Naming scheme for servers in an enterprise, Operating System

Assignment Help:

Problem:

Within a corporate environment, there are usually many servers located across various departments. Naming of servers is often a tedious task. In many circumstances, we have name of birds, animals and flowers that have been used to identify servers.

(a) Why is it inappropriate to use arbitrary or randomly chosen names for naming computers in an enterprise environment?

(b) In view of easing administrative burden, devise a simple but efficient naming scheme for servers in an enterprise.

(c) In view of ensuring DNS compatibility, what is the character set that you would use in a computer naming scheme?

(d) Even though the various servers may be located throughout the enterprise's premise and they may provide different functionalities, explain why you would not use the server's exact location and/or functionality as part of the naming scheme.

(e) What is the single constraint that is faced when naming computers within a domain?


Related Discussions:- Naming scheme for servers in an enterprise

Memory Management Problems, Sir i want formulas in Memory management starti...

Sir i want formulas in Memory management starting from paging till the demang paging in a easy manner for solving problems in competitive exams

Defining kernel, Problem 1. What is kernel? What are the main component...

Problem 1. What is kernel? What are the main components of a kernel? Defining Kernel Explaining Main components of Kernel 2. What is mutual exclusion? What are i

Processes- making the system more responsive and useful, Processes- Making ...

Processes- Making the System More Responsive and Useful A method by definition build up of a code execution and resource ownership. A process has two main characteristics, code

Explain the thread local storage (tls), Explain the Thread Local Storage (T...

Explain the Thread Local Storage (TLS)    Windows NT provides unique functions for per-thread data management. Thread local storage (TLS) is a concept defined in NT so develope

Capability lists are typically kept within the address space, Q. Capabilit...

Q. Capability lists are typically kept within the address space of the user. How does the system make sure that the user cannot modify the contents of the list? Answer: An ap

Design issues of network operating system, expalin about the design issues ...

expalin about the design issues of network operating system

What is a thread, What is a thread? A thread or else called a lightweig...

What is a thread? A thread or else called a lightweight process (LWP) is a basic unit of CPU utilization, it comprises of a thread id, a program counter, a register set and a s

Memory hierarchy, Difference between cache and associate memory

Difference between cache and associate memory

What is virtual file system?, What is virtual file system? A Virtual f...

What is virtual file system? A Virtual file system switch (VFS) or Virtual file system is an abstraction layer   on top of a more concrete file system. The purpose of a VFS

Why is it complicated to protect a system, Q. Why is it complicated to prot...

Q. Why is it complicated to protect a system in which users are allowed to do their own I/O? Answer: In earlier chapters we identified a distinction among kernel and user mod

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd