Special Offers

MCSE Training Kit (Exam 70-226): Designing Highly Available Web Solutions with Microsoft® Windows® 2000 Server Technologies
Author Microsoft Corporation
Pages 544
Disk 2 Companion CD(s)
Level All Levels
Published 10/03/2001
ISBN 9780735614253
ISBN-10 0-7356-1425-3
Price(USD) $59.99
To see this book's discounted price, select a reseller below.

More Information

About the Book
Table of Contents
Sample Chapter
Related Series
Related Books
About the Author

Support: Book & CD

Rate this book
Barnes Noble Amazon Quantum Books


Table of Contents

About This Bookxiii
    Intended Audiencexiv
    Reference Materialsxiv
    About The Supplemental Course Materials CD-ROMxv
    Features of This Bookxv
    Chapter and Appendix Overviewxvii
        Finding the Best Starting Point for Youxviii
        Where to Find Specific Skills in This Bookxix
    Getting Startedxxi
        Hardware and Software Requirementsxxi
        Setup Instructionsxxii
    About the eBookxxiii
    The Microsoft Certified Professional Programxxiii
        Microsoft Certification Benefitsxxiv
        Requirements for Becoming a Microsoft Certified Professionalxxvi
        Technical Training for Computer Professionalsxxviii
    Technical Supportxxix
CHAPTER 1 Introduction to Designing Highly Available Web Solutions1
        About This Chapter1
        Before You Begin2
    Lesson 1: Introduction to Highly Available Web Solutions3
        Windows 2000 Advanced Server3
        Key Terminology4
        The Web Computing Model for Business7
        Lesson Summary12
    Lesson 2: Determining System Availability13
        Availability Metrics13
        Causes of Downtime16
        Availability Checklist17
        Lesson Summary18
    Lesson 3: Ensuring System Availability19
        Designing a Highly Available Web Site19
        Lesson Summary23
CHAPTER 2 Network Infrastructure25
        About This Chapter25
        Before You Begin26
    Lesson 1: Designing a Highly Available Network Topology27
        Network Topology27
        Making a Decision36
        Example: Network Redundancy37
        Lesson Summary38
    Lesson 2: Designing a Subnet Addressing Structure for a TCP/IP Network39
        Subnetting a Multitiered Web Environment39
        Making a Decision44
        Example: A Subnetted Web Environment45
        Lesson Summary48
    Activity 2.1: Adding Redundancy to a Network Topology49
    Lesson 3: Designing a DHCP Server Environment for a TCP/IP Network50
        Windows 2000 DHCP Service50
        Making a Decision58
        Example: A DHCP Configuration59
        Lesson Summary59
    Lesson 4: Designing a Name Resolution Structure for a TCP/IP Network62
        DNS Hierarchy and Naming62
        Making a Decision69
        Example: A DNS Namespace70
        Lesson Summary73
    Lab 2.1: Designing a Highly Available Network Infrastructure74
        Lab Objectives74
        About This Lab74
        Before You Begin74
        Scenario: The Contoso Web Site75
        Exercise 1: Providing Redundant Components and Network Paths75
        Exercise 2: Subnetting a TCP/IP Network76
        Exercise 3: Designing a Namespace77
CHAPTER 3 Server Configurations81
        About This Chapter81
        Before You Begin81
    Lesson 1: Designing a Fault-Tolerant System82
        Highly Available Configurations82
        Making a Decision88
        Example: A Fault-Tolerant System89
        Lesson Summary90
    Lesson 2: Designing Data Storage for High Availability91
        Disk Fault Tolerance91
        Making a Decision98
        Example: RAID Configuration for Tailspin Toys99
        Lesson Summary100
    Lab 3.1: Planning RAID Configurations101
        Lab Objectives101
        About This Lab101
        Before You Begin101
        Scenario: Fault-Tolerant Storage for Lucerne Publishing 101
        Exercise 1: Planning a File Server Configuration101
        Exercise 2: Planning a File Server and Operating System Configuration102
        Exercise 3: Planning a Domain Controller and Services Configuration103
        Exercise 4: Planning a Relational Database Server Configuration104
CHAPTER 4 Microsoft Windows 2000 Cluster Service107
        About This Chapter107
        Before You Begin108
    Lesson 1: Introduction to Server Clusters109
        Overview of Server Clusters109
        Server Cluster Components110
        Server Cluster Objects112
        Cluster Service Architecture118
        Lesson Summary121
    Lesson 2: Planning Server Cluster Configurations122
        Planning a Server Cluster122
        Making a Decision128
        Example: A Server Cluster for Northwind Traders130
        Lesson Summary131
    Activity 4.1: Planning Resource Groups132
    Lesson 3: Choosing a Server Cluster Model133
        Server Cluster Models133
        Making a Decision140
        Example: A Highly Available Cluster for Woodgrove Bank141
        Lesson Summary142
    Lab 4.1: Planning a Server Cluster143
        Lab Objectives143
        About This Lab143
        Before You Begin143
        Scenario: Server Clusters for Wingtip Toys143
        Exercise 1: Choosing a Server Cluster Model144
        Exercise 2: Planning the Resource Groups144
        Exercise 3: Determining Failover Policies145
CHAPTER 5 Network Load Balancing (NLB)147
        About This Chapter147
        Before You Begin148
    Lesson 1: Introduction to NLB149
        Using Multiple Servers149
        Windows 2000 NLB151
        How NLB Works152
        NLB Architecture158
        Using NLB160
        Lesson Summary162
    Lesson 2: Planning NLB Clusters163
        Planning for NLB163
        Making a Decision168
        Example: An NLB Cluster for Northwind Traders169
        Lesson Summary171
    Activity 5.1: Using Round-Robin DNS for Multiple Clusters172
    Lesson 3: Choosing an NLB173
        NLB Cluster Models173
        Making a Decision181
        Example: An NLB Configuration for the Baldwin Museum of Science182
        Lesson Summary183
    Lab 5.1: Planning an NLB Cluster184
        About This Lab184
        Before You Begin184
        Scenario: NLB Cluster for Litware, Inc.184
        Exercise 1: Determining Which Applications to Run in the Cluster185
        Exercise 2: Choosing an NLB Model185
CHAPTER 6 Microsoft Application Center 2000187
        About This Chapter187
        Before You Begin188
    Lesson 1: Introduction to Application Center189
        Platform Components of a Web Site189
        Overview of Application Center190
        Load Balancing192
        Synchronization and Deployment194
        Application Center Architecture196
        Clustering Scenarios198
        Lesson Summary201
    Lesson 2: Planning Application Center Clusters202
        Planning for Application Center 2000202
        Making a Decision208
        Example: An Application Center Cluster210
        Lesson Summary211
    Activity 6.1: Identifying Components of Application Center Clusters212
    Lesson 3: Designing CLB Clusters213
        Making a Decision221
        Example: A CLB Cluster for Consolidated Messenger222
        Lesson Summary223
    Lab 5.1: Designing Application Center Clusters224
        About This Lab224
        Before You Begin224
        Scenario: Clusters for Trey Research224
        Exercise 1: Designing a General/Web Cluster225
        Exercise 2: Designing a COM+ Routing Cluster225
        Exercise 3: Designing a COM+ Application Cluster226
CHAPTER 7 Capacity Planning229
        About This Chapter229
        Before You Begin230
    Lesson 1: Introduction to Capacity Planning231
        Lesson Summary238
    Lesson 2: Calculating User Costs240
        Overview of Calculating Costs240
        Calculating Cost Per User242
        Lesson Summary252
    Activity 7.1: Calculating CPU Usage253
    Activity 7.2: Calculating Network Bandwidth254
    Lesson 3: Planning Network Capacity255
        The Planning Process255
        Making a Decision264
        Example: Capacity Planning for Coho Vineyard 266
        Lesson Summary267
    Lab 7.1: Planning CPU and Bandwidth Capacity268
        About This Lab268
        Before You Begin268
        Scenario: Capacity Planning for Adventure Works268
        Exercise 1: Identifying the User Base269
        Exercise 2: Determining CPU Requirements271
        Exercise 3: Determining Bandwidth Capacity272
CHAPTER 8 Directory Services275
        About This Chapter275
        Before You Begin275
    Lesson 1: Introduction to Active Directory 276
        Overview of Active Directory276
        Active Directory Objects277
        Active Directory Structure278
        Active Directory Replication282
        Lesson Summary284
    Lesson 2: Planning the Active Directory Physical Structure286
