Linux Implementation proposal

Running Head: Linux Implementation Proposal 1
Linux Implementation Proposal
[Author]
[Institution]
Running Head: Linux Implementation Proposal 2
There are numerous version of Linux that are available for use such as
Ubuntu, Linux Mint, Fedora, CentOS (Hendler., 2006). The choice to use Linux Mint is
due to the fact that its simple to use ,customizable and compatible with all types of
hardware .Linux Mint is designed and created to be used by everyone, no matter what
operating system they have used previously. The user interface is similar to that of
Windows with Apps, settings and quick launch icons being located in the same place as
in Windows hence rewiring no learning curve. Listed below are the minimum system
requirements to run Linux Mint.
Processor X86 uses Linux Mint 32-bit and the 64 bit version uses Linux Mint
64-bit
RAM is 512 MB however 1 GB is more preferable as it offers better performance.
The minimum disk size required is 5GB although the recommended size for
optimal performance is 20GB.
The Graphics card properties required are 800×600 resolution but the
recommended are 1024×768.
DVD drive or USB port
Present Desktop/Laptop properties that are in use by the Windows XP:
Intel Core 2 Processor
Random Aces Memory (RAM) 512
80GB Hard Disk
10/100 Mbps Network Card
Running Head: Linux Implementation Proposal 3
4 USB 2.0 USB port
15inch LCD Monitor
A comparison of the minimum requirements to run Linux Mint to the current
desktop configuration of Windows XP shows that Linux Mint runs in minimal hardware
requirements, hence the current hardware setup of the machines largely outperforms the
requirements for Linux Mint and is hence suitable for use.
The next step is to create a backup plan for the data in the Windows XP machines
before installing the Linux Mint. Due to the fact that numerous desktops operating
system are going to be replaced, planning has to be carried out to ensure that the
migration is carried out accordingly and no data is lost. The next step is to create a
backup plan for the data in the Windows XP machines before installing the Linux Mint.
There are two options in backing up data. Data can be backup in the drive partition of
the computer or to an external hard drive (Linux Mint, 2017).A disk partitioning tool
should be run on Windows XP to create a partition where the user data can be backed up.
The other partition where the operating system is to installed should have at least 50GB
of Hard Drive space to allow for the effective running of the Linux Mint operating
system that will be installed in it later.
Once data has been backed up , the next step is the install the Linux Mint operating
system. An operating system installation disk is created with the use of a burning
software that will be used to install Linux Mint in the machines. There are a number of
installation disks burning software that are available for use and include Nero Burning
Rom, Express Burn Disk , Ashampoo Burning Studio and Express Burn Disc. The disk
Running Head: Linux Implementation Proposal 4
is utilized to deploy the operating system by running it in a machine. The installation
process is straight forward upon changing the boot sequence in the host machine from
hard disk to CDROM . Linux mint will periodically requiring the administrator to
specify details like the partition to be used to install the operating system ,login
credential, work groups, confirm location of machine for time zoning purposes.
Linux mint has a preconfigured default password and username. Administrators are
hence required to change the login credentials of users and disable the default username
and password in order to prevent users from elevating their privilege levels to root users
After Linux Mint boots, a screen that resembles the welcome screen in Windows is
displayed. A prompt pops up with an request that is given in the form of on a command
line interface. The computer user is prompted to key in their access credentials to gain
to entry the system. In the case that the login credentials of the computer user match
the beforehand passwords stored in the company’s staff database, the user is granted
access to the desktop window therefore effectively completing a logging in. Access
levels to the user accounts will differ in regards to a user’s role, duty and clearance .
It is very cumbersome and impractical for the administrator to manually
subnet and configure static IP addresses in each and every machine in the organization.
There is also a high possibility of IP address conflict (Yashpalsinh Jadeja, 2012).
Therefore, DHCP is the most suitable method for acquiring IP addresses for the
machines. A DHCP server will be setup in a server and configured with a pool large
enough to cover the IP address needs within the organization. The machines will be
configure to request and consequently receive IP addresses from a DHCP server by
making DHCP address request. On receipt of the request, the DHCP responds by
Running Head: Linux Implementation Proposal 5
sending the client an IP address, subnet mask and default gateway. The client machines
are then able to send and receive data from other networks using the addressing
information they received from the DHCP server.
A Domain Name Resolution server will be set up to resolve server names to IP
addresses. The server will specify the resolution of IP addresses to hostname. In addition,
they will be configured to prevent spoof attacks and in the case of an attack, have
procedures to alert the system administrators on such attacks (Ratajczak, 2015).
Data sharing is achieved by configuring a resource sharing folder that is set
up in a server or in the cloud. The folders are called network shares and can be accesses
remotely by users who have the necessary access permissions . Security in file sharing is
achieved by ensuring only authorized access to files. Alerts should be made when client
computers access data from a computer. Nautilus system can be used to securely send
data over workgroups using SSH, web day and FTP In order to access network shares in
Linux Mint there is a window that is located below the place pane. The pop up window
that is displayed offers a list of the serves and networks which the user possesses the
right to gain access to. The user then chooses the server in the list that is displayed
and is then prompted to enter a username and password to access the documents.
A printer has to be installed on the network prior to any of its use. The
machines in the network are then configured to print using printers in the network by
clicking on the system icon on the administration option ,a pop up window then lists
some choices of services a user can access. The user then selects the printing option after
which they are prompted to search for a printing device. A dialogue box consequently
Running Head: Linux Implementation Proposal 6
pops up requiring the user to enter details of the user id. Once the user keys in their
correct details, the computer finally synchronizes with the printer .
The Unix system has an inbuilt technology that tackles encryption and decryption
of data (Elham Vaziripour, 2016) .Unix systems store data in encrypted forms. The
loopback modules of Unix provides a guarantee that files are both encrypted and
decrypted simultaneously. In the case of encrypted data, administrators can use loopback
modules to decrypt the data. The company is to implement a firewall that will inhibit and
regulate unauthorized data flow in and out of the company’s network. This is achieved
by modifying the security settings in Linux as it has an already inbuilt firewall that just
needs configuration to filter packets (Elham Vaziripour, 2016).
Running Head: Linux Implementation Proposal 7
To conclude, the Windows XP hardware components that the company is
currently in possession of are more than sufficient to be used by a Linux operating
system. As alluded to throughout the proposal, there are numerous benefits to be gained
by using Linux Mint as an operating system. The light nature of the Linux operating
system when compared to Windows XP guarantees that the computer will function
better and faster .Linux also offers user friendly and optimized interface for users. In
addition, the use of the automatic method to install Linux makes it easier and faster to
install Linux in numerous machines .Also, Linux is optimized for data sharing, network
connection and encryption and data security. Its built in security features makes it one of
the safest operating systems in the market. Not to mention the fact that all of this features
are available to the organizational at no cost .
References
Elham Vaziripour, M. O. (2016). Social Authentication for End-to-End Encryption.
Retrieved from
https://www.usenix.org/system/files/conference/soups2016/way_2016_paper_vazi
ripour.pdf
Hendler., J. G. (2006). Inferring binary trust.
Linux Mint. (2017). Install Linux Mint. Retrieved from http://linuxmint-installation-
guide.readthedocs.io/en/latest/
Ratajczak, D. (2015). Is Linux a better desktop operating sytem than Windows?
Yashpalsinh Jadeja, K. M. (2012, March). Retrieved from Cloud computing-concepts
architecture and challenges:
https://www.reserachgate.net/publication/254035330_Cloud_computing_-
_concepts_architecture_and_challenges
Running Head: Linux Implementation Proposal 8

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.