Thursday, June 13, 2019

Data base analysis Essay Example | Topics and Well Written Essays - 2000 words

Data base analysis - Essay ExampleHowever, enabling the say of the netmask provides the most efficient results for clients orders but this does not enhance the internal clients in resolving the external addresses. Using the NS1 as a forwarder severs enhances fortunate name resolution for the internal clients. In round robin disabling, this will prohibit any further load balancing and hence will not enable the internal clients in resolving the external host names. In this scenario the user are likely to suffer from many problems which may hamper them from obtaining IP addresses, these may include the expiry of the users IP address, the incorrect DHCP configuration, facsimile IP address on the same network and lack of DHCP server authorization. As a result of the introduction of the active directory in the network, this authorizes the DHCP server and the expiry of the users IP address stimulates the generation of a new IP address (Shapiro, 2008). This also prevents a computer from a cquiring a new IP address by itself and thus prevents the DHCP missing which prevents users on network subnets to acquire new IP addresses. However, duplicate IP address prevents the user from communicating in the network but does not prevent the generation of a new IP address from the server. ... es which are connected to the main network finished a virtual private network which uses registered authentication information from the active directory in the network this prevent unauthorized entry in to the network and as well as providing cheap access in the main network. Employees of a company cease enrol into the network through the authorization given by the network administrators. This is through the registration of usernames and the generation of passwords by the active directory which gives each employee rights and limits to access the network resources. This can be used to control the access of network resources by different employees. The use of centralized backups in WAN ma kes the sharing of network resources easier and cheap, a to a greater extent improved backup includes all the possible inclusion of all subnet LANs joined together to a central database for easier access of resources, this can be done through network sub netting. References Carvalho, L. (2012). Windows server 2012 Hyper-V cookbook. Birmingham Packt Pub.. Shapiro, J. R. (2008). Windows server 2008 bible. Indianapolis, IN Wiley . Tomsho, G. (2010). MCTS guide to Microsoft Windows Server 2008 Active Directory configuration exam 70-640. Boston, MA Course Technology/Cengage

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.