networking
- Get link
- X
- Other Apps
Networking
NETWORKING (Server 2003)
Definition
It is the collection of Hardware & Software which enables two or more computers to communicate & to share the resources.
According to our computer environment, resources are divided into two categories.
Shared Resources
Hardware Resources Software Resources
E.g.: cd rom e.g.: Application software or
Hard disk etc any Application
Advantages of Networking
Ø Shared resources
Ø Low cost
Ø Communication
Ø Security
Types of Networks
Ø LAN
Ø WAN
Ø MAN
Ø INTERNET
LOCAL AREA NETWORK
By using two or more computers to configure a network in a limited geographical area is called as local area network.
WIDE AREA NETWORK
By using two or more computers to configure a network in unlimited geographical area is called wide area network.
INTERNET
Networks in a network is called internet.
TOPOLOGY
The way of configuring the network is called topology.
LAN Topologies
· BUS Topology
· RING Topology
· MESH Topology
· STAR Topology
Bus Topology

v In this topology, the systems are connected in serial fashion. In this topology, data is passed on via systems.
v In this topology, the ending point of the system is connected to the starting point of the next system and the starting point of the first system and ending point of last system is terminated with 50Ω resistor.
Advantages
Disadvantages
Ring Topology

v In this topology, the systems are connected in serial fashion and the last system ending point is connected to the starting point of the first system.
Advantages
Disadvantages
Mesh Topology

v In this topology, the systems are independently connected to another system.
Advantages
Disadvantages
Star Topology

v In this topology, the systems are communicated to another system through network media devices such as Hub or Switch.
Advantages
Disadvantages
The minimum requirements to configure a LAN
Hardware Software
1. Two PCs 1. Any Operating system from Microsoft
2. Network interface cards 2. Drivers
3. Networking media devices such 3. Service
as Hub and Switch
4. Cables 4. Client
5. Connectors (RJ 45 Connector) 5. Protocol
[RJ 11 (phone)]
6. Connecting devices such as
Crimping tools
Software
Drivers
It is a piece of software which acts as a mediator between Operating system and our hardware.
Service
It is used for Microsoft file and print sharing purpose.
Client
It is used for Client to the particular Server.
Protocol
Protocol is the set of rules and regulations which controls the data transmission among the systems over a network.
Types of Protocols
à NETBEUI Protocol
à IPX/SPX Protocol
à APPLE Protocol
à TCP/IP Protocol
NETBEUI Protocol
v It stands for Network Basic Emulated User Interface.
v It is designed by Microsoft.
v It is available in all Microsoft operating systems.
v By using this protocol we can communicate Microsoft operating systems machines only.
v It is a plug and play protocol, so no configuration of this protocol is required.
v It is faster than when compared to any other protocol.
v It occupies less space.
v It is suggested for only homogeneous networks.
IPX/SPX Protocol
v It is designed by Novell organization.
v It stands for Internet Packet Exchange /Switched or Service Packet Exchange.
v It is available in Novell operating systems & Microsoft operating systems.
v By using this protocol, we can communicate Novell to Novell & Novell to Microsoft operating systems.
v A little bit administration over head.
v Some extend to heterogeneous but it is not full fledged heterogeneous typed protocol.
APPLE Protocol
v It is designed by Apple Organization.
v It is available in Macintosh operating systems.
v By using this operating system we can communicate Macintosh to Macintosh.
TCP/IP Protocol
v It stands for Transmission Control Protocol/Internet Protocol.
v It is designed by International Standard Organization (ISO).
v All operating systems support this protocol, so it is the Universal protocol.
v By using this protocol, we can communicate any operating system machine to any operating system machine.
v TCP/IP protocol becomes very much popular because it has the Routing Algorithm.
ROUTING
The process of selecting best possible route to reach the destination is called Routing.
Disadvantages
SYSTEM ADDRESS

Physical address logical address
MAC (Media access control)
IEEE
v System address is the combination of physical address and logical address.
Physical address
v It is designed with 16 bit hexa decimal code.
Eg: 2E-3B-B1-8D-3F
v Physical address is given to Network interface cards by IEEE
(Institute of Electrical & Electronic Engineers).
Logical address
IP Address (32 bit)

· The minimum octet value is Zero.
0 0 0 0 0 0 0 0 = 0
· The maximum octet value is 255.
27 26 25 24 23 22 21 20
1 1 1 1 1 1 1 1 = 255
E.g. 21.33.45.125
v Logical address is also called IP address.
v IP address is the combination of network identification and host identification.
v IP address is 32 bit decimal coded.
v These 32 bits can be divided into 4 parts.
v Each part having 8 bits called as Octet.
v These octets are separated with period (.)
v So each octet can store a minimum value of zero and maximum value of 255.
v Class: To identify the NID & HID in particular IP address, IP
addresses are given some ranges called as Class. They are,
Class Range NID HID
Class A 1 – 126 1 3
Class B 128 – 191 2 2
Class C 192 – 223 3 1
Class D 224 - 239 Multicast Range
Class E 240 – 255 Reserved range for feature
Experiments
v Classes are classified according to the values of first octet.
Rules
§ IP address cannot start with zero & 255 and cannot end with zero and 255
§ IP addresses can always starts with Network Identification and ends with Host Identification.
à 127 is the loop back adapter address used for self checking purpose.
E.g. 127.0.0.1
Subnet Mask:
It represents that how many octets (no. of bits) reserved for network identification and host identification.
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
Ø If we want to assign a IP address to the particular system,
§ Syntax
My Network places→ Right click properties→
Local area connection→ Right click properties→
Select TCP/IP Protocol→ properties→
Use select the IP address→ assign the IP address and Subnet mask→ then click OK.
Ø If we want to see the IP address in CUI (character user interface),
§ Syntax:
Start→ Run→ Type cmd→ Type ipconfig
Ø If we want to see the IP address with physical address,
§ Syntax:
Start→ Run→ Type cmd→ Type ipconfig/all
Ø If we want to check the communication between two systems,
§ Syntax:
Start→ Run→ Type cmd→
Type ping < Destination address >
Eg: ping 100.10.10.3
Note: If reply comes with data packets list (TTL list) then, we decide to perfect communication between two systems.
Note: If reply comes with “request timed out” then we decide to troubleshoot in physical connections between two systems.
Note: If reply comes with “Destination host unreachable” then we decide to troubleshoot in IP addressing.
DATA TRANSMISSION

Ø All services bind to protocol.
Ø All protocols bind to NIC.
Ø TCP/IP protocol suit designed, based on OSI (open system interface) seven layers.
Ø Each layer having its own importance and these layers are Bi-directional layers i.e, whatever transmission section layer transmits that can be understandable by receiving section layer.
OPERATING SYSTEM
Definition
Operating system is the interface between user and system (computer).
According to the user interface, Operating systems can be divided into two types.
1. GUI (Graphical User Interface)
2. CUI (character User Interface)
According to Microsoft Operating systems, Operating systems can be divided into two types.
1. Desktop Operating systems
Eg: Windows 95, Windows 98, Windows ME, Windows XP
2. Network Operating systems
Eg: Windows NT 4.0, Windows 2000 Server Edition, Windows 2000
Professional Edition, Windows 2003 Server professional Edition,
Windows 2003 (Enterprise, Standard, Web) Editions.
Operating System Installation
Installing 2003 Server Operating system:
§ Syntax:
Insert 2003 Server Operating System CD in CD drive→ Go to BIOS settings through “delete” key→ In Standard CMOS setup detect all HDDs and CD drives through F3→ Esc→ Go to Advanced Setup→ Select First Boot Device→ CD drive, 2nd Boot Device IDE-0→ Save and Exit (F10)→ Save Current Settings Y→ Enter.
A Hard disk can be partitioned in three ways.
1. FDISK
2. DM
3. Operating System
After BIOS Setup,
§ Syntax:
→ Press any key to Boot from CD
→ Select O.S. we want to install
→ Hard disk can be partitioned at the time of O.S. Installation
→ To partition press C
→ to install in partition press Enter
→ Installation takes place on its own
→ Keep on pressing Next
→ Enter Person name and Company name
→ Enter CD key
→ Enter Number of Conferment Connections (Clients)
→ Enter NET BIOS name (Computer Name)
→ Type Administrator Password (Local)
→ Date and Time Settings (GMT + 5:30)
→ Select Typical Settings
→ Select Work Group (we can also make client to a Domain)
→ Remove 2003 O.S. CD from CDROM
→ Finish
Operating System takes place in 5 steps.
1. Collecting Information
2. Dynamic Update
3. Preparing Installation
4. Installing Windows
5. Finalizing Installation
WORKGROUP (peer to peer Network)
Configuring a network using Desktop Operating systems:
Ø This type of network is called as WORKGROUP or peer to peer network.
Ø In this network, each system having its own importance i.e, every system acts as a peer.
Ø Shared resources are distributed normally.
Ø Security provided here is called as Shared level security i.e. the user
Must and should remember the multiple passwords for accessing the
Resources.
Ø The users of the particular system cannot logon to another system because there is no centralized administration.
Ø So, this type of users we called as local users and the system acts as local system.
Ø If we want to configure a Workgroup system,
§ Syntax:
Right click My computer→ properties→ Computer Name→
Change→ select Workgroup option→ enter Workgroup Name→
Apply→ Ok.
Ø If we want to share the particular resource (folder),
§ Syntax:
Right click the folder→ sharing and security→
Select “share the folder”→ Enter the share name→ permissions→
Select the user through Add→ Browse→ advanced→ Find now→
Select user→ Ok and enter the proper permissions
(Read, write, modify, full control).
Go to Security tab→ Do the same above process.
Ø If we want to see the shared resources of the particular system,
§ Syntax:
Right click My Network places→ Open→ entire Network→
Microsoft Windows Networks→ Select Workgroup→
Select system and enjoy the resources.
Hidden Share:
Run with $:
If we create a file and share it and if the “Share Name” is with ‘$’ e.g. hidden$, then the folder will not be visible for access in the Network.
Ø If we want to access such folders,
§ Syntax:
Start→ Run→ Type “\\system name\folder name$
e.g. \\mcse2\hidden$
Shortcut for viewing Shared Resources of a particular System:
§ Syntax:
Start→ Run→ “\\Destination System IP address or System Name “
Eg: \\100.10.10.2 or \\mcse2 (where mcse2 is the System Name).
Ø If we want to create a Local User Account.
§ Syntax:
Start→ Programs→ Administrative tools→ Computer
Management→ Local Users→ Right click New user→
Enter user Name and Logon Name→ Enter the Password→
Apply→ Ok.
CLIENT SERVER

Ø This type of networking, we called as “Client Server” network.
Ø In this network we are having Server and Clients.
Ø The “Domain” system should have Network based/Server based Operating system such as Windows 2003 Server.
Ø The “Client” can either have Server based Operating system such as Windows 2003 Server or Desktop Operating system such as Windows XP.
Server:
The system which provides service is called Server.
Client:
The system which accepts the service is called Client.
Note: In Client Server networking we are having Centralized administration.
Note: During the centralized administration, the domain users can logon to any other client machine to the particular domain controller.
Note: Security provided here is called as “User Level Security” i.e. the user need not remember the multiple passwords to accessing the resources.
Ø If we want to configure a client machine to the particular domain controller,
§ Syntax:
Right click My Computer→ properties→ Computer Name→
Change→ Select Domain option→ Enter the Domain Name→
Select More→ Enter the Domain Name with Suffix→
Enter the Domain administrator Name and password.
Eg: twintowers.com
Ø If we want to configure a client machine to the Domain controller, first we must enter the Domain IP address in preferred DNS server of client machine.
§ Syntax:
My Network places→ properties→ LAN properties→ TCP/IP properties→ Select “preferred DNS server”→ Enter the Domain IP address.
Domain Controller Promotion:
The system which we want to make a Domain controller, that system should be having Windows 2000/2003 Server based Operating system.
§ Syntax:
Start→ Run→ Type “dcpromo” (Active Directory Service Installation)→ Next→ Select Domain controller for a new domain→ Select Domain in a New forest→ Next→ Enter the Domain Name (eg: wrangler.com)→ verify Domain Net BIOS name→ verify NTDS folder→ Next→ verify Sys Vol folder→ Next→ verify permission compatible with Windows 2000/2003 Operating systems→ Next→ Enter the Restore mode (Recovery) password→ Next→ Select DNS middle option→ Ok.
Note: After creating Domain Controller, to check whether Domain is created perfectly,
§ Syntax:
Start→ Programs→ Administrative Tools→ DNS→ Forward Lookup Zones→ Domain Controller→ 6 Folders should be there.
Policies
After installing Active Directory Services, Some Policies should be set in Domain Controller.
Domain Security Policy:
User Rights Assignments
1. Access the Computers from the Network→ Administrator and Everyone
2. Allow logon locally→ Administrator, Administrators and Everyone
3. Logon as Batch job→ Administrator and Everyone
Security Options
1. Accounts: Administrative Account Status→ Enable
Domain Controller Security Policy:
Local Policies:
User Rights Assignments
1. Access the Computers from the Network→ Administrator and Everyone
2. Allow logon locally→ Administrator, Administrators and Everyone
3. Logon as Batch job→ Administrator and Everyone
And
1. Deny Access to this Computer→ Not defined
2. Deny logon as a Batch Job→ Not defined
3. Deny logon as a Service→ Not defined
4. Deny logon as locally→ Not defined
5. Deny logon through Terminal Services→ Not defined
CRIMPING OF CABLES
Straight Cabling (PC to Hub) (one side same as other side)
One side Other side
1. Orange 1. Orange
2. Orange white 2. Orange white
3. Green 3. Green
4. Green white 4. Green white
5. Blue 5. Blue
6. Blue white 6. Blue white
7. Brown 7. Brown
8. Brown white 8. Brown white
Cross Cabling (PC to PC)
1. Orange 1. Green
2. Orange white 2. Blue white
3. Green 3. Orange
4. Green white 4. Green white
5. Blue 5. Blue
6. Blue white 6. Orange white
7. Brown 7. Brown
8. Brown white 8. Brown white
Logic: (1 ↔ 3, 2 ↔ 6.)
Roll over Cabling (Router Cabling) (one side reverse to other side)
1. Orange 1. Brown white
2. Orange white 2. Brown
3. Green 3. Blue white
4. Green white 4. Blue
5. Blue 5. Green white
6. Blue white 6. Green
7. Brown 7. Orange white
8. Brown white 8. Orange
Domain User
Creating a domain user:
If we want to create a domain user account,
§ Syntax:
Start→ Programs→ Administrative tools→ Active Directory Computers and users→ Expand our Domain Name→ Select users→ Right click users→ New→ User→ Enter user name, login name and password→ Ok.
Note: As an Administrator after creating Domain User Account, we must first logon with that particular user account because that particular user profile will be created at the time of that particular user logon.
Creating a User Group:
Group is the Collection of Users.
§ Syntax:
Start→ Programs→ Administrative tools→ Active Directory Computers and Users→ Right click Users→ New→ Group.
User Right click options:
Add to a Group:
This is used for adding the User Account in a particular Group.
§ Syntax:
Right Click User→ Add to a Group→ Advanced→ Find New→ Select Group.
Ø If u want to seize the User Account from particular Group.
§ Syntax:
Go to particular Group→ Right click→ Properties→ Members tab→ Add→ Advanced→ Find new→ Select User→ Ok.
To Disable an Account:
This is used to disable the user account.
§ Syntax:
Right click User→ Disable the particular User Account.
Reset Password:
This is used to change the password of a particular User Account.
§ Syntax:
Right click particular User→ Move.
Delete:
It is used to delete the User Account.
§ Syntax:
Right click particular User→ delete.
Restrict the User Account:
By default the user can logon to all computers. If we want to restrict the user, to logon to particular computer we can use this option.
§ Syntax:
Start→ Programs→ Administrative Tools→ Active Directory Computers and Users→ Select Domain→ Select Users→ Right Click Particular User→ Properties→ Select Account Tab→ Logon to→ select the Computer to logon to.
Logon to (Time to Time):
User can logon from the selected time to time.
USER PROFILES
Profiles:
To maintain our own individual desktop settings at the time of user login, Profiles are used.
Ø By using profiles, we can maintain desktop settings i.e. wallpapers, screensavers, desktop icons, Start menu options, Internet Explorer Favorites and cookies, Windows Dictionary etc; at the time of User login.
Profile types:
1. Local Profile
2. Roaming profile
3. Mandatory Profile
Local Profile
Local Profile is created at the time of first time User logon on the Domain Controller.
Roaming profile
After Roaming process, we can maintain our own individual desktop settings at the time of logon in any Client machine over a Network.
Roaming process
As an Administrator on Domain Controller, after creating the Local Profile,
Ø Share the “Documents and Settings” folder
§ Syntax:
Go to Boot Partition→ Documents and Settings→ Right click→ Sharing and Security→ Share with proper permissions to the specified User or
Everyone.
§ Syntax:
Go to programs→ Administrative Tools→ Active Directory Users and Computers→ Select Users→ Select particular User→ Right click→ Properties→ Profile tab→ Profile option→ Enter the UNC path (Universal Naming Context or Conventional path) Profile path→ “ \\System name\Shared folder name\User name “.
Eg: \\mcse2\ds\ahamed
Note: After Roaming process, we must first logon with that particular User Account on the Domain Controller.
Ø If we want to see the User Profile status,
§ Syntax:
My Computer→ Right click→ Properties→ Advanced→ User Profiles→ Settings.
Mandatory Profile
After Roaming Process, as an Administrator we can fix the Desktop Settings to the particular User Account.
Note: After creating Mandatory Profile, User cannot change the Desktop Settings.
As an Administrator on Domain Controller,
§ Syntax:
Go to Boot Partition→ Documents and Settings→ Select User folder→ Open→ Rename the “ntuser.dat” as “ntuser.man “.
Logon Script
Logon Scripts are used to execute the predefined executable files such as “calc.exe”, at the time of User Logon.
As an Administrator on Domain Controller,
§ Syntax:
1. Search the executable file path
Eg: Boot Partition\Windows\system32\calc.exe
2. Run notepad→ Enter executable file path
Eg: \\mcse2 (System Name)\Windows\system32\calc.exe
3. Save the file with “ .bat “ extension and save in Boot Partition\windows\SysVol\SysVol\Domain controller\Scripts\File Name
Eg: c:\windows\SysVol\ SysVol\microsoft.com\scripts\calc.bat
4. Share the “Windows” folder to everyone or a particular User with proper permissions.
5. Go to programs→ Administrative Tools→ Active Directory Users and Computers→ Select Users→ Select particular User→ Right click→ Properties→ Profile tab→ Logon Script option→ Enter the Batch file name (e.g. “calc.bat” )
Map Network Drive:
By using Map Network Drive, we can access particular Resource in shortcut method.
§ Syntax:
Browse the shared Resource→ Select Resource→ Right Click→ Map Network Drive→ Assign Drive letter→ Finish.
To open Map Network Drive Resource
§ Syntax:
Go to My Computer→ Open.
Home Folder:
By using Home Folder Concept, as an Administrator, we can assign our Domain Hard Disk space to the particular User or Remote system.
§ Syntax:
As an administrator on Domain Controller, create a folder and share with proper permissions to the specified User.
Start→ Programs→ Administrative Tools→ Active Directory Users and Computers→ Select Users→ Select particular User→ Right click→ Properties→ Profile tab→ In “Home Folder” option, select connect and assign drive letter→ Enter the UNC path (\\Domain Controller system name\shared folder name\User name).
FILE SYSTEMS
After Switching the Power on, the system goes through these processes.
1. POST (Power On Self Test)
It checks the Processor, RAM, Display Card etc.
2. System Configuration
It checks the Configuration about Processor speed, RAM size, Hard Disk size etc.
3. Booting
The process of loading System files and Bootable files of Operating system from Secondary Storage device (Hard Disk) to Micro Processor is called Booting.
Partitions:
According to our Windows 2003 Server Operating system, we are having two types of partitions.
1. System Partition
It contains Bootable files.
2. Boot Partition (System Root)
It contains Windows folder.

o Tracks are divided into Sectors.
o Sectors are divided into Clusters.
o Data is stored in Clusters.
o Track 0 is also called as MBR (Master Boot Record).
The MBR (Master Boot Record) contains,
1. Partition information
2. Root Directory
3. Bootable Files
4. File System
Partition information:
It contains the information about Logical drives.
Root Directory:
File system writes file properties i.e. file name, file type, file location, file attributes (read, write, and archive) in Root Directory.
Bootable Files:
According to Windows 2003 Server Operating System, there are five Bootable files.
1. NTLDR
2. BOOT.INI
3. BOOT SECT.DOS
4. NT BOOT DO.SYS
5. NT DETECT.COM
FILE SYSTEM
File System is the file databases which maintains the read or write operations on a physical disk by maintaining the sector information.
Ø When the data is stored in the physical disk, it may be stored in multiple clusters.
Ø A table is created in File System. This Table maps file to the Clusters, where they are located and contains information about their sequential order. So, the file was located and read.
File System in different flavors:
1. FAT 16 (File Allocation Table – 16 Bit)
2. FAT 32 (File Allocation Table – 32 Bit)
3. NTFS (Network File System)
FAT 16:
Ø FAT 16 is also referred as FAT, is widely used in Windows NT 4.0 operating system and earlier versions of Operating systems.
Ø A table entry is 16 bits per entry.
FAT 32:
Ø FAT 32 is used to differentiate between the versions.
Ø It was introduced with Windows 95 operating system.
Ø When FAT 32 was introduced, the table length was extended to 32 bits per entry.
NTFS:
Ø NTFS File System was introduced with Windows NT 4.0 operating system and has been some improvements. Again NTFS was introduced as NTFS File System 5.0 with Microsoft Windows Server 2000 and fully supported by Microsoft Windows 2003 Server.
Ø NTFS was a Master File Team (MFT). It is similar to FAT 16 and FAT32 but, more efficient. NTFS because of having different Architecture is not readable by Windows 98 and earlier operating systems.
Ø Although Microsoft Windows 2003 Server supports FAT32 and NTFS, it is highly recommended to format using NTFS File System.
Ø NTFS File System was required, when Active Directory Service is installed.
Ø By using NTFS File System, we can have Compression, Encryption, File and Folder level Security and Disk Quotas.
Note: We can convert FAT32 to NTFS file system of particular Partition in GUI mode but, we will lose the Data of that particular Partition.
Note: We can also convert FAT32 to NTFS file system of the particular Partition in CUI mode. We would not loose the Data.
§ Syntax:
Start→ Run→ Type cmd→ Ok→ in the Command prompt type, “convert <drive letter>:/fs:ntfs “.
e.g. convert d:/fs:ntfs
Compression:
By using Compression, we can compress the contents of the particular folder or file to save the disk space.
§ Syntax:
Right click the folder→ Properties→ Advanced→ Select “Compress the Contents to save disk space”→ Ok.
Encryption:
By using Encryption, we can encrypt the data in the particular file or folder to secure the data.
§ Syntax:
Right click the folder→ Properties→ Advanced→ Select “Encrypt the data of a particular file or folder”→ Ok.
Disk Quotas:
By using Disk Quotas, as an Administrator we can assign limited disk space to a particular User.
