Windows Server Deployment Proposal

Contoso Advertising has two locations. The main site location is in Pensacola, Florida (FL) with a smaller site in Casper, Wyoming (WY). Multiple servers will be distributed throughout these sites to support the various services required by each department. Throughout the growing enterprise, there will initially be 90 employees distributed into five departments between the two sites. Contoso has a small Executive department of 9 personnel, 15 employees in the Accounts and Sales department, 49 personnel staffing the Creative, Media, and Production department, 12 members of the Human Resources and Finance department and 5 IT employees. As FL is Contoso’s main site, the majority of employees will be based there with one-third of each department working out of the WY site to split company responsibilities between locations.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Windows Server 2012 will be the Operating System (OS) deployed to all servers within the organization due to a few key features. Firstly, the use of PowerShell within Windows Server 2012 will be very important to the management of Contoso’s network. Microsoft has vastly increased the number of available PowerShell cmdlets to allow for more robust management from the command line (Otey, 2011). This will allow the IT staff to manage company assets via command line interface and script out a majority of routine network management duties. Furthermore, Microsoft’s Server Manager utility can remotely manage multiple servers, up to 100 at a single time (Microsoft, 2013). This will allow the IT employees to manage the entire organization remotely without physically visiting each server as well as eliminating the need for the Remote Desktop Protocol (RDP) for management tasks. These two features in particular will simplify the network management for Contoso’s small IT support staff throughout both sites. Other features such as the use of Storage Tiers will be quite impactful for users throughout the organization, particularly the employees in the Creative, Media, and Production department. These are just a few features that Contoso can take advantage of within their organization.
Deployment and Server Configurations:
Contoso’s network will be constructed with 24 total servers throughout the enterprise to handle organizational growth over the next few years while being configured to have robust failover solutions. This will be done to ensure the company can recover from any single failure while still fulfilling their organizational goals. Services for Contoso’s daily operations, such as Domain Controllers, Dynamic Host Control Protocol (DHCP), Domain Name Servers (DNS), file servers, web servers and print servers will be provided by these servers. In addition, both sites will be mirrored to allow each site to function if the WAN link between the sites happens to go down, but also for organizational purposes and ease of management by the small IT department. If implemented properly, Contoso’s enterprise network can scale to their expected growth while having incredibly high reliability.
The main FL site will have two Domain Controllers FL_DC1 and FL_DC2. The primary domain controller, FL_DC1, will be configured to run Domain Name Services (DNS), Dynamic Host Control Protocol (DHCP) as well as performing the role of Domain Controller. FL_DC2 will be a copy of FL_DC1 and will act as a backup in case of corruption or server failure. Both Domain Controllers will run the Server Core version of Windows Server with the graphical user interface (GUI). The Active Directory role will need to be installed to provide Directory Services along with being able to organize and manage the organization through the use of group policy discussed later in the proposal. Additionally, FL_DC2 will be designated as a Global Catalogue to aid in any type of searching to be done throughout the other site, decreasing the burden on the primary DC.  A full chart of needed servers and their intended purpose can be seen below.

Server

Role

Location

FL_DC*

Primary/Secondary Domain Controller/DNS/DHCP Server

Pensacola, Florida

FL_FS_HRF*

Primary/Secondary HRF File Server

Pensacola, Florida

FL_FS_CMP*

Primary/Secondary CMP File Server

Pensacola, Florida

FL_FS*

Primary/Secondary File Server/Print Server

Pensacola, Florida

FL_MX*

Primary/Secondary Mail Server

Pensacola, Florida

FL_WWW*

Primary/Secondary Web Server

Pensacola, Florida

WY_DC*

Primary/Secondary Domain Controller/DNS/DHCP Server

Casper, Wyoming

WY_FS_HRF*

Primary/Secondary HRF File Server

Casper, Wyoming

WY_FS_CMP*

Primary/Secondary CMP File Server

Casper, Wyoming

WY_FS*

Primary/Secondary File Server/Print Server

Casper, Wyoming

WY_MX*

Primary/Secondary Mail Server

Casper, Wyoming

WY_WWW*

Primary/Secondary Web Server

Casper, Wyoming

As the Human Resources and Finances department will be dealing with highly sensitive financial data for the company, they will have their own exclusive file server, FL_FS_HRF1, which will be backed up to FL_FS_HRF2. Full backups will be conducted weekly with differential backups occurring every night. Shares will be hosted on this server with permissions applied to only allow members of the Human Resources and Finances department access to any resources on it.

Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

The other department to have their own dedicated file servers is the Creative, Media, and Production employees. Similar to the Finance department, there will be a primary server and a backup, FL_FS_CMP1 and FL_FS_CMP2. These servers will also follow the same backup schedule as the Finance department as well as having its share accesses locked down to only those employees within the department. Storage pools will be created to implement storage tiers on the primary file server. Multiple traditional mechanical hard disk drives (HDD) and solid state drives (SSD) will be assigned to the storage pool. The SSD tier will be configured to house the most frequently accessed data while the HDD tier will house data accessed less often. The storage tier optimization task will be scheduled to run every evening during off hours.
The rest of the personnel at the FL site will use a single file server FL_FS1, which will also be backed up to FL_FS2 in a manner similar to the Finance and Creative departments. Storage on this server will be split among the other departments and quotas will be enforced using the File Server Resource Manager (FSRM). Using this method of quota management will allow the IT department to centrally control and monitor the daily storage resources and generate storage reports to analyze disk usage trends (Microsoft, 2008). Users will be set up for home folders nested under their respective department share with access being granted only to those members of the department, and each user of that department only having access to their own personal folder through application of NTFS permissions. Users will all be given the same amount of space initially and expansion requests will be scrutinized. Due to the more advanced features of FSRM as compared to NTFS quotas, administrative notification scripts can be set to run when a user nears their allocated quota limit (Microsoft, 2008). The IT department will implement a semi-automated process with administrative scripts once these quotas are met to trigger a quota increase request process. All file servers in the network will be installed with Server Core with the GUI.
Having a public presence on the internet will be crucial for Contoso to gain new clients and allow their business to grow over the next few years. Company mail servers will also be needed to communicate internally and interface with their customers as well. The FL site will have their own dedicated mail and web servers, with FL_MX1 and FL_WWW1 acting as primary, and FL_MX2 and FL_WWW2 being mirrored backups for their respective roles. These servers will run the Server Core edition of Windows Server 2012 because of its stability improvements as well as it being inherently more secure than other editions of Windows Server due to far less running services than full GUI versions (Microsoft, 2017). Public facing assets, such as mail or web servers, are often the first point of cyber-attacks and Server Core will decrease the attack footprint.
The WY site will have the exact same configuration as the primary FL site as seen in the network diagram below. Backup solutions and fault tolerance were built-in to this proposal to prevent downtime for the network and prevent monetary loss for the company. In the event that any one node within the network fails, Contoso can continue with their day to day operations while resolutions are developed and implemented by the IT department. This configuration was chosen to have the maximum reliability and fault tolerance which will be crucial for a growing organization. A simplified diagram of Contoso’s network can be seen below to illustrate how their network could be structured to accomplish the goals of this deployment proposal.
NETWORK DIAGRAM

Active Directory and Group Policy:
Contoso’s network will have two domains within a single forest, one for each site. The FL site will be contoso.com and the WY site will be north.contoso.com with each new site that Contoso builds in the future following a similar structure. Domain Controllers will be placed in each site for management within their domain. Organizational Units (OU) will be used for organization with Active Directory with each department having their own OU nested under their domain. Active Directory objects will be created for each user and will be organized by job role and placed into their respective OUs. Computer objects within Active Directory will follow a similar structure. This is to ensure proper organization, application of Group Policy, and ease of network management throughout the domain.
Software programs needed throughout the organization will be deployed through the use of group policy, if the number of employees that require it are high enough or it is not feasible for the IT department to physically visit every computer for installation. This can be done with the group policy management console within Windows Server. Packages can be configured that will deploy .msi files and will be installed upon next computer reboot, if the policy was configured under the computer configuration section of the GPO management editor. Programs like Adobe Reader, Photoshop, and QuickBooks could be deployed to different departments while Wireshark or Zenmap could be deployed to different servers throughout the network for traffic analysis. Software restriction policies will also be used in the domain as they will be able to control execution of software at the discretion of the network administrators (Microsoft, 2004). Using these policies, the IT department can configure the environment to prevent unauthorized programs at their discretion based on a hash, certificate, path, or zone identifiers.
To maintain a high level of security throughout the enterprise, a strong password policy will be strictly enforced. Strong passwords that are often changed will be used as passwords are continuously vulnerable, especially during password assignment, management, and use (Microsoft, 2017). Contoso employees will be required to have a password of at least 10 characters in length with a mixture of mixed case characters, special characters, and numbers. Password age thresholds will be set in the password policy for a maximum age of 45 days and a minimum age of 30 days. A password history of 10 will be set to prevent users from cycling back to previously used passwords quickly. This will ensure that if any user credentials are compromised, they won’t be of use to an undetected malicious user for long.
In addition to the general password policy just discussed, the administrators will also be subject to a fine-grained password policy for security reasons. Fine-grained password policies will allow for multiple password policies to affect different users throughout a domain (Microsoft, 2012). Contoso will be able to use this feature of Windows Server to enforce stronger password restrictions upon select users, the IT department in this situation. Additional complexity, password history, minimum and maximum password ages, as well as increased password length requirements will be enforced upon these employees to protect the corporate network. In the event of a network breach, accounts with high power or permissions, such as the members of the IT department, will be the first group to be targeted by malicious users. By having frequently changing and complex passwords, this will increase the time for passwords to be cracked as well as shorten the available time for them to be used by malicious cyber actors.
Additional security measures to be enforced will include the disabling of user accounts after 10 days of no activity. Account deletion will occur after 30 days of inactivity, unless prior arrangement is made through the IT support department. This will be done to ensure access to network and company resources remain secure from malicious attacks. Furthermore, account logon hours will be applied as determined by the employees’ regular work hours with an hour of buffer time at the start and end of their regular work day.
In addition to the hardware firewalls already in place, the use of Windows Firewall will be applied to each computer within the organization through group policy and rules will be tailored to each department. For example, outbound traffic from the Human Resources and Finance department user workstations to the Creative, Media, and Production file server will be blocked. Special precautions for the public facing infrastructure, such as the mail and web servers, will have extra restrictions placed on them for additional security. For example, incoming ICMP traffic from the public internet will be blocked to prevent against Denial of Service (DOS) attacks. Windows Defender will also be active on all employee workstations throughout the enterprise as well as all servers. The right configuration of the hardware and software firewalls and Microsoft’s security product should protect Contoso from numerous cyber threats. These are just a few policies laid out to begin the hardening of the network and the IT department will develop others as they see fit.
Print Services:
The print and document services role will be installed on the primary file server at each site, FL_FS1 and WY_FS1, with multiple print devices located throughout the environment. Specifically, there will initially be two print devices located within each department to accommodate printer pooling as a means of load balancing the print jobs between the many users. Any employee will be able to print to other print devices outside of their department, but they will have a lower priority than employees utilizing their own department resources.
DNS and DHCP:
IPv4 addresses will be used throughout the organization for simplicity of management as that is still widely used today. In the future when Contoso grows and global adoption rates of IPv6 increase, reconsideration of addressing will take place. As there will be many network-critical devices throughout the enterprise network, such as file servers, printers, and domain controllers, these computers will all be assigned static IP addresses rather than have DHCP reservations. This will be done to ensure that critical devices are always reachable in case of a DHCP failure. Other devices such as employee workstations, company laptops, or other mobile devices will have address management performed through the use of DHCP. Scopes will be configured to have lease durations of 16 hours. This will ensure that an address assignment covers a full work day while still being short enough to prevent the pool of available addresses from running low from mobile devices entering and leaving the network throughout the day. DNS and DHCP services will be handled by the primary domain controllers of each site, respectively. Those servers will also act as a backup for their sister servers in the opposite site for failover solutions in the event of server failure or corruption. The 80/20 rule will be applied within each scope; the primary DHCP server provides roughly 80% of the addresses within its scope with the secondary providing the remaining addresses. This will be done to provide address assignment in situations where the primary DHCP server is unable to fulfill its services (Microsoft, 2005).
Summary:
In summary, the network infrastructure and hardware will be set up at both sites in a mirrored fashion to provide ease of management for the IT department in addition to allowing for easy growth over the next few years. The multiple domains and logical structure of active directory will ease the burden of organization and administration of the enterprise network. Each server will have a dedicated backup server for cases of machine failure, corruption, or other disaster. Security practices such as the password policy, use of Windows security software, and additional firewall restrictions will ensure that the company sensitive business matters are protected. Estimating conservatively, the IT department could complete the initial setup within a week. While this network deployment may seem excessive, Contoso Advertising is a growing enterprise that requires a solution that will be able to scale as their organization grows.
 
References
Manage Multiple, Remote Servers with Server Manager. (2013, June 24). Retrieved January 10, 2017, from https://technet.microsoft.com/en-us/library/hh831456(v=ws.11).aspx
Microsoft. (2008, January 21). File Server Resource Manager. Retrieved February 01, 2017, from https://technet.microsoft.com/en-us/library/cc754810(v=ws.10).aspx
Microsoft. (2017). Why Is Server Core Useful? Retrieved January 18, 2017, from https://msdn.microsoft.com/en-us/library/dd184076.aspx
Microsoft. (2017). Configuring Password Policies. Retrieved February 09, 2017, from https://technet.microsoft.com/en-us/library/dd277399.aspx
Microsoft. (2005, January 21). Best Practices. Retrieved February 20, 2017, from https://technet.microsoft.com/en-us/library/cc958920.aspx
Microsoft. (2012, October 19). AD DS: Fine-Grained Password Policies. Retrieved February 25, 2017, from https://technet.microsoft.com/en-us/library/cc770394(v=ws.10).aspx
Microsoft. (2004, May 25). Using Software Restriction Policies to Protect Against Unauthorized Software. Retrieved February 25, 2017, from https://technet.microsoft.com/en-us/library/bb457006.aspx#EEAA
Otey, M. (2011, October 17). Top 10: New Features in Windows Server 2012. Retrieved January 10, 2017, from http://windowsitpro.com/windows-server-2012/top-10-new-features-windows-server-2012

Client Server Network Architecture Essay

Abstract
This report is about the client server network architecture in which each computer or process on the network is either a client which is low end computer which request services and or a server which is high end powerful computer which is highly capable of providing services to many different clients at the same time. The task which servers performs are like managing disk drives which are called file servers, managing printers which are called print servers or managing network data traffic known as network server. Clients are PCs which require or use these facilities from servers which include sharing files, printers, storage and sometimes processing. All the clients and servers in a network communicate by using different protocols which are set of rules or standards which govern the communication between any computers or devices connected in a network. This client server architecture is also known as two-tier architecture.(1)

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Introduction
The advent of personal computers gave birth to the idea of client/server architecture. Before personal computers, programs were written for mainframes. Software written for mainframes was often coded in a monolithic format that is the user interface, business logic and data access functionality are all contained in a single application. Because the entire application ran within the mainframe this was not a problem.(2)
Client/server model, needed to share many kind of services. As time passed the need of these services increased so servers also evolved. Many clients started sharing services of common server. Example can be of our web browser which is a client and requests services from web server like web pages or files. This is sometime also knows as Hyper Text Transfer Protocol server (HTTP) also for computer to make requests like a client Transfer Control Protocol/Internet Protocol (TCP/IP) and for transfer of files over internet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more nodes in a network.(3)
The relationship between two computer programs in which one program makes a request and other which provide the required service is called a client/server relationship. It is a backbone of interconnection of two or more programs or computers anywhere across the network. Example could be an ATM machine in which we send request for balance check or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is sent back to the client to display in front of user.(4)
Client Server Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the application will be on the server instead of client because server has more disk space and power as compare to PC also the data will also be in server along with the application. In three-tier architecture the load is divided between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less contention system for resources will be available because each server will be used either to process data or application requests.(6)
Literature Review
In modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of faster and better network system growing tremendously companies are bound to upgrade their system every six months. Now Hures is also facing same problems. This is very common problem in any company because of the rapid development of business systems so to cater these problems any company should keep this in mind while developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that even internal and external environment is affecting the company.

The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for flexibility of coping with these changes. However it comes with its own challenges which we will discuss here.

 

Client/Server is built on three basic building block they are client which is a small or less capable hardware or software then middleware which is a software which lies in between and server more powerful then client.
The first block client runs different applications on its operating system which provides graphic user interface. Clients could have web browser for example as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distributed System Management) it could be simple element to the entire front-end managing application.
Middleware is application which has three categories: transport stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture.
Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which can be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network.

 

The additional server like email could be used depending on size and usage of the network. Hures could also use similar OS in all workstations it also plays very important part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less strain on servers.

 

The Alternative architecture which could overcome Hures problem can be client queue client or another one called peer to peer architecture. Client queue client Architecture is also called passive queue Architecture.
In Client queue client all points including servers are simple clients. It was developed to continue on traditional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this track and order number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results.
Peer-to-Peer Architecture rather than focusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the network. This architecture goes against previous client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to repair or upgrade without clients being affected and it’s more secure and easy to maintain.

 

Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only authorize data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or World Wide Web (WWW) but is only restricted to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customizable so it’s your preference whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. Any outside person trying to access company files will be blocked by firewalls.

 

The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications such as newsletters, policy manuals, and price list etc. It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet it’s safer and secured because only authority can access the website.
The Disadvantages of this intranet to be considered would be like firstly it is very expensive to setup and maintain because a special team of people need to be hired and trained for handling the process of managing resources of this particular company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall budget for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be done at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget.

 

It is very true that the popularity of intranet software and the internet pose threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the most advantage of networking technology in the business world and because it enables us to take full use of wireless and internet technology at the same time it is the most flexible most secure and gives more privacy as compared to offered by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in consideration that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As far as security is considered there are always threats to any open network system. To reduce the risk of infiltration from outside sources proper monitoring of network on continues level is severely needed. The most important aspect of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use their plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the unplanned damages to revenue but again the cost of doing all these procedures will be substantial.

 

Migration Plan from UNIX to Microsoft Server

Data Migration is the process of transferring data between different storage types, servers or formats. It’s not just about copying data, but also about validating the data according to constraints and since different databases uses different data types, this step also include modifying the data as per the target server. One essential requirement is that the data migrated should verify the Business logic to run applications smoothly on target server.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

Migrating from one server to another can be a tricky situation. There are various challenges while migration of full data from UNIX server to Microsoft Server. First of all the user should completely understand the data sources and their proper formats. Usually, too many spreadsheets or excel files, or redundant data may affect proper migration. Wherever possible, instead of manual, automated systems should be used. Microsoft offers MAP (Microsoft Assessment and Planning) tool to identify the various constraints, or issues that might occur while migrating from UNIX platform to Microsoft server. Moreover, SSMA (SQL Server Migration Assistant) can further help in performing the migration. SSMA can create mapped schemas to UNIX server, which helps in easy migration of data.
It is essential that the all applications like email, finance systems, personal records, CAD/CAM engineering facilities, production systems, Sales & Marketing databases, Website etc. should run smoothly after migration. There are various underlying steps that need to be taken care of for easy and error-free migration, as explained below:

Recognizing the pattern-Template Creation: To begin migration, first we’ll have to understand the schema of UNIX database. We’ll create a template consisting of master data key objects. The template has following two sections:

Section 1: Key Data Fields: In the first section of the template user will provide the key values, such as storage objects material, address etc. Usually, in key field columns, drop-down lists are provided for accurate and easy entry of data.
Section 2: Derived and Default Fields:Based on the key field values, various fields can be derived based on the Business translational logic. For example, using the production unit key field the template will determine the employee names working in it. For different production units, different employee names will be automatically derived by the template.
The default fields like, “currency used” will be automatically updated.

Process of Migration: The process of migration is summarized on the figure below:

Figure-1 (Source: Ranga Rao Davala, Nikhil Singh, 2011, A Case Study on Data Migration Strategy, The Data Administration Newsletter, Robert Seiner Publishers.)

Select Source:Due to various applications running on UNIX server, the data will be spread across many sources like different DBs, excel files or spreadsheets. In this step, user will identify the various data sources that are to be migrated. The selection of sources will be based upon the requirements in the project, according to which what data needs to be migrated can be identified.
Data Fields Mapping:This is an essential step, where the schema or key fields from source system are mapped to target system. The field names in target schemas should be kept similar to source schema for easy mapping. This step is usually done manually for error-free mapping. Usually the different database servers will have different underlying data types. For example, Integer’s maximum and minimum limit in UNIX server is different from in SQL Server. The mapped data, therefore, should be transformed according to destination server data types.
Data Transformation:This is where the template we created will come in picture. User will manually enter the key field values in the template and based on that all the derived and default field values will be generated automatically. Moreover, in this step, the user will transform the data based on the difference between data types of both servers.
Validations and Constraints:This step is to ensure that the data entered in the template is accurate. The template will gray out the field which are entered wrong or doesn’t qualify the constraints, such as mandatory fields, null values etc. This step will help in minimizing errors and improving the quality of data.
Extract Files:Once the data is entered into the template, the master data objects are extracted or generated.
Load files:The load files are in text format, and they can be generated in single click by macro-enabled extract files system. This step ensures that data present in the text file is in exactly the same format as we require in the Microsoft system.
Loading data in Microsoft Server:The data is loaded in batches. Since there are multiple applications running on UNIX system that are to be migrated, this step may take several hours to complete.

Web server migration (FTP or HTTP Websites)
Once we have completed the initial steps of creating a template and selecting the proper migration tools, we can begin full migration from UNIX to Microsoft server i.e. IIS. We must follow following steps:

Assessment of hardware requirements and acquiring new hardware if required.
We can begin migrating FTP or HTTP websites by copying their content to destination server.
Next step is to replicate Web application files to destination.
Migration of log files.
Migration of Web server configuration settings.
The last step is to create security settings and user permission and roles.

DHCP/DNS Migration:
The process of migrating UNIX server DHCP/DNS services to Microsoft Windows Server DHCP/DNS servers requires the following steps:

Install Microsoft Windows Server DHCP/DNS Services Manually
Configure Microsoft Windows Server DHCP/DNS Services
Create Forward and Reverse Lookup Zones: Creating lookup zones will make sure that Microsoft server is authoritative for the DHCP/DNS names for local resources and forwards other queries to an ISP or performs recursive resolutions.
Add secondary zones to Microsoft Windows Server DHCP/DNS for the existing zones that are hosted on UNIX based DHCP/DNS servers.
In this step we’ll initiate zone transfers at the Microsoft Windows Server-based DHCP/DNS servers to transfer the zones from the UNIX servers.
After the transfers are successful we will convert secondary zones into primary zones.
In the last step, we’ll point client configurations to Microsoft Windows based DHCP/DNS Servers.

Avoiding downtime while migrating:
We can avoid the downtime while migration by reconfiguring our sites to connect to our new database remotely. Using this way, our users or visitors will be redirected to new site and all the updates will be saved to new server. This technique is, though, very complex, but it will minimize the downtime to a great extent. We can summarise this process in following steps:

Transfer the files, DBs and important settings to the new server.
Then we can test our site on the new server to check if it’s working as expected.
After two steps are successfully completed, we will change the various database settings on our site, to make sure that the old server accesses the DB from the new server.
Then we’ll modify the name servers and DNS and point them to the new server.

 

Allocation of Resources in Cloud Server Using Lopsidedness

B. Selvi, C. Vinola, Dr. R. Ravi

Abstract– Cloud computing plays a vital role in the organizations resource management. Cloud server allows dynamic resource usage based on the customer needs. Cloud server achieves efficient allocation of resources through virtualization technology. It addresses the system that uses the virtualization technology to allocate the resources dynamically based on the demands and saves energy by optimizing the number of server in use. It introduces the concept to measure the inequality in multi-dimensional resource utilization of a server. The aim is to enlarge the efficient resource utilization system that avoids overload and save energy in cloud by allocating the resources to the multiple clients in an efficient manner using virtual machine mapping on physical system and Idle PMs can be turned off to save energy.
Index Terms-cloud computing, resource allocation, virtual machine, green computing.
I. Introduction
In cloud computing provides the service in an efficient manner. Dynamically allocate the resources to multiple cloud clients at the same time over the network. Now-a-Days many of the business organizations using the concept of cloud computing due to the advantage with resource management and security management.
A cloud computing network is a composite system with a large number of shared multiple resources. These are focus to unpredictable needs and can be affected by outside events beyond the control. Cloud resource allocation management requires composite policies and decisions for multi-objective optimization. It is extremely difficult because of the convolution of the system, which makes it impracticable to have accurate universal state information. It is also subject to continual and unpredictable communications with the surroundings.
The strategies for cloud resource allocation management associated with the three cloud delivery models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), differ from one another. In all cases, the cloud providers are faced with huge, sporadic loads that contest the claim of cloud flexibility.
Virtualization is the single most efficient way to decrease IT expenses while boosting effectiveness and liveliness not only for large enterprise, but for small and mid budget organizations also.
Virtualization technology has advantages over the following aspects.

Run multi-operating systems and applications on a single computer.
Combine hardware to get hugely higher productivity from smaller number of servers.
Save 50 percent or more on general IT costs.
Speed up and make things easier IT management, maintenance, and the consumption of new applications.

The system aims to achieve two goals:

The capability of a physical machine (PM) should be enough to satisfy the resource requirements of all virtual machines (VMs) running on it. Otherwise, the Physical machine is overload and degrades performance of its VMs.
The number of PMs used should be minimized as long as they can still satisfy the demands of all VMs. Idle physical machine can be turned off to save energy. There is an intrinsic exchange between the two goals in the face of altering resource needs of VMs.

For overload avoidance, the system should keep the utilization of PMs Low to reduce the possibility of overload in case the resource needs of VMs increase later.
For green computing, the system should keep the utilization of PMs reasonably high to make efficient use of their energy.
It presents the design and implementation of an efficient resource allocation system that balance between the two goals. The following aids are,

The development of an efficient resource allocation system that avoids overload in the system effectively while minimizing the number of servers use.
To introduce the concept of “lopsidedness” to measure the uneven utilization of a server.
By minimizing lopsidedness, the system improves the overall utilization of servers in the face of multidimensional resource constraints.
To implement a load prediction algorithm that can capture the future resource usages of applications accurately without looking inside the VMs.

Fig.1 System Architecture
II. System Overview
The architecture of the system is presents in Fig.1. The physical machine runs with VMware hypervisor (VMM) that supports VM0 and one or more VMs in cloud server. Each VM can contain one or more applications residing it. All physical machines can share the same storage space.
The mapping of VMs to PMs is maintains by VMM. Information collector node (ICN) collects the information about VMs resource status that runs on VM0. The virtual machine monitor creates and monitors the virtual machine. The CPU scheduling and network usage monitoring is manage by VMM.
Assume with available sampling technique can measure the working set size on each virtual machine. The information collects at each physical machine and passes the information to the admin controller (AC). AC connects with VM Allocator that activated periodically and gets information from the ICN resource needs history of VMs, and status of VMs.
The allocator has several components. The Indicator Indicates the future demands of virtual machine and total load value for physical machine. The ICN at each node attempts to satisfy the input demands locally by adjusting the resource allocation of VMs sharing the same VMM.
The hotspot remover in VM allocator spots if the resource exploitation of any PM is above the Hot Point. If so, then some VMs runs on the particular PM will be move away to another PM to reduce the selected PM load.
The cold spot remover identifies the system that is below the average utilization (Cold point) of actively used PMs. If so, then it some PMs turned off to save energy. Finally, the exodus list passes to the admin controller.
III. The Lopsidedness Algorithm
The resource allocation system introduces the concept of lopsidedness to measure the unevenness in the utilization of multiple resources on a server. Let consider n be the number of resources and let consider ri be the exploitation of the ith resource. To define the resource lopsidedness of a server p by considering r is the average utilization of resources in server p. In practice, not all types of resources are performance critical and then consider bottleneck resources in the above calculation. By minimizing the lopsidedness, the system can combine different types of workloads nicely and improve the overall utilization of server resources.
A. Hot and Cold Points
The system executes periodically to evaluate the resource allocation status based on the predicted future resource demands of VMs. The system defines a server as a hot spot if the utilization of any of its resources is above a hot threshold. This indicates that the server is overloaded and hence some VMs running on it should be migrated away.
The system defines the temperature of a hot spot p as the square sum of its resource utilization beyond the hot threshold. Consider R is the set of overloaded resources in server p and rt is the hot threshold for resource r. (Note that only overloaded resources are considered in the calculation.) The temperature of a hot spot reflects its degree of overload.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

If a server is not a hot spot, its temperature is zero. The system defines a server as a cold spot if the utilizations of all its resources are below a cold threshold. This indicates that the server is mostly idle and a potential candidate to turn off to save energy. However, the system does so only when the average resource utilization of all actively used servers (i.e., APMs) in the system is below a green computing threshold. A server is actively used if it has at least one VM running. Otherwise, it is inactive. Finally, The system define the warm threshold to be a level of resource utilization that is sufficiently high to justify having the server running but not so high as to risk becoming a hot spot in the face of temporary fluctuation of application resource demands.
Different types of resources can have different thresholds. For example, the system can define the hot thresholds for CPU and memory resources to be 90 and 80 percent, respectively. Thus a server is a hot spot if either its CPU usage is above 90 percent or its memory usage is above 80 percent.
B. Hot Spot Reduction
The system sort the list of hot spots in the system in descending temperature (i.e., the system handle the hottest one first). Our goal is to eliminate all hot spots if possible. Otherwise, keep their temperature as low as possible. For each server p, the system first decides which of its VMs should be migrated away. The system sort its list of VMs based on the resulting temperature of the server if that VM is migrated away. The system aims to migrate away the VM that can reduce the server’s temperature the most. In case of ties, the system selects the VM whose removal can reduce the lopsidedness of the server the most. For each VM in the list, the system sees if the system can find a destination server to accommodate it. The server must not become a hot spot after accepting this VM. Among all such servers, the system select one whose lopsidedness can be reduced the most by accepting this VM. Note that this reduction can be negative which means the system selects the server whose lopsidedness increases the least. If a destination server is found, the system records the migration of the VM to that server and updates the predicted load of related servers. Otherwise, the system moves onto the next VM in the list and try to find a destination server for it. As long as the system can find a destination server for any of its VMs the system consider this run of the algorithm a success and then move onto the next hot spot. Note that each run of the algorithm migrates away at most one VM from the overloaded server. This does not necessarily eliminate the hot spot, but at least reduces its temperature. If it remains a hot spot in the next decision run, the algorithm will repeat this process. It is possible to design the algorithm so that it can migrate away multiple VMs during each run. But this can add more load on the related servers during a period when they are already overloaded. The system decides to use this more conservative approach and leave the system some time to react before initiating additional migrations.
IV. System Analysis
In Cloud Environment, the user has to give request to download the file. This request will be store and process by the server to respond the user. It checks the appropriate sub server to assign the task. A job scheduler is a computer application for controlling unattended background program execution; job scheduler is create and connects with all servers to perform the user requested tasks using this module.
In User Request Analysis, the requests are analyze by the scheduler before the task is give to the servers. This module helps to avoid the task overloading by analyzing the nature of the users request. Fist it checks the type of the file going to be download. The users request can be the downloading request of text, image or video file.
In Server Load value, the server load value is identifies for job allocation. To reduce the over load, the different load values are assign to the server according to the type of the processing file. If the requested file is text, then the minimum load value will be assign by the server. If it is video file, the server will assign high load value. If it is image file, then it will take medium load value.
In Server Allocation, the server allocation task will take place. To manage the mixed workloads, the job-scheduling algorithm is follow.
In this the scheduling, depends upon the nature of the request the load values are assign dynamically. Minimum load value server will take high load value job for the next time. High load value server will take minimum load value job for next time. The aim is to enlarge the efficient resource utilization system that avoids overload and save energy in cloud by allocating the resources to the multiple clients in an efficient manner using virtual machine mapping on physical system and Idle PMs can be turned off to save energy.

Fig. 2 Comparison graph
IV. Conclusion
It presented by the design, implementation and evaluation of efficient resource allocation system for cloud computing services. Allocation system multiplexes by mapping virtual to physical resources based on the demand of users. The contest here is to reduce the number of dynamic servers during low load without sacrificing performance. Then it achieves overload avoidance and saves energy for systems with multi resource constraints to satisfy the new demands locally by adjusting the resource allocation of VMs sharing the same VMM and some of not used PMs could potentially be turn off to save energy. Future work can on prediction algorithm to improve the stability of resource allocation decisions and plan to explore using AI or control theoretic approach to find near optimal values automatically.
References
[1] Anton Beloglazov and Rajkumar Buyya (2013), ‘Managing Overloaded Hosts For Dynamic Consolidation of Virtual Machines In Cloud Data Centers Under Quality of Service Constraints’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 7, pp. 1366-1379.
[2] Ayad Barsoum and Anwar Hasan (2013), ’Enabling Dynamic Data And Indirect Mutual Trust For Cloud Computing Storage Systems’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 12, pp. 2375-2385.
[3] Daniel Warneke, and Odej Kao (2011), ‘Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud’, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 6, pp. 985-997.
[4] Fung Po Tso and Dimitrios P. Pezaros (2013), ‘Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1139-1147.
[5] Hong Xu, and Baochun Li (2013), ‘Anchor: A Versatile and Efficient Framework for Resource Management in The Cloud’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1066-1076.
[6] Jia Rao, Yudi Wei, Jiayu Gong, and Cheng-Zhong Xu (2013), ‘Qos Guarantees And Service Differentiation For Dynamic Cloud Applications’, IEEE Transactions on Network and Service Management, Vol. 10, No. 1, pp. 43-54.
[7] Junwei Cao, Keqin Li,and Ivan Stojmenovic (2013), ‘Optimal Power Allocation and Load Distribution For Multiple Heterogeneous Multicore Server Processors Across Clouds and Data Centers’, IEEE Transactions on Computers, Vol. 32, No. 99, pp.145-159.
[8] Kuo-Yi Chen, Morris Chang. J, and Ting-Wei Hou (2011), ‘Multithreading In Java: Performance and Scalability on Multicore Systems’, IEEE Transactions On Computers, Vol. 60, No. 11, pp. 1521-1534.
[9] Olivier Beaumont, Lionel Eyraud-Dubois, Christopher Thraves Caro, and Hejer Rejeb (2013), ‘Heterogeneous Resource Allocation Under Degree Constraints’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 5, pp. 926-937.
[10] Rafael Moreno-Vozmediano, Ruben S. Montero, and Ignacio M. Llorente (2011), ‘Multicloud Deployment Of Computing Clusters For Loosely Coupled MTC Applications’, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 6, pp. 924-930.
[11] Sangho Yi, Artur Andrzejak, and Derrick Kondo (2012), ‘Monetary Cost-Aware Checkpointing And Migration on Amazon Cloud Spot Instances’, IEEE Transactions on Services Computing, Vol. 5, No. 4, pp. 512-524.
[12] Sheng Di and Cho-Li Wang (2013), ‘Dynamic Optimization of Multiattribute Resource Allocation In Self-Organizing Clouds’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 3, pp. 464-478.
[13] Xiangping Bu, Jia Rao, and Cheng-Zhong Xu (2013), ‘Coordinated Self-Configuration of Virtual Machines And Appliances Using A Model-Free Learning Approach’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 4, pp.681-690.
[14] Xiaocheng Liu, Chen Wang, Bing Bing Zhou, Junliang Chen, Ting Yang, and Albert Y. Zomaya (2013), ‘Priority-Based Consolidation Of Parallel Workloads In The Cloud’, IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1874-1883.
[15] Ying Song, Yuzhong Sun, and Weisong Shi(2013), ‘A Two-Tiered On-Demand Resource Allocation Mechanism For VM-Based Data Centers’, IEEE Transactions on Services Computing, Vol. 6, No. 1, pp. 116-129.
 
­­­
 

Managing Virtual Environments: Server Comparison

Table of Contents

Physical Server and Specifications

Vendor Selection

Hypervisor Comparison

VMware 6.5

Hyper-V 2016

VCenter deployment

Physical Server

Virtual Server

VMware VSphere Cluster settings

VSphere DRS Cluster with FT enabled

VSphere HA Cluster

DPM – Distributed Resource Schedule

VM Specifications

Virtual Machine Placement

Storage Requirements

VMFS DATASTORE

ISCSI Storage Protocol

ISCSI Storage design and configuration

Backup Solution

I have calculated the Hardware by researching the Average requirements for each server and allowed 20% for growth

Server Type

QTY

CPU

Total CPU

RAM

Total RAM

NIC

Total NIC

Mail Servers

5

2

10

2

10

1

5

Active directory

4

2

8

2

8

1

4

Windows File Server

10

2

20

6

60

1

10

Web Servers

8

2

16

6

48

1

8

Database Servers

4

2

8

4

16

1

4

Linux Servers

6

2

12

2

12

1

6

Total

37

 

74

 

154

37

Growth 20%

18

31

8

Total incl Growth

 

 

92

 

185

45

Server Hardware Vendor Comparison 

For vendor comparison I looked at the top two Server hardware vendors globally  

Dell 

Pros. Dell assembles and tests the hardware before shipping whereas HPE ship in parts and requires assembly and testing onsite which will be an extra workload on the Local team. (Schaller, 2018) 

Dell has Improved Manageability and Serviceability by integrating with industry leading management consoles like VMware and Hyper-V.  With Dell OpenManage Integrations with vCenter you can auto-detect a new server and automate the configuration of the new server and install the Operating system from the vCenter console. Dell offers excellent warranty and support and has many add on packages to support Enterprise business and offers user friendly services for support and hardware and warranty lookup.  Dell ProSupport Plus with SupportAssist technology resolves problems 90% faster than systems covered by standard warranty. (EdisonGroupInc, 2018) 

Dell enterprise support is noted as being one of the best  

Cons. Lead times can be longer for custom built Servers and very minimal flexibility with pricing. (Schaller, 2018) 

HPE 

Pros.  HPE provide predictive alerts for parts that may fail allowing you to replace before impacting on production environments. Ordering of hardware is done through HPE OneView management tools and use plug-ins to integrate with management tools for VMware vCenter and Hyper-V 

Cons. HPE ship hardware in pieces and needs to be put together onsite and tested which takes additional resources for IT teams, also their supply chain for replacement parts is not always reliable and their website can be difficult to navigate for information and support (Schaller, 2018) 

OneView integration with VMware and Hyper-V main activities for configuration and tuning requires the witching between two systems. Firmware updates require additional tools such as HPE System Update Manager (EdisonGroupInc, 2018) 

Comparing Dell and HPE with respect to compatibility and support Dell is the more obvious choice considering that their integration with Hypervisor choice of VMware allows for seamless management compared to HPE. The fact that Dell ships hardware already configured and tested is also a big plus and will reduce the workload of the local IT team. 

Hosts

3 plus 1 for redundancy

Model

Dell PowerEdge

No of CPU

2

Cores Per CPU

8 Cores

Network

2 x 10GE

Memory

2 x 32 DIMM

VMware ESXi

Vmware 6.5 build

Hypervisor Comparison

The following is an outline of the significant improvements made in VMware 6.5 and Hyper-V 2016 that make them better applications for enterprise development.

VMware 6.5

Pros. Significant improvements to the VMware 6.5 are as follows. They include The migration tool is built into the VCSA installer, appliance management improvements, VCSA Native high availability, vCenter Native Backup and Restore, performance enhancement of the vSphere Web Client, with inbuilt HTML 5 into the Windows and VCSA versions. Also, enhanced logging, proactive HA for Cisco, Dell, and HP so far, HA orchestrated restart, HA admission control improvements, HA support for vGPU, improvements done to FT, predictive DRS and additional options, Network-Aware DRS, vSphere Integrated Containers, Advanced Format and 512e Disk Support, Automated UNMAP, LUN Scalability, ISCSI Static Routing, and Dedicated Gateways for vmkernel ports. It has a content library, vSphere update manager. An AutoDeploy with GUI, VM encryptions, and SecureBoot options for VMS and ESXi (Shawn, 2017)

Cons. The significant challenges include compatibility issues with other VMware products and some hardware, the Log Insight 4.0 only works for a single host, and the cSphere C# is removed.

Hyper-V 2016

Pros. Some of the new additions to the Hyper-V 2016 include compatibility with connected standby, hot resource protection, hot add and remove for network adapters and memory. It updated the Hyper-V management improvements, integrates service delivery into the windows update, and introduced the Linux secure boot. It allocates more memory and processors for generation 2 virtual machines and hosts, allows discrete device assignment, and provides encryption support for the operating system disk in generation 1 virtual machines. Other features include nested virtualization, new networking features (RDMA, VMMQ, QoS), the introduction of production checkpoints, an upgrade on the Rolling Hyper-V cluster, updated shared virtual disks, new virtual machine backup, shielded virtual machine, virtual machine configuration updated introduction of windows containers, and Windows PowerShell Direct (Davies et al., 2016).

Cons. One of the significant downsides of the Hyper-V 2016 is that it does not include guest operating system licenses which can add up if one is looking to host several VMs.

Comparing the VMware and Hyper-V in relation to enterprise deployment, the former is much better regarding implementing complex virtualization features. These features function better with VMware as long as the licenses are paid for and running on supported hardware. While Hyper-V supports more hardware and is less complicated, it requires more steps to configure (Leoni, 2017). Hence, VMware would be much more manageable.

VCenter License

6.5

 

Target Server

ESXI 1

VCenter will be hosted on ESXI 1

Deployment Type

Embedded Platform Services controller

Connection to VCenter Server and the PSC is not over the network so less prone to outages

Less licenses required

NO Load balancing to distribute the load across PSC

Setup SSO

Create a new SSO Domain

Set application size

Tiny

Have less than 10 hosts and 100 VMs

Datastore

Datastore 6

120GB

Configure Database

Use an Embedded DB

Customer experience program

Enabled

Provide feedback for improvements

Physical Server

Pros. Would not be impacted in the case of Virtual Infrastructure outages

Cons. A dedicated physical server is required and backup and maintenance would also be necessary. May not be ideal when moving to a virtualised environment to still be using a Physical server for management. Snapshots cannot be used and no load balancing techniques.

Virtual Server

Pros. No additional physical server are required and virtual resources such as RAM and CPU can be increased. Easy to backup and restore and can use Snapshots for testing and upgrade management. Can utilise DRS and HA Cluster for high availability.

Cons. Must have HA enabled otherwise would be issues in the case of outage of Virtual Infrastructure. Must also compete for resources with other VM’s

 

I have chosen to deploy the VServer on a Virtual Machine as recommended by VMware and to take advantage of HA which can protect the Management server from a hardware failure.

I will be taking advantage of VCenter Service Appliance in 6.5 to link vCenter servers together as they will be part of the same SSO Domain. This will allow any changes made on any vServer to be replicated to all VServer’s. The VCSA also has an embedded Database that is sufficient for the deployment of this size.(under 20 hosts  Will required a disk size of Tiny – 120GB of storage on physical Server.

 

VMware VSphere Cluster settings

Name

Cluster_Site_1

Hosts

4

Datastore

Datastore 7

License

VMware 6.5

Lockdown Mode

Strict

Only want users to connect via VCenter Server

VMotion

Enabled

Used for planned outages and maintenance

DRS

Enabled

DRS

Fully Automated

Let DRS take care of managing resources.

Less time consuming for IT Staff

Predictive DRS

Enabled

Take advantage of this new feature in 6.5 which will allow DRS to respond to forecast metrics provided by realise Server

Virtual Machine Automation

Enabled

May need individual VM’s to set their own Automation

Automation Level

3

Leaving level at default setting

VMware DPM

Enabled

Save power when VM’s are idle by moving VM’s to a few hosts and puts hosts in Standby until needed

DPM Threshold

3

Leaving at Default setting, any lower wound not have any real impact and higher would be too aggressive

HA

Enabled

Host monitoring

Enabled

Host Failure Response

Restarts VM’s

Will restart VM’s once failure has occurred

Automation Level

Automated

Will allow hosts with problems or that need maintenance to be placed into quarantine or maintenance mode

Remediation

Mixed mode

Want to balance the performance and availability – want to leave HA be used to make such decisions

Admission control

Default settings

Leaving as default and can be changed later if need more control over failover capacity

Heartbeat Datastore

Automatically select Datastores accessible from the host

VSphere DRS Cluster with FT enabled

VSphere HA Cluster

DPM – Distributed Resource Schedule

Name

Mail Server

AD Server

File Server

Cluster

Cluster 1

Cluster 1

Cluster 1

CPU

2

2

2

RAM

2

2

6

Datastore

Datastore 2

Datastore 2

Datastore 1

OS

WS 2016

WS 2016

WS 2016

VNIC

1

1

1

VDisk Size

32GB

32GB

32GB

VDisk

Thin Provisioning

Thin Provisioning

Thin Provisioning

VDisk Option

Store with VM

Store with VM

Store with VM

 

Name

Database

Web Servers

Linux Servers

Cluster

Cluster

Cluster 1

Cluster 1

CPU

2

2

2

RAM

4

6

4

Datastore

Datastore 4

Datastore 5

Datastore 3

OS

WS 2016

WS 2016

Linux

VNIC

1

1

1

VDisk Size

32GB

32GB

32GB

VDisk

Thin Provisioning

Thin Provisioning

Thin Provisioning

VDisk Option

Store with VM

Store with VM

Store with VM

 

Virtual Machine Placement

To ensure that Mail Servers, AD Servers and File servers are spread across all hosts in the cluster to avoid downtime DRS Groups are created and associated with Affinity rules. The rules specify that a VM’ in the group will be spread across each host in the Cluster. The rule specifies that the VM’s should run on the host in the group meaning that if the cluster fails then VMotion will move the VM’s to another host. This will ensure the availability of business critical services. 

Rule 1 Mail Server

Group Type

DRS Groups VM

Group Name

MS_Group_DRS_VM

Group Members

5 Mail Server VM’s

Rule Name

MS_Affinity_Rule

Enable rule

Enabled

Type

Virtual Machine to Host

VM Group

MS_Group_DRS_VM + MS_Group_Host

Rule

Should run on host in Group

Host Group

Host_Group_1(ESXI 1, ESXI 2, ESXI 3, ESXI 4)

Rule 2 Active Directory rule

Group Type

DRS Groups VM

Group Name

AD_Group_DRS_VM

Group Members

4 Active Directory VM’s

Rule Name

AD_Affinity_Rule

Enable rule

Enabled

Type

Virtual Machine to Host

VM Group

AD_Group_DRS_VM + AD_Group_Host

Rule

Should run on host in Group

Host Group

Host_Group_1(ESXI 1, ESXI 2, ESXI 3, ESXI 4)

Rule 3 File Server rule

Group Type

DRS Groups VM

Group Name

FS_Group_DRS_VM

Group Members

10 File Servers VM’s

Rule Name

FS_Affinity_Rule

Enable rule

Enabled

Type

Virtual Machine to Host

VM Group

FS_Group_DRS_VM + FS_Group_Host

Rule

Should run on host in Group

Host Group

Host_Group_1(ESXI 1, ESXI 2, ESXI 3, ESXI 4)

 

Network

 

 

 

 

Server Type

Total Disk Space GB

Local Disk Space

Calculation and assumptions

Mail Servers 

400

160

I based my calculation on each user having

8GB of storage each

Active directory 

128 

Here I made an assumption of requirements

Windows File Server 

250 

320 

I based my calculation on each user having

5GB of storage required

Web Servers 

256 

Here I made an assumption of requirements

Database Servers 

128 

Here I made an assumption of requirements

Linux Servers 

192 

Here I made an assumption of requirements

Total 

650

1184

Capacity growth 20% 

130 

236 

Total Storage requirements  

780 

1420 

Total Storage required  

2200 GB 

Bottom of Form

 VMFS DATASTORE

The VMFS DATASTORE’s will be created for each of the below VM groups to allow to manage the storage for each Server type as a whole

DATASTORE 1 – File Servers 690GB Total Storage plus 20% for growth

DATASTORE 2 – Mail Servers – 680GB Total storage plus 20% for growth

DATASTORE 3 – Linux – 250GB – Total Storage plus 20% for growth

DATASTORE 4 – DB Servers – 160GB – Total Storage plus 20% for growth

DATASTORE 5 – Web Servers – 310GB – Total storage plus 20% for growth

DATASTORE 6 – Active Directory – 154GB – Total storage plus 20% for growth

DATASTORE 7 – Management

ISCSI Storage Protocol

ISCSI storage protocol is the choice for storage protocol

leverages the existing network and does not require additional Network design and equipment

Cost is lower  

Does not require additional training for IT Staff unlike FC deployments which can be difficult to deploy

Supports VMFS, DRS and VMotion

Supports booting from SAN

ISCSI Storage design and configuration

Veeam is chosen as the backup solution. Veeam was named as Gartner Peer Insights Customer’s choice for Data Center Backup and Recovery Software in 2018. VMware and Veeam have a very strong technical alliance. (Veeam, Veeam Hyper-Availability for VMware, 2018)

Veeam solutions guarantees business continuity, minimizes risk and fast-tracks innovation. Veeam Backup & Replication™ fully supports VMware VSphere 6.5 and offers an easy-to-use, reliable and agnostic solution for virtual, physical and cloud-based workloads which enable faster back-ups through smart logic that reduces network traffic and enables backup and restore according to your storage policy (Veeam, Veeam Hyper-Availability for VMware, 2018)

Veeam operates at the virtualization layer and uses an image based approach for VM back-up and no agent is required to be installed on the Guest OS.

High speed recovery with the ability to restore VM’s within minutes and recover individual files easily. Recover AD objects, Containers and OUs and user accounts and Restore to a point in time for Oracle and SQL DB’s

Ability to create backups from any storage with storage snapshots. 2 in 1 backup and replication allows you to maintain image based replicate onsite for HA or off site for disaster recovery and simplify failover and failback with minimum disruption to business with inbuilt WAN acceleration.

Veeam gives you the ability to work in a production like environment by allowing you to use Backups and replicas to test any new deployment prior to go live. (Veeam, Veeam, 2018)

Veeam Backup & Recovery Architecture

In order to provide an adequate backup strategy to restore operations in the event of any problem the 3-2-1 rule will be enforced.

3 – This will ensure that there are at least 3 copies of all the VMware environment and DATA. This will ensure that if one of the backup fails for any reason that there will be another backup recovery will still be possible 

2 – Keep backup’s in different locations. One backup will be held onsite on local storage and second will be held offsite in a different media.

1 – Keep one backup in a different location. One backup will be onsite and the second will be held offsite. For offsite Veeam Cloud Connect will be utilized to get backups off site (Veeam, 2014)

(Veeam, 2014)

References (What’s new in Hyper-V on Windows Server 2016, 2017)

EdisonGroupInc. (2018). Retrieved from www.TheEdison.com: www.TheEdison.com

Fenech, J. (2016). vCenter Server for Windows and vCSA compared. Retrieved from https://www.altaro.com/vmware/vcenter-server-windows-vcsa-compared/

Schaller, J. (2018). Retrieved from https://www.exittechnologies.com/blog/data-center/hpe-vs-dell-servers/

Shawn. (2017). VMware vSphere 6.5 – Is it all it’s cracked up to be? Retrieved from https://virtuallyinclined.com/2017/01/22/vmware-vsphere-6-5-cracked/

Veeam. (2014). Retrieved from https://www.veeam.com/blog/how-to-follow-the-3-2-1-backup-rule-with-veeam-backup-replication.html

Veeam. (2018). Retrieved from Veeam: https://www.veeam.com/vmware-software-defined-data-center-solution-brief_wp.pdf

Veeam. (2018). Veeam Hyper-Availability for VMware. Retrieved from https://www.veeam.com/vmware-vsphere-solutions.html

VMware. (2017). Performance Best Practices for. Retrieved from https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/performance/Perf_Best_Practices_vSphere65.pdf

VMware. (2017). vSphere Networking. Retrieved from vmware.com: https://docs.vmware.com/en/VMware-vSphere/6.5/vsphere-esxi-vcenter-server-65-networking-guide.pdf

VMware. (2018). Veeam Backup & Replication. Retrieved from https://kb.vmware.com/s/article/52533

 

Client Server Computing and Content Management Systems

Table of Contents

Client-Server Computing

Uses of Client-Server Computing

Client-Server Computing evolved

Advantages and Disadvantages

Advantages

Disadvantages

Content Management System

Types of Content Management System

CMS Comparison: Drupal and Joomla

CMS Installation

CMS 1 Installation(Drupal):

The process of acquiring and installing a theme for Drupal:

The  method to add plugins/modules to provide functionality for Drupal

To produce a simple site for Drupal:

What back end technologies do they make use of?

CMS 2 installation(Joomla):

The process of acquiring and installing a theme for Joomla:

The  method to add plugins/modules to provide functionality

Steps to produce a simple site for Joomla

What back end technologies do they make use of?

Recommendation and Justification

References

 

The client-server model is a model that communicate against each other via a computer network. It is designed for one or more users to share its data resources in a client-server network. There are plenty of data resources that can be shared such as songs album, mp3, mp4, or other contents from the service provider, called a server. A server is a service provider which store files and data and may works on multiple clients at the same time and share its resources to the client. While the clients are a requester which can ask requests from the server. For example, one of the famous gaming devices called the Playstation is a kind of Client-server model to serve the end-user. We can open the updated or completed network files by logging into it which allow the end-user to contact with the Playstation server website and retrieve their data such as games update, video collection, equipment store, games download and others.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The uses of the client and server computing are the server itself should take request from the clients and share its data with all clients that are requested for. Just imagine, a client is waiting for a server in order to serve him, the client connects, communicate and ask for a request from the server via a network. A server then will make sure the data access is legit. After the server confirms that the data is legit, then the server will take the request from the client. So, the role of the client-server model is a client doesn’t provide any data to the server but only make requests to the server. However, a server may have its limited number by receiving requests from clients at once. Therefore, it uses priority rules to schedule that request. Although the client and server are communicated with each other on separate client’s devices, they remain to use the same system through a network. After that, the server will close the connection and move to serve another client when there is no other job request from the present client.

The client and server system started when the computers were increased hugely and being used individually. The organization started to demands of computing control and value. Then, the idea is to separate some personal computers and a mainframe. Therefore, the computers can communicate with each other via a network.

Advantages:  Security, data access, data resources and data integrity are under control by the dedicated server. It is because the data is centralized in a dedicated server. The unauthorized client cannot access the system without permission by the support staff. For example, any new unknown clients entered the network would require to enter the network’s username and passwords for new access to the network. Any new unrecognized clients will go through a centralized security system based before access through the network. That’s mean it is hard to be attacked by some unauthorized clients or maybe  Even if the issue happened, the support staff will be aware easily and protect the data.

Besides, support staff can set data backup in the servers which server can automatically recover data before the data being lost from the client devices. That is important because no one can guarantee that the hard drive will always work well in the client devices. When it comes to the issue of a hard drive failure, everybody must do a backup. However, one hard drive is not enough. The server can have two or more internal hard drives to do extra data backup. When the data accessed for the first one is failed, then the client can go to the second one for retrieving data.

The support team can also modify, update, or upgrade resources if they needed. It is easy for them to do that because all clients are requested data from only one server in the network. Therefore, the support team can only focus on the server to modify data. It is also a good way to improve teamwork and reduce human error at the same time when they have three or more people working together in that server.

The user can connect and access anytime by using any client devices they want because the server is always powered on. This is important for the client because it can help them to communicate with each other immediately whenever the other client devices are offline or broken down.

The support staff can strengthen, upgrade or add new nodes in the client-server computing. It is a great scalability in client-server computing. We can also increase the nodes if we want it to. It is because of all the nodes have the same task individually, which request data from the server. The client and support staff don’t have to get closer to the server and access it. They can connect with the server by using remote access. The data can be processed efficiently even if they are not in the server room. So, this makes them save much of their time if they live far away from there or having difficulties to come.

Disadvantages: Client and server computing are more lead to a network overload issue. The issue happens when more and more request from the clients contact with only one server contemporary. This can cause the server down by getting overloaded.

As we know, the server is a hub for all clients. When the server is broken down, the whole network will go down at the same time. All the download part may stop and start from 0 to redownload it again. The clients have to stop their work until the server is restored.

The failure of the server may happen anytime without any reason. When that happens,  the time to under maintenance might take about several minutes if it is a fortune, but sometimes it might take days to fix the whole systems’ server failure.

The setup cost is a little bit expensive compared to some other model such as peer to peer network.

Moreover, it is required to have some experienced IT field people to take control of the servers. The security, database, errors or problem-solving issues are not a regular person can do. And it needs some profession to be fast and get the solution. The bigger the company is, the faster they want it to solve the problem on that server because the more clients it has.

A content Management System is an application that is used to manage and modify content. It supports multiple users to add, organize and modify their publishing content. You can edit the page in the administrative page and then you can also preview it at the user site after you have done editing. Furthermore, you can add some plugins and themes to demonstrate the site and make the content different. All of those themes and plugins are mostly created by the support team from the CMS and a lot of that can be used for free and only one-click installation. Besides, a Content management system also can help you to manage menu, create a contact or online forms, create a blog, create an e-commerce platform, manage a security framework, manage store database and etc. Moreover, a content management system also allows you to create and manage webpages easily by separating the creation of your content from the mechanics required and present it on the web. A traditional CMS architecture still prefers to use the self-hosted open-source model to combine codes together with the CMS so that the developers can take control over it without share it to other people such as a vendor. Actually, it has another technology architecture to change the typical web CMS to a modern CMS called Headless CMS architecture. The Headless CMS can use open API to manage users content and send over to multiple client devices.

Types of Content Management System

There are five types of a content management system. First, the component content management system. It manages stores the components in a repository. The costs are reduced with the reuse of the content and it can publish in a different type of platform such as PDF, mobile and etc. Secondly, the document management system. It is to manage documents on a cloud-based platform. Thirdly, the Enterprise Content Management System. It can manage document and make sure information goes to a correct recipient every day. Then, it will delete unimportant files. Fourthly, the web content management system. It manages the webpage with its own content. Users can do it at zero knowledge of coding. Fifthly, the Digital Asset Management System. It can store content securely and let clients access their important data safely. Also, this system is a cloud-based platform too.

Drupal is a content management system run in PHP script. Drupal is a flexible CMS based on the LAMP stack such as Linux, Apache, My SQL and my PHP languages. With a modular design that allowing features to be added by installing new modules and allowing the entire appearance and feel of the whole website to be changed. All of those can be done by installing a theme. Drupal isn’t only a CMS platform but it is a variety and complete web development framework. By using Drupal, we are able to build many websites without any programming knowledge or coding experiences. Drupal is a free and open-source and it is same as Joomla, so that’s mean it is free to use for the user. About Drupal: two university students felt unusual to a permanent internet connection in the year of 2000. A new site with a web board has been developed and a small content framework is created. They set its domain name as dorp.org and “Drop” is known as a village in the Dutch language. They did a mistype from “dorp” to “drop”. When it is live on the web, it became attracted to people and they rename it to Drupal as the Dutch word means “drop”. There are some features about Drupal. It has a new theme engine called Twig.  It is a PHP based but it is written in syntax form. So it is more secure, fast and flexible. Another great feature is the quick edits. It allows a user to click on the edit button on the front page and that button links through backport for quick hands fixes from the front end. Also, It has a Guided Tour for people to understand better. It supports PHP 4 and 7. Drupal provides HTML 5, JSON, XML and Hypertext Application Language as a data source and output content to the users. The cost to develop a website project is a lot in Drupal. The estimated amount is between $15,000 to $100,000. There are several business problems faced by Drupal which is business themes issue and business rule module issue.

Joomla is a CMS which runs in a Model View Controller design pattern. About Joomla: It is an award-winning content management system. It allows users to build websites with zero coding experience. History of Joomla, An Australia company named Miro develops a CMS called MAMBO. It has given a General Public license under GNU. But, a copyright issue happened in 2005, caused the MAMBO teams to resign.  The second time the name of Mambo changed to Jumla and it launched on 16 September 2005. Then, it launched Joomla 1.5 on 21 January 2008. After that, Joomla has well known to the public since July 2009. There are some features about Joomla. It is an open-source(free), good content management allow the viewer to register and keep updating on their module and get core updated easily. Then it keeps newer version with users need by using 1 click step to complete the update process. It supports PHP 4 and 7 and over 70 viewing languages to the user. Major types of websites that can be created, for example, a blogging site, business to business online sales website, event website for a local event and others. Furthermore, it also great at user management, menu management, contact management, banner management and cache management. The search capabilities in Joomla provide the most popular search in plugins, themes, admin tools and others. The cost to develop a website project is less than Drupal. The estimated amount is between $99 to $100,000. There are several business problems faced by Joomla which is Jstring issues, Joomlaaxtc extension issue and framework issue.

The easier ways to install a content management system is by following:

First, I run a hosting provider called CPanel. Before we start, we should have a domain name like 27035574.2019.labnet.nz to access it. After that, to open the Cpanel is to type in your [domain name]/cpanel in the URL bar and enter.

You will go into the login page. Press login to enter your CPanel hosting account.

CMS 1 Installation(Drupal):

In the CPanel hosting environment, you can set up any kind of Content Management System quickly. Scroll down and go to the “SOFTACULOUS APPS INSTALLER” tab.

At the categories, Click on the Portals/CMS logo.

Find Drupal and press it.

Go to the install menu button, click on the arrow for the drop-down menu and choose Custom install

It will show this page.

Then, you will see an “in Directory”. This is for your root directory to install at, for example, Http://[domain]/[drupal8]/. Leave it empty if you don’t want to change the directory.

You can change the admin’s username and password. Recommended building a strong password to real website builder to prevent security loss.

After that, click on the install button and it will bring you to this page.

 

Press on the Administrative URL link to log in as an administrator.

You will be required to enter your admin username and password to access.

After login, you will see something has changed such as the extension bar and Tools menu.

 

The process of acquiring and installing a theme for Drupal:

First, you have to enter the link below: https://www.drupal.org/project/project_theme

Then, you will see the download and extend page, fill in the Core compatible mode to the mode that suits your Drupal version. I’m choosing, 8.x for myself. Type in zircon at the search themes bar and press on the Search button.

After pressing the search button, scroll down and choose zircon as shown below. Then press on Zircon link.

Scroll down the page and you will see two types of download file, you can choose either .gz or.zip file. For me, I have chosen the .gz file, right-click the link and copy link addresses.

Go back to you Drupal admin site, hover to the Appearance tab, and choose the install new theme option.

When the page loaded, paste the copy link address into the ”Install from a URL” bar and press the install button.

After the installation successful, press on the Appearance tab.

Zircon theme will be located on the Uninstall theme column. Go there and press on the install link.

Then you will get a confirmation message below.

.

Go to the Zircon theme and set the theme as default.

The  method to add plugins/modules to provide functionality for Drupal

First, you have to enter the link below: https://www.drupal.org/project/project_module

Then, you will see the download and extend page, fill in the Core compatible mode to the mode that suits your Drupal version. I’m choosing, 8.x for myself. Type in admin toolbar at the search themes bar and press on the Search button.

After pressing the search button, scroll down and choose Admin Toolbar module as shown below. Then press on Admin Toolbar link.

Scroll down the page and you will see the type of download file, you can choose either .gz or.zip file. For me, I have chosen the .gz file, right-click the link and copy link addresses.

Go back to you Drupal admin site, hover to the Extend tab, and choose the install new module option.

When the page loaded, paste the copy link address into the ”Install from a URL” bar and press the install button.

You will receive a confirmation message.

After that, press on the Extend tab, scroll down and find the Admin Toolbar, tick all 3 boxes as shown below.

A confirmation message will be shown at the top of the page as below.

Then, you can now update the module by using the Update option under the Extend tab.

To produce a simple site for Drupal:

First, go to the configuration tab and click on the Basic site settings.

Then, fill in the site name, email address and the file path. It will change the contents on the home page.

After that, go to content -> Add content

Fill in all the field.

Menu setting is a menu creator and settings for the content. Set up the weight from lower to higher means to display the menu in ascending order.

URL Alias is to make user access easier. After finished, save and close the settings.

To change the logo image or favicon: press on appearance -> find our theme -> site settings ->  you can change under logo image content and also favicon content. It uses the same function to change the colour background as well.

What back end technologies do they make use of?

Back end technologies have PHP code and other languages to write modules, web services, automate tests and etc.

https://befused.com/drupal/developer

CMS 2 installation(Joomla):

In the CPanel hosting environment, Scroll down and go to the “SOFTACULOUS APPS INSTALLER” tab. You can see there is a Joomla script, press on that.

Go to the install menu button, click on the arrow drop-down menu and choose Custom install.

It will show this page.

You can change the directory if you want. Otherwise, leave it empty.

Change the Admin Username and password if you like.

After that, click on the install button and it will bring you to this page.

Press on the Administrative URL link to log in as an administrator.

You will be required to enter your admin username and password to access.

It will bring you to the Joomla’s control panel page.

The process of acquiring and installing a theme for Joomla:

First, there are multiple websites for you to download a theme to Joomla, For me, I will enter the link: https://www.astemplates.com/free-joomla-templates.

I will Choose LT TECH SHOP as my template in Joomla, you can choose another template whenever you like. Press on the more button.

Then press on Download Free Version button.

Tick the accept term and condition check box and download it. It will ask to sign in the account for the first user.

After the registration completed, you will get two zip folders.

Open the Joomla admin site, go to extension tab -> manage. Then, browse both zip file that you downloaded and upload it.

After that, go to the extension tab -> template. The page will be shown as below, make the Lt Techshop as default by clicking on the star icon.

And you will see the change of homepage.

The  method to add plugins/modules to provide functionality

First, you should enter the link below: https://extensions.joomla.org/extension/

Search for “AllVideos” plugin and download it and it should show in the zip file.

Go back to the admin site. Then, go to the extension tab -> Manage

Drap and drop the plugin zip file into the upload link. Then, it will install automatically and show a confirmation message to you.

Go to extension tab -> Manage

Enable the plugin that has installed by clicking the disable folder icon and it will turn to green.

Then, go to Extension tab -> Plugins.

Press on the link to edit the “AllVideos” Plugin

Then, click on the “show full description” link.

Go down and select the “Documentation for AllVideos”.

You will beload this page.

Scroll down and copy the Youtube AllVideo tag that can be used in Joomla (if you want to use Youtube channel service).

GO back to Joomla admin site, and go to the article that you want to embed a video inside with HTML code. Then paste the “AllVideos” tag to shows the youtube channel. Then save and publish it. For example:

Steps to produce a simple site for Joomla

First, create an article for the website, go to content -> Articles.

Press the new button

Create a title for your article, save and close after finished.

Press the menu tab, go to Main Menu and choose Add New Menu Item.

Create a menu title, this is to link with the article, change the menu item type to a single article, and select About Article.

Check to confirm the menu items are added inside the menu items manager, you should have About Us page.

You can add some content inside an article. Press the content and select the article option.  Press the About Us link.

Put the content that you want to. Save and close. Then, you can view it on your user site.

What back end technologies do they make use of?

We could create a Model-view-Controller triptych and edit the admin entry point.

I have applied two software for the Social Media(twitter style)micro-messaging site. First one is called Social Engine. This is a mobile social community software. It has some great performance to create a custom branded social media site. Another one is a social analytics software called phpFox. About the phpFox is to give a solution for people who wants to create social media sites. It provides tools for group users such as group owners, admin, and community managers. Both are at the same cost and have similar product features.  If you want to get support in 24×7 from the active community, the phpFox should have the service but the Social media does not. Both software support above Php4.0 and PHP7 versions.

For my recommendation, I will choose phpFox as my choice. It is because phpFox is a powerful server platform to build social media online than Social Engine server platform. If you build the social media site in phpFox, you will like the script that has been built inside the phpFox compared to the Social Engine especially the hosting part with a virtual private server.

I have applied two software for the Content Streaming Website. First one is called Uscreen. Then, the second one is called Contus Vplay. Uscreen can turn users’ channel into a mobile application. So, it allows interested viewers to download it from Play Store on Android or Itunes on Apple and displays the content on their phone. For Contus Vplay, it is an online video streaming product that allows users to manage their video content. Both of the software has similar features such as. It is a one-time license for the Contus Vplay and the price is varied by the vendor. For Ugreen users, they have to pay 149 per month for the basic plan and 299 for the Plus. Ugreen has a great secure on its Billing system, while the Contus VPlay has fully secured the whole system from being access by hackers or unauthorized users.

For my recommendation, I will choose Contus VPlay as my choice. It is because live streaming is common nowadays. Contus V Play can live broadcast for my created videos on other mobile phones. It is cool, isn’t it? In addition, it has full protection at my video streaming contents from being stolen by other users.

I have applied two software for the Blogging Site. First one is called Gator. Then, the second one is called Blogger. Gator is a blogging platform created by HostGator. As we know, HostGator is a famous hosting service provider, but it also a blog creator management site. On the other hand, Blogger is a blogging platform running in a google hosting platform. Users can use Blogger as free by watching the provided advertisement. But if users want to create more, then they have to pay based on quota. But in other hand, Gator has to pay monthly with as low as 4 dollars to get a plan. Both have 24×7 technical support. The security of Gator is protected by the HostGator while the security of Blogger is protected by Google.

For my recommendation, I will choose Blogger as my choice. It is great to choose Blogger as my favourite Blogging site builder. It is because the trustworthy of linking with Google company and believe the platform is more secure than Gator. In addition, it is easy, simple, and understandable to manage or build my own content without using any of my technical or programming skills.

I have applied two software for the Business to business online sales websites. First one is called PrestaShop and the second one is called OpenCart. Both of this CMS is specially designed for eCommerce platform and has been placed in a top 10 list. Presta shop allows users to works on 25 languages while OpenCart is not good in client management.  However, OpenCart has its own community which give users certain commercial support to solve their issue. It is easy to build a website in PrestaShop than in the OpenCart.

For my recommendation, I will choose PrestaShop as my choice. When I work with some business clients and also some of the charge accounts, PrestaShop is a good choice for me. It is because PrestaShop provides stronger features in product management, SEO capabilities, customer care than using an OpenCart. This is important because it helps me to overcome several clients issue and also ranking up my website from the search engine site.

I have applied two software for the Micro jobbing sites. First one is called WordPress and the second one is Drupal. Drupal is a website builder to generate a solution with robust functionality for building general-purpose websites. While WordPress is more like a community platform. It can be said a Drupal can do more than a WordPress. In fact, Drupal is a little bit more complicated than WordPress to build a website because Drupal is neither for a starter nor zero skills developer, on the other hand, WordPress can start at a very basic level. Both are open sources Content Management System. There are 5000 more free themes and 53000 more plugins that can be used in WordPress compare to Drupal’s which has only 2500 more themes and 39000 more modules.

For my recommendation, I will choose WordPress as my choice. I choose WordPress because I know there are some themes available to create a micro jobbing site such as a Fiverr. It is important to get started with prebuilt themes rather than using a Drupal. Besides, the ease of use for WordPress can also help to save my time.

I have applied two software for Event websites for a local event. First one is called Wix and the second one is EventCreate. EventCreate is specially designed to create an Event website, while Wix is used to creating a variety of websites with different features in it. It is free cost for the starter plan in the EventCreate, while it has a free version for the Wix when I use the ad provided by Wix.

For my recommendation, I will choose EventCreate as my choice. It is because there is a limited choice of background to choose in Wix. EventCreate has a great design option for me to choose and create a quality background on the event website. EventCreate provides great tools and good technical support to help create a robust product that I need.

Buytaert, D. (2001, May 18). Our history. Retrieved from DRUPAL: https://www.drupal.org/about/history

DRKCT. (2008, March 17). The Evolution of Client/Server Computing. Retrieved from A Blogger CMS: http://client-server-technology.blogspot.com/2008/03/evolution-of-clientserver-computing.html

Horne, K. (2019, March 15). Gator Website Builder: Our First Look at HostGator’s Site Builder. Retrieved from A whoishostingthis Blog: https://www.whoishostingthis.com/blog/2019/01/21/gator-website-builder

Inc, Q. (2019, December 30). Client/Server Computing. Retrieved from Webopedia: https://www.webopedia.com/Computer_Science/Client_Server_Computing

Jackson, B. (2019, July 26). WordPress vs Drupal – Which One is Better? (Pros and Cons). Retrieved from A Kinsta Blog : https://kinsta.com/blog/wordpress-vs-drupal/

JONES, S. (2018, November 26). 5 Types of Content Management Systems (CMS). Retrieved from An ixiasoft Blog: https://www.ixiasoft.com/types-of-content-management-systems/

Kenneth Crowder, R. S. (2019, January 30). A Brief History of Joomla. Retrieved from Oreilly Safari: https://www.oreilly.com/library/view/using-joomla/9781449377434/ch01s02.html

Lee, M. (2017, June 7). 9 Best Content Management System (CMS) for Blogging. Retrieved from A Blogdada Blog: https://www.blogdada.com/9-best-content-management-system-cms-for-blogging/

Levi, J. (2014, July 1). 16 Drupal 8 Features You Should Know. Retrieved from axelerant: https://www.axelerant.com/resources/articles/drupal-8-features-need-know

members, T. F. (2015, September 15). 10 Core Features of Joomla. Retrieved from Tech Fry: https://www.techfry.com/joomla/10-core-features-of-joomla

Mortti. (2018, February 9). The Joomla! Forum. Retrieved from JoomlaXTC: https://forum.joomla.org/viewtopic.php?t=959075

Open Source Matters, Joomla community. (2005, August 17). Joomla! Benefits & Core Features. Retrieved from JOOMLA!: https://www.joomla.org/core-features.html

Patar5036. (2014, January 18). Socialengine vs. PhpFox. Retrieved from A WebHostingTalk web and cloud hosting community: http://www.webhostingtalk.com/showthread.php?t=1341054

perpignan. (2018, August 1). Problem with Business Rules + Masquerade. Retrieved from Drupal download and extension: https://www.drupal.org/project/business_rules/issues/2989868

Raymond, M. (2018, December 10). Creating a headless CMS technology stack. Retrieved from A SURFCODE blog Web Site: https://www.surfcode.io/blog/headless-cms-tech-stack/

Rode, J. (2016, June 9). What is the top 10 features of Joomla? Retrieved from Quora: https://www.quora.com/What-is-the-top-10-features-of-Joomla

Sameh, F. (2019, February 17). PRESTASHOP VS. OPENCART: A COMPARISON OF ECOMMERCE PLATFORMS. Retrieved from A Perzonalization Blog website: https://www.perzonalization.com/blog/prestashop-vs-opencart-comparison/

Sanati, J. (2011, May 2). Top 10 Reasons to Setup a Client-Server Network. Retrieved from Intel IT Peer Network Web Site: https://itpeernetwork.intel.com/top-10-reasons-to-setup-a-client-server-network/

Sparrow, P. (2011, May 1). Client Server Network : Advantages and Disadvantages. Retrieved from Ianswer4u.com: https://www.ianswer4u.com/2011/05/client-server-network-advantages-and.html

Zen Ventures, L. (2018, April 10). PrestaShop VS OpenCart. Retrieved from A prestashop CMS website: https://www.prestashop.com/en/prestashop-vs-opencart

Zuckerman., A. (2019, July 10). C. Retrieved from CompareCamp : http://comparecamp.com/webstarts-review-pricing-pros-cons-features/

 

Evaluation of Server Virtualization Infrastructure

Introduction
ICA. COM owns a domain based network and their datacenter is based on different physical server. For maintenance and upgrading of these physical server, the management is spending a lot of time and the money. Before attended to seminar, CEO realized that, in future it need to buy more hardware or physical server to offer IT services to the new and existing domain user. But after attending to the business seminar, CEO got ideas about the Green IT and virtualization technology. With the help of server virtualization ICA can save money, wore more efficiently. Server infrastructure administrator able to decide which server workload will run effectively in virtual machine and which server workload remain deployed in more traditional environment.

Get Help With Your Essay
If you need assistance with writing your essay, our professional essay writing service is here to help!
Essay Writing Service

The main objective of this report is to present the current server infrastructure and show that how to implement application and server virtualization platform for ICA.COM domain. Also it will present the suitable type of hypervisor for ICA.COM. This report has provide the detail about how easy it would be manage virtual server infrastructure as compared to physical server, benefits of network and storage virtualization to manage the data and network services.
Task 1:
A hypervisor is a crucial piece of software that makes virtualization possible. A hypervisor, also known as a virtual machine monitor, is a process that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, like memory and processing. As per the scenario given, type 1 hypervisor is physical server. Hence, below given answer discuss about suitable virtual server hypervisor type for the ICA.COM as compared to physical server.
There are two types of hypervisors:
Type 1 hypervisor: It is a physical server. It run directly on the system hardware – A “bare metal” embedded hypervisor.  A Type 1 hypervisor is proven in providing excellent performance and stability since it does not run inside Windows or any other operating system. Type 1 hypervisors are mainly found in enterprise environments.

Type 2 hypervisor: It run on a host operating system that provides virtualization services, such as I/O device support and memory management. Type 2 hypervisors don’t support over/dynamic allocation of RAM, so care is required when allocating resources to virtual machines. Type 2 hypervisors are typically found in environments with a small number of servers. (Yurtoğlu Nadir, 2018)

Performance of Type 2 Hypervisor: Hosted hypervisors essentially also act as management consoles for virtual machines, it can perform any task using the built-in functionalities. There is no need to install separate software on another machine to create and maintain virtual environment. It need to simply install and run a type 2 hypervisor any other application within OS. With it, it can create snapshots or clone your virtual machines, import or export appliances, etc.
Type 2 Hypervisor Operational factors, and support:  You do need to be careful when allocating actual resources with this type of hypervisor. We should critical to keep in mind, so as to avoid over-allocating resources and crashing the host machine. Type 2 hypervisors are convenient for testing new software and research projects. It is possible to use one physical machine to run multiple instances with different operating systems to test how an application behaves in each environment or to create a specific network environment.
Cost: Many type 2 hypervisors are free in their basic versions and provide sufficient functionalities. Some even provide advanced features and performance boosts when it install add-on packages, free of charge.
Technical features and support:

Higher server ability
Cheaper operating costs
Eliminate server complexity
Increased application performance
Deploy workload quicker

The common types of the Type 2 hypervisor are as:
1. VMware Workstation/Fusion/Player
It is a hosted hypervisor that runs on x64 versions of Windows and Linux operating systems. It enables users to set up virtual machines (VMs) on a single physical machine, and use them simultaneously along with the actual machine. There is a free-of-charge version. It may cost about $189. An operating systems license is needed to use proprietary ones such as Windows. Ready-made Linux VMs set up for different purposes are available from several sources.
VMware Workstation supports bridging existing host network adapters and sharing physical disk drives and USB devices with a virtual machine. VMware Workstation includes the ability to group multiple virtual machines in an inventory folder. VMware Workstation is a more robust hypervisor with some advanced features, such as record-and-replay and VM snapshot support.
VMware Workstation has four major technical feature and support

 running multiple different operating systems or versions of one OS on one desktop,
Use in labs and demonstration purposes.
It does come with a price tag, as there is no free version.
For MacOS users, VMware has developed Fusion that is similar to their Workstation product. It comes with somewhat fewer features, but also carries a smaller price tag.

2. VMware Server
It is a discontinued free-of-charge virtualization-software server suite developed and supplied by VMware, Inc. It have fewer features than VMware ESX, software available for purchase, but can create, edit, and play virtual machines. It uses a client–server model, allowing remote access to virtual machines, at the cost of some graphical performance (and 3D support). It can run virtual machines created by other VMware products and by Microsoft Virtual PC. (Muller Al, 2005)
VMware Server can preserve and revert to a single snapshot copy of each separate virtual machine. VMware Server is a free, hosted virtualization hypervisor that’s very similar to the VMware Workstation.
3. Parallels Desktop for Mac:
It is software providing hardware virtualization for Mac computers with Intel processors. Parallels Desktop for Mac is a hardware emulation virtualization software, using hypervisor technology that works by mapping the host computer’s hardware resources directly to the virtual machine’s resources. Each virtual machine thus operates identically to a standalone computer, with virtually all the resources of a physical computer. Parallels Desktop for Mac is able to virtualize a full set of standard PC hardware, including,

A virtualized CPU of the same type as the host’s physical processor,
ACPI compliance system,
A generic motherboard compatible with the Intel i965 chipset,
Up to 64 GB of RAM for guest virtual machines,
Up to 2 GB of video RAM (VRAM)

4. Oracle VM Virtual Box
Virtual Box hypervisor technology provides reasonable performance and features virtualize on a limited budget. Despite being a free, hosted product with a very small footprint, Virtual Box shares many features with VMware vSphere and Microsoft Hyper-V. Virtual Box is not resource demanding, and it has proven to be a good solution for both desktop and server virtualization. Operating system support. It can run software written for one operating system on another (say, Windows software on Linux) without having to reboot.
Task 2:
On the basis of the evaluation performed in TASK 1, Oracle VM Virtual Box make the most sense for given scenario. It is Functional and free software. It has passed through a few different hands but is now owned by Oracle. Its open-source, hence it’s free price tag, and has a large number of features to back it up. We describe virtual box as a full virtualization. It allows an unmodified operating system with all of its installed software to run in a special environment. This environment, called a “virtual machine”, is created by the virtualization software by introducing hardware components and certain features. The physical computer is then usually called the “host”, while the virtual machine is often called a “guest”. Most of the guest code runs unmodified, directly on the host computer, and the guest operating system “thinks” it’s running on real machine. (Vojnak Dejana, 2019)
The virtualization technique of Oracle VM Virtual Box are:

Operating system support: It can run software written for one operating system on another (say, Windows software on Linux) without having to reboot.

Infrastructure consolidation: Since the full performance of today’s computers is rarely needed full-time, instead of running many such physical computers, one can “pack” many virtual machines onto a few powerful hosts and balance the loads between them. This can save a lot of hardware costs: e.g. by consolidating many servers into a few.
Testing and disaster recovery: Especially with the use of snapshots one can mess with a computing environment by running it as a virtual machine. If something goes wrong, one can easily switch back to a previous snapshot and avoid the need of frequent backups and restores.

Task 3:
Windows Deployment Services
With increased dependency on Information Technology (IT) solutions, organizations are constantly looking for better ways to automate the OS installation process on their systems. Windows Deployment Services (WDS) is a Microsoft technology that enables you to deploy Windows operating system on computers without using physical media such as Compact Disc (CD) or Digital Versatile Disc (DVD). WDS reduces overall installation time, by deploying Windows operating systems on multiple client systems simultaneously through network installation. WDS is a redesigned version of Remote Installation Services (RIS) and offers many advantages over its predecessor.
Advantages of Windows Deployment Services
• WDS uses standard Windows setup technologies including image-based deployment, virtual hard disk (.vhd and .vhdx) image files, Windows Preinstallation Environment (Windows PE), and Windows image (.wim) files
• WDS based installation is easy and efficient due to network-based installation
• WDS based installation reduces the cost and complexity of installation
• Support for mixed environments deployment
• Support for both server and client computers installation
Windows Deployment Service is effective to reinstall Virtual machines in several ways:

Images stored on the Windows Deployment Services server can be customized.
Images can be taken directly from the Windows DVD

Will contain no software applications
Will need the latest windows updates

Can create customized images

Operating system
Drivers
Windows updates
Applications and programs

Less administration required after deployment
Save the templates can be reuse to deployment new Virtual machine.

Task 4:
Network virtualization combine hardware and software network resources and network functionality into a single, software based administrative entity. Network virtualization can play many role within ICA network.
      Reduces the number of physical devices needed and power consumption: By using multiple servers and storage devices onto a single host machine, we can dramatically cut down on the space and costs required to run your network efficiently.
      Automated Management: It plays important role in reducing the burden of physical network. It allows to easily automate network and security protocols, ensuring that they are applied across an entire network infrastructure.
      Manage and prioritize traffic: In portions of a network that might be shared among different external networks.
      It allows administrators to use performance, resources, availability, and security more efficiently.
      Easily segment networks
      Permits rapid change / scalability and agile deployment
      Security from destruction of physical devices
      Failover mode: defective disk simply switches to a backup on the fly, and the failed component can be repaired, while the system continues to run
      Organizing your virtual network can be relatively easy, and immediately increase network efficiency.
      Improved Scalability: Network virtualization provides a quick and easily scalable solution. It allows business to respond to market demands with agility, expanding the services demanded by a specific group of users or providing new services as your business evolves.
Similarly, Storage virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device. Storage virtualization is all about from buying additional hardware and adding in storages in file. Storage virtualization helps to address problem of management of storage and data by facilitating easy backup, archiving and recovery tasks by consuming less time.
The main role of implementing storage virtualization are as follows:
      Easy to move and shift around the data from one hardware to another hardware i.e. just moving or coping data or virtual file from one storage to another storage.
      Easy to move and transfer, no installation, no mechanical heads to be fail. However, we will have core level of hardware on separate storage.
      For setting goal with the network also you need to buy additional storages. All the server are posted in virtual environment and virtual switches to separate them
      You can create one server network switch and there we can apply ACL (Access control list) which traffic should come in and which is denied. Similarly, which code is allowed and not allow all those sort of access control.
      Improved storage management in a heterogeneous IT environment
      Better availability and estimation of down time with automated management
      Better storage utilization
      It creates better workflows
      It allows for the costs to become more predictable.
      It allows for migrations to be performed quickly: It makes the migration of data faster because there are fewer barriers to movement present.
      It allows more than one type of storage array: When using virtual storage, it is possible to assign more than one type of array to your SAN (Storage Area Network).
      It is a cheaper option for storage: Storage virtualization reduces the amount of hardware that is necessary to achieve a needed storage capacity. That makes it easier and cheaper for the required infrastructure to be installed
      It provides better access to your data: Resources are managing centrally instead, either with an on-site installation or through the Cloud.
Task 5:
Microsoft Application Virtualization or App-V is one of the most mature and popular technologies of this type available today. App-V takes a different approach to application delivery with app-v application are not installed but instead are virtual as such they can be streamed to users whenever they click on the application icon by separating the application layer from the operating system. App-V reduces application conflicts, brings patch and update management to a central location and accelerates the deployment of new application and updates. App-V also reduces the costs associated with testing and deploying applications under a new operating system such as windows 10. Regardless of form factor such as Laptop, PC, VDI Desktop. Thereby increasing the speed at which IT can deliver applications to users. Deploying Microsoft application virtualization can deliver many other immediate benefits to IT including reduced application packaging times to a fraction of the time, typically needed to create windows installer packages and reduced compatibility and regression testing by providing isolation that prevents application to application conflicts.  App-v runs on either 32- or 64-bit windows platforms including terminal services enabling more applications per server and allowing users to access their virtual applications from anywhere. Customers who choose to leverage VDI in their environment can reduce their SAN storage space requirements through app-v shared cache capacity and with App-V 5.0 or other version you can accelerate deployment of office programs for delivery of key productivity enhancement and seamless users experience.
Application Virtualization works in following steps:

App repackaged using Sequencer
Installation monitored to capture resources
All app resources stored in an app image (.SFT)
App image placed on server for distribution
App streamed to client over network
App-V runs app in Virtual Environment (VE)
App virtualization (V12N) layer handles resource requests

Application are Virtualized with the following steps:

Sequencer captures resources created at installation time. E.g., files, registry, etc.
Resources stored in an app image
Image optimized for network streaming
App image placed on server for distribution

Conclusion
This report presents the current server infrastructure and show that how to implement application and server virtualization platform for ICA.COM domain. Also, it presents the suitable type of hypervisor for ICA.COM. This report has also provided the detail about how easy it would be managed virtual server infrastructure as compared to physical server, benefits of network and storage virtualization to manage the data and network services. Similarly, above given answer include about the window deployment services and deployment of application virtualization as the infrastures administrators. Hence, virtualization helps the organization to save the physical hardware space, save the power and cooling cost, hardware and software installation cost and management.
References

Figure 2f from: Irimia R, Gottschling M (2016) Taxonomic revision of Rochefortia Sw. (Ehretiaceae, Boraginales). Biodiversity Data Journal 4: e7720. https://doi.org/10.3897/BDJ.4.e7720
Nadir Yurtoğlu – History Studies International Journal of History – 2018 http%3a%2f%2fwww.historystudies.net%2fdergi%2f%2fbirinci-dunya-savasinda-bir-asayis-sorunu-sebinkarahisar-ermeni-isyani20181092a4a8f.pdf
Dejana Vojnak-Borislav Eordevic-Valentina Timcenko-Svetlana Strbac – 2019 27th Telecommunications Forum (TELFOR) – 2019 2:Task Performance Comparison of the type-2 hypervisor VirtualBox and VMWare Workstation
Al Muller-Seburn Wilson-Don Happe-Gary Humphrey-Ralph Troupe – Virtualization with VMware ESX Server – 2005. VMware Under the Covers

 

Server and Small Computer Hardware Specification and Operating Systems for Both Computers

CONTENT

 

       INTRODUCTION

       SERVER COMPUTER

       Server Hardware Components

Chassis Mid Tower

Motherboard Supermicro

Processor: Intel Xeon E5

Memory 16GB (2 x 8GB) 2133MHz ECC DDR4

Power Supply 500W – 80PLUS Bronze

Monitor Acer G276HL 27″ Full HD LED 1ms Gaming Monitor

Keyboard Keysonic Industrial Keyboard

Mouse Zowie EC2-B Black Medium Wired

 

     OPERATING SYSTEM AND SOFTWARES

 

     CLIENT COMPUTER

     Client Hardware Components

Case/Cabinet

Power Supply

Compact Disk Read-Only Memory (CD-ROM)

Motherboard MSI Intel Z270 GAMING PRO CARBON

Hard Disk Drive Seagate BarraCuda

Central Processing Unit (CPU)

Random Access Memory (RAM)

 

     Peripheral Devices

Monitor Samsung LS19F355 18.5-inch LED

Keyboard ADVENT K122

Mouse HP X1500 wired USB optical

 

       OPERATING SYSTEM AND SOFTWARES

Windows-7 Professional

MS Offices

Anti-Virus / Anti-Malware

 

     Conclusion

 

     Installation of Triple Boot Machine Steps

Installing Windows XP

Installing Windows 7

Installing Mint-19 Linux

Setup Raid Array in Windows 7

 

 

     References

 

 

 

 

 

INTRODUCTION

 

Computers have become an integral part of human life and with the many requirements of this human was necessary to provide this computer in a manner that facilitates and meets the needs of this human and its requirements in various aspects of life.

The labour market depends directly and indirectly on the operation of all business transactions on computers. Depending on the nature of the work, the specifications of these computers will be automated to serve the purpose for which they came.

In this technical report, we will conduct a qualitative study on the forms of computers, such as the server computer and the client computer, and review the similarities and differences between them and the requirements and specifications that must be met in each of them so that each takes its specific form and fulfils the purposes that are built for.

 

 

 

SERVER COMPUTER

Regardless of whether it’s for your home or freelance venture, you presumably would like a server within the event that you simply have a system that maintained the business. Servers accustomed value an enormous variety of greenbacks, however, you’ll construct your terribly own freelance venture server for essential workplace quality. The server will store documents and host applications while not cost accounting you excellent several greenbacks.

After researching and checking the need for the company to a server that serve the purposes required by the company, in the completion of its work.

It was necessary to pass through a number of sites in the Internet search engine to find the website on the Internet called www.scan.co.uk where the computer server 3XS T100 Server, Intel Xeon E3, tower server that meets all the requirements required by the company and cost only £1,149.98.

Author: tower Scan 3XS T100 Server

Article title: Scan 3XS T100 Server, Intel Xeon E3, tower

Website title: Scan.co.uk URL: https://www.scan.co.uk/products/scan-3xs-t100-server-intel-xeon-e3-1220-v5-16gb-ram-2-x-1tb-hdd-towerAccessed 30 Nov 2018

 

This server is characterized by advantages that serve the company’s purpose. Economically, it does not exceed the budget available by the company to build a server that fulfills the minimum requirements for performing the company’s tasks and works in a distinctive way that facilitates the company’s work and contributes significantly to the productivity of the company. As a result of efficient work reduced time wasted in data processing, preservation and retrieval. The 3XS Tower server has its hardware specifications and features which we will discussed in detail below.

The Server Hardware Components:

 

Chassis Mid Tower (192 x 424 x 525.3mm)

This cabinet is characterized by it’s streamlined, modern way and also the flexibility that allow it to contain all accessories without the need to buy additional parts to be able to include these accessories.

Features and specifications for this chassis are shown below in the table.

Features

Specifications

4x 3.5″ internal SAS/SATA HDD Bays90° rotatable HDD cage design4x 2.5″ internal SAS/SATA HDD (opt.)

Peripheral Drive Bays: 2x 5.25″ and 1x 3.5″

1x 12cm Rear Exhaust Fan1x 12cm Front Cooling Fan (opt.)

7x Full-height, Full-length PCIExpansion Slots

Front I/O ports: 2x Audio (HD/AC97),2x USB 2.0 ports

High Efficiency Power Supply

Cost Effective Desktop, Embedded,Workstation Chassis

SuperChassis 732D2-500B (Black)

Expansion Slots

7x Full-height, Full-length I/O expansion slots

Front Panel

Buttons

LEDs

Power status LED

Hard drive activity LED

Network activity LED

System Overheat LED

Ports

2x Front USB 2.0 ports

2x Front HD/AC97 Audio ports

Power Supply

500W AC power supply w/ PFC

Website title: AVADirect Custom Computers, URL: https://www.avadirect.com/732D2-500B-Black-Mid-Tower-Server-Chassis-3-5-Hot-swap-SAS-SATA-HDD-4-ATX-E-ATX-Micro-ATX-500W-PSU-w-PFC/Product/5098933Accessed 30 Nov 2018

 

 

 

Figure 1.1 Mid-Tower Cabinet

 

 

Motherboard Supermicro 5039a-il

This motherboard that made it distinctive it’s the high efficiency and high speed in addition to many of the slots that enable us to add accessories, making the upgrade of the server in the future easier and less costs.

Key Features:

Intel® Xeon® Processor Skylake-W , Intel® Xeon® Processor W Family., Single Socket R4 (LGA 2066) supported, CPU TDP support Up to 140W

Intel® C422

Up to 256GB Registered ECC RDIMM, DDR4-2666MHz; Up to 512GB Registered ECC LRDIMM, in 8 DIMM slots

3 PCI-E 3.0 x16,

1 PCI-E 3.0 x4***3xPCI-E3.0 x16 Slots(8/16/16 (Skylake-W 48 lanes), 1xPCI-E3.0x4 slots***

M.2 Interface: 2 PCI-E 3.0 x4

M.2 Form Factor: 22110

M.2 Key: M-Key (RAID 0,1 support)

U.2 Interface: 2 PCI-E 3.0 x4

Intel® C422 controller for 6 SATA3 (6 Gbps) ports; RAID 0,1,5,10

*iRST enabled, only SATA2 to SATA5 support RAID.

Single LAN with Intel® PHY I219LM LAN controller

Single LAN with Aquantia 5G LAN chip AQC108

Article title: X11SRA | Motherboards | Products – Super Micro Computer, Inc.,

 Website title: Supermicro.com,

URL:https://www.supermicro.com/products/motherboard/Xeon/C420/X11SRA.cfm

Accessed 30 Nov 2018

Figure 1.2 supermicro 5039a-il motherboard

 

 

 

Processor: Intel Xeon E5 1225 v6 ‘Kaby Lake’ 3.3GHz Quad Core

This processor is designated by high speed and great efficiency makes it highly desirable in the work market.

The Intel Xeon E5 1225 processor features the power and speed required to meet the requirements and delivers fast response speed for fast file and program opening and seamless application and web page navigation without delay.

Features and Specifications

• Intel® Turbo Boost Technology 2.0• Intel® vPro Technology • Intel® Hyper-Threading Technology• Intel® Virtualization Technology (VT-x)• Intel® Virtualization Technology for Directed I/O (VT-d)• Intel® Trusted Execution Technology• AES New Instructions• Intel® 64• Idle States • Enhanced Intel SpeedStep® Technology• Intel® Demand Based Switching • Thermal Monitoring Technologies • Intel® Flex Memory Access • Execute Disable Bit

Author: Intel Bridge-EP

Articletitle: Intel Xeon E5-2643 Processor Sandy Bridge-EP

Websitetitle: Scan.co.uk

URL: https://www.scan.co.uk/products/intel-xeon-e5-2643-lga-2011-sandy-bridge-ep-quad-core-33ghz-base-35ghz-turbo-80gt-s-10mb-cache-130w-Accessed 30 Nov 2018

 

 

Figure 1.3 Intel Xeon E5 1225

Memory 16GB (2 x 8GB) 2133MHz ECC DDR4

RAM is a type of data and information storage memory in a computer, through which it can access any data stored in a random way, which makes it quickly accessible to stored data and access to certain specific information.

The 16GB (2 x 8GB) 2133MHz ECC DDR4 ram is identified by it is large storage capacity and it the high speed of access to the data and information that made it suitable for work in the servers because of the dynamic work in multiple ways that grantee a maximum rapidity in accessing all the required information.

Features and Specifications

Dual channel, 8 Layers PCB heatspreader, anodized aluminum heatspreader, Intel Extreme Memory Profiles (XMP 2.0), Vengeance LPX low profile heatspreader, unbuffered.

Figure 1.4 Memory 16GB (2 x 8GB) 2133MHz ECC DDR4

Power Supply 500W – 80PLUS Bronze

Despite the huge development in the hardware parts, providing sufficient energy and the ability to not consume large quantities of watts while maintaining the efficiency and performance, but the offer available in this power supply makes it incredibly appropriate for the job.

Features and Specifications

EasyRail™ Plus Technology allowing plenty of wattage headroom to handle your devices.

Extreme heat tested capacitors 

 Net Weight: 1.7kg 

Connectors: Full Wired

For more information regarding this power supply refer to the reference list.

 Figure 1.5 Power Supply

 

 

Monitor Acer G276HL 27″ Full HD LED 1ms Gaming Monitor

acer G6 series monitors area unit unbelievably fashionable with an incredible-slim portrait. outstanding performance eco-friendliness and sensible use of energy complement the sleek style all whereas staying well among budget £134.

It enables the user to set the display as he wishes to fit with acer e-colour management. the magnificent visions are made also better by charming colours via acer adaptive contrast superintendence.

Features and Specifications

• Screen: 68.6 cm (27″) Full HD (1920 x 1080)• Panel Technology: Twisted Nematic Film (TN Film) (170°x160°)• Inputs: HDMI, DVI, VGA• Response Time: 5 ms• Brightness: 250 cd/m²

   Figure 1.6 Acer Monitor

Keyboard Keysonic Industrial Keyboard, Full Size, Waterproof, USB – KSK-8030 IN

This keyboard is designated by its streamlined shape, which makes it easy to use and makes the pressing on the keys simple and the speed to access an unbelievable light, in addition to its cheap price compared to the features afforded and the possibilities provided by this keyboard an ease of use and the feature waterproof all of is addressed it more proper for our server.

Features and Specifications

ergonomically designed siloxane covered keyboard with one zero five keys. our keysonic keyboard has associate degree excellent tactile feedback and is watertight to ip68 norm and might so even be soaked in liquids. the facade of the keysonic keyboard is supplied with a special cover and thus combines a sensible manufacturing and substance immunity in order that you’ll be able to work with habitual disinfectants and therefore the keys print won’t dissolve.

    Figure 1.7 Keysonic Keyboard

8.     Mouse Zowie EC2-B Black Medium Wired eSports Gaming Mouse

The ergonomic structure just for right-gave users. It offers users a greater house for wrist joint developments. The state of the right facet of the mouse is balanced. It permits the client’s fingertips to hold/cover the mouse to manoeuvre simply.

Features and Specifications

No drivers needed, plug and play

Ergonomic design exclusively for right-handed users

Cable Length 2m / 6,6 ft

    Figure 1.8 Mouse Zowie EC2-B

 

OPERATING SYSTEM AND SOFTWARES

Linux Mint operating system is considered as one of the most elegant and powerful operating system easy to use, which made many companies depend on Linux Mint for the work of their servers and what distinguishes it in addition to the strength and speed that designate it comparing to many other OS such as windows server, as the most important also is free of charge to get it from the Internet https://linuxmint.com/ where it does not deceive to the right of a particular company and it is one of the open resources available on the Internet for free, therefore is would be suitable to our company server to use this open source and free of price operating system distribution.

Features and Specifications

Fast, safe and reliable

Has more than thirty thousand packages

Great software manager

Full multimedia support

Free of charge and open source.

   Figure 1.9 Linux Mint O.S.

 

 

 

 Libre Office

LibreOffice is free and open source software, originally based on OpenOffice.org (commonly known as OpenOffice), and is the most actively developed OpenOffice.org successor project.

Articletitle: Who are we? LibreOffice – Free Office Suite – Fun Project – Fantastic People

Websitetitle: Libreoffice.org

URL: https://www.libreoffice.org/about-us/who-are-we/

Accessed 06 DEC 2018

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CLIENT COMPUTER

 

 

before begin buying the device components you need to have a concept and a tenet that helps you to remain within the scope of the budget you have already got and therefore the specification meets the necessities of the purchaser. its well and suggested to own an honest search on the net websites and examine the costs between them before buying thus you’ll get the most effective worth offered online that its appropriate to your budget. websites like (Scan, eBay, gumtree and newegg …etc). area unit invariably providing a competitive worth that may facilitate to stay the finances to the most profit.