        Planning Process286
        Making a Decision291
        Example: Active Directory Physical Structure for Woodgrove Bank 292
        Lesson Summary293
    Lab 8.1: Planning the Physical Structure295
        About This Lab295
        Before You Begin295
        Scenario: Network Structure for Northwind Traders295
        Exercise 1: Defining a Site Structure296
        Exercise 2: Placing Domain Controllers297
        Exercise 3: Defining an Intersite Replication Strategy297
        Exercise 4: Placing Global Catalog Servers and Operations Masters298
CHAPTER 9 Application Integration301
        About This Chapter301
        Before You Begin302
    Lesson 1: Defining a Web Application Strategy303
        Application Integration303
        Making a Decision310
        Example: A Distributed Application for Trey Research311
        Lesson Summary312
    Activity 9.1: Deploying a Web Application313
    Lesson 2: Designing a Database Web Integration Strategy314
        Web Database Access314
        Making a Decision322
        Example: Database Integration for Margie's Travel 323
        Lesson Summary324
    Activity 9.2: Partitioning Data in a SQL Server Database325
    Lesson 3: Designing a Microsoft Exchange Web Integration Strategy326
        Outlook Web Access326
        Making a Decision331
        Example: Web-Integrated Messaging for Northwind Traders332
        Lesson Summary332
    Lab 9.1: Integrating a Web Application into a Distributed Environment334
        About This Lab334
        Before You Begin334
        Scenario: Web Application and Messaging Services for Lucerne Publishing 334
        Exercise 1: Designing an IIS Application Structure335
        Exercise 2: Integrating SQL Server into Your Application Structure335
        Exercise 3: Integrating Exchange 2000 Server into Your Web Site336
CHAPTER 10 Network Security339
        About This Chapter339
        Before You Begin340
    Lesson 1: Designing an Authentication Strategy341
        IIS Authentication Models341
        Making a Decision346
        Example: Authentication Strategy for Trey Research347
        Lesson Summary348
    Lesson 2: Designing an Authorization Strategy349
        User Authorization349
        Making a Decision355
        Example: Authorization Strategy for Wide World Importers356
        Lesson Summary357
    Activity 10.1: Troubleshooting Access Permissions358
    Lesson 3: Designing an Encryption Strategy359
        Data Encryption359
        Making a Decision364
        Example: Encryption Strategy for City Power & Light365
        Lesson Summary366
    Lesson 4: Designing a Firewall Strategy367
        Firewall Security367
        Making a Decision372
        Example: A Firewall Strategy for Woodgrove Bank373
        Lesson Summary373
    Lab 10.1: Planning Your Network Security375
        About This Lab375
        Before You Begin375
        Scenario: A Security Strategy for Northwind Traders 375
        Exercise 1: Planning an Authentication and Encryption Strategy376
        Exercise 2: Planning an Authorization Strategy377
        Exercise 3: Planning a Firewall Strategy378
CHAPTER 11 Systems Monitoring and Disaster Recovery381
        About This Chapter381
        Before You Begin382
    Lesson 1: Designing a System Monitoring Strategy383
        Performance Monitoring383
        Making a Decision393
        Example: Monitoring Memory for Lucerne Publishing394
        Lesson Summary395
    Activity 11.1: Creating a Processor Alert396
    Lesson 2: Designing a Security Auditing Strategy397
        System Auditing397
        Making a Decision402
        Example: Directory Auditing for Fourth Coffee402
        Lesson Summary403
    Activity 11.2: Auditing a Web Site404
    Lesson 3: Designing a Disaster Recovery Strategy405
        Disaster Recovery405
        Making a Decision408
        Example: Preparing the Recovery Systems for Coho Vineyard408
        Lesson Summary411
    Lab 11.1: Designing a System Monitoring and Security Auditing Strategy412
        About This Lab412
        Before You Begin412
        Scenario: Northwind Traders Web Site412
        Exercise 1: Designing a System Monitoring Strategy413
        Exercise 2: Designing a Security Auditing Strategy414
APPENDIX: Questions and Answers419

Last Updated: September 25, 2001
Top of Page