List of Figures


Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?

Figure 1.1: The four pillars of a mission-critical system.
Figure 1.2: How mission critical Exchange Server 2003 is organized.

Chapter 2: Public Enemy #1: Exchange Downtime

Figure 2.1: Illustrating lost client opportunity downtime measurement.
Figure 2.2: The cost of downtime.
Figure 2.3: The black box of Exchange downtime.
Figure 2.4: Categorizing the leading causes of downtime.

Chapter 3: The Heart of Exchange: Exchange Store Technology

Figure 3.1: Exchange storage design: version 5.5 and earlier.
Figure 3.2: Exchange Server 2000/2003 storage design.
Figure 3.3: Exchange 2000/2003 storage layout.
Figure 3.4: Exchange database logical view.
Figure 3.5: Message receive actions for Exchange Server Store.
Figure 3.6: Message move actions for Exchange Server Store.
Figure 3.7: Basic B-Tree database structure.
Figure 3.8: Exchange Extensible Storage Engine B-Tree structure.
Figure 3.9: Exchange ESE page structure.
Figure 3.10: The Exchange database engine at work.
Figure 3.11: Exchange transaction log file header format.
Figure 3.12: Example ESE transaction log file contents.
Figure 3.13: Interactions between ESE, ExIFS, and IIS when storing Exchange data.
Figure 3.14: Exchange single instance storage illustrated.

Chapter 4: When Exchange Servers Fall Down

Figure 4.1: The impacts of write-back caching on disk I/O operations.
Figure 4.2: ESEUTIL command line options and parameters.
Figure 4.3: Using the ESEFILE utility to check physical database page integrity.

Chapter 5: Protecting and Recovering Exchange Data

Figure 5.1: Exchange 2003 backup operation.
Figure 5.2: ESE’s patching operation during backup (Exchange 2000 SP1 and earlier).
Figure 5.3: Enabling ESE Page Zeroing in Exchange system manager.
Figure 5.4: Exchange 2003’s restore operation.
Figure 5.5: Snapshot technology illustrated.
Figure 5.6: Clone technology illustrated.
Figure 5.7: Windows Volume Shadow Copy Services architecture.
Figure 5.8: Typical VSS Shadow Copy operation.
Figure 5.9: Exchange 2000 recovery server scenario.
Figure 5.10: Exchange Server 2003’s Recovery Storage Group feature.

Chapter 6: Exchange Server Disaster-Recovery Best Practices

Figure 6.1: Exchange Server transacted storage architecture.
Figure 6.2: Partitioned versus monolithic storage in Exchange Server.
Figure 6.3: Comparing backup strategies in terms of time, tapes, and volume.
Figure 6.4: Using snapshot/ clone (BCV) technology with Exchange Server.

Chapter 7: Mission-Critical Server and Storage Technologies

Figure 7.1: Typical simplified server architecture.
Figure 7.2: Server outages due to memory failures.
Figure 7.3: Illustration of RAID levels 0, 1, 0+1, and 5.
Figure 7.4: FCAL-based storage attachment.
Figure 7.5: FCS-based storage attachment.
Figure 7.6: The paradigm shift from host-based storage to networkbased storage.
Figure 7.7: Using data replication with Exchange Server.
Figure 7.8: Implementation of software-based data-replication technology
Figure 7.9: An illustration of BCVClone.
Figure 7.10: Illustration of BCVSnap.
Figure 7.11: Using NAS with Exchange server.
Figure 7.12: Optimizing performance: separation of random and sequential I/O.

Chapter 8: Leveraging Exchange Clusters

Figure 8.1: Microsoft’s three-pronged approach to clustering.
Figure 8.2: Comparing shared nothing to shared disk cluster architectures.
Figure 8.3: A basic two-node MSCS configuration.
Figure 8.4: MSCS architecture and components.
Figure 8.5: The Exchange Cluster Administration DLL and the Exchange resource DLL.
Figure 8.6: Exchange 2000 Cluster resource dependency tree.
Figure 8.7: Windows virtual memory model.
Figure 8.8: Exchange Server 2003 Cluster resource dependency tree.
Figure 8.9: Cluster service interaction with Exchange 2003 via IsAlive and LooksAlive.
Figure 8.10: Exchange 2003 Cluster design utilizing mount points.
Figure 8.11: 4-Node (N+1) Exchange 2003 Cluster configuration (7,500 users).
Figure 8.12: 2-Node (A/A) Exchange 2003 Cluster configuration (4,000 users).
Figure 8.13: Configuring Exchange system attendant resource dependencies.
Figure 8.14: Exchange Cluster View from Cluster Administrator.
Figure 8.15: Exchange Cluster view from Exchange System Manager.

Chapter 9: Locking Down Mission-Critical Exchange Servers

Figure 9.1: ient authentication to Exchange using Windows Kerberos.
Figure 9.2: Kerberos authentication used with an Exchange front-end/back-end architecture.
Figure 9.3: Windows and Exchange services dependencies.
Figure 9.4: Example of firewall architecture Alpha.
Figure 9.5: Example of firewall architecture Bravo.
Figure 9.6: Example of firewall architecture Charlie.
Figure 9.7: On access virus scanning mode.
Figure 9.8: Proactive virus scanning mode.
Figure 9.9: Background virus scanning mode.
Figure 9.10: Exchange 2003/ Outlook 2003 end-to-end antispam solution.
Figure 9.11: A simplified PKI design.

Chapter 10: Proactive Management for Mission-Critical Exchange Servers

Figure 10.1: A three-pronged approach to proactive management.
Figure 10.2: Performance monitoring with Windows Server System Monitor.
Figure 10.3: HP’s Insight Manager version control feature.
Figure 10.4: Example of MOM architecture for Exchange monitoring.
Figure 10.5: Microsoft Operations Manager console view.




Mission-Critical Microsoft Exchange 2003. Designing and Building Reliable Exchange Servers
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors: Jerry Cochran

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net