Premium Essay

Unit 1 Assignment 1 Windows 2008 Network

In:

Submitted By mONSTa
Words 461
Pages 2
Unit 1. Assignment 1. Windows 2008 Network Services

Course Objectives and Learning Outcomes
In this assignment, you will explain the function of DHCP and DNS.

Assignment Requirements

Write a 1-page report summarizing IT-management overhead in reference to DHCP and DNS.

In your report, address IT-management overhead in reference to DNS and DHCP, with the following question in mind: 1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in. 2. At what point should DNS or DHCP be considered a priority and require some level of redundancy? 3. Should servers use DHCP?

Submission Requirements
Maximum 1 page, Microsoft Word, double-spaced, 12 pt. font

1. How many hosts does it take to justify the time and effort to setup a centrally managed solution for name resolution and address allocation? (In other words, is it worth setting up DHCP for two computers? 5? 25?) Consider both MS Windows Server DNS and DHCP as well as other, special use devices where DNS or DHCP may be built-in.

I believe one host is enough. In fact, if the host has a functioning network interface which is connected to a network chances are it is managed by DHCP uses DNS for name resolution. Although most end users don’t know or understand the how their computer connects to the Internet and never realize their computer is being managed by the router/gateway installed by their ISP which perform the roles of DHCP and DNS servers. I prefer to manage the IP address received by my computers at home by making reservations that way I always know the IP addresses of various hosts on my home

Similar Documents

Free Essay

Unit 1 - Assignment 1 - Windows 2008 Network Services

...Unit 1 - Assignment 1 - Windows 2008 Network Services If you have a routed local area network and high-speed links that are fairly reliable, you might be able to use one DNS server for a larger, multiple sub-netted network area. If you have a high number of client nodes on a single subnet design, you might want to add more than one DNS server to the subnet to provide backup and failover if the preferred DNS server stops responding. When determining the number of DNS servers you need to use, assess the effect of zone transfers and DNS query traffic on slower links in your network. Although DNS is designed to help reduce broadcast traffic between local subnets, it does create some traffic between servers and clients that should be reviewed, particularly when used in complexly routed LAN or WAN environments. Consider the effects of zone transfer over slower speed links, like those typically used for a wide area network (WAN) connection. Although the DNS Server service supports incremental zone transfers and DNS clients and servers can cache recently used names, traffic considerations are sometimes still an issue, particularly when DHCP leases are shortened and, as a result, dynamic updates in DNS are performed more frequently. One option for dealing with remote locations on WAN links is to set up a DNS server at these locations to provide caching-only DNS service. With most installations, you should have at least two server computers hosting each of your DNS zones for fault tolerance...

Words: 413 - Pages: 2

Premium Essay

Nt1230 Syllabus

...introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server...

Words: 1834 - Pages: 8

Premium Essay

Fsmo Role Ayer Nate Method

...Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers...

Words: 10360 - Pages: 42

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Premium Essay

Overview of Windows Server 2008 Features

...Unit 1 Research Project – Overview of Windows Server 2008 Features CIS 245 – Windows Client and Server Unit 1 Research Project Abstract – The objective of the Unit 1 research project was to provide an overview on two of the five topics that were listed in the assignment page. The overview is designed to give a general understanding of the topic, the function it provides, when it would be used, what benefit it provides, and any other pertinent information. For this assignment I chose Network Access Protection (NAP) and Client Access Licenses (CALs). Network Access Protection - Network Access Protection, or NAP, is a tool that allows network administrators to manage the access to network resources, as well as monitor real-time events on the network (Palmer, 2011). It has features that ensure all clients have the proper security protocols in order to remain connected to the network. If something is missing, it will automatically update the computer so that it matches the requirements for network access. It also performs continuous monitoring even after access has been granted to make sure they remain in compliance. As a security protocol, if a computer is found to lack the proper settings, NAP will quarantine it to limit what parts of the network it can use, or if it is found that it does not meet any of the requirements, it will quarantine it completely until it becomes compliant. Nap is also used when clients are connected to the network for the first time. It will...

Words: 715 - Pages: 3

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Accounting

...STUDENT COPY The following sections contain student copies of the assignments that must be distributed to students at least two weeks prior to the due dates for those assignments. Online students will have access to those documents in PDF format available for downloading at any time during the course. ------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized...

Words: 5558 - Pages: 23

Premium Essay

Server 2 End of Lesson Answers

...Active Directory Administration Key Terms access token Created when a user logs on, this value identifies the user and all of the user’s group memberships. Like a club membership card, it verifies a user’s permissions when the user attempts to access a local or network resource. Anonymous Logon Special identity that refers to users who have not supplied a username and password. authenticate To gain access to the network, prospective network users must identify themselves to a network using specific user accounts. authentication Process of confirming a user’s identity using a known value such as a password, pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication. authorization Process of confirming that an authenticated user has the correct permissions to access one or more network resources. batch file Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks. built-in user accounts Accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account. Comma-Separated Value Directory Exchange (CSVDE) Command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file. Comma-Separated Values (CSV)...

Words: 6605 - Pages: 27

Premium Essay

Client Server 2

...Name: ____________________________________________________ Date: _______________________ NT1330 Week 1 Unit 1 Assignment 1 Instructions: 1. Complete this assignment and submit it prior to the beginning of the next class meeting. 2. Completely fill in the bubble for the correct answer(s), any other mark such as an X or just a line through it will be marked as incorrect. True/False Indicate whether the statement is true or false. 1. IPv6 uses 128 bits, or 16 bytes, for addressing, thus providing 2128 (about 340 billion) unique addresses. A True B False 2. Dynamic IP addresses can be assigned when administering TCP/IP hosts. These addresses must be configured and maintained manually. A B True False 3. Using DHCP relay agents eliminates the need to have a DHCP server on every subnet. A True B False 4. One benefit of the hierarchical structure of DNS is that it is possible to have two hosts with the same host names that are in different locations in the hierarchy. A B True False 5. ICS turns your computer into a router so that other computers on the local network can access its Internet connection. A B True False 6. If you inappropriately allowed network discovery in a public network environment (for example, an Internet café), you would allow total strangers to see and access any file shares on your system. A B True False Steve Todd Page 1 of 9 7. Because the software is installed into a single partition, the specified minimum storage...

Words: 1872 - Pages: 8

Free Essay

Unit 9 Assignment 1 Gpo Planning Scenario

...Unit 9 Assignment 1 GPO Planning Scenario To Junior IT Admin: You can use Windows Server 2008 Group Policy to manage configurations for groups of computers and users, including options for registry-based policy settings, security settings, software deployment, scripts, folder redirection, and preferences. Group Policy preferences new in Windows Server 2008, are more than 20 Group Policy extensions that expand the range of configurable policy settings within a Group Policy Object (GPO). In contrast to Group Policy settings preferences are not enforced. Users can change preferences after initial deployment for information about Group Policy Preferences. By using Group Policy, you can significantly reduce an organization’s total cost of ownership. Various factors such as the large number of policy settings available, the interaction between multiple policies, and inheritance options can make Group Policy design complex. By carefully planning, designing, testing, and deploying a solution based on your organization’s business requirements, you can provide the standardized functionality, security, and management control that your organization needs. Overviewing Group Policy; it enables Active Directory–based change and configuration management of user and computer settings on computers running Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP. In addition to using Group Policy to define configurations for groups of users and computers, you can also use Group...

Words: 377 - Pages: 2

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520...

Words: 4400 - Pages: 18

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Nt 1330 Unit 1 Exercise 1

...Unit 1. Exercise 1. IP Addressing Scenario Course Objectives and Learning Outcomes In this Exercise, you will explain IP address components, contrast classful and classless IP addressing, and explain the function of DNS and DHCP. Assignment Requirements Respond to the following scenario with design considerations and recommendations: You are an IT Administrator for a newly founded company and have been tasked with designing an IP addressing scheme and a plan for allocation and management of IP addresses. The company will currently have a single, physical location with approximately 145 hosts (computers, printers, etc.). IT plans should accommodate 50% growth within the next two years. At a minimum, address these specific questions, in addition to any other concerns/considerations: 1. What subnet range/s should be used? 2. Should IP addresses be dynamically or statically assigned? 3. Should one or more network/subnets be used? 4. If DHCP is used, should a router, firewall or Windows Server be utilized and why? Respond in detail, justifying your recommendations. In your response, consider future growth and design considerations. Submission Requirements 1-2 pages, Microsoft Word, double-spaced, 12 pt. font In response to your question I would use a classless addressing and start at 172.16.0.0 for your network address with a subnet mask of 255.255.255.0. This gives you 254 hosts per subnet which will easily cover your 50% growth over the next...

Words: 384 - Pages: 2

Free Essay

Cis 246 Week 2 Ilab 2 Organizing Resources

...com/cis-246-week-2-ilab-2-organizing-resources Product Description iLab 2 of 7: Organizing Resources Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See the Syllabus section “Due Dates for Assignments & Exams” for due date information.) Connect to the iLab here. • Before beginning work, connect to your virtual lab platform (Skillsoft / Element K). NOTE: • There are two sections to this week’s iLab assignment. Be sure to complete both sections in order to receive full credit. o Lab 2a: Install and Configure Active Directory o Lab 2b: Organize Users and Groups Additional Resource You may find this resource helpful as you prepare to complete the lab. • Advanced Configuration and Organizing Resources LAB 2A OVERVIEW Scenario and Summary • You will explore Server Manager, install Active Directory, and add a Windows 7 PC to the domain. iLAB STEPS TASK 1: Explore Server Manager STEP 1: Explore the Basic Information in Server Manager Back to Top Action 1. Log on with a user name of Administrator and a password of password. It may ask about the network type. Click Work, then click Close. 2. Click the Server Manager icon in the lower left, to the right of the Start button. 3. Notice the Server information in the right pane. Scroll down to find out the following information, and put the answers in the lab report. 1. Is the firewall turned on? 2. What is the name of the link for the IE Enhanced Security Configuration? 3. Which...

Words: 13210 - Pages: 53