Designing Windows 2000 Networks


  • Windows 2000 network design, the professional way!
  • Build better, more efficient, more secure networks from the ground up
  • Featuring examples from the author's own designs and installations

Fast, solid, and secure Windows 2000 networks don't happen by chance—they happen by design!

It's not the hardware. It's not even the software ... by far, the most vital component of any ...

See more details below
$37.74 price
(Save 24%)$49.99 List Price
Other sellers (Paperback)
  • All (8) from $1.99   
  • New (4) from $2.49   
  • Used (4) from $1.99   
Sending request ...


  • Windows 2000 network design, the professional way!
  • Build better, more efficient, more secure networks from the ground up
  • Featuring examples from the author's own designs and installations

Fast, solid, and secure Windows 2000 networks don't happen by chance—they happen by design!

It's not the hardware. It's not even the software ... by far, the most vital component of any Windows 2000 network is the design work performed before it goes online. Drawing on his extensive experience in designing Windows 2000 networks for major companies, top networking expert Ed Wilson explains everything you need to do before you connect even a single cable. With real-world examples, deployment options, and scenario-based solutions from actual cases, Wilson guides you through the entire design process. When you roll out your network, you'll know you've left nothing to chance.

Taking a unique project management approach, Designing Windows 2000 Networks covers preliminary considerations, migration and deployment strategies, business considerations, technology integration, domain management, security concerns, and troubleshooting, as well as Active Directory, DNS issues, DHCP, WINS, and more. Best of all, Designing Windows 2000 Networks comes with Wilson's hands-on style and trademark sense of humor. You'll not only learn more than you thought there was to know about Windows 2000 network design, you'll have fun doing so. This book was written to give a thorough, working knowledge of the topic, including how to design a network that will:

  • Meet your company's cost and operational goals
  • Allow for a smooth migration fromyour present system
  • Be performance and security optimized
  • Provide for straightforward troubleshooting

Network administrators, consultants, system architects, technicians, and anyone else thinking about deploying a Windows 2000 network will find Designing Windows 2000 Networks an indispensable companion. Using real-world examples, author Ed Wilson, a top authority on designing and implementing Windows 2000 networks, shows you exactly what to anticipate at every step along the way, from planning to migration to implementation to troubleshooting and beyond.

Read More Show Less

Editorial Reviews

From The Critics
Emphasizes the importance of planning a migration strategy before actually upgrading a network to Windows 2000. The author identifies different ways Windows 2000 can be deployed onto live networks and issues to consider for group policy planning. He then offers recommendations for implementing the dynamic host configuration protocol (DHCP), the Windows internet naming system (WINS), domain namespaces (DNS), and active directory services. Annotation c. Book News, Inc., Portland, OR (
Read More Show Less

Product Details

  • ISBN-13: 9780130661999
  • Publisher: Pearson Education
  • Publication date: 11/26/2001
  • Pages: 528
  • Product dimensions: 6.98 (w) x 9.14 (h) x 1.40 (d)

Table of Contents

Pt. 1 Preliminary Considerations 1
1 A Quick Overview 3
Pt. 2 Migration Strategies 19
2 Planning a Migration 21
3 Selecting a Migration Strategy 71
4 Group Policy Planning 93
5 Lowering Desktop TCO 123
Pt. 3 Implementing Migration Strategies 137
6 Sample Windows 2000 Migration 139
Pt. 4 Understanding the Components 157
7 Dynamic Host Configuration Protocol 159
8 Windows Internet Naming System 237
9 Windows 2000 DNS 291
10 Active Directory 365
11 Interoperability and Migration 387
Pt. 5 Troubleshooting 411
12 Troubleshooting 413
App. A Well-Known TCP and UDP Port Numbers 439
App. B Command Line Utilities 451
App. C Troubleshooting Common Network Errors 453
App. D NetBIOS Suffixes 455
App. E Group Policy Result 457
Glossary 481
Index 497
Read More Show Less



This book is about designing Windows 2000 networks. To this end, we will not be looking at a lot of theoretical documents, nor will we be focused on abstract concepts. Rather, we will drill down into the depths of Windows 2000 networking. We will examine the design details that will make your network run better, simplify your life as a network administrator or a consultant, and make things easier to troubleshoot. If something does not fit into those objectives, it is left out.

The most critical time in the life of a Windows 2000 network is before it ever leaves the design table. Many new and exciting things have been added in this version of Windows to warrant a full discussion. I have not assumed you are already experienced with Windows 2000; rather, I start from the ground up, by doing a thorough treatment of the subject.

The time to learn Windows 2000 is not when you pop the disk into the mouth of an awaiting server; rather, it is in the design stages, when things are running well. You want to understand the subtleties of the main Windows 2000 services before you deploy them onto a live network. We will share many insights with you and hint at possibilities for further exploration. In fact, you will find many new ideas for monitoring and troubleshooting your network inside these covers. Some of the areas that will pay the greatest dividends are troubleshooting, optimization, and security concerns, each of which command considerable attention.

In this book, we look at the Windows 2000 architecture and describe many of the sources of frustration an administrator can experience. We look at how to set things up right, and how to troubleshootthem if you inherited a mess from someone else.

Intended Audience

The target audience is network administrators, consultants, system architects, technicians, help desk personnel, and others who support and design Windows 2000 networks. The book is also useful for those wishing to do supplemental reading while preparing for their MCSE certifications. It is therefore a moderately detailed book. We make no real assumptions either about knowledge of Active Directory, Group Policy, networking protocols, or experience with the products, as we will be discussing them. A basic knowledge of TCP/IP, DHCP, DNS, and WINS is helpful, as would be familiarity with NT security models, but that is what the book is about, so if you have never set up a server in your life, don't worry. If you want to know how to design and implement a Windows 2000 network, then this book is for you! If you want to read a book that is fun and interesting (an arm-chair consultant?) then go ahead and buy this book—you won't be disappointed!

Organization of the Book

Part 1: Preliminary Considerations

In order to understand how to design and deploy Windows 2000 networks, you need to know the basics of project management, features implementation, and return on investment. In this section we will bring you up to speed on all that and more. We begin with those strange numbers, and proceed to establishing guidelines for designing and planning a migration to Windows 2000.

Chapter 1: A Quick Overview. Here we look at the expectations for a migration to Windows 2000. We look at such things as the business case for the migration, planning for change and offer tips for determinin of the environment. After that we look at establishing guidelines and developing a pilot program. Then we look at which items of the architecture will offer the greatest rewards, and how to integrate the technology for a successful deployment. If you are wondering what in the world this has to do with Windows 2000, or what an IS person is doing talking about this stuff, then you have got to read this chapter!

Part 2: Migration Strategies

In this section we take a real long look at some of the different ways that Windows 2000 can be deployed onto live networks. We look at the five key steps in a design, and talk about DNS namespace issues. Following that we look at group policy, and how to roll it into a successful design. This section has some real cool stuff!

Chapter 2: Planning a Migration. In this chapter we look at what happens when you deploy Windows 2000 onto your network. We go into the various steps that are involved in designing the deployment, and look at the all the things that must be documented and identified. We talk about putting together the team, and do an evaluation of some of the various models.

Chapter 3: Selecting a Migration Strategy. In this chapter we look at developing a migration strategy. We look at the migration path, and factor in several of the major considerations involved in the migration. We talk about restructuring domains, and migrating domains. We conclude this chapter with a discussion of tools.

Chapter 4: Group Policy Planning. In this chapter we begin with a discussion of the prerequisites for group policy. We next look at the details of group policy operations. We talk about how group policy works how to modify its default behaviors. We talk about various group policy models and conclude the chapter by talking about delegation.

Chapter 5. Lowering desktop TCO. In this chapter we build upon the discussion of group policy in Chapter 4, and move it one step forward to solve some of the most vexatious problems that face network administrators. We look at five basic models of desktop configurations. We will talk about some cool tools from Microsoft that vastly simplify creating these five basic desktop configurations. We conclude by looking at some specialized group policy considerations such as integration with Active Directory, and various types of directory trees.

Part 3: Implementing Migration Strategies

Here we look at a design walk through scenario that pulls together many of the things we have covered up to this point.

Chapter 6: Sample Windows 2000 Migration. In this chapter we look at the procedure involved in designing a Windows 2000 network from start to finish. We go over the questions that will normally be asked during the first few months of a network design. We evaluate nearly everything from server hardware, and desktop computers, to infrastructure equipment such as hubs and routers.

Part 4: Understanding the Components

Chapter 7: Dynamic Host Configuration Protocol. This chapter is loaded with tips, pointers, and recommendations for implementing, maintaining, and configuring DHCP.

Chapter 8: Windows Internet Naming System. Here we look at WINS. We will see how to install, configure and maintain WINS. We look at some troubleshooting techniques, as well as several disaster recovery scenarios. We secrets learned from years of consulting in the field and troubleshooting hundreds of networks.

Chapter 9: Windows 2000 DNS. In this chapter we talk about the biggie for Windows 2000, DNS. We start at the beginning and talk about the strange vocabulary required for understanding DNS. We then go into some of the concepts, and finally explore the unique implementation of DNS as it stands in Windows 2000. This is an extremely critical chapter for network administrators working with Windows 2000.

Chapter 10: Active Directory. In this chapter we talk about Active Directory operations. We go into backup methods, talk about system state and some best practices for backup. Next we go into recovery issues and talk about the recovery console, and restoring Active Directory.

Chapter 11: Interoperability and Migration. In this chapter we talk about interoperating with Netware and configuring and using Client Services for Netware. Next we talk about Active Directory schema modifications, and working with Exchange 2000. Following that discussion, we go into some detail about the use of groups, and how Exchange 2000 interoperates with Windows 2000 Active Directory.

Part 5: Troubleshooting

In some aspects, much of the book has been devoted to troubleshooting. However, there are a few tricks I have learned from the field, that I want to share with you. These are some really cool tools. I do not go over the standard tool kit here—this was covered in the preceding chapters. What you will find here, are the tools that will set you apart from the pack. The kind of stuff, when you pull out a CMD line, that everyone stops to see.

Chapter 12: Troubleshooting. In this chapter we talk about troubleshooting. Not the normal troubleshooting, but cool stuff you can do to save the day. This is the kind of troubleshooting where you solve a problem that has been perplexing someone for weeks. Perhaps it is not too far of a stretch to quote Humphrey Bogart from the Maltese Falcon: "This is the stuff dreams are made of." You will find some neat things here. Go ahead and dive in.

About the Author

Ed Wilson, MCSE + I, MCT, MCSD, MCDBA, CCNA, CCA, CCI, CTT, Master ASE is a Senior Networking Specialist with Full Service Networking, a Microsoft Solution Provider Partner in Cincinnati, Ohio. He specializes in deploying Windows 2000 networks for medium-sized companies. His roster of clients includes both Fortune 500 and Fortune 100 companies. His previous publications include An Administrator's Guide to Windows 2000 TCP/IP Networks, and Network Monitoring and Analysis: A Protocol Approach to Troubleshooting, both by Prentice Hall PTR, as well as contributions to four other books.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)