Operating System And Microsoft Essay

PAGES
8
WORDS
2567
Cite
Related Topics:

Deployment and Administration - Windows Server 2012 Deployment and Server Additions

The number of servers required the roles to be combined.

Server Requirements:

Careful evaluation of present and projected activity considerations helps decide the server configuration. The number of servers required will correspond directly to the amount of functional data handling for the next three to five years. If a growth of 33% is projected, then it would be prudent to use a RAM of 16 GB in the physical server. Generally, it is good enough practice to start with a 12 GB RAM in a virtual operation computer, and monitor for the need to upgrade as the project and operations expand (Serhad MAKBULOGLU, 2012).

Component

Estimate Memory (example)

Base Operating System Recommended RAM (Windows Server 2008)

2 GB

LSASS internal tasks

Monitoring Agent

Antivirus

Database (Global Catalog)

GB

Cushion for backup to run, administrators to log on without impact

1 GB

Total

12 GB

Table 1: Calculation Summary Example

If the server is based on the premises, this user would require approximately 7.5 MB of external bandwidth every day. There should be a little more added to cater for protocol overheads. This means that the overall figure would round up to about 8MB. In an 8-hour working day, this figure adds up to an average of slightly over a quarter of a kilobyte per second for 8 hours. The rate, thus, would support thousands of users; even on a slow connection. However, such calculation is superficial and misleading (as regards data requirements), because it ignores many practical factors that affect performance; for example, if there is an on-premise mail system, there is a good chance that it will handle lots of spam mail. Spam generally outnumbers actual mail by up to 9 times. In other words, if the firm receives 8 MB of actual mail, it should also expect up to 72 MB of spam. The consequence is that the bandwidth requirement pushes up to 2-7 Kbps. Thus the connection estimated to serve thousands can only now serve a couple of hundreds (Peter Bright, 2012).

ii. The edition of windows to be used for each server

The standard edition of windows; the x64 bit will be on hand. This assures that, even if your Active Directory operates on a 2003x86 architecture, and has DIT less than 1.5 GB, the template provided in this paper can be still applied and will work satisfactorily. Capacity planning must be a continuous activity. You should constantly check the level of efficiency achieved by your system and upgrade as the situation demands. Optimization level will be achieved after several hardware deployments and lifecycles as the cost of such hardware changes. For instance, when the memory goes down in, cost per core also reduces. The cost of optional storage options also changes (Serhad MAKBULOGLU, 2012).

You should also plan for peak periods of the day. You could break it into a 30 minute or one hour spans. Avoid making it higher because the actual peaks will be concealed. Using lesser spans will also be misleading. It is prudent to plan for growth in line with the passing of the hardware lifecycle over time. One option is to add hardware and upgrade in a staggered step. You may also replace everything after three or five years. Whatever option you choose, you will need to estimate the amount of load that will grow on Active Directory. If you collect historical data, it could be a handy resource in such assessment (Serhad MAKBULOGLU, 2012).

iii. Should servers be virtualized using Hyper-V?

The important element here is to make sure that the shared infrastructure can support the DC load and the other dependent resources such as the shared media and the pathways that link to it. This is a necessary precaution regardless of whether the physical domain controller is co-sharing the same media on NAS iSCSI or SAN infrastructures (as alternative servers or apps); or a guest that makes use of pass via access to a NAS,...

...

It may help you to use a multiplier of 1:10 for adjustment to different options of storage for virtualized guests that are Hyper-V. For instance, use pass-through storage, IDE or SCSI. Adjustments needed between ranges of storage options are not relevant to whether the storage is iScsi, NAS or SAN
iv. In which of the two sites will the servers be located

There will be a server in each of the two sites for purposes of security, audit and safety.

v. How will the servers be deployed?

Windows operating systems can be deployed by Windows Deployment Services. You can use a network-based installation to set up new computers. Thereby, the need for installing an operating system for each computer directly from the media you are using for installation drive can be avoided (Windows Deployment Services Getting Started Guide for Windows Server 2012, n.d.).

To install using Server Manager:

a. Click on manage

b. Add roles and features

c. Choose feature-based or role-based installation and pick the server you wish to deploy WDS

d. On the page titles select server roles, select Windows Deployment Services

e. Click next and follow the wizard to complete the process.

While you are on the select role service page, the wizard gives you the option to pick role services for installation in Windows Deployment Services. You have the options of choosing the deployment server or the transport server, or even not pick any of them.

2. DNS

i. DNS namespace design

ii. Windows operation is strongly affected by the resolution of names by DNS. If there is no elaborate name system, there is no way for users to locate the resources they desire from the network. The Domain Name System namespace should be designed considering Active Directory. The already existing namespace on the internet should not conflict with the internal namespace of an organization (DNS Namespace Planning, n.d.).

iii. How DNS will be handled for the second site

How to deploy multiple sites (Planning and Implementing a DNS Namespace, n.d.):

If your organization runs many operations and/or product lines, you can register several second-level domains for every name that you need (each domain will carry a fee). You must manage a distinct DNS for each domain when registering several second-level domains.

Alternatively, register a second-level domain and develop several subdomains below the registered second level domain.

3. Active Directory

i. The number of Active Domains

Two strategies are in use for IT engineers and administrators when deciding on domain names to use (Adam Brown, 2013).

a. An internal private domain name

Such a domain name could look like: company.internal or domain.local. A private domain is just that; one that is not available, publicly, on the internet.

b. You could also an External Public Domain Name

This looks like name.com or company.org. These names use TLDs that are recognized by ICANN. They can be deciphered by…

Sources Used in Documents:

References

Davide Costantini. (2015, Septemeber 9). How to configure a Distributed File System (DFS) Namespace. Retrieved from The Solving: http://thesolving.com/storage/how-to-configure-distributed-file-system-dfs-namespace/

Adam Brown. (2013, April 15). Active Directory Domain Naming in the Modern Age. Retrieved from AC Brown's IT World: https://acbrownit.com/2013/04/15/active-directory-domain-naming-in-the-modern-age/

Best Practice Active Directory Design for Managing Windows Networks. (n.d.). Retrieved from Microsoft Developer Network: https://msdn.microsoft.com/en-us/library/bb727085.aspx

Dishan Francis. (2015, March 3). Step-by-Step: Setting Up Active Directory Sites, Subnets & Site-Links. Retrieved from Microsoft Technet Blogs: https://blogs.technet.microsoft.com/canitpro/2015/03/03/step-by-step-setting-up-active-directory-sites-subnets-site-links/
DNS Namespace Planning. (n.d.). Retrieved from Microsoft Support: https://support.microsoft.com/en-in/kb/254680
Planning and Implementing a DNS Namespace. (n.d.). Retrieved from Techfaq: http://www.tech-faq.com/planning-and-implementing-a-dns-namespace.html
Serhad MAKBULOGLU. (2012, November 8). Capacity Planning for Active Directory Domain Services. Retrieved from Microsoft Technet: https://social.technet.microsoft.com/wiki/contents/articles/14355.capacity-planning-for-active-directory-domain-services.aspx
SMB: File and printer sharing ports should be open. (2011, February 2). Retrieved from Microsoft Technet: https://technet.microsoft.com/en-us/library/ff633412(v=ws.10).aspx
What Is an RODC? (2012, April 26). Retrieved from Microsoft Technet Windows Server: https://technet.microsoft.com/en-us/library/cc771030(v=ws.10).aspx
Windows Deployment Services Getting Started Guide for Windows Server 2012. (n.d.). Retrieved from Microsoft Technet: https://technet.microsoft.com/en-us/library/jj648426(v=ws.11).aspx
Working with Quotas. (2008, February 27). Retrieved from Microsoft Technet: https://technet.microsoft.com/en-us/library/cc770989(v=ws.10).aspx


Cite this Document:

"Operating System And Microsoft" (2016, September 29) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/operating-system-and-microsoft-2162025

"Operating System And Microsoft" 29 September 2016. Web.25 April. 2024. <
https://www.paperdue.com/essay/operating-system-and-microsoft-2162025>

"Operating System And Microsoft", 29 September 2016, Accessed.25 April. 2024,
https://www.paperdue.com/essay/operating-system-and-microsoft-2162025

Related Documents

operating system can be simply defined as a "program that manages a computer's resources, especially the allocation of those resources among other programs" ("operating system (OS) (computing) -- Encyclopedia Britannica"). There is no definitive answer to the question that which is the best operating system that has been produced till date. Windows and MAC OS X are two of the renowned operating systems that are used all over the

The system will also assist the company to incorporate a fleet management system that has a tracking device to assist the Jinx Transport & Logistics Company to track all its fleet of vehicles located at any location. With the new systems, customers will have platform to interact with the systems, and the system will assist them to make inquiry and track their parcels. 2. OS Processor and Core Jinx Transport &

7 billion by 2008 establishing the fact that Linux is no more a fringe player but rather a mainstream. IDC admitted that Linux is not being used just on new hardware only. As an alternative customers frequently reinstall existing servers to run Linux. While considering for such use as also the use of Linux for secondary OS, IDC forecasts for servers running Linux to remain 26% larger in 2008. Evidently,

Configuration of Microsoft Windows in more complex networking environments required an extensive amount of add-in software and programming to ensure all systems could work. Finally the levels of security inherent in the Microsoft Windows operating system continue to be problematic (Bradley, 2009). The Linux and UNIX operating systems are comparable in terms of kernel and memory architectures (MacKinnon, 1999)(Predd, Cass, 2005). There are variations in the pricing models used for

Without the consent of the user, the program will never be elevated to administrator privilege. The MIC or integrity levels is again a new security concept with Vista OS. This feature is controlled by the Access control entry (ACE) in the System Access control List (SACL) of a file, process or a registry key. By associating every process with an integrity level, the OS limits privilege escalation attacks. [Matthew

In addition the cost makes it expensive to own the hardware required to support these systems as personal computers. The university has also indicated its preference for the PC and the Windows operating system. All training and skill acquisition is also generally offered for the windows system in the college. Standardization and uniformity of the design platform of Microsoft has greatly enhanced the applicability in the workplace. Standard packages