Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 3 August 2010

Understanding Domains

Posted on 10:45 by Unknown
Domains predate the workgroup by a considerable time-span in computer years. Older computer systems used a centralized mainframe and terminals attached to the mainframe to perform work. In many respects, a Windows domain works the same way as these systems of old. Yes, the workstations connected to the server have intelligence and perform some work locally, but the central computer maintains a firm grip on everything that goes on with the network. That’s why administrators call servers that provide services in a domain a domain controller — the server controls the environment completely.

Don’t get visions of “Big Brother” at this point. Yes, the domain controller exercises considerable control over the network, but many users won’t even notice the difference. The difference is more noticeable to the administrator than it is to the user in most cases. Domains are extremely useful in some situations. You have many reasons for using a domain. These reasons include

• Better security

• Centralization of control over users, machines, and resources

• Improved organizational capability

• Enhanced performance through efficient resource usage

• Superior reliability on large networks

This list may lead you to believe that domains are far superior to workgroups, and they are, in some respects. However, you always have to consider both sides of the coin. Although domains provide you with all these benefits, you must also bear the cost of using them. These costs include

• Increased complexity, which can increase administration time and result in more errors

• Loss of certain Windows Server 2008 features, such as Internet Connection Sharing (ICS)

• Required use of some features, such as Active Directory

• Significantly increased training costs

• Decreased flexibility in some areas, such as the ability to create ad hoc connections when required

• The number of users makes a difference. (I’ve seen networks of up to 100 users work just fine as a workgroup, but 75 users is probably a more practical upper limit.)

• Application types, such as databases, require better security and control, which means that you may need a domain with fewer users.


• High-network-bandwidth applications require additional resources, which means you may need a domain with fewer users.

• High-security applications normally require a domain no matter how few or many users you have.

• Shared resource applications, such as word processing, don’t require a domain in most cases unless you have a large number of users that must collaborate on content.

• Services such as file sharing and printing don’t usually require a domain.

• Power users generally work better in a workgroup setup.

• Novice users may not require a domain, but the domain environment can sometimes prevent them from making as many mistakes.

• Scientific and other highly collaborative applications don’t require a domain unless the application has significant security requirements. (The use of a domain will inhibit the users in this case.)

• Networks with high growth rates may not require a domain today, but will likely need one tomorrow, so installing the domain at the outset is less confusing for end users.

Domains are a good networking solution, but only in certain situations. In some cases, a workgroup is the right choice because the number of users doesn’t warrant a domain. Of the factors that you should consider when choosing between a domain and a workgroup, the centralized management capability is the most significant reason to use a domain, whereas the increase in complexity is the most significant reason not to use a domain. No magic number of users exists for determining when to use a domain. The point at which a domain becomes necessary is a combination of the following user factors:

Source of Information : For Dummies Windows Server 2008 For Dummies
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Networking, Windows Server 2008 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ▼  August (31)
      • Configuring Small Memory Dump Files
      • Memory Dump Files
      • Types of Stop Errors
      • Stop Messages
      • Stop Message - Identifying the Stop Error
      • Stop Message - Identifying the Stop Error
      • Single, Centralized System Cache and The Memory Ma...
      • Cache Manager
      • Shutdown
      • Windows Resource Protection
      • Solving Common Boot Problems “Part II”
      • Solving Common Boot Problems “Part I”
      • Boot Status File
      • Troubleshooting Boot and Startup Problems – Window...
      • Troubleshooting Boot and Startup Problems – Boot L...
      • Troubleshooting Boot and Startup Problems - Safe-M...
      • Troubleshooting Boot and Startup Problems - Driver...
      • Troubleshooting Boot and Startup Problems - Safe Mode
      • Troubleshooting Boot and Startup Problems - Last K...
      • Images That Start Automatically
      • ReadyBoot
      • Smss, Csrss, and Wininit
      • Initializing the Kernel and Executive Subsystems
      • The EFI Boot Process
      • The BIOS Boot Sector and Bootmgr
      • BIOS Preboot
      • Understanding how WSRM works and what you gain fro...
      • Working with the Windows System Resource Manager (...
      • Understanding Domains
      • Working with Peer Name Resolution Protocol
      • Considering Centralized versus Group Sharing
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile