Free Essay

Replication Management

In:

Submitted By yulc
Words 804
Pages 4
LAB 4 WORKSHEET
WORKING WITH ACTIVE DIRECTORY SITES

This lab contains the following exercises:
Exercise 4.1 Replication Management
Exercise 4.2 Preparing Your Infrastructure
Exercise 4.3 Configuring a Site
Exercise 4.4 Configuring a New Subnet
Exercise 4.5 Moving Computers and Creating Site Links
Post-Lab Cleanup

Estimated lab time: 100 minutes

Exercise 4.1 Replication Management
Overview
Now that you have added a new domain controller to the Domain99.Local domain, you want to ensure replication is occurring properly. You have reviewed the replication error messages in the Event Viewer Directory Service log and identified some errors that you are anxious to resolve. First, you plan to force replication. Then, you plan to create a manual connection object. Finally, you will use repadmin to troubleshoot any further problems.
Completion time 60 minutes

 PART A: Forcing Replication

Question 1 What is the name of the site that was created by default when you installed the Active Directory Domain Services role?Default –first-site-name

Question 2 What servers are listed within this folder?
Server2

Question 3 What connection objects are configured in this folder?
Automatically generated from Server2

 PART B: Managing Connection Objects

Question 4 Forcing replication on the new connection object was described in the previous section. How can you tell which connections are the automatically generated connections and which ones have been created manually?Under the NTDS settings you can see the partner computer Server02

 PART C: Identifying the Global Catalog

Question 5 What does it mean when the Global Catalog checkbox is selected?Makes the directory structure within a forest transparent to users who perform a search

 PART D: Using repadmin

Question 6 Who are your inbound neighbors?Server02

Question 7 How many connections were found?2 connections

Exercise 4.2 Preparing Your Infrastructure
Overview
You want to configure your existing network to support a new site so that you can run some tests to see how a custom application will perform. However, you are unable to locate a router or additional network cards. You decide that you can create a logical Internet Protocol (IP) network inside your physical local area network (LAN) for your tests. You need to prepare two servers for this test.
Completion time 5 minutes
• PART A: Preparing the Server## Computer for Site-Configuration Testing
Step 7 Use 172.16.1##.1##
No screen shots or questions for this part.
• PART B: Preparing the Server##A Computer for Site-Configuration Testing
Step 7 Use 172.16.2##.2##
No screen shots or questions for this part.
Exercise 4.3 Configuring a Site
Overview
You decide to create the Main and Branch sites. Furthermore, you want to rename the Default-First-Site-Name to HQ.
Completion time 5 minutes
• PART A: Creating a Site for the Server## Computer
No screen shots or questions for this part.
• PART B: Creating a Site for the Server##A Computer and Renaming the Default-First-Site-Name Site
No screen shots or questions for this part.
Exercise 4.4 Configuring a New Subnet
Overview
To simulate inter-site Active Directory replication, you decide to create two new subnets for use in the two sites that you created in Exercise 4.3.
Completion time 5 minutes
• PART A: Create a Subnet Object for the Server## Computer
Step 3 Use 172.16.1##.0/24
No screen shots or questions for this part.
• PART B: Create a Subnet Object for the Server##A Computer
Step 3 Use 172.16.2##.0/24
Add step 4. Click the + by Subnets on the Active Directory Sites and Services screen to show the new subnets. Press Ctrl+Prt Scr to take a screen shot, and then press Ctrl+V to paste the resulting image into this file after this line.

Exercise 4.5 Moving Computers and Creating Site Links
Overview
Now that you have created site and subnet objects, you want to move your computer accounts into their respective sites and configure site links between the sites.
Completion time 15 minutes
• PART A: Moving the Server## and Server##A Computers to the Appropriate Site
Add to step 9. Press Ctrl+Prt Scr to take a screen shot, and then press Ctrl+V to paste the resulting image into this file after this line. Be sure all server boxes are expanded.
• PART B: Creating a Site Link Object from the Server##A Computer
No screen shots or questions for this part.
• PART C: Creating a Site Link from the Server## Computer
No screen shots or questions for this part.
• PART D: Verifying Replications
Add to step 2. Press Ctrl+Prt Scr to take a screen shot showing success, and then press Ctrl+V to paste the resulting image into this file after this line.

It is CRITICAL the cleanup for this lab is completed !!

Similar Documents

Free Essay

Delegate Replication Rights to Non-Admins

...Task 1 of 2 Create a Universal Group called Replication Management Admins in an OU you’ve chosen to hold groups for delegated access or other security related task. Open ADSI Edit and connect to the Configuration Naming Context as seen in the image below. Once you've selected Configuration in "Select a well known Naming Context", click OK Expand the Configuration Naming context and right click the Naming Context node below it. See the picture below for the arrow indicating where you should right-click. Next Click Properties Click the Security Tab Click the Advanced button Click Add Enter the name of the Universal Group you created in Step 1 and click OK In the Permission Entry for Configuration box scroll to the bottom and tic the Allow box for the Replication Synchronization permission. Ensure that "This object and all child objects" is selected for the Apply to and click OK Click Apply, then OK, and then click OK once more and you should be back to ADSI Edit with no open dialog boxes. Task 2 of 2 After you’ve completed steps 1-10 in Task 1 you'll need to view all the replicated partitions and do the same process for each partition. Click on CN=Partitions under CN=Configuration, DC= to view the partitions in the Configuration naming context. On each partition right click each object and select New Connection to Naming Context. Note: You don't have to do this for...

Words: 354 - Pages: 2

Premium Essay

Business Research

...Business Research Part 3 RES/351 August 16th, 2012 Business Research Part Three It is easy to create a product, but it is better to make one people want. Any product wanting to survive in an open market economy must know how consumers will respond. Many factors, grand or miniscule, can determine the fate in the consumer’s eye. Companies must first determine the target market, go to that market, and get feedback. Although this sounds easy and direct, seen and unseen obstacles can hinder the process. New products are bound to experience these pitfalls in some point of the development process. In some rare cases, it is easy as eating an ice cream bar. Sampling Method and Sampling Frame B’s Ice Cream Energy Bar will determine how people feel about the new product and if there is enough interest to place the ice cream bar on the market. It is determined that the best sampling method for this study is probability sampling. This type of sampling is based on the theory of random selection. Controlled probability sampling gives each population element an equal chance of selection. It also provides estimates of precision, which is critical for decision-making when investing millions of dollars. This type of sampling is cost-effective and is done over a short period. Probability sampling will also reduce the possibility of researcher bias (McIntosh, 2006). The sample frame will consist of health conscious people who like to eat ice cream. This means the distribution of samples...

Words: 775 - Pages: 4

Free Essay

Random

...You work in the Justice Department in one of the twenty counties in the state of Texkansahomatucky. Recently, the state Justice Department published a short report releasing crime statistics that included a crime map, and your county was flagged as a high crime county. Because the District Attorney in the county is up for re-election this year, he is concerned that this report will significantly hurt his election chances. He has asked you to both verify that the methodology used in the official report indeed indicates that your county is in fact a high crime county and to write a short report proposing a "better" methodology, where you are to interpret "better" to mean a methodology that takes your county off the list of high crime counties! Instructions Attached you will is the name of the county (Jay County) whose Justice Department you work for and a copy of the short report. This report, as you may have guessed by now, is the report one of the other groups in the class submitted for part one of this assignment. Your first task is to attempt to replicate the results of the report you are given based only on the information contained within the report. As you recall, the report should include both "a verbal description of the metric used including at least your method of calculation and the high crime/low crime threshhold" and the raw data used to create the metric. If the report you have in front of you did this, you should have no problem recreating...

Words: 736 - Pages: 3

Free Essay

Linux Unit 5

...means. It means that basically when you store a file it will be stored in a predetermined place on a server instead of on the system. Now let us analyze what file replication is. File replication would be the server backing up by replicating to another server. Both of these are extremely helpful services provided by servers. How are these beneficial services increasing the ease of administration? Well, all of the different users will be storing their work to the server. That means they can login and access their files from any workstation on the local network. So I have come up with some examples showing different scenarios where this would be helpful. Example 1: As a student, if all of your files were being stored on a server you could login from any computer and access your files allowing for great mobility. Example 2: This one isn’t about a local network but I felt it was a great example anyway. When your access your e-mails they are stored on a server. Allowing you to login from anywhere and access the mail. Also, you can send yourself attachments so that you can access them at any time from any place. Example 3: Say you work in a lab and you want to do an experiment. You could search the server to find helpful information from other people’s work that is being shared. All of these examples benefit from replication as well. These servers replicating which would be backing up to the other servers would help make sure that your work would not be lost. Even if the server that...

Words: 492 - Pages: 2

Premium Essay

Hi Ho

...1. What is replication, and what role does it play in increasing the external validity or generalizability of a study? In what way is the IRB involved in using participants in a research study? • Replication has been stressed as a way of overcoming any problems of generalization that occur in a single study. • Exact replications: an attempt to replicate precisely the procedures of a study to see whether the same results are obtained. • Conceptual Replication: A replication that investigates the relationship between the same conceptual variables that were studied in previous research but tests the hypothesis using different operational definitions of the independent variable and/or the dependent variable. • Replication is used to identify the generalizability to a diversity of different groups. It helps to determine reliability and validity. The IRB is involved in using participants in a research study by protecting the privileges, rights, and wellbeing of individuals. 2. What are the advantages and disadvantages of using college students as participants in research studies? • Advantages of using college students is they are able to assist in expanding the research on social psychology and experimental psychology. • Disadvantages of using college students are having a limited population. The groups may be small or young. 3. What potential problems can arise from generalization of results to different cultures or ethnic groups? • Generalization can cause complications...

Words: 306 - Pages: 2

Premium Essay

Gender Stereotypes In Nursing

... Looking at the sample size and population, the researchers used a large sampling size from males in nursing. To obtain the responses needed, researchers used surveys to get an understanding of when, where, and type of discrimination those males were exposed to. With the study setting, it focused on males who were in nursing school along with males who are currently working as nurses in the medical field. Regarding the sampling method, the researchers used a non-probable sampling, this is due to the number of male nurses and students in society today. The population size for this study is not large enough to use a probability sample. I believe the researchers used an inter-rater reliability tool as well as sampling validity as a measuring tool in their study. With inter-rater reliability “... [it measures the] reliability used to assess the degree to which different judges or raters agree in their decisions” (Phelan & Wren, n.d.). Since the males were given the ability to choose their responses, the researchers could assess their decisions and determine the percentage of how many answered with a specific choice. As for sampling validity “… [it] ensures that the measure covers the broad range of areas within the concept under study” (Phelan & Wren, n.d.). By covering both the males in nursing school and who work in the hospital, the researchers can determine if there is a correlation with discrimination in school and work. Data Analysis In conducting the study over discrimination...

Words: 711 - Pages: 3

Free Essay

Site to Site

...Site Connectivity Scenario With the two site taking long to replicate or not replicating at all I would first check the time that is set to replicate and if there is even a connection at all. Open the console and service site link and note how long this configuration is set for replication. Then I would try and duplication the problem. Create a new object in the Active Directory and replicate. Compare the time it took to the time set on the configuration. There are many other ways you could troubleshoot this issue. Open command prompt and run repadmin /?. This will show you many helpful commands you can run to troubleshoot this issue. In repadmin /showrepl command helps you understand the replication topology and replication failures. It reports status for each source domain controller from which the destination has an inbound connection object. The status report is categorized by directory partition. Use the /repsto parameter to display outbound partners. The /replicate command tests replication success after you remove suspected fault conditions without waiting for the replication schedule to open /replsummary will Identifies domain controllers that are failing inbound replication or outbound replication, and summarizes the results in a report. Like I noted before there are many options to troubleshoot this another tool I would like to leave you with is a command line tool DCDiag. This will analyze the state of one or all domain controllers in the forest and reports any problems...

Words: 300 - Pages: 2

Premium Essay

Audit Sampling

...Summary Audit sampling is necessary and helps improve an audit engagement because examining all items are rather very timely, requires more effort, and of course, at higher cost. Audit risks such as inherent, control and detection risk are first assessed when doing audit sampling. Low control risk means auditors rely extensively on the entity's internal control, and vice versa. The process for determining risks and gathering evidences to provide reasonable assurance are done through other audit procedures such as tests of controls and tests of details. These procedures are done by sampling. Using sampling, when auditors do not obtain sufficient and appropriate evidences, there is a risk of not identifying material errors and therefore result in a wrong conclusion. The use of either non-statistical sampling techniques or statistical ones does not directly affect application of audit procedures, appropriateness of audit evidences or courses of actions that could be taken. Even though the procedures in non-statistical sampling is less formal, they are still rigorous. Non-statistical sampling method involves eight steps namely establish objective test, defining the population, determining distortions, determining the appropriate sample size, determination of the right method for the sample selection, proper testing of the selected sample, extrapolating results, risk assessment. Firms include in their policies the techniques which they use to implement auditing procedures....

Words: 1449 - Pages: 6

Free Essay

Satistics

...The Justice Department in one of the twenty counties in the state of Texkansahomatucky. Recently, the state Justice Department published a short report releasing crime statistics that included a crime map and your county was flagged as a high crime county. Because the District Attorney in the county is up for re-election this year, he is concerned that this report will significantly hurt his election chances. He has asked you to both verify that the methodology used in the official report indeed indicates that your county is in fact a high crime county and to write a short report proposing a "better" methodology, where you are to interpret "better" to mean a methodology that takes your county off the list of high crime counties! Instructions Your first task is to attempt to replicate the results of the report you are given based only on the information contained within the report. As you recall, the report should include both "a verbal description of the metric used including at least your method of calculation and the high crime/low crime threshold" and the raw data used to create the metric. If the attached report you have in front of you did this, you should have no problem recreating the results (you will need to cut/paste the data from the appendix of the report given to you into excel). Should you be unable to replicate the results, if I determine that this was because the original report was not written well enough to be replicable then it will not affect your grade...

Words: 614 - Pages: 3

Free Essay

Backup and Recovery Problem Statement

...for backup and recovery software are overwhelming. There are so many out there it seems difficult to center on a few that might be considered the best on the market. Some seem more geared to home backup and recovery while others seem better constructed for company use. Some are very costly, whereas, many can be downloaded as freeware. Depending on the user there is definitely software out there to meet their needs but it seems difficult for one to narrow down the abundance of options to choose one that will give them peace of mind. There is much to be said about the terminology of backup and recovery products. Terms such as storage, security and auto-backup are pretty self-explanatory. However, with terminology such as Asynchronous Replication and Deduplication, which both copy and store information in a unique way, a user could easily be lost in translation. After some research it is learned that a product such as “MyPc Backup” offers unlimited storage as well as support for less than ten dollars. It’s pretty straight forward without many frills but probably an excellent choice for home backup and recovery. On the other hand, companies with highly secure and crucial files may go with something like EMC’s Avamar. This product has all the bells and whistles one would expect from a top notch product including their deduplication storage solutions. Avamar seems to be pretty amazing software but depending on the plan purchased this product will cost anywhere from ten to twenty-five...

Words: 297 - Pages: 2

Premium Essay

Sample Design

...3.1 Research Design 3.2 Sample Design 3.2.1 Target population It would be costly and timely for us to target the whole marketing industry hence we decided to target on specific segment group of UTAR undergraduate students in Sungai Long, Selangor. We study the behavioral respond view of UTAR undergraduate’s students on their perceived on quality, value and satisfaction toward the intention to recommend products or services. According by the Department of the Faculty General Office (FGO), there are estimated 2500 students, thus the recommended sample size is 250 students. With the 95% confidence level and +/-5% margin of error, 264 sets of questionnaire has been distributed to our respondents due to the possibilities of the occurrence of unused data. 3.2.2 Sampling Frame and Sampling Location In our research, we decide to distribute a total of questionnaires which we have prepared early to UTAR undergraduate students in Sungai Long, Selangor. The purpose of the different location chosen is because we want to acquire more precise results. 3.2.3 Sampling Technique Sampling method is a method for investigating a whole population and it includes of probability and non-probability samples. Probability samples are selected to be representative of the population. Then, non-probability is a sampling technique in which units of the sample are selected on the basis of personal judgment or convenience. There are four types of probability sampling techniques; one of them is systematic...

Words: 409 - Pages: 2

Free Essay

Distributed System Failures

...Distributed System Failures There are four types of failures that may be encountered when using and operating within a distributed system. Hardware failures occur when a single component within the system fails. Network failures refer to the failure of links within the distributed system network. Application failure occur to the failure of applications that run within the system, and can occur when the application stops working or operates incorrectly. Failure of synchronization occurs when different points in the system do not synchronize correctly. Both hardware and application failures may also occur within a centralized system as well as distributed systems. In the event of an application failure, it is important to first be able to differentiate between operator error and software error in order to determine the point of failure. When a hardware error occurs, this can be due to a few simple causes. Hardware failures occur when a single component within the system fails. The most common types of hardware failures are of a link, a site, or the loss of a message. At one point hardware failures were a common occurrence, but with recent innovations in hardware design and manufacturing these failures tend to be few and far between. Instead, more failures that now occur tend to be network or drive related. Network failures refer to the failure of links within the distributed system network. Processors within a distributed system need to be able to communicate with...

Words: 726 - Pages: 3

Premium Essay

Black Board Research Assignment

...Identify the inclusion and exclusion sample criteria study In the study of Sleep Quality and Risk for Sleep Apnea in Incarcerated Women, the inclusion criteria for the study were volunteered English speaking incarcerated women in the general population section of the prison. (Harner & Budescu, 2014) The exclusion criteria for the study excluded non English speaking inmates, inmates not housed in the general population, and those who did not wish to participate in the study. Indicate the method used to obtain the sample. The study sample was obtained by using a cross sectional design via a questionnaire completion from the volunteered inmates .(Harner & Budescu, 2014) The sample method utilized is the convenience sampling , which is a study of the inmates who are women and incarcerated. These two criteria were the main focus of the study and the reason why the convenience sampling method was used. According to (Grove et al., 2013) Convenience sampling is used when the subjects are in the right place at the right time. The study did not appear to be costly and the inmates were not compensated for their time. Grove further states that convenience sampling is not expensive and does not acquire a lot of time as other sample methods. (Grove et al., 2013) State the sample size. Was power analysis done to determine sample size? If not specified, how is a power analysis done? Power analysis was not completed to determine the sample size of 439 and it was not...

Words: 643 - Pages: 3

Free Essay

Ad Design Replication Scenario

...AD Design Replication Scenario Since the two new branch offices will be directly connected to main office you can configure hub and spoke topology and configure the replication schedule as per requirement. I would also recommend in hub site to have minimum two DC for redundancy. In the event of failure if second DC does not exist irrespective of OS version AD replication will be down totally. At least in the hub site you should have additional DC if not present. The first rule of Active Directory design is keeping it simple. Active Directory is very flexible. So flexible that you can design an Active Directory forest that is complex beyond imagination. All Windows Server 2003/08 R2 supports the Active Directory containers of forest, domain, site, and organizational unit (OU). With the only real restriction of one forest per namespace, you can deploy as many domains, sites, and OUs as you deem necessary. To run a replication topology in multisite network, it should be run off of Inter site Topology Generator. This will allow you to replicate between the two new offices. There are three attributes to control the behavior of replication traffic over the site link: cost, schedule, and frequency. Assigning a cost to a site link object allows the administrator to define the path that replication will take. The schedule of the site link object determines when the link is available to replicate information. A site link’s frequency determines how often information will be replicated...

Words: 366 - Pages: 2

Premium Essay

Dna Reproductive Process

...Jacob Cohn Mr. Lander Period 4 1/20/2011 When the two strands of DNA double helix are separated, each can serve as a template for the replication of a new complementary strand, producing two daughter molecules each of which contains two DNA strands with an antiparallel orientation. The enzymes involved in DNA replication process are template-directed polymerases that can synthesize the complementary sequence of each strand with extraordinary fidelity. This complex leads to the local denaturation and unwinding of an adjacent A + T rich region of DNA. The interaction of proteins with the origin is what defines the start site of replication and provides a short region of single stranded DNA essential to initiation of synthesis of the nascent DNA strand. Then helicase binds and allows for processive unwinding of double stranded DNA into single stranded DNA. As helicase unwinds the DNA, DNA single stranded protiens bind and stabilize the single stranded DNA. The polymerase III holoenzyme binds to template DNA as a part of a multi protein complex that consists of several polymerase accessory factors. DNA polymerase synthesizes DNA only in the 5 ' to 3 ' direction and only one of the several different types of polymerases is involved at the replication fork. As the DNA strands are anti parallel, the DNA polymerase functions asymmetrically. On the leading (forward) strand, the DNA is synthesized continuously. On the lagging strand (retro strand) the DNA is synthesized in short (1-5...

Words: 1062 - Pages: 5