0% found this document useful (0 votes)
16 views189 pages

Configure and Administrate Server

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views189 pages

Configure and Administrate Server

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 189

MARY HELP COLLEGE

DEPARTMENT OF INFORMATION
TECHNOLOGY HNS L-III
UNIT OF COMPETENCE:- CONFIGURE AND
ADMINISTER SERVER
Prepared By Abenezer A.

Prepared By Abenezer A.
Previ Next End

CONFIGURE AND ADMINISTER


SERVER
E-Mail : [email protected]

Chapter 1:- Confirm server specification.


Chapter 2:- Verify server compatibility and inter operability.

Chapter 3:- Configure and test server.


Prepared by: Abenezer A.

2
Previ Next End

Chapter 1:- Confirm server


specification.
E-Mail : [email protected]

 Confirm Network operating system and server design


 Identify product, vendor architecture and equipment
 Identify technology and resource with business requirements
Prepared by: Abenezer A.

3
Previ Next End

CONFIRMING NETWORK OPERATING


SYSTEM AND SERVER DESIGN
E-Mail : [email protected]

Confirm server design with client


 The first step in building and configuring a server is to
 confirm that the information about the project is correct, current and that
the client agrees with documented specifications and design.

 You will need to reconfirm with the client


 The role of the server
Prepared by: Abenezer A.

 How it will function with the remaining IT infrastructure, and


the required configuration.

4
Previ Next End

FUNCTIONAL REQUIREMENTS
E-Mail : [email protected]

 Functional requirements capture the intended behavior of the


system.
 This behavior may be expressed as a service, task or function
that the system is required to perform.
 The functional requirements documents are the ‘blueprint’ for
Prepared by: Abenezer A.

the project implementation

5
Previ Next End

CLIENTS REQUIREMENTS
ISSUES
E-Mail : [email protected]

 One of the first and most important activities to get on when


confirming server specifications is
 To confirm client needs ,
 To ensure that they acknowledge that requirements have been
captured correctly and
 Sign-off on the requirements
Prepared by: Abenezer A.

 So one of the tasks in confirming client needs is to document


the requirements.

6
THIS MAY INCLUDE
IDENTIFYING OR CLARIFYING
REQUIREMENTS ISSUES
 The business case  Maintenance and backup
 What the client considers requirements
the project’s main  Bandwidth issues that may
objectives are, including affect the project
the services that are to be  Role definition of parties
performed involved
 What IT infrastructure is  The nature of the data (e.g.
already in place text, multimedia)
 Basic specifications  Security needs (e.g. levels
 Conflicting or overlapping of user access and
requirements privileges)
 Costing 7
Previ Next End

FUNCTIONAL REQUIREMENTS
SPECIFICATION
E-Mail : [email protected]

 The functional specification describes what the system will do,


as opposed to how it will be done.
 This distinction is important because
 The client may not be interested in the details of how a function is
implemented, and
 The technical details may simply cause confusion for the client the
Prepared by: Abenezer A.

implementation details may need to change during the design and


development of the project

8
Previ Next End

USER REQUIREMENTS
E-Mail : [email protected]

 How many users are expected to use the system?


 How many people will be utilizing the solution at one
time?
 Where the users will be located (e.g. overseas,
interstate or at home?
Prepared by: Abenezer A.

9
Previ Next End

TECHNICAL REQUIREMENTS
 What types of computers/operating systems will the users operate?
E-Mail : [email protected]

 Are their desktops all the same?


 What bandwidth restrictions occur presently?
 What security (login) will they need?
 What backup policies need to be in place?
 Who will have administration rights?
 What will the business do if the system fails at any stage?
Prepared by: Abenezer A.

 Who is the project sponsor?


 What does management expect the system will do and won’t do?

10
Previ Next End

HARDWARE
 Compatibility: will the solution work with existing systems?
E-Mail : [email protected]

 Support for proprietary formats: will the existing systems and


architecture support all types of data?
 Will the new system be supported by existing resources within the
company?
 What funding is available for new hardware?
 What is the backup strategy? Has this been cost?
 Does the system need to be redundant, load balanced or clustered?
Prepared by: Abenezer A.

 Will there be time delays to purchase and install hardware?


 Who will be building the server?
 Are there other projects that you may be able to share hardware
costs with?
11
SOFTWARE
 What is the true cost of the  Who owns the source code?
software?  What happens if the source code is
 Are there licensing issues? As modified? Who supports the product
the system is in development, then?
should you pay for all the  Does the solution work with all other
licensing now or when the company software systems?
system is in live mode?  If web-based, does the solution
 Can the software be licensed for function on all common browsers?
use by multiple users who use it  If security is a concern, can the
on different machines? software be delivered in a ‘locked
(Concurrent licensing) down’ format?
 How long has the software been  Does the software support all file
on the market for formats?
 What happens if the software  Is the software easy to use, or are there
company becomes insolvent? major training issues/costs?
Who supports it?

