Domain Name System. Proper use reduces intranet administration costs. Architecture DNS. Service. Flexible Scalable Extensible
|
|
|
- Steven Hampton
- 10 years ago
- Views:
Transcription
1 Domain Name System Proper use reduces intranet administration costs Architecture Flexible Scalable Extensible Service Standard Robust Efficient DNS Affordable Reliable Predictable
2 The Internet continues expanding. Its progress seems unstoppable; for years now the rate of growth has been increasing. To easily continue using a more widely spread Internet, and to keep a grip on it, DNS is vital. This article explains the benefit of DNS for business networks and the technological and administrative conditions necessary for the optimal deployment of this technology. The method described here is particularly important for organizations with many employees spread over multiple locations.
3 Domain Name System N Proper use reduces intranet administration costs etwork addresses, such as , are difficult for people to remember. The need for associating names with network addresses has been recognized almost from the start of the Internet. Initially, a list of the names and network addresses of all computer systems was maintained in a central file, known as the hosts file. System administrators needed the discipline to regularly pick up the latest version. This method of working was no longer practical once the Internet starting rapidly expanding. System administrators needed to pick up an increasingly large file increasingly often. Also, the whole Internet was dependent on a single central authority who made changes. This authority also had no way of verifying changes. By about 1983 it was clear that the hosts file had to be replaced by another mechanism. The successor had to offer the same functions, but also be distributed, consistent, reliable, and autonomous. These four characteristics are brought together in DNS. 1. Distributed: the system is hierarchical and allows the delegation of authorities to multiple administrators. 2. Consistent: the same answer is given when the same request is made at different places. 3. Reliable: redundant data can be held at different places; changes propagate automatically. 4. Autonomous: administrators can make changes independently of others. Advantages for the Intranet Internet technology is increasingly used on internal company networks, where it is called an intranet. The characteristics of DNS bring a number of advantages for intranets. An intranet often has the same characteristics as the Internet, such as rapid growth and increasing geographical dispersal. This means that there is a greater need for distributed management of names and network addresses. DNS can adapt itself to the growth and dispersal because of its distributed and autonomous characteristics. A reliable translation of names to network addresses is a requirement for the reliability of intranet applications (see figure 1). Because these names are used for applications, the reliability of an application is dependent as much on a reliable translation from name to address as on a reliable network connection (provided by the routers). If the translation from name to network address fails, then the application is, in effect, disconnected from the network. DNS is very suitable for performing the translation because of its reliability and consistency. A well-structured naming scheme makes maintaining an intranet easier. For example, it makes it possible to make DNS technology is better for larger networks and business critical applications changes to the infrastructure without disrupting the services. So the network address of a web server or mail server can be changed without having to inform the users, because the name will not change. DNS can, therefore, reduce intranet management costs. There are various services which can perform name translation. The most well known, other than DNS, are Network Information name Service (NIS) and Windows Internet Naming Service (WINS). The NIS and WINS services were developed for administrating Local Area Networks (LANs) and are not sufficiently robust for larger networks. It is therefore better to use DNS technology for larger networks and for business critical applications. SAP WWW Names Network connections Figure 1: Applications, names and network connections. 3 of 8
4 DNS building blocks What does DNS consist of? DNS is built from three components: servers, resolvers, and the content. Servers and resolvers form the DNS infrastructure. The content consists of what are called domains. A DNS server is called a name server, and its job is to store names or to get them from other name servers. Responses that the name server gets from other servers are temporarily stored in cache to eliminate unnecessary network traffic. Resolvers are the DNS clients whose job it is to query the name server (figure 2). A resolver can generally directly query up to three name servers. The DNS content can fulfil a number of functions. The best known are the translation of names to network addresses and mail routing. DNS can indicate where must be delivered. Mail routing can be made more robust by including alternative routes in the DNS. Since DNS is distributed, it is also necessary to store where a domain can be found. This is done with the help of DNS meta-information. tree; the DNS meta-information is used for this. Thirdly, the structure allows responsibility for a branch to be delegated to multiple parties. Within the branch com, for example, responsibilities can be delegated to ibm and to origin-it. This creates the domains ibm.com and originit.com. The content of each domain must be maintained. That is the responsibility of the hostmaster. There is, therefore, a hostmaster for each of the root, com, and origin-it.com domains. Each hostmaster must manage the names, network addresses, mail routing and DNS meta-information for the domain (figure 3). Name server Local tables cache other name servers The content is held in a tree structure (figure 3), in which the highest level in the hierarchy is called the root. This hierarchical tree structure has different functions. Firstly, the name gives a rough indication of the type and location of the organization. Names that end with.nl, for example, are related to the Netherlands. Secondly, it is possible to automatically navigate through the DNS query response Resolver Figure 2: Name servers and resolvers DNS architecture Without a clear architecture for name servers, resolvers and the content, DNS cannot be effectively deployed. One possible architecture is looked at here. For the name server architecture a distinction is made between the backbone name servers and the LAN servers. A backbone name server has information about the whole intranet. Within the backbone a division is made into master name servers and regional name servers. The master backbone name server passes data on to the regional name servers. The LAN name server only has information about the LAN. LAN name servers ask the regional backbone servers for DNS content that is not known locally. To increase reliability the backbone name servers can be geographically dispersed (figure 4). Resolvers first approach the name server on the LAN. In case of problems they can fallback to the backbone servers. This arrangement minimizes usage of bandwidth on the Wide Area Network (WAN), because the LAN name server holds information in cache. With this set-up the resolver gets a response as quickly as possible. Furthermore, this gives extra robustness in two ways. Translating local names is still possible if the connection to the WAN is down, and translation of all names is still possible if the local name server is down, provided that the resolvers can fallback to using the backbone name servers. 4 of 8
5 nl root com org surfnet origin-it ibm unesco WWW= Figure 3: Part of the Internet naming hierarchy Naming convention To make optimal use of DNS a naming convention is vital. A naming convention defines the architecture of the content. It describes the structure and rules for the names that may be used within the company. A practical naming convention ensures that names need to change as little as possible, and that they have a logical structure. At the same time, the naming convention must also have both a technical and a human dimension. The technical dimension gives the relationship between the application and the infrastructure (see figure 1). The human dimension is concerned with ensuring that the end users and administrators can apply the convention in practice. Bearing in mind that organizations frequently reorganize, it is advisable to include as few organizational indications in the domain as possible. The geographic spread of a business is often the most stable factor. A convention that recommends <location>.<country>. company.com is logical. A machine in Chicago would then have the name webserver.chi.us.company.com. The convention can also make a link to the network infrastructure. A LAN is connected to the domain <location>.<country>.company.com with the associated network addresses. In addition to domains, the naming convention must indicate the names of the applications. DNS offers the possibility to separate, in a logical sense, the services from the infrastructure. The service in Chicago, for example, is called mail.chi.us.company.com. The mail server could have another name, for example, mailserver.chi.us.company.com. This offers the manager of the service great flexibility. If the mail server in Chicago must undergo maintenance, then a simple change to the DNS takes care that the service mail.chi.us.company.com is temporarily moved to, for example, mailserver.was.us.company.com. This change is transparent to end users: carries on being delivered without delays. DNS implementation Assuming that the DNS name server, resolvers and content are to be correctly implemented, then a combination of a centrally administered backbone and LAN name servers gives the most effective solution. The configuration of the resolvers can be distributed per LAN, for corporate level, with the LAN manager remaining responsible for the LAN names and addresses. Therefore, a DNS domain is partly centrally managed, and partly locally managed. A combination of centrally managed backbone and LAN name servers is the most effective. Regional Name Servers pull a copy from the Master Name Server Master Name Server DNS Backbone example, by using Dynamic Host Configuration Protocol (DHCP) servers. For the implementation of the content, a naming convention is needed that states, among other Regional Name Servers things, which domain names are allowed. The hostmaster must maintain the names, network addresses, mail routing, and DNS meta-information for each domain. LAN managers often have no knowledge of mail routing and DNS meta-information, and therefore cannot LAN Name Server LAN Name Server pulls a copy from the Regional Name Servers adequately fill this role. This means that mail routing and DNS meta-information must be administered at a Figure 4: Name server architecture 5 of 8
6 Tool The tool used for managing the content must allow for both central and local LAN management. The right tool lets the LAN manager concentrate on the LAN names and network addresses without worrying about mail routing and meta-information. A good tool will automatically check the syntax and semantics of changes made by the LAN manager. In this way, decentralized administration with central control is possible. This allows a company to implement a solid layer of names which can support business critical applications. There are numerous tools on the market that claim to make DNS administration simpler. Many of these, however, do make administration more difficult. For example, the LAN manager must still know about DNS internals, such as the definitions for mail routing, to be able to do his job. Some tools put the emphasis more on configuration management than DNS management. Many businesses use the tools without first sorting out the configuration management process. An organization that does so is saddled with another, often incomplete, configuration management database. There is a tendency to neglect building a decent DNS infrastructure of name servers and resolvers. The connection with the Internet A company must, of course, also make names known on the Internet, for example, for and web servers. It is not wise to publish the complete intranet contents on the Internet. An intranet s DNS content can give competitors more information than you might first realize. Based on the number of machines included in the research department in a particular town, for example, it is possible to get an indication of the number of staff working on a particular project. The solution is to set up a shadow DNS structure which only contains that information necessary for communicating with the Internet. This is called a split DNS. Abuse The domain name is a company s calling card on the world-wide web. Misuse is made of this by people who register minor variations on names, banking on users making typing mistakes. This has the greatest consequences for . An example is the domain shell.com from Shell Oil Company. It is expected that people will forget the second l and type in shel.com. A web pirate has therefore registered shel.com. An sent to [email protected] is then sent to the pirate s machine. In this way, even internal can be sent outside the organization as the result of a typing mistake, if the appropriate measures are not put in place. In addition to variations, the names of products are also popular with pirates. There are a few technical measures that can be taken to limit the damage as far as possible. Administrative measures are the most effective: companies must treat domain names with the same care they apply to trademarks and patents. DNS management For DNS to work to its full potential, an organization must fill a number of roles. The naming authority is a central role which sets up the naming convention, guards it, and continually keeps it up to date. Each time a new service or location is added to the network, additions are made to the naming convention. The naming authority must have a corrective function if the convention is not being adhered to. A hostmaster is required for each domain, whose role is to assign names to the locally known network addresses. Considering that the network addresses are spread over the entire organization, assigning names to network addresses must also be done in a distributed manner. The role of hostmaster must be filled for each LAN. By using the right tool, the hostmaster need not be concerned with complex issues such as mail routing. The backbone administrator implements the naming convention determined by the naming authority. Using the right tools allows the administration of mail routing and DNS meta-information. The backbone administrator also manages the backbone and the LAN name servers. 6 of 8
7 A glimpse into the future DNS technology is still developing. Within this article we have just scratched the surface. The first example of a new development is that Microsoft is embracing DNS technology in Windows Windows 2000 uses DNS for finding services on servers. It is also going to use dynamic DNS, which effectively gives the desktop write access to DNS. This brings dangers with it, because an incorrectly configured desktop could, for example, claim the name of a corporate web server or mail server. Therefore, dynamic DNS must be combined with a proper method for authentication and verification. Another new development is secure DNS, which guarantees the authenticity of DNS responses. The name server adds a signature to each response, which the resolver can verify. A prerequisite for secure DNS is a public key infrastructure. Conclusions Companies invest a lot of time and money in network connections (routers, bandwidth, etc) and in applications, such as SAP. The poor relation here is often the names in between. The necessary organizational roles are often not filled, and there is lack of a decent infrastructure. This increases the operational costs of the intranet, because, for example, changes can not be implemented without involving end users. A good DNS service brings with it a clear divide between LAN management and WAN management. This simplifies the daily administration, increases service availability, and prepares the intranet for the future. Anton Holleman Origin provides a full spectrum of information technology services for global corporations and other complex "extended enterprises". With a staff of over 17,000, Origin conducts operations in 32 countries around the world and is headquartered in Eindhoven, the Netherlands. Origin's customers include over one hundred of the world's Fortune 500 firms. Origin is a member of the Royal Philips Electronics group of companies. Origin Managed Services is responsible for all of Origin s network services, system management and managed application services, providing a focus on global synergy and efficiency to the best possible benefit of its customers. To achieve this, it uses standardized processes, technology and global management centers in North America, South America, Europe, and Asia Pacific, together with national data centers worldwide, to deliver 7 x 24 hour services. 7 of 8
8 Anton Holleman works for Origin Managed Services. This article first appeared in Dutch in Open Computing 3, April Origin BV Origin Managed Services Eindhoven The Netherlands June 1999 Printed in The Netherlands Origin BV 1999 Document Number: BID-NBS-0344
High Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
The Domain Name System (DNS) A Brief Overview and Management Guide
The Domain Name System (DNS) A Brief Overview and Management Guide Table of Contents Introduction 1 What Exactly Is DNS? 2 Potential Pitfalls of DNS 4 DNS Management and 5 Zone Hosting DNS Management 6
Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks
Microsoft Exchange Load Balancing Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Server Balancing The following is an introduction and overview as to how the EdgeXOS appliances
Implementing Domain Name Service (DNS)
Implementing Domain Name Service (DNS) H C A 1 P T E R ITINERARY Objective 1.01 Objective 1.02 Objective 1.03 Install and Configure DNS for Active Directory Integrate Active Directory DNS Zones with Existing
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
Designing the Active Directory Structure
253 CHAPTER 9 Designing the Active Directory Structure Microsoft Windows 2000 Server includes a directory service called Active Directory. The Active Directory concepts, architectural elements, and features
Network Security. Chapter 9 Integrating Security Services into Communication Architectures
Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Milestone Federated Architecture TM
White paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: June 22, 2015 Table of Contents Introduction...
Virtualized Domain Name System and IP Addressing Environments. White Paper September 2010
Virtualized Domain Name System and IP Addressing Environments White Paper September 2010 Virtualized DNS and IP Addressing Environments As organizations initiate virtualization projects in their operating
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724
COURSE SYLLABUS MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
The Importance of a Resilient DNS and DHCP Infrastructure
White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems The Importance of DNS and
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
How To Guide Edge Network Appliance How To Guide:
How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table
Network Station - Thin Client Computing - Overview
Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,
Clustering and Queue Replication:
Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.
COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator
FatPipe Networks www.fatpipeinc.com
XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business
CGIAR Active Directory Design Assessment DRAFT. 18 September 2007
CGIAR Active Directory Design Assessment DRAFT 18 September 2007 1170 Hamilton Court Menlo Park, California 94025 www.cgnet.com Table of Contents 1. Executive Summary...3 2. Introduction...4 3. Alternative
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Chapter 3: Building Your Active Directory Structure Objectives
Chapter 3: Building Your Active Directory Structure Page 1 of 46 Chapter 3: Building Your Active Directory Structure Objectives Now that you have had an introduction to the concepts of Active Directory
Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24
Basic DNS Course Module 1 Ron Aitchison ZYTRAX, Inc. Page 1 of 24 The following are the slides used in this Module of the course. Some but not all slides have additional notes that you may find useful.
How Cisco IT Migrated to Microsoft Active Directory
How Cisco IT Migrated to Microsoft Active Directory Automated migration and provisioning tools reduce cost of migrating to Active Directory and simplify training and troubleshooting. Cisco IT Case Study
Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005
Fax and Oracle Collaboration Suite An Oracle White Paper August 2005 Fax and Oracle Collaboration Suite Introduction... 3 Fax Support in Oracle Collaboration Suite... 4 Outbound Fax Configuration... 7
Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers
Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers What You Will Learn This document describes how you can use Cisco Wide Area Application Services (WAAS) Software
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.
Course 20410C: Installing and Configuring Windows Server 2012 OVERVIEW About this Course Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012
Microsoft 6421 - Configure and Troubleshoot Windows Server 2008 Network Infrastructure
1800 ULEARN (853 276) www.ddls.com.au Microsoft 6421 - Configure and Troubleshoot Windows Server 2008 Network Infrastructure Length 5 days Price $4169.00 (inc GST) Overview This five-day instructor-led
White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
Application Note Multiple SIParator Distribution
Application Note Multiple SIParator Distribution 26 May 2008 Multiple SIParator Distribution Table of Contents 1 MULTIPLE INGATE SIPARATOR SOLUTION... 1 2 WHAT IS DNS SRV?... 1 2.1 LOAD BALANCING WITH
For extra services running behind your router. What to do after IP change
For extra services running behind your router. What to do after IP change This guide is for customers who meet the following conditions: - Customers who have moved from a TPG Layer 3 plan to a TPG Layer
MOC 6435A Designing a Windows Server 2008 Network Infrastructure
MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:
Enterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435
coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
Designing and Implementing a Server Infrastructure
Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services
Course Outline. Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Duration: 5 Days What you will learn This five-day instructor-led course provides students with the knowledge
Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure
Course 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Length: Language(s): Audience(s): 5 Days English Level: 200 IT Professionals Technology: Windows Server 2008 Type:
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
Designing and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Page 1 of 7 Designing and Implementing a Server Infrastructure Course 20413: 4 days; Instructor-Led Introduction This 4-day instructor-led
6421B - Windows Server 2008 R2 Network Infrastructure
Configuring and Troubleshooting a Windows Server 2008 R2 Network Infrastructure Introduction This five-day instructor-led course provides students with the knowledge and skills to configure and troubleshoot
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
Configuring & Troubleshooting Windows 2008 Server 2008 Network Infrastructure
About this Course Configuring & Troubleshooting Windows T This five-day instructor-led course provides students with the knowledge and skills to configure and troubleshoot Windows Server 2008 and Windows
Installing and Configuring Windows Server 2012 MOC 20410
Installing and Configuring Windows Server 2012 MOC 20410 Course Outline Module 1: Deploying and Managing Windows Server 2012 This module introduces the new Windows Server 2012 administrative interface.
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
How To Manage Software License Management With An Aspera Catalog
Software License Management Guide How To: Choosing the Right Catalog for Software License Management Software license management tools all rely on an SKU catalog to reference and validate license data.
DNS Appliance Architecture: Domain Name System Best Practices
WHITEPAPER DNS Appliance Architecture: Domain Name System Best Practices A Practical Look at Deploying DNS Appliances in the Network to Increase Simplicity, Security & Scalability Cricket Liu, Chief Infrastructure
Automating Software License Management
Automating Software License Management Automating license management saves time, resources, and costs. It also consistently produces high quality data and a documentable method for mapping software licenses
Discovery and Usage data for Software License Management
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Alteon Global Server Load Balancing
Alteon Global Server Load Balancing Whitepaper GSLB Operation Overview Major Components Distributed Site Monitoring Distributed Site State Protocol Internet Topology Awareness DNS Authoritative Name Server
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
MCSA Server (Exam 70-410)
MCSA Server (Exam 70-410) Installing and Configuring Windows Server 2012 Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this
COLLEGE OF COMPUTER SCIENCE & INFORMATICS Information Technology Courses
COLLEGE OF COMPUTER SCIENCE & INFORMATICS Information Technology Courses IT101 Introduction to Computer Applications The 20 th century not only brought us the dawn of Information Age, but continued to
Conquering the Challenges of IP Network Management with DHCP and DNS
Conquering the Challenges of IP Network Management with DHCP and DNS A white paper by Incognito Software 2006 Incognito Software Inc. All rights reserved. Page 1 of 9 Conquering the Challenges of IP Network
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Installing and Configuring Windows Server 2012
Course Code: M20410 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Installing and Configuring Windows Server 2012 Overview Get hands-on instruction and practice installing and configuring Windows
Understanding the Impact of Running WAN Emulation with Load Testing
Understanding the Impact of Running WAN Emulation with Load Testing A Shunra Software White Paper July 2, 2008 Introduction Investment in pre-deployment performance testing has become a widely adopted
Making the Business and IT Case for Dedicated Hosting
Making the Business and IT Case for Dedicated Hosting Overview Dedicated hosting is a popular way to operate servers and devices without owning the hardware and running a private data centre. Dedicated
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft
A TECHNICAL REVIEW OF CACHING TECHNOLOGIES
WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,
Scalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
Planning and Implementing Windows Server 2008
Planning and Implementing Windows Server 2008 Course Number: 6433A Course Length: 5 Days Course Overview This five day course is intended for IT Professionals who are interested in the knowledge and skills
BT Internet Connect Global - Annex to the General Service Schedule
1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Building a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
How To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz [email protected], [email protected] Institute of Control and Computation Engineering Warsaw University of
BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide
BlackBerry Enterprise Server Version: 5.0 Upgrade Planning Guide SWDT577232-577232-0327090551-001 Contents 1 Overview: BlackBerry Enterprise Server... 3 2 Upgrading a BlackBerry Enterprise Server environment...
How To: Choosing the Right Catalog for Software License Management
Software License Management Guide How To: Choosing the Right Catalog for Software License Management Software License Management tools all rely on a catalog to reference and validate data. In this guide
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Installing and Configuring Windows Server 2012
Course 20410B: Installing and Configuring Windows Server 2012 Length: 5 Days Audience(s): IT Professionals Level: 200 Technology: Windows Server 2012 Overview About this Course This course is part one
Module 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
