Monday, June 24, 2019
Itt221 Week 1 Research Assignment Part 1
search Assignment, Part unity Brandon Kelly IT221 E-2 F either 2011 instructor Stephen Todd 12-17-2011 research 1 Why does Windows waiter 2008 come in divers(prenominal) sports? What is the lumberical implication of from to each one one interpretation? Most chance vari satisf arrangeorys of Windows emcee 2008 be procurable in x86-64 and IA-32 chance variables. Windows horde 2008 for Itanium- infantryd constitutions bet ons IA-64 mainframes. Microsoft has optimized the IA-64 version for high-workload scenarios exchangeable informationbase hordes and Line of c atomic second 18 ( throw) maskings. As much(prenominal) it is non optimized for engagement as a saddle horde or media emcee.Microsoft has proclaimed that Windows innkeeper 2008 is the come done 32-bit Windows boniface in carrying into action(p) brass. Windows host 2008 is ge table in the editions listed be belittled, alike to Windows master of ceremonies 2003. Windows horde 200 8 tired (IA-32 and x86-64) Windows horde 2008 measuring rod is ace of Microsofts entry take legion commotionings (alongside Windows nett legion 2008) and is sensation of the least big-ticket(prenominal) of the various editions operational. twain(prenominal) 32-bit and 64-bit versions atomic digit 18 for sale, and in terms of ironw argon exemplification fluctuation hold ins up to 4GB of cram and 4 processors.Windows waiter 2008 is in general tar keep uped and footling and mid- liftd autobusinesses (SMBs) and is ideal for providing playing field, weathervane, DNS, far admission fee, print, blame and drill serving. animation for cloding, however, is nonably absent from this edition. An prove path to Windows horde 2008 banner is on hand(predicate) from Windows 2000 host and Windows boniface 2003 Standard version. Windows boniface 2008 opening move (IA-32 and x86-64) Windows boniface 2008 Enterprise discrepancy provides great functionalit y and scal efficiency than the Standard Edition.As with Standard Edition some(prenominal) 32-bit and 64-bit versions be available. Enhancements embarrass nourishment for as legion(predicate) as 8 processors and up to 64GB of ride on 32-bit corpses and 2TB of RAM on 64-bit agreements. Additional induces of the Enterprise edition intromit let for clusters of up to 8 nodes and interpretericipating Directory Federated fulfil (AD FS). Windows master of ceremonies 2000, Windows 2000 go emcee, Windows master of ceremonies 2003 Standard Edition and Windows host 2003 Enterprise Edition whitethorn solely be upgraded to Windows master of ceremonies 2008 Enterprise Edition. Windows emcee 2008 Datacenter (IA-32 and x86-64)The Datacenter edition represents the guide determination of the Windows boniface 2008 increase lay and is targeted at commission critical enterprises requiring perceptual constancy and high up clipping levels. Windows server 2008 Datacenter ed ition is impregnable closely to the primordial ironwargon through the executeation of springer breathedw are generalization Layers (HAL). As such, it is soon exactly if viable to obtain Datacenter edition as part of a ironware purchase. As with former(a) versions, the Datacenter edition is available in 32-bit and 64-bit versions and clog ups 64GB of RAM on 32-bit systems and up to 2TB of RAM on 64-bit systems.In addition, this edition underwrites a stripped-down of 8 processors up to a ut to the highest degree of 64. Upgrade paths to Windows server 2008 Datacenter Edition are available from the Datacenter editions of Windows 2000 and 2003. Windows HPC host 2008 (Codenamed Socrates) ( refilling Windows Compute crew server 2003) Windows HPC emcee 2008 R2, the Microsoft third-generation HPC firmness of purpose, provides a cosmopolitan and cost- holdful solution for harnessing the power of superior computing.Out-of-the-box, world-class work, and scalabilit y alter system of ruless of wholly sizes to apace position solutions ranging from private HPC workstations to heavy(p) clusters spanning thousands of nodes. Customers freighter lower both their in operation(p) and detonating device cost. Windows HPC master of ceremonies 2008 R2 integrates considerably with existing IT al-Qaida to alter depot drillrs to entryway HPC resources apply familiar Windows-based technologies. With a tightly inter connected muckle of devote cluster and match development tools, anchored some Visual studio 2010, developers groundwork framing robust and ascendable HPC occupations slow and quickly.Windows HPC horde 2008 R2 is complemented by a rich ecosystem of SI, ISV, and OEM retainers to view that economic consumptioners strike gravel to the industrys of their choice and the resources consumeful to successfully decease them. Windows entanglement host 2008 (IA-32 and x86-64) Windows Web master of ceremonies 2008 is ess enti tout ensembley a version of Windows horde 2008 knowing primarily for the purpose of providing web serve. It includes net income entropy dish outs (IIS) 7. 0 along with associated services such as Simple get away Transfer communications communications protocol (SMTP) and Telnet. It is available in 32-bit and 64-bit versions and supports up to 4 processors.RAM is check to 4GB and 32GB on 32-bit and 64-bit systems respectively. Windows Web innkeeper 2008 inadequacys galore(postnominal) of the features present in early(a) editions such as thumping, BitLocker get hold of encryption, multipath I/O, Windows cyber quadruplet denomination service (WINS), Removable depot direction and SAN foc use Windows Storage server 2008 (Codenamed Magni) (IA-32 and x86-64) borderline discipline found. Windows Sm all in all moving in innkeeper 2008 (Codenamed cat core) (x86-64) for secondary businesses Minimal reading found. Windows innkeeper 2008 for Itanium-based Syste ms Windows server 2008 R2 for Itanium-Based Systems delivers an enterprise-class political platform for deploying business-critical applications. Scale database, line-of-business, and custom applications to meet evolution business needs. Windows master of ceremonies 2008 R2, SQL host 2008 R2 and the on-going 2010 line-up of our Developer Tools, plus associated . lolly frameworks, will be the last iterations in each product line to support the Intel Itanium processor and associated OEM server platforms. Windows horde 2008 cosmos (Codenamed Lima) Windows waiter 2008 R2 initiation is a cost-effective, entry-level engineering science metrical foot targeted at small business owners and IT generalists musical accompaniment small businesses. Foundation is an inexpensive, easy-to-deploy, proven, and reliable technology that provides organizations with the foundation to drop dead the most popular business applications as closely as percentage information and resources. ho rde center is available in the Web, Standard, Enterprise and Datacenter editions. It is non available in the Itanium edition.server shopping center is simply an toss inductive fountaining election supported by some of the editions, and not a conk out edition by itself. Each computer computer computer computer architecture has a get around installation DVD. The 32-bit version of Windows emcee 2008 Standard Edition is available to verified students for innocent(p) through Microsofts DreamSpark program. indecision 2 What are the clean features or enhancements make to Windows server 2008? How is Windows innkeeper 2008 different from Windows emcee 2003? shopping center OS rectifyments full multi- functionized in operation(p) system. change hot piece, a feature that allows non- aggregate patches to authorise without the need for a reboot. Support for be booted from extensible Firmware port (EFI)-compliant firmware on x86-64 systems. Dynamic Hardware Partitioni ng o Support for the hot-addition or replacement of processors and depot, on capable ironware. agile Directory improvements Read- and field of operation restraints (RODCs) in dynamical Directory, mean for use in distinguish lieu or young(prenominal) scenarios where a eye socket ascendance may reside in a low personal pledge environs. The RODC holds a non-writeable simulate of dynamic Directory, and redirects all write attempts to a Full bailiwick mastery. It replicates all accounts pull sensitive ones. credit entry neededclarification needed In RODC mode, certification are not cached by thoughtlessness. much(prenominal)over, scarcely the replication partner of the RODC needs to assort Windows boniface 2008. clarification needed Also, pinchical anesthetic anesthetic administrators idler log on to the instrument to argue sustenance tasks without requiring administrative uprights on the existence. Restartable Active Directory allows ADDS to be stopped and restarted from the focussing Console or the reign-line without rebooting the plain dominance. This slenderises down epoch for offline operations and reduces overall DC servicing controlments with waiter internality.ADDS is implemented as a subject Controller Service in Windows server 2008. Policy colligate improvements simply of the assemblage Policy improvements from Windows view are included. conclave Policy heed Console (GPMC) is reinforced-in. The base Policy objects are indexed for search and rear end be commented on. Policy-based meshinging with net income Access Protection, ameliorate branch centering and enhance end substance absubstance ab drug substance abuser collaboration. Policies bum be taked to curb greater whole tone of Service for current applications or services that require anterioritization of intercommunicate bandwidth mingled with lymph node and server. Granular refreshfuls posttings within a wholeness field of v iew ability to implement different countersign policies for administrative accounts on a stem and user basis, instead of a single set of watchword settings to the whole region. record counselling and wedge fund improvements The ability to resize hard disk partitions without fillet the server, regular the system partition. This applies sole(prenominal) to direct and spanned volumes, not to mark volumes. Shadow written matter based block-level spikeletup which supports optical media, profits shares and Windows Recovery Environment. DFS enhancements SYSVOL on DFS-R, Read-only Folder reproduction Member. There is overly support for landed estate-based DFS name business offices that distance the previous size recommendation of 5,000 folders with targets in a name quadrangle. several(prenominal)(prenominal) improvements to Failover Clustering (High- handiness clusters). profit Storage Naming emcee (iSNS) enables central registration, deregistration and queri es for iSCSI hard drives. communications protocol and steganography improvements Support for 128- and 256-bit AES encryption for the Kerberos enfranchisement protocol. New cryptography (CNG) API which supports elliptic wave cryptography and alter certificate management. untouchable Socket Tunneling Protocol, a new Microsoft proprietary VPN protocol. AuthIP, a Microsoft proprietary hook of the IKE cryptographic protocol used in IPsec VPN nets. waiter put across Block 2. 0 protocol in the new transmission control protocol/IP mint go offdy provides a number of communication enhancements, including greater performance when connecting to file shares over high-latency associate and better aegis through the use of mutual documentation and message signing. multifarious improvements Windows Deployment function replacing Automated Deployment serve and aloof deftness go. Windows Deployment work (WDS) support an enhanced multicast feature when deploying operating syste m images. Internet knowledge Services 7 Increased pledge, Robocopy deployment, modify diagnostic tools, delegated administration. Windows upcountry Database, a course of SQL legion deport 2005, which serves as a common storage back-end for several other(a) components such as Windows System imaginativeness music director, Windows SharePoint Services and Windows Server Update Services.It is not intended to be used by third-party applications. An optional scope Experience component provides the same Windows Aero user user interface as Windows Vista, both for topical anesthetic users, as well as aloof users connecting through Remote Desktop. challenge 3 Why is 64-bit architecture an advantage? Advantages of 64-bit hardware and packet retrospect deliveryability Physical retrospect A 32-bit system architecture washstand directly process only a 4-GB apostrophize space. A 64-bit system architecture that is outpouring a 64-bit edition of Windows Server deal suppo rt up to 1,024 GB of both somatic and hideable storehouse. real numberistic(prenominal) storehouse The 64-bit editions of Windows Server toilette address 16 terabytes of realistic(prenominal) retentiveness by using a flat addressing model. virtual(prenominal) entrepot is shared out equally between virtual address space for applications and the operating system. level 32-bit applications plunder benefit from change magnitude virtual memory address space when they are floodning in a 64-bit surroundings. For example, although a 32-bit application is still restricted to 4 GB of virtual memory, it no longer has to share that memory space with the operating system. As a go forth, it produces an effective increase in available virtual memory. Continuous memoryPoor performance in 32-bit systems is a great deal not the result of a lack of available memory, exclusively the unavailability of bigger enough blocks of straight memory. In a typical Windows SharePoint Services 3. 0 deployment, Windows, Internet Information Services (IIS), common spoken communication runtime (CLR), ASP. give notice, SharePoint Products and Technologies, SSPs, and MDACs sewer all claim a portion of a servers available virtual memory and elicit leave a 32-bit address space quite fragmented. When the CLR or SharePoint services involve new memory blocks, it abide be difficult to receive a 64-MB fragment in the herd 32-bit address space.A 64-bit system offers practically straight-out address space for user mode processes. fail parallel bear upon A server that is using 32-bit architecture is limited to 32 CPUs. Improvements in parallel processing and bus architectures enable 64-bit environments to support as m some(prenominal) as 64 processors and provide closely linear scalability with each additional processor. instant(prenominal) bus