About the Contributors | | v | |
Acknowledgments | | vii | |
Preface | | xvii | |
Introduction | | xix | |
| Analyzing Business Requirements | | | 1 | (30) |
| Understanding Business Requirements Analysis | | | 2 | (2) |
| | 3 | (1) |
| Analyzing the Existing and Planned Business Models | | | 4 | (3) |
| | 5 | (2) |
| Analyzing the Company Model and the Geographic Scope | | | 7 | (3) |
| | 8 | (2) |
| Analyzing Company Processes | | | 10 | (2) |
| | 11 | (1) |
| Analyzing the Existing and Planned Organizational Structures | | | 12 | (2) |
| | 13 | (1) |
| Analyzing Factors That Influence Company Strategies | | | 14 | (3) |
| | 16 | (1) |
| Analyzing the Structure of IT Management | | | 17 | (3) |
| | 18 | (2) |
| | 20 | (2) |
| | 22 | (1) |
| | 23 | (6) |
| | 29 | (2) |
| Analyzing Technical Requirements | | | 31 | (34) |
| Analyzing Corporate Technical Requirements | | | 32 | (2) |
| | 33 | (1) |
| Evaluating the Company's Existing and Planned Technical Environments and Goals | | | 34 | (4) |
| | 36 | (2) |
| Analyzing the Impact of Infrastructure Design on the Existing and Planned Technical Environments | | | 38 | (4) |
| | 40 | (2) |
| Analyzing the Network Requirements for Client Computer Access | | | 42 | (3) |
| | 43 | (2) |
| Analyzing the Existing Disaster Recovery Strategy | | | 45 | (5) |
| | 46 | (4) |
| | 50 | (3) |
| | 53 | (1) |
| | 54 | (8) |
| | 62 | (3) |
| Designing a TCP/IP Networking Strategy | | | 65 | (32) |
| Understanding the Fundamentals of Designing TCP/IP Networking Strategies | | | 66 | (2) |
| | 67 | (1) |
| Analyzing IP Subnet Requirements | | | 68 | (4) |
| | 69 | (3) |
| Designing a TCP/IP Addressing and Implementation Plan | | | 72 | (4) |
| | 73 | (3) |
| Measuring and Optimizing a TCP/IP Infrastructure Design | | | 76 | (3) |
| | 77 | (2) |
| Integrating Software Routing into Existing Networks | | | 79 | (3) |
| | 80 | (2) |
| Integrating TCP/IP with Existing WAN Connections | | | 82 | (3) |
| | 83 | (2) |
| | 85 | (2) |
| | 87 | (1) |
| | 88 | (7) |
| | 95 | (2) |
| Designing a DHCP Strategy | | | 97 | (30) |
| Understanding the Windows 2000 DHCP Server | | | 98 | (3) |
| | 99 | (2) |
| Integrating DHCP into a Routed Environment | | | 101 | (3) |
| | 102 | (2) |
| Integrating DHCP with Windows 2000 | | | 104 | (3) |
| | 105 | (2) |
| Using Automatic Private Internet Protocol Addressing | | | 107 | (2) |
| | 108 | (1) |
| Security Issues Related to DHCP | | | 109 | (2) |
| | 110 | (1) |
| Designing a DHCP Service for Remote Locations | | | 111 | (3) |
| | 112 | (2) |
| Measuring and Optimizing a DHCP Infrastructure Design | | | 114 | (3) |
| | 115 | (2) |
| | 117 | (2) |
| | 119 | (1) |
| | 120 | (6) |
| | 126 | (1) |
| | 127 | (30) |
| Understanding the Windows 2000 Dynamic DNS Server | | | 128 | (2) |
| | 129 | (1) |
| Creating a DNS Namespace for the Organization | | | 130 | (2) |
| | 131 | (1) |
| Creating an Integrated DNS Design | | | 132 | (2) |
| | 133 | (1) |
| Creating a Secure DNS Design | | | 134 | (2) |
| | 135 | (1) |
| Creating a Highly Available DNS Design | | | 136 | (3) |
| | 137 | (2) |
| Measuring and Optimizing a DNS Infrastructure Design | | | 139 | (3) |
| | 140 | (2) |
| Designing a DNS Deployment Strategy | | | 142 | (3) |
| | 143 | (2) |
| | 145 | (2) |
| | 147 | (1) |
| | 148 | (6) |
| | 154 | (3) |
| Designing a WINS Strategy | | | 157 | (34) |
| Understanding NetBIOS Name Resolution | | | 158 | (3) |
| | 159 | (2) |
| | 161 | (3) |
| | 162 | (2) |
| Integrating WINS into a Network Design Plan | | | 164 | (6) |
| | 165 | (5) |
| Designing Security for WINS Communications | | | 170 | (3) |
| | 171 | (2) |
| Designing a Fault-Tolerant WINS Network | | | 173 | (4) |
| | 174 | (3) |
| | 177 | (3) |
| | 177 | (3) |
