Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?
Figure 1.1: The four pillars of a mission-critical system.
Figure 1.2: How mission critical Exchange Server 2003 is organized.
Chapter 2: Public Enemy #1: Exchange Downtime
Figure 2.1: Illustrating lost client opportunity downtime measurement.
Figure 2.2: The cost of downtime.
Figure 2.3: The black box of Exchange downtime.
Figure 2.4: Categorizing the leading causes of downtime.
Chapter 3: The Heart of Exchange: Exchange Store Technology
Figure 3.1: Exchange storage design: version 5.5 and earlier.
Figure 3.2: Exchange Server 2000/2003 storage design.
Figure 3.3: Exchange 2000/2003 storage layout.
Figure 3.4: Exchange database logical view.
Figure 3.5: Message receive actions for Exchange Server Store.
Figure 3.6: Message move actions for Exchange Server Store.
Figure 3.7: Basic B-Tree database structure.
Figure 3.8: Exchange Extensible Storage Engine B-Tree structure.
Figure 3.9: Exchange ESE page structure.
Figure 3.10: The Exchange database engine at work.
Figure 3.11: Exchange transaction log file header format.
Figure 3.12: Example ESE transaction log file contents.
Figure 3.13: Interactions between ESE, ExIFS, and IIS when storing Exchange data.
Figure 3.14: Exchange single instance storage illustrated.
Chapter 4: When Exchange Servers Fall Down
Figure 4.1: The impacts of write-back caching on disk I/O operations.
Figure 4.2: ESEUTIL command line options and parameters.
Figure 4.3: Using the ESEFILE utility to check physical database page integrity.
Chapter 5: Protecting and Recovering Exchange Data
Figure 5.1: Exchange 2003 backup operation.
Figure 5.2: ESE’s patching operation during backup (Exchange 2000 SP1 and earlier).
Figure 5.3: Enabling ESE Page Zeroing in Exchange system manager.
Figure 5.4: Exchange 2003’s restore operation.
Figure 5.5: Snapshot technology illustrated.
Figure 5.6: Clone technology illustrated.
Figure 5.7: Windows Volume Shadow Copy Services architecture.
Figure 5.8: Typical VSS Shadow Copy operation.
Figure 5.9: Exchange 2000 recovery server scenario.
Figure 5.10: Exchange Server 2003’s Recovery Storage Group feature.
Chapter 6: Exchange Server Disaster-Recovery Best Practices
Figure 6.1: Exchange Server transacted storage architecture.
Figure 6.2: Partitioned versus monolithic storage in Exchange Server.
Figure 6.3: Comparing backup strategies in terms of time, tapes, and volume.
Figure 6.4: Using snapshot/ clone (BCV) technology with Exchange Server.
Chapter 7: Mission-Critical Server and Storage Technologies
Figure 7.1: Typical simplified server architecture.
Figure 7.2: Server outages due to memory failures.
Figure 7.3: Illustration of RAID levels 0, 1, 0+1, and 5.
Figure 7.4: FCAL-based storage attachment.
Figure 7.5: FCS-based storage attachment.
Figure 7.6: The paradigm shift from host-based storage to networkbased storage.
Figure 7.7: Using data replication with Exchange Server.
Figure 7.8: Implementation of software-based data-replication technology
Figure 7.9: An illustration of BCVClone.
Figure 7.10: Illustration of BCVSnap.
Figure 7.11: Using NAS with Exchange server.
Figure 7.12: Optimizing performance: separation of random and sequential I/O.
Chapter 8: Leveraging Exchange Clusters
Figure 8.1: Microsoft’s three-pronged approach to clustering.
Figure 8.2: Comparing shared nothing to shared disk cluster architectures.
Figure 8.3: A basic two-node MSCS configuration.
Figure 8.4: MSCS architecture and components.
Figure 8.5: The Exchange Cluster Administration DLL and the Exchange resource DLL.
Figure 8.6: Exchange 2000 Cluster resource dependency tree.
Figure 8.7: Windows virtual memory model.
Figure 8.8: Exchange Server 2003 Cluster resource dependency tree.
Figure 8.9: Cluster service interaction with Exchange 2003 via IsAlive and LooksAlive.
Figure 8.10: Exchange 2003 Cluster design utilizing mount points.
Figure 8.11: 4-Node (N+1) Exchange 2003 Cluster configuration (7,500 users).
Figure 8.12: 2-Node (A/A) Exchange 2003 Cluster configuration (4,000 users).
Figure 8.13: Configuring Exchange system attendant resource dependencies.
Figure 8.14: Exchange Cluster View from Cluster Administrator.
Figure 8.15: Exchange Cluster view from Exchange System Manager.
Chapter 9: Locking Down Mission-Critical Exchange Servers
Figure 9.1: ient authentication to Exchange using Windows Kerberos.
Figure 9.2: Kerberos authentication used with an Exchange front-end/back-end architecture.
Figure 9.3: Windows and Exchange services dependencies.
Figure 9.4: Example of firewall architecture Alpha.
Figure 9.5: Example of firewall architecture Bravo.
Figure 9.6: Example of firewall architecture Charlie.
Figure 9.7: On access virus scanning mode.
Figure 9.8: Proactive virus scanning mode.
Figure 9.9: Background virus scanning mode.
Figure 9.10: Exchange 2003/ Outlook 2003 end-to-end antispam solution.
Figure 9.11: A simplified PKI design.
Chapter 10: Proactive Management for Mission-Critical Exchange Servers
Figure 10.1: A three-pronged approach to proactive management.
Figure 10.2: Performance monitoring with Windows Server System Monitor.
Figure 10.3: HP’s Insight Manager version control feature.
Figure 10.4: Example of MOM architecture for Exchange monitoring.
Figure 10.5: Microsoft Operations Manager console view.
Previous page
Table of content
Next page
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Summary
Defining the Input and Output Functions in PostgreSQL
Defining the Data Type in PostgreSQL
Client 2Adding Error Checking
Internationalization and Localization
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 10. Georeference Digital Photos
Hack 38. Add Location to Weblogs and RSS Feeds
Hack 50. The Serial Port to USB Conundrum
Hack 65. Extract Data from Maps with Manifold
Hack 74. Plot Wireless Network Viewsheds with GRASS
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
3-D Layers from Photoshop Layers
Blue-Screen Garbage Mattes
Rotoscoping Techniques with Photoshop
Making Movies from Stills
GDI+ Programming with C#
Understanding GDI+
Working with Text and Strings
Coordinate Systems
Printing
Miscellaneous GDI+ Examples
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies