Windows Server Administration
Windows Server Administration
Server Administration
Acknowledgment
There are various kinds of networks, each intended to fulfill particular functions and
accommodate varying communication levels. A network's size and scope can vary; it can be as
tiny as a local area network (LAN) inside a single building or as wide as the internet. Here are
the types of networks. (Anon., n.d.)
A personal area network (PAN) is the smallest and simplest type of network. PANs are only a
few meters (m) in size and connect devices within a person's immediate vicinity. Because PANs
operate in such limited areas of space, most are wireless and provide short-range connectivity
with infrared technology.
Advantages:
• Connects devices within an individual's personal space.
• Typically, wireless, offering convenience.
• Examples include Bluetooth and personal Wi-Fi networks.
Disadvantages:
• Limited range.
• Data transfer rates may be lower compared to larger networks.
• Not suitable for connecting larger groups of devices
A local area network (LAN) is a system where computers and other devices connect to each
other in a single location. Although PAN networks connect devices around a person, the range of
a LAN can vary from a few meters in a home to hundreds of meters in a Network topology
determines how devices on LANs are connected to each other.
Advantages:
• High data transfer rates within a limited geographic area.
• Easy to set up and maintain.
• Cost-effective for connecting devices within a single location.
Disadvantages:
• Limited geographic coverage.
• Can be challenging to scale for larger areas.
1.2.3. Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is the connection of several local networks in a city, town
or municipality. Similar to LANs, MANs can use a variety of wired or wireless connection
options, such as fiber optics, Ethernet cables, a Wi-Fi connection, or a cellular network.
Advantages:
• Covers a larger geographic area than LANs.
• Provides high-speed connectivity within a city or metropolitan area.
• Suitable for connecting multiple LANs in close proximity.
Disadvantages:
• May require significant infrastructure investment.
• Maintenance can be complex.
• Limited to a specific metropolitan area.
1.2.4. Wide Area Network (WAN)
A wide area network (WAN) is the most common type of computer network configuration. Like
MAN, WAN is a connection of several LANs belonging to the same network. However, unlike
MANs, WANs are not limited to city limits. A WAN can extend anywhere in the world. For
example, an organization with a corporate office in New York can connect a branch office in
London to the same WAN. Users in both locations have access to the same data, files and
applications and can communicate with each other.
Advantages:
• Connects devices over a wide geographic area.
• Supports long-distance communication.
• Enables the sharing of resources across different locations.
Disadvantages:
• Higher costs compared to LANs.
• Slower data transfer rates over long distances.
• Maintenance and troubleshooting can be complex.
1.2.5. Virtual Private Network (VPN)
A virtual private network (VPN) creates a private network overlay over an existing public
network. VPNs use tunneling protocols that create encrypted connections between the network
and client devices. Web traffic travels through a VPN service and secure, encrypted tunnels
instead of the public network, effectively hiding the user's IP address and information from ISPs
and cybersecurity hackers. The user's location appears to be the location of the VPN server.
Advantages:
• Securely connects remote users or offices over the Internet.
• Provides a cost-effective way to establish private communication.
• Facilitates remote access to a network.
Disadvantages:
• Performance may be impacted by internet speed and reliability.
• Requires robust security measures to prevent unauthorized access.
• Configuration and management can be complex.
1.3. Network Topologies
Network topology refers to the arrangement of nodes and connections in a computer network.
Each topology has pros and cons of its own, and the size and needs of the network are among the
variables that influence the choice of topology. (Anon., n.d.)
1.3.1. Bus Topology
Each node in the bus network topology is connected in series with one wire. These days, cable
broadband distribution networks are the main places to find this configuration.
Advantages:
• Simple and easy to implement.
• Requires less cable, making it cost-effective.
• Well-suited for small networks with limited traffic.
Disadvantages:
• Performance degrades as more devices are added.
• If the main cable fails, the entire network is affected.
• Limited cable length and number of devices that can be connected.
1.3.2. Star Topology
A central device in the star network topology is connected to every other node by means of a
central hub. The majority of wired home and office networks have a physical star topology, as do
switched local area networks that rely on Ethernet switches.
Advantages:
• Easy to install and manage.
• Fault isolation – failure of one device doesn't affect others.
• Scalable and allows for easy addition of new devices.
Disadvantages:
• Dependent on the central hub; if it fails, the entire network is affected.
• Requires more cable compared to bus topology.
• Expensive to implement initially.
1.3.3. Ring Topology
The nodes are connected in a closed-loop configuration in a ring network design. While some
rings can transmit data in both directions, others can only convey data in one direction. Since
traffic can travel in either direction to reach a node, bidirectional ring networks are more resilient
than bus networks. The most common type of ring network is a metro network built using
Synchronous Optical Networking technology.
Advantages:
• Easy to install and configure.
• No collisions as data flows in one direction.
• Suitable for small to medium-sized networks.
Disadvantages:
• Failure of one device can disrupt the entire network.
• Expensive to install and expand.
• Limited cable length and number of devices.
The mesh network topology creates numerous pathways between at least some network points by
connecting nodes with connections. If every node in a network has a direct connection to every
other node, it is said to be completely meshed; if only some nodes have numerous connections to
other nodes, it is said to be partially meshed. The cost of meshing several pathways rises along
with resilience. However, specialized links require more room.
Advantages:
• Fault tolerance – if one link or node fails, alternative paths are available.
• High reliability and robustness.
• Can handle heavy network traffic.
Disadvantages:
• Expensive to implement due to the high number of cables and connections.
• Complex to design and manage.
• Maintenance can be challenging.
1.3.5. Tree Topology
One root node and a hierarchy of related nodes make up the structure of a tree network. The
connections inside the topology are arranged in a star pattern. Tree configurations are common in
larger Ethernet switch networks, such as those found in data centers.
Advantages:
• Dependence on the central hub; failure can affect the entire network.
• Expensive to implement initially.
• Complex to design and manage.
Text
Plain text: Plain text files without any formatting. They are commonly used for simple
documents and configuration files.
HTML text: HTML (Hypertext Markup Language) files for web pages with formatted text and
embedded resources.
Images
JPEG Image: JPEG image format, is widely used for photographs and images with continuous
tones.
PNG Images: Portable Network Graphics format, commonly used for images with transparency
and lossless compression.
GIF: Graphics Interchange Format, often used for simple animations and images with limited
colors.
Audio
MPEG: MPEG audio file format, commonly used for compressed audio files, such as MP3.
WAV: Waveform Audio File Format, used for high-quality audio files.
Video
MP4: MPEG-4 Part 14, a widely used video file format for streaming and high-quality video.
WEBM: WebM, an open and royalty-free media file format designed for the web.
Application
PDF: Portable Document Format, used for documents with text and images.
JSON: JavaScript Object Notation, a lightweight data interchange format.
The Primary Domain Controller (PDC) is the hub of a network's user management and security,
which serves as the principal authority for enforcing policies and verifying user credentials. It's
an essential server role that keeps everything in check in a computer domain.
Domain Name System (DNS) is the phonebook of the Internet. DNS is in charge of determining
the correct IP address for websites that users type into web browsers, such as facebook.com or
youtube.com. After that, browsers utilize those addresses to get in touch with origin servers or
CDN edge servers to see content from websites. All of this is made possible by DNS servers,
which are computers devoted to responding to DNS requests. (Anon., n.d.)
1.7. DHCP
A DHCP Server is a network server that automatically provides and assigns IP addresses, default
gateways, and other network parameters to client devices. It relies on the standard protocol
known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by
clients. (Anon., n.d.)
Task 2
Types of IP versions
i. IPV4: 32 bits
ii. IPV6: 64 bits
IPV4 (Internet Protocol version 4)
Example: 192.168.10.1
Purpose: This version of IP address is the most widely used protocol for networking. It uses 32-
bit addresses, allowing for a total of approximately 4.3 billion unique addresses. There is a
shortage of IPv4 addresses due to the Internet's explosive expansion and the rise in linked
devices. Despite this drawback, IPv4 is still widely used, and many methods are employed to
increase the address space's usefulness, including Network Address Translation (NAT).
IPV6 (Internet Protocol version 6)
Example: 2001:0db8:8fr3:0000:0000: 6513:0370:7334
Purpose: The development of IPv6 was aimed at resolving the shortcomings of IPv4, specifically
the depletion of addresses. Compared to IPv4, IPv6's 128-bit address system offers a far bigger
address space. The Internet will continue to develop and accommodate the growing number of
connected devices because of this expansion, which makes an almost unlimited number of
unique IP addresses possible. The adoption of IPv6 is continuing, and during the transition
period, it coexists with IPv4. To enable a seamless transfer, dual-stack networks supporting both
IPv4 and IPv6 must be deployed.
Classes of IP addresses
IP addresses are divided into 5 main classes. They are class A, class B, class C, class D, and class
E.
Class A
Range: 1.0.0.0 - 126.255.255.255
Network/Host portion: The first 8 bits represent the network and the remains are host bits.
(N.H.H.H)
Class B
Range: 128.0.0.0 – 191.255.255.255
Network/Host portion: The first 16 bits represent the network and the remains are host bits.
(N.N.H.H)
Class C
Range: 192.0.0.0 – 223.255.255.255
Network/Host portion: The first 24 bits represent the network and the remains are host bits.
(N.N.N.H)
Class D
Range: 224.0.0.0 – 239.255.255.255
Reserved for multicast groups.
Class E
Range: 240.0.0.0 – 255.255.255.255
Subnetting
A computer networking technique called subnetting is used to split a larger network into smaller
subnetworks, or subnets. This is done to enhance the network's performance, security, and
efficiency. 1. Subnetting facilitates effective network organization, which aids in the expansion
of technology for big businesses and corporations. In order to minimize traffic and preserve
efficiency and order, it is applied to particular personnel arrangements. Subnetting separates
broadcast domains to provide effective traffic routing, which enhances network performance.
2.2. What are the subnets of the 2 networks for those two departments
HR department
Subnet mask = 255.255.255.192 (If we take 50 hosts for HR)
Subnet range = 195.20.30.0 – 195.20.30.63
IT department
Subnet mask = 255.255.255.224 (If we take 30 hosts for HR)
Subnet range = 195.20.30.64 – 195.20.30.95
2.3. Name the first 2 host IP addresses
HR = 195.20.30.1
IT = 195.20.30.65
2.4 What is the IP address of the last host
HR = 195.20.30.63
IT = 195.20.30.95
2.5 What are the broadcast IP addresses of those subnets
HR = 195.20.30.63
IT = 195.20.30.95
2.6 What is the subnet mask?
HR = 255.255.255.192
IT = 255.255.255.224
2.7 Calculate the maximum host count per subnet
HR
Number of host bits (n) = (total bits) - (subnet bits)
= 32 – 26
=6
Maximum host count = 26 – 2
= 62
IT
Number of host bits (n) = (total bits) - (subnet bits)
= 32 – 27
=5
Maximum host count = 25 – 2
= 30
2.8. Increased department subnet
1. Server interface
2. IP config in server
3. Server to client pinging
Task 4
1. Add a Domain
2. Added domain
Task 5
5.1. Install Microsoft windows 10 Professional
1. Windows 10 interface
2. MMCP network
3. IP config in client
3. Printer Restriction
4. Printer restriction
Task 9