Dynamic Host Configuration Protocol Analysis

Great Essays
Introduction
Business users and applications rely on core infrastructure components to be available in order to effectively do the job for which they have been tasked. An internet protocol (IP) network is critical to business functions; however, obtaining an IP address is not enough. Client workstations should make use of the Dynamic Host Configuration Protocol (DHCP) for the dynamic assignment of addresses, as well as other name resolution components, such as DNS, and WINS. Active Directory is also essential in providing authorization, and authentication mechanisms for the people, and systems used throughout the network.
DHCP Infrastructure Strategy
The first step in an effective DHCP infrastructure strategy is to ensure the right number of
…show more content…
This increases the security of DNS and allows reasonable assurance against DNS related attacks, such as denial of service (DoS), and DNS hijacking. Due to the criticality of DNS, and the successful operation of Active Directory, a functioning and healthy DNS service is …show more content…
Maintenance windows can take place where each server is restarted on alternate schedules, which reduces downtime. In the even both domain controllers go offline, auto-site coverage can be configured for GPO settings that allow a domain controller within another AD site to provide authentication services for the impacted site.
AD Troubleshooting
The domain controllers are the servers that run and support Active Directory. Troubleshooting Active Directory is more than troubleshooting the servers that run the service. While there are physical components that can cause problems, such as a failed power supply or faulty network conditions, AD itself has specialized tools to troubleshoot the service effectively.
The first tool used should be REPADMIN. Since replication is a critical component of a healthy AD environment, if two servers are failing to replicate there could be network related issues that are the cause. DNS may not be resolving correctly, or a firewall is preventing proper replication traffic. If replication is healthy; however, there are other problems the DCDIAG tool should be executed. This command line utility can identify issues with a local DC or potentially issues with other DCs that may be impacting the operations of the local

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The following are the top 10 types of packets: IPv4: Internet Protocol version 4 (IPv4) is the standard version of the internet protocol, that acts as the platform for standard internet protocols and existing internet models (ISP). Extensive use of this protocol led to exhaustion of IP addresses. Therefore, we are bound to use IPv6, in the near future. A feature called as sub-netting is used for IP address allocation. It is defined in RFC 791.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    They are further categorized to three different GPOs which are site, domain and organizations unit GPOs. Site GPO is the location, domain GPO is the level of authority and lastly the organizational GPO is the Kens Windows 7 Limited. Every user’s information is saved at the local GPO. At this level, all new users are created individually and assigned the right authority. Active Directory can make changes and apply to all the users at the same time instead of one user at a time.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    This also helps to detect strange traffic running across the servers 3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access. 4. Secure the Network: Access level assignments…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Most networks today use the TCP/IP protocol for how to communicate on the network and the most common is IP Version 4. Missing Elements In the diagram, it is showing that each department has three IP addresses assigned as well as three printers which are connected to the network via Ethernet. we can see that each department has three IP addresses assigned to it, and there are three printers, one for each department. These computers can communicate with one another as well as the printers, server, and Internet.…

    • 923 Words
    • 4 Pages
    Improved Essays