Ary Elp Ollege Ardware ND Etworking Ervice Evel-: M H C H A N S L
Ary Elp Ollege Ardware ND Etworking Ervice Evel-: M H C H A N S L
Ary Elp Ollege Ardware ND Etworking Ervice Evel-: M H C H A N S L
……………………………………………………………
By Mohammed H.
……………………………………………………………
Learning Outcomes:
Network Configuration
In general, all networks have certain components, functions,
and features in common, these include:
◦ Servers— Computers that provide shared resources to
network users.
◦ Clients— Computers that access shared network
resources provided by a server.
◦ Media— the wires that make the physical connections.
……………………………………………………………
◦ Servers are described as "dedicated" because they are not themselves clients,
and because they are optimized to service requests from network clients
13
……………………………………………………………
Cont….
The network operating system is designed to
allow shared file and printer access among multiple
computers in a network, typically a local area
network (LAN), a private network or to other networks.
Network Operating Systems are based on
a client/server architecture in which a server enables
multiple clients to share and access resources.
14
……………………………………………………………
Cont….
Advantage of NOS
Centrally manage network resources, such as programs,
data and devices.
Secure access to a network.
Allow remote users to connect to a network.
Allow users to connect to other networks like the Internet.
Back up data and ensure its availability.
Multiuser, Multitasking, and Multiprocessor Systems
15
……………………………………………………………
Cont….
Supports multiple user accounts at the same time and
enables concurrent access to shared resources by
multiple clients. Allow for simple additions of clients
and resources.
Monitor the status and functionality of network
elements.
Distribute programs and software updates to clients.
Ensure efficient use of a server's capabilities.
16
……………………………………………………………
Cont….
Types of Network Operating System
1. Novell NetWare
2. Microsoft Windows:
3. Mac OS X Server:
4. UNIX:
18
……………………………………………………………
CONT….
1. Novell NetWare:
Novell NetWare was one of the first network
operating systems.
It made possible the networking of computers
running MS-DOS. NetWare used DOS to boot
the server and then installed itself as an
alternative operating system. Although today
Novell NetWare uses TCP/IP, its original
file transfer protocol was IPX.
19
……………………………………………………………
CONT….
1. Novell NetWare:
Novell NetWare requires a server running the
server software and client software on all
machines. Novell client software is included in
recent Windows releases but must be purchased
separately for other operating systems. Novell
NetWare is the least commonly used of the major
NOSs today and is the least likely to be installed in
a new, small network.
20
……………………………………………………………
CONT….
2. Microsoft Windows:
Network operating systems offered by
Microsoft are Windows 2000 Server and
Windows Server 2003.
Windows Server operating systems use a
central Database called Active Directory
to manage network resources.
21
……………………………………………………………
CONT….
3. Linux/UNIX:
Linux is an operating system similar to
UNIX.
It runs on many different computers
and was first released in 1991.
Linux operating systems include
RedHat, Caldera, SUSE, Debian,
Fedora, Sanba and Slackware
22
……………………………………………………………
CONT….
4. Macintosh OS X.
Mac OS is the computer operating
system for Apple Computer's Macintosh
line of personal computers and
workstations.
A popular feature of its latest
version, Mac OS X , is a desktop
interface with some 3-D appearance
characteristics.
23
……………………………………………………………
Cont…
What is Server?
Servers is large system with higher processing speed,
memory and hard disk capacity whose role in a network is
to provide services and resources to users.
In a large network environment, servers may have one or
more specific roles in a network, depending on the number
of users, volume of traffic, number of peripherals, and so on
Computer that functions as servers within a domain can have
one of two roles, Domain Controller or Member Server.
24
……………………………………………………………
Server-based network:-
Server-based network:- A network in which
network security and storage are managed
centrally by one or more servers.
25
……………………………………………………………
Cont…
How It Works
In a server-based network, special computers called
servers handle network tasks such as authenticating users,
storing files, managing printers, and running applications
such as database and e-mail programs.
Security is generally centralized in a security provider,
which allows users to have one user account for logging
on to any computer in the network. Because files are
stored centrally, they can be easily secured and backed up.
26
……………………………………………………………
27
……………………………………………………………
Cont….
Role of Server:
1. Domain Controller is the authentication server or
security server validate users for logging on and accessing
network resources.
2. Member servers is a computer that provides specific
function.
Such as :-File and print servers provide users with centralized
locations for storing files and accessing print devices.
28
……………………………………………………………
Cont…
Choosing a NOS
The main features to consider when selecting a NOS include:
Performance
Security
Scalability
Robustness/fault tolerance
29
……………………………………………………………
30
……………………………………………………………
Cont…
This may include identifying or clarifying
The business case
Level of services they need
Maintenance and backup requirements
Bandwidth issues
The nature of the data (e.g. text, multimedia)
Security needs (E.g. levels of user access and privileges)
Available support resources
Cost or budget.
31
……………………………………………………………
Cont…
Once requirements have been defined and client needs are
◦ Hardware
◦ Software
◦ Network connections.
32
……………………………………………………………
33
……………………………………………………………
34
……………………………………………………………
CPU
RAM
HDD
RAID Controller
FAN
POWER SUPPLY……
35
……………………………………………………………
CONT….
1. Blade Server
3. Tower Server
36
……………………………………………………………
1. blade server
Blade server. A server architecture
that houses multiple server modules
("blades") in a single chassis. It is
widely used in datacenters to save
space and improve system
management. Either self-standing or
rack mounted, the chassis provides
the power supply, and each blade has
its own CPU, RAM and storage.
37
……………………………………………………………
3. Tower Server
A tower server is a computer intended
for use as a server and built in an upright
cabinet that stands alone. The cabinet,
called a tower, is similar in size and
shape to the cabinet for a tower-style
personal computer. This is in contrast to
rack server s or blade server s, which are
designed to be rack-mounted .
39
……………………………………………………………
The End
40
……………………………………………………………
41
……………………………………………………………
42
……………………………………………………………
Cont…
What is Software compatibility?
Software compatibility is a characteristic of software
components or systems which can operate satisfactorily
together on the same computer, or on different
computers linked by a computer network.
It is possible that some software components or
systems may be compatible in one environment and
incompatible in another.
43
……………………………………………………………
Cont…..
44
……………………………………………………………
Cont…
Software incompatibility occurs many times for new software
released for a newer version of an operating system which is
incompatible with the older version of the operating system because
it may miss some of the features and functionality that the software
depends on.
Software that works on older versions of an operating system is said to
be backwards compatible.
45
……………………………………………………………
Cont….
What is Hardware Compatibility?
Hardware Compatibility List (HCL) is a list of
computer hardware (typically including many types of peripheral
devices) that is compatible with a particular operating system or device
management software.
In today's world, there is a vast amount of computer hardware in
circulation, and many operating systems too.
46
……………………………………………………………
Cont…
Hardware compatibility can refer to the
compatibility of computer hardware components
with a particular CPU architecture, bus,
motherboard or operating system.
Hardware that is compatible may not always run
at its highest stated performance, but it can work
with legacy components.
47
……………………………………………………………
Cont…
How well you plan these steps will determine how successful
49
……………………………………………………………
Cont…
Verifying Minimum Hardware Requirements
The first step of the installation is verifying that your hardware meets the
system requirements. although there is a minimum requirement for the
CPU and RAM, there is also a recommended CPU and RAM
configuration. For the sake of performance we have to use recommended.
50
……………………………………………………………
51
……………………………………………………………
Cont….
Selecting the Computer Name
Each computer on a network must have a name that is unique
within that network. Many companies have a standard naming
convention for their servers and workstations.
Cont…
53
……………………………………………………………
Choose an Installation
Method
1. Attended installation
2. Unattended installation
3. Other installation options
54
……………………………………………………………
Cont…
Cont…
56
……………………………………………………………
Cont…
3. Other Installation Options
3.1. Network installation
Cont…
58
……………………………………………………………
1. Partitioning
2. File system
3. Licensing
4. Server name
5. Initial password
6. Network settings
7. Upgrade or clean installation
59
……………………………………………………………
BIOS Setup
60
……………………………………………………………
61
……………………………………………………………
62
……………………………………………………………
63
……………………………………………………………
64
……………………………………………………………
65
……………………………………………………………
66
……………………………………………………………
67
……………………………………………………………
68
……………………………………………………………
Logon to Windows
69
……………………………………………………………
Directory Service
The Directory acts as a central point of control and
management of the network operating system.
71
……………………………………………………………
Cont…
single logon facility and they provide more secure authentication process.
Directory Services allow interoperability: Most of Directory Services
available today are based upon industry standards This allows sharing of
72
……………………………………………………………
Cont…
Directory Services software application store data in its own database.
Following are the important data which are kept in Directory
Services database.
◦ User Account Information (Login name, Password, Restrictions).
◦ Security Information.
◦ Network Structure.
Cont….
75
……………………………………………………………
Cont….
76
……………………………………………………………
Cont…
It is not a physical entity and doesn’t identify the actual network
For Domain
example, Microsoft.com and Amazon.com are domains
78
……………………………………………………………
Is a collection of trees that do not share a contiguous DNS naming structure.
Forest
79
……………………………………………………………
Schema
◦ Is the configuration information that
governs the structure and content of the
directory
Configuration
◦ Configuration defines the logical structure
of a forest, such as the number and
configuration of sites in the forest.
80
……………………………………………………………
Global Catalog
It contains information about all objects in the forest and, in particular, where to
find them. Global catalogs also contain membership information for universal
groups.
81
……………………………………………………………
Domain Controller
A domain controller manages information in the Active
Directory database and enables users to log on to the domain, be
authenticated for accessing resources in the domain, and search
the directory for information about users and network resources.
Domain controllers act as the central security component of a
domain.
All security and account validation is performed by a domain
controller.
Every domain must have at least one domain controller.
82
……………………………………………………………
Organizational Unit
Organizational Unit (OU) is a special container of Active Directory,
which is used to organize Active Director objects within a domain
into administrative groups or simply an organizational unit (OU) is a
logical group of Active Directory objects. An OU can contain objects
like user accounts, groups, computers, printers, file shares, and other
OUs from the same domain.
83
……………………………………………………………
Cont….
84
……………………………………………………………
Tree
An Active Directory tree is a collection of Active Directory
domains that begins at a single root and branches out into
peripheral, child domains. Domains in an Active Directory tree
share the same namespace.
85
……………………………………………………………
Trust
Active Directory Trust relationship is a logical link
which allows a domain to access another domain, or a
forest to access another forest. Trusts which are created
automatically are called as implicit Trusts and the trusts
which are created manually are called as Explicit Trusts.
86
……………………………………………………………
Cont…
The following are the characteristics of Windows 2003
Trusts.
◦ Active Directory Trusts can be created manually
(explicitly) or automatically (implicitly).
◦ Active Directory Trusts can be either transitive or
non transitive. A transitive trust extends the trust
relationships with other domains and a no
transitive does not allow the trust to flow to any
other domains in the forest.
◦ Active Directory Trusts can be one-way or two-way.
87
……………………………………………………………
Types of Trust
1. Parent-child Trust:
2. Tree-root Trust:
3. Shortcut Trust:
4. External Trust:
5. Realm Trust:
6. Forest Trust:
88
……………………………………………………………
Cont….
89
……………………………………………………………
Cont…
Shortcut Trust: Shortcut Trust is an clearly created, transitive trust
between two domains in a forest to improve user logon times.
Shortcut Trust will make a trust path shorter between two
domains in the same forest. The Shortcut Trust can be one-way or
two-way.
External Trust: External Trust is explicitly created, non-transitive
trust between Windows Server 2003 domains that are in different
forests or between a Windows Server 2003 domain and Windows
NT 4 domain. The External Trust can be one-way or two-way.
90
……………………………………………………………
Cont….
Realm Trust: Realm Trust is explicitly created transitive or
non-transitive trust between a non Windows Kerberos
realm and a Windows Server 2003 domain. This trust helps
to create trust relationship between Windows Server 2003
domain and any Kerberos version 5 realm. The Realm
Trust can be and one-way or two-way.
Forest Trust: Forest Trust is explicitly transitive (between
two forests) created trust between two forest root domains.
The Forest Trust can be one-way or two-way. 91
……………………………………………………………
Operation Sheet
93
……………………………………………………………
Cont…
1. On the first page of the Active Directory Installation Wizard, click
Next.
94
……………………………………………………………
Cont…
On the next page of the Active Directory Installation Wizard,
click Next
95
……………………………………………………………
Cont…
On the Domain Controller Type page, click Domain Controller for
a new domain, and then click Next
96
CONT…
On the Create New Domain page, click Domain in a new forest, and then
click Next
97
CONT…
On the New Domain Name page, in the Full DNS name for new domain box, type
corp.contoso.com, and then click Next
98
CONT…
99
CONT…
Note:
If your AD has been planned and the growth factor has been taken into account I
would recommend to plan these locations right from the beginning. Logs and
database should be on a different partition. This will improve performance
100
CONT…
Type a password (record this password part of your secure server documentation)
click next.
Note: This password does not need to be the same as your domain administrator
password. To read more regarding this topic click on the "AD help link" on the same
window
101
CONT…
102
……………………………………………………………
103
……………………………………………………………
104
……………………………………………………………
CONT…
105
……………………………………………………………
Domain user accounts allow users to log on to the domain and gain
his or her user name and password during the logon process.
108
……………………………………………………………
User Profiles
The system creates a user profile the first time that a
user logs on to a computer.
At following logons, the system loads the user's profile,
and then other system components configure the user's
environment according to the information in the profile.
111
……………………………………………………………
112
……………………………………………………………
2.to Roaming
need create a profile onUser Profiles
each computer they use on a
network.
114
……………………………………………………………
Advantage
C P
D H
l l
ta
ns
I
118
……………………………………………………………
119
……………………………………………………………
Cont….
120
……………………………………………………………
Cont…
121
……………………………………………………………
Web Server(iis)
Is a member server which helps as to manage and control the file which
is created by HTML, XHTML ASP language with the given specific port
internet service provider (ISP) and that responds to requests from a user's
browser.
Provide information to user on the internet
Distribute application to user over the internet instead of through physical
media, such as CD, flash disk, floppy disk and other external memory.
123
Previ
Previ Next
Next
…………………………………………………………… End
Cont..
HTTP is a protocol used by the While the FTP protocol is
World Wide Web that allows
used to transfer files from a
the transfer of files from a web
server to a user’s web browser computer to and from an
for viewing web pages on the FTP server. FTP facilitates
Internet.
the transfer of files from
HTTP transfers only web page
content to the browser so as to one computer to another.
view it. The transferred file is FTP, on the other hand,
not saved in the memory
transfers the whole file to
space. HTTP does not require
a password and user name to the another computer, and
access the server to transfer the file is saved in memory. 125
files.
Previ
Previ Next
Next
…………………………………………………………… End
Cont..
HTTP is faster and more efficient Whereas the FTP protocol
for transferring smaller files.
requires authentication.
HTTP is able to use a single
connection to transfer multiple While FTP is faster and more
files, efficient in transferring larger
HTTP only transfers the contents files.
of a web page into a browser for
While FTP requires a new
viewing.
HTTP is a one-way system as connection to be created with
files are transported only from the each file transfer.
server onto the workstation’s FTP is a two-way system as
browser. The files are transferred
files are transferred back and
but not downloaded, therefore not
copied into the memory of the forth between server and
126
receiving device. workstation
……………………………………………………………
127
……………………………………………………………
Print server
It is a server that use to centralize printing job. It
helps network administrator control who can and
to specify it availability time in that network which
save printer resource and cost.
Print servers can be used to save costs by utilizing
one printing device for multiple workstations as
opposed to individual printers.
129
……………………………………………………………
Cont…
A print server, or printer server, is a device that
connects printers to server computers over a network.
It accepts print jobs from all client computers and
sends the jobs to the appropriate printers.
A print server may be a networked computer with one
or more shared printers. Alternatively a print server
may be a dedicated device on the network, with
connections to the LAN and one or more printers.
130
……………………………………………………………
131
……………………………………………………………
BACK UP SERVER
Cont….
Is a feature helps us to make a backup or a copy of
the original document for the safety of the
original data.
Helps us to protect our operating system, volume,
files, and application data and data can be saved
to single or multiple disks, DVD, removable
media, or remote shared folders. They can be
schedule to run automatically or manually.
133
……………………………………………………………
……………………………………………………………
the server with a static IP address and a DNS suffix. The suffix will
135
……………………………………………………………
CONT…
3. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This tells the
server to use its own DNS server service for name resolution, rather than using a separate
server. After filling out those fields , click the Advanced button.
4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter
firewall.test on the DNS suffix for this connection text field, check Register this
connection's address in DNS , check Use this connection's DNS suffix in DNS
registration , and click OK , OK , and then Close
136
……………………………………………………………
CONT..
3. When the Windows Components Wizard comes up, scroll down and
highlight Networking Services and then click the Details button.
138
……………………………………………………………
CONT…
Note that, during the install, Windows may generate
an error maintaining that it could not find a file
needed for DNS installation. If this happens, insert
your Windows Server 2003 CD into the server's
CD-ROM drive and browse to the i386 directory.
The wizard should automatically find the file and
allow you to select it. After that, the wizard should
resume the install.
139
……………………………………………………………
CONT…
140
……………………………………………………………
CONT…
141
……………………………………………………………
145
……………………………………………………………
Steps to Creating a Primary Reverse Lookup
Zone
147
……………………………………………………………