Register your product to gain access to bonus material or receive a coupon.
Fast, solid, and secure Windows 2000 networks don't happen by chancethey happen by design!
It's not the hardware. It's not even the software ... by far, the most vital component of any Windows 2000 network is the design work performed before it goes online. Drawing on his extensive experience in designing Windows 2000 networks for major companies, top networking expert Ed Wilson explains everything you need to do before you connect even a single cable. With real-world examples, deployment options, and scenario-based solutions from actual cases, Wilson guides you through the entire design process. When you roll out your network, you'll know you've left nothing to chance.
Taking a unique project management approach, Designing Windows 2000 Networks covers preliminary considerations, migration and deployment strategies, business considerations, technology integration, domain management, security concerns, and troubleshooting, as well as Active Directory, DNS issues, DHCP, WINS, and more. Best of all, Designing Windows 2000 Networks comes with Wilson's hands-on style and trademark sense of humor. You'll not only learn more than you thought there was to know about Windows 2000 network design, you'll have fun doing so. This book was written to give a thorough, working knowledge of the topic, including how to design a network that will:
Network administrators, consultants, system architects, technicians, and anyone else thinking about deploying a Windows 2000 network will find Designing Windows 2000 Networks an indispensable companion. Using real-world examples, author Ed Wilson, a top authority on designing and implementing Windows 2000 networks, shows you exactly what to anticipate at every step along the way, from planning to migration to implementation to troubleshooting and beyond.
Planning a Migration to Windows 2000
I. PRELIMINARY CONSIDERATIONS.1. A Quick Overview.
First Things First. What are the Expectations? The Business Case. Understand Your Environment. Architect for Success. Focus on Technology Integration. Chapter Review. In the Next Chapter.
II. Migration Strategies.2. Planning a Migration.
Relationship of Namespace. DNS Planning Considerations. AD Sizing. Domain Design Considerations. Evaluating Existing Network Infrastructure. Evaluating Existing Servers. Evaluating Existing Desktops. Chapter Review. In the Next Chapter.3. Selecting a Migration Strategy.
Developing a Migration Strategy. Choosing between Upgrade Paths. Evaluate the Order for the Migration. Migration Process. Upgrade Considerations. Why Go Native? Chapter Review. In the Next Chapter.4. Group Policy Planning.
Group Policy Backgrounder. Deployment Planning Scenarios. Chapter Review. In the Next Chapter.5. Lowering Desktop TCO.
Scenarios for Lowering Desktop TCO. Change and Configuration Management. Managing Change. Group Policy Considerations. Scope of Management. Group Policy Best Practice. Chapter Review. In the Next Chapter.
III. Implementing Migration Strategies.6. Sample Windows 2000 Migration.
Technical Requirements. The Impact of AD. Desktop Support Issues. Design the Directory Service Architecture. Chapter Review. In the Next Chapter.
IV. UNDERSTANDING THE COMPONENTS.7. Dynamic Host Configuration Protocol.
DHCP Backgrounder. DHCP Building Blocks. New Features in Windows 2000 DHCP. Installing the DHCP Server Service. Creating DHCP Multicast Scopes. Managing and Monitoring DHCP. Troubleshooting a DHCP Server. Chapter Review. In the Next Chapter.8. Windows Internet Naming System.
Understanding WINS. Installing WINS. Configuring WINS. Troubleshooting WINS. Chapter Review. In the Next Chapter.9. Windows 2000 DNS.
A Look at the Namespace. DNS Concepts. Implementation Details. Chapter Review. In the Next Chapter.10. Active Directory.
Managing AD Operations. Chapter Review. In the Next Chapter.11. Interoperability and Migration.
Consider the Possibilities. Exchange 2000 Integration. Chapter Review. In the Next Chapter.
V. Troubleshooting.12. Troubleshooting.
Troubleshooting AD. Troubleshooting Group Policy. Chapter Review.Appendix A: Well-Known TCP and UDP Port Numbers.
Runt / Long Frames. CRC or FCS Errors. Collisions. Late Collisions.Appendix D: NetBIOS Suffixes.
This book is about designing Windows 2000 networks. To this end, we will not be looking at a lot of theoretical documents, nor will we be focused on abstract concepts. Rather, we will drill down into the depths of Windows 2000 networking. We will examine the design details that will make your network run better, simplify your life as a network administrator or a consultant, and make things easier to troubleshoot. If something does not fit into those objectives, it is left out.
The most critical time in the life of a Windows 2000 network is before it ever leaves the design table. Many new and exciting things have been added in this version of Windows to warrant a full discussion. I have not assumed you are already experienced with Windows 2000; rather, I start from the ground up, by doing a thorough treatment of the subject.
The time to learn Windows 2000 is not when you pop the disk into the mouth of an awaiting server; rather, it is in the design stages, when things are running well. You want to understand the subtleties of the main Windows 2000 services before you deploy them onto a live network. We will share many insights with you and hint at possibilities for further exploration. In fact, you will find many new ideas for monitoring and troubleshooting your network inside these covers. Some of the areas that will pay the greatest dividends are troubleshooting, optimization, and security concerns, each of which command considerable attention.
In this book, we look at the Windows 2000 architecture and describe many of the sources of frustration an administrator can experience. We look at how to set things up right, and how to troubleshoot them if you inherited a mess from someone else.
The target audience is network administrators, consultants, system architects, technicians, help desk personnel, and others who support and design Windows 2000 networks. The book is also useful for those wishing to do supplemental reading while preparing for their MCSE certifications. It is therefore a moderately detailed book. We make no real assumptions either about knowledge of Active Directory, Group Policy, networking protocols, or experience with the products, as we will be discussing them. A basic knowledge of TCP/IP, DHCP, DNS, and WINS is helpful, as would be familiarity with NT security models, but that is what the book is about, so if you have never set up a server in your life, don't worry. If you want to know how to design and implement a Windows 2000 network, then this book is for you! If you want to read a book that is fun and interesting (an arm-chair consultant?) then go ahead and buy this bookyou won't be disappointed!
In order to understand how to design and deploy Windows 2000 networks, you need to know the basics of project management, features implementation, and return on investment. In this section we will bring you up to speed on all that and more. We begin with those strange numbers, and proceed to establishing guidelines for designing and planning a migration to Windows 2000.
Chapter 1: A Quick Overview. Here we look at the expectations for a migration to Windows 2000. We look at such things as the business case for the migration, planning for change and offer tips for determining the nature of the environment. After that we look at establishing guidelines and developing a pilot program. Then we look at which items of the architecture will offer the greatest rewards, and how to integrate the technology for a successful deployment. If you are wondering what in the world this has to do with Windows 2000, or what an IS person is doing talking about this stuff, then you have got to read this chapter!
In this section we take a real long look at some of the different ways that Windows 2000 can be deployed onto live networks. We look at the five key steps in a design, and talk about DNS namespace issues. Following that we look at group policy, and how to roll it into a successful design. This section has some real cool stuff!
Chapter 2: Planning a Migration. In this chapter we look at what happens when you deploy Windows 2000 onto your network. We go into the various steps that are involved in designing the deployment, and look at the all the things that must be documented and identified. We talk about putting together the team, and do an evaluation of some of the various models.
Chapter 3: Selecting a Migration Strategy. In this chapter we look at developing a migration strategy. We look at the migration path, and factor in several of the major considerations involved in the migration. We talk about restructuring domains, and migrating domains. We conclude this chapter with a discussion of tools.
Chapter 4: Group Policy Planning. In this chapter we begin with a discussion of the prerequisites for group policy. We next look at the details of group policy operations. We talk about how group policy works, as well as how to modify its default behaviors. We talk about various group policy models and conclude the chapter by talking about delegation.
Chapter 5. Lowering desktop TCO. In this chapter we build upon the discussion of group policy in Chapter 4, and move it one step forward to solve some of the most vexatious problems that face network administrators. We look at five basic models of desktop configurations. We will talk about some cool tools from Microsoft that vastly simplify creating these five basic desktop configurations. We conclude by looking at some specialized group policy considerations such as integration with Active Directory, and various types of directory trees.
Here we look at a design walk through scenario that pulls together many of the things we have covered up to this point.
Chapter 6: Sample Windows 2000 Migration. In this chapter we look at the procedure involved in designing a Windows 2000 network from start to finish. We go over the questions that will normally be asked during the first few months of a network design. We evaluate nearly everything from server hardware, and desktop computers, to infrastructure equipment such as hubs and routers.
Chapter 7: Dynamic Host Configuration Protocol. This chapter is loaded with tips, pointers, and recommendations for implementing, maintaining, and configuring DHCP.
Chapter 8: Windows Internet Naming System. Here we look at WINS. We will see how to install, configure and maintain WINS. We look at some troubleshooting techniques, as well as several disaster recovery scenarios. We also share some secrets learned from years of consulting in the field and troubleshooting hundreds of networks.
Chapter 9: Windows 2000 DNS. In this chapter we talk about the biggie for Windows 2000, DNS. We start at the beginning and talk about the strange vocabulary required for understanding DNS. We then go into some of the concepts, and finally explore the unique implementation of DNS as it stands in Windows 2000. This is an extremely critical chapter for network administrators working with Windows 2000.
Chapter 10: Active Directory. In this chapter we talk about Active Directory operations. We go into backup methods, talk about system state and some best practices for backup. Next we go into recovery issues and talk about the recovery console, and restoring Active Directory.
Chapter 11: Interoperability and Migration. In this chapter we talk about interoperating with Netware and configuring and using Client Services for Netware. Next we talk about Active Directory schema modifications, and working with Exchange 2000. Following that discussion, we go into some detail about the use of groups, and how Exchange 2000 interoperates with Windows 2000 Active Directory.
In some aspects, much of the book has been devoted to troubleshooting. However, there are a few tricks I have learned from the field, that I want to share with you. These are some really cool tools. I do not go over the standard tool kit here--this was covered in the preceding chapters. What you will find here, are the tools that will set you apart from the pack. The kind of stuff, when you pull out a CMD line, that everyone stops to see.
Chapter 12: Troubleshooting. In this chapter we talk about troubleshooting. Not the normal troubleshooting, but cool stuff you can do to save the day. This is the kind of troubleshooting where you solve a problem that has been perplexing someone for weeks. Perhaps it is not too far of a stretch to quote Humphrey Bogart from the Maltese Falcon: "This is the stuff dreams are made of." You will find some neat things here. Go ahead and dive in.
Ed Wilson, MCSE + I, MCT, MCSD, MCDBA, CCNA, CCA, CCI, CTT, Master ASE is a Senior Networking Specialist with Full Service Networking, a Microsoft Solution Provider Partner in Cincinnati, Ohio. He specializes in deploying Windows 2000 networks for medium-sized companies. His roster of clients includes both Fortune 500 and Fortune 100 companies. His previous publications include An Administrator's Guide to Windows 2000 TCP/IP Networks, and Network Monitoring and Analysis: A Protocol Approach to Troubleshooting, both by Prentice Hall PTR, as well as contributions to four other books.