Free Essay

Unit 4. Site-to-Site Connectivity Scenario

In:

Submitted By Evilynburlesk
Words 481
Pages 2
Unit 4. Site-to-Site Connectivity Scenario

First, open the console and Services Site Links and see how long this set up for replication.
Then create an object in AD and expect to replicate.

Compare this with the time set in "Site and Services", and is equal to or less this ok (ok with the settings that were set)

If you are the highest: Run the command repadmin / showreps and put the result here.

Open the Event Viewer logs and see what errors appear.

When you create a site object in Active Directory, you associate one or more Internet Protocol (IP) subnets with the site. Each domain controller in a forest is associated with an Active Directory site. A client workstation is associated with a site according to its IP address; that is, each IP address maps to one subnet, which in turn maps to one site.
Active Directory uses sites to: * Optimize replication for speed and bandwidth consumption between domain controllers. * * Locate the closest domain controller for client logon, services, and directory searches. * * Direct a Distributed File System (DFS) client to the server that is hosting the requested data within the site. * * Replicate the system volume (SYSVOL), a collection of folders in the file system that exists on each domain controller in a domain and is required for implementation of Group Policy. *

The ideal environment for replication topology generation is a forest that has a forest functional level of at least Windows Server 2003. In this case, replication topology generation is faster and can accommodate more sites and domains than occurs when the forest has a forest functional level of Windows 2000. When at least one domain controller in each site is running Windows Server 2003, more domain controllers in each site can be used to replicate changes between sites than when all domain controllers are running Windows 2000 Server.
In addition, replication topology generation requires the following conditions:

* A Domain Name System (DNS) infrastructure that manages the name resolution for domain controllers in the forest. Active Directory–integrated DNS is assumed, wherein DNS zone data is stored in Active Directory and is replicated to all domain controllers that are DNS servers. * * All physical locations that are represented as site objects in Active Directory have LAN connectivity. * * IP connectivity is available between each site and all sites in the same forest that host operations master roles. * * Domain controllers meet the hardware requirements for Windows Server 2008 R2, Windows Server 2008, Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition. * * The appropriate number of domain controllers is deployed for each domain that is represented in each site.

This section covers the replication components that create the replication topology and how they work together, plus the mechanisms and rationale for routing replication traffic between domain controllers in the same site and in different sites.

Similar Documents

Premium Essay

Tinab Ennett

...Calling Tree 7 External Contacts 8 External Contacts Calling Tree 10 1 Plan Overview 11 1.1 Plan Updating 11 1.2 Plan Documentation Storage 11 1.3 Backup Strategy 11 1.4 Risk Management 11 2 Emergency Response 12 2.1 Alert, escalation and plan invocation 12 2.1.1 Plan Triggering Events 12 2.1.2 Assembly Points 12 2.1.3 Activation of Emergency Response Team 12 2.2 Disaster Recovery Team 13 2.3 Emergency Alert, Escalation and DRP Activation 13 2.3.1 Emergency Alert 13 2.3.2 DR Procedures for Management 14 2.3.3 Contact with Employees 14 2.3.4 Backup Staff 14 2.3.5 Recorded Messages / Updates 14 2.3.7 Alternate Recovery Facilities / Hot Site 14 2.3.8 Personnel and Family Notification 14 3 Media 15 3.1 Media Contact 15 3.2 Media Strategies 15 3.3 Media Team 15 3.4 Rules for Dealing with Media 15 4 Insurance 15 5 Financial and Legal Issues 16 5.1 Financial Assessment 16 5.2 Financial Requirements 16 5.3 Legal Actions 16 6 DRP Exercising 16 Appendix A – Technology Disaster Recovery Plan Templates 17...

Words: 4679 - Pages: 19

Premium Essay

Risk Mgmt

...Task 1 (C) – JIT2 Risk Management C. Recommendations Create an implementation plan in which you recommend ways of implementing, monitoring and adjusting the BCP. For the task of creating a Business Continuity Plan (BCP), I will follow a logical and systematic formula for implementation, monitoring and reviewing the plan for United Health Group. The goal is to minimize the impact of any disruption by containing it within a predictable and predetermined period of time. To do this, I recommend that this plan be developed and implemented with as many preventative controls, contingency resources, and procedures designed to allow the organization to quicky bounce back from any long-term business interruption. With this document I’ll present a workable DR plan that focuses not only on safeguarding critical data but also on the restoration of all normal business functions. The process for developing a sound Disaster Recovery plan will involve many layers of detail from the obvious to the not so obvious. Since disasters are by their nature unpredictable, this DR plan must be thorough enough to provide a certain amount of relief to know that if one does occur, the affects on the business will not be catastrophic. Disaster Recovery Topics: 1. Secure executive-level leadership commitment Senior leadership buy-in and support is critical to the long-term success of any enterprise level initiative. Disaster Recovery and Business Continuity Plans are no different. Further...

Words: 2044 - Pages: 9

Premium Essay

Bcp Planning and Development

... Table of Contents Executive Summary 3 Introduction 5 About Company Virtual Solutions 6 The Current Status of Business Continuity Planning 6 Historical Context 6 The New Plan 8 Using Recovery Planner 8 Configuration for TPT 9 Presentation 9 Compliance 10 Comprehensive Planning 10 Leadership Approval 12 The Plan Strategy 12 Team Structure 12 Figure 1: The Business Continuity Plan Team Organizational Chart 13 Emergency Management Team 13 Business Continuity Team 14 Business Unit Teams 15 Fly Out Teams 16 Fire Teams 16 The Four Phases of the Plan 16 Figure 2: The four phases of the Plan 16 Phase I - Appraisal 17 Phase II – Recovery Coordination 18 Phase III - Production 18 Phase IV – Site Restoration 19 Business Unit Plan Structure 20 Alternative Sites 21 Planning Refinement Recommendations 22 Risk Assessment 22 Business Impact Analysis 22 Emergency Response 23 Disaster Recovery 23 Testing and Restoration 24 Future State 25 Comprehensive Business Planning 25 ACP Workflow Planning 26 Awareness and Training 27 Maintaining Support 27 Projected Timeline 28 Figure 3: Projected Timeline 29 Tasks 29 Conclusion 30 Sources 31 Appendix A 32 Appendix B 34 Executive Summary Business continuity at Company has been undergoing...

Words: 6761 - Pages: 28

Free Essay

Site-to-Site Connectivity Scenario

...Unit 4 Exercise 1 Site-to-site Connectivity Scenario Chris Northington Junior Admin, To troubleshoot these issues, use the following utilities: * Domain Controller Diagnostics (Dcdiag.exe) and Network Diagnostics (Netdiag.exe) utilities. You can obtain these tools from the Windows 2000 Support Tools on the Windows 2000 CD-ROM. For more information, click the following article number to view the article in the Microsoft Knowledge Base: 301423 How to install the Windows 2000 Support Tools to a Windows 2000 Server-based computer For additional information about how to obtain and use the Dcdiag.exe and Netdiag.exe diagnostic utilities, click the following article number to view the article in the Microsoft Knowledge Base: 265706 DCDiag and NetDiag in Windows 2000 Facilitate Domain Join and DC Creation * Replication diagnostics utility (Repadmin.exe). Use this tool to verify correct site links and to display inbound and outbound connections. You can also use it to display the replication queue. You can obtain this tool from the Windows 2000 Support Tools on the Windows 2000 CD-ROM. For more information, click the following article number to view the article in the Microsoft Knowledge Base: For additional information about how to obtain and use the Repadmin.exe utility, click the following article number to view the article in the Microsoft Knowledge Base: 229896 Using Repadmin.exe to Troubleshoot Active Directory Replication * File Replication Service...

Words: 512 - Pages: 3

Premium Essay

Businessrecoverymarcvandoorenmaalen

...several phases in the BCM-lifecycle, specifically fully integrated ‘Crisis Management’ and the various phases of BCM Response. For example: since IT Disaster Recovery requires mostly the highest investments within the full scope of BCM and disruptions often are a consequence of failures within this area, it is required to have ‘IT DRP’ as a separate reporting phase to allocate priorities adequately. The definition of phases in the BCM approach support the following BCM processes within the Bank: • Scoping of BCM Standards documents, within BCM document framework; • Categories within BCM Reporting; • Support of common BCM terminology within the organisation. 4. Specifics BCM Approach The department Business Continuity Management within the Bank exists of 5 Full Time Equivalent and reports to the Business Risk Officer of the unit TOPS (Technical & Operations...

Words: 1276 - Pages: 6

Premium Essay

Urban Outfitters

... Appendix I-3 CONTINGENCY PLAN Version Submitted to: Submitted By: Table of Contents 1 Executive Summary 1 2 Introduction 1 2.1 Purpose 3 2.2 Scope 3 2.3 Plan Information 3 3 Contingency Plan Overview 4 3.1 Applicable Provisions and Directives 4 3.2 Objectives 4 3.3 Organization 5 3.4 Contingency Phases 8 3.4.1 Response Phase 8 3.4.2 Resumption Phase 8 3.4.3 Recovery Phase 8 3.4.4 Restoration Phase 9 3.5 Assumptions 9 3.6 Critical Success Factors and Issues 9 3.7 Mission Critical Systems/Applications/Services 10 3.8 Threats 10 3.8.1 Probable Threats 11 4 System Description 12 4.1 Physical Environment 12 4.2 Technical Environment 12 5 Plan 12 5.1 Plan Management 12 5.1.1 Contingency Planning Workgroups 12 5.1.2 Contingency Plan Coordinator 12 5.1.3 System Contingency Coordinators 13 5.1.4 Incident Notification 13 5.1.5 Internal Personnel Notification 13 5.1.6 External Contact Notification 13 5.1.7 Media Releases 14 5.1.8 Alternate Site (s) 14 5.2 Teams 14 5.2.1 Damage Assessment Team 14 5.2.2 Operations Team 15 5.2.3 Communications Team 15 5.2.4 Data Entry and Control Team 15 5.2.5 Off-Site Storage Team 15 5.2.6 Administrative Management Team 15 5.2.7 Procurement Team 15 5.2.8 Configuration Management Team 16 5.2.9 Facilities Team 16 5.2.10 System Software Team 16 5.2.11 Internal Audit Team...

Words: 17323 - Pages: 70

Premium Essay

Quality Control Plan

...Version Submitted to: Submitted By: Table of Contents 1 Executive Summary 1 2 Introduction 1 2.1 Purpose 3 2.2 Scope 3 2.3 Plan Information 3 3 Contingency Plan Overview 4 3.1 Applicable Provisions and Directives 4 3.2 Objectives 4 3.3 Organization 5 3.4 Contingency Phases 8 3.4.1 Response Phase 8 3.4.2 Resumption Phase 8 3.4.3 Recovery Phase 8 3.4.4 Restoration Phase 9 3.5 Assumptions 9 3.6 Critical Success Factors and Issues 9 3.7 Mission Critical Systems/Applications/Services 10 3.8 Threats 10 3.8.1 Probable Threats 11 4 System Description 12 4.1 Physical Environment 12 4.2 Technical Environment 12 5 Plan 12 5.1 Plan Management 12 5.1.1 Contingency Planning Workgroups 12 5.1.2 Contingency Plan Coordinator 12 5.1.3 System Contingency Coordinators 13 5.1.4 Incident Notification 13 5.1.5 Internal Personnel Notification 13 5.1.6 External Contact Notification 13 5.1.7 Media Releases 14 5.1.8 Alternate Site (s) 14 5.2 Teams 14 5.2.1 Damage Assessment Team 14 5.2.2 Operations Team 15 5.2.3 Communications Team 15 5.2.4 Data Entry and Control Team 15 5.2.5 Off-Site Storage Team 15 5.2.6 Administrative Management Team 15 5.2.7 Procurement Team 15 5.2.8 Configuration Management Team 16 5.2.9 Facilities Team 16 5.2.10 System Software Team 16 5.2.11 Internal Audit Team...

Words: 17284 - Pages: 70

Free Essay

Oracle Apps

...CURRICULAM VITAE Personal Profile |Name |Harjinder Singh | |Father’s Name |Surinder Singh | |Languages Known |English, Hindi and Punjabi | |Marital Status |Un-Married | |Nationality |Indian | |Email |Harjinder.singh102@gmail.com | |Phone |+91-7207460775 | |Current Designation |System Engineer | |Current Location |Hyderabad | |Current Employer |Tata Consultancy Services | Executive Summary: My ambition is to work for the leading consulting firms within the IT industry as I believe I am skilled and have much to offer potential employers and their clients. Currently, I am a System Engineer with Tata Consultancy Services Limited. Primary Skills: 2years & 9 Months of experience...

Words: 1310 - Pages: 6

Premium Essay

It 221 Research 1

...1. Why windows Server 2008 comes in different versions? What is the significance of each version? Each Windows Server 2008 R2 edition provides key functionality to support any size business and IT challenge. Use the information below to decide which edition best meets your business needs. Windows Server 2008 R2 Datacenter Edition is optimized for your large-scale virtualization of workloads that require the highest levels of scalability, reliability, and availability to support large, mission-critical applications. With unlimited virtualization use rights and a hypervisor-based virtualization technology, Windows Server 2008 R2 Datacenter provides both flexibility and cost savings. Windows Server 2008 R2 Datacenter also supports the memory and processing needs of large-scale, business-critical workloads such as ERP, databases, server consolidations, and custom and line-of-business applications. Windows Server 2008 R2 Enterprise Edition provides you with high levels of system uptime and the scalability to support the growth of mission-critical applications. It also provides a cost-effective way to realize the benefits of virtualization. Providing uninterrupted business services to employees, vendors, and partners around the clock has become a critical business factor for global businesses. Remote employees and international customers and partners need to have continuous access to systems and data. A disruption in services can result in diminished productivity...

Words: 5150 - Pages: 21

Premium Essay

Application of Information System by Southeast Bank Limited

...APPLICATION OF INFORMATION SYSTEM BY SOUTHEAST BANK LIMITED 1.0 Introduction Information systems are essential for conducting day-to-day business in the most advanced countries in the world, as well as achieving strategic business objectives. Entire sectors of the economy are nearly inconceivable without substantial investments in information systems. E-commerce firms such as Amazon, eBay, Google, and E-Trade simply would not exist. Today’s service industries—finance, insurance and real estate, as well as personal services such as travel, medicine, and education—could not operate without information systems. Similarly, retail firms and manufacturing firms require information systems to survive and prosper. 1.1 Objective of the report The main purpose of this report is to have a clear idea about the application of information system by banking system of Bangladesh. For this reason we select Southeast Bank Limited. 1.2 Methodology and Data Collection Of the two ways of data sources (primary and secondary) we have used only secondary sources as follows: • Text books, • Investigation report, • Previous researches related to the topic, • Journals, newspaper, indices data and • Electronic sources (Internet) 1.3 Scope of the report The reader of the report will find the answer of the following questions after reading this report; ➢ What is an information system? ➢ What makes information system so essential today...

Words: 4150 - Pages: 17

Free Essay

Mobile Service Provider

...our CSE faculty without whose constructive guidance this term paper would not have been a success. Her valuable advice and suggestions for the corrections, modifications and improvement did enhance the perfection in performing my job well. I am obliged LOVELY PROFESSIONAL UNIVERSITY for providing the best of facilities and environment to bring out our innovation and spirit of inquiry through this venture. I am grateful to My Parents whose blessings and wishes have gone a long way in the completion of this arduous task. Last but not the least I thank all My Friends and Batch Mates, without their prompt support my efforts would have been in vain. CONTENTS 1. Introduction of C 2. Mobile services present scenario 3. Model of mobile computing 4. Benefits of the Mobile Web For Mobile Service Provider: 5. Routing and Query Processing 6.Description of mobile service provider 7. Disconnectivity and consistency 8. Coding 9. Snapshot 10. Future Scope 11. Refernces INTRODUCTION OF C:- We begin our journey with a little history. C , has become one of the most popular programming languages. Originally designed for systems programming, C enables programmers to write efficient code and provided close access to the machine. C compilers, found on practically every Unix system, are now available...

Words: 4262 - Pages: 18

Free Essay

Airtel

...Administration East West University SUBMITTED BY Hasnat Jahan Nira: 2012-2-10-229 Md. Abul Kalam: 2012-2-10-126 Md. Abu Bakar Siddique Bhuiyan: 2010-2-10-327 LETTER OF TRANSMITTAL 10th December, 2013 To, Mahmud Zubayer Assistant Professor Department of Business Administration East West University. Subject: Consumer perception of e-advertising about “Airtel Bangladesh Ltd.” Dear Sir, It gives us an immense pleasure in submitting to you the term paper Consumer perception of e-advertising about “Airtel Bangladesh Ltd.” Which is the topic under our observation? While preparing the report, we closely focused on the topic & tried to collect most complete information available. We believe that it will provide you a clear scenario of e-advertising about the company. We thank you for giving us the opportunity to do a report on the above mention point. This term paper will definitely give us experience which we can be used in our professional life. We will be always available for any further query and to answer any questions on this paper. Thank you Truly yours Group- Scanner, Course- MKT201; Section- 01 Hasnat Jahan Nira _______________________________ Md. Abul Kalam _________________________________ Md. Abu Bakar Siddique Bhuiyan __________________________ ACKNOWLEDGEMENT At first we express our deep sense of gratitude to almighty ALLAH for His infinite grace that allowed us to complete this assignment successfully...

Words: 4010 - Pages: 17

Premium Essay

Disaster Recovery Plan

...DOCUMENT CHANGE CONTROL 6 EXECUTIVE SUMMARY 8 Overview 8 Recovery Statement Summary 8 Recovery Scenario #1: The Preferred Solution for a Total Data Center Loss 8 Recovery Strategies: Activities and Time Frames 9 Short-Term (2 to 3 Days): 9 Medium-Term (6 to 12 weeks): 9 Longer-Term (6 months to 2 years): 9 Recovery Scenario #2: The Strategy for Loss of a Critical System or Component 9 Summary 10 INTRODUCTION 11 INFORMATION SECURITY POLICY – DEFINITIONS & STATED REQUIREMENTS 11 8.2 Disaster Recovery Plan 11 8.3 Business Recovery Strategy 11 PLAN DISTRIBUTION 11 PLAN OBJECTIVES 11 PLAN ASSUMPTIONS 12 Definitions 12 PROCESSING ENVIRONMENT 13 Scope of Recovery 13 Environment Description 13 Essential Equipment 13 Disaster Recovery Scripts 15 RECOVERY PLAN ELEMENTS 17 1. Recovery Plan for Major Disasters 17 A. Detection and Reaction 17 B. Identifying the problem – Notifying the authorities 17 C. Establishing a Command Center 17 D. Reducing Exposure 17 2. Roles and Responsibilities 20 A. Management / Damage Assessment Team: Initial Response 21 B. Disaster Recovery Teams — Emergency Contact List 22 (AGENCY) FUNCTIONAL AREA MANAGERS 23 3. Recovery Plan for Major Disasters 24 A. Establishment of Full Recovery at Backup Site 24 B. Disaster Recovery Team Checklists 24 C. Restoration of Facilities and Operations at the Original and/or Alternate Site 24 4. DISASTER RECOVERY TEAMS 24 A. Emergency Contact List in Section 2-B & Activity Checklists Provided...

Words: 17396 - Pages: 70

Free Essay

Wimax

...Content 1.1 Introduction 2 1.2 objectives of the study 2 1.3 Operational Definition 3 1.4 Literature review 4 2.1 Methodology of Data Collection 24 3.1 Conclusion 24 3.2 Reference 25 1.1 Introduction WiMAX is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless "metropolitan area networks". WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15 km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100 - 300 feet (30 - 100m). With WiMAX, WiFi-like data rates are easily supported, but the issue of interference is lessened. WiMAX operates on both licensed and non-licensed frequencies, providing a regulated environment and viable economic model for wireless carriers. WiMAX can be used for wireless networking in much the same way as the more common WiFi protocol. WiMAX is a second-generation protocol that allows for more efficient bandwidth use, interference avoidance, and is intended to allow higher data rates over longer distances. 1.2 objectives of the study ➢ To know details about the WiMax technology.   1.3 Operational Definition WiMAX- WiMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks...

Words: 5510 - Pages: 23

Premium Essay

Microsoft

...Microsoft Age of Empires III Readme File September 2005 Welcome to Microsoft® Age of Empires® III! This file contains information to help you install Age of Empires III. It also includes late-breaking information not included in the manual or in-game Help. CONTENTS A. Installing Age of Empires III B. Starting Age of Empires III C. Getting Help D. What's on the Disc? E. Multiplayer Guide F. Shortcut Keys G. Manual Corrections H. Gameplay Troubleshooting I. DirectX Troubleshooting J. Video Troubleshooting K. CD-ROM Drive Troubleshooting L. Audio Troubleshooting M. Processor Troubleshooting N. Performance Troubleshooting O. Multiplayer Troubleshooting P. Age of Empires III Information A. Installing Age of Empires III To install Age of Empires III, you must have administrator rights on your computer and your computer must be running Microsoft Windows® XP. To install Age of Empires III · Insert the Age of Empires III disc into the disc drive. If AutoPlay is enabled, the installation menu will appear; click Install, and then follow the on-screen prompts. —or— · If AutoPlay is disabled, on the Start menu, click My Computer. In the My Computer window, double-click the disc drive icon, and then double-click Setup.exe. On the Setup screen, click Install, and then follow the on-screen prompts. B. Starting Age of Empires III You must have the Age of Empires III disc 1 in your disc drive to play. To start Age of Empires III · Insert the...

Words: 4090 - Pages: 17