Free Essay

Unit 1 - Assignment 1 - Windows 2008 Network Services

In:

Submitted By sgoverby
Words 413
Pages 2
Unit 1 - Assignment 1 - Windows 2008 Network Services
If you have a routed local area network and high-speed links that are fairly reliable, you might be able to use one DNS server for a larger, multiple sub-netted network area. If you have a high number of client nodes on a single subnet design, you might want to add more than one DNS server to the subnet to provide backup and failover if the preferred DNS server stops responding.
When determining the number of DNS servers you need to use, assess the effect of zone transfers and DNS query traffic on slower links in your network. Although DNS is designed to help reduce broadcast traffic between local subnets, it does create some traffic between servers and clients that should be reviewed, particularly when used in complexly routed LAN or WAN environments.
Consider the effects of zone transfer over slower speed links, like those typically used for a wide area network (WAN) connection. Although the DNS Server service supports incremental zone transfers and DNS clients and servers can cache recently used names, traffic considerations are sometimes still an issue, particularly when DHCP leases are shortened and, as a result, dynamic updates in DNS are performed more frequently. One option for dealing with remote locations on WAN links is to set up a DNS server at these locations to provide caching-only DNS service.
With most installations, you should have at least two server computers hosting each of your DNS zones for fault tolerance. DNS was designed to have two servers for each zone, one as a primary server and the other as a backup or secondary server. When making any final determinations about the number of servers to use, first assess the level of fault tolerance you need for your network.
Because there is no fixed limit to the maximum number of clients a DHCP server can service or to the number of scopes you can create on a DHCP server, the primary factors to consider when you determine the number of DHCP servers to use are network architecture and server hardware. For example, in a single subnet environment, only one DHCP server is necessary, although you may want to use two servers or deploy a DHCP server cluster for increased fault tolerance. In multiple subnet environments, routers must forward DHCP messages between subnets, so router performance can affect your DHCP service. In both cases, DHCP server hardware affects service to clients.

Similar Documents

Premium Essay

Nt1230 Syllabus

...examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Premium Essay

Fsmo Role Ayer Nate Method

...Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers...

Words: 10360 - Pages: 42

Premium Essay

Overview of Windows Server 2008 Features

...Unit 1 Research Project – Overview of Windows Server 2008 Features CIS 245 – Windows Client and Server Unit 1 Research Project Abstract – The objective of the Unit 1 research project was to provide an overview on two of the five topics that were listed in the assignment page. The overview is designed to give a general understanding of the topic, the function it provides, when it would be used, what benefit it provides, and any other pertinent information. For this assignment I chose Network Access Protection (NAP) and Client Access Licenses (CALs). Network Access Protection - Network Access Protection, or NAP, is a tool that allows network administrators to manage the access to network resources, as well as monitor real-time events on the network (Palmer, 2011). It has features that ensure all clients have the proper security protocols in order to remain connected to the network. If something is missing, it will automatically update the computer so that it matches the requirements for network access. It also performs continuous monitoring even after access has been granted to make sure they remain in compliance. As a security protocol, if a computer is found to lack the proper settings, NAP will quarantine it to limit what parts of the network it can use, or if it is found that it does not meet any of the requirements, it will quarantine it completely until it becomes compliant. Nap is also used when clients are connected to the network for the first time. It will...

Words: 715 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Server 2 End of Lesson Answers

...Active Directory Administration Key Terms access token Created when a user logs on, this value identifies the user and all of the user’s group memberships. Like a club membership card, it verifies a user’s permissions when the user attempts to access a local or network resource. Anonymous Logon Special identity that refers to users who have not supplied a username and password. authenticate To gain access to the network, prospective network users must identify themselves to a network using specific user accounts. authentication Process of confirming a user’s identity using a known value such as a password, pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication. authorization Process of confirming that an authenticated user has the correct permissions to access one or more network resources. batch file Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks. built-in user accounts Accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account. Comma-Separated Value Directory Exchange (CSVDE) Command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file. Comma-Separated Values (CSV)...

Words: 6605 - Pages: 27

Premium Essay

Client Server 2

...Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True False Steve Todd Page 1 of 9 7. Because the software is installed into a single partition, the specified minimum storage...

Words: 1872 - Pages: 8

Premium Essay

Unit 1 Assignment 1 Windows 2008 Network

...Unit 1. Assignment 1. Windows 2008 Network Services Course Objectives and Learning Outcomes In this assignment, you will explain the function of DHCP and DNS. Assignment Requirements Write a 1-page report summarizing IT-management overhead in reference to DHCP and DNS. In your report, address IT-management overhead in reference to DNS and DHCP, with the following question in mind: 1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in. 2. At what point should DNS or DHCP be considered a priority and require some level of redundancy? 3. Should servers use DHCP? Submission Requirements Maximum 1 page, Microsoft Word, double-spaced, 12 pt. font 1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in. I believe one host is enough. In fact, if the host has a functioning network interface which is connected to a network chances are it is managed by DHCP uses DNS for name resolution. Although...

Words: 461 - Pages: 2

Premium Essay

Accounting

...STUDENT COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized...

Words: 5558 - Pages: 23

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Free Essay

Cis 246 Week 2 Ilab 2 Organizing Resources

...com/cis-246-week-2-ilab-2-organizing-resources Product Description iLab 2 of 7: Organizing Resources Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See the Syllabus section “Due Dates for Assignments & Exams” for due date information.) Connect to the iLab here. • Before beginning work, connect to your virtual lab platform (Skillsoft / Element K). NOTE: • There are two sections to this week’s iLab assignment. Be sure to complete both sections in order to receive full credit. o Lab 2a: Install and Configure Active Directory o Lab 2b: Organize Users and Groups Additional Resource You may find this resource helpful as you prepare to complete the lab. • Advanced Configuration and Organizing Resources LAB 2A OVERVIEW Scenario and Summary • You will explore Server Manager, install Active Directory, and add a Windows 7 PC to the domain. iLAB STEPS TASK 1: Explore Server Manager STEP 1: Explore the Basic Information in Server Manager Back to Top Action 1. Log on with a user name of Administrator and a password of password. It may ask about the network type. Click Work, then click Close. 2. Click the Server Manager icon in the lower left, to the right of the Start button. 3. Notice the Server information in the right pane. Scroll down to find out the following information, and put the answers in the lab report. 1. Is the firewall turned on? 2. What is the name of the link for the IE Enhanced Security Configuration? 3. Which...

Words: 13210 - Pages: 53

Premium Essay

Building a New Structure Rfp

...homework June 19, 2015 IP Addressing Scenario According to the scenario, the company will have a single, physical location with approximately 145 hosts on the network. In this case, I would us a class C address such as 192.168.0.0. Reason why is because you can put all the devices on a single subnet with the subnet mask 255.255.255.0/24. This would allow for 253 usable host addresses, which is more than needed in this case. Whether you should dynamically or statically assign those IP’s goes, I suggest assigning it dynamically. Unless you don’t mind MANUALLY managing 218 hosts, you should definitely go with DHCP. The router will be well capable of handing out addresses for 145 hosts. Since there is only one location used in this case, only one network should be used as it will only complicate things to have more than one network. Since DHCP is being used as the suggestion, whether we should use a router and/or firewall, or utilizing Windows Server…the answer is yes. The router for dishing out the IP addresses and the firewall should be used for security purposes. Using Windows Server just for DHCP is rather overkill. Using these suggested methods should also accommodate for at least 50% growth within the next few years. Rey Lozada NT1330 homework Unit 1: Assignment June 19, 2015 Window 2008 Networking Services Domain Name System (DNS) - are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP)...

Words: 385 - Pages: 2

Free Essay

Unit 9 Assignment 1 Gpo Planning Scenario

...Unit 9 Assignment 1 GPO Planning Scenario To Junior IT Admin: You can use Windows Server 2008 Group Policy to manage configurations for groups of computers and users, including options for registry-based policy settings, security settings, software deployment, scripts, folder redirection, and preferences. Group Policy preferences new in Windows Server 2008, are more than 20 Group Policy extensions that expand the range of configurable policy settings within a Group Policy Object (GPO). In contrast to Group Policy settings preferences are not enforced. Users can change preferences after initial deployment for information about Group Policy Preferences. By using Group Policy, you can significantly reduce an organization’s total cost of ownership. Various factors such as the large number of policy settings available, the interaction between multiple policies, and inheritance options can make Group Policy design complex. By carefully planning, designing, testing, and deploying a solution based on your organization’s business requirements, you can provide the standardized functionality, security, and management control that your organization needs. Overviewing Group Policy; it enables Active Directory–based change and configuration management of user and computer settings on computers running Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP. In addition to using Group Policy to define configurations for groups of users and computers, you can also use Group...

Words: 377 - Pages: 2

Premium Essay

Windows 2008 Network Services

...Unit 1 Assignment 1 windows 2008 network services Short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing, a device can have a different IP address every time it connects to the network. In some systems, the device's IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP addresses. Dynamic addressing simplifies network administration because the software keeps track of IP addresses rather than requiring an administrator to manage the task. This means that a new computer can be added to a network without the hassle of manually assigning it a unique IP address. Many ISPs use dynamic IP addressing for dial-up users. Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. DHCP would be better used if you were going to set up a large network of computers I’d say about 25 or more...

Words: 314 - Pages: 2