12
Previ Next End

STAGE SIGN-OFF
E-Mail : [email protected]

 A project is divided into many stages. Each stage will have


entry and exit criteria that must be met before the project can
progress further. At the planning stage, the owner of the
system or project steering committee must signoff on stage
exit criteria, which would include server design
documentation.
Prepared by: Abenezer A.

 This then would trigger the start of the next stage of the
project the development stage.

13
THE EXIT CRITERIA WILL NORMALLY
STATE THAT THE FOLLOWING ITEMS
HAVE BEEN IDENTIFIED AND AGREED TO:
 Server platforms  Privacy issues
 Operating systems  Initial timelines
 Applications  Budget
 Hardware and software  State and federal
limitations regulations.
 Client and developer
responsibilities

14
IDENTIFY SPECIFICATIONS
 Once requirements have been defined and client needs are
clarified, it’s time to start thinking about identifying products
that fit the solution.
 In this case, we need to focus on the possible server
solutions. Remember: a server consists of
 Hardware

 Software

 Network connections.
15
Previ Next End

CONT…
E-Mail : [email protected]

 There are different types of server designs that need to be considered


when identifying equipment.
 There are multiple server architectures to choose from, including
 Mainframe architecture
 File sharing architecture
 Client/server architecture
Prepared by: Abenezer A.

 Web based architecture


 Thin Client architecture
 Blade architecture
16
Previ Next End

CHAPTER 1 :- CONFIRM SERVER


SPECIFICATION
E-Mail : [email protected]

Definition and Characteristics of Network OS

 A network operating system (NOS) is the software that runs


on a server computer and enables the server to manage data,
users, groups, security, applications, and other networking
functions.
Prepared by: Abenezer A.

 It is a computer operating system that is designed primarily to


support workstation, personal computer, and, in some
instances, older terminal that are connected on a local
area network (LAN).
17
Previ Next End

CONT….
E-Mail : [email protected]

 The network operating system is designed to allow shared


file and printer access among multiple computers in a
network, typically a local area network (LAN), a private
network or to other networks.
 Network Operating Systems are based on
a client/server architecture in which a server enables
Prepared by: Abenezer A.

multiple clients to share and access resources.

18
Previ Next End

CONT….
E-Mail : [email protected]

 Advantage of NOS
 Centrally manage network resources, such as programs,
data and devices.
 Secure access to a network.
 Allow remote users to connect to a network.
Prepared by: Abenezer A.

 Allow users to connect to other networks like the Internet.


 Back up data and ensure its availability.
 Multiuser, Multitasking, and Multiprocessor Systems
19
Previ Next End

CONT….
E-Mail : [email protected]

 Supports multiple user accounts at the same time and


enables concurrent access to shared resources by
multiple clients. Allow for simple additions of clients
and resources.
 Monitor the status and functionality of network elements.
 Distribute programs and software updates to clients.
Prepared by: Abenezer A.

 Ensure efficient use of a server's capabilities.

20
Previ Next End

Differences between Network and Desktop OS

Network Operating System Desktop Operating System


E-Mail : [email protected]

■ Supports multiple users ■ Supports a single user


■ Runs multiuser applications ■ Runs single-user applications
■ Shares files and folders on a large ■ Shares files and folders on a small
network with high security. network with limited security
■ Designed for a corporate ■ Designed for a small office/home
environment serving multiple users office (SOHO) with a limited
with a wide range of needs . number of users
Prepared by: Abenezer A.

■ Support large number of users.

21
Previ Next End

CONT….

Types of Network
E-Mail : [email protected]

 There are two types of network based on configuration


1. Peer to peer network
2. Server based network
Prepared by: Abenezer A.

22
Previ Next End

CONT….
1. Peer to peer network:-
E-Mail : [email protected]

 This is a type of network in which all computers are connected to


each other. It is inexpensive to setup.
 Files are placed on any computer and can be accessed by any other
computer in the network.
 This type of network is best for small or medium size organization.
Prepared by: Abenezer A.

23
Previ Next End

CONT…

1.1. Advantages of peer to peer network:-


E-Mail : [email protected]

 It is easy to configure
 It is not expensive to setup

1.2. Disadvantages of peer to peer network:-


 No control over all the computers i.e. decentralized
Prepared by: Abenezer A.

 Security problem

24
Previ Next End

CONT….
2. Server based network:-
E-Mail : [email protected]

 This is type of network in which there is a server that is attached


to client computer. So one computer is behaving as a center
server controlling and managing other computers.

2.1. Advantages of client and server network:-


 Security is well managed in these systems
 New resources can be easily added and removed to these
Prepared by: Abenezer A.

networks
 New technology can be put in without any problem
 Server can be accessed remotely also
25
Previ Next End

CONT….
2.2. Disadvantages of client and server network:-
E-Mail : [email protected]

 It is expensive to setup
 Maintenance of these systems require more staff
 All computers are dependent on server. If server crashes then all
computers effected

Examples of network operating systems:-


Prepared by: Abenezer A.

 Windows server 2008 (client and server network)


 Appleshare

26
Previ Next End

CONT….
Types of Network Operating System
Macintosh OS X.
E-Mail : [email protected]

1.

2. Microsoft Windows Server.


3. UNIX/Linux.
4. Novell NetWare
Prepared by: Abenezer A.

27
Previ Next End

CONT….
1. Novell NetWare:
E-Mail : [email protected]

 Novell NetWare was the first OS to meet network OS


requirements and enjoy widespread deployment in PC-
based LANs back in the 1980s
 The original NetWare product in 1983, supported
clients running both GUI and MS-DOS, ran over a
proprietary star network topology and was based on a
Novell-built file server using the Motorola 68000
processor, but the company soon moved away from
building its own hardware, and NetWare became
Prepared by: Abenezer A.

hardware-independent, running on any suitable Intel-


based IBM PC compatible system, and a wide range
of network cards.

28
Previ Next End

CONT….

2. Microsoft Windows:
E-Mail : [email protected]

 Network operating systems offered


by Microsoft are Windows Server
2003 and Windows Server 2008.
 Windows Server operating systems
use a central Database called Active
Prepared by: Abenezer A.

Directory to manage network


resources.

29
Previ Next End

CONT….

3. Linux/UNIX:
E-Mail : [email protected]

 Linux is an operating system


similar to UNIX.
 It runs on many different
computers and was first released in
1991.
Prepared by: Abenezer A.

 Linux operating systems include


RedHat, Caldera, SUSE, Debian,
Fedora, Sanba and Slackware

30
Previ Next End

CONT….

4. Macintosh OS X.
E-Mail : [email protected]

 Mac OS is the computer


operating system for Apple
Computer's Macintosh line of
personal computers and
workstations.
Prepared by: Abenezer A.

 A popular feature of its latest


version, Mac OS X , is a desktop
interface with some 3-D
appearance characteristics. 31
Previ Next End

QUIZ (5%)
E-Mail : [email protected]

1. Define network operating system?

2. What is the basic difference between desktop operating


system and server operating system?

3. List and define the basic type of NOS?


Prepared by: Abenezer A.

32
Previ Next End

IDENTIFY PRODUCT ,VENDOR


ARCHITECTURE AND EQUIPMENT
E-Mail : [email protected]

 Identify vendor architecture


 When selecting equipment for the server, you will need to
consider the
 Hardware and
 Software platforms from each vendor.
Prepared by: Abenezer A.

 Platform selection
 A server’s platform will mainly depend on the type of
service provided.
33
Previ Next End

SOME OF THE FUNCTIONS PROVIDED


BY A SERVER ARE
E-Mail : [email protected]

 Mail Services
 Web Services
 Remote Access Services
 File Storage And Retrieval Services
 Network Access
Prepared by: Abenezer A.

 Application Services.
 Transactional Processing Services
 Streaming Media Services
34
Previ Next End

HARDWARE AND SOFTWARE


SPECIFICATIONS
E-Mail : [email protected]

 Detailed information about server hardware is available from


the server documentation and from the hardware
manufacturer’s website.
 At a minimum, the server vendor will have a component list
detailing what hardware is in the server.
Prepared by: Abenezer A.

35
Prepared by: Abenezer A. E-Mail : [email protected]
Previ

B
U
H
Next

EQUIPMENT’S
IDENTIFYING NETWORK
End

36
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

EQUIPMENT’S
IDENTIFYING NETWORK
End

37
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

MODEM
EQUIPMENT’S
IDENTIFYING NETWORK
End

38
Prepared by: Abenezer A. E-Mail : [email protected]
Previ

E
T

R
R

U
O
Next

EQUIPMENT’S
IDENTIFYING NETWORK
End

39
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

EQUIPMENT’S
IDENTIFYING NETWORK
End

40
End
IDENTIFY SERVER
Previ Next

TECHNOLOGIES
E-Mail : [email protected]

 Information technology is constantly changing and


improving at a high speed.
 Common hardware technologies are
Processors (CPU)
Prepared by: Abenezer A.

Random access memory (RAM)


Storage

Optical drive.
41
Previ Next End

SYSTEM REQUIREMENTS
E-Mail : [email protected]

 For hardware and software components, you will need to


ensure that any minimum system requirements are met.
 You will find this information at
 manufacturer’s websites
 Whitepaper,
Prepared by: Abenezer A.

 Installation Documentation, and


 Product Overviews.

42
Previ Next End

WHAT IS SERVER?
 Servers is large system with higher processing speed,
E-Mail : [email protected]

memory and hard disk capacity whose role in a network is to


provide services and resources to users.
 In a large network environment, servers may have one or
more specific roles in a network, depending on the number of
users, volume of traffic, number of peripherals, and so on
Prepared by: Abenezer A.

 Computer that functions as servers within a domain can have


one of two roles, Domain Controller or Member Server.

43
Previ Next End

SERVER-BASED NETWORK:-
E-Mail : [email protected]

 Server-based network:- A network in which network


security and storage are managed centrally by one or more
servers.
Prepared by: Abenezer A.

44
Previ Next End

CONT…

How It Works
E-Mail : [email protected]

 In a server-based network, special computers called


servers handle network tasks such as authenticating users,
storing files, managing printers, and running applications
such as database and e-mail programs.
 Security is generally centralized in a security provider,
Prepared by: Abenezer A.

which allows users to have one user account for logging


on to any computer in the network. Because files are
stored centrally, they can be easily secured and backed up.
45
Previ Next End

WINDOWS SERVER 2008 CORE


TECHNOLOGIES
E-Mail : [email protected]

New Technology File System


Active Directory
Microsoft Management Console
Disk Management
Prepared by: Abenezer A.

File and printer sharing


Windows networking
Internet Information Services
46
Previ Next End

NEW TECHNOLOGY FILE SYSTEM


(NTFS)
E-Mail : [email protected]

 Successor to FAT/FAT32
 Native support for long filenames, file and folder permissions,
support for large files and volumes, reliability, compression,
and encryption
 Most significant is the added ability for more granular file
Prepared by: Abenezer A.

access control

47
Previ Next End

ACTIVE DIRECTORY
E-Mail : [email protected]

 Provides a single point of administration of resources (Users,


groups, shared printers, etc.)
 Provides centralized authentication and authorization of users
to network resources.
 Along with DNS, provides domain-naming services and
Prepared by: Abenezer A.

management for a Windows domain.


 Enables administrators to assign system policies, deploy
software to client computers, and assign permissions and rights
to users of network resources. 48
Previ Next End

MICROSOFT MANAGEMENT
CONSOLE (MMC)
E-Mail : [email protected]

 Creates a centralized management interface for administrators


 Uses snap-ins, which are designed to perform specific
administrative tasks (such as disk management or active
directory configuration)
 Multiple snap-ins can be combined into a single MMC,
Prepared by: Abenezer A.

providing quicker access to commonly used tools

49
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

(MMC)
MICROSOFT MANAGEMENT CONSOLE
End

50
Previ Next End

DISK MANAGEMENT
E-Mail : [email protected]

 Monitors disk and volume status


 Initializes new disks
 Creates and formats new volumes
 Troubleshoots disk problems
Prepared by: Abenezer A.

 Configures redundant disk configurations (RAID)

51
Previ Next End

FILE AND PRINTER


SHARING
E-Mail : [email protected]

 Shadow copies
 Disk quotas
 Distributed File System (DFS)
 Also possible to configure options that allow redundancy,
Prepared by: Abenezer A.

version control, and user storage restrictions.

52
WINDOWS NETWORKING
Previ Next End

CONCEPTS
THE WORKGROUP MODEL:
E-Mail : [email protected]

 A small group of computers that share common roles, such as


sharing files or printers. Also called a peer-to-peer network
 Decentralized logons, security, and resource sharing
 Easy to configure and works well for small groups of users
(fewer than 10)
 A Windows Server 2008 server that participates in a
workgroup is referred to as a The Domain Model
Prepared by: Abenezer A.

 Preferred for a network of more than 10 computers or a


network that requires centralized security and resource
management
 Requires at least one computer to be a domain controller
53
Previ Next End

CONT….
Role of Server:
1. Domain Controller is the authentication server or security
E-Mail : [email protected]

server validate users for logging on and accessing network


resources.
2. Member servers is a computer that provides specific
function.
Such as :-File and print servers provide users with
Prepared by: Abenezer A.

centralized locations for storing files and accessing print


devices.
3. Standalone Server is a computer install only NOS without
service 54
Previ Next End

Identify Windows Server 2003 Technology and


resource
E-Mail : [email protected]

HARDWARE OF SERVER

 CPU

 RAM

 HDD
Prepared by: Abenezer A.

 RAID Controller

 FAN

 POWER SUPPLY……
55
Previ Next End

CONT….
E-Mail : [email protected]

Types of Computer Server

1. Blade Server

2. Rack Mount Server


Prepared by: Abenezer A.

3. Tower Server

56
Previ Next End

1. BLADE SERVER
E-Mail : [email protected]

 Blade server.
A server architecture that houses
multiple server modules ("blades")
in a single chassis. It is widely used
in datacenters to save space and
improve system management.
Prepared by: Abenezer A.

Either self-standing or rack


mounted, the chassis provides the
power supply, and each blade has
its own CPU, RAM and storage.
57
Previ Next End

2. RACK MOUNT SERVER


E-Mail : [email protected]

 A rack server, also called a rack-mounted


server, is a computer dedicated to use as
a server and designed to be installed in a
framework called a rack. The rack
contains multiple mounting slots called
bays, each designed to hold a hardware
Prepared by: Abenezer A.

unit secured in place with screws. A rack


server has a low-profile enclosure, in
contrast to a tower server, which is built
into an upright, standalone cabinet.
58
Previ Next End

3. TOWER SERVER
E-Mail : [email protected]

 A tower server is a computer intended


for use as a server and built in an
upright cabinet that stands alone. The
cabinet, called a tower, is similar in size
and shape to the cabinet for a tower-
style personal computer. This is in
Prepared by: Abenezer A.

contrast to rack server s or blade server


s, which are designed to be
rack-mounted . 59
Previ Next End

CONT…

Choosing a NOS
E-Mail : [email protected]

 The main features to consider when selecting a NOS include:

 Performance

 Management and monitoring tools

 Security
Prepared by: Abenezer A.

 Scalability

 Robustness/fault tolerance
60
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

The End
End

61
Previ Next End

LO2: VERIFYING SERVER COMPATIBILITY


AND INTER-OPERABILITY
E-Mail : [email protected]

Objectives:
 After completing this Learning outcome the student should
be able to:
 Review Hardware and software compatibility
 Install Required operating system and software
Prepared by: Abenezer A.

62
Previ Next End

REVIEW HARDWARE AND SOFTWARE


COMPATIBILITY
E-Mail : [email protected]

Computer compatibility
 A family of computer models is said to be compatible if
certain software that runs on one of the models can also
be run on all other models of the family.
 The computer models may differ in performance, reliability
Prepared by: Abenezer A.

or some other characteristic. These differences may affect


the outcome of the running of the software.

63
Previ Next End

CONT…

What is Software compatibility?


E-Mail : [email protected]

 Software compatibility is a characteristic of software


components or systems which can operate satisfactorily
together on the same computer, or on different computers
linked by a computer network.
 It is possible that some software components or systems
Prepared by: Abenezer A.

may be compatible in one environment and incompatible


in another.

64
Previ Next End

CONT…..

 Software compatibility can refer to the compatibility that


E-Mail : [email protected]

particular software has running on a particular CPU


architecture such as Intel or PowerPC.
 Software compatibility can also refer to ability for the
software to run on a particular operating system. Very
rarely is compiled software compatible with multiple
Prepared by: Abenezer A.

different CPU architectures.

65
Previ Next End

CONT…

 Software incompatibility occurs many times for new


E-Mail : [email protected]

software released for a newer version of an operating


system which is incompatible with the older version of
the operating system because it may miss some of the
features and functionality that the software depends on.
 Software that works on older versions of an operating
Prepared by: Abenezer A.

system is said to be backwards compatible.

66
Previ Next End

CONT….
What is Hardware Compatibility?
E-Mail : [email protected]

 Hardware Compatibility List (HCL) is a list of


computer hardware (typically including many types of
peripheral devices) that is compatible with a particular
operating system or device management software.
 In today's world, there is a vast amount of computer
Prepared by: Abenezer A.

hardware in circulation, and many operating systems too.

67
Previ Next End

CONT…
E-Mail : [email protected]

 Hardware compatibility can refer to the compatibility of


computer hardware components with a particular CPU
architecture, bus, motherboard or operating system.
 Hardware that is compatible may not always run at its
highest stated performance, but it can work with legacy
components.
Prepared by: Abenezer A.

68
Previ Next End

CONT…
E-Mail : [email protected]

 An example is RAM chips, some of which can run at a


lower (or sometimes higher) clock rate than rated.
Hardware that was designed for one operating system
may not work for another, if device or kernel drivers
are unavailable.
 For example, much of the hardware for Mac OS X is
Prepared by: Abenezer A.

proprietary hardware [1] with drivers unavailable for use in


operating systems such as Linux.

69
Previ Next End

INSTALLING WINDOWS SERVER 2008


E-Mail : [email protected]

Preplanning and Preparing a Server Installation

 Before you begin the actual installation of Windows Server 2008,

you must make several decisions.

 How well you plan these steps will determine how successful your

installation is.
Prepared by: Abenezer A.

70
Previ Next End

CONT…
Verifying Minimum Hardware Requirements

 The first step of the installation is verifying that your hardware meets
E-Mail : [email protected]

the system requirements. although there is a minimum requirement for


the CPU and RAM, there is also a recommended CPU and RAM
configuration. For the sake of performance we have to use
recommended.
Prepared by: Abenezer A.

71
Previ Next End

Requirement Standard Enterprise Edition Datacenter Edition Web


Edition Edition
Minimum CPU 133 MHz 133 MHz for x86-based 400 MHz for x86-based 133 MHz
E-Mail : [email protected]

Speed computers733 MHz for computers733 MHz for


Itanium based Itanium-based computers*
computers*
Recommended 550 MHz 733 MHz 733 MHz 550 MHz
CPU Speed

Minimum RAM 128 MB 128 MB 512 MB 128 MB

Recommended 256 MB 256 MB 1 GB 256 MB


Minimum RAM

Maximum RAM 4 GB 32 GB for x86based 64 GB for x86based 2 GB


computers512 GB for computers512 GB for
Itanium based Itanium-based computers*
Prepared by: Abenezer A.

computers*

Multiprocessor Up to 4 Up to 8 Minimum 8 required Up to 2


Support ** Maximum 64

72
Previ Next End

GATHERING THE INFORMATION


NECESSARY TO PROCEED
E-Mail : [email protected]

 During the installation of Windows Server 2008, you will


have to tell the Setup Wizard how you want your server
configured.
 The wizard will take the information you provide and will
configure the server settings to meet your specifications.
Prepared by: Abenezer A.

 Taking the time to gather the information described in the


following sections before starting your installation will
likely make your installation go faster and easier.
73
Previ Next End

CONT….
Selecting the Computer Name
E-Mail : [email protected]

 Each computer on a network must have a name that is unique


within that network. Many companies have a standard naming
convention for their servers and workstations.

Name of the Workgroup or Domain

 During the server installation, the Setup Wizard will ask for the
Prepared by: Abenezer A.

name of the workgroup or domain that the server will be joining.


You can either enter the name of an existing organizational
structure or enter a new name, creating a new workgroup or
domain. 74
Previ Next End

CONT…

Network Protocol and IP Address of the Server


E-Mail : [email protected]

 When installing Windows Server 2008, you must install and configure a
network protocol that will allow it to communicate with other machines
on the network. Currently, the most commonly used protocol is called
TCP/IP, which stands for Transmission Control Protocol/Internet
Protocol. This protocol allows computers throughout the Internet to
communicate. After you install the TCP/IP protocol, you need to
Prepared by: Abenezer A.

configure an IP address for the server

75
Previ Next End

CHOOSE AN INSTALLATION METHOD


E-Mail : [email protected]

1. Attended installation

2. Unattended installation

3. Other installation options


Prepared by: Abenezer A.

76
Previ Next End

CONT…

1. Attended Installation:- An attended installation requires a user’s


E-Mail : [email protected]

continuous involvement during the installation process. This


installation method requires the least amount of preparation.

Note:- Attended installations are time consuming.

2. Unattended Installation:- An unattended installation does not


require constant user involvement during the installation process.
Prepared by: Abenezer A.

The installation can be initiated by pre-configuring an answer


file called unattend.txt. Unattend.txt file contains all the
necessary settings and options that are selected and entered
77
during an attended installation.
Previ Next End

CONT…

Unattended installations are beneficial:


E-Mail : [email protected]

 When the operating system is to be installed on several


similar servers.
 For deploying/organizing a large number of client operating
systems such as Windows XP or Windows 2000 Professional.
 Unattended installation requires a lot of planning; it may be
Prepared by: Abenezer A.

essential to run through at least one attended installation to


ensure that all the settings and options entered in the answer
file are accurate.
78
Previ Next End

CONT…
3. Other Installation Options
E-Mail : [email protected]

3.1. Network installation

3.2. Imaged installation

3.1. Network Installation

 For installing Windows Server 2003 on computers connected to an


existing network:

 Copy the \I386 directory from the installation CD to a shared folder on


Prepared by: Abenezer A.

the network.

 Copy files, such as answer files and device drivers, to the same folder.

 Map the folder to a drive letter on the machine where the operating
79
system is to be installed.
Previ Next End

CONT…

3.3. Imaged Installation


E-Mail : [email protected]

 Imaged installation is useful when Windows Server 2003


needs to be set up on several identical computers.
 Disk image is used to perform imaged installations.
Prepared by: Abenezer A.

80
Previ Next End

MAKE PRE-INSTALLATION DECISIONS


(QUESTION?)
E-Mail : [email protected]

1. Partitioning

2. File system

3. Licensing

4. Server name

5. Initial password
Prepared by: Abenezer A.

6. Network settings

7. Upgrade or clean installation

81
Previ Next End

INSTALL WINDOWS SERVER 2008


E-Mail : [email protected]

Step 1. Insert the appropriate Windows Server 2008 installation

media into your DVD drive.

Step 2. Reboot the computer.


Prepared by: Abenezer A.

82
Previ Next End

After Press Any Key from the keyboard this message is appeared
E-Mail : [email protected]
Prepared by: Abenezer A.

83
Previ Next End

STEP 3. WHEN PROMPTED FOR AN INSTALLATION


LANGUAGE AND OTHER REGIONAL OPTIONS, MAKE YOUR
SELECTION AND PRESS NEXT.
E-Mail : [email protected]
Prepared by: Abenezer A.

84
Previ Next End

STEP 4. NEXT, PRESS INSTALL NOW TO BEGIN THE


INSTALLATION PROCESS
E-Mail : [email protected]
Prepared by: Abenezer A.

85
Previ STEP
Next5. PRODUCT ACTIVATION IS NOW ALSO IDENTICAL WITH
End
THAT FOUND IN WINDOWS VISTA. ENTER YOUR PRODUCT ID IN
THE NEXT WINDOW, AND IF YOU WANT TO AUTOMATICALLY
ACTIVATE WINDOWS THE MOMENT THE INSTALLATION
E-Mail : [email protected]

FINISHES, CLICK NEXT.


Prepared by: Abenezer A.

86
Previ IF YOU End
Next DO NOT HAVE THE PRODUCT ID AVAILABLE RIGHT NOW, YOU

CAN LEAVE THE BOX EMPTY, AND CLICK NEXT. YOU WILL NEED TO
PROVIDE THE PRODUCT ID LATER, AFTER THE SERVER INSTALLATION
IS OVER. PRESS NO.
E-Mail : [email protected]
Prepared by: Abenezer A.

87
Previ Next End

STEP 7. BECAUSE YOU DID NOT PROVIDE THE CORRECT ID, THE
INSTALLATION PROCESS CANNOT DETERMINE WHAT KIND OF
WINDOWS SERVER 2008 LICENSE YOU OWN, AND THEREFORE YOU
E-Mail : [email protected]

WILL BE PROMPTED TO SELECT YOUR CORRECT VERSION IN THE NEXT


SCREEN, ASSUMING YOU ARE TELLING THE TRUTH AND WILL
PROVIDE THE CORRECT ID TO PROVE YOUR SELECTION LATER ON.
Prepared by: Abenezer A.

88
Previ Next End

STEP 8. IF YOU DID PROVIDE THE RIGHT PRODUCT ID,


SELECT THE FULL VERSION OF THE RIGHT WINDOWS
E-Mail : [email protected]

VERSION YOU'RE PROMPTED, AND CLICK NEXT.


Prepared by: Abenezer A.

89
Previ Next End

STEP 9. READ AND ACCEPT THE LICENSE TERMS BY


CLICKING TO SELECT THE CHECKBOX AND
PRESSING NEXT
E-Mail : [email protected]
Prepared by: Abenezer A.

90
Previ Next End

STEP 10. IN THE "WHICH TYPE OF INSTALLATION DO


YOU WANT?" WINDOW, CLICK THE ONLY AVAILABLE
OPTION – CUSTOM (ADVANCED).
E-Mail : [email protected]
Prepared by: Abenezer A.

91
Previ Next End

STEP 11. IN THE "WHERE DO YOU WANT TO INSTALL


WINDOWS?", IF YOU'RE INSTALLING THE SERVER ON A
REGULAR IDE HARD DISK, CLICK TO SELECT THE
FIRST DISK, USUALLY DISK 0, AND CLICK NEXT.
E-Mail : [email protected]
Prepared by: Abenezer A.

92
Previ Next End
STEP 12.THE INSTALLATION NOW BEGINS, AND YOU
CAN GO AND HAVE LUNCH. COPYING THE SETUP
FILES FROM THE DVD TO THE HARD DRIVE ONLY
TAKES ABOUT ONE MINUTE. HOWEVER,
E-Mail : [email protected]

EXTRACTING AND UNCOMPRESSING THE FILES


TAKES A GOOD DEAL LONGER. AFTER 20 MINUTES,
THE OPERATING SYSTEM IS INSTALLED. THE EXACT
TIME IT TAKES TO INSTALL SERVER CORE DEPENDS
UPON YOUR HARDWARE SPECIFICATIONS. FASTER
DISKS WILL PERFORM MUCH FASTER INSTALLS…
WINDOWS SERVER 2008 TAKES UP APPROXIMATELY
10 GB OF HARD DRIVE SPACE.
Prepared by: Abenezer A.

93
Previ Next End

STEP 13. THEN THE SERVER REBOOTS


YOU'LL BE PROMPTED WITH THE NEW
WINDOWS SERVER 2008 TYPE OF LOGIN
E-Mail : [email protected]

SCREEN. PRESS CTRL+ALT+DEL TO LOG IN.


Prepared by: Abenezer A.

94
Previ Next End

STEP14. CLICK ON OTHER USER


STEP 15. THE DEFAULT ADMINISTRATOR IS BLANK, SO
E-Mail : [email protected]

JUST TYPE ADMINISTRATOR AND PRESS ENTER.


Prepared by: Abenezer A.

95
Previ Next End

INSTALLING ADDITIONAL TOOLS OR


THIRD-PARTY SOFTWARE
E-Mail : [email protected]

 Additional tools or third party software is very necessary after


we install server 2008 software and on the client computer.
 So one of third party software is driver. Installing device
drivers is necessary in many instances.
Prepared by: Abenezer A.

96
Previ Next End

CONSIDER THE FOLLOWING


METHODS TO INSTALLING DEVICE
E-Mail : [email protected]

DRIVERS, MOST COMMONLY FOUND.

1. CD And Discs

2. Downloading
Prepared by: Abenezer A.

97
Previ Next End

DEVICE DRIVERS
 A device driver is a set of instructions. The driver tells your
E-Mail : [email protected]

computer what to do with the hardware you are installing in it.


For example, you may have a new printer. Your computer does not
have information installed in it to handle all types of printers, since
every printer is slightly different.

 Therefore, it needs something to tell it what to do.


Prepared by: Abenezer A.

 Device drivers are created by the manufacturers of the


hardware (in this case the printer manufacturer) and provide
very specific instructions on how to use the device.
98
Previ Next End

INSTALLING THIRD-PARTY SOFTWARE


 Installing driver pack solution or SDI
E-Mail : [email protected]

Step 1- Download Driver Pack Solution Download and run it easily, and it
will check your computer configurations
Prepared by: Abenezer A.

99
Previ Next End

STEP 2- AFTER CHECKING YOUR COMPUTER


CONFIGURATIONS, THE APPLICATION WILL LOOK
LIKE BELOW
E-Mail : [email protected]

You can chose to do automatic


setup or you can click on the
expert mode on the below bar
to customize your driver and
programs installations, and
that’s what i recommend
Prepared by: Abenezer A.

