Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing Server-Based Computing and the On-Demand Enterprise
Figure 1-1: SBC combines flexibility with low costs.
Figure 1-2: A typical remote office in a PC-based computing environment
Figure 1-3: A typical office utilizing enterprise server-based computing
Figure 1-4: A typical on-demand enterprise data center
Figure 1-5: A Wyse WinTerm Windows terminal
Figure 1-6: ABM Industries' on-demand enterprise infrastructure
Chapter 2: Windows Terminal Services
Figure 2-1: Execution of a multiuser Windows application
Figure 2-2: An RDP session
Figure 2-3: The connection process in an RDP session
Figure 2-4: The Terminal Services Manager application showing a disconnected session
Figure 2-5: The disconnection process in an RDP session
Figure 2-6: Remote Desktop Client remote control process
Figure 2-7: Setting timeout values for RDP sessions
Chapter 3: Citrix MetaFrame Access Suite
Figure 3-1: ICA presentation services
Figure 3-2: How SpeedScreen improves link performance
Figure 3-3: ICA's connectivity options
Figure 3-4: MetaFrame Secure Gateway example deployment
Figure 3-5: MSAM portal page screenshot
Chapter 4: Preparing Your Organization for an On-Demand Enterprise Implementation
Figure 4-1: ABM's user survey form
Chapter 5: Server-Based Computing Data Center Architecture
Figure 5-1: Legacy systems located near MetaFrame servers
Chapter 6: Designing Your Network for Server-Based Computing
Figure 6-1: Distributed vs. server-based network usage
Figure 6-2: Network design logical symbols
Figure 6-3: Typical LAN access module
Figure 6-4: Typical WLAN access module
Figure 6-5: Typical branch office WAN access module (dedicated media)
Figure 6-6: Typical branch office WAN access module (VPN router)
Figure 6-7: Typical branch office WAN access module (VPN hardware)
Figure 6-8: Typical branch office WAN access module (VPN firewall)
Figure 6-9: Typical data center VPN termination module
Figure 6-10: Typical data center Internet services access module
Figure 6-11: Typical data center RAS module
Figure 6-12: Frame relay vs. T1/E1 point-to-point connections
Figure 6-13: ATM data center network connected to frame relay
Figure 6-14: ISDN BRI and PRI structure
Figure 6-15: Network with a Packeteer PacketShaper
Figure 6-16: Denied session request
Figure 6-17: Bandwidth partitioning
Figure 6-18: Bandwidth prioritization
Figure 6-19: Packeteer analysis report
Figure 6-20: A small business network example
Figure 6-21: A medium-sized business network example (dedicated media)
Figure 6-22: A medium-sized business network example (Internet/VPN media)
Figure 6-23: A medium-sized business network example (Core)
Figure 6-24: A large business network example (distribution/core layer)
Figure 6-25: Large business distribution and core components
Chapter 7: The Client Environment
Figure 7-1: A Windows terminal with various embedded programs
Figure 7-2: The Web Interface application publishing architecture
Figure 7-3: A wireless tablet device accessing a Citrix MetaFrame server farm
Chapter 8: Security
Figure 8-1: Security model vs. user impact
Figure 8-2: Cisco Systems' Security Wheel
Figure 8-3: Implementation cost vs. risk
Figure 8-4: A distributed network in which each regional work site has its own resident file server
Figure 8-5: A centralized network in which the load-balanced file servers reside all in one place
Figure 8-6: Classic firewall system
Figure 8-7: The basic enterprise firewall system
Figure 8-8: MetaFrame Secure Gateway
Chapter 9: Network Management
Figure 9-1: The MIB hierarchy
Figure 9-2: SNMP communities
Figure 9-3: A security alert within an SME
Figure 9-4: Network discovery
Figure 9-5: Agent monitoring
Figure 9-6: Multisite network monitoring
Figure 9-7: Event correlation
Figure 9-8: Software distribution in an SBC environment
Figure 9-9: Software distribution in a distributed network
Figure 9-10: A daily report or hot sheet
Figure 9-11: RM architecture
Figure 9-12: The MOM Administrator Console
Part III: Implementing an On-Demand Server-Based Computing Environment
Figure 10-1: The Clinical Medical Equipment (CME) network schematic
Figure 10-2: The CME Corporate Campus topology
Chapter 10: Project Managing and Deploying an Enterprise SBC Environment
Figure 10-3: Organizational chart method of a work breakdown structure
Figure 10-4: Outline method of a work breakdown structure
Figure 10-5: Accessing legacy servers across the WAN
Figure 10-6: ABM's data migration procedure guidelines
Chapter 11: Server Configuration: Windows Terminal Services
Figure 11-1: Imaging
Figure 11-2: Scripting
Chapter 13: Application Installation and Configuration
Figure 13-1: Shadow key propagation
Figure 13-2: Deploying an application to a few servers
Figure 13-3: The conceptual design of a package-building process
Figure 13-4: The IM job creation process
Figure 13-5: Installation Manager server configurations
Chapter 14: Client Configuration and Deployment
Figure 14-1: The MetaFrame Web Interface site
