|
RAID, 151
Rainbow document, 129
RAS module (data center), 169
RAS (Remote Access Service) server, 168
RDC encryption levels, 49
RDC Remote Control, 49–51
RDC (Remote Desktop Connection), 37
Microsoft's design goals for, 47
vs. RDP Version 5.0, 47–48
Windows 2003 and, 47
RDC session administration, 50–52
RDC using RDP, OSs supported, 47
RDP client software architecture, 48–51
RDP clients
vs. ICA client, 431–432
local drive and COM port mapping, 455
RDP 5.0, Windows 2000 with, 46–47
RDP packet, 44
RDP (Remote Desktop Protocol), 33, 35, 38, 41–51, 72
data transmission optimization, 45
encapsulating screen data, 45
main API calls sent to, 45
RDP session
connection process, 42
diagram of, 36
disconnection process, 44
timeout values, 52
RDP Version 5.0 vs. RDC, 47–48
RDPDD, 45, 49
RDPWD (RDP Winstation Driver), 35
RDPWSX, 35, 41
Readiness phase (migration), 644
Real-time event and performance monitoring, 271
Reassignment pool (for PCs), 199
Reboot script, 655
Recovery point, 627
Recovery time, 627–628
Recovery time objectives, 628
Redundancy, 143–144, 151, 156
Redundant data centers, 18
Registry changes, replicated for all users, 400
Registry security, 61
Registry settings, 203
Registry (Windows), 56
32-bit applications and, 400
use of in multiuser environment, 59
Regulated industries, security policies of, 218–219
Regulatory compliance benefits of SBC, 18
Reliability (data center), 143
Reliability and redundancy, 21
Remote access, defined, 70
Remote access design, 126
Remote access support, 426
Remote administration of Terminal Server, 63
Remote branch office WAN access module, 162–165
Remote connection to server console, 65
Remote control, 46
Remote Desktop for Administration, 64–65
Remote Desktop Client, 38
Remote diagnostics, 258, 264
Remote office bandwidth, 12
Remote office bandwidth cost estimates, 695
Remote office connectivity, 15–17
Remote office data migration, 323–325
Remote office infrastructure, assessing, 322
Remote office infrastructures, 10–12, 322
Remote office LANs, 303
Remote office migration, planning for, 322–323
Remote office migration teams, 325–326
Remote office in PC-based environment, 10
Remote office in SBC environment, 11
Remote office server cost estimates, 695
Remote office server savings estimates, 698
Remote office users, 16
Remote user Internet access, 157–158, 167–168
Remote users, assessing cultural environment of, 289
Replicate Driver console, 612
Report formats (system management), 264
Reporting, MOM 2000, 271
Reporting SLA, 265
Reputation of the company, protection of, 218
RES PowerFuse, 344
Resiliency, network design for, 150–151
Resource pooling, 398
Resources
limiting access to local, 477–480
protecting, 217–218
Restricted security paradigm, 222
Reusable code, 148
Revision control system, 481
RFCs (requests for comments), 247
Risk assessment, 221
RM billing services, 268, 705
RM (Resource Manager), 88, 112, 266–268, 705
architecture diagram, 268
report detail, 706
for specific usage billing, 705
user delineation, 705
RMON (Remote Monitoring Agent), 248–249
Road kit, 326
Roaming profiles, 204–205, 458–459
Rogue applications, 146, 325
Rogue servers, 146
ROI savings estimates, 696–699
Rollout (enterprise SBC), 318–328
Root certificate, 453
RootDrive variable, 403
Round-trip latency, 443
Router configuration, private WAN, 552–553
Router trap, 261
Router-based bandwidth management, 179
Routing protocols and methods, 549–551
RTO Software (formerly Kevsoft), 344
|