MCSE Braindumps - free tests - study guides and mcse simulations are available for download. Looking for mcse braindumps mcse brain dumps or mcsa braindumps? You will find many links...  
MCSE Braindumps Home Members area to download MCSE Braindumps Signup to become member of Download the most latest MCSE Braindumps Need more information?
MCSE Braindumps
Download MCSE braindumps
MCSE Exam Information
MCSE 2000 Braindumps Free Download
MCSE 2003 Braindumps Free Download link
MCSE dumps free
Free braindumps
MCSE Exam Tips
Pass Guaranteed
Update News
MCSE Braindumps are  updated on

Special Offer

All Exams
for $69

read more..



MCSE 70-221 Study Guide

Designing a Microsoft Windows 2000 Network Infrastructure

When you pass this exam, you achieve Microsoft Certified Professional status. You also earn credit toward the following certifications:

Elective credit toward Microsoft Certified Systems Engineer on Microsoft Windows 2000 certification

According to Microsoft, 

"This certification exam tests the skills required to analyze the business requirements for a network infrastructure and design a network infrastructure that meets business requirements. Network infrastructure elements include:

Network topology
IP addressing
Name resolution such as WINS and DNS
Virtual private networks
Remote access
Telephony solutions

The scale of the Windows 2000 environment we are talking about in this exam are:

  • Supported users range from 200-26,000+
  • Physical locations range from 5-150+
  • Typical network services and applications include file and print, database, messaging, proxy server or firewall, dial-in server, desktop management, and Web hosting.
  • Connectivity needs include connecting individual offices and users at remote locations to the corporate network and connecting corporate networks to the Internet.

It is recommended that you first start by studying 70-215 and 70-216 to ensure that you are familiar with Windows 2000 Active Directory.

This exam is CASE STUDY BASED. You should download and try the Case Study-Based Test Demo available at  to become familiar with these new types of questions before taking the exam.

Your focus on this exam is on the infrastructure options such as connectivity, routing, remote access and VPN, as well as some sevurity arrangement.

Remember, the answers, form our point of view, could appear highly subjective. You need to choose the BEST answer that fits your case.

Network Infrastructure Elements

Advice from Microsoft:

"While you are documenting your current network environment, take special note of areas where you are currently experiencing problems. If you stabilize your network before deploying a new operating system, deployment and troubleshooting will be easier, and you can have increased confidence in the upgraded network. Setting up a test lab to duplicate problems and configurations is a good way to evaluate the impact of deploying Windows 2000..." 

Documenting your network infrastructure:

  • obtaining hardware data to document your infrastructure's physical structure
  • obtaining software data to document the existence and configuration of the protocols in use
  • document the logical organization of your network, name and address resolution methods, and the existence and configuration of services used
  • also document the location of your network sites and the available bandwidth between them

As said by Microsoft, "Developing a physical and logical diagram of your network will help you organize the information you gather in an understandable and intuitive manner."

Physical Network Diagram presents:

  • Details of physical communication links
  • Servers, with computer name, IP address (if static), server role, and domain membership
  • Location of devices
  • Specifications of devices: firmware version, throughput, and any special configuration requirements
  • WAN communication links and the available bandwidth between sites
  • Number of users at each site, including mobile users.

Logical Network Diagram shows:

  • Existing domain hierarchy, names, and addressing scheme.
  • Server roles
  • Trust relationships

Network Configuration Information that must be collected:

  • Name Resolution Services
  • IP Service Configurations
  • DHCP settings
  • IP Addressing scheme

  • Remote and Dial-up Networking
  • Current bandwidth utilization

Microsoft Suggested Steps for preparation of the network infrastructure

  1. Identify computers that do not have sufficient or compatible hardware.
  2. Upgrade hardware.
  3. Identify computers with software that is not compatible or that will not operate properly with Windows 2000.
  4. Identify the applications most often used, so that compatibility testing is done on all of the most important applications.
  5. Analyze network usage to determine network capacity availability, protocols in use, and which computers are being used as servers.
  6. Upgrade incompatible applications.
  7. Ensure that incompatible applications are not used. 

Name Resolution Services

  • find out whether any of the DNS servers not running Windows NT on your network can support dynamic registration and Service (SRV) resource records
  • find out whether upgrades for SRV support are available from the software manufacturer
  • if upgrade not available, may need to replace them – SRV RR support is a MUST
  • for hosts that are not running Windows NT, document the services they use and provide, such as UNIX BIND – make sure you document the version of each service in use
  • remember, for pure Windows 2000 environment DNS alone is enough
  • when legacy windows computers are present, use WINS together with DNS
  • for DNS, the best type of zone is Active Directory integrated zone

"The WINS server solves the problems inherent in resolving NetBIOS names through IP broadcasts, and frees network administrators from the demands of updating static mapping files, such as LMHOST files. WINS, which is compliant with the NetBIOS Name Server (NBNS) RFCs (1001/1002), also automatically updates the WINS database when dynamic addressing through DHCP results in new IP addresses for computers that move between subnets. Neither the user nor the network administrator needs to make manual accommodations for such name resolutions."

"Active Directory uses DNS as the domain controller location mechanism, enabling computers to find the IP addresses of the domain controllers. In order to find a domain controller in a particular domain or forest, a client queries DNS for the appropriate service location (SRV) and address (A) resource records. These DNS resource records provide the names and IP addresses of the domain controllers. Therefore, the DNS server used to support Active Directory deployment must support SRV records. In addition, Microsoft highly recommends that such DNS servers also support dynamic updates. The domain controllers dynamically register DNS records necessary for the successful functionality of the domain controller location mechanism."

IP Addressing Methods and Service Configurations

  • document all the DHCP service servers
  • for the clients, know the following:
    • default gateway settings
    • number of subnets and hosts
    • the IP addresses / submasks used
    • address leasing configuration
  • static IP is a MUST for servers
  • static IP is more efficient for small and simple network
  • DHCP is a must when your network is complex and when you do not have enough "real" IP addresses to share
  • multiple DHCP server that follows the 80/20 rule can provide fault tolerance
  • you need DHCP relay agent for subnets without DHCP server
  • you should pay attention to supporting BOOTP clients

"Dynamic Host Configuration Protocol (DHCP) is a TCP/IP standard that reduces the complexity and administrative overhead of managing network client IP address configuration. Microsoft® Windows® 2000 Server provides the DHCP service, which enables a computer to function as a DHCP server and configure DHCP-enabled client computers on your network. DHCP runs on a server computer, enabling the automatic, centralized management of IP addresses and other TCP/IP configuration settings for your network's client computers."

"The Bootstrap Protocol (BOOTP) is a computer configuration protocol developed before DHCP. DHCP improves on BOOTP and resolves specific limitations BOOTP had as a computer configuration service. RFC 951 defines BOOTP.

BOOTP was intended to configure diskless workstations with limited boot capabilities, while DHCP was intended to configure frequently relocated networked computers (such as portables) that have local hard drives and full boot capabilities."

Remote and Dial-up Networking

  • for the remote or mobile users, document the remote access and dial-up configurations
  • call back security is a MUST for RAS users
  • for VPN users, document the configuration of VPN
  • always remember, L2TP is the best for pure Windows 2000 environment
  • when there are non-Windows 2000 computers, use P2TP
  • Windows 2000 PPP infrastructure includes support for:
    • Dial-up remote access as client
    • Dial-up remote access as server
    • VPN remote access as client
    • VPN remote access as server
    • On-demand or persistent dial-up demand-dial routing as calling router
    • On-demand or persistent dial-up demand-dial routing as answering router.
    • On-demand or persistent VPN demand-dial routing as calling router
    • On-demand or persistent VPN demand-dial routing as answering router.
  • RRAS is the Windows 2000 component that provides these services
  • RRAS = Routing + RAS. Why combine both routing and remote access into a single service?

"The reason for combining the two services lies in the Point-to-Point Protocol (PPP), which is the protocol suite that is commonly used to negotiate point-to-point connections for remote access clients. PPP provides link parameter negotiation, the exchange of authentication credentials, and network layer protocol negotiation. For example, when you dial an Internet service provider (ISP) using PPP, you agree to the size of the packets you are sending and how they are framed (link negotiation), you log on using a user name and password (authentication), and you obtain an IP address (network layer negotiation). Demand-dial routing connections also use PPP to provide the same kinds of services as remote access connections (link negotiation, authentication, and network layer negotiation). Therefore, the integration of routing (which includes demand-dial routing) and remote access was done to leverage the existing PPP client/server infrastructure that existed for the remote access components."

  • Routing and Remote Access Service
    • Unicast IP Support
  • Static IP routing
  • Routing Information Protocol (RIP) versions 1 and 2
  • Open Shortest Path First (OSPF)
  • DHCP Relay Agent
  • Network address translation
  • IP packet filtering
  • ICMP router discovery
    • IP Multicast Support
  • Multicast forwarding
  • Internet Group Management Protocol (IGMP) versions 1 and 2
  • Multicast boundaries
    • IPX Support
  • IPX packet filtering
  • RIP for IPX
  • SAP for IPX

  • NetBIOS over IPX
  • Single-path routing infrastructure
    • only a single path exists between any two networks in the internetwork
    • simplify the routing tables and the packet flow paths
    • not fault tolerant - downed link or a downed router must be brought back up before packets can be delivered successfully across the downed link or router.
  • Multipath routing infrastructure
    • multiple paths exist between networks in the internetwork
    • fault tolerant when dynamic routing is used
    • some routing protocols can balance the load of network traffic across multiple paths
    • more complex to configure
    • have a higher probability of routing loops during convergence (when using distance vector-based routing protocols such as RIP)


  • document your network's current bandwidth utilization to establish a baseline from which changes can be measured - you should record available bandwidth during the course of low, normal, and high network utilization.
  • bandwidth metrics include bytes and packets sent or received, transmit and receive errors, and packets per second
  • document the speed of the network links between the network segments and the geographical locations- look at the logical and geographical dispersion in terms of bandwidth considerations and consider the amount and type of traffic over your organization's communication links
  • If WAN links periodically slowed by domain replication between domain controllers at different sites, then you may need to reconsider the site configuration
  • also consider to adjust replication settings
  • replication over the WAN is always bad
  • Microsoft recommends that you "Evaluate bandwidth demand in your test lab for a specific configuration. For instance, if your organization plans to carry voice and video over your data network, your cabling and switches must be capable of handling the bandwidth demand of those services."

ALWAYS review your network devices for compatibility with Windows 2000.


"Network security becomes most critical when you connect your computers to a network that you do not entirely trust. Network security issues are common within an organization … Beyond your organization, options for accountability and discipline are greatly diminished, and therefore you need to rely more strongly on security strategies themselves."

In fact, you will see security related questions in the exam. Therefore, it is suggested that you also study the material for 70-220 before attempting this exam.

PKI is a MUST have for any e-enabled enterprise. How does PKI work?

"The basic idea of public key cryptography is that there are two keys that are related. One key can be passed openly and freely between parties or published in a public repository; the other key must remain private. There are also different types of public key algorithms, each with its own characteristics. This means that it is not always possible to substitute one algorithm for another. If two algorithms can perform the same function, the detailed mechanism by which that result is obtained varies. With public key cryptography, the two keys are used in sequence. If the public key is used first, followed by the private key, then this is a key exchange operation. If the private key is used first, followed by the public key, this is a digital signature operation."

Keep in mind that PKI is based on cryptography. It relies on certificates for authentication.

"Cryptography protects users by providing functionality for the encryption of data and authentication of other users. This technology lets the receiver of an electronic message verify the sender, ensures that a message can be read only by the intended person, and assures the recipient that a message has not be altered in transit."


What type of CA should we use? See what Microsoft said:

"A CA hierarchy requires planning. The first business policy decisions you make will have to do with selecting the CAs, both internal and external, that will be the source of your certificates. A typical CA hierarchy has a three-level architecture. It is recommended that you have one root CA, and that it be offline. You need a second level of CAs to implement certificate policy. This level also needs to be offline. The third level is the issuing CAs. You can have internal or external CAs at this level. Internal network authentication and data integrity can be handled by a local certifying authority, such as your IT department. Internet transactions and software signing might require third-party certificates in order to establish public credibility. While selecting your CAs, give some thought to your cryptographic service provider (CSP). The CSP is the software or hardware that provides encryption services for your CA."

Steps to take for setting up certification authorities:


  1. Plan a certification hierarchy
  2. Set up a Windows 2000 Server for each certification authority

  3. Plan the renewal strategy you are going to use for the root certification authority
  4. Install a root certification authority

  5. Install subordinate certification authorities as required by your planned certification hierarchy
  6. Install Web enrollment services on non-certification authority servers, as required.
    Configuration for each certification authority: 
  7. Specify whether to make each incoming certificate request pending or automatically approved
  8. Schedule the publication of the certificate revocation list
  9. Set up applications and services to use your public key infrastructure 
  10. Set up a Web server to use certificates for secure access Certificates and Internet Information Services
  11. Set up Internet Protocol security - IPSec
  12. Set up a Microsoft Exchange server to use certificates for secure e-mail


"Migrating successfully from Microsoft® Windows NT® 3.51 and Microsoft® Windows NT 4.0 to Microsoft® Windows® 2000 requires careful analysis of your current system and in-depth planning."

Some of the questions you encounter will involve migration and upgrade issue. Therefore, it is suggested that you also study the material for 70-222 before attempting this exam.

Reference Books:

MCSE Designing a Windows 2000 Network Study Guide (Exam 70-221)

by Thomas Shinder (Editor), et al (Hardcover)

MCSE Designing a Microsoft Windows 2000 Network Infrastructure Readiness Review; Exam 70-221

by Emmett A. Dulaney, MeasureUp Inc. (Paperback)

Test Yourself MCSE Designing A Windows 2000 Network (Exam 70-221)

by John M. Gunson II (Editor) (Paperback)

MCSE Training Guide (70-221): Designing a Windows 2000 Network Infrastructure

by Dale Holmes, et al (Hardcover)

Disclaimer: Sure2Pass Tests and MCSE Braindumps are based solely on published objectives of various exams, which cover concepts that are necessary for various networking professional certification designations. Links to other sites are published for the benefit/information of our visitors and we are not responsible for their contents. Our MCSE Study Guides, practice tests, and/or material is not sponsored by, endorsed by or affiliated with Microsoft. Microsoft, MCSE, MCSA, MCSD, the Microsoft logo are trademarks or registered trademarks of Microsoft in the United States and certain other countries. All other trademarks are trademarks of their respective owners