§ Syntax:
Select particular disc→ Right click→ Properties→ Quotas→ Enable Quota management→ Select “Deny Disk space to users exceeding Quota limit.
Limit Disk space to: 
Set warning level to: 
Select the Quota logging options for this volume
In logging options,
→ Select “log event when a User exceeds the Quota limit”
→ Select “log event when a User exceeds their warning level”
→ Go to Quota entry tab→ Quota menu→ New Quota entry→ Advanced→ Find now→ Select particular User→ set Disk space and warning level→ Ok→ Apply→ Ok.
NAMING SERVICES

According to our Windows 2003 Server Operating System, we are having two Naming Services.
1. WINS (Windows Internet Naming Service)
2. DNS (Domain Naming Service)
WINS

Database
MCSE1→ 100.10.10.1
MCSE2→ 100.10.10.2
MCSE3→ 100.10.10.3
WINS is the process of resolving NETBIOS Names to IP addresses.
STEP 1:
WINS Server Installation:
§ Syntax:
Start→ Settings→ Control Panel→ Add/Remove Programs→ Add/Remove Windows Components→ Networking Services→ Details→ WINS→ Ok.
STEP 2:
WINS Server Configuration:
§ Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Advanced→ Select WINS
Tab→ Enter the WINS Server IP address.
STEP 2:
WINS Client Configuration:
§ Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Advanced→ Select WINS
Tab→ Enter the WINS Server IP address.
Domain Naming Service (DNS):

Database
MCSE1→ 100.10.10.1
MCSE2→ 100.10.10.2
MCSE3→ 100.10.10.3
DNS is the process of resolving Domain Name space to IP address.
DNS Server Installation:
When we run “ dcpromo.exe “, the Active Directory Service and DNS Service will be installed in that particular machine.
If we want to install the DNS Service manually,
§ Syntax:
Start→ Settings→ Control Panel→ Add/Remove Programs→ Add/Remove Windows Components→ Networking Services→ Details→ DNS→ Ok.
DNS Server Configuration:
§ Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Enter the DNS Server IP address in “Preferred DNS Server”.
DNS Client Configuration:
§ Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Enter the DNS Server IP address in “Preferred DNS Server”.
DHCP

Dynamic Host Configuration Protocol:
It is the process of assigning IP address to the DHCP clients (which has no IP address) automatically.
Ø The minimum requirements to configure a DHCP Server
1. Windows 2003 Server Operating System
2. One Static IP address (Manual IP address)
3. Stop the DHCP Client Service
§ Syntax:
Start→ Programs→ Administrative Tools→ Services→ Select DHCP Client Service→ Right Click→ Stop
Step 1:
Installing the DHCP Service
§ Syntax:
Start→ Settings→ Control Panel→ Add/Remove Programs→ Add/Remove Windows Components→ Networking Services→ Details→ DHCP Services→ Next→ Ok.
Step 2:
DHCP Server Configuration
SCOPE
The Scope contains the full configuration details of DHCP Network.
§ Syntax:
Start→ Programs→ Administrative Tools→ Services→ DHCP→ Right click our Computer Name→ New Scope→
→ Enter the Scope Name
→ Address Range: Start: 100.10.10.2
End: 100.10.10.14
→ Exclude Range: Start: 100.10.10.4
End: 100.10.10.7
→ Lease duration: 8 days (By default)
→ No, I will Configure later.
Lease Duration:
After 50% of Lease Duration, the DHCP Client tries to renew the IP address until 87.4% Lease Duration.
Ø If we want to renew the IP address on Client Machine,
§ Syntax:
Start→ Run→ Cmd
→” ipconfig/renew “
→ “ipconfig/release “
Microsoft Reserved IP address: (169.254.x.x)
This range of IP address assigned to the DHCP clients at the time of completing the Lease Duration period.
Reservations:
The process of assigning wanted IP address to the particular DHCP Client Machine through Net BIOS name and MAC address of that particular DHCP Client Machine.
§ Syntax:
Select Reservation Option→ Right click→ New→
Reservation→ Net BIOS Name: MCSE4 (Computer name)
MAC address : 2B-4E-8F-3C-E5
IP address : 100.10.10.10 (wanted IP address)
The Transaction between DHCP Server and DHCP Client

1. Discover
Client Machine searching for DHCP Server
2. Offer
DHCP Server ready to assign the IP address
3. Request
Client Machine request for an IP address
4. Acknowledgement
DHCP Server sends IP address with Acknowledgement to the Client Machine.
Note: After creating the Scope, as an Administrator we must “activate” the scope and “authorize” the DHCP Server
Activate:
§ Syntax:
Right click the Scope→ Activate
Authorization:
§ Syntax:
Right click the DHCP Server (System Name)→Right click→
Authorize.
INTERNET INFORMATION SERVICES
It is used to create Websites and FTP sites.
Websites (HTML)
Step 1:
IIS service installation:
§ Syntax:
Start→ Settings→ Control panel→ Add/Remove Programs→ Add/Remove Windows Components→ Select “Application Server”→ Details→ Internet information Services→ Details→ World Wide Web service→ Ok.
Step 2:
Saving our Web page:
§ Syntax:
Open the text file→ Enter the Web design file format→ Save as (.html) extension and save in boot partition→ Inetpub→ www.root→ Save (sample.html).
Step 3:
Adding the additional IP address:
§ Syntax:
My Network Places→ Right click→ Properties→ LAN Connection→ Right click→ Properties→ TCP/IP→ Properties→ Advanced→ IP settings→ Add→ Assign the IP address and Subnet Mask.
Step 4:
Website Creation:
§ Syntax:
Start→ Programs→ Administrative Tools→ Internet information
Services→ Websites→ Right click→ New Website→ Enter the Description (e.g. sample) → Next→ Select the additional IP address (150.10.10.25) and verify the html default port number (80) and type the Website name (www.chiru.com)→ Next→ Enter the Home Directory path through→ Browse→ My Computer→ Boot Partition→ Inetpub→ www.root→ Ok→ verify the permissions→ Finish.
Ø After creating the Website,
Right click the Website→ Description Name→ Properties→ Documents tab→ remove the previous default Web pages and add our Web page (sample.html).
Step 5:
Editing the ETC host file:
§ Syntax:
Boot Partition→ Windows→ System32→ Drivers→ ETC→ Host→ Open with Notepad→ Enter the additional IP address <Website Name > (e.g. 150.10.10.25 www.chiru.com)
Ø On Client side,
Do the same above 5th Step process.
FILE TRANSFER PROTOCOL (FTP)
Step 1:
Installing the FTP Service:
§ Syntax:
Start→ Settings→ Control panel→ Add/Remove Programs→ Add/Remove Windows Components→ Select “Application Server”→ Details→ Internet information Services→ Details→ FTP Service→ Ok.
Step 2:
Saving our Files:
§ Syntax:
Save the required files with their own file extensions and save in, Boot Partition→ Inetpub→ FTP root.
Step 3:
Adding the additional IP address:
§ Syntax:
My Network Places→ Right click→ Properties→ LAN Connection→ Right click→ Properties→ TCP/IP→ Properties→ Advanced→ IP settings→ Add→ Assign the IP address and Subnet Mask.
Step 4:
FTP Creation:
§ Syntax:
Start→ Programs→ Administrative Tools→ Internet information Services→ Websites→ Right click→ New Website→ Enter the Description (e.g. sample) → Next→ Select the additional IP address (150.10.10.25) and verify the html default port number (21) → Next→ In FTP user isolation, select “Do not isolate Users”→ Next→ Enter the Home Directory path through→ Browse→ My Computer→ Boot Partition→ Inetpub→ FTP root→ Ok→ Next→ verify the permissions→ Finish.
Step 5:
To open the FTP Site in Internet Explorer,
§ Syntax:
Go to Internet Explorer→ type “ftp:// Additional IP address “
e.g. ftp://150.10.10.25
Disk Management
Disk Management:
§ Syntax:
Right click My Computer→ Manage→ Storage→ Disk Management.
HDD configuration is of two interfaces.
1. Integrated Device Electronics (IDE):
IDE can have two Devices to be connected.
2. Small Computer System Interface (SCSI):
SCSI can have 32 Devices to an interface.
By using Disk Management we can create,
1. Disk Partition
2. Simple and Spanned Volumes
3. Spanned and Stripped Volumes
4. RAID Levels or Fault Tolerance
Note: We can create four Primary Partitions (BASIC)
Note: RAID - Redundant Array of Independent Disk
Note: RAID 0 - Simple + Spanned (Disk Stripping)
Simple Volume:
Combining two or more free spaces in one Hard Disk is called Simple Volume.
Minimum Hardware Requirements:
1. One Hard Disk
2. Number of IDE Controllers – 1
Spanned Volumes:
Combining two or more uneven free spaces on multiple Hard Disks is called Spanned Volume.
Minimum Hardware Requirements:
1. Number of IDE Controllers – 1
2. Hard disks – 2
Stripped Volumes:
Combining two or more even free spaces on Multiple Hard Disks is called Stripped Volume.
Minimum Hardware Requirements:
1. Number of IDE Controllers – 1
2. Hard disks – 2
1.
We can combine two or more 1. We can combine two or more
Uneven free spaces. Even free spaces.
2. Data is written serially 2. Data is written parallels.
(Serial writing).
3. Writing and Reading Data is 3. Writing and Reading Data is
Slow (Disk Performance is poor). Faster (Disk Performance is fast)
4.
We cannot keep either Boot or 4. We cannot keep either Boot
System Partition. or System Partition.
5. No Fault Tolerance. 5. No Fault Tolerance.
RAID 1 or Disk Mirroring:
1. Writes Data to two disks simultaneously. Writes all Data to both Primary and Mirror Disks.
2. Can use only 50% of the Disk Space.
3. Can contain any partition includes Boot and System Partitions.
4. Supports FAT and NTFS File Systems.
Note: RAID 0 is not Fault Tolerance.
Note: RAID 1 is a Fault Tolerance.
In a RAID 5 volume, Fault Tolerance is achieved by adding a Parity Stripe to each Disk partition in the volume. If a single Disk fails, Windows uses the Data and Parity information on the remaining to reconstruct the Data that was on a failed Disk.
Parity:
In mathematical method of determining, it is the number of odd and even bits which can be used to reconstruct Data.
System Tools
Disk Defragmenter:
Sometimes we create, remove, move, copy and edit files. They can become fragmented.
When a file is written to Disk, it is written to Clusters. Clusters are tiny parts of the Drive where information is stored. When a file is moved or deleted, opened, the non-contagious clusters are not removed as well thereby creating a fragment. The process of de-fragmenting removes lost Clusters and also records in a more efficient order. De-fragmentation will improve the performance of the System.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Disk Defragmenter.
Disk Cleanup:
To remove the temporary internet files, compressed old files, empty the Recycle Bin. Disk Cleanup is provided as a utility.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Disk Cleanup.
Chkdsk:
This Command is used to scan and fix the errors on the disk
§ Syntax:
Run Cmd→ type “chkdsk <drive letter>: and press enter.
e.g. c:\chkdsk d: (where ‘d’ is the ‘d’ partition)
BACKUP
Backup:
Backup is the plan in which recovery from sudden failures is possible.
Ø Every file contains an Archive bit as one of its hidden attributes.
Ø This attribute setting is to indicate that the file was created or after it has been modified and needs to be included in the Backup set.
Ø When the Archive bit is set to 1 that indicates the file was created or it has been modified.
Ø The Backup program will then set the Archive bit to zero which is called as clearing the Archive bit.
Ø If the file does not change by the next scheduled Backup, that file is skipped.
Ø The Archive bit settings is dependent on what type of Backup is being run.
Types of Backup:
1. Normal Backup
2. Incremental Backup
3. Differential Backup
4. Copy Backup
5. Daily Backup
Normal Backup:
Normal Backup sometimes referred to as full Backup. This Backup is the most complete type of Backup.
Ø A Normal Backup takes large amounts of time to backup.
Ø A Normal Backup clears the Archive bit of all files after backup.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Next→
Select “Backup Files and Settings”→ Next→ Select “let me choose what to backup”→ Next→ Select the “folder” to backup→ Next→ Choose a place to save your backup and type a name for the backup → Next→ Click “Advanced” tab→ Select “Normal” in select the type of backup→ Next→ Select “Verify data after backup” and Deselect or Select “Disable volume shadow copy”→ Next→ Select “Append this backup to the existing backups”→ Next→ Select “Now or Later” to run the backup→ Next→ Finish.
To restore a Normal Backup:
§ Syntax:
Open the saved Normal Backup file→ Next→ Select “Restore files and settings”→ Next→ In the File, Select the Desired Normal Backup File→ Next→ Advanced→ Select “Original Location” to restore file→ Next→ Select “Leave existing files (recommended)”→ Next→ Finish.
Incremental Backup:
Incremental Backup is the quickest method for performing backup of data.
Ø An Incremental Backup backups only the new files and modified files and Archive bit is set to 1, since the Normal Backup and Incremental Backup.
Ø It also clears the Archive bit of all files after Backup.
Ø To do a complete restore, we must restore the Normal Backup and previous Incremental Backups.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Next→ Select “Backup Files and Settings”→ Next→ Select “let me choose what
to backup”→ Next→ Select the “folder” to backup→ Next→ Choose a place to save your backup and type a name for the backup → Next→ Click “Advanced” tab→ Select “Incremental” in ‘select the type of backup’→ Next→ Select “Verify data after backup” and Deselect or Select “Disable volume shadow copy”→ Next→ Select “Append this backup to the existing backups”→ Next→ Select “Now or Later” to run the backup→ Next→ Finish.
Note: To do a complete Incremental Backup restore, we must first restore the Normal Backup and previous Incremental Backups.
§ Syntax:
After restoring the Normal Backup then,
Open the saved Incremental Backup file→ Next→ Select “Restore files and settings”→ Next→ In the File, Select the Desired Incremental Backup File→ Next→ Advanced→ Select “Original Location” to restore file→ Next→ Select “Replace existing files if they are older than backup files”→ Next→ Finish.
Differential backup:
It backup’s all that have changed or newly added files since the last full backup.
Ø When a Differential backup is used, it backup’s all files with the archive bit set to ‘1’ but, it does not clear the archive bit.
Ø By not clearing the archive bit, the Differential backup will backup the same file on two separate dates even if the file does not change.
Ø To do a complete restore, we must restore the normal backup first and last Differential backup next.
Copy backup:
Copy backup is just like Copy. It backup’s only files specified, regardless of whether the archive bit is set to ‘1’ or not & it does not clear the archive bit.
Ø They may be made when a company requires keeping data for extended length of time.
Daily backup:
It backup’s only new files or modified files on the day.
Ø It does not clear the archive bit.
System State Backup
By using System state Backup, as an Administrator we can backup Active Directory Database.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Advanced Mode→ Backup→ Select “Only backup System State Data”→ Select Location and Name the Backup→ Next→ Finish.
To Recover the Active Directory Database:
§ Syntax:
Restart the System→ Press Continuously ‘F8’ key (Safe Mode) → Select “Directory Service Restore Mode” (Windows Domain Controllers only) → Enter Restore mode password→ Insert Backup Device or select System State Backup→ Restore→ After completing Restore→ Restart System.
Note: Restore mode password is given at the time of “Active Directory Service” installation.
Automated System Recovery
Automated System Recovery Backup is used to recover from sudden O.S. Failures and Active Directory Database failures.
§ Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Go to “Advanced Mode”→ Select “Automated System Recovery”→ Next→ Enter Destination Storage Device→ Next→ Finish.
Note: Please insert the Floppy Disk in FDD when asked to, for saving our System settings.
Restoring ASR Backup:
§ Syntax:
Insert 2003 Server O.S. CD in CDROM→ Go to BIOS settings→ Enter the First Boot Device as CDROM and Second Boot Device as IDE-0→ Save and Exit→ Press any key to boot from CDROM→ Select Operating System addition type (Enterprise) → When intimated press ‘F2’ key to recover from ASR Backup, press ‘F2’→ In the middle of Installation, Enter the Destination Storage Device address→ At the end of the Installation, insert Floppy Disk which contain the System settings.
Terminal Service
By using Terminal Service, we can access our entire system in Remote system.
Terminal Server Configuration:
§ Syntax:
Start→ Settings→ Control panel→ Add/Remove Programs→ Add/Remove Windows Components→ Select “Terminal Services” and “Terminal Server Licensing”→ Install.
Share the “Windows” folder to the specified User with proper permissions.
Terminal Client Configuration:
§ Syntax:
In the Client machine, browse the Shared Terminal Server “Windows” folder→ System32→ Clients→ TS Client→ Win32→ Setup.exe
To access the Terminal Server in Terminal Client machine,
§ Syntax:
Start→ Programs→ Remote Desktop Connection→ Enter the Terminal Server System Name and IP address and then Connect.
In Windows 2003 Server, we don’t need to install Terminal Service.
Terminal Server Configuration:
§ Syntax:
Right Click My Computer→ Properties→ Remote tab→ On Remote Desktop Window→ Mark the “Allow Users to connect remotely to this Computer.
To open the Terminal Server in Remote System,
§ Syntax:
Go to Remote system,
Start→ Programs→ Accessories→ Communications→ Remote Desktop Connection→ Enter the Terminal Server “System” name.
Offline Enabling
By enabling the Offline files, we can obtain all the resources in networking disabled condition also.
§ Syntax: (Step 1)
Go to My Computer→ Open→ Go to Tools menu→ Folder Options→ Select the “Offline files” tab→ Mark the “Enable Offline files” option→ Mark the “Synchronize all offline files when logging on or logging off” option→ Mark the “Display a remainder every selected minutes” option→ Mark the “Create an offline files shortcut on the desktop” option→ Mark the “Encrypt offline files to secure and to examine the drive’s space” option→ Apply→ Ok.
Step 2: Browse the offline resource (wanted resource) → through Run →\\Source system name→ Right click the wanted resource→ Make available offline.
Synchronization: (Step 3)
By using the Synchronization, all the modified resources (Offline folders), are updated in the Source system manually or dynamically.
By dynamically:
§ Syntax:
Go to My Computer→ Tools menu→ Synchronize→ Mark the Offline files→ Go to “Setup” tab→ Again mark the “Offline files” option→ Mark the “When I logon to my Computer or logoff to my Computer→ Go to “Idle” tab→ Mark the “Offline file or folder”→ Go to “Advanced” tab→ Enter the minimum minutes for “Automatically Synchronize the specified items after my Computer has been idle for”→ Enter the minimum time and mark the “While my Computer remains idle, repeat Synchronization every→ Mark the “Prevent the Synchronization when my Computer is running on battery power” option→ Ok→ Apply→ Ok.
Event Viewers
Event Viewers:
Windows 2003 Server O.S. includes a set of Log files that are configured and presented within the Event Viewers.
§ Syntax:
Right click My Computer→ Manage→ Computer Management (Local)→ Event Viewers.
Application Log file:
Developers of an Application can program their software to report Configuration changes, Errors or other Events in these Log files.
System Log:
Windows 2003 Server O.S. will report Events about Service start or abnormal Shut Down, Device failures and so on to these Logs.
Security Log:
Windows 2003 Server O.S. will report Events about Logon and resource occurs Events.
Directory Service Log:
This Log contains Log information about the Active Directory Events.
DNS Server Log:
This Log contains Log information about DNS Server Log events.
File replication Service:
This Log Contains Log information about replicated files Log Events.
Run as Administrator:
On Domain when logon as User, if we want to run as Administrator,
Step 1:
Right click Taskbar→ Properties→ Start Menu→ Customize→ Select “Display Administrative Tools”
Step 2:
Start→ Programs→ Administrative Tools→ Right click “Active Directory Users and Computers”→ Run as→ Enter as administrator.
e.g. User Name: Novell\administrator
Password : iiht@447
Ø If we want to do administrator work on Client System,
§ Syntax:
My Computer→ Boot Partition→ Windows→ System32→ Double click “Adminpak.msi”→ Run the installation→ Finish.
Task Manager
Task Manager:
Press (Ctrl + Alt + Del) to view the Task Manager.
We will have five options.
1. Applications
2. Processes
3. Performance
4. Networking
5. Users
Applications:
It displays the status of Applications (whether running or not responding).
Processes:
It gives the list of recent processes that took place i.e. the list of latest executable files with User Name and Memory usage.
Performance:
It gives the Graphs of CPU usage history, Page file usage history.
Networking:
It gives the Graphs of usage of Network at present and gives Adapter name, Network utilization and link speed and share information.
Users:
It gives the User accounts information.
Loop Back Adapter
Loop Back Adapter Installation:
§ Syntax:
Disable the NIC if we have it
→ Start→ Settings→ Control Panel→ Add Hardware→ Next→ Select “Yes, I have already connected the hardware→ Next→ Select “Add a new Hardware Device”→ Next→ Select “Install a Hardware that I manually select from a list”→ Next→ Select “Network Adapters”→ Next→ Select “Microsoft”→ and Select “Microsoft Loop back Adapter”→ Next→ Finish.
Assigning IP address for this Loop back Adapter:
§ Syntax:
Right click My Network Places→ Right click “Microsoft Loop back Adapter”→ Properties→ TCP/IP→ Properties→ Assign IP address→ Ok.
Distributed File System (DFS)
DFS:
By using DFS, as a User we can access number of resources of different address location in a single location.
DFS Roots are of two types.
1. Standalone Root
2. Domain Root
Standalone Root:
Standalone Root is available in Domain, Member Server and WORKGROUP Systems.
Stand alone Root can be configured in three steps.
§ Syntax:
Step 1:
Create a Folder and share with proper permissions to the particular User.
Step 2:
Start→ Programs→ Administrative Tools→ DFS→ Right click→ New Root→ Select Standalone Root→ Enter the Server name (mcse2) → Enter the Root name→ Enter the DFS folder path through Browse option→ Finish.
Step 3:
Right click that Root→ New link→ Enter the Link name→ Enter the path to target (shared Resource) through Browse option→ Ok.
Ø If we want to browse the Standalone Root,
§ Syntax:
Go to Start→ Run→ “\\DFS Server name\DFS Root name “
e.g. \\mcse2\DFS Root
Domain Root:
Domain Root is available in Domain and Member Server only.
Domain Root can be configured in three steps.
§ Syntax:
Step 1:
Create a Folder and share with proper permissions to the particular User.
Step 2:
Start→ Programs→ Administrative Tools→ DFS→ Right click→ New Root→ Select Domain Root→ Select Domain Controller→ Enter the DFS Server name through Browse option (e.g. mcse2.novell.com) → Enter the Root name→ Enter the DFS folder path through Browse option→ Finish.
Step 3:
Right click that Root→ New link→ After the Link name enter the path to connect (shared Resource) through Browse option→ Ok.
Ø If we want to browse the Domain Root,
§ Syntax:
Go to Start→ Run→ “\\Domain name\ DFS Root name”
e.g. \\novell.com\DFS Root
Subscribe to: Posts (Atom)
- Explain hidden shares. How do they work? Hidden or administrative shares are share names with a dollar sign ($) appended to their names....
- Active Directory What is Active Directory? What is LDAP? Can you connect Active Directory to other 3rd-party Directory Services? Name a f...
-
- Get link
- X
- Other Apps
No comments:
Post a Comment