Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Has Anyone Seen My Mission-Critical Microsoft Exchange Server?
Figure 1.1: The four pillars of a mission-critical system.
Figure 1.2: How mission critical Exchange Server 2003 is organized.
Chapter 2: Public Enemy #1: Exchange Downtime
Figure 2.1: Illustrating lost client opportunity downtime measurement.
Figure 2.2: The cost of downtime.
Figure 2.3: The black box of Exchange downtime.
Figure 2.4: Categorizing the leading causes of downtime.
Chapter 3: The Heart of Exchange: Exchange Store Technology
Figure 3.1: Exchange storage design: version 5.5 and earlier.
Figure 3.2: Exchange Server 2000/2003 storage design.
Figure 3.3: Exchange 2000/2003 storage layout.
Figure 3.4: Exchange database logical view.
Figure 3.5: Message receive actions for Exchange Server Store.
Figure 3.6: Message move actions for Exchange Server Store.
Figure 3.7: Basic B-Tree database structure.
Figure 3.8: Exchange Extensible Storage Engine B-Tree structure.
Figure 3.9: Exchange ESE page structure.
Figure 3.10: The Exchange database engine at work.
Figure 3.11: Exchange transaction log file header format.
Figure 3.12: Example ESE transaction log file contents.
Figure 3.13: Interactions between ESE, ExIFS, and IIS when storing Exchange data.
Figure 3.14: Exchange single instance storage illustrated.
Chapter 4: When Exchange Servers Fall Down
Figure 4.1: The impacts of write-back caching on disk I/O operations.
Figure 4.2: ESEUTIL command line options and parameters.
Figure 4.3: Using the ESEFILE utility to check physical database page integrity.
Chapter 5: Protecting and Recovering Exchange Data
Figure 5.1: Exchange 2003 backup operation.
Figure 5.2: ESE’s patching operation during backup (Exchange 2000 SP1 and earlier).
Figure 5.3: Enabling ESE Page Zeroing in Exchange system manager.
Figure 5.4: Exchange 2003’s restore operation.
Figure 5.5: Snapshot technology illustrated.
Figure 5.6: Clone technology illustrated.
Figure 5.7: Windows Volume Shadow Copy Services architecture.
Figure 5.8: Typical VSS Shadow Copy operation.
Figure 5.9: Exchange 2000 recovery server scenario.
Figure 5.10: Exchange Server 2003’s Recovery Storage Group feature.
Chapter 6: Exchange Server Disaster-Recovery Best Practices
Figure 6.1: Exchange Server transacted storage architecture.
Figure 6.2: Partitioned versus monolithic storage in Exchange Server.
Figure 6.3: Comparing backup strategies in terms of time, tapes, and volume.
Figure 6.4: Using snapshot/ clone (BCV) technology with Exchange Server.
Chapter 7: Mission-Critical Server and Storage Technologies
Figure 7.1: Typical simplified server architecture.
Figure 7.2: Server outages due to memory failures.
Figure 7.3: Illustration of RAID levels 0, 1, 0+1, and 5.
Figure 7.4: FCAL-based storage attachment.
Figure 7.5: FCS-based storage attachment.
Figure 7.6: The paradigm shift from host-based storage to networkbased storage.
Figure 7.7: Using data replication with Exchange Server.
Figure 7.8: Implementation of software-based data-replication technology
Figure 7.9: An illustration of BCVClone.
Figure 7.10: Illustration of BCVSnap.
Figure 7.11: Using NAS with Exchange server.
Figure 7.12: Optimizing performance: separation of random and sequential I/O.
Chapter 8: Leveraging Exchange Clusters
Figure 8.1: Microsoft’s three-pronged approach to clustering.
Figure 8.2: Comparing shared nothing to shared disk cluster architectures.
Figure 8.3: A basic two-node MSCS configuration.
Figure 8.4: MSCS architecture and components.
Figure 8.5: The Exchange Cluster Administration DLL and the Exchange resource DLL.
Figure 8.6: Exchange 2000 Cluster resource dependency tree.
Figure 8.7: Windows virtual memory model.
Figure 8.8: Exchange Server 2003 Cluster resource dependency tree.
Figure 8.9: Cluster service interaction with Exchange 2003 via IsAlive and LooksAlive.
Figure 8.10: Exchange 2003 Cluster design utilizing mount points.
Figure 8.11: 4-Node (N+1) Exchange 2003 Cluster configuration (7,500 users).
Figure 8.12: 2-Node (A/A) Exchange 2003 Cluster configuration (4,000 users).
Figure 8.13: Configuring Exchange system attendant resource dependencies.
Figure 8.14: Exchange Cluster View from Cluster Administrator.
Figure 8.15: Exchange Cluster view from Exchange System Manager.
Chapter 9: Locking Down Mission-Critical Exchange Servers
Figure 9.1: ient authentication to Exchange using Windows Kerberos.
Figure 9.2: Kerberos authentication used with an Exchange front-end/back-end architecture.
Figure 9.3: Windows and Exchange services dependencies.
Figure 9.4: Example of firewall architecture Alpha.
Figure 9.5: Example of firewall architecture Bravo.
Figure 9.6: Example of firewall architecture Charlie.
Figure 9.7: On access virus scanning mode.
Figure 9.8: Proactive virus scanning mode.
Figure 9.9: Background virus scanning mode.
Figure 9.10: Exchange 2003/ Outlook 2003 end-to-end antispam solution.
Figure 9.11: A simplified PKI design.
Chapter 10: Proactive Management for Mission-Critical Exchange Servers
Figure 10.1: A three-pronged approach to proactive management.
Figure 10.2: Performance monitoring with Windows Server System Monitor.
Figure 10.3: HP’s Insight Manager version control feature.
Figure 10.4: Example of MOM architecture for Exchange monitoring.
Figure 10.5: Microsoft Operations Manager console view.
Previous page
Table of content
Next page
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors:
Jerry Cochran
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Practice: Performance Requirements Cards
Speculate Summary
Practice: Workload Management
Practice: Daily Team Integration Meetings
Self-Organization Extensions
Absolute Beginner[ap]s Guide to Project Management
How Does Defining a Project Relate to Project Planning?
Best Practices
Best Practices
Managing Project Risks
The Common Sources of Project Risk
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
Line-Scan Cameras
Video Standards
Other Image Sources
Image Analysis
The CISSP and CAP Prep Guide: Platinum Edition
Legal, Regulations, Compliance, and Investigations
Physical (Environmental) Security
Understanding Certification and Accreditation
The Certification Phase
Appendix B Glossary of Terms and Acronyms
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Choreography
Common principles of service-orientation
Benefits of a business-centric SOA
Fundamental WS-* Extensions
A.2. Transit Line Systems Inc.
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
3-D Layers from Photoshop Layers
Static Matte Painting in Photoshop
Motion Matte Painting in Photoshop
Atmosphere, Film, and Noise Effects
Appendix Adobe Photoshop and After Effects Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies