Free Essay

Nt1330 Unit 4 Assignment 1

In: Computers and Technology

Submitted By cutediva86
Words 580
Pages 3
NT1330
Unit 4 Assignment 1.
AD Design Replication Scenario

AD Design Replication Scenario

To whom it may concern:

I am the IT Administrator for the company and I have been asked to give my recommendations for the Active Directory Replication Design of the two new Branches. The first I can recommend for you is that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done because the Root AD automatically builds the inter-site replication topology based on the information provided about the new site connections. Each new site’s AD will have one each domain controller that is known as the inter-site topology generator and they are assigned to build the topology at their sites.

To add two new branch offices we will need to find a strategy to design a replication process. To implement this we will need to use inter-site replication. Inter-site replication is needed when adding domain controllers located in different sites. We will also need a site link (Site link is a logical, transitive connection between two sites that allows replication to occur) protocol of Remote Procedure Call (RPC) over Internet Protocol (IP) which is the preferred choice for the replication process. This allows you to communicate with network services on various computers and also keep data secure when being transmitted by using both encryption and authentication. We will need to take into consideration the cost, schedule, and frequency of the replication. It’s best to set the schedule for the site link during off-peak business hours to ensure the bandwidth is not bogged down on the WAN, due to replication traffic. Frequency will determine how often information is replicated over the site link. I think the best schedule/frequency for the replication would be every 6/hrs starting at 0600/daily.

Before installing the new domain controllers and before we begin the replication process, we will need to setup the IP addressing or sub netting for the new locations. We will want to use subnets that reflect our current IP addressing scheme. This will be important to make sure there are connections between hosts and domain controllers as needed.

Now my individual recommendation for Branch Office # 1 is that I would recommend having a 56k POTS line for a redundant backup line. I feel that the redundant 56k POTS line would be justified because if the main ISPs T1 lines went down then you could always use dial-up to get updates for your servers. Because this Branch has a Call Center with a high employee turnover it is imperative that there be some means of connection in case an employee is fired or his/her account needs to be updated across the domain.

As for Branch # 2 office I would recommend using Simple Mail Transport Protocol for replication. I also would suggest that because of the very remote location of this site and the utilizing connection (56k POTS Line) I would recommend that the company invest in satellite internet service either as a main source of telecommunications link or as a redundant line. It would be more cost effective if the company used the satellite connection only for redundancy purposes.

Based on my knowledge of AD Replication Design this was my recommendation to you. If you have any future concern or questions, please do not hesitate to contact me.

Professionally,

Similar Documents

Free Essay

Unit 4 Assignment 1

...UNIT 4. Assignment 1. Copper vs Fiber As the name suggests, fibre optic technology uses pulses of light to carry data along strands of glass or plastic. It's the technology of choice for the government's National Broadband Network (NBN), which promises to deliver speeds of at least 100Mbps. When we're talking about 'speed' were actually talking about throughput (or capacity) — the amount of data you can transfer per unit time. And fiber optics can definitely transfer more data at higher throughput over longer distances than copper wire. For example, a local area network using modern copper lines can carry 3000 telephone calls all at once, while a similar system using fiber optics can carry over 31,000. So what gives it the technical edge over copper wires? Traditional copper wires transmit electrical currents, while fiber optic technology sends pulses of light generated by a light emitting diode or laser along optical fibers. In both cases you're detecting changes in energy, and that's how you encode data. With copper wires you're looking at changes in the electromagnetic field, the intensity of that field and perhaps the phase of the wave being sent down a wire. With fiber optics, a transmitter converts electronic information into pulses of light — a pulse equates to a one, while no pulse is zero. When the signal reaches the other end, an optical receiver converts the light signal back into electronic information, the throughput of the data is determined by the frequency......

Words: 396 - Pages: 2

Premium Essay

Unit 4 Assignment 1

...Motherboards Marc Burzynski Unit 4 Assignment 1 NT1110 07/20/2013 Video 1.04 Summary This video talked about the differences in the different form factors motherboards as well as the similarities. It explains for those of us who prefer to build our own systems that we should select our motherboard before buying the tower and after we have selected the CPU. It also explains about the different types of connectors found on motherboards. List Of Topics, Terms And Definitions * Motherboard – The most important consideration, the size and shape is determined by form factor * ATX Form Factor – Replaced the AT form factor, ATX is smaller, easier to work on, better organization, has support for a wide variety of I/O devices, usually has is the P1 20 pin or 24 pin power connector, on the older ATX form factor motherboards were connected via the PS/2 connector at the back of the case, the newer ATX form factor motherboards connected keyboard and mouse via a USB, usually has between two and four DIMM slots, has either PCI E Oren AGP slot but not both, usually has 2 40 pin IDE slots, and usually 1 to 2 serial ATA slots. The ATA form factor was the first to introduce the soft power switch on the front of the computer; the soft power switch does not immediately cut power but instead allows the computer to go through the normal shutdown procedure. There is however a power switch on the back of the computer, flipping the switch immediately kills power. Another......

Words: 540 - Pages: 3

Premium Essay

Nt1330 Unit 1 Assignment 1

...would likely become unrealistic to resolve names and IP addresses manually because of the fact that it would take far too much time. You should also keep in mind that if you have a DHCP or DNS server or any servers in general then you are going to have to keep it on at all times otherwise your users will be unable to connect to the internet because they will not have an IP address. Or if they are able connect to the internet then they will have errors when they type in the web address then they will not be able to fix them. As far as the IT-management overhead when referring to DHCP or DNS you should also keep in mind the facts stated previously. First of all it can be very cost ineffective if you try to run a DNS or DHCP server for just 1 or 2 PC’s. The reason for this is that servers require much more to operate and maintain than your standard PC also you will have to train somebody within the company to understand how servers work and operate or hire someone new who knows possess these skills....

Words: 334 - Pages: 2

Premium Essay

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Free Essay

Unit 4 Assignment 1

...even buy a case because sometimes the motherboard will not fit into the case. There are three form factors today. Atx which replaced older AT Motherboards. They are also easier to work on. ATX also has a soft power switch on the front of the computer and a power switch on the back. The second form is the BTX form. This has better air flow for cooling by having an intake vent on the front of the computer and an exhaust vent on the back. The last is an NLX form used on low end computers and is also known as daughter boards. On the bottom of the motherboard there are numerous copper traces know as Buses. A motherboard will have expansion slots. It will have either several PCi slots and one AGP slot or several PCI slots and one PCIe slot. 3 &4. ATX-easy to work on, replace old At form BTX- better cooling for cpu NLX- daughter boards Riser cards- plug into motherboard, and support additional expansion slots Soft power- button on front of computer that does not immediately cut off computer. Allows normal OS shutdown process Wake on LAN- Configured in CMOS any keyboard or network activity will repower your system if it is in standby Motherboard Connectors- P1 Power, 40 pin IDE, 34 pin floppy drive, SATA, 50 or 68 pin SCSI 5. Before choosing anything with your computer you should choose both a cpu and a motherboard. There are three forms to choose from. PCIe or PCI express slots are expected to replace old AG connectors because they are the fastest to date. This information is a......

Words: 313 - Pages: 2

Free Essay

It3220 Unit 4 Assignment 1

...Jake Robinson ET3220 Unit 4 Assignment 1: Unit Review Questions 6.2 The function of a modem is modulation and demodulation. A modem takes a signal and modulates it so that the data can be sent via an audio link such as a phone. Then at the other end of the line another modem demodulates the signal back into the original data that was to be sent. 6.3 Three major advantages of digital transmission over analog transmission are: 1. Digital transmissions cannot get corrupted by noise. 2. Digital signals typically use less bandwidth. 3. Digital transmissions can be encrypted so that only the intended recipient can decode it. 6.4 In ASK or amplitude-shift keying the two binary values are represented by two different amplitudes of the carrier frequency. The limitations of ASK are that it is linear and sensitive to atmospheric noise, distortion, propagation condition on different routes in PSTN. It requires extensive bandwidth and is therefore a waste of power. 6.7 QAM is a popular analog signaling technique that is known as quadrature amplitude modulation. This modulation technique is a combination of ASK and PSK. QAM can also be considered a logical extension of QPSK. QAM takes advantage of the fact that it is possible to send two different signals simultaneously on the same carrier frequency, by using two copies of the carrier frequency, one shifted by 90 degrees with respect to the other. 6.8 The sampling theorem tells us that the......

Words: 260 - Pages: 2

Premium Essay

Nt1330 Unit 1 Assignment 1

...Unit 1 Assignment 1 DNS servers provide domain name resolution for network resources. They associate the TCP/IP address assigned by DHCP to a client with its fully qualified domain name. The association of an IP address to a domain name requires that a change in either the address or the name requires an update of the information in DNS. The DHCP protocol does not do this automatically. To make this more seamless, servers running Windows Server® 2008 and DHCP and clients running DHCP can register with DNS, allowing the two to cooperate (TechNet) Dynamic Host Configuration Protocol (DHCP) is a protocol that assists in configuring IP addresses, subnet masks, default routers, and other IP parameters to client PCs that don't have a static IP address. These computers locate a DHCP server in their local network that gives them an IP address so they can connect to the internet or other computers within the local network. (dhcp server) There are four way to allocate dynamic IP addresses: automatic, dynamic, roaming, and manual. Three of these (dynamic, roaming, and manual) use DHCP to assign the IP addresses. (DHCP Servers) There are a number of downsides to administering IP addresses statically. Foremost is human error. If the administrator mistypes the IP address or subnet mask, the workstation may not have connectivity to the resources it requires. If the DNS or WINS server IP addresses are mistyped, the workstation will not be able to perform name resolution. If the default......

Words: 486 - Pages: 2

Free Essay

Nt1330 Unit 1 Assignment 1

...EN1330 Client-Server Networking 2 Unit 1. Assignment 1 9/25/2014 A Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resources connected to the internet or a private network. It associates various information with domain names assigned to each of the participating entitles. It translates easily memorized domain names to the numerical IP addresses needed for the purpose of locating computer services and devices worldwide. The best way that I have been able to explain it, it works like a phone book for the internet by translating hostnames into IP addresses. But unlike a phone book, the DNS can easily be updated and quickly. The internet maintains two principal namespaces, the domain name hierarchy and the Internet Protocol address spaces. A DNS name server is a server that stores the DNS records for a domain name, such as (A or AAA) records, name server records, and mail exchanger records. A DNS name server responds with answers to queries against its database. The Dynamic Host Configuration Protocol is a Standardized networking protocol used in Internet Protocol networks for dynamically distributing network configuration parameters, such as IP addresses for interface and services. With DHCP computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually. DHCP is used by computers for requesting......

Words: 323 - Pages: 2

Premium Essay

Unit 2 Assignment Nt1330

...NT1330 Client Server Networking II Mr. Pham Unit 2 Assignment 1 Dear Junior Admin, Regarding your task with changing out the DHCP You can start by checking the workstations and seeing if they have an static IP setup on the network adapter. There are 2 ways to check this. The first way is to click on the run command in the start menu and type cmd and hit enter. Next type in ipconfig /all, depending on how many Network Interface Card or NIC cards are installed (both logically and virtually.) you might get a long list . Look for your main NIC card that you are configuring. Once you find your NIC card that you are looking for, you should see a line that says DHCP Enabled. If there is no static IP address set up then it should say yes. The second way to check is to open the control panel. Find and open the Network and Sharing Center. On the right hand side you should see an option for change adapter settings. Select you main NIC card and right click and select properties. Select and double click on Internet Protocol Version 4 (IPv4). Once the window pops up, make sure that both the radio buttons for obtain IP Address automatically are selected. You should also check to see if each workstation has renewed its DHCP lease. To do this you can repeat the steps in the first way to change the DHCP setup. Once again you want to look for your main NIC card that you are configuring. Once you find your NIC card that you are configuring you should see 2 lines that say Lease......

Words: 357 - Pages: 2

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a......

Words: 532 - Pages: 3

Premium Essay

Is3340 Unit 4 Assignment 1

...Identifying Types of Malware Infection 1) You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks, you suspect a malware attack. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? Rootkit and likely another type of malware – Closing all programs and still seeing disk usage would suggest that a rootkit has installed and is actively hiding the actual program running. The rootkit would hide the program while a virus or worm is likely behind the scenes wreaking havoc. 2) You download a new program to display the current weather on your desktop. Since you installed the weather application you noticed a lot of network activity and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? Trojan Horse – Acting as a useful program, it actually infects and runs amuck inside of the pc and network. 3) Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many......

Words: 407 - Pages: 2

Premium Essay

Nt1330 Unit 1 Assignment 1

...NT1330 Mr. Ajero Assignment 1 September 14, 2015 DNS – Domain Name System DNS is a hierarchical representation of all the IT devices and their sub-domains in a (company) network. So, in case you see an address like mail.subdomain.company.com, you can easily recognize the name of the system (mail), name of the sub-domain (sub-domain), name of the company (company) and the name of the primary domain (.com). DHCP – Dynamic Host Control Protocol A DHCP server automatically assigns the IP addresses for a device. Any device, before communicating with any other device in the network needs an IP address. These IP addresses are given to the network devices dynamically by a DHCP server (IP addresses ought to be within a certain range and the range is already specified). The IP addresses assigned this way are not permanent – they are actually leased for a certain amount of time to the devices (till they log-out of the network, for example). I believe that two hosts should be sufficient. Using a DHCP Relay Agent would greatly reduce the time necessary for me to set up the name allocation and resolution. If I were to do this manually on a static IP Address, I would have to put a stop to it at 25 machines as it would waste valuable time with trying to get to the other pieces of equipment my client owns. Regardless of if I was getting paid by the hour, I would need extra time for future maintenance and upgrades References DNS and DCHP......

Words: 276 - Pages: 2

Premium Essay

Acc555 Assignment 1 Unit 4

...Melanie Waghalter Johnson Unit 4 Assignment 1 Professor Cynthia Waddell ACC555: Fraud Examination “How to Steal a Million Dollar Without Taking the Cash” Seneca Staunton was an overwhelmed accounting clerk at Carlton Chemicals. His job was to deal with AR collection, customer service issues, process payments and keep the AR records straight. He was a quiet man who preferred to work alone than with others, and this was his down fall with Carlton Chemicals. The only time that Seneca was vocal was when his department was audited. He would get upset and complain about the added work load caused by the auditors. He would delay getting reports and other paperwork to them causing issues with completing the audit itself. When the reports finally got to the head auditor there were discrepancies in the reports. The senior auditor took her concerns to Seneca’s boss, Max Fairchild, because the reports would not reconcile and she was concerned. After being brought the discrepancies in the reports, Max spent several hours in trying to figure out what Seneca had done. He was unable to find if the money was missing by embezzlement or misapplied funds. All he knew at this point is that Seneca was the only one to apply the payments and that he was the one to answer the questions. Waiting until the next afternoon, Max spoke with Seneca who immediately admitted that he had misapplied the funds, but had not stolen any of the money. Max had decided to write a reprimand on Seneca stating...

Words: 868 - Pages: 4

Premium Essay

Nt1330 Unit 2 Assignment 1

...Unit 2 Assignment 1 DHCP troubleshooting Hello Junior Administrator, Let me clarify your parameters and intent… You have stated that you were tasked with changing the DHCP scope to match you IP addressing scheme. The IP address range you are using is 192.168.0.200 through 192.168.0.225. I have come up with a couple solutions and approaches to help you with your problem. First of all make sure you have typed all your numbers correctly. At times, a simple number incorrectly typed can throw the entire scheme off. Perform the same check for your subnet inputs as any slight number mistype will negate everything that you are trying to achieve. Make sure the scope is under the established DHCP local role IP address range on your assigned server. My next approach would be to see if there is connectivity between your user machines and the network. Make sure your network interface cards are all up to date and functioning. The other approach I will suggest can be involved if you’re not used to working with your command prompt however it’s doable with a detailed memo to your employees. I would have them release their IP addresses and renew them to through the console command input. I understand that most users may not have the required know how to do these tasks but for those I would actually go and input the commands manually and hopefully this will finally fix your problems. If you still encounter issues, please feel free to contact me and we can walk......

Words: 265 - Pages: 2

Premium Essay

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016,......

Words: 1067 - Pages: 5