Chapter 15 PowerPoint (421.0K)

Uploaded on


  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Chapter 15: Networking Services Design Optimization
    • Essential Networking Services Optimization
    • Data Protection and Optimization
    • Advanced Design Optimization
  • 2. Optimizing Designs for Applications
    • Identify which networking services the applications require.
    • Select the best placement for servers running networking services.
    • Select optimal specifications of the networking services.
  • 3. Identifying Required Networking Services
  • 4. Selecting the Best Server Placement
    • Determine placement of servers running networking services.
    • Choose from the following options:
      • Place on the same server.
      • Place on the same network segment.
      • Place on an adjacent network segment.
  • 5. Selecting the Optimal Networking Services Configuration
    • Base the configuration on organizational requirements and constraints.
    • Consider that some requirements and constraints may conflict.
    • Resolve conflicts by
      • Prioritizing the requirements
      • Tailoring the design to achieve the highest priority
      • Prioritizing the remaining requirements
  • 6. Optimizing Designs to Reduce the Number of Servers
    • Lowers deployment cost
    • Lowers long-term costs
    • Allows you to combine services on one server
      • Services use unique Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port numbers.
      • Security requirements allow combined services.
      • Availability requirements allow combined services.
      • System resources support multiple networking services with acceptable performance.
  • 7. Identifying Security Requirements and Constraints
    • Consider security requirements when optimizing servers accessed by
      • Authorized users only
      • Unauthorized users only
      • A combination of authorized and unauthorized users
  • 8. Selecting Security Optimization Methods
    • Methods must not compromise security requirements.
    • Place services on the same segment/server as applications.
    • Combine networking services on one server.
    • Isolate networking services on separate servers.
  • 9. Optimizing by Using Windows Clusters
    • Optimize by combining services on clusters to improve availability and performance.
    • Choose from the two cluster types:
      • Network Load Balancing clusters
      • Server clusters
  • 10. Network Load Balancing Clusters
    • Two or more combined Microsoft Windows 2000 servers that
      • Provide load balancing and fault tolerance
      • Offer an alternative to round robin DNS
      • Can use the “share nothing” model
  • 11. Server Clusters
    • Two or more combined Windows 2000 servers that
      • Share common disk resources
      • Can be configured for fault tolerance and load balancing
      • Provide automatic failover
      • Minimize recovery time
  • 12. Optimizing the Windows 2000 Configuration
    • Include only signed device drivers.
    • Run only reliable services or applications.
    • Run only the required services or applications.
    • Avoid combining networking services that compete for resources.
  • 13. Optimizing to Reduce Network Traffic
    • Reduce network traffic to improve performance.
    • Combine networking services on the same computer.
    • Place servers running networking services on the same or adjacent network segment.
  • 14. Chapter Summary
    • Evaluate the requirements and constraints to plan design optimization.
    • Prioritize requirements to avoid conflicts.
    • Use Windows Clustering to improve availability and performance.
      • Network Load Balancing clusters
      • Server clusters
    • Include reliable and certified software components.