Network Admin (Chap 1) - Part Two
Network Admin (Chap 1) - Part Two
Network Naming
Network Naming
Network name is numbers or strings that devices use to reference a particular
computer network.
These strings or numbers are separate from the names of individual devices and the
addresses they use to identify each other. Network names take several forms.
Names
No Types of Names Examples
1 Uniform Resource Locator http://www.cs.princeton.edu/~jrex/foo.html
2 E-mail [email protected]
3 Hostname www.cs.princeton.edu
4 Internet Protocol 128.112.7.156
2
Network Naming Roles
They are used:
To share resources,
8
Windows Network Concepts
1. Workgroups
In reference to computers, a workgroup is simply one computer accessing or
sharing resources with another computer on the same network, also known as
peer-to-peer networking.
Workgroups are great for home offices and small businesses because they are
easy to implement and cost less than a domain setup.
In computer networking a workgroup is a collection of computers on a LAN
that share common resources and responsibilities.
Computers running Windows OSs in the same work group may share files,
9
printers, or Internet connection.
Windows Network Concepts-----
Workgroup contrasts with domain, in which computers rely on centralized
authentication.
A Windows workgroup is a group of standalone computers in a peer-to-peer
network.
Each computer in the workgroup uses its own local accounts database to
authenticate resource access.
The computers in a workgroup also do not have a common authentication process.
The default-networking environment for a clean windows load is workgroup.
In general, a given Windows workgroup environment can contain many
computers but work best with 15 or fewer computers. 10
Windows Network Concepts------
As the number of computers increases, a workgroup eventually become very
difficult to administer and should be re-organized into multiple networks or set
up as a client-server network.
The computers in a workgroup are considered peers because they are all equal
and share resources among each other without requiring a server.
Since the workgroup doesn’t share a common security and resource database,
users and resources must be defined on each computer.
Joining a workgroup requires all participants to use a matching name, all
Windows computers (Windows 7, 8 and 10) are automatically assigned to a
default group named WORKGROUP (MSHOME in WindowsXP). 11
Windows Network Concepts-----
To access shared resources on other PCs within its group, a user must know the
name of the workgroup that computer belongs to plus the username and
password of an account on the remote computer.
One of the most common mistakes when setting up a peer-to-peer network is
misspelling the workgroup name on one of the computers.
For example, suppose you decide that all the computers should belong to a
workgroup named MYGROUP.
If you accidentally spell the workgroup name MYGRUOP for one of the computers,
that computer will be isolated in its own workgroup.
If you can’t locate a computer on your network, the workgroup name is one of
12
Common characteristics of workgroup accounts in Windows 10
No computers in the workgroup has control over any other computer; rather,
they are peer computers
Each computer in the workgroup has multiple accounts associated with it.
Each workgroup account can only log into the workgroup computer it
belongs to
Workgroup accounts are not password-protected
Computers in a workgroup must all be on the same LAN or subnet
The number of computers in a workgroup is far smaller than in a domain.
This breaks down to an average of 20 computers for a workgroup 13
Windows Workgroups vs Homegroups
21
Common Characteristics of Domain Controller
Domain accounts need an account to log into a computer joined to the
domain
Domain controllers manage computers on the domain
There can be potentially thousands of computers joined to a domain
Computers on a domain can be on different local networks
Domain accounts can log into any of the other computers on the domain by
using their domain login credentials
Only limited changes can be made by the domain account user — the bigger,
important changes need to be made by the administrator 22
Domain Name Server (DNS)
A DNS is a computer server that contains a database of many IP addresses
and their associated domain names.
It serves to translate a requested domain name into an IP address, so that
the computer knows which IP address to connect to for the requested
contents.
The Internet is a network of connected computers, and they
communicate with each other through IP addresses.
DNS plays an important role to help us conveniently use the Internet and it
is one of the most essential foundations of the Internet today. 23
Domain Name Server (DNS)----
It is much easier for us to remember a domain name, webnic.cc, rather than
a string of numbers, 104.20.73.209 (IP address) to WebNIC’s website.
Both the domain name and the DNS are extremely important and they
work together to make this possible.
