Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Scenario 1: Running JetPack.exe

A DHCP database has grown to more than 50 MB in size, and various, random issues have been happening. Attempting to run jetpack dhcp.mdb temp.mdb from C:WindowsSystem32dhcp does not work. You realize that jetpack.exe can be found only within the subdirectories of C:WindowsWinSxS. You copy jetpack.exe from within that subdirectory and place it into the C:WindowsSystem32dhcp folder and attempt to run jetpack dhcp.mdb temp.mdb again, only to find a different error arises.

Describe how to successfully run the jetpack executable with the least amount of headache.

You are the administrator for the Contoso Corporation. Recently, the DHCP server failed. To fix the problem, you had to fix the server and restore from backup. You want to make the server fault tolerant in case it fails again in the future. In addition, you want to ensure that you add additional sites, and you want to allow the servers to handle a bigger load. Describe your recommended solution.

You are an administrator of the Contoso Corporation, which has a forest root domain called contoso.com. There are subdomains in three trees: Eu.Contoso.com, US.contoso.com, and adatum.com. The CTO has asked you to recommend an IPAM deployment option but wants each domain administrator to have full control of the infrastructure in her own domain. Describe your recommended course of action.

You are setting up an IPAM solution for your Active Directory forest that contains a single domain (adatum.com). All domain controllers are currently running Windows Server 2012 or Windows Server 2016. The forest and domain functional levels are at Windows Server 2012. Your CTO has asked you to ensure that you can manage all DHCP and DNS servers from the IPAM server. Describe your recommended course of action.

You are an administrator at a corporate office with 12 remote sites. Each remote site has a site server that also acts as a router. When you look at each of the servers, you realize that the previous administrator used the route command to specify static routes. However, as you have had to perform maintenance and move some of the network connections, you find it difficult to modify all of the servers to reflect the changes. In addition, you will be adding four more sites over the next six months. Describe the recommendation you will propose to management to avoid purchasing additional network equipment.

You are an administrator for a sales organization and your manager requests that you install a VPN server so that users can access internal network data while they are off-site with sales customers. Your manager wants you to make the VPN server as secure as possible with the VPN technologies that appear in this lesson. Describe how to configure the server.

You are an administrator with the Contoso Corporation, which has about 1,100 users. Of those 1,100 users, 200 users use VPN to connect to the organization network when they are not in the office. You are having trouble keeping the clients updated and performing other maintenance tasks as needed because these clients are often not connected to the network. Describe your recommended course of action.

As the administrator for a company, you are installing DirectAccess on an internal server. You need to configure the Network Location Server (NLS), but, first, your manager needs you to explain NLS and describe its requirements.

Scenario 1: Running JetPack.exe

The successful running of the jetpack.exe needs to avoid we need to scan our systems from the viruses as virus are sometimes disguised in the .exe files with the help of the spamming emails or other malicious programs. The validity of the .exe files is questionable for the windows32 (Panek, 2017). The location of the .exe files also causes numerous errors while running the file. The errors associated to the jetpack.exe is one of the numerous factors contributing to the errors in the executable jetpack.exe. The jetpack executable files should be installed in such a situation when the any other executable files are open in the terminal even during the starting of the windows and the shutdown of the windows.

In order to handle a bigger load in the DHCP server, scope extension, re-sub netting and super scoping are the perfect recommendations.

Scope extension: All the available address of the given sub net should not be included at once with in the server. The number of addresses should be increased by extending the start address or the end address.

Re-sub netting: The subnet hosts and gateways should be changed in the subnet masks, frequently and larger share of host addresses (Lemon & Mrugalski, 2016). New subnet masks should be used to increase the load of the DHCP server. Additional overheads on the subnet routers and the gateways can be minimized with the help of resub netting.

Supers coping: The addition of the logical networks can be very much useful for increasing the load capacity of the DHCP server. Performance of the networking unit can be modified with the help of this technique, as communication with the hosts are easier with the help of the super scoping as the logical subnets share same physical wire.

Distributed implementation of the IPAM is the ideal recommendation which can be given to Contoso Corporation as an administrator. This organization must be having Information technology team in each of the departments of this business organization so that the implementation process is conducted in a structured manner. Each domain administrators associated with each of the department should be able to own their IP addresses. The IPAM server should be included in all the three subdomains of this corporation which is the US.contoso.com, adatum.com, Eu.Contoso.com. The full control of the networking infrastructures will be on the hand of the CTO of the organization (Thomas, 2017). Additions features as per requirement additions feature can also be added by the domain administrator of this organization to the form the IP address management (IPAM).

Management of the DNS server in the windows server 2012 depends on the type of data collection and the DNS zone management which are needed to be done in a frequent manner. Creation of the primary, secondary and the stub zones are one of the most essential aspects of the management of the DNS servers which is highly recommended in order to resolve the compatibility issues related to the IPAM server (Taleb, Hadjadj-Aoul & Samdanis, 2015). The resource record management of the DNS should be done in an effective manner so that the different types of records supported by the DNS can be solved effectively.

Scenario 2: Configuring DHCP High Availability

Management of the DHCP server of the IPAM server considering the windows server 2012 should be evaluated frequently as the load changes with time and complexity associated to the servers keeps on piling up. New subnets and scopes must be added to the DHCP servers after the scanning process.

Additional network equipment’s in the corporate office can be avoided with the help of the existing route commands which was used by the previous network administrator as the new sites which are about to be added to the existing sites can be managed effectively with the help of the ADD command of the static route followed by the gateway and the subnet masks. The known routes of the new sites should be manually entered by the network administrators which will be helping the static routes to come in. The only problems associated with the new sites will be the issues associated with rebooting (Drew, 2017). Modification od the servers can be avoided with the help of the stated discussions. Network connections will not be affected if the known routes are entered manually by the network administrators. The performance of the network will not at be affected as there are complexities which arises with the automatic selection of the known routes.

As an administrator of a sales organization Virtual private network plays a huge role in managing the external network data along with the internal network data which is a must in every sales organizations as it always needs access to the corporate networks to enhance the sales force of the organization. Careful evaluation of the subnets and IP masking is a must before the installation of the VPN server in this sales organization as it might have direct negative role to maintain the reputation of the organization considering their clients. The conflicts associated to the IP is one of the major issues of the installation of the VRN servers along with the compatibilities of the latest VPN technologies (Henke, 2017). Configurations process should be started with help of the manage network connections in the vista operating system or change adaptor settings of the windows 7. New incoming connections should be established in the systems; security of the VPN server most depends upon the access of the VPN access. Customized accounts are much safer than the already created accounts as there are lots of other networking issues related to those accounts. The secure protocols are needed to be chosen for establishing the connection of the VPN servers. Access should be given to only the concerned stakeholders of this sales organization so that security and integrity is maintained. The third party firewalls help in the maintaining the server security so it is highly recommended to be integrated in the new VPN servers.

The connections to the network for the clients which are not always connected to the network can be improved with the help of fast and free VPN services such as the TorGuard VPN, Golden FROG Vypr VPN and Tunnel Bear VPN and Private internet access VPN. The clients of this organization can stay updated with the corporation with the help of these faster VPN programs (Li, Liu & Qin, 2015). The security measures of this organizations should be checked and limited so that there are no issues with the performance of the maintenance tasks of the VPN servers. The existing connection can be improved significantly considering the clients who are not always connected to the office network with the help of the stated VPN services.

Every direct access deployment in a business organization depends entirely upon the Network Location Server. The security of the private network is a very important networking criteria so as the administrator of this company it is very much important to understand the detailed functionality of the Network Location Server. The external threats associated with the networking security can be managed with the help of NLS (Hicks, 2016). The categorization of the internal threats and external threats can be done in a more useful way with the help of the NLS. The other most important specification of the NLS is its notification feature during any kind of changes in the network due to the activities of the threats.

References

Drew, P. (2017). Using Route Forwarding State to Identify Routing Errors in Mission-Critical, Military Data Networks.

Henke, M. (2017). iOS VPN on-demand profile with OpenVPN.

Hicks, R. M. (2016). Configure DirectAccess with the Remote Access Setup Wizard. In Implementing DirectAccess with Windows Server 2016 (pp. 57-82). Apress, Berkeley, CA.

Lemon, T., & Mrugalski, T. (2016). Customizing DHCP Configuration on the Basis of Network Topology (No. RFC 7969).

Li, Q., Liu, P., & Qin, Z. (2015). A Stealthy Attack Against Tor Guard Selection. International Journal of Security and Its Applications, 9(11), 391-402.

Panek, W. (2017). MCSA Windows Server 2016 Study Guide: Exam 70-741. John Wiley & Sons.

Taleb, T., Hadjadj-Aoul, Y., & Samdanis, K. (2015). Efficient solutions for enhancing data traffic management in 3GPP networks. IEEE Systems Journal, 9(2), 519-528.

Thomas, O. (2017). Windows Server 2016 Inside Out (includes Current Book Service). Microsoft Press.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Practical Solutions For Various Windows Server Issues: An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/itec250-network-infrastructure/how-to-run-the-jetpack-executable.html.

"Practical Solutions For Various Windows Server Issues: An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/itec250-network-infrastructure/how-to-run-the-jetpack-executable.html.

My Assignment Help (2021) Practical Solutions For Various Windows Server Issues: An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/itec250-network-infrastructure/how-to-run-the-jetpack-executable.html
[Accessed 13 November 2024].

My Assignment Help. 'Practical Solutions For Various Windows Server Issues: An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itec250-network-infrastructure/how-to-run-the-jetpack-executable.html> accessed 13 November 2024.

My Assignment Help. Practical Solutions For Various Windows Server Issues: An Essay. [Internet]. My Assignment Help. 2021 [cited 13 November 2024]. Available from: https://myassignmenthelp.com/free-samples/itec250-network-infrastructure/how-to-run-the-jetpack-executable.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close