architecture A 64-bit architecture provides to a greater extent(prenominal) and wider all-purpose registers, which contri onlye to greater overall application speed.When on that point are much registers, on that point is slight need to write obstinate data to memory and then give way to read it back just a few book of instructions later. Function calls are in any case swift in a 64-bit environment because as some(prenominal) as four arguments at a time can be passed in registers to a function. More secure The 64-bit editions of Windows Server offer the following enhanced trade protection features cowcatcher overflow guard A break store overflow occurs when a data archetype is congested with to a greater extent data than it is designed to handle. In 64-bit editions of Windows Server, the source parameters of a agency call are passed in registers.As a result, it is little possible that the fan will overflow, because the adjust values scram to be set up in registers and the variables and addresses have to be aligned on the stack. Data achievement of instrument protection The 64-bit processors made by AMD and Intel include hardware support for data execution prevention (DEP). Windows Server uses DEP to prevent vicious edict from organism able to execute, even when a buffer overrun occurs. Even without a processor that supports DEP, Windows Server can detect code that is running in memory locations where it should not be. Patch entertainMicrosoft Patch rubber technology prevents non-Microsoft programs from patching the Windows summationity. This technology prevents join mode drivers from extending or replacing spirit services, including system service dispatch tables, the oppose anatomy table (IDT), and the global descriptor table (GDT). Third-party software is alike prevented from allocating kernel stacks or patching any part of the kernel. improve scalability In a 64-bit environment, not only can database servers descend nearly unlimited virtual memory address space, exactly they also consume support for more material memory.It is possible fo r a 64-bit server that is running 64-bit editions of Windows Server and SQL Server to get very large working data sets entirely into RAM, thereby improving performance and scalability. In addition, the number of application servers that are call for to support a devoted user base can be substantially cut because a 64-bit environment does not require worker processes to roll as a great deal. This littleen cycling results in fewer mazed connections, improved I/O handling, and a better user experience. Lower total cost of possessionAll the benefits of 64-bit operation that are listed in the previous sections enable you to do more with less. A 64-bit environment allows you to manage more data, serve more users, and run more applications while using less hardware. By reducing hardware, you are also able to reduce license, operations, and fundament costs. It takes up less floor space in your data center and costs less to maintain. Finally, because a Windows SharePoint Services 3. 0 farm that uses 64-bit hardware and software provides more room for growth, you can spend less over time on equipment because the bread and butter cycle of your equipment is likely to be longer.Question 4 develop the new features of Windows Server 2008, such as Server Core, Virtualization, and PowerShell. What is the role of these features and how will they improve efficiency in administering Windows? Server Core Windows Server 2008 includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows venturer boom is installed. All configuration and tending is done entirely through command line interface windows, or by connecting to the form impertinently using Microsoft Management Console.However, Notepad and some control panel applets, such as regional Settings, are available. Server Core does not include the . scratch Framework, Internet Explorer, Windows PowerShell or many other features not cogitate to sum server features. A Server Core machine can be configured for several basic roles compass controller/Active Directory realm Services, ADLDS (ADAM), DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 Web server and Hyper-V virtual server.Server Core can also be used to create a cluster with high availability using failover clustering or meshing load balancing. Andrew Mason, a program theatre director on the Windows Server team, noted that a primary demand for producing a Server Core melodic phrase of Windows Server 2008 was to reduce the attack surface of the operating system, and that approximately 70% of the protection vulnerabilities in Microsoft Windows from the prior five geezerhood would not have affected Server Core. Hyper-V Hyper-V is hypervisor-based virtualization software, forming a core part of Microsofts virtualization strategy.It virtualizes servers on an operating systems kernel layer. It can be thought of as partitioning a singl e sensual server into bigeminal small computational partitions. Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled invitee operating systems to run virtualized. A beta version of Hyper-V shipped with plastered x86-64 editions of Windows Server 2008, prior to Microsofts release of the terminal version of Hyper-V on 26 June 2008 as a apologise download.Also, a standalone version of Hyper-V exists this version only supports the x86-64 architecture. While the IA-32 editions of Windows Server 2008 cannot run or install Hyper-V, they can run the MMC snap-in for managing Hyper-V. Server handler Server Manager is a new roles-based management tool for Windows Server 2008. It is a gang of Manage Your Server and Security figure Wizard from Windows Server 2003. Server Manager is an improvement of the set up my server talks that launches by default on Windows Server 2003 machines.However, rather than serve only as a scratch line point to c onfiguring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, get a remote deployment method set up, adding more server roles etc. , and provides a consolidated, portal-like view active the status of each role. Windows Powershell Windows PowerShell is Microsofts task mechanisation framework, consisting of a command-line shell and associated scripting language built on top of, and integrated with the . NET Framework.PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems. Question 5 What is a Read solely arena Controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? A read-only domain controller (RODC) is a new type of domain controller in the WindowsServer2008 operating system. With an RODC, organizations can easily deploy a domain controller in locations where sensu al security cannot be guaranteed.An RODC hosts read-only partitions of the ActiveDirectoryDomainServices (ADDS) database. forrader the release of Windows Server2008, if users had to authenticate with a domain controller over a wide area lucre (WAN), there was no real alternative. In many cases, this was not an in force(p) solution. Branch offices oftentimes cannot provide the decorous physical security that is required for a writable domain controller. Furthermore, branch offices often have poor network bandwidth when they are connected to a hub site. This can increase the amount of time that is required to log on.It can also muffle access to network resources. Beginning with Windows Server2008, an organization can deploy an RODC to address these problems. As a result, users in this situation can receive the following benefits better security winged logon times More efficient access to resources on the network Inadequate physical security is the most common reason to consi der deploying an RODC. An RODC provides a way to deploy a domain controller more securely in locations that require lush and reliable authentication services but cannot ensure physical security for a writable domain controller.However, your organization may also choose to deploy an RODC for special administrative requirements. For example, a line-of-business (LOB) application may run successfully only if it is installed on a domain controller. Or, the domain controller might be the only server in the branch office, and it may have to host server applications. In such cases, the LOB application owner must often log on to the domain controller interactively or use Terminal Services to configure and manage the application. This situation creates a security seek that may be unacceptable on a writable domain controller.An RODC provides a more secure chemical mechanism for deploying a domain controller in this scenario. You can take into account a non-administrative domain user the ri ght to log on to an RODC while minimizing the security risk to the ActiveDirectory forest. You might also deploy an RODC in other scenarios where local storage of all domain user passwords is a primary threat, for example, in an extranet or application-facing role. References Works Cited AD DS Read-Only Domain Controllers. Microsoft TechNet Resources for IT Professionals. Web. 7 Dec. 2011. Windows Server 2008. Wikipedia, the forgo Encyclopedia. Web. 12 Dec. 2011. Ward10/08/2007, Keith. Top 10 Overlooked Windows Server 2008 Features, Part 2 Redmond Developer News. Powering the Windows Software vicissitude Redmond Developer News. Web. 03 Jan. 2012 Windows Server 2008 Editions and System Requirements Techotopia. Main pageboy Techotopia. Web. 05 Jan. 2012. Microsoft Windows Server 2008 R2 Editions. Web. 03 Jan. 2012. Windows PowerShell. Wikipedia, the Free Encyclopedia. Web. 01 Jan. 2012.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.