Description
Scenario: You are a consultant for an IT consulting firm, specializing in Windows Client/Server Infrastructure. The project timeline has you first submitting a proposal for the work to be completed. Part one of the statement of work (SOW) is for you to evaluate the services and technologies that currently exist in their environment, identify single points of failure (SOF), and suggest the most optimal way to make that particular technology highly-available (HA) and or fault-tolerant (FT).
Part two of the SOW states you will create a Business Continuity and Disaster Recovery (BC/DR) plan for their infrastructure. To fit a “reasonable” (purposefully ambiguous) recovery time objective (RTO) and recovery point objective (RPO) using enterprise-level technologies.
Be sure to include the following in both the HA, and BC/DR solutions.
What products and/or technologies will be used?
What RTO/RPO will be possible?
What kind of security is being used to secure the data in all forms?
What is being done to protect from a Natural Disaster?
What kind, and how much, extra infrastructure (servers, storage, network, etc.) is needed?
Environment: *See Excel Spreadsheet*
Your Task: Your task is to perform the above work and submit it to the customer in the form of a technical document. This should be sufficient to submit to a customer, and must be presentable to both a C-level executive and the technical staff. Meaning, it must include any and all costs, as well as technical details. You will not be implementing the changes that you recommend, so no detail need be left undocumented. *Note that you are more than welcome to ask any and all clarifying questions about the infrastructure if needed.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Can you extend for me the time a bit?
Attached.
Running Head: BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN
Business Continuity and Disaster Recovery Plan
Name
Instructor
Institutional Affiliation
Date
1
BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN
2
Part I
Technologies and Services
The technologies and services that currently exist in the environment include physical
and virtual servers, storage area network (SAN), routers, firewall, switch, wireless distribution
system (WDS), domain controller, CPU, and print and file servers. The organization has both
virtual and physical servers. Fundamentally, physical servers are essentially servers in which
operating systems run on them. They are in almost all facets like computer systems, with various
enhancements that personal computers lack including aspects such as raid controllers, redundant
power supplies, and multiple network cards among others. Virtual servers, unlike physical
servers, do not have physical locations and share software and hardware resources with other
operating systems (Wallace, & Webber, 2017).
The environment also consists of the storage area network which is a high-speed network
that interlocks and provides shared pools of storage accessories to various servers. It offers
block-level network access to storage and comprises of switches, hosts, and storage devices.
Routers and switches are also available in the environment. They are computer networking
devices that enable computers to be connected to other PCs as well as other networks. The
function of the router is to guide data in the network whereas that of a switch is to enable
connections to several devices. Wireless distribution system (WDS) is also available in the
environment and refers to a system allowing wireless interlinks of access points in a wireless
network. It should be noted that a router can serve as a wireless base station in a wireless
distribution system.
BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN
3
Another technology that currently exists in the environment is the domain controller.
Typically, a domain controller is a server that reacts to security verification appeals within a
Windows Server domain. It controls network security effectively by serving as the warden for
user verification and approval. A firewall is also installed in the organization’s computer systems
to protect them from some types of network traffic as well as unauthorized users with malicious
intentions. The environment also consists of multiple computer systems used within the
organization (Cook, (2015).
...