The domain is a piece of string that helps to identify a particular
resources(eg. website) while the DNS is a server that translates the
domain to the corresponding IP address to provide the required webpage.
A great example is to see a DNS as a phone book, which matches the
name of subscribers to a telephone number. 24
Domain Name Server (DNS)----
You can search for the name you want and find the corresponding phone
number.
It is also a similar concept to your smartphone’s contact list, which will
match a contact name to a phone number.
Remembering domain names is definitely easier for us than to remember
a string of numbers.
DNS helps us to do this by match domain names to IP addresses, and
simplifies our web surfing experience significantly
25
DNS structure------
The domain name is usually contained in a URL. A domain name is made of
multiple parts, called levels.
The domain hierarchy is read from right to left with each section denoting
a subdivision.
The multiple parts of the domain name includes the protocols, subdomain
(third-level domains), second-level domain, and top-level-domain
For example, the last word in a domain name represents a top-level domain.
These top-level domains are controlled by the IANA in what's called the
Root Zone Database.
26
DNS structure
1. Protocol
The protocol identifier or URL prefix is what you usually see on the first part of
your URL.
The term itself identifies the protocol used to locate a resource on the internet
( or online).
There are various protocol identifiers, such as FTP, mailto, file, and news but
what we commonly see is HTTP or HTTPS.
HTTP (Hypertext Transfer Protocol) represents a data transfer protocol that
directs how a web server and a browser communicate
27
DNS structure-----
The protocol comes before the subdomain, such as having a secure (https://)
versus a non-secure (http://) website.
2. Third-level domains or subdomains
It is also called subdomains, third-level domains are the part of a URL before
the second-level domain.
They indicate the type of server that the domain connects to when accessing
website data.
The most common third-level domain is www., which means World Wide Web.
Third-level domains used to be a requirement for domain names, but they are
now optional. 28
DNS structure-----
3. Second-Level domains
Second-Level Domains are the main part of a domain name, also
known as the domain title.
The SLD is usually a combination of words that describes a business
or website.
Example: The website www.indeed.com
The word “indeed” would be the second-level domains.
When choosing a Second-Level Domain, you can use any combination
29
DNS structure
4. Top-Level Domains (TLDs)
A TLD also called an extension or domain ending, refers to the suffix and the
last part of a web address to the right of the last dot after the primary domain
name.
For example, if the domain is www.indeed.com, the TDL is “.com.”
The Internet Assigned Numbers Authority (IANA), now a division of ICANN
(Internet Corporation for Assigned Names and Numbers), manages the allocation
of TLDs
There are more than 1,000 top-level domains, and here are some of the most
common: 30
DNS structure------
COM — commercial websites, though open to everyone
40
The Importance of a DNS
To convert domain names into respective IP addresses and locate the web address
host.
To make a website or an online business visible on the internet.
To safeguard data from being accessed by unwanted people as these DNS servers
With a single network logon, administrators can manage directory data and
organization throughout their network, and authorized network users can
access resources anywhere on the network.
Active Directory (AD) initially, used only for centralized domain
management.
However, it eventually became an umbrella title for a broad range of
directory-based identity-related services.
A server running the Active Directory Domain Service (AD DS) role is called
a domain controller.
43
Benefits of Active Directory
1. Centralizes Resources
Allows to authenticates and authorizes all users and computers in a Windows
domain type network,
2. Security Administration
Helps the administrator in assigning and enforcing security policies for all
computers, and installing or updating software.
3. Active Directory simplifies resource location
Active directory simplifies resource location by allowing files and print resources to
be published on the network.
Publishing an object allows users to securely access network resources by searching
the active directory database for the desired resources. 44
Benefits of Active Directory
6. Replication of information
7. Provides integration with DNS
8. Provides flexible querying
9. Establishes a framework to deploy other related services:
Certificate Services,
AD Federation Services,
Lightweight Directory Services, and Rights Management Services.
46
Active Directory Domain Services
Here are the services that AD DS provides as a the core functionality required by a
centralized user management system:
1. Domain Services (DS)
AD DS is the foundation stone of every Windows domain network.
It stores information about members of the domain, including devices and users,
verifies their credentials and defines their access rights and manages
communications between the users and the domain controller.
The server running this service is called a domain controller.
A domain controller is contacted when a user logs into a device, accesses another
device across the network, or runs a line-of-business Metro-style app side loaded
47
into a device.
Active Directory Domain Services------
Its independence enables local control and autonomy of directory services for
specific applications.
It also facilitates independent, flexible schema, and naming contexts
Unlike AD DS, however, multiple AD LDS instances can run on the same
server.
3. Certificate Services (CS)
AD Certificate Services (AD CS) establishes an on-premises public key
infrastructure.
It can create, validate and revoke public key certificates for internal uses of
an organization. 50
Active Directory Domain Services-------
These certificates can be used to encrypt files, emails, and network traffic
(when used by virtual private networks or IPSec protocol).
AD CS requires an AD DS infrastructure.
4. Federation Services (FS)
AD Federation Services (AD FS) is a single sign-on service.
With an AD FS infrastructure in place, users may use several web-based
services (e.g. Internet forum, blog, online shopping, webmail) or network
resources using only one set of credentials stored at a central location, as
opposed to having to be granted a dedicated set of credentials for each service.
51
Active Directory Domain Services-------
52
Active Directory Domain Services-------
53
LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, vendor-
neutral, industry standard application protocol for accessing and maintaining
distributed directory information services over an Internet Protocol (IP)
network.
Directory services play an important role in developing intranet and Internet
applications by allowing the sharing of information about users, systems,
networks, services, and applications throughout the network.
As examples, directory services may provide any organized set of records,
often with a hierarchical structure, such as a corporate email directory.
Similarly, a telephone directory is a list of subscribers with an address54and a
LDAP-------
LDAP (Lightweight Directory Access Protocol) is one of the core protocols that
was developed for directory services (the process of securely managing users and
their access rights to IT resources), and most directory services still use LDAP
today.
In a nutshell, LDAP specifies a method of directory storage and facilitates the
authentication and authorization of users to servers, files, networking
equipment, and applications, among other IT resources.
Companies store usernames, passwords, email addresses, printer connections,
and other static data within directories.
LDAP is an open, vendor-neutral application protocol for accessing and
55
LDAP-------
LDAP is a protocol, so it doesn't specify how directory programs work.
Instead, it's a form of language that allows users to find the information they
need very quickly.
LDAP has two main goals:
To store data in the LDAP directory and
Authenticate users to access the directory.
It also provides the communication language that applications require to send
and receive information from directory services.
A directory service provides access to where information on organizations,
individuals, and other data is located within a network. 56
LDAP-------
The most common LDAP use case is providing a central location for accessing
and managing directory services.
LDAP enables organizations to store, manage, and secure information about
the organization, its users, and assets–like usernames and passwords.
This helps simplify storage access by providing a hierarchical structure of
information, and it can be critical for corporations as they grow and acquire
more user data and assets.
The main goal of LDAP is to communicate with, store, and extract objects (i.e.
domains, users, groups, etc.) from AD into a usable format for its own
directory, located on the LDAP server. 57
LDAP-------
In short, LDAP specifies a method of directory storage that allows for adding,
deleting, and modifying records, and it enables the search of those records to
facilitate both authentication and authorization of users to resources.
LDAP’s three main functions are:
Update:
This includes adding, deleting, or modifying directory information.
Query:
This includes searching and comparing directory information.
Authenticate:
The main authentication functions include binding and unbinding; a third function,
abandon, can be used to stop a server from completing an operation.
58
LDAP vs Active Directory
Lightweight Directory Access Protocol Active Directory
1 LDAP is a lightweight version of Directory Active Directory (AD) service, a large
Access Protocol (DAP) and provides a central directory service database that contains
location for accessing and managing directory information spanning every user account
services running on the (TCP/IP). in a network
2 LDAP specializes in finding a directory object AD provides the authentication and
with little information, so it doesn’t need to management of users and groups, and it is
extract all of its attributes from AD, or what ultimately authenticates a user or
whichever directory service it is pulling from computer. The database contains a higher
volume of attributes than what is pulled
into LDAP
59