StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Microsoft Windows Server Analysis - Report Example

Cite this document
Summary
This report "Microsoft Windows Server Analysis" discusses the use of centralized backups in WAN that makes the sharing of network resources easier and cheap, a more improved backup includes all the possible inclusion of all subnet LANs joined together to a central database…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Microsoft Windows Server Analysis
Read Text Preview

Extract of sample "Microsoft Windows Server Analysis"

In order to enable the uses in the company network to connect to the internet hostnames, one has to do the various steps in the configuration of the server. The initial step to take is to disable the recursion on the NS3 and NS2 server. This is followed by enabling the ordering of the netmask on the NS1 server whereas the configuration of the NS3 and the NS2 servers to use the NS1 server as a forwarder disabling the round-robin on NS1. In disabling this recursion of the server NS2 forces the use and introduction of iterative queries which does not enhance them in resolving the external names (Carvalho, 2012).

However, enabling the ordering of the netmask provides the most efficient results for client’s orders but this does not enhance the internal clients in resolving the external addresses. Using the NS1 as a forwarder severs enhances successful name resolution for the internal clients. In round robin disabling, this will prohibit any further load balancing and hence will not enable the internal clients in resolving the external host names. In this scenario the user are likely to suffer from many problems which may prevent them from obtaining IP addresses, these may include the expiry of the users IP address, the incorrect DHCP configuration, duplicate IP address on the same network and lack of DHCP server authorization.

As a result of the introduction of the active directory in the network, this authorizes the DHCP server and the expiry of the users IP address stimulates the generation of a new IP address (Shapiro, 2008). This also prevents a computer from acquiring a new IP address by itself and thus prevents the DHCP missing which prevents users on network subnets to acquire new IP addresses. However, duplicate IP address prevents the user from communicating in the network but does not prevent the generation of a new IP address from the server.

A network lies in its network domain, in this context; some offices may be too small and located far away from the main company (Tomsho, 2010). It is too expensive to have that installed broadband and hence still requires internet connection and communication by the users on the company’s network. To incorporate this small office on the network we can use modem dongles which are connected to the main network through a virtual private network which uses registered authentication information from the active directory in the network this prevents unauthorized entry into the network and as well as providing cheap access in the main network.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data base analysis Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Data base analysis Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1471613-data-base-analysis
(Data Base Analysis Essay Example | Topics and Well Written Essays - 2000 Words)
Data Base Analysis Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1471613-data-base-analysis.
“Data Base Analysis Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1471613-data-base-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Microsoft Windows Server Analysis

Windows HPC Server 2008

Moreover, the latest developed windows server® 2008 64-bit, HPCS ranges to thousands of CPU processing cores and comprises a management console that facilitates practically maintenance and checking system strength and constancy.... In this scenario, the main head node that currently offers switching from fail component to backup component using windows server 2008 Enterprise accessibility services, SQL Server powers and clustering is responsible for managing all the rights to access the cluster resources as well as it is the particular position of operation, organization and job development in support of the compute cluster....
7 Pages (1750 words) Research Paper

Microsoft Company Analysis

Microsoft – Company analysis In 2010, Interbrand ranked Microsoft as the 3rd Largest brand in the world.... Microsoft has been severely lagging behind in this industry with windows Mobile not being used by many of the handheld PDAs or cell phones (Markus & Robey).... With Apple and Google growing rapidly with their own respective systems, Microsoft needed to bounce back which it did with a strategic collaboration with Nokia which means that all new Nokia handsets will be supplied with support for windows Media Audio and windows Media DRM 10 (Digital Rights Management)....
8 Pages (2000 words) Essay

The System Administrators of MegaCorp: Security Goals

With this concern, the primary purpose of this paper is to develop, document, and assess best practices for server deployment and administration that would eventually support and enhance the security of Megacorp towards upgrading its new operating system.... Before server Deployments Deployment of servers in any organization is costly and daunting.... There exist certain few common threats to servers that have been represented below: Malicious objects may use software bugs in the server or its operating system to gain unofficial access to the server Denial of service (DoS) might also be directed to secondary network infrastructure, deterring the valid users to execute the server services Sensitive information stored in the main server may get access by the intruders or may change in an unauthorized manner Sensitive data or information that are transferred or encrypted amid the servers and thus the client may get interrupted by unauthorized users....
12 Pages (3000 words) Assignment

Pursue Software Services for Consumers: Microsoft PLC

hellip; The author states that one of the most notable products of the company is its best selling software pertained to as the microsoft windows operating system as well as the Microsoft Office suite of productivity software.... In the paper “Pursue Software Services for Consumers: microsoft PLC” the author focuses on microsoft Corporation, an international computer technology company, known for developing, producing, supporting and even licensing a broad range of software products predominantly for computers....
4 Pages (1000 words) Assignment

Comparing the Windows 2003 Server and Windows 2008 Server Operating System

Windows Servers do this by building windows server also manages domain and its client's creation, maintenance and security.... (Theosfiles) The family of windows server 2008 includes windows server 2008 R2 Standard, Enterprise, Datacenter and Windows Web Server 2008 R2 each one has its own long list of cost and benefits which can be studied separately at Microsoft Website.... (Theosfiles) Any decision of migration from windows server 2003 to 2008 requires critical planning of users account and their rights and data....
3 Pages (750 words) Essay

Microsoft Company Analysis

The author provides SWOT analysis and describes competitor rivalry, buyer bargaining leverage/power, supplier bargaining power, threat of new entrants  and threat of substitutes… The analysis reveals Microsoft company that has a lot to offer and has a strong competitive position moving forward, but is coming in at second place behind Google in many of the growth areas that have been considered here (Kelleher; Paul; Enderle; Coldewey; Porter; Reuters; Sachitanand; Thurrott; Microsoft; Microsoft (b); Clark and Worthen; Fletcher) The Company also designs and sells hardware, and delivers online advertising to the customers....
25 Pages (6250 words) Assignment

Case Note: Microsoft vs. Commission Law

The purpose of the following study "Case Note: microsoft vs.... Commission Law" is to clarify the debate between competition law and a free market.... Therefore, the paper examines a few cases that demonstrate the conflict between innovation and protection against abuse of monopoly....
10 Pages (2500 words) Case Study

Security Risks of Enumerating Active Directory

microsoft windows server active directory is a network directory service used in domain networks of windows and also included in the other popular windows server like windows 2003, windows 2012 as a bunch of processes.... microsoft windows server active directory is a network directory service used in domain networks of windows and also included in the other popular windows server like windows 2003, windows 2012 as a bunch of processes.... Active directory and enumeration of the active directory in windows server It is actually a directory service by Microsoft in windows server, which saves the information about the network resources and data from those applications that are directory-enabled applications....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us