| | 180 | (1) |
| | 181 | (1) |
| | 182 | (7) |
| | 189 | (2) |
| Designing Distributed Data Access Solutions | | | 191 | (30) |
| Understanding Distributed Data Access Solutions | | | 192 | (2) |
| | 193 | (1) |
| Designing a Multiprotocol Strategy | | | 194 | (4) |
| | 195 | (3) |
| Designing a Distributed File System Strategy | | | 198 | (4) |
| | 199 | (3) |
| Designing a Load-Balancing Strategy | | | 202 | (4) |
| | 203 | (3) |
| Windows 2000 Server Clustering | | | 206 | (4) |
| | 207 | (3) |
| | 210 | (1) |
| | 211 | (1) |
| | 212 | (7) |
| | 219 | (2) |
| Designing Internet Connectivity Solutions | | | 221 | (34) |
| Designing Internet Connectivity Solutions | | | 222 | (3) |
| | 223 | (2) |
| Implementing Firewall Solutions | | | 225 | (4) |
| | 226 | (3) |
| Developing Routing and Remote Access Strategies | | | 229 | (3) |
| | 230 | (2) |
| Understanding Windows 2000 Network Address Translation | | | 232 | (4) |
| | 233 | (3) |
| Utilizing Windows 2000 Internet Connection Sharing | | | 236 | (2) |
| | 236 | (2) |
| Integrating Windows 2000 with Microsoft Proxy Server, Internet Information Server, and Exchange Server | | | 238 | (4) |
| | 239 | (3) |
| | 242 | (1) |
| | 243 | (1) |
| | 244 | (9) |
| | 253 | (2) |
| Designing Internet Connectivity Using Microsoft Proxy Server 2.0 | | | 255 | (34) |
| Understanding Proxy Server 2.0 | | | 256 | (3) |
| | 257 | (2) |
| Designing a Proxy Server Network Implementation | | | 259 | (5) |
| | 260 | (4) |
| Ensuring Proxy Server Security | | | 264 | (4) |
| | 265 | (3) |
| Designing a Fault-Tolerant Proxy Network | | | 268 | (3) |
| | 269 | (2) |
| Maximizing Proxy Server Performance | | | 271 | (5) |
| | 273 | (3) |
| | 276 | (2) |
| | 278 | (1) |
| | 279 | (7) |
| | 286 | (3) |
| Designing a Wide Area Network Infrastructure | | | 289 | (30) |
| Designing a WAN Infrastructure | | | 290 | (4) |
| | 291 | (3) |
| Designing a Remote Access Solution That Uses Routing and Remote Access Service | | | 294 | (4) |
| | 295 | (3) |
| Integrating Authentication with Remote Authentication Dial-In User Service | | | 298 | (3) |
| | 299 | (2) |
| Designing a Virtual Private Network Strategy | | | 301 | (4) |
| | 302 | (3) |
| Designing an RRAS Routing Solution to Connect Locations via Demand-Dial Routing | | | 305 | (2) |
| | 306 | (1) |
| | 307 | (1) |
| | 308 | (1) |
| | 309 | (7) |
| | 316 | (3) |
| Designing an IPSec Implementation Strategy | | | 319 | (30) |
| | 320 | (2) |
| | 321 | (1) |
| Defining the Goals of IPSec on Your Network | | | 322 | (3) |
| | 322 | (3) |
| Installing and Configuring IPSec | | | 325 | (3) |
| | 326 | (2) |
| Implementing IPSec Security Policies | | | 328 | (4) |
| | 329 | (3) |
| IPSec Planning Considerations | | | 332 | (2) |
| | 332 | (2) |
| Monitoring and Optimizing IPSec | | | 334 | (3) |
| | 335 | (2) |
| | 337 | (1) |
| | 338 | (1) |
| | 339 | (9) |
| | 348 | (1) |
| Management and Implementation Strategies for Windows 2000 | | | 349 | (30) |
| Designing a Strategy for Monitoring and Managing Windows 2000 Network Services | | | 350 | (4) |
| | 351 | (3) |
| Designing Network Services That Support Application Architecture | | | 354 | (3) |
| | 355 | (2) |
| Designing a Plan for the Interaction of Windows 2000 Network Services such as WINS, DHCP, and DNS | | | 357 | (5) |
| | 358 | (4) |
| Designing a Resource Strategy | | | 362 | (4) |
| | 363 | (3) |
| | 366 | (2) |
| | 368 | (1) |
| | 369 | (9) |
| | 378 | (1) |
Practice Exam | | 379 | (37) |
| AEN Solutions Inc. Case Study | | | 388 | (7) |
| Company Profile and History | | | 380 | (8) |
| | 388 | (7) |
| New Silicon Ventures Limited Case Study | | | 395 | (10) |
| Company Profile and History | | | 395 | (4) |
| | 399 | (6) |
| | 405 | (11) |
| | 416 | |