Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?
Figure 1.1: The four pillars of a mission-critical system.
Figure 1.2: How mission critical Exchange Server 2003 is organized.
Chapter 2: Public Enemy #1: Exchange Downtime
Figure 2.1: Illustrating lost client opportunity downtime measurement.
Figure 2.2: The cost of downtime.
Figure 2.3: The black box of Exchange downtime.
Figure 2.4: Categorizing the leading causes of downtime.
Chapter 3: The Heart of Exchange: Exchange Store Technology
Figure 3.1: Exchange storage design: version 5.5 and earlier.
Figure 3.2: Exchange Server 2000/2003 storage design.
Figure 3.3: Exchange 2000/2003 storage layout.
Figure 3.4: Exchange database logical view.
Figure 3.5: Message receive actions for Exchange Server Store.
Figure 3.6: Message move actions for Exchange Server Store.
Figure 3.7: Basic B-Tree database structure.
Figure 3.8: Exchange Extensible Storage Engine B-Tree structure.
Figure 3.9: Exchange ESE page structure.
Figure 3.10: The Exchange database engine at work.
Figure 3.11: Exchange transaction log file header format.
Figure 3.12: Example ESE transaction log file contents.
Figure 3.13: Interactions between ESE, ExIFS, and IIS when storing Exchange data.
Figure 3.14: Exchange single instance storage illustrated.
Chapter 4: When Exchange Servers Fall Down
Figure 4.1: The impacts of write-back caching on disk I/O operations.
Figure 4.2: ESEUTIL command line options and parameters.
Figure 4.3: Using the ESEFILE utility to check physical database page integrity.
Chapter 5: Protecting and Recovering Exchange Data
Figure 5.1: Exchange 2003 backup operation.
Figure 5.2: ESE’s patching operation during backup (Exchange 2000 SP1 and earlier).
Figure 5.3: Enabling ESE Page Zeroing in Exchange system manager.
Figure 5.4: Exchange 2003’s restore operation.
Figure 5.5: Snapshot technology illustrated.
Figure 5.6: Clone technology illustrated.
Figure 5.7: Windows Volume Shadow Copy Services architecture.
Figure 5.8: Typical VSS Shadow Copy operation.
Figure 5.9: Exchange 2000 recovery server scenario.
Figure 5.10: Exchange Server 2003’s Recovery Storage Group feature.
Chapter 6: Exchange Server Disaster-Recovery Best Practices
Figure 6.1: Exchange Server transacted storage architecture.
Figure 6.2: Partitioned versus monolithic storage in Exchange Server.
Figure 6.3: Comparing backup strategies in terms of time, tapes, and volume.
Figure 6.4: Using snapshot/ clone (BCV) technology with Exchange Server.
Chapter 7: Mission-Critical Server and Storage Technologies
Figure 7.1: Typical simplified server architecture.
Figure 7.2: Server outages due to memory failures.
Figure 7.3: Illustration of RAID levels 0, 1, 0+1, and 5.
Figure 7.4: FCAL-based storage attachment.
Figure 7.5: FCS-based storage attachment.
Figure 7.6: The paradigm shift from host-based storage to networkbased storage.
Figure 7.7: Using data replication with Exchange Server.
Figure 7.8: Implementation of software-based data-replication technology
Figure 7.9: An illustration of BCVClone.
Figure 7.10: Illustration of BCVSnap.
Figure 7.11: Using NAS with Exchange server.
Figure 7.12: Optimizing performance: separation of random and sequential I/O.
Chapter 8: Leveraging Exchange Clusters
Figure 8.1: Microsoft’s three-pronged approach to clustering.
Figure 8.2: Comparing shared nothing to shared disk cluster architectures.
Figure 8.3: A basic two-node MSCS configuration.
Figure 8.4: MSCS architecture and components.
Figure 8.5: The Exchange Cluster Administration DLL and the Exchange resource DLL.
Figure 8.6: Exchange 2000 Cluster resource dependency tree.
Figure 8.7: Windows virtual memory model.
Figure 8.8: Exchange Server 2003 Cluster resource dependency tree.
Figure 8.9: Cluster service interaction with Exchange 2003 via IsAlive and LooksAlive.
Figure 8.10: Exchange 2003 Cluster design utilizing mount points.
Figure 8.11: 4-Node (N+1) Exchange 2003 Cluster configuration (7,500 users).
Figure 8.12: 2-Node (A/A) Exchange 2003 Cluster configuration (4,000 users).
Figure 8.13: Configuring Exchange system attendant resource dependencies.
Figure 8.14: Exchange Cluster View from Cluster Administrator.
Figure 8.15: Exchange Cluster view from Exchange System Manager.
Chapter 9: Locking Down Mission-Critical Exchange Servers
Figure 9.1: ient authentication to Exchange using Windows Kerberos.
Figure 9.2: Kerberos authentication used with an Exchange front-end/back-end architecture.
Figure 9.3: Windows and Exchange services dependencies.
Figure 9.4: Example of firewall architecture Alpha.
Figure 9.5: Example of firewall architecture Bravo.
Figure 9.6: Example of firewall architecture Charlie.
Figure 9.7: On access virus scanning mode.
Figure 9.8: Proactive virus scanning mode.
Figure 9.9: Background virus scanning mode.
Figure 9.10: Exchange 2003/ Outlook 2003 end-to-end antispam solution.
Figure 9.11: A simplified PKI design.
Chapter 10: Proactive Management for Mission-Critical Exchange Servers
Figure 10.1: A three-pronged approach to proactive management.
Figure 10.2: Performance monitoring with Windows Server System Monitor.
Figure 10.3: HP’s Insight Manager version control feature.
Figure 10.4: Example of MOM architecture for Exchange monitoring.
Figure 10.5: Microsoft Operations Manager console view.
Previous page
Table of content
Next page
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Four Ways in Which You Can Respond to Risk
Who Are the Attackers?
Performing the Assessment
Preparing for Analysis
Contents of a Good Report
The Complete Cisco VPN Configuration Guide
IPsec
WebVPN Remote Access
Verifying and Troubleshooting Concentrator Connections
Summary
WebVPN
InDesign Type: Professional Typography with Adobe InDesign CS2
Footnotes
Discretionary Ligatures
Swash Characters
Creating Default Styles
Gradient Type
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Value Stream Mapping and Process Flow Tools
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Complexity Value Stream Mapping and Complexity Analysis
What is Lean Six Sigma
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Six Things Managers Must Do: How to Support Lean Six Sigma
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Window Object
Conclusion
Creating a Data-Bound Customized Spreadsheet with VSTO
Conclusion
An End-to-End Scenario: Creating a Schema and Mapping It into a Word Document
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies