Saturday, October 5, 2019

Data base analysis Essay Example | Topics and Well Written Essays - 2000 words

Data base analysis - Essay Example However, enabling the ordering of the netmask provides the most efficient results for client’s orders but this does not enhance the internal clients in resolving the external addresses. Using the NS1 as a forwarder severs enhances successful name resolution for the internal clients. In round robin disabling, this will prohibit any further load balancing and hence will not enable the internal clients in resolving the external host names. In this scenario the user are likely to suffer from many problems which may prevent them from obtaining IP addresses, these may include the expiry of the users IP address, the incorrect DHCP configuration, duplicate IP address on the same network and lack of DHCP server authorization. As a result of the introduction of the active directory in the network, this authorizes the DHCP server and the expiry of the users IP address stimulates the generation of a new IP address (Shapiro, 2008). This also prevents a computer from acquiring a new IP addr ess by itself and thus prevents the DHCP missing which prevents users on network subnets to acquire new IP addresses. However, duplicate IP address prevents the user from communicating in the network but does not prevent the generation of a new IP address from the server. ... es which are connected to the main network through a virtual private network which uses registered authentication information from the active directory in the network this prevent unauthorized entry in to the network and as well as providing cheap access in the main network. Employees of a company can enter into the network through the authorization given by the network administrators. This is through the registration of usernames and the generation of passwords by the active directory which gives each employee rights and limits to access the network resources. This can be used to control the access of network resources by different employees. The use of centralized backups in WAN makes the sharing of network resources easier and cheap, a more improved backup includes all the possible inclusion of all subnet LANs joined together to a central database for easier access of resources, this can be done through network sub netting. References Carvalho, L. (2012). Windows server 2012 Hyper -V cookbook. Birmingham: Packt Pub.. Shapiro, J. R. (2008). Windows server 2008 bible. Indianapolis, IN: Wiley ;. Tomsho, G. (2010). MCTS guide to Microsoft Windows Server 2008 Active Directory configuration: exam 70-640. Boston, MA: Course Technology/Cengage

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.