Free Essay

Client Server Configuration

In: Computers and Technology

Submitted By rdwilli1492
Words 589
Pages 3
Running Header: Unit 7 Assignment 1 Client Server Configuration

Unit 7 Assignment 1 Client Server Configuration
Robert D Williams
ITT-Tech

MR. Brockman
NT1230
Client Server Networking
Friday, February 10, 2012

The hardware side should be set up with raided hard disks preferable in as a raid 6. There should be at least two NICs for each server to ensure that connectivity is not lost. IT recommends that we have at least three hours of a backup power available. In order to cut costs IT would like to if more then one server is required to set up virtual servers. The server roles that we network administration recommends would include, active directory services for security to ensure that they only authorized persons are accessing the system and to help to make sure that if necessary encrypt the information so that if the system is breached the information stays secure. An active directory domain services so that IT can manage the system better. This would include user profiles and is a required to add other services that will be needed as well. An active directory domain rights service is recommend to help ensure that only the users that need certain information have access to it. This also enables us to limit what some users can do with the information such as look or modify the information in a file. An application server, so that all employees will have access to needed programs to get their jobs done. A dynamic host control protocol and a domain name server are recommended so that each computer has a way of accessing the internet and sending email to each other. This will allow users to send files to another user with by using the name of the user that they want to send to instead of the IP address. File services for storing and managing files on the system and ensuring that the network runs efficiently. Network policy and access is necessary to give users access to the network, access other parts of the network that they may need as well as the internet. Print servers are needed to make sure that printers can be shared to everyone and for larger printers deny access to certain users. The features that IT recommends that we install on the servers are the following. .Net framework 3.0 features so that users can set up and customize their desktops to their liking. Bit locker for portable drives so that if a flash drive or a portable hard drive is lost the information will remain secure and only the authorized user may access it. Desktop experience is one so that sound, picture and video files can be accessed and managed at the local machine. Failover clustering is one that must be installed so that we have all the servers working together and if one fails then another server will pick up the load to ensure there is no loss of productivity. Group policy management is necessary so that IT can ensure that the correct users are getting access to the correct applications. This also allows for easier management of the users on the network. This is a basic system that IT is recommending for approval. There are many service that can be added later if there is a need for them. This will give the user a way for feeling comfortable at their workstation while still maintaining security and functionality. This will allow IT to easily manage, configure, spot problems and ensure that the system is secure.

Similar Documents

Premium Essay

Client Server Configuration

...Lesson 1: Multiple Choice and Fill in the Blanks What technology provided by Microsoft is used to perform a network-based installation of Windows operating systems including Windows XP, Windows Vista, Windows Server 2003, and Windows Server 2008? | D | What does the name of the answer file on a USB drive have to be to perform an automatic installation? | A | What is the program you should use to create or validate an answer file used to install Windows? | D | What is the maximum amount of memory that Windows Server 2008 R2 Standard Edition requires? | C | How many grace period days do you have in which to activate Windows Server 2008 R2? | D | Which of the following is not a primary subsystem found in a server? | C | What type of installation do you use that starts from scratch? | B | What command would you use to prepare a Windows installation for imaging that will remove the SID and computer name? | B | What does Microsoft use to fight pirated copies of Windows? | D | Which edition of Windows Server 2008 R2 gives you the most access to processors and memory? | D | 1. A server role is primary duty that a server performs. 2. The computer, including servers, is built around one or more integrated chips called processor. 3. A 64-bit processor can typically process more data at the same time and can access much more memory than a 32-bit processor. 4. Making sure you have sufficient RAM is one of the biggest factors in performance, even more......

Words: 405 - Pages: 2

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Free Essay

Citrix Presentation Server Planning Guide

...[pic] X-CELERATOR Citrix Presentation Server Citrix Presentation Server 4.0 for Windows Architectural Design Review Revision History |Revision |Change Description |Updated By |Date | |0.1 |Initial Document Creation |Erik Mickelson |6/3/2008 | |0.2 |Document Revision | | | | | |Erik Mickelson | | | | | | | |0.4 |QA Review | | | |0.5 |Document Revision |Erik Mickelson | | |0.6 |QA Review |Erik Mickelson, |6/19/2008 | | | |Brent Maher | | |1.0 |Final Document ...

Words: 30213 - Pages: 121

Premium Essay

Network Evaluation

...improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. All client computer software will be evaluated to ensure that it is up to date and that it meets or exceeds industry standards. For...

Words: 2399 - Pages: 10

Free Essay

Network Security

...Peer-to-Peer and Client/server Networks Professor: Karen Lederer Trevor Kale 4/16/2011 We shall discuess the difference between Peer-to-Peer networks and the Client/Server networks. First we need to describe how each one operates in order to view the differences between both. First we will describe a Peer-to-Peer network. In the Peer-to-Peer network every computer can communicate directly with every other computer.(2009, Dean, Pg.3) Because of this setup no one computer has more authority then another one on the network. Each person on the network can set their access and restrictions for other users to their computer. These configurations are simple to configure and due to the simplisity they do not require a great technical expertise. They also tend to be cheaper due to lack of need of equipment to establish this network. Some disadvantages consist of not being flexible, that is as they grow they become more difficult to handle. Security on these networks is very lacking due to ease of access of unauthorized access. They are also not very practical due to the lack of centralized resources requires a user to have their terminal on in order to access their resources. That is the basics of a Peer-to-Peer network setup, next we move on to the Client/Server model. In a Client/Server network a centralized computer known as a server facilitates communication between other computers on the network known as clients. For a computer to function as a server they must be......

Words: 478 - Pages: 2

Free Essay

It332 Unit 2

...Architectures: Peer-to-Peer, Client/Server, and Web-based 3 Part 2: Propose One Architecture in Detail 4 Part 3: Examine and Explain the Role of Protocols for Your Proposed Architecture 5 Part 4: Explain and Detail the Supporting Infrastructure for the Proposed Architecture 6 References 7 Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based A peer-to-peer network (P2P) is a network where all computers, workstations, and/or terminals are treated equally, i.e. the permissions and access is leveled across the board, and any one of the computers in the network can become the host (Englander, 2014). A way I worked this into my life was, while deployed, I set up a network where all computers connected to that network could share information and files as needed, so long as they were given access to the network in the first place. It was a small group, about 8 points of connection, using TCP/IP to communicate between the terminals, and was effective, however, I think we would have experienced some ‘bogging down’ of the network if we increased the number of people that had access to it. Because of the innate security risk that P2P networks exhibit, no sensitive information was permitted to be stored or shared on this network for any reason. Client-server architecture is application based being installed a user’s computer or workstation (i.e. the ‘client’) and through that can make requests from the server, and save back to the server as......

Words: 1094 - Pages: 5

Free Essay

Is3220 Week 7

...IS3220 VPN connectivity troubleshooting checklist 1. Users can't access file servers If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names. When using DNS to resolve internal network host names for VPN clients, make sure that these clients are able to correctly resolve unqualified fully qualified domain names used on the corporate network. This problem is seen most often when non-domain computers attempt to use DNS to resolve server names on the internal network behind the VPN server. 2. Users can't access anything on the corporate network Sometimes users will be able to connect to the remote access VPN server but are unable to connect to any resources on the corporate network. They are unable to resolve host names and unable to even ping resources on the corporate network. The most common reason for this problem is that users are connected to a network on the same network ID as the corporate network located behind the VPN server. For example, the user is connected to a hotel broadband network and is assigned a......

Words: 1569 - Pages: 7

Premium Essay

Intro to Network Magement

...Introduction to Network Management Network Configuration Candice Robinson 04/23/2012 Table of Contents Target Organization………………………………………………………………….…3 Network Architecture…………………………………………………………………..4 Network Model……………………………………………………………………………….5 Network Security……………………………………………………………………………...6 Network Protocols…………………………………………………………………………….7 Network Management………………………………………………………………………...8 References……………………………………………………………………………………..9 Target Organization Name of Business: CR Media Locations: Fayetteville, NC; Greensboro, NC and New Port News, NC and a website. Number of employees: 22 Business History: CR Media is a business that provides rentals of video games and movies. The business came to life in December of 2011 and is in the process of becoming established. Movies and Games can be rented via the internet and mailed to the home address in addition to visiting a physical location in the above mentioned cites. Network Architecture The network architecture that will be used for the organization will be the client/server network. A client/server network would be more suitable because this is a business that is growing thus it will be easier to make changes and additions to the network. A WLAN Star Topology is going to be used because it will be cost effective and will allow room for future growth. The client/server network will be composed of Windows 2000 File Server, Exchange Server and Firewall Server. We plan to connect 17......

Words: 407 - Pages: 2

Premium Essay

Inventory System

...the sale of items from the cash registers with additional features for interpreting the data. It uses a client-server model with a connected database to allow multiple stores and warehouses to be connected. This allows for later expansion while still supporting the targeted small businesses. The core features and final framework should be completed within 2 weeks, leaving 5 weeks to implement additional features and testing. 1. Operational Concepts The Inventory Management System is a real-time inventory database capable of connecting multiple stores. This can be used to track the inventory of a single store, or to manage the distribution of stock between several branches of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location through email at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. Further features may include the ability to generate reports of sales, but again the interpretation is left to the management. In addition, since theft does occasionally occur, the system provides solutions for confirming the store inventory and for correcting stock quantities. 2. System Requirements The Inventory Management System uses a web-based interface to display inventory data to the stock manager client. The product will use of open-source software primarily due to cost of implementation. A JSP......

Words: 1417 - Pages: 6

Free Essay

Pos 355 Server Pros and Cons

...Running head: CLIENT SERVER PROS AND CONS 1 Client Server Pros and Cons Henry Ford POS355 October 6, 2014 Mr. Kernan CLIENT SERVER PROS AND CONS 2 Client Server Pros and Cons Computer Networking has a vast amount of attributes. These attributes allow a system to not only function in a specific way but they also add definition to the system which in turn creates a specific identity. One of the identities of a Network is a Client/Server Network. The term "client server" defines a network system where computers known as servers are used. The Servers create central management. This form of management is used to access the network. Each network has a plethora of segments that are used for resources and data storage. These Network applications are used in Commercial applications more so than anywhere else. Since there are a variety of Network configurations, the end user has to determine which one of the specific Network features they want and also to consider the advantages and disadvantages of each system. Even though the Client/ Network architecture is the most desirable for most commercial businesses, there are certain disadvantages in this system. “The reason that client/server computing is still growing in popularity is because top management believes that it will save them money, and end-users believe that it will solve many of their computing problems.” (Windsor, 2011) Client/Server Definition: This type of computing provides the necessary comingling of personal......

Words: 854 - Pages: 4

Premium Essay

Deploying Citrix

...Deployment Best Practices for Citrix XenApp® over HughesNet™ Managed Network Services Table of Contents Executive Summary ........................................................................................... 1 HughesNet™ Managed Network Services ....................................................... 2 Citrix XenApp Overview..................................................................................... 4 Best Practices & Recommendations ................................................................ 6 Appendix A – Lab Environment – Detailed Diagram ..................................... 10 Appendix B – Citrix WAN Policy Configuration Instructions ....................... 11 Appendix C – SpeedScreen Configuration Instructions ............................... 15 Appendix D – Sample DEFAULT.ICA FILE with SpeedScreen Settings ...... 20 Hughes Network Systems Contact Information: Ajith Edakandi Principal Engineer Hughes Network Systems, LLC (301) 428-7048 -i- Executive Summary Broadband networks offer high-bandwidth but can often exhibit high-latency and/or higher jitter with certain wireless technologies. The unique nature of high-latency networks causes poor performance amongst latency-sensitive applications. Hughes Network Systems leverages over 20 years of experience in managing enterprise networks and has over 110,000 sites under management. The result is a comprehensive set of managed network features and functionality. This functionality, available...

Words: 2123 - Pages: 9

Free Essay

Web Design

...discontinuity in the way applications are connected. Using the Web Technology as the basis for an application brings substantial advantages to the adopter. This report focuses on 2-tier architecture and mainly on the 3-tier architecture, which is the present web technology. This report will also review the client-side scripting and the server-side scripting. TABLE OF CONTENTS EXECUTIVE SUMMARY 2 1. Introduction 3 2. Need for technology 4 3. Terminology 5 4. 2-Tier Architecture 5 5. 3-Tier Architecture 7 6. Client Server Architecture 10 7. Conclusion 12 REFERENCES 13 1. INTRODUCTION Web sites have quickly evolved from simple, static pages to complex Web applications performing critical operations for many businesses. These applications involve dynamic data from multiple sources; ever changing and various features for e-commerce, personalization and many more. At the same time, customers and internal users have understandably come to expect and demand more and more sophistication in the Web-based applications they use every day. The result? Web application solution providers — and their client companies — face several new challenges. They must meet or exceed increasing user demands and deliver information quickly while adapting to each new stage of the evolution. Yet addressing these challenges effectively requires efficient technologies for application development.......

Words: 2397 - Pages: 10

Premium Essay

What Title ?

...The University Student Registration System: a Case Study in Building a High-Availability Distributed Application Using General Purpose Components M. C. Little, S. M. Wheater, D. B. Ingham, C. R. Snow, H. Whitfield and S. K. Shrivastava Department of Computing Science, Newcastle University, Newcastle upon Tyne, NE1 7RU, England. Abstract Prior to 1994, student registration at Newcastle University involved students being registered in a single place, where they would present a form which had previously been filled in by the student and their department. After registration this information was then transferred to a computerised format. The University decided that the entire registration process was to be computerised for the Autumn of 1994, with the admission and registration being carried out at the departments of the students. Such a system has a very high availability requirement: admissions tutors and secretaries must be able to access and create student records (particularly at the start of a new academic year when new students arrive). The Arjuna distributed system has been under development in the Department of Computing Science for many years. Arjuna’s design aims are to provide tools to assist in the construction of fault-tolerant, highly available distributed applications using atomic actions (atomic transactions) and replication. Arjuna offers the right set of facilities for this application, and its deployment would enable the University to exploit the......

Words: 8052 - Pages: 33

Free Essay

Performance Tuning for Windows Server 2008

...Performance Tuning Guidelines for Windows Server 2012 April 12, 2013 Abstract This guide describes important tuning parameters and settings that you can adjust to improve the performance and energy efficiency of the Windows Server 2012 operating system. It describes each setting and its potential effect to help you make an informed decision about its relevance to your system, workload, and performance goals. The guide is for information technology (IT) professionals and system administrators who need to tune the performance of a server that is running Windows Server 2012. For the most current version of this guide, see Performance Tuning Guidelines for Windows Server 2012. ------------------------------------------------- Disclaimer: This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some information relates to pre-released product which may be substantially modified before it’s commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. You bear the risk of using it. ------------------------------------------------- Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. ------------------------------------------------- This document does not provide you with any legal rights to any......

Words: 50142 - Pages: 201

Free Essay

Network Eval

...of improvement. The following evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. All client computer software will be evaluated to ensure that it is up to date and that it meets or exceeds industry standards. For...

Words: 778 - Pages: 4