Ch03 Network Operating System
Ch03 Network Operating System
CHAPTER THREE
1
Outline
3.1. Introduction to Network Operating System 3.3.Resource Monitoring & Management
3.2. Windows Network Concepts 3.4.Online Server upgrade/update process
3.2.1. Workgroups 3.5.Administering Database Server (MySQL)
3.2.2. Server Domain
3.2.3. Domain Controllers
3.2.4. LDAP & Windows Active Directory
3.2.5. User Administration Concepts & Mechanisms
3.2.5.1.Users and capabilities
3.2.5.2.Policy Tools & Roaming Profiles
3.2.5.3.The Registry
3.2.5.4.Automating Administrative Tasks - Windows Host
Scripting
2
Introduction to Network Operating System
An operating system (OS) is software that manages
computer hardware and software resources and provides
common services for computer programs.
Operating systems form an essential component of the
system software in a computer system. Application
programs usually require an operating system to function.
Functions of OS
Resource management
Memory management
Device management: Printer, Hard drive, display etc.
Process management
Processor management (CPU time )
3
Introduction to NOS….
Examples of popular modern operating systems include:
Android, BSD, iOS, Windows Phone,
Linux, OS X, QNX,
Microsoft Windows, and IBM z/OS.
All these examples, except Windows, Windows Phone and z/OS, share roots in UNIX.
Introduction to NOS….
Network Operating System (NOS) is a systems software that runs on a server and
enables to controls the computer systems and devices on a network and allows them
to communicate with each other.
The NOS performs similar functions for the network as operating system software
does for a computer, such as memory and task management and coordination of
hardware.
For example, one that runs on a server and enables the server to manage data, users,
groups, security, applications, and other networking functions.
When network equipment (such as printers, plotters, and disk drives) is required, the
NOS makes sure that these resources are used correctly.
Linux (used on workstations), OS X (used on Apple MACs), UNIX (used on servers),
and Windows Server (used on workstations and servers) are common network
operating systems.
Introduction to NOS….
NOS can be used in:
Routers, switches and hardware firewall.
PCs in Peer-to-peer networks
Client-server Architecture
Network OS and General Operating System
Aspect Network Operating System (NOS) General Operating System (OS)
Designed specifically for network management and Designed for general-purpose computing and
Primary Function
services. user applications, supports a single user.
Network Emphasizes network resources, such as file and print Focuses on managing computer hardware, file
Management services, user access control, and directory services. systems, and application execution.
Often has a command-line interface and web-based Provides graphical user interfaces (GUI) for user
User Interface
administration tools for network configuration. interaction.
- Windows Server - Linux with Samba - Novell - Microsoft Windows (client editions) - macOS -
Examples
NetWare Linux (desktop editions)
Ideal for environments where centralized network Used on personal computers and workstations
Use Cases
services are critical, such as in enterprise networks. for a wide range of applications.
Offers basic file and print services but may
File and Print Provides advanced file and print sharing services for
require additional server software for advanced
Services network users.
functionality.
Supports efficient sharing of resources like files, Resource sharing is primarily at the individual
Resource Sharing
printers, and user accounts across the network. computer level rather than network-wide.
7
Networking Models
Computers on a network can be a be a
part of either
Workgroup
Domain
8
Workgroup (Peer-to-Peer) Networking
One of the simplest ways to configure
a network John
John
All computers are equal SAM
Shared folder
SAM
Note: By default, all Windows computers are placed in a workgroup named WORKGROUP
Server-Based (Domain) Networking
The domain controller(the Sever) control
the network.
Centralizes all shared resources on a
centralized server, allowing everyone who DC
has been granted permission to access
them
centralized administration and centralized
authentication, which make it easier for
administrators to manage
Requires at least one domain controller
(DC)
The administrator performs all the tasks
through the domain control.
11
Server-Based (Domain) Networking….
12
Introduction to Active directory
In the not-too-distant past, networks were
workgroup
Each workstation had its own security
system, which consisted of user accounts,
group accounts, and network resources.
For each server user needs a separate logon
IDs.
13
Introduction to Active directory(cont’d.)
If one wants to access resources from another
computer, he has to have account on that computer.
The problem with this setting is, first it doesn’t scale
well. If it is small network administrating may be easy
task.
Each time the new user want request a resource you
need to create account. when network size increases,
it becomes unmanageable
Another problem is when a user changes a password,
you need to go to each computer so that the change
will be applied for all computer in the network
14
Introduction to Active Directory(cont’d.)
Group Discussion(5 min)
What is the disadvantages of workgroup network?
For users, the end result in a workgroup environment was a convoluted and difficult
process of remembering the location of resources,
remembering the correct logon ID, and
remembering the correct current password, all just to be able to access resources on the
network.
administration became difficult.
If a user needed to access files or printers residing on two or more servers
The password change will not be automatically applied in all computer, no syncing
15
Introduction to Active Directory(Cont’d.)
Network operating systems soon developed a variety of ways to use a single
logon ID(SSO) and password to access multiple servers.
Domain is introduced in Window NT which is a flat database which stores users
information
Active directory is introduced starting from window 2000X for centralized user
name and password management by window server as a Database
NB: SSO: ability for a user to authenticate once to a single authentication authority and access other protected
resources without reauthenticating
16
What is Active Directory?
Active Directory is a Directory Service which Contains Active Directory
Information of All User Accounts and Shared Recourses
on a Network.
18
What is Active Directory (cont’d.)?
Resources are the components attached to the network and made available to
users. Examples of resources are:
A server’s hard drive
An IP address
A fax modem
A scanner
A printer
Any “thing” that can be used by a client workstation
19
What is Active Directory (cont’d.)?
For most services, there is an analogous resource, and for most resources,
there is an analogous service.
20
What is Active Directory (cont’d….)
The final category in a directory is an account.
An account is usually a logon ID and associated password used for access to
the network
Each resource, service, and account is stored as an object in the directory.
The information in the directory service manages how the services, resources,
and accounts relate to each other.
Each object in the directory service includes a set of properties, or attributes.
For example, a user account property might be the city in which the user resides, or a
DNS hostname would have the property for the IP address that host has been
assigned.
21
What is Active Directory (cont’d.)?
Has information about all the objects- Users, Computers, Resources like Printers,
Shared Files/Folders-in an organization's network.
Everything in the AD is treated as an object.
It is essentially a database which holds the objects.
The name of the database file is NTDS.DIT
22
What is an ACTIVE DIRECTORY ?(cont’d.)
Is similar to a telephone directory
It is a software to arrange, store information and provides access and
permissions based on those information
23
What is an ACTIVE DIRECTORY ?(cont’d.)
Arranges all the Network’s Users, computers and other OBJECTS in to LOGICAL,
HIERARCHIAL groupings
ACTIVE DIRECTORY information is used to authenticate/ authorize the Users,
Computers, Resources which are part of a network.
Auditing functionality
Domain Controller(DC) is a server that
responds to security authentication
requests within a Windows
Server domain.
• It is a server on a Microsoft Windows
network that is responsible for
allowing host access to Windows
domain resources.
24
Active Directory Services
Domain Services
Federation Services
• Internal Accounts Certificate Services
• Authorization
• Network Access for • Authentication • Identity
External Resources • Non-Repudiation
Active Directory
• Identity
• Access
• Centralized Management Lightweight Directory Services
Rights Management
Services
• Application Templates
• Content Security and
Control
Active Directory-Domain services(AD DS)
Active Directory Services consist of multiple directory services.
The best known is Active Directory Domain Services, commonly abbreviated as AD
DS or simply AD
Active Directory Domain Services (AD DS) is the cornerstone of every
Windows domain network.
It stores information about members of the domain, including devices and
users, verifies their credentials and defines their access rights.
The server running this service is called a domain controller(D.C.)
A domain controller is contacted when a user logs into a device, accesses
another device across the network.
26
Active Directory OBJECTS
Physical entities of a network
Can be described by a set of attributes
Objects
DOMAIN
FOREST
ORGANIZATIONAL UNIT
USER
GROUP
CONTACT
COMPUTER
SHARED FOLDER
PRINTER
SITE
SUBNET
28
Active Directory OBJECTS
OBJECTS are explained by their ATTRIBUTES like
Name, Location, Department, etc.
CONTAINER Object
For Ex- Forest, Tree,
Domains, Organizational Units
LEAF Objects
For Ex- users, computers, printers, etc.
29
Active Directory OBJECTS(cont’d.)
SECURITY PRINCIPAL OBJECT-objects that
can be authenticated and assigned
permissions
Each Object has a
GUID-128 bit Globally unique identifier
SID- Security identifier for each security
principal object
30
Overview of the Active Directory Structure
Logical structure
Objects
Organizational Units (OUs)
Domain
Tree
Forest
Physical structure
consists of sites and
Servers configured as domain controllers.
31
Active Directory Domain
Logical grouping of objects
Administrative boundary for objects
No limit on the number of objects that can be
contained in a domain
Objects need not be in a same physical
location
Active Directory consists of one or more
domains.
Domains are identified by their DNS name structure and objects in a domain share the same
domain space (e.g. [email protected], printer1 @ Microsoft.com, etc.…login)
33
Active Directory Domains(cont’d.)
➢ Triangles
Boundary of
➢ Domains function as containers for Active Policies
Directory objects Boundary of
➢ Each domain stores information only about Authentication
the objects it contains,
➢ and theoretically an Active Directory domain
can contain up to 10 million objects(17
terabytes).
➢ The objects for a single domain are stored in a single
database.
➢ A domain is defined as a logical group of network objects
Microsoft.COM
(users, computers, devices) that share the same active
directory database.
Boundary of Replication
34
Active Directory Domains(cont’d.)
➢ Because all Active Directory users log on to a domain,
Boundary of
domains are boundaries of authentication Boundary of
Authentication Policies
➢ Domain controllers are responsible for authenticating user
and group passwords.
➢ Domains are also policy boundaries. Security policies
that are defined in one domain are not extended to
other domains.
• Password length
➢ Within a domain, information about objects is
replicated between all domain controllers for
additional security and redundancy
Microsoft.COM
➢ However, information is not replicated between
domains. This means that domains are also
Boundary of Replication
boundaries for data replication.
35
Active Directory Domains(cont’d.)
• Boundary of Administration and DNS Namespace
• The domain administrator has the right to set policies only within that domain.
So, domains are also boundaries of administration because privileges that are
granted in one Domain do not extend to any other Domain.
• A unique namespace.
• An Active Directory Domain is identified by a unique DNS domain name.
36
Quiz(5%)
1. What is the difference between NT domain and Active directory domain?
2. What is the difference between container object and leaf object in active
directory? And give two example of each
37
ORGANIZATIONAL UNIT(OU)
Containers that can be used to group objects
within a domain
Organizational units can appear only inside a
Domain
Can be used to denote a specific Department,
location, team, functions, etc.
OUs are unique inside a Domain
Objects that should be managed by the same
administrator can be grouped together, and
authority to manage the specific OU is
delegated to an appropriate user by the domain
administrator.
38
ORGANIZATIONAL UNIT(OU)(cont’d.)
Contains other objects like Users, Groups, Contacts, Computers, Printers,
Shared Folders, etc
An OU can contain another OU(s).
Nested OUs have Parent-Child relationship
All OUs inside a domain are connected
Group Policy Settings can be set at the OU level
Delegation of Administrative Control is possible in OU
Child OU(s) inherit the properties of the Parent OU.
39
ORGANIZATIONAL UNIT(OU)(cont’d.)
Organized For:
•Administration
•Same Requirements
•Delegation
•Group Policy
Techno •Configuration
•Security
Agri main
Hu.edu.et
40
Organizational Unit Applications
SalesLondon
Department
Desktops Marketing
NewDepartment
York
Printers
Hardware Devices
Domain Tree
DOMAIN TREE: Parent Domain- Child Domain(s) tree structure or
Nested Domains
Objects in different DOMAINS communicate through TRUSTS which are
Transitive, Non-Transitive, Two Way and One Way
42
Domain Trees(cont’d.)
➢ All domains in a Domain tree share a Shared
contiguous namespace Schema
➢ All Domains in an Active Directory Tree CONTOSO.COM
share schema, configuration, GC features
Configuration
US.CONTOSO.COM
43
Configuration, Global Catalog, Schema
1. Configuration Container:
Single container applying to all domains in the Active Directory Tree.
Contains information about the Active Directory as a whole,
including what Domains exist,
what physical Sites are defined,
what Domain Controllers are running in what Domains and in what Sites,
what Services are available, and so forth.
Replicated to all Domain Controllers for replication topology and partner determination.
44
Configuration, Global Catalog, Schema
2. Global Catalog (GC) Server:
Each domain or DC can’t contain forest wide information. Each domain maintains a separate
directory database (called NTDI.dit)
Therefore, for users to find resources in all domain in the forest GC is used.
GC acts as an index for all resources in the forest.
Any DC can be made into a GC, and making all DC as a GC is advantageous if disk space and
network bandwidth is an issue.
A GC contains key information about all the objects in the AD forest, but not full record of
an object as a library index contain only key information such as book title and Autor.
i.e. only certain attributes are replicated to the GC server
Having GC server means users in different domains can run queries on the GC ‘s to find any
object it the forest.
In each domain, at least one GC server is required, more for redundancy
Facilitates efficient queries, avoiding the need to search every domain.
45
Configuration, Global Catalog, Schema….
The global catalog:
Schema Hosts a partial attribute set for other
Configuration domains in the forest
Domain A Supports queries for objects throughout
Schema the forest
Configuration
Domain A Schema
Domain B Configuration
Domain B
Global catalog server
Schema
Configuration
Domain B
AD DS
Configuration, Global Catalog, Schema
3. Schema:
Formal definition for all AD objects, including classes and attributes.
Defines which object attributes are required and objects relationships.
Stored in a single schema container, applying to all domains in the AD
Tree.
Replicated for consistency across all Domain Controllers.
CONTOSO.COM
UK.CONTOSO.COM
US.CONTOSO.COM
48
Active Directory Forest
Highest Level of Security Boundary
A forest contains one or more trees and
one or more namespaces.
A complete Active Directory instance
contains objects like Domains, Users,
Computers, Printers and other network
resources.
Information and data exchange can happen
only between the objects inside a Forest
49
Active Directory Forests(cont’d.)
CONTOSO.COM FABRIKAM.COM
US.CONTOSO.COM UK.FABRIKAM.COM
Global
Schema Configuration
Catalog
50
Active Directory Forest(cont’d.)
To communicate with objects in other forests, explicitly created FOREST
LEVEL trusts are required
Can contain one or more domains or a combination of domains or domain
trees
The schema or design of an AD is consistent throughout the Forest
51
Active Directory Forest(cont’d.)
An AD DS forest is a security boundary. By default, no users from outside the
forest can access any resources inside the forest.
Typically an organization creates only one forest, although you can create
multiple forests to isolate administrative permissions between different parts
of the organization.
By default, all the domains in a forest trust the other domains in the forest
automatically.
This makes it easy to enable access to resources such as file shares and
websites for all users in a forest, regardless of the domain in which the user
account is located.
52
Active Directory User
55
Active Directory Computer
Individual computers/workstations, servers which are part of a
network
Each computer has a unique computer account
Computer Account allows each computer to be authenticated and
authorized for access to the domain and domain resources
A server could be a Domain Controller or Global Catalog Server or
a Member Server
56
Active Directory Contact
An individual who is not part of the organization but related to the
organization.
E.g. Customer, Supplier,Vendor, etc.
Unlike a user, a Contact cannot logon or access the domain or network.
Cannot be assigned permissions or authorizations or restrictions.
57
Active Directory Group
58
Active Directory Group
59
Why should we user Active Directory Services?
Highly SECURE-Possible to have layered Security, that have POLICIES and
PERMISIONS for security at different levels.
Objects can be LOCATED ANYWHERE physically yet access the
domain/network’s resources securely.
MILLIONS of users can be added to a single domain, Easily SCALABLE, Highly
FLEXIBLE, Readily EXTENSIBLE.
EASY, EFFIICIENT SEARCH mechanism to locate an object
60
Why should we user Active Directory Services?(cont’d.)
Centralized storage- for users, departments which makes BACKUP and
RESTORE-Efficient, Fast and Easy
Efficient and Effective management of services because of Centralized
management of services
Serves as a platform for services like Exchange, SharePoint, etc.
Enable Single Sign-on(SSO)and pre and post action scripts like logon scripts
Centralized auditing-which makes it easier to track all the operations.
61
Where can ACTIVE DIRECTORY SERVIES be used?
Any organization that has a NETWORK setup
Organizations which requires 24*7 uptime
Any organization where the number of users, computers or resources will
keep changing
Any organization where IFORMATION/DATA security is vital
Any organization that operates in Multiple Locations
62
Where can ACTIVE DIRECTORY SERVIES be used?(cont’d.)
63
64
Active Directory Domain Controllers
• A domain controller is a server that
Active Directory system users log in PDC DC
to and that contains information about
your directory structure.
• Active Directory system should
contain at least two domain
controllers.
• In window NT there is single point of
failure but not in wind 200x server BDC DC
• Stores info about each object in its BDC
domain DC
67
Active Directory Domain Controller(cont’d.)
68
Active Directory Sites
• An Active Directory site is a set of
TCP/IP subnets that are considered to be
“well-connected
Site A
• A site is a group of well-connected
computers in an Active Directory
system.
WAN Link
Site B
69
Sites and Domains
Site A
US.CONTOSO.COM
Site B
71
Global Catalog
Spans all domains in the forest
The Global Catalog is a limited, forest-wide database of attributes
Contains object attributes
Used for searches(acts as index)
Exists on domain controllers
DC can be set to GC role
72
DNS
AD will not work without DNS
A few important tasks a DNS server in Windows Server 2012 is used for are:
Resolve host names to their corresponding IP address (DNS)
Resolve IP address to their corresponding host name (Reverse DNS)
Locate Global Catalog Servers and Domain Controllers
Locate Mail Servers
Domain Naming System locates network services and resources.
75
DNS
Domain Naming System locates network services
and resources.
•Requested Service
•Site Information
DNS Server DC
•IP Addresses
•SVR Records Cache
76
Training Resources
Course ID Title
2199 Jumpstart: Active Directory Fundamentals
2282 Designing a Microsoft Windows Server
2003 Active Directory and Network
Infrastructure
78
Server Migration Steps
Install Windows Server Migration Tools on the destination server, running
Windows Server 2012 R2.
Create a distribution folder and copy an appropriate version of the tools for
the source server.
Copy the distribution folder to the source server and then register the
Windows Server Migration Tools.
Use Migration Guides to migrate roles, features shares, settings, and other
data.
79
Migration Guide Elements
Compatibility notes
Guide contents
Migration overview
Migration requirements
Pre-migration tasks
Migration procedures
Post-migration procedures
80
PowerShell
Now becoming the de facto CLI and scripting language for Microsoft products
Allows you to string together commands, passing the result of one command
into the next, in a process known as pipelining
81
Windows Remote Management
WS-Management protocol
Public standard for exchanging management data remotely by any device implementing
the protocol
82
Lesson Summary
Microsoft releases all of its operating systems in multiple editions, which
provides consumers with varying price points and feature sets.
Windows Server 2012 R2 includes predefined combinations of services called
roles that implement common server functions.
A clean installation is the simplest way to deploy Windows Server 2012 R2 on
a bare metal computer or a computer with a partition that you are willing to
reformat (losing all of the data on the partition in the process).
83
Lesson Summary
Many enterprise networks today use servers that are dedicated to a particular
role. When a server is performing a single role, does it really make sense to
have so many other processes running on the server that contribute little to
that role?
When you select the Windows Server Core installation option, you get a
stripped-down version of the operating system.
If the advantages of Server Core sound tempting, but there are traditional
server administration tools you don’t want to give up, Windows Server 2012
R2 provides a compromise that it calls the Minimal Server Interface.
The Minimal Server Interface is a setting that removes some of the most
hardware-intensive elements from the GUI.
84
Lesson Summary
An in-place upgrade is the most complicated form of Windows Server 2012
R2 installation. It is also the lengthiest, and the most likely to cause problems
during its execution. Whenever possible, Microsoft recommends that
administrators perform a clean installation, or migrate required applications
and settings instead.
Migration is the preferred method of replacing an existing server with one
running Windows Server 2012 R2. Unlike an in-place upgrade, a migration
copies vital information from an existing server to a clean Windows Server
2012 R2 installation.
Windows Server Migration Tools is a Windows Server 2012 R2 feature that
consists of Windows PowerShell cmdlets and help files that enable
administrators to migrate certain roles between servers.
85