LESSON 1: Understanding The "Server" and "Client": Networks, Like Humans, Exist Even Within Computer Systems!
LESSON 1: Understanding The "Server" and "Client": Networks, Like Humans, Exist Even Within Computer Systems!
"Client"
Introduction
To understand this, this module will run you through how computer networks are
connected in sharing information and resources through servers and clients.
This lesson will run you through the client/server network model. You will be able to
enumerate the various functions of the client/server model and as well as discuss their
different topologies.
TOPIC 1: Client/Server
Server - a process which provides requested services for the Client.
Disadvantages
Maintenance cost
Training cost
Hardware cost
Software cost
Complexity
LESSON 2: Creating User Folder
Introduction
In this lesson, you will learn how to create a user folder with Network Operating
System, or NOS, features.
Basically, a user folder is the storage of files stored by the user to the computer
server.
TOPIC 1: Active Directory Domain Services
Before creating a user folder, the administrator of the server should first install the
Active Directory Domain Services (ADDS) and create a user account.
To install the ADDS, the administrator should open command prompt (Ctrl + R then
cmd), and type dcpromo to install ADDS, DNS, and create a forest and domain.
Validates and gives access to all users and computers in a Windows domain
type network;
Appoints and creates security protocols for all computers; and
Installs and adds software.
Features of ADDS
These are the features of having the Active Directory Domain Services:
1. Security - The data is stored securely. Each of the objects in the Active Directory
has an ACL or Access Control List which consists of the resources that one may
access and along with access privileges given to each resource.
4. Extensibility - Having ADDS is extensible. Meaning that new object types can be
added to a directory. An attribute can be added, for example to the user object.
Once a user is created, a user folder is also automatically created upon the log-in of
the user to the client computer.
TOPIC 2: Creating a User Folder
This topic will teach you how to create a user folder with network operating system
(NOS) features.
You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10 ) connected through a
network cable.
6. Choose your directory to be redirect, press right click on your mouse and select
properties
9. Click OK
Follow the step-by-step procedures on how to configure the ADDS. This is important
since this is where all the information on resources are centered on.
Adding Roles
Follow the step-by-step procedures on how to add roles in the ADDS.
In the workplace, computers are not used by an individual for personal use.
Computers are usually accessed by more than one person. System administrators are
able to log on locally if these accounts are in the domain.
Each user in the network has a unique user account which contains the contact details
of the users as well as what his/her rights and restrictions in accessing
resources/folders, etc.
TOPIC 1: Features of a User Account
The following are the features of a domain-based user account in Windows Server
2008 r2 (which we will be using throughout this module).
Password Security
Permissions
These are access privileges granted to a user account (e.g. group memberships, user-
specific settings to access resources, etc.)
Identification
Having a user account means easily identifying the person to the computer system and
network.
User Rights
Having user rights is a high-level privilege given to users or groups to define their
action on a computer system.
Roaming
The administrator may define user accounts in a way that a user is able to log on to
any system which is a memer of a domain using a domain user account, a Remote
Access Service (RAS), or gateway.
Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and
user environment in general. They are specifically restricted through the use of
mandatory profiles.
Auditing
The server can track access and use by domain user accounts.
This topic will teach you how to configure user access level based on NOS features
and established network policies and end-user requirements.
You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10 ) connected through a
network cable.
1. To get to Active Directory Users and Computers, choose Start> All Programs >
Administrative Tools > Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization
unit to which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by
retyping it.
9. Click the Next button when you’re finished marking your selections.
In the workplace, computers are not used by an individual for personal use.
Computers are usually accessed by more than one person. System administrators are
able to log on locally if these accounts are in the domain.
Each user in the network has a unique user account which contains the contact details
of the users as well as what his/her rights and restrictions in accessing
resources/folders, etc.
TOPIC 1: Features of a User Account
The following are the features of a domain-based user account in Windows Server
2008 r2 (which we will be using throughout this module).
Password Security
Permissions
These are access privileges granted to a user account (e.g. group memberships, user-
specific settings to access resources, etc.)
Identification
Having a user account means easily identifying the person to the computer system and
network.
User Rights
Having user rights is a high-level privilege given to users or groups to define their
action on a computer system.
Roaming
The administrator may define user accounts in a way that a user is able to log on to
any system which is a memer of a domain using a domain user account, a Remote
Access Service (RAS), or gateway.
Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and
user environment in general. They are specifically restricted through the use of
mandatory profiles.
Auditing
The server can track access and use by domain user accounts.
This topic will teach you how to configure user access level based on NOS features
and established network policies and end-user requirements.
You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10 ) connected through a
network cable.
1. To get to Active Directory Users and Computers, choose Start> All Programs >
Administrative Tools > Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization
unit to which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
7. Type the password for this account and confirm that password to the system by
retyping it.
9. Click the Next button when you’re finished marking your selections.
“Pre-Test”
1. The Server is the process which provides requested services for the Client.
Select one:
True
False
2. Client/Server, according to the Management Information System, is the new technology that yields
solutions to many data management problems faced by modern organizations.
Select one:
True
False
3. This service is one of the most used on a Windows network. It enables one to realistiically assess
operational requirements and server performance for each computer.
Select one:
a. File Services
b. Web Services
c. Domain Controller
d. Remote Access
4. The _______________ is the package that contains Windows PowerShell commands.
Select one:
a. Modules
b. Configuration
c. Actions
d. Commands
5. One of the main disadvantage of using server/client systems is the cost such as:
a. Maintenance cost
b. Training cost
c. Hardware cost
d. Software cost
Select one: True, False
6. The printer services role provides essential services for managing files and the way they are made
available and replicated on the network.
Select one:
True
False
7. The following are client/server topologies EXCEPT FOR
Select one:
a. Single client, single server
b. Multiple clients, no server
c. Multiple clients, single server
d. Multiple clients, multiple servers
8. A server that runs ADDS is a client controller.
Select one:
True
False
9. The boot process has four major stages:
a. Pre-boot
b. Boot
c. Load
d. Initialization
Select one:
True
False
10. It is the storage of files stored by the user to the computer server.
Select one:
a. Random Access Memory
b. User folder
c. Memory
d. ADDS
LESSON 1: Checking Normal Functions
Introduction
In this lesson, you will be able to identify various boot processes. This is important
because a startup failure might occur. To successfully boot the server operating
system is the first step in handling the server.
Some issues may be easily diagnosed and corrected however, take note that not all
server errors occur only during booting. It can also occur when it is running or even
when the server is shutting down.
TOPIC 1: Boot Process
The boot process has five major stages:
1. Pre-boot
2. Boot
3. Load
4. Initialization
5. Log-on
In each stage, there are steps that should be followed in loading and using files. In
each of these stages, observe how the process works, how the particular files are
utilized, and what is seen on screen.
Preboot
Pre-boot is basically the BIOS startup process.
The BIOS shall execute the Initial Program Load where the boot devices are read and
prioritized.
The partition information is seen as well as the boot sector and the Windows Boot
Manager. You will also see the memory check, hardware, and boot device search.
Corrupt MBR
This is caused by many viruses in the Master Boot Record which corrupted it.
This happens when the hard drive is not recorgnized. This error can happen even if the
device is fine and the configuration is unchanged.
This may happen if the Fdisk utility is recently used and no partition is made from all
the free space available.
Corrupt or missing Ntldr file
This may happen when the Ntldr file is corrupted or deleted by a virus.
Boot
Windows Boot Manager reads the boot configuration data (BCD). But in the case of
having more than one boot partition, it prompts the user to choose a partition and its
operating system.
If a choice is not made before the time clocks out, the default partition and operating
system will be loaded. If you are booting a Windows Server operating system, the
Windows Boot Loader (Winload.exe) is started.
This may happen when you manually edit Boot.ini or if you have made any changes
to the disk configuration.
If the error that appears is due to Ntdetect.com, the issue comes from the hardware .
By this time, the Windows Server 2008 “splash” screen comes up.
While this happens, the Windows Boot Loader loads the operating system kernel, the
hardware abstraction layer that provides the interface between the operating system
and a particular set of hardware, the Registry file, and the drivers for basic hardware
devices, such as the monitor, mouse, and keyboard.
Initialization
The OS kernel is initialized and takes over from the Windows Boot Loader, bringing
up the graphical display and filling the Registry with HKEY_LOCAL_
MACHINE\HARDWARE key, and HKEY_LOCAL_MACHINE\SYSTEM\SELECT
subkey (called the “Clone Control Set”) and loads the remainder of the device drivers.
Logon
The Windows Server OS graphic user interface (GUI) comes up and the logon screen
will show.
After a successful logon, the necessary services are prompted, the Last Known Good
control set is written on the basis of the Clone Control Set, and the start-up programs
are started.
1. If logon errors occurs, they are usually due to an incorrect username or password or
to the unavailability of a DNS server or a domain controller to authenticate the request
(if the computer is a part of a domain).
2. Errors can also occur if a service cannot be loaded. If a service fails to load, you
will see a message in the System Log of Event Viewer.
LESSON 2: Installing Modules and Add-
ons
Introduction
One must be able to load modules and add-ons so that you can access their functions.
Modules will contain other modules. But however, modules are independent and can
be used without the other depending on the needs of the server.
This lesson will briefly go through the different modules and add-ons that you may
utilize for the server.
TOPIC 1: Using Modules
You are able to write commands with these modules to organize commands and share
with others.
Those who will receive modules can add commands in the modules to their Windows
PowerShell sessions to use them like built-in commands.
List of Modules/Add-ons
The following are modules which support different functions and features in the
Windows Server OS.
Procedure:
In the PowerShell window, type the following command and press ENTER:
In the PowerShell window, type the following command and press ENTER:
Get-Module –ListAvailable
In the PowerShell window, type the following command and press ENTER:
Get-Help Import-Module
In the PowerShell window, type the following command and press ENTER:
Import-Module ServerManager
LESSON 3: Performing Network Services
Introduction
When you are managing a NOS or Network Operating System, you should know
there are different network services that are avaialble.
These services need to be configured so that communication will flow easily within
the network.
You are expected to learn most of these network services and configure them.
There are seven basic network services that you need to be familiar with: remote
access, domain controller, web services, database services, proxy server, file services,
and printer services.
We will go through each of these through this lesson.
TOPIC 1: Remote Access
One of the most common form of remote access is the remote dekstop. This basically
allows a server computer can control with the actual desktop user interface of another
computer.
To setup a remote desktop, both the host and target (controlling computer and remote
computer to be accessed) need to be installed certain software.
This service is one of the most used on a Windows network. It enables one to
realistiically assess operational requirements and server performance for each
computer.
Several web applications that have many roles and functions can also be hosted using
ASP.NET and .NET Framework 3.0, among others.
The term may also refer to a computer dedicated to running such a program. Database
management systems frequently provide database server functionality.
A client connects to the proxy server, requesting some service, such as a file,
connection, web page, or other resource available from a different server and the
proxy server evaluates the request as a way to simplify and control its complexity.
Proxies were created to add structure and encapsulation to distributed systems.
Includes these role services and subservices: File Server, Distributed File System,
DFS Namespace, DFS Replication, File Server Resource Manager, Services for
Network File System (NFS), Windows Search Service, Windows Server 2003 File
Services, File Replication Service (FRS), and Indexing Service.
If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in
the process of spooling are discarded and must be re-spooled or reprinted to the Print
Spooler resource.
Steps/Procedure:
c. Note: Always validate the IP Address; set the IP range after the installation
• Select Roles, DHCP Server, (domain), right-click on IPv4 and select New Scope
• Choose Policies
• Click OK
Folder Sharing
Follow the step-by-step procedures on how to configure folder sharing where folders
across a network are shared to all connected devices.
Folder Redirection
Follow the step-by-step procedures on how to redirect folders across a network.
Click the link: https://www.youtube.com/watch?v=BkJoYbrBDD4&pbjreload=101