did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735610231

Microsoft Application Center 2000 Resource Kit

by
  • ISBN13:

    9780735610231

  • ISBN10:

    0735610231

  • Format: Trade Paper
  • Copyright: 2001-03-28
  • Publisher: Microsoft Pr
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.99

Summary

This Microsoft "Resource Kit" delivers essential reference and tools to IT professionals who want to fully exploit the functionality of Microsoft Application Center Server 2000 -- a strategic solution for running and managing Web applications through "Web farms", or clusters. This kit covers a variety of deployment scenarios, ranging from simple Web applications to multitier e-commerce solutions. Packed with use-now tools and information, this authoritative kit can help IT professionals save time, reduce ownership and support costs, and maximize their organization's investments in Web technologies. The CD features must-have tools and utilities to aid product support and deployment.

Table of Contents

Preface xv
Acknowledgments xvii
Introduction xix
Scaling Business Web Sites with Application Center
1(24)
Building Blocks
1(8)
The Applications Architectural Shift
2(3)
An Overview of Distributed Web Applications
5(2)
.NET Enterprise Servers
7(2)
Positioning Application Center
9(1)
The Web Computing Model for Business
9(4)
Enabling Highly Available and Scalable Application Services
13(11)
The Traditional Approach - Scaling Up
14(1)
Scaling Out as an Alternative
15(2)
Clustering
17(3)
Scaling Up vs. Scaling Out
20(3)
Scaling n-Tier Sites with Microsoft Clustering Technology
23(1)
Resources
24(1)
Books
24(1)
Feature Overview
25(28)
Application Center Overview
25(2)
Design Goals
26(1)
Application Center Feature Summary
27(1)
Application Center Cluster Services
28(5)
Cluster Creation
28(3)
Cluster Administration
31(2)
Load Balancing
33(3)
Integrated NLB
33(2)
Component Load Balancing
35(1)
No Load Balancing
36(1)
Synchronization and Deployment
36(6)
Controller Configuration Settings
37(1)
Content Publishing and Application Deployment
37(4)
Cluster Synchronization
41(1)
Monitoring
42(4)
Events
42(2)
Performance
44(1)
Health
45(1)
Programmatic Support
46(2)
Monitoring
47(1)
Performance Counters
47(1)
Command-Line Administration
47(1)
COM+Provider
48(1)
Local and Remote Administration
48(2)
High Availability
50(1)
Online Help
50(1)
Resources
51(2)
Books
51(1)
Web Links
51(2)
The Application Center Architecture
53(16)
The Architecture Layers
53(1)
The User Interface
54(2)
The Feature Set
56(1)
The Operating System
56(10)
MMC version 1.2
56(1)
WMI
57(2)
IIS version 5.0
59(6)
NLB
65(1)
COM+
66(1)
Health Monitor version 2.1
66(1)
SQL Server 2000 Desktop Engine
67(1)
Resources
68(1)
Book
68(1)
Web Links
68(1)
Cluster Services
69(26)
Recommended Server Configuration
69(5)
Memory
70(1)
Fixed Disk
70(1)
Network Adapter
71(1)
IP Addresses
71(3)
Default Accounts and Services
74(3)
Deployment Infrastructure Example
77(1)
Application Center Cluster Services
77(1)
Connecting to a Cluster
78(1)
Creating a Cluster
79(4)
Processing Activities and Their Sequence
80(3)
Cluster Administration
83(9)
Adding a Server
83(4)
Removing a Server
87(1)
Restarting a Member
88(1)
Changing the Cluster Controller
89(3)
Disbanding a Cluster
92(1)
Background Services
92(3)
Cluster Time Synchronization Service
92(2)
Reliable Name Resolution Service
94(1)
Load Balancing
95(44)
Load Balancing Options
95(1)
Network Load Balancing
96(9)
Network Load Balancing Architecture
96(4)
