Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Naming Conventions for Windows Server 2008

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
5/29/2011 11:26:55 AM
When referencing naming conventions in Windows Server 2008, it's essentially the same thing as saying you're identifying the method of name to IP address conversion that is used throughout the enterprise. And of course, this brings to mind two different name resolution technologies that are used with Windows Server 2008: WINS and DNS.

Accordingly, this also means that the two technologies may either exist by themselves or coexist in the same environment. Furthermore, these technologies can be implemented either externally or internally. In the following sections, I'll discuss some of the most common usage scenarios for name resolution tactics and how they're implemented in an enterprise-level environment. I'll begin with a brief review of DNS and zone types. Then, since I've already covered WINS technology, I'll address the incorporation of WINS with DNS, and then I'll address how to include Active Directory within DNS. Afterward, I'll finish off this discussion on naming conventions by talking about some of the most commonly used migration, delegation, and transfer strategies used in a complex environment.

1. Internal and External Namespaces

When I reference the words internal and external in regard to namespaces, I'm actually referring to whether you're using the internal infrastructure of your enterprise, or how that enterprise is accessed from the Internet. On the internal level, you usually reference your enterprise by an extension such as .local, whereas the external namespace is referenced by a top-level domain such as .net, .com, or .org. And each of these types of naming conventions, internal and external, make way for several configuration options that are important in terms of administrative overhead and user accessibility.

In fact, the first design choice an administrator has to make when choosing an internal and external naming scheme is whether that naming scheme will actually be the very same scheme, that is, whether the internal and external naming address will be the same. It's certainly a tempting option, and it has lulled more than a fair share of (perhaps lazy is too strong a word) less involved administrators.

When designing an internal namespace and an external namespace that use the same name, an administrator is choosing to have the internal namespace be a subdomain of the external namespace. The problems with this are, first, security based (because resources are all in one place) and, second, that users in the internal organization won't be able to access external resources without a lot of overhead administrative work, which is basically taking away from one of the benefits of using them both at once.

When using different internal and external naming addresses, you're provided with the added benefit of security, and you create an additional forwarder in DNS. Plus, users who may be accessing your network externally will not have access to your internal resources, which is a huge benefit.

1.1. External Namespace Design

The first step in choosing an external namespace design is to determine the most appropriate registered domain according to your company. For instance, if your company name is MyCorp, it would be logical to attempt to register the MyCorp.com domain with a given domain registrar, such as domainsdoneright.com. Once this is complete, you can begin your design from the top down.

An important point to keep in mind about any good external strategy is that a good design practice is to keep any external resources assigned completely as external resources. This means that it's a good idea to not place your external users, or Active Directory objects, in a completely different place that cannot access your internal resources. The reason this is suggested is because if internal resources, such as a printer, can be accessed on the external namespace, it's possible that an external user can take control of this device or cause internal problems within your enterprise, which is never a good thing.

By the same token, certain specialty resources such as a web proxy server needn't be located in the external namespace. This is mostly because resources such as this don't rely upon being addressed externally and make use of preexisting conditions in the internal namespace in order to operate. But the most important reason for the separation of the external namespace is NAT. When using NAT, it's difficult for external addresses to be accessed by the internal network because of the inherent problems with referencing something else in another domain or possibly a different subnet.

1.2. Internal Namespace Design

The reasons for implementing an internal namespace design are many. One of the reasons for this portion of the naming convention design is that there needs to be an isolated area within your network that can be accessed only by authorized resources from within a certain area or that falls within the purview of a predefined set of security conditions for external access that is laid out originally by the enterprise administrator. But more important, the point of an internal namespace design is to create a robust design that creates an environment that provides a method for name resolution of all internal clients through the use of either hostnames or NetBIOS names.

NetBIOS names have a maximum length of 15 characters, and each name must be unique within the entire organization.


2. Zone Types and Zone Transfers

Windows Server 2008 has four types of zones: primary, secondary, stub, and GlobalNames. And each of these zones is designed for a specific purpose that can be incorporated with Active Directory. Throughout your study, you've already touched on a good share of these zone types, but for the sake of completeness you can review each of these shortly.

2.1. Primary Zones

A primary zone is the main standard zone type in Windows Server 2008. It can be either integrated or not integrated with Active Directory. The primary zone contains the main database associated with the DNS and is usually supported by secondary zones. If Active Directory is not associated with it, the primary zone hosts the only modifiable zone in the infrastructure, with all remaining zones being secondary to it. If it is integrated with Active Directory, the zone data is copied into Active Directory, and all other associated zones become peers of this zone. It is, by far, the most efficient way of managing DNS zones. On the enterprise level, it is highly recommended to integrate DNS with Active Directory; otherwise, the standard primary zone becomes a bottleneck for the rest of the enterprise that relies upon the primary zone to receive information from Dynamic DNS or other query resolution processes.

2.2. Secondary Zones

Secondary zones are zones set apart from the primary zone to aid in the replication and accessibility of DNS database records for the rest of the enterprise. Secondary zones are read-only, host a copy of known DNS information, and reduce traffic in an enterprise. Secondary zones are usually placed at logical places throughout the external and internal namespaces in order to aid users on either side in the acquisition of whatever DNS information they may require.

2.3. Stub Zones

Stub zones are not new to Windows Server 2008 but are still a relatively new concept to Windows Server in general. Originally released with Windows Server 2003, stub zones are zones that delegate information to another namespace. The main purpose of a stub zone is to act as a buffer between zones to eliminate traffic caused by excessive queries to a particular zone by delegating requests to another namespace. Stub zones receive their updates by an authoritative server and contain only the following:

  • Start of authority (SOA)

  • Name server (NS)

  • Address (A)

Once it receives this information, the stub zone periodically updates itself whenever it requires additional information from its authoritative server based on administratively defined settings.

2.4. GlobalNames Zone

The completely new zone type in Windows Server 2008 is the GlobalNames Zone, which I briefly discussed earlier. It is a zone type that is designed to assist in phasing out the WINS technology by implementing a last-resort technique that resolves NetBIOS queries for DNS operating infrastructures. It supports IPv6, can integrate into a currently running WINS environment, and can affect an entire forest.

2.5. Zone Transfers

Within Windows Server 2008, zone transfers come in two types: authoritative transfers (AXFRs) and incremental zone transfers (IXFRs). An AXFR is a complete transfer of all components of the zone as it is authoritatively initiated, whereas an IXFR transfers only the differences since the last zone transfer. Normally, most organizations try to make as much use as possible of IXFR because of the inherently less bandwidth that is used.

3. Active Directory Replication with DNS

A friend of mine once told me that if Active Directory knew where, when, and how to replicate itself, I'd probably be out of a job. And, unfortunately, I have to agree. One of the major problems with any enterprise is the process of connecting various servers through the use of site links, bridges, and various routers across multiple subnets. It's time-consuming, difficult, and not necessarily reliable. Additionally, replication uses schedules that may not fit in perfectly well with your given organization.

However, the actual process of setting up replication was mostly covered in your exam on Active Directory. On this certification exam, you'll be concentrating on understanding the scope of your replication as it pertains to DNS. Remember, there are four scope levels, which are summarized in Table 1.

Table 1. DNS Scope Replication Levels
Scope LevelEffect
ForestEvery DNS server in the forest receives replication.
DomainOnly DNS servers for the domain will be replicated.
Domain controller in domainEvery domain controller holds a copy of the DNS server information.
Domain controllers in a DNS applicationAll domain controllers with a copy of the application partition will receive replication.

4. DNS Server Requirements and Placement

The exact DNS server requirements of your organization will be based on the number of users, the amount of queries, and the amount of traffic that you see both externally and internally within your organization. As a general rule of thumb, a resource record (RR) will take up approximately 100 bytes of RAM. Thus, based on the number of users and records associated with your organization, you can use this accordingly. If you are in an organization with 10,000 users, you will require 1,000,000 bytes of RAM just for resource records that can be accessed thousands of times per second based on the amount of traffic flowing back and forth between your network.

In general, the basic rule of DNS server requirements is that the DNS server must be highly available and accessible to all users in your organization. In an ideal world, this would mean you could place a DNS server in every subnet, and each server would have an incredibly light load. However, for an organization with, say, 500 subnets, this is not very realistic. This problem literally doubles when you consider that the first rule of thumb with network design is that you plan for the worst and then expect the worst. So, this means you will naturally need a backup DNS server for each server you are using. And, in your ideal "500 subnet" design, you'd be using a paltry 1,000 servers purely for DNS—probably not a good idea.

Normally, DNS servers are accessed across a WAN link or across routers that are connected in such a way that allow for easy throughput. When placing your DNS servers in design questions on the certification exam, consider the speed or your WAN links as well as the speed of the given switches in the topology, and place your DNS server in the most logical area of your network in terms of accessibility.

It's pretty unlikely that you will be asked about this on your exam, but a good tip to keep in mind for the real world is that Microsoft estimates that WINS servers can support approximately 4,500 queries per minute and register about 1,500 names per minute.

Other -----------------
- Windows Server 2003 : Designing a Security Infrastructure - Providing Secure Network Administration
- SharePoint 2010 Disaster Recovery Development : Designing Applications for Disaster Recovery Readiness
- SharePoint 2010 Disaster Recovery Development : Rolling Your Own Backup and Restore Approach
- SharePoint 2010 Disaster Recovery Development : Volume Shadow Copy Service
- BizTalk 2010 Recipes : Business Activity Monitoring - Creating a Tracking Profile
- BizTalk 2010 Recipes : Business Activity Monitoring - Creating a BAM Service Request
- BizTalk 2010 Recipes : Business Activity Monitoring - Using the BAM Interceptor
- Exchange Server 2010 : Managing Anti-Spam and Antivirus Countermeasures (part 4)
- Exchange Server 2010 : Managing Anti-Spam and Antivirus Countermeasures (part 3) - Implementing File-Level Antivirus Scanning
- Exchange Server 2010 : Managing Anti-Spam and Antivirus Countermeasures (part 2) - Configuring Antivirus Features
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server