Free Essay

New Updates for Service Pack Features

In:

Submitted By laylasawaqed
Words 1225
Pages 5
LESSON 7

Knowledge Assessment

Fill in the Blank:

Complete the following exercise by filling in the blanks with the appropriate terms from this lesson.

1. The network load balancing method that assigns multiple IP addresses to a single host name is called ____dns round robin______.

2. The application high availability method that uses redundant servers with only one active at any time is called a __failover cluster________.

3. The Windows Server 2008 feature that enables end users to store copies of server-based documents on a local drive is called _offline files_________.

4. The servers in a network load balancing cluster continually exchange status messages called ________heartbeats__.

5. Windows Server 2008 servers can maintain multiple versions of a volume’s files using a feature called __shadow copies________.

6. The process by which servers are automatically added to and removed from a network load balancing cluster is called __convergance________.

7. A failover cluster stores its configuration database on a ___witness disk_______.

8. The role service that enables disconnected Terminal Services clients to reconnect to the same server is called _____TS session broker_____.

9. The application high availability mechanism that uses redundant servers, with all running simultaneously, is called ___network load balancing_______.

10. The Windows Server 2008 feature that enables a computer to verify an application before launching it is called _windows installer 4.0_________.

Multiple Choice:

Select one or more correct answers for each of the following questions.

1. In addition to the application data, which of the following is stored on a failover cluster’s shared storage?

a. the Failover Cluster management console
b. the witness disk
c. the TS Session Broker database
d. the Shadow Copies database

2. Which of the following Windows Server 2008 features enables users to access files that they have accidentally overwritten?

a. Offline Files
b. parity-based RAID
c. Windows Installer 4.0
d. Shadow Copies

3. Which of the following server clustering solutions can make use of a storage area network?

a. a failover cluster
b. a terminal server farm
c. a network load balancing cluster
d. DNS Round Robin

4. Which of the following RAID levels yields the largest percentage of usable disk space?

a. RAID-0
b. RAID-1
c. RAID-5
d. RAID-6

5. To use Shadow Copies, you must enable the feature at which of the following levels?

a. the file level
b. the folder level
c. the volume level
d. the server level

6. How many heartbeat messages must a server in an NLB cluster miss before it is removed from the cluster?

a. 1
b. 5
c. 50
d. 500

7. Which of the following is not a requirement to use the TS Session Broker role service?

a. All of the Terminal Services computers must be running Windows Server 2008.
b. All of the Terminal Services computers must be configured identically.
c. The TS Session Broker role service must be installed on one of the terminal servers.
d. The Terminal Services computers must all be members of the same Active Directory domain.

8. Which of the following statements is true about DNS Round Robin load balancing?

a. DNS Round Robin requires you to create multiple resource records containing the same host name.
b. When one of the servers in the cluster fails, the Windows Server 2008 DNS server performs a convergence and disables the resource record for that server.
c. To use DNS Round Robin, you must first create a cluster resource record specifying the cluster name.
d. When the Windows Server 2008 DNS server receives a name resolution request for a cluster, it replies with all of the resource records for that cluster name.

9. Which of the following statements best defines the function of the port rules in an NLB cluster?

a. Port rules specify what types of application traffic are allowed through the cluster’s firewall.
b. Port rules specify the name of the servers that are to be members of the cluster.
c. Port rules enable the cluster to detect server failures and initiate a convergence.
d. Port rules specify what application traffic is to be distributed among the cluster servers.

10. Which of the following operating systems does not include the Previous Versions client needed to access Shadow Copies files?

a. Windows XP
b. Windows Server 2003
c. Windows Vista
d. Windows Server 2008

Review Questions:

1. Explain the primary difference between a failover cluster and a network load balancing cluster. 2. Falivour cluster only one of the sevrer is running the protected appliciation at any given time, in the network load balancing all of the server in the cluster are operational and able to service client s,the nlb itself is like like a flaiover but the client connect to cluster instead of individual computers so it distrubet the traffic among its component servers.

3. List three of the disadvantages of DNS Round Robin as compared to Network Load Balancing.

Dns round robin has no connection with the server in the cluster, this means if one of the server fialed the dns server will keep send to it a request until the administrator delete it from the clusterbut in nlb they have what called convergence so if one server failed they do convergence and remove it from the cluster and vice versa

Dns server cache resource records for reuse by subsequent clients. That means when a client connect to dns server it only cache one od the dns cluster records not all .so what happened is any client connect to dns robin sevrers connect to the same server which make dns robin round not function as it suppose to function. Dns server robin doesnot balance the traffic as NLB in a way make sence but it just distribute the traffic evenly, for example two client might connect ot the web server seeing one page while another’s might download a huge files , when dns server receive the request it only disturbed the traffic in evenly way which cause latency to the client that only want to view the page..

Case Scenario

Scenario 7-1: Deploying a Terminal Services Server Farm

Wingtip Toys has recently decided to deploy all office productivity applications to its internal users with terminal servers. Robert, a member of the IT staff, has been given the responsibility for installing and configuring a server farm on the company network that consists of 12 new terminal servers running Windows Server 2008. Robert installs the Terminal Services role, with the Terminal Server role service, on all 12 computers. He also installs the TS Session Broker role service on one of the computers. After adding each of the 12 terminal servers to a TS Session Broker farm and installing the office applications on the server, Robert begins a test deployment, adding groups of users to gradually increase the terminal server traffic load. Later, when examining the traffic statistics, Robert notices that one of the servers is experiencing much higher traffic levels than the others and it is not the server running TS Session Broker. What could be the problem and how should Robert resolve it? what could be a problem is all users connecting to one single computer instead of cluster this causing overwhelmed this singe computer ,so I suggest using Network load balancing cluster and add users to it which help balancing traffic and distribute the traffic between thos servers.

Similar Documents

Premium Essay

Updates

...regularly issues patches and updates to solve security problems in their software. If these are not applied, it leaves your computer vulnerable to hackers. What are Microsoft Updates? Microsoft Update is a service that allows for the periodic patching of system files to address known issues with Microsoft products. It has been expanded to include all Microsoft. Microsoft Updates are organized into several categories: 1. Security Updates - These updates patch security vulnerabilities that could allow a system to become compromised. Ignoring these could leave your computer or server extremely vulnerable to hackers and malicious code. 2. Critical Updates - Critical Updates fix any major issue that is found in Microsoft products that could cause software errors or unexpected behaviour. Together with Security Updates, they form the "High Priority" category of updates from Microsoft and should be set to download and install automatically. 3. Software Updates - Non-critical issues, such as extended features and minor bugs, are addressed using Software Updates. 4. Service Packs - Service Packs contain a rollup of all patches to date for a specific piece of software or operating system and usually have additional feature changes. For example, Windows 7 Service Pack 1 is the latest service pack for Windows 7 and addresses all updates prior to its release as well as a small number of new features. Why Should You Update? Microsoft Updates prevent problems. Although...

Words: 329 - Pages: 2

Premium Essay

Meeeerw

...| | [ Overview of Windows XP Service Pack 3 ] Abstract Windows® XP Service Pack 3 (SP3) includes all previously released updates for the operating system, and a small number of new updates to ensure that Windows XP customers have the latest updates for their system. Windows XP SP3 will not significantly change the Windows XP experience. This white paper summarizes what is new in Windows XP SP3, and how to deploy the service pack. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Server, Windows Vista, Windows Live, OneCare, MSDN, and the Windows logo...

Words: 2299 - Pages: 10

Free Essay

Wireless Lan Security

...following set of security features to secure wireless LAN communication: Two different authentication methods: Open system and shared key The Wired Equivalent Privacy (WEP) encryption algorithm An Integrity Check Value (ICV), encrypted with WEP, which provided data integrity Over time, these security features proved to be insufficient to protect wireless LAN communication in common scenarios. To address the security issues of the original IEEE 802.11 standard, the following additional technologies are used: The IEEE 802.1X Port-Based Network Access Control standard is an optional method for authenticating 802.11 wireless clients. IEEE 802.1X provides per-user identification and authentication, extended authentication methods, and, depending on the authentication method, encryption key management dynamic, per-station or per-session key management and rekeying. Wi-Fi Protected Access (WPA) is an interim standard adopted by the Wi-Fi Alliance to provide more secure encryption and data integrity while the IEEE 802.11i standard was being ratified. WPA supports authentication through 802.1X (known as WPA Enterprise) or with a preshared key http://www.informationweek.com/whitepaper/download/showPDF?articleID=901061&site_id=&profileCreated= 1/6 3/20/2014 www.informationweek.com/whitepaper/download/showPDF?articleID=901061&site_id=&profileCreated= (known as WPA Personal), a new encryption algorithm known as the Temporal Key Integrity Protocol (TKIP), and a new integrity algorithm...

Words: 1834 - Pages: 8

Free Essay

Project Report on Dth

...breakdowns and in most cases the service is not dependable. Since DTH signals come directly from the broadcast satellite to the consumer’s dish, it can even reach remote places without any cable running through the streets and highways. With the widespread implementation of Conditional Access System (CAS) throughout India, DTH is a good alternative. Having many service providers makes it difficult to choose from. To select a DTH provider, we have to consider various factors such as picture quality, transmission during rough weather, suitability of the plans / packages, package pricing, and other value added services. The DTH service quality depends on the signal strength, so it is always better to check for excellent reception in your area. DTH services offer MPEG4 quality or DVD quality or MPEG4 with DVB-S2 digital transmission. MPEG4 with DVB-S2 (Digital Video Broadcasting) has provision for HD quality, but not implemented yet. It also allows for enhanced interactive services with access to the Internet. Airtel and Videocon offer MPEG4 with DVB-S2. Almost each DTH provider has special packs for the southern region that has packs specifically designed to include regional language channels. Many providers provide a Jumbo package or Mega Package or Titanium package, which includes all channels for an amount. On an average, the monthly charges for such a mega pack comes to about Rs 300 to Rs 350, which many include a few value added services and pay per view channel. If you...

Words: 1126 - Pages: 5

Premium Essay

Operating System Analysis Paper

...Operating System Analysis Paper Team A: , POS/355 August 25, 2012 Demetrius Fluker University of Phoenix Operating System Analysis Paper When ruminating over which operating system for a home, business, or office computer or network of computers, it is vital to evaluate all areas of the different operating systems options. The key system options to compare and contrast when evaluating Microsoft Windows XP, Microsoft Windows Server 2003, and Linux operating systems are to consider the system requirements, the different editions available, security features, system features, updates and support, user interface, and cost effectiveness. Moreover, the best fit operating system can be determined depended on the individual’s or organization’s needs. Operating System Requirements Windows XP The system requirements for Windows XP Home Edition and Professional Edition are the same. These requirements are a PC with a 233 megahertz or higher (a 300 megahertz + processor speed is recommended), 64 megabytes (MB) of RAM or higher (128 MB is recommended), 1.5 gigabytes (GB) of available hard drive space, a video adapter and monitor that is Super VGA (800x600) or higher-resolution, CD/DVD-ROM drive, keyboard, and mouse/pointing device. The Windows XP Starter Edition has different system requirements. These are 233MHz processor or better, 256 MB of RAM, Super VGA (800x600) video adapter and monitor, CD/DVD-ROM drive, keyboard, mouse/pointing device, DirectX 9 graphics with 32 MB...

Words: 4101 - Pages: 17

Free Essay

Test123

...Infor ERP LN Development Tools 8.6 Developer's Guide © Copyright 2009 Infor All rights reserved. The word and design marks set forth herein are trademarks and/or registered trademarks of Infor and/or its affiliates and subsidiaries. All rights reserved. All other trademarks listed herein are the property of their respective owners. Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential and proprietary information of Infor. By gaining access to the attached, you acknowledge and agree that the material (including any modification, translation or adaptation of the material) and all copyright, trade secrets and all other right, title and interest therein, are the sole property of Infor and that you shall not gain right, title or interest in the material (including any modification, translation or adaptation of the material) by virtue of your review thereof other than the non-exclusive right to use the material solely in connection with and the furtherance of your license and use of software made available to your company from Infor pursuant to a separate agreement (“Purpose”). In addition, by accessing the enclosed material, you acknowledge and agree that you are required to maintain such material in strict confidence and that your use of such material is limited to the Purpose described above. Although Infor has taken due care to ensure that the material included in this publication...

Words: 52557 - Pages: 211

Free Essay

Hci Storyboard

...development This tutorial helps you to install SharePoint Server 2010. It shows you step-by-step how to setup requirements like Windows Server 2008 R2 including roles and features, administrative and service accounts as well as SQL Server 2008 R2. With these requirements installed you are able to deploy SharePoint Server 2010. Get more tutorials at http://sharepoint-tutorial.net/ Need a SharePoint book? http://sharepoint-book.net/ SharePoint resources http://andreasglaser.net/ Disclaimer THIS INFORMATION IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY KIND. All trademarks are property of their respective owners. © Copyright 2011 Andreas Glaser Software Engineering GmbH Version: 1.1, 3/9/2011 Overview 1 Table of contents 1. Overview .............................................................................................................................. 2 1.1. 1.2. 2. 2.1. 2.2. 2.3. Hardware requirements .......................................................................................................... 3 Software requirements ........................................................................................................... 4 Installation ............................................................................................................................... 5 Updates ................................................................................................................................... 6 Configuration ........................

Words: 4069 - Pages: 17

Premium Essay

Identifying the Operating System

...7 Enterprise Service Pack 1. Before it can be upgraded to Windows 8.1, the firmware and the USB would need to be updated because it is not compatible. Windows 8.1 is the latest version of Microsoft windows and has a completely new appearance from the prior versions. There are five features that will be discussed that comes with the installed service pack. The first one will be direct access which allows you to connect to a corporate network that you work at through internet access and without having to be connected to a virtual private network (VPN). It provides increased productivity for mobile work force. Because of this, you are not required to be in the office, you could be at home or traveling somewhere and still is able to have access to your work as if you are at the desk. Even with this access, it doesn’t stop the IT Administrators from being able to update software or policy settings provided by the company. Another feature is Federated search and enterprise search scopes which enables the user to search files through Windows explorer and be able to open it and work with the file no matter where it is located. Sharepoint portals were created to enable migration of important content to centralized content stores. The App locker provides the ability to control what software can be run which reduces risk of viruses. IT Administrators are able to create rules that works as a background even after an update has been performed. Language packs allows support...

Words: 362 - Pages: 2

Premium Essay

Nt1110 Week1

...I am currently operating on Windows 7 Professional I also currently have service pack 1 installed for my operating system. Windows 7 has features that simplify computer security it makes it easier for you to reduce the risk of damage caused by viruses, spyware and other malware. It also improved a backup solution to help keep information safe. My Operating system also has a new enhancement feature which allows you to see the icons larger on the task bar. You basically get a sneak peek of what that window contains so you don’t have to click open each icon to find out what they contain. Another Cool feature Windows 7 has is the ability of resizing the screens that are open on your desktop. You can maximize a window by dragging its border to the top of the screen, and you can minimize it as well by dragging its border away from the top of the screen. The feature that I love the most is being able to switch my screen’s view, as a duplicate of extended. I will usually use the extended feature when my kids want to watch a movie, so they can watch the movie without being bothered by what I am working on. The only times I use a duplicate is when I am not working on anything and I relax and enjoy the movie on the projector with my kids. Lastly Windows 7 has a Problem Steps Recorder option so you can capture steps that you take on your computer including text descriptions of where you click your mouse and a picture of the screen during each click. After you troubleshoot the issue you can...

Words: 582 - Pages: 3

Free Essay

Sharepoint 2010 Installation and Configuration Plan

...SHAREPOINT 2010 AND FAST SEARCH SERVER 2010 INSTALLATION AND CONFIGURATION PLAN Document Control |Document Details | |Project Name |Intranet Revamp | |Document Location |IT | |Document Reference | SharePoint 2010 Installation Plan.doc | |Revision History | |Revision Description |Version |Date |Author / Editor | |Initial draft |0.1 |08/08/2010 |Chiyesu Kalaba | |Final draft |0.2 |25/08/2010 |Jacob Siwiti | 1. INTRODUCTION This document outlines the process of preparing, installation and configuration of...

Words: 7699 - Pages: 31

Premium Essay

Comparing Windows Xp, Vista, and 2003 Server

...resources provided in newer hardware available for procurement. Transitioning to new infrastructure requires a detailed look at the applications required for business processes, the availability and pricing of upgraded software packages to replace current applications, and/or the feasibility of rewriting those applications for modern architectures. The upgrade plan should build as much backward compatibility for older applications as possible, while still maintaining progressive replacement cycles aiding in product support and reliability. Windows XP FEATURES Over the years Microsoft has produced many versions of Windows since 1985. Every version of Windows from 1985 to 1990’s can be considered as a testing phase until Windows 3.0 came out for personal computers. Windows XP Professional integrates the strengths of Windows 2000 Professional. Windows XP offers many enhancements and a reduced total cost of ownership over Windows 2000 while increasing your computer power. Windows XP Professional advanced management and support tools will allow IT administrators will be able to create customized application consoles. With the active directory service, administrators are able to reduce the number of operating system images they maintain, while reducing the time it takes to deploy a typical desktop system. Windows XP Performance, Security, Compatibility Figure 1-1: Windows XP Features Below is a chart that shows...

Words: 3011 - Pages: 13

Premium Essay

Operating System

...combined which made DOS obsolete. According to Capron (2001), “An operating system is a set of programs that lies between applications software and computer hardware; it is the fundamental software that controls access to all other software and hardware resources” (p. 65). Operating systems have three main functions: to manage computer resources, to establish user interface and to execute and provide services for application software. The computer would just be useless machine with no direction or purpose without an operating system. According Nickerson (2001), “The most important system software is the operating system because without it computers would be extremely difficult to use” (p. 31). Operating System Compatibility in the Workplace Watts-Smith and Cheng (2004) define compatibility as, “The ability of all hardware and all software in one unit, such as a computer, to work together without difficulty” (no pg.). As with a perfect world, there is no such thing as a perfect computer or software. There will always be compatibility issues with their set of patches and service packs to assist in the smooth operation of a computer information system. In the case of operating systems, upgrades always bring their host of compatibility problems or issues. While most compatibility issues go relatively unnoticed to the average computer user, the ones that are noticeable are extreme in nature. Too many times, previous programs which worked smoothly with the previous operating systems...

Words: 1353 - Pages: 6

Premium Essay

Network

...IT140-1302A-05: Introduction to Operating Systems and Client/Server Environments Group Assignment Carroll Backus, Sonia Crumbley, Willie Coffie, Jason Duggan, Christopher West 13 May 2013 Instructor: Dr. Betty Tipton Colorado Technical University Table of Contents Technology Analysis and Assessment Plan 3 Technology Analysis and Assessment Improvement Plan 6 Operating System Platform and Cost Containment 6 Architecture Assessment and Governance 9 Enterprise Authentication 11 Directory Services and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250...

Words: 5202 - Pages: 21

Premium Essay

Lab 4

...computer with an on-screen keyboard so that he may use the mouse to type data. How would you configure this user’s computer to comply with his request? Sticky Keys A friend with severe arthritis is having difficulty pressing multiple keys simultaneously (for example, ctrl-alt-delete). You offer to enable sticky keys for her. How would you configure this setting? Add Hardware Driver Not Detected You are running Windows XP Professional on an old Pentium II computer. A friend has just bought a new network interface card (NIC) for his computer and asks if you would like to have his old one. You install the NIC and the correct driver on your computer, but you discover that when you restarted your computer, the operating system did not detect the new NIC. Without restarting your computer, how would you troubleshoot this problem? Add/Remove Programs Add Components How would you install IIS (Internet Information Services) on your computer? Remove Programs Adobe Reader has recently become corrupted. How would you remove it from your computer? Administrative Tools Computer Management Add User to Group A user named Bob Smith needs to install and uninstall software packages for the Research and Development department. You decide to make him a Power User. How would you do this? Change Password at Logon You have just reset the password for a...

Words: 6123 - Pages: 25

Premium Essay

Computer Science

...Question 1. [Pg. 242] 1. [Challenge exercise 9.1.] Windows vulnerability (Passwords) One of windows vulnerabilities is that user accounts may have weak, nonexistent or unprotected passwords. The operating system and some third-party applications may create accounts with weak or nonexistent passwords. This in turn causes data to be vulnerable and with respect to user data it could be very damaging to a user’s organization if data is lost or removed without warning by an attacker. Also the connection of these systems to a shared network or perhaps the internet in the scenario of a business organization leaves the system vulnerable to an attacker. With respect to the data that is being sent across the network, there are certain countermeasures that could be taken, such as encrypting data that resides on the computer by using some well-known cryptographic algorithms currently being implemented to secure the system data even after password has been bypassed. Encrypting data provides a level of assurance that even if data is compromised, it is impractical to access the plaintext without significant resources, however controls should also be put in place to mitigate the threat of data exfiltration in the first place. Many attacks occur across a network, while others involve physical theft of laptops and other equipment holding sensitive information. Yet, in most cases, the victims are not aware that the sensitive data are leaving their systems because they are not monitoring...

Words: 2126 - Pages: 9