Load Balancing Distribution
100(2)
Convergence---Redistributing the Load on an NLB Cluster
102(3)
Maintaining Session State with Network Load Balancing
105(12)
The Request Forwarder
106(10)
Scenarios that Require Request Forwarding
116(1)
Request Handling Examples in a Network Load Balancing Cluster
117(3)
Stateless Session
117(1)
Stateful Session
118(2)
Network Load Balancing Administration
120(4)
Setting a Server Offline or Online
120(1)
Configuring Load Balancing Weights
121(2)
Configuring Client Affinity
123(1)
Configuring Request Forwarding
123(1)
Component Load Balancing
124(7)
CLB Architecture
125(6)
Component Load Balancing Scenarios
131(6)
Two-Tier with Full Load Balancing
132(1)
Three-Tier with Full Load Balancing
133(3)
Three-Tier with Fail Over
136(1)
Resources
137(2)
Books
137(1)
Web Links
138(1)
Synchronization and Deployment
139(36)
Synchronization Service Overview and Architecture
139(9)
Synchronization Service Architecture
140(8)
Synchronization Reliability
148(1)
Transport Recovery
148(1)
Apply Time Recovery
148(1)
Synchronization Modes and Processing
149(5)
Processing Activities During a Full Synchronization
151(3)
Synchronizing Cluster Configuration Settings
154(1)
Replicating Network Settings
154(1)
Replicating NLB Settings
154(1)
Synchronizing Content and Applications
155(5)
The Default Applications
155(1)
User-Defined Applications
156(2)
Editing Applications
158(1)
The Replication Definition
159(1)
Deploying Applications
160(3)
Special Cases
163(7)
Deploying User Accounts
164(1)
Deploying COM+ Components
164(1)
Deploying Global ISAPI Filters
165(1)
WMI/Health Monitor Replication Driver
166(4)
Configuring, Managing, and Monitoring Synchronization
170(5)
Synchronization Exclusions
170(2)
Monitoring Synchronization
172(3)
Monitoring
175(50)
The Role of Monitoring
175(1)
High-Level Architecture
176(3)
Windows Management Instrumentation
179(18)
Managed Applications
179(1)
Managed Objects
180(1)
WMI Providers
181(3)
Management Infrastructure
184(13)
Health Monitor 2.1
197(10)
High-Level Architecture and Operation
198(9)
SQL Server Desktop Engine and ACLog
207(8)
The Application Center Log
207(2)
Table Layouts
209(3)
Table Views
212(1)
ACLog Capacity Requirements
213(2)
Monitoring: a Four-Step Process
215(10)
Generating Data
216(4)
Logging Data
220(2)
Querying and Preparing Data
222(3)
Creating Clusters and Deploying Applications
225(58)
Setting Up and Testing a Two-Tier Cluster Environment
227(32)
Build the Web Tier
227(25)
Build the COM+ Tier
252(7)
Setting Up a Stager
259(2)
Create a Staging Cluster
260(1)
Sample Applications for Staging
261(5)
Installing the Applications on the Stager
261(5)
Deployment Issues
266(2)
Using a Stager to Deploy Applications
268(2)
Deploy a New Application to a Web Cluster
270(3)
Deploy an Application Update to a Web Cluster
273(4)
Deploying Applications Without COM+ Components
273(1)
Deploying Applications with COM+ Components
274(2)
Deploy ACPFCOM
276(1)
Deploy a New Application with COM+ Components to Two Tiers
277(4)
Prepare the Application
277(1)
Phase One: Install to the COM+ Application Cluster
278(1)
Phase Two: Install to the Web Cluster
279(1)
Summary
280(1)
Resources
281(2)
Web Links
281(2)
Working with Monitors and Events
283(40)
The Event Schema
284(4)
The Monitors Hierarchy
288(2)
Anatomy of a Monitor
290(8)
Data Groups
290(1)
Data Collectors
290(7)
Thresholds and Actions
297(1)
The Default (Synchronized) Monitors
298(3)
The Sample Monitors
301(5)
Creating a Custom Monitor
306(5)
Modifying and Creating Actions
