In the Company Network
Essay by Seanj11 • July 19, 2013 • Essay • 527 Words (3 Pages) • 1,563 Views
In order to enable the uses in the company network to connect to the internet host names, one has to do the various steps in configuration of the server. The initial step to take is to disable the recursion on the NS3 and NS2 server. This is followed by the enabling the ordering of the netmask on the NS1 server whereas the configuration the NS3 and the NS2 servers to use the NS1 server as a forwarder disabling the round robin on NS1. In disabling this recursion of the server NS2 forces the use and introduction of iterative queries which does not enhance them in resolving the external names (Carvalho, 2012). However, enabling the ordering of the netmask provides the most efficient results for client's orders but this does not enhance the internal clients in resolving the external addresses. Using the NS1 as a forwarder severs enhances successful name resolution for the internal clients. In round robin disabling, this will prohibit any further load balancing and hence will not enable the internal clients in resolving the external host names.
In this scenario the user are likely to suffer from many problems which may prevent them from obtaining IP addresses, these may include the expiry of the users IP address, the incorrect DHCP configuration, duplicate IP address on the same network and lack of DHCP server authorization. As a result of the introduction of the active directory in the network, this authorizes the DHCP server and the expiry of the users IP address stimulates the generation of a new IP address (Shapiro, 2008). This also prevents a computer from acquiring a new IP address by itself and thus prevents the DHCP missing which prevents users on network subnets to acquire new IP addresses. However, duplicate IP address prevents the user from communicating in the network but does not prevent the generation of a new IP address from the server.
A network lies on its network domain, in this context; some offices may be too small and located far away from the main company (Tomsho, 2010). It is too expensive to have those installed broadband and hence still requires internet connection and communication by the users on the company's network. To incorporate this small offices on the network we can use modem dongles which are connected to the main network through a virtual private network which uses registered authentication information from the active directory in the network this prevent unauthorized entry in to the network and as well as providing cheap access in the main network.
Employees of a company can enter into the network through the authorization given by the network administrators. This is through the registration of usernames and the generation of passwords by the active directory which gives each employee rights and limits to access the network resources. This can be used to control the access of network resources by different employees.
The use of centralized backups in WAN makes the sharing of
...
...