IT tutorials
 
Technology
 

Microsoft Lync Server 2010 : Lync Server Virtual Topologies (part 2) - Additional Topologies

11/28/2013 1:36:46 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

3. Sample Topology Considerations

These topologies provide some general guidance, but organizations ultimately need to design a virtualized solution that works best for them. These topologies provide a starting point, but should be taken with consideration and adjusted to meet the needs of each organization instead of simply reusing the sample topologies. There are a few key issues with the sample topology; these are discussed in this section.

Guest Placement

With the published example, Microsoft has dedicated particular virtual hosts for specific Lync Server roles such as only Front-End Servers, only A/V Conferencing Servers, or only Directors. The obvious issue with this type of deployment is that if a single host server fails, it will bring down all the virtual machines running on that server. With many of these roles, each host becomes a single point of failure. So, although mixing roles across different host servers might make performance testing or troubleshooting slightly more difficult, it does remove one piece of hardware from being a single point of failure.

Disk Layout

The examples provided by Microsoft also use RAID 0 disk configurations for the host servers in most cases. Although this provides a performance benefit over other RAID configurations, the reality is that most organizations prefer to offer some form of redundancy at the physical disk level. If a single disk in a RAID 0 array fails, the entire array is lost, and all virtual machine disks on that array are unavailable. Using a redundant disk configuration such as RAID 5 or RAID 1+0 for most host servers offers some redundancy with slightly reduced performance.

Edge Virtual Machine Collocation

One security concern the Microsoft design addresses is the fact that the Edge Server should not be located on the same host machine as any other server roles. This is because the Edge Server is designed to sit in a perimeter network surrounded by firewalls on both sides.


Caution

Placing Edge Servers on a host machine within the internal network is a bit of a security concern, which is why Microsoft recommends separating these virtual machines.


In reality, many organizations will probably deploy Edge Servers on the same host as other virtual machines. With the ability to tag individual virtual machine adapters with a specific VLAN, the perimeter network traffic can be directed to only the adapters assigned to Edge Servers. Of course this means the perimeter network traffic passes through the host hypervisor at some level, but this seems to be a security issue less important for organizations because of the flexibility gained with VLAN tagging. Of course, the proper firewall rules should be in place to protect both the host and guest operating systems. If nothing else, it might make sense to use perimeter network hosts to also deploy virtual reverse proxy servers such as Microsoft Forefront Threat Management Gateway, which also is typically placed in a perimeter network.

Reverse Proxy

An often overlooked component of a deployment can be the requirement for a reverse proxy server when enabling remote access. The sample topology does not account for these servers, but organizations should plan for these additional virtual machines when deploying Lync Server. The requirements for each server are not nearly as high as for a Lync Server role, but do consume some resources on a host. Because these servers are typically placed in a perimeter network, the same concerns exist as when virtualizing an Edge Server deployment.

4. Additional Topologies

This section builds on the guidance suggested by Microsoft and offers some additional sample topologies. These have not been performance tested by Microsoft and are only a suggested starting point. Each topology should be thoroughly tested for performance by an organization before being placed into production.

Small Business

Small businesses looking to take advantage of virtualizing Lync Server 2010 on-premises will likely be looking to leverage the core feature set with remote access and possibly telephony integration. The priority in this configuration is to deploy as many features as possible with the least amount of hardware. High availability and failover are not requirements in this scenario, but the downside here is that a host or guest VM failure causes a complete loss in service. The small business topology is shown in Figure 3.

Figure 3 Sample Small Business Virtual Topology

image

A single virtual host can be used with the following hardware configuration:

• 2.26 GHz or higher CPU with 12 processor cores

• 48 GB RAM

• 500 GB SAS Disk (RAID 1+0)

• Six network adapters

Three virtual machines will be created: one Standard Edition Front-End Server with the Mediation Server collocated, one Edge Server, and one reverse proxy server running Microsoft Forefront Threat Management Gateway.

The Standard Edition Front-End Server would have the following configuration:

• Four virtual CPUs

• 16 GB RAM

• One network adapter

The Edge Server would have the following configuration:

• Four virtual CPUs

• 16 GB RAM

• Two network adapters

The Threat Management Gateway would have the following configuration:

• Two virtual CPUs

• 4 GB RAM

• Two network adapters

Medium-Sized Business

For those businesses that require a higher level of availability in Lync deployments, it becomes necessary to use more host server hardware and create additional virtual machines. This sample builds on the deployment for a small business, but provides redundancy at each role while adding monitoring and archiving abilities. Shared storage through an iSCSI SAN is a requirement for providing database clustering capabilities. This is only an example and can be modified to meet the needs of a business. The sample medium-sized business topology is depicted in Figure 4.

Figure 4 Sample Medium-Sized Business Virtual Topology

image

Two virtual hosts can be used with the following hardware configuration:

• 2.26 GHz or higher CPU with 16 processor cores

• 72 GB RAM

• 500 GB SAS Disk (RAID 1+0)

• 10 network adapters

Each host will run one virtual machine with the Enterprise Edition Front-End Server role in the following configuration:

• Four virtual CPUs

• 16 GB RAM

• One network adapter

Each host will run one virtual machine with the Back-End Server role in the following configuration. The two Back-End Servers can use SQL Server Failover Clustering to provide high-availability across hosts:

• Four virtual CPUs

• 16 GB RAM

• Four network adapters


Note

The additional network adapters here are for SQL Server Failover Clustering. In addition to the regular adapter, a private heartbeat network should be used. Also, because SQL clustering requires a shared disk, network adapters for iSCSI access to a SAN are required. Two are used here to allow iSCSI multipathing for redundancy.


Each host will run one virtual machine with the Edge Server role in the following configuration:

• Four virtual CPUs

• 16 GB RAM

• Two network adapters

Each host will run one virtual machine with Microsoft Forefront Threat Management Gateway in the following configuration:

• Two virtual CPUs

• 4 GB RAM

• Two network adapters

One host will run a Monitoring Server virtual machine and the other will run the Archiving Server virtual machine. Both will use the following configuration:

• Four virtual CPUs

• 16 GB RAM

• One network adapter

 
Others
 
- Microsoft Lync Server 2010 : Lync Server Virtual Topologies (part 1) - Standard Edition Example, Enterprise Edition Example
- LINQ to SharePoint and SPMetal : Deleting Data Using LINQ (part 2) - Ensuring Referential Integrity
- LINQ to SharePoint and SPMetal : Deleting Data Using LINQ (part 1) - Deleting Sample Data
- LINQ to SharePoint and SPMetal : Adding Data Using LINQ (part 2) - Add On-Hire Assets,Add AssetNotes
- LINQ to SharePoint and SPMetal : Adding Data Using LINQ (part 1) - Add Data Generation Buttons to LinqSampleApplication , Add Sample Contracts
- Windows 7 : Kernel Mode Installation and Build - Using WinDbg with Featured Toaster, Versioning and Dynamic Binding
- Windows 7 : Kernel Mode Installation and Build - Debugging Macros and Routines, WDF Debugger Extension Commands
- Microsoft Excel 2010 : Introducing the Excel Web App - Sharing a Workbook, Interacting with a Sheet Online
- Microsoft Excel 2010 : Uploading and Downloading Workbooks (part 2) - Saving to SkyDrive from Excel, Saving a File to Your Local Drive
- Microsoft Excel 2010 : Uploading and Downloading Workbooks (part 1) - Accessing the SkyDrive, Uploading with Windows Live
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us