311(7)
The Default Actions
312(1)
Creating a New Action
313(5)
Configuring Event Logging
318(5)
Working with Performance Counters
323(48)
Performance Management
324(2)
The User's Perspective
325(1)
The Administrator's Perspective
325(1)
An Overview of Performance Tuning
326(5)
The Tuning Cycle
327(4)
An Overview of Capacity Planning
331(2)
Testing and Tuning the Infrastructure
333(10)
The Network and Server
335(2)
The Web Server
337(6)
Testing and Tuning Applications
343(2)
Anticipating Application Load
343(1)
Stress Test the Application
344(1)
The Web Application Stress Tool
345(3)
Using WAS to Test NLB Web Clusters
348(1)
Performance Counters
348(12)
The Default Performance Counters
349(6)
Adding Additional Performance Counters
355(4)
Enabling Counter Graphing
359(1)
Performance Monitoring Samples
360(9)
Cluster Test Configuration
360(1)
Counter Graphs
361(2)
The Base Environment
363(1)
Scenario: Single-Node Web Cluster and Single-Mode COM+ Application Cluster
364(1)
Scenario: Two-Node Web Cluster and Single-Node COM+ Application Cluster
365(1)
Scenario: Three-Node Web Cluster and Single-Node COM+ Application Cluster
365(3)
Scenario: Three-Node Web Cluster and Two-Node COM+ Application Cluster
368(1)
Resources
369(2)
Books
369(1)
Web Sites
370(1)
Working with the Command-Line Tool and Scripts
371(40)
Windows Scripting Host
371(8)
WSH Architectural Overview
372(1)
Running Scripts By Using the Command-Based Scripting Host
373(2)
Running Scripts by Using the Windows-Based Scripting Host
375(1)
The .wsh File
375(1)
The .wsf File
376(3)
The Command-Line Tool: Overview and Reference
379(21)
Command Overview
379(2)
Command Reference
381(19)
Command-Line Example: Setting Up a Staging Environment
400(4)
Preparation
400(2)
Create the Staging Cluster and Preflight Check Application
402(1)
Deploy the Preflight Check Application
403(1)
Script Samples
404(5)
Script: Asynchronously Trap an Event
404(1)
Script: Synchronously Trap an Event
404(1)
Script: Obtain the Available Disk Space and Directory Listing
405(1)
Script: Save ACLog Database as CSV Text File
406(1)
Script: Backup the ACLog Database
407(1)
Batch File: Clean ACLog Tables
408(1)
Additional Samples
408(1)
Resources
409(2)
Security: For Administrators and Developers
411(42)
Security: Trends and Perspectives
412(5)
What's Been Happening in the Computer Industry
412(1)
The Nature of the Beast
413(1)
Insights From the Experts
414(3)
The Nature of Security Breaches
417(3)
The Security Design Process
420(5)
Risk Assessment
422(3)
The Three-Tier Security Model
425(4)
Presentation Services
426(1)
Business Services
426(1)
Data Services
426(1)
Topologies for the Three-Tier Model
427(2)
Platform Security
429(11)
Network Security
429(1)
General Security Guidelines for Windows 2000 Server and Web Servers
430(8)
The Applications and Components
438(1)
The Back-End Databases
439(1)
Application Center Security
440(2)
User Accounts
440(1)
User Credentials
440(1)
File Systems
441(1)
Network Adapters
441(1)
Health Monitor and WMI
441(1)
Monitoring
442(1)
Logging
442(1)
Remote Control
442(1)
Secure Remote Administration
442(3)
Securing Off-Site Computers
443(1)
The Application Center Administrative Client
444(1)
The Application Center Web-Based Administrative Client
445(1)
Windows 2000 Terminal Services
445(1)
Monitoring and Auditing
445(4)
Think Like a Hacker
449(1)
Resources
449(4)
Books and Articles
449(1)
Web Sites
450(3)
Third-Party Load Balancer Support
453(18)
Conceptual Overview and Functional Requirements
454(2)
Device Monitoring
455(1)
Device Management
456(1)
Application Center and Load Balancers---Concepts
456(5)
Alteon WebSystems 180E
457(1)
Cisco Systems LocalDirector
458(1)
F5 Networks BIG-IP
459(1)
Intel NetStructure 7175 and 7185
460(1)
Device Monitors
461(1)
Lbdevicehm.mof
461(1)
The ACEXT.EXE Command-Line Tool
462(3)
Using ACEXT.EXE
463(2)
Device Set Up
465(6)
Install the Load-Balancer Programs and Files
465(1)
Configure the Alteon WebSystems 180E, Intel NetStructure 7175 and 7185, and Cisco Systems LocalDirector Devices
466(1)
Configure the F5 Networks BIG-IP Device
467(1)
Configure All of the Devices
467(2)
Troubleshooting
469(2)
Appendix A A Blueprint for Building Web Sites Using the Microsoft Windows DNA Platform 471(50)
Executive Summary
471(1)
Architecture Overview
472(8)
An Example Site
480(7)
Scalability
487(9)
Availability
496(3)
Security
499(9)
Management and Operations
508(11)
Summary
519(2)
Appendix B Network Load Balancing Technical Overview 521(28)
Abstract
521(1)
Introduction
521(7)
Advantages of Network Load Balancing
523(1)
Installing and Managing Network Load Balancing
524(2)
How Network Load Balancing Works
526(1)
Managing Application State
527(1)
Network Load Balancing Architecture
528(7)
Distribution of Cluster Traffic
530(2)
Load-Balancing Algorithm
532(2)
Convergence
534(1)
Remote Control
535(1)
Network Load Balancing Performance
535(8)
CPU Overhead
536(3)
Throughput and Response Time
539(3)
Switch Occupancy
542(1)
Summary
543(1)
For More Information
544(1)
Glossary of Key Terms
544(5)
Appendix C The Art and Science of Web Server Tuning with Internet Information Services 5.0 549(36)
Abstract
549(1)
Introduction
550(1)
Performance Tuning as an Art
550(1)
Why Tune Your Web Servers?
551(1)
What to Tune
551(20)
Monitoring Your Hardware
552(6)
Security
558(2)
Monitoring Your Web Applications
560(1)
Tuning Your Web Applications
561(2)
Tools to Monitor and Test Server Performance
563(1)
Features and Settings in Windows 2000 and IIS 5.0
564(3)
Tuning and Troubleshooting Suggestions
567(4)
Testing, Piloting, and Going Live
571(1)
Performance Settings
572(6)
Metabase Settings
572(3)
Registry Settings
575(3)
Tips for Optimizing Windows 2000 Web Server Performance
578(2)
ASP Caching
580(1)
Tips for Getting the Most Out of an 8-Processor Machine
581(1)
Resources
582(3)
Appendix D Application Center Status Events 585(26)
Appendix E Sample Performance Charts 611(8)
Appendix F Resource Kit Software Tools 619(10)
ACSystem Tray
619(1)
Requirements
619(1)
Installation
619(1)
Usage Instructions
619(1)
Advanced Configuration Editor
620(1)
Requirements
620(1)
Installation
620(1)
Usage Instructions
620(1)
Application Exporter
620(1)
Requirements
621(1)
Installation
621(1)
Usage Instructions
621(1)
Command Syntax
621(1)
Cluster Monitor
621(1)
Requirements
621(1)
Installation
622(1)
Usage Instructions
622(1)
Command-Line Scripts
622(1)
DumpHM
622(1)
Requirements
622(1)
Installation
622(1)
Usage Instructions
622(1)
Command Syntax
623(1)
Notes
623(1)
Pre-Flight Manual
623(1)
Requirements
623(1)
Installation
623(1)
Scanner
623(1)
Requirements
624(1)
Installation
624(1)
Usage Instructions
624(1)
Command Syntax
624(1)
SQL Partitioner
624(1)
Requirements
625(1)
Installation
625(1)
Usage Instructions
625(1)
SQL Event Logger
625(1)
Requirements
625(1)
Installation
626(1)
Uptime
626(3)
Requirements
626(1)
Installation
626(1)
Usage Instructions
627(1)
Command Syntax
627(2)
Appendix G Managing IIS IP Bindings 629(4)
Index 633

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program