Gathering an accurate specification of the component to build the device while keeping in mind the budget you have:

The Client Hardware Components:

 Computer hardware refers to the physical parts or components of a computer such as the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips), etc. all of which are physical objects that can be touched.

Starting by the hardware parts the first purchase must be a case or the container of all the other hardware parts.

      Case/Cabinet this is the metal box that contains the computer hardware parts, in the case, you will find the power supply, floppy drive, CD ROM drive, the hard drive, motherboard and the central processing unit (CPU) …etc. for our small business client the best case which is decent for the office light use and fit our demand is CiT Dark Star Midi Case which cost around £34 only.

   Figure 2.1 CiT Dark Star Midi Case

 

      Power Supply the electrical component that supplies power to at least one electric load and it converts a different form of energy. The best option available to our project in online market is the Coolermaster Masterwatt Lite V2 400w PSU (Power Supply Unit) and it’s available on http://www.ebuyer.com which costs about GB £30.

Features and Specifications

 Advanced Circuit Design

Silent and Durable Fan

Green Power

Safety Guardian

80 Plus Standard 230v PSU

Figure 2.2 Coolermaster Masterwatt Lite V2 400w PSU

 

      Compact Disk Read-Only Memory (CD-ROM)

a device can read CD-ROMs, but can’t write to it, CD-ROM’s are not writable or erasable. It is designed to store computer data in the form of text and graphic. Its price in http://www.amazon.co.uk is about GB £13 which means good enough for our budget.

Figure 2.3 LiteOn IHAS124-14 24x SATA Internal DVD-RW

 

 

 

 

      Motherboard the heart of any computer system. Everything plugs into the computer’s motherboard, and its role is to allow all the different parts of the computer system to communicate with each other. Best option we can have for our device is MSI Intel Z270 GAMING PRO CARBON 7th/6th Gen. which it costs GB £141 in http://www.amazon.com with great specifications such as 6x SATA (Serial AT Attachment) 6GB/s ports and 2x M.2 slots.

Figure 2.4 MSI MSI Intel Z270 GAMING PRO CARBON

 

      Hard Disk Drive(HDD) stores the computers operating system, applications and saved files. The most important information on any hard disk specification is the amount of data it can store. One of the demands in our business computer for this project is to have a great storage capacity which it’s a significant part of the device is to store the data collected form the clients and the staff as well. Therefe for I found it according to our affordability and budget is to have a Seagate BarraCuda 1TB (Terabyte) HDD, its price in the market is not fixed from a place to another, but after a great research online I settle down in http://www.scan.co.uk website which offer the best price and it cost GB £40

 

Figure 2.5 Seagate BarraCuda ST1000LM048 /HDD

      Central Processing Unit (CPU) the component of the device that carries out all tasks and telling other component of the system what to do. A good offer for a cpu core i5-3230M with speed of 2.6GHZ (gigahertz) was available in http://www.encore-pc.co.uk which costs about GB £50. This CPU is more than compatible for the job a device designed for and an excellent choice in the range of our budget.

 

Figure 2.6 intel core i5-3230m processor

 

      Random Access Memory (RAM) it’s a type of storage that keeps a computer data and a machine code that currently being used. For the business office device, a perfect option is available in http://uk.crucial.com which it is a new crucial 4GB DDR3L-1600 SODIMM It’s price around GB £30.

Figure 2.7 Crucial 4GB DDR3L-1600 SODIMM

      Peripheral Devices

is that any kind of device that plugs into the case and provides input and output for the computer such as keyboard, mouse, monitor …etc. peripheral devices are not part of the essential computer component which cannot work without them (i.e., the memory and microprocessor).

Monitor it is one of the main peripheral devices which displays information and provide a visual output from a computer. Computer monitors use CRT (cathode ray tube), LCD (liquid crystal display) and LED (light-emitting diodes) technology.

For our business device the best monitor based in our budget it will be the Samsung LS19F355 18.5-inch LED monitor which it cost around GB £70 in http://www.pcworld.co.uk with features of a comfortable viewing due to a reduced blue light and slim design that can be easily wall mounted and portable.

Figure 2.8 SAMSUNG LS19F355 18.5

 

 

 

 

 

 

 

 

 

 

 

Keyboard an input device used to enter characters and functions into the system by pressing buttons or keys. Keyboards come in two major types of computer keyboard basic one and extended. The basic contains 104 keys and the extended may have additional buttons.

By searching for the most suitable keyboard it was advisable to look for the basic type of keyboards which it is enough to perform all the functions that can be done in Windows PC (personal computer) and less cost comparing to the extended one. Cheapest keyboard and compatible that fulfil the purpose is ADVENT K122 keyboard which cost as about GB £6 in http://www.currys.co.uk It is a great choice because of it is comfortable design and the features it has such as the USB (Universal Serial Bus) port standard that can be used with both desktop and laptop as well without any requires for setup.

Figure 2.9 ADVENT K112 Keyboard – Black

 

 

Mouse an input andhand-held pointing device that allows an easier control of the graphic user interface (GUI). Good and sufficient option with great compatibly to our need and budget is available in http://www.ao.com, the mouse HP X1500 wired USB optical has a great features such an easy set-up and smooth movement with optical technology and main thing with all the features it has it’s cost us GB £8.

 

 

Figure 2.10 mouse HP X1500 wired USB

 

Operating System the low-level software that supports a computer’s basic functions, such as scheduling tasks and controlling peripherals, as well as users, can interact right with the operating system through a user interface such as a command line interface (CLI) and graphical user interface (GUI). For an OS many examples that include versions of Microsoft Windows (Windows XP, Windows 7, Vista and so on) Apple’s macOS, iOS and Linux operating system.

Find Out How UKEssays.com Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

Windows-7 Professional this edition of Windows-7 includes all the features of Windows Home Premium and supports 32-bit and 64-bit CPU and 64-bit installation media are included. Windows-7 Professional – Provides access to the high graphics user-interface. This platform is chosen because it is more ideal for our business and suitable for the company budget. Its available at http://www.amazon.co.uk with good price of GB £11.

Software and Applications are a set of instructions and associated documentation that tells a computer what to do or how to perform a task. Applications are programs that do a specific thing, such as a game or MS-office.

MS Offices a suite of products developed by Microsoft Corporation that includes Microsoft Word, Excel, Access, PowerPoint, Publisher, and Outlook. It’s important for every business to have MS-Office application software which assists in performing many business tasks. For our company, was recommended to include it in our budget for the reasons we mentioned above. By searching for the most compatible and suitable to our business MS-Office product it was the only option which was good for our financial situation is that to have MS-Office 2016. For GB £27.

Anti-Virus/ Anti-malware a computer software which designed to prevent and protect the device form a deferent type of viruses that may affect in the computer performance and the data stored in the device, an antivirus software is used to detect the malware and remove it from the device. It’s recommended to use Kaspersky antivirus which it is top rated anti-virus program that prevents any form of virus/malware infecting the system and provides a firewall for the entire system. This firewall prevents intruders. This genuine software is available in http://www.kaspersky.co.uk with just GB £22.50, which means comparing to it is benefit is more attractable and preferable.

Conclusion

Finally, in conclusion, the main thing we can understand form building our own computing device, starting from the lowest levels of business body and home users to the highest business companies are all the same in how to plan for their devices demand and their business need for a computer.

But the only thing that makes a difference in a device to be built is the use of that device and for what is going to be used and the budget that is invested in the device computer.

Name: ALI EGAIL

ID No. 1806511

Email: aoe1crt@bolton.ac.uk

 

STEPS FOR INSTALLING A TRIPLEMACHINEBOOT (XP, Windows_7 and Mint-19 Linux)

Start Installing Windows XP first and using XP CD to create the portioning …

 

 

 

 

 

 

 

INSTALLATION OF WINDOWS-7 STEPS:

 

 

 

 

 

 

 

 

 

 

 

 

STEPS TO INSTALL MINT_19

 

Setup Raid Array in Windows-7

References

 

https://www.storagereview.com/ssd_vs_hdd

https://www.scan.co.uk

Accessed 28 Nov 2018

Author: Intel Bridge-EP

Article title: Intel Xeon E5-2643 Processor Sandy Bridge-EP

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/intel-xeon-e5-2643-lga-2011-sandy-bridge-ep-quad-core-33ghz-base-35ghz-turbo-80gt-s-10mb-cache-130w-

Accessed 30 Nov 2018

Author: tower Scan 3XS T100 Server

Article title: Scan 3XS T100 Server, Intel Xeon E3, tower

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/scan-3xs-t100-server-intel-xeon-e3-1220-v5-16gb-ram-2-x-1tb-hdd-tower

Accessed 30 Nov 2018

Author: BY JEFF TYSON & DAVE COUSTAN

Article title: How RAM Works

Website title: HowStuffWorks

URL: https://computer.howstuffworks.com/ram.htm

Accessed 30 Nov 2018

Article title: Corsair Vengeance LPX 16GB (2x8GB) DDR4 2133MHz DIMM 288-pin (CMK16GX4M2A2133C13) | BT Shop

Website title: BT Shop

URL:https://www.shop.bt.com/products/corsair-vengeance-lpx-16gb–2x8gb–ddr4-2133mhz-dimm-288-pin-cmk16gx4m2a2133c13-BMRW.html

Accessed 01 DEC 2018

Article title: XFX XT Series 500W 80 Plus Bronze Power Supply – Aria PC

Website title: Aria.co.uk

URL: https://www.aria.co.uk/Products/Components/Power+Supplies/Non-Modular+650W+or+less/XFX+XT+Series+500W+80+Plus+Bronze+Power+Supply+?productId=65947

Accessed 03 DEC 2018

Author: Acer Monitor

Article title: Acer G276HL 27″ Full HD LED 1ms Gaming Monitor

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/27-acer-g276hl-fhd-monitor-1920×1080-60hz-169-1ms-250cd-m-brightness-vesa-hdmi-dvi-d-vga

Accessed 02 DEC 2018

Author: USB – KSK-8030 IN Keysonic Industrial Keyboard

Article title: Keysonic Industrial Keyboard, Full Size, Waterproof, USB – KSK-8030 IN

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/keysonic-ksk-8030-in-full-sized-industrial-keyboard-ip68-rated-waterproof-usb

Accessed 03 DEC 2018

Author: Zowie Mouse

Article title: Zowie EC2-B Black Medium Wired eSports Gaming Mouse

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/zowie-ec2-b-medium-gaming-mouse-black

Accessed 05 DEC 2018

Author: Steven J. Vaughan-Nichols

Article title: Anonymous MSFT developer admits Linux is faster than Windows | ZDNet

Website title: ZDNet

URL: https://www.zdnet.com/article/anonymous-msft-developer-admits-linux-is-faster-than-windows/

Accessed 01 DEC 2018

Author: Carlos Drifter

Article title: About – Linux Mint

Website title: Linuxmint.com

URL: https://linuxmint.com/about.php

Accessed 03 DEC 2018

Website title: Amazon.co.uk

URL: https://www.amazon.co.uk/CiT-Dark-Star-Window-Panel/dp/B01MSE3M3W

Accessed 03 DEC 2018

Article title: Coolermaster Masterwatt Lite V2 400w – PSU Ebuyer

Website title: Ebuyer.com

URL: https://www.ebuyer.com/828324-coolermaster-masterwatt-lite-v2-400w-psu-mpx-4001-acabw-ks?mkwid=s_dc&pcrid=51482424299&pkw=&pmt=&gclid=EAIaIQobChMI4vS366iE3wIVE53VCh1COAycEAQYASABEgIKVvD_BwE

Accessed 13 OCT 2018

Website title: Amazon.co.uk

URL: https://www.amazon.co.uk/LiteOn-IHAS124-14-SATA-Internal-DVD-RW/dp/B00ERJXTE4?ref_=fsclp_pl_dp_

Accessed 23 OCT 2018

Website title: Amazon.co.uk

URL:https://www.amazon.co.uk/MSI-Intel-Z270-PLUS-Motherboard/dp/B01N5LSIYI/ref=pd_lpo_vtph_147_bs_t_1?_encoding=UTF8&psc=1&refRID=29DKBEFKEZPWYN3EKEWN

Accessed 23 NOV 2018

Author: Seagate drive/HDD

Article title: Seagate 1TB Guardian BarraCuda ST1000LM048 2.5″ 7mm Internal Hard drive/HDD

Website title: Scan.co.uk

URL: https://www.scan.co.uk/products/1tb-seagate-guardian-barracuda-hdd-25-7mm-form-factor-sata-iii-6gb-s-128mb-cache-5400rpm

Accessed 02 DEC 2018

Article title: Crucial 4GB DDR3L-1600 SODIMM | CT51264BF160B | Crucial UK

Website title: Crucial

URL: http://uk.crucial.com/gbr/en/ct51264bf160b

Accessed 04 DEC 2018

Article title: SAMSUNG LS19F355 18.5″ LED Monitor – Black

Website title: pcw

URL: https://www.pcworld.co.uk/gbuk/computing/pc-monitors/pc-monitors/samsung-ls19f355-18-5-led-monitor-black-10161976-pdt.html

Accessed 04 DEC 2018

Article title: ADVENT K112 Keyboard – Black

Website title: currys

URL: https://www.currys.co.uk/gbuk/computing-accessories/computer-accessories/mice-and-keyboards/keyboards/advent-k112-keyboard-black-13828361-pdt.html

Accessed 03 DEC 2018

Article title: H4K66AA#ABB | HP Wireless Mouse | ao.com

Website title: Ao.com

URL: https://ao.com/product/h4k66aaabb-hp-x1500-mice-black-49068-265.aspx

Accessed 04 DEC 2018

Website title: Amazon.co.uk

URL: https://www.amazon.co.uk/Microsoft-Windows-Home-Premium-Version/dp/B002DUCMT2

Accessed 04 DEC 2018

Author: Microsoft PC

Article title: Microsoft Office 2016 Professional Plus for Windows PC

Website title: TheKeyFactory

URL:https://www.thekeyfactory.uk/products/microsoft-office-2016-professional-plus-for-windows-pc.html?gclid=EAIaIQobChMIx4Wy4t6E3wIVyuR3Ch2ViQgmEAQYASABEgIZ-vD_BwE

Accessed 10 DEC 2018

Article title: Who are we? | LibreOffice – Free Office Suite – Fun Project – Fantastic People

Website title: Libreoffice.org

URL: https://www.libreoffice.org/about-us/who-are-we/

Accessed 06 DEC 2018