Figure 14-2: A Terminal Server Advanced Client site
Figure 14-3: The SpeedScreen Browser Acceleration properties page
Figure 14-4: The SpeedScreen Latency utility
Chapter 15: Profiles, Policies, and Procedures
Figure 15-1: The Terminal Server profile path
Figure 15-2: User Profile Path
Figure 15-3: Profile processing
Figure 15-4: The Group Policy Management Console policy scope
Figure 15-5: The Group Policy Management Console Group Policy results
Figure 15-6: Creating a separate OU for MetaFrame servers
Figure 15-7: Creating a new Group Policy
Figure 15-8: Applying the Group Policy to the Citrix users group
Figure 15-9: Denying the Group Policy to the Domain Admins group
Figure 15-10: Enabling Group Policy loopback processing
Figure 15-11: Setting loopback mode to Replace
Figure 15-12: Settings for Application Data redirection
Chapter 16: Securing Client Access
Figure 16-1: The CME secure gateway diagram
Figure 16-2: Citrix components required for Secure Gateway Deployment
Figure 16-3: MetaFrame Management Console's XML port identification tab
Figure 16-4: The Web Interface configuration page
Figure 16-5: A custom Web Interface page showing the contents of a Microsoft folder
Figure 16-6: CME's full Secure Access Center deployment with Web Interface, Secure Gateway, and MSAM
Chapter 17: Network Configuration
Figure 17-1: The layered security hierarchy
Figure 17-2: The CME host naming scheme (partial)
Figure 17-3: Typical Private WAN site network
Figure 17-4: The CME-TNG site network
Figure 17-5: Typical private WAN Packeteer settings
Figure 17-6: A typical VPN WAN site network
Figure 17-7: The CME-EUR network
Figure 17-8: The CME-MEX Network
Figure 17-9: The CME-WEST network
Figure 17-10: CME Corp Internet Packeteer settings
Figure 17-11: CME Corp Internet, Security Perimeter, and VPN/firewall configuration
Figure 17-12: The Private WAN Distribution module
Figure 17-13: CME Corp Private WAN PacketShaper settings
Figure 17-14: Campus LAN access/distribution topology
Figure 17-15: Campus LAN access/distribution (partial)
Figure 17-16: The Campus WLAN access/distribution topology
Figure 17-17: The dual core module
Figure 17-18: The FEC adapter team
Figure 17-19: The FEC member adapter (general)
Figure 17-20: The FEC member adapter (link settings)
Figure 17-21: The FEC member adapter (power management)
Chapter 18: Printing
Figure 18-1: The auto-creation process
Figure 18-2: A locally attached printer
Figure 18-3: Network printer ICA
Figure 18-4: Network printer
Figure 18-5: The Printer Management Properties window
Figure 18-6: The Drivers tab of CMC
Figure 18-7: Driver compatibility
Figure 18-8: Driver mapping
Figure 18-9: The Auto-Creation Settings dialog box
Figure 18-10: The Drivers tab in the Print Server Properties dialog box
Figure 18-11: The Replicate Driver console
Chapter 19: Disaster Recovery and Business Continuity in the SBC Environment
Figure 19-1: Recovery time objectives
Figure 19-2: CME's network infrastructure
Chapter 20: Migration to Windows 2003 and Citrix MetaFrame XP
Figure 20-1: The CCS migration methodology
Chapter 21: Ongoing Administration of the Server-Based Computing Environment
Figure 21-1: Sample reboot script
Appendix A: Internetworking Basics
Figure A-1: Data flow and the OSI model
Figure A-2: Data encapsulation in the OSI model
Figure A-3: Common protocol suites versus the OSI model
Appendix B: Creating an On-Demand Enterprise Financial Analysis Model
Figure B-1: Demographics section of a financial justification model
Figure B-2: Logistics section of a financial justification model
Figure B-3: Costs section of a financial justification model
Figure B-4: Report section of a financial justification model
Appendix C: Creating an On-Demand Enterprise Subscription Billing Model
Figure C-1: Detail from RM report
Previous page
Table of content
Next page
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2003
Pages: 158
Authors:
Steve Kaplan
,
Tim Reeser
,
Alan Wood
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
IT Project Management Overview
Schedule Planning
Comprehensive Project Plan
Project Closure
Interprocess Communications in Linux: The Nooks and Crannies
Command-Line Values
Introduction
exec s Minions
Key Terms and Concepts
Key Terms and Concepts
VBScript Programmers Reference
Variables and Procedures
Error Handling and Debugging
Remote Scripting
Appendix F The Scripting Runtime Library Object Reference
Appendix G The Windows Script Host Object Model
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Cisco IPC Express Architecture Overview
Configuring Call Transfer and Forward
Step 4: Configuring Extensions and Phones
Summary
Troubleshooting the Database, LDAP, and Mailbox Activities
A Practitioners Guide to Software Test Design
The Testing Process
Pairwise Testing
Section II - White Box Testing Techniques
Section III - Testing Paradigms
Section V - Some Final Thoughts
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Multithreading
Network Programming
Windows Controls
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies