Planning IPv6 Addressing To plan an efficient IPv6 addressing strategy, you must understand how IPv6 addressing works. IPv6 addressing is a major departure from IPv4 addressing. The most obvious difference is that IPv4 uses 4‑byte sou Citeste tot ...
Dimensiune
Overview of Deploying ASP
Overview of Deploying ASP.NET Applications in IIS 6.0 ASP.NET is a unified Web application platform that provides services to help you build and deploy enterprise-class Web applications and XML-based Web services. ASP.NET is supported on th Citeste tot ...
Dimensiune
Deciding Whether to Perform an Upgrade or a Clean Installation
Deciding Whether to Perform an Upgrade or a Clean Installation Unlike other automated installation methods, such as image-based and RIS installations, an unattended installation can be configured to perform a clean installation or an upgrad Citeste tot ...
Dimensiune
Enabling IPv4 Applications for IPv6
Enabling IPv4 Applications for IPv6 You can use the PortProxy service as an application-layer gateway for nodes or applications that do not support IPv6. PortProxy facilitates the communication between nodes or applications that cannot connect Citeste tot ...
Dimensiune
Additional Resources
Additional Resources These resources contain additional information and tools related to this chapter. Related Information · “Choosing an Automated Installation Method” in this book for more Citeste tot ...
Dimensiune
Memory Protection Technologies
Memory Protection Technologies Microsoft Corporation Published: April 30, 2004 Authors: Starr Andersen, Technical Writer, Vincent Abella, Technical Editor This document is Part 3 of “Changes to Functionality in Win Citeste tot ...
Dimensiune
Designing an IP Addressing Scheme
Designing an IP Addressing Scheme Before assigning addresses, design an IP addressing scheme that meets the requirements of your networking infrastructure. Figure 1.5 shows the tasks involved in designing your IP addressing system, inc Citeste tot ...
Dimensiune
Developing Routing Strategies
Developing Routing Strategies After planning your network infrastructure based on your design model, plan how to implement routing. Figure 1.4 shows the tasks involved in developing a unicast routing strategy. For information about IP mul Citeste tot ...
Dimensiune
Identifying Supplemental Device Drivers
Identifying Supplemental Device Drivers Most device drivers are provided on the Windows XP Professional and Windows Server 2003 operating system CDs. However, some devices require special device drivers, which you must obtain from Citeste tot ...
Dimensiune
Evaluating Hardware and Software for Unattended Installations
Evaluating Hardware and Software for Unattended Installations Before you start designing an unattended installation, you must determine whether the hardware and software on your destination computers is compatible with the operating system Citeste tot ...
Dimensiune
Performing Unattended Installations
Performing Unattended Installations There are several ways to perform an unattended installation: · You can start a destination computer with the operating system CD, and use a Winnt.sif a Citeste tot ...
Dimensiune
Designing Automated Post-Installation Tasks
Designing Automated Post-Installation Tasks Post-installation tasks include any installation and configuration tasks that need to be performed after the operating system is installed. Post-installation tasks are usually described in your compon Citeste tot ...
Dimensiune
Choosing a Distribution Method
Choosing a Distribution Method Distribution refers to the way you store and transfer system files, device drivers, and software program files during an unattended installation. There are two types of distribution methods: · &n Citeste tot ...
Dimensiune
Designing Setup Settings
Designing Setup Settings An unattended installation relies on one of two Setup programs: a 16-bit Setup program called Winnt.exe, or a 32-bit Setup program called Winnt32.exe. You can run Winnt.exe on a computer that is running MS-DOS, Windows Citeste tot ...
Dimensiune
Using Media to Perform an Unattended Installation
Using Media to Perform an Unattended Installation Media distribution is useful if you are deploying computers in remote locations that do not have high-speed network connections, or in locations that do not have a local IT department availabl Citeste tot ...
Dimensiune
Configuring IP Multicast Scopes
Configuring IP Multicast Scopes Multicast addressing supports dynamic membership, under which individual computers can join or leave a multicast group at any time. Group membership is not limited by size, and computers are not restricted to me Citeste tot ...
Dimensiune
Planning the IP-Based Infrastructure
Planning the IP-Based Infrastructure To create or expand an enterprise network, you can choose from many design models, including a network infrastructure model based on the three-tier design model. This model, a hierarchical network design mod Citeste tot ...
Dimensiune
Planning IP Multicast-Enabled Routers
Planning IP Multicast-Enabled Routers To implement IP multicasting on a multiple-router intranet, you must install routers enabled for multicast routing and configured with one or more multicast routing protocols. Windows Server 2003 Citeste tot ...
Dimensiune
Routing IPv6 Traffic over an IPv4 Infrastructure
Routing IPv6 Traffic over an IPv4 Infrastructure An eventual successful transition to IPv6 requires interim coexistence of IPv6 nodes in today’s predominantly IPv4 environment. To support this, IPv6 packets are automatically tunneled over IPv4 Citeste tot ...
Dimensiune
Creating a Disk Configuration Plan for Unattended Installations
Creating a Disk Configuration Plan for Unattended Installations You need to create a disk configuration plan if you need to do any of the following before you perform the installation: · Change Citeste tot ...