp.52-58 2016). Because Windows utilizes Access Control Lists (ACL), it concurrently manages all clients’ computers. The action behind it involves an entire set up of what clients can modify at their workstations, as well as applications accessible from the client desktop.
The client-server network is established in roles which determine the accessibility means by clients. Similarly, users are delineated to whether they can alter any configurations in their stations. Therefore, each network through the administrator tracked of user brought up roles as a significant step to alienate hacking instances. By allocating client workstations into groups, users are assigned to rights of access as well as licenses. The administrator is highest in hierarchy and Windows also provides a group for the account. In the first instance of installing Windows, one is required to fill the admin password so as to bolster network’s security (Xu 2016). The latter pose administrators to the entire mandate of the network and server. Therefore, not only can the lockout clients but also liable for configuring the network. Similarly, they manipulate clients’ means to file accessibility which range from viewing, editing, creating an entire manipulation.
The application server is responsible for hosting executable data files, that can either be run in a flash from the server by clients, if not installed in their local workstations. The server holds all developer updates, hence distributing it to every user PC. File servers are mutual among networks and enable document uploads. Admins allow each client to access their directory through a centralized storage, enhancing privacy as well as providing backup features on server hard drive. Web servers are the most common to networks and are used to host the intranet or company website. The former refers to web servers that are only open to employees in the network. Web servers enable dissemination of files, thence, provides admins to automate all departmental duties (Mahaffey et al., 2016). The DHCP server is responsible for allocating IP addresses. Although the function can be designated to routers, the business’ ought to use the physical hardware. Lastly, a Domain Name Server is enabled for networks translation of their domain name to IP addresses. Looking to create a friendly interaction in the client’s browsers, the company’s intranet website can amply be accessed.
It concerns the administrator’s role to manage accounts that are distributed across the organization’s servers. The process is essential especially with the growth of each department including sales, marketing, inventory, and accounting. The latter requires system administrators to control the accruing burden causing a hassle for clients. In Windows Server 2012 R2 Server, the administrator is required to log in to a target server using Backup Operator privileges so as to back the Active Directory configuration service in the following steps:
The server is successfully backed.
Being one of the most important devices on the office network, the print server should be deployed as was done on Windows Server 2012 R2 machine.
Prerequisites:
An admin account set with a strong password, the configuration of a static IP, installed with latest windows update, and a turned off the firewall.
References
[1] Bhingarkar, S. and Shah, D., January. A survey: cloud hosted website protection using soft computing techniques. In Cloud Computing, Data Science & Engineering-Confluence, 7th International Conference on IEEE, 2017.
[2] Couto, R.D.S., Secci, S., Campista, M.E.M. and Costa, L.H.M.K.. Network design requirements for disaster resilience in IaaS clouds. IEEE Communications Magazine ,2014.
[3] Mahaffey, K.P., Richardson, D.L., Salomon, A., Croy, R.T., Walker, S.A., Buck, B.J., Gorrino, S.I.M. and Golombek, D., Lookout Inc. Multi-factor authentication and comprehensive login system for client-server networks, 2016.
[4] Mueller, J.P., Windows Server 2008 All in one desk Reference For Dummies 2008.
[5] Nakamura, H., Nishizawa, K. and Yamaji, A., Seiko Epson Corp, Network system, interface board, method of controlling printing on an network system, and program, 2018.
[6] Nice, N., Eyal, A., Nukala, C., Addagatla, S. and Neystadt, E., Microsoft Technology Licensing LLC, Authentication in a network using client health enforcement framework, 2016
[7] Panek, W., MCSA Windows Server 2012 R2 Administration Study Guide: Exam 70-411. John Wiley & Sons, 2009.
[8] Mittal, S., Kakkar, D., Thaman, P. and Kumar, OWN CLOUD DEVELOPMENT FOR SECURITY AND RELIABILITY OVER AND OUTSIDE THE NETWORK, 2018.
[9] Xu, Z.X, Practices to Administration of Windows Server 2012 and 2012 R2. Memory, 2016.
[10] Zambelli, A., IIS smooth streaming technical overview. Microsoft Corporation, 2009
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download