Naming scheme for servers in an enterprise, Operating System

Assignment Help:

Problem:

Within a corporate environment, there are usually many servers located across various departments. Naming of servers is often a tedious task. In many circumstances, we have name of birds, animals and flowers that have been used to identify servers.

(a) Why is it inappropriate to use arbitrary or randomly chosen names for naming computers in an enterprise environment?

(b) In view of easing administrative burden, devise a simple but efficient naming scheme for servers in an enterprise.

(c) In view of ensuring DNS compatibility, what is the character set that you would use in a computer naming scheme?

(d) Even though the various servers may be located throughout the enterprise's premise and they may provide different functionalities, explain why you would not use the server's exact location and/or functionality as part of the naming scheme.

(e) What is the single constraint that is faced when naming computers within a domain?


Related Discussions:- Naming scheme for servers in an enterprise

Os installation, Question: OS Installation / File system a) Why is NTFS...

Question: OS Installation / File system a) Why is NTFS portioning preferred over FAT16 or FAT32 when security is of primary concern? b) State a situation or an application w

Differences among user-level threads and kernel-level thread, Q. What are t...

Q. What are two differences among user-level threads and kernel-level threads? Under what situations is one type better than the other? Answer: (1) User-level threads are un

Give an overview of unix based file systems, Give an overview of UNIX based...

Give an overview of UNIX based file systems. UNIX and UNIX-like operating systems allocate a device name to each device, other than this isn't how the files on that device are

Explain the protection problems, Q. In some systems a subdirectory is able...

Q. In some systems a subdirectory is able to be read and written by an authorized user just as ordinary files can be. a. Explain the protection problems that could arise. b.

What is the use of FIFOs in client-server applications, What is the use of ...

What is the use of FIFOs in client-server applications

What are the advantages of contiguous allocation, What are the advantages o...

What are the advantages of Contiguous allocation? The advantages are a. Supports direct access b. Supports sequential access c. Number of disk seeks is minimal.

Define what is dispatcher, Define what is Dispatcher In the Worker Mode...

Define what is Dispatcher In the Worker Model, it is the task of the Dispatcher to spawn a thread for every client-to-server connection. The Dispatcher acts as the go-between o

Difference between message passing and shared memory, Problem: a) To en...

Problem: a) To ensure proper operation, the operating system and all the other programs must be protected from any malfunctioning program. Describe a mechanism which is impleme

Concepts of an address - data and control bus, Let us consider the operatio...

Let us consider the operation of the EPROM device in more detail. Consider the pining details below again   Before we examine the interface means of the EPROM, it is worth

What is mutual exclusion, Question 1 Brief the following distributed compu...

Question 1 Brief the following distributed computing system model Question 2 Explain the components involved in implementation of RPC mechanism Question 3 What is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd