0% found this document useful (0 votes)
8 views15 pages

Final Edition

The document provides an overview of various networking concepts and commands related to Windows Server 2008 and 2012, including DNS, DHCP, Active Directory, and file systems. It explains the roles of different components such as Forward and Reverse Lookup Zones, DHCP Relay Agents, and the structure of Active Directory. Additionally, it covers protocols like HTTP and FTP, as well as user profile types and disk management options.

Uploaded by

bikashbera630
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views15 pages

Final Edition

The document provides an overview of various networking concepts and commands related to Windows Server 2008 and 2012, including DNS, DHCP, Active Directory, and file systems. It explains the roles of different components such as Forward and Reverse Lookup Zones, DHCP Relay Agents, and the structure of Active Directory. Additionally, it covers protocols like HTTP and FTP, as well as user profile types and disk management options.

Uploaded by

bikashbera630
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

1.

Minimum Requirements Of Windows Server 2008 & 2012


2. Commands-

NSLOOKUP:- nslookup is a network administration command-line tool available for various

operating systems, including Windows, macOS, and Linux. It is used for querying the Domain

Name System (DNS) to obtain domain name or IP address mapping information. Here are some

key points about nslookup.

Basic Usage

nslookup can be run from the command line to perform various DNS queries. The general
syntax for the command is:
• IPCONFIG / RELEASE

The ipconfig /release command is used to release the current DHCP lease, allowing the
network adapter to discard its current IP address configuration.

Usage:

Purpose: Release the IP address obtained from the DHCP server.

When to Use: When you need to change your IP address, troubleshoot network issues, or
reconfigure the network settings.

3. Domain, Workgroup

A ‘workgroup’ is a type of peer-to-peer network. It is essentially the name for a Windows based

peer- to-peer computer network. Computers in this kind of network can allow each other access

to their files, printers, or Internet connection.


A ‘domain’, on the other hand, is a client/server network in which the security and resource

management is centralized. This means that a singular administration has control over the

domain and allows which users have access to which files.

1. Forward & Reverse Lookup Zone

Forward Lookup Zone

A forward lookup zone is used to translate domain names to IP addresses. This is the most
common type of DNS query. When a user types a domain name into a web browser, the DNS
server checks the forward lookup zone to find the corresponding IP address, allowing the
browser to locate the correct server to load the website.

How it works:

1. You type a domain name (e.g., [invalid URL removed]) into your web browser.
2. Your computer contacts a DNS server and initiates a forward lookup.
3. The DNS server checks the forward lookup zone to find the IP address linked to that
domain name.
4. If it finds a match, the server sends the IP address back to your computer.
5. Your computer can then connect to the website using the retrieved IP address.

Reverse Lookup Zone


A reverse lookup zone performs the opposite function: it translates IP addresses back to domain
names. This type of query is less common but is used for purposes such as network
troubleshooting and logging, email server validation, and certain security measures.

Uses of Reverse Lookup Zones:

 System administrators can use them to identify the domain name associated with a
suspicious IP address, aiding in security investigations.
 Email servers can leverage them to verify the sender's domain name, helping to combat
spam.
 Concept Of Domain Tree, Forest, OU, Site

Logical Structure

The logical structure defines how network resources are organized within Active Directory. It
provides a hierarchical framework for managing user accounts, groups, computers, and other
objects. Here are the main components:

 Forest: The highest level container in Active Directory. A forest can contain multiple
trees. Think of it as a large company with multiple divisions.
 Tree: A collection of domains that share a common schema (definition of attributes and classes)
and a single root domain. imagine a division within the company with its own departments.
 Domain: A fundamental unit of security and administration within Active Directory. It contains
user accounts, computer accounts, groups, and other objects. A domain has its own local
security policy and administrators. This could represent a department within the company.
 Organizational Units (OUs): Containers within a domain used to further organize network
resources. OUs don't have their own security policies, but they inherit policies from the parent
domain. Imagine teams or sub-departments within the department.

1. NTDS.DIT & SYSVOL

2. NTDS DIT :- NTDS stand for New Technology Directory service, and DIT stand for
Directory Information Tree. The default location is “c:/windows/NTDS” this the main
file of active directory where all classes object and container are stored in hirchitical
structure . default size is 4 mb. It create after installation of ADDS.
3. SYSVOL
4. :- SYSVOL—system volume

5. Its create after installation the active directory domain service, this is the share folder of
active directory which password login scripts the policy setting each of very object

DHCP Relay Agent & GIAddr


A DHCP (Dynamic Host Configuration Protocol) Relay Agent is a network device, typically a router, that
forwards DHCP messages between clients and servers located on different subnets. This is necessary
because DHCP messages are typically broadcast messages, and broadcasts don't cross subnet
boundaries.

Here's where GIAddr comes in:

 GIAddr: Stands for Gateway IP Address. It's a field within the DHCP messages forwarded by the
relay agent. It serves two purposes:
o Informs Server: It tells the DHCP server the IP address of the subnet where the client
resides. This helps the server choose an appropriate IP address from the correct pool to
assign to the client.
o Return Address: It specifies the address where the DHCP server should send its response
messages. Since the server and client are on different subnets, the server can't directly
respond to the client's broadcast. It sends the response to the relay agent (using the
GIAddr) which then forwards it to the client.

1. HTTP & FTP

HTTP (Hypertext Transfer Protocol)

HTTP is a protocol used for transferring hypertext (HTML) documents on the World Wide Web. It
facilitates communication between web browsers (clients) and web servers.
FTP (File Transfer Protocol)
FTP is a protocol used for transferring files between a client and a server on a computer network. It is
designed specifically for file exchange.

Virtual Directory in Web Server

A Virtual Directory is a directory name that you can map to a physical directory located on the
server or another server. It allows web servers to serve content from different physical locations
under a single domain structure without revealing the actual directory path to the users.

How Virtual Directories Work:

1. Configuration:
o A virtual directory is configured within the web server settings. This configuration maps
a URL path to a physical directory on the server or another server.

2. Mapping:
o For example, a virtual directory named /images could be mapped to a physical
directory located at C:\WebContent\Images on the server. When users access
http://example.com/images, they are actually being served content from the C:\
WebContent\Images directory.

3. Access Control:
o Permissions and access controls can be applied to virtual directories independently of
their physical location, allowing administrators to manage security and user access more
effectively.

5.DNS Resolver, DNS & WINS


DNS Resolver:

It’s like a search engine for your computer. When you type a website name (like

www.example.com), the DNS resolver finds the website’s actual address (like 192.0.2.1) so your

computer can connect to it.

DNS (Domain Name System):

It’s like a phone book for the internet. It translates website names (like www.example.com) into

numbers (IP addresses, like 192.0.2.1) that computers use to find each other online.

WINS (Windows Internet Name Service):

It’s like a local address book for older Windows networks. It helped computers on the same

network find each other using names (like COMPUTER1) instead of numbers (IP addresses). It's

not as commonly used now because DNS does a similar job but for the whole internet.

1. Records Of DNS

A Record (Address Record): Maps a domain name to an IPv4 address (e.g., “example.com” ->

“192.0.2.1”).

AAAA Record (IPv6 Address Record): Maps a domain name to an IPv6 address (e.g.,

“example.com” -> “2001:db8::1”).

CNAME Record (Canonical Name Record): Creates an alias from one domain name to

another (e.g., www.example.com -> “example.com”).


MX Record (Mail Exchange Record): Specifies mail servers responsible for receiving email

(e.g., “example.com” -> “mail.example.com”).

TXT Record (Text Record): Holds text information, often used for verification or SPF records

(e.g., SPF record for email authentication).

PTR Record (Pointer Record): Used for reverse DNS lookups, mapping IP addresses to

domain names.

NS Record (Name Server Record): Specifies authoritative name servers for the domain (e.g.,

“example.com” -> “ns1.example.com”).

SOA Record (Start of Authority Record): Contains administrative information about the

domain, such as primary name server and contact mail

2. Zones Of DNS- Primary Zone, Secondary Zone, STUB Zone, Active Directory

Active Directory Group Accounts- Domain Admin, Enterprise Admin

Primary Zone: It’s like the main database of information about a domain (like a website or

network). It holds all the records like IP addresses and domain names. Changes are made directly

here.

Secondary Zone: This is a copy of a primary zone. It helps spread the load of requests for

information. It’s updated regularly to stay current with the primary zone.

STUB Zone: This is a smaller version of a secondary zone. It only holds basic information about

other zones (like where to find them). It helps speed up finding information about other domains.
Active Directory: It’s like a big address book for a network. It keeps track of all the resources

(like computers, printers, users) in a network and controls access to them. It's essential for

managing and organizing everything in a network or domain.

Container: In Active Directory, a container is like a folder that can hold other objects such as

users, groups, computers, and other containers. It’s used to organize these objects into a

hierarchical structure, making it easier to manage and find them.

Leaf: A leaf object in Active Directory is an object that cannot contain other objects. Examples

include user accounts, computer accounts, and printer objects. These objects exist at the end of

the hierarchy and typically represent individual entities like a user or a device.

Domain Admins: This group in Active Directory has full administrative rights over all

computers and objects in a domain. Members of this group can perform any action on the

domain controllers within that domain.

Enterprise Admins: This group has the highest level of administrative rights in a forest (a

collection of domains). Members of the Enterprise Admins group have full control over all

domains and domain controllers in the entire Active Directory forest. They can manage trust

relationships between domains and have administrative access across all domains within the

forest.

1. Global Catalog Server


A Global Catalog Server is like a special phone book for a large network of computers,

called Active Directory. It keeps important information about all the users, computers, and

resources in that network. So, when you want to find something or someone in a big

company’s network, like where a file is stored or who has access to a certain printer, you can

ask the Global Catalog Server and it helps you find what you need quickly.

2. FSMO 5 Roles

FSMO (Flexible Single Master Operations) roles are specific responsibilities in a Windows Server
network that ensure certain operations are managed correctly. There are five FSMO roles:

Schema Master: Manages changes to the Active Directory schema (the structure of directory
objects).

Domain Naming Master: Controls the addition or removal of domains in the network.

Infrastructure Master: Maintains object references between different domains in a forest.

RID (Relative ID) Master: Assigns unique IDs to objects created in a domain.

PDC (Primary Domain Controller) Emulator: Handles tasks like password changes and account
lockouts, especially for older Windows systems.

These roles are essential for keeping an Active Directory environment running smoothly and
efficiently.

3. Concept Of ADDS

The concept of ADDS stands for “Active Directory Domain Services.” It’s a technology created
by Microsoft for managing network resources in a Windows environment. ADDS provides a
centralized system for managing users, computers, and other devices within a network. It allows
administrators to organize these resources into logical units called domains, which can then be
grouped into trees or forests. ADDS also supports security features like authentication and
authorization, ensuring that only authorized users and computers can access network resources.
In simpler terms, it’s like a control center for managing and securing all the devices and users
connected to a network running on Windows.

4.Disk Quota
Disk quota is a limit set on how much data a user or group can store on a computer’s hard drive.
It helps prevent one person or program from using up all the available space, ensuring fair use
and keeping the system running smoothly for everyone.

 NTFS & FAT32

FAT32: Older file system, widely compatible across different operating systems, but has

limitations like a maximum file size of 4 GB and a partition size limit of 2 TB.

NTFS: Newer file system with advanced features such as support for larger file sizes (up to 16

exabytes) and better security (file permissions, encryption). It’s the preferred choice for

Windows systems due to its capabilities.

 Roaming Profile & Mandatory Profile

Roaming Profile: This is a user profile stored on a network server that lets users access their

personal settings and files from any computer within a network. It ensures that their desktop

customizations, preferences, and documents are consistent no matter where they log in.

Mandatory Profile: Unlike a roaming profile, a mandatory profile is a standardized user profile

that administrators set up for multiple users. It enforces the same desktop settings and

configurations for all users who use it, preventing any individual changes from being saved.

of meaningless data. It’s a way to keep your information safe from unauthorized access or theft.

 Basic Disk vs. Dynamic Disk


 MBR & GPT

Role Of DHCP

DHCP (Dynamic Host Configuration Protocol) is like a manager for your network. It hands out

unique addresses to devices (like computers or phones) so they can connect and communicate

properly. Think of it as giving each device its own ticket to join the network party without any

hassle.

APIPA, DORA*, DHCP 8020 Rule

APIPA (Automatic Private IP Addressing):

APIPA assigns a temporary IP address (169.254.x.x) to devices when they can’t get an IP from a

DHCP server, allowing them to communicate locally.

DORA (Discover, Offer, Request, Acknowledge):

DORA is the process devices use to obtain an IP address from a DHCP server: they Discover

available servers, get an Offer, Request an IP, and then the server Acknowledges their request.

DHCP 80/20 Rule:

This rule recommends having one DHCP server handle 80% of IP assignments in a subnet, with

another handling the remaining 20%, ensuring efficient IP allocation and redundancy.

Lease Renewal Process


DNS (Domain Name System) lease renewal refers to the process by which a client computer

updates its DNS record with the server to extend its lease or validity period. Here’s how it

generally works:

Client Lease: Client computers receive an IP address and lease duration from the DHCP server.

DNS Registration: Clients register their hostname and IP address with the DNS server for

network accessibility.

Renewal Trigger: As the lease nears expiry, clients automatically attempt to renew their IP

address lease.

DNS Update: Concurrently, clients update their DNS record with the current IP address and new lease
duration.

Server Confirmation: DHCP server confirms the renewed lease, while DNS server updates its records
accordingly.

Continuous Connectivity: Successful renewal and update ensure uninterrupted network connectivity for
the client using its hostname.

You might also like