100
Previ Next End

STEP 3- EXPLORING THE EXPERT


MODE
E-Mail : [email protected]

You can chose what to


install from the driver
and what not, same for
the software package, as
for “Security Tab” it will
guide you about the
unnecessary application
if you have and you need
to remove it
Prepared by: Abenezer A.

101
Previ Next End

STEP 4- CHOOSING WHAT SOFTWARE TO INSTALL ON


THIS STEP YOU WILL SELECT WHICH SOFTWARE DO
YOU NEED FOR YOUR COMPUTER
E-Mail : [email protected]
Prepared by: Abenezer A.

102
Previ Next End

STEP 5- THE MOST IMPORTANT STEP AND IT’S


DRIVERS INSTALLATION SELECT THE REQUIRED
DRIVERS THAT YOU NEED TO INSTALL AND ALSO
YOU WILL NOTICE THAT DRIVERPACK CAN
E-Mail : [email protected]

UPDATE YOUR CURRENT DRIVERS


Prepared by: Abenezer A.

103
Previ Next End
E-Mail : [email protected]

 After made your selections with each tab (Drivers, Software,


Security,..Etc) click Install everything, and the driver pack
will download your required drivers and software to install
Prepared by: Abenezer A.

104
Previ Next End

PATCHING OPERATING SYSTEM AND


APPLICATIONS
E-Mail : [email protected]

 Patching operating systems is a strategy used by IT


professionals and businesses to ensure all known or potential
system vulnerabilities are fixed (or patched) thereby reducing
the likelihood of malware entering the system via glitches.
 A patch updates one component of the software, perhaps to fix a
bug or error discovered after product release. ... Security
Prepared by: Abenezer A.

patches address vulnerabilities in the software cybercriminals


might use to gain unauthorized access to your device and your
data
105
Previ Next End

PATCHING DOESN’T REMOVE


VIRUS!
E-Mail : [email protected]

 It's pretty much useless.


 New threats that have been discovered since its last update
cannot be picked up, as it'll not show any no record of it being
a vulnerability.
 Patching your anti-virus means that it can pick up everything
Prepared by: Abenezer A.

that it should do.

106
Previ Next End

CONT….

Patch management system


E-Mail : [email protected]

 Patch management is the process of distributing and applying


updates to software.

Patching
 A patch is a set of changes to a computer program or its
supporting data designed to update, fix, or improve it.
Prepared by: Abenezer A.

 This includes fixing security vulnerabilities and other bugs,


with such patches usually being called bug fixes or bug fixes.

107
Previ Next End

PRACTICAL SESSION
E-Mail : [email protected]

 Task1: installing server 2008 operating system

1. Install Windows Server 2008 Operating System on the


Server Computer
 Task2: installing deriver pack solution
 Task3: installing operating system patch
Prepared by: Abenezer A.

 Task4: installing application software patch

108
Previ Next End

LO3: CONFIGURE AND TEST SERVER


E-Mail : [email protected]

Objective: At the end of this the student should be able to


know the following contents
 Configure server as required by technical requirements.
 Define scope and applicability of the testing against
technical requirements.
Prepared by: Abenezer A.

 Develop Test plan with reference to resources and


network impact.

109
Previ Next End

DIRECTORY SERVICE
E-Mail : [email protected]

What is Directory Service?


 A Directory Service is a software application that stores and
organizes information about the network users and resources.
 The Directory Service allows the network administrators to
manage the user’s access to the resources.
Prepared by: Abenezer A.

 The Directory acts as a central point of control and


management of the network operating system.

110
Previ Next End

CONT…

Main advantages of Directory Services are


E-Mail : [email protected]

 Directory Services help in Simplifying management: By acting as a single

point of management, a directory can ease the administrative tasks

associated with complex networks.

 Directory Services provide higher level of security. Directories offer a

single logon facility and they provide more secure authentication process.
Prepared by: Abenezer A.

 Directory Services allow interoperability: Most of Directory Services

available today are based upon industry standards This allows sharing of

resources in a heterogeneous environment.

111
Previ Next End

CONT…
 Directory Services software application store data in its own
E-Mail : [email protected]

database. Following are the important data which are kept


in Directory Services database.
 User Account Information (Login name, Password, Restrictions).
 User Personal Information (Phone number, Address, Employee ID).
 Peripheral Configuration Information (Printers, Modem, Fax).
Prepared by: Abenezer A.

 Application Configuration (Desktop Preference, Default Directories).


 Security Information.
 Network Structure.
 Network Infrastructure Configuration. 112
Previ Next End

CONFIGURING ACTIVE DIRECTORY AND


DNS
E-Mail : [email protected]

What is Active Directory?


 Active Directory is the directory service for the Microsoft
Windows 2003 network operating system.
 Active Directory consists of both a database and a service.
 Active Directory is a database of information about
Prepared by: Abenezer A.

resources on the network, such as computers, users, shared


folders, and printers.
 It is also a service that makes this information available to
users and applications. 113
Previ Next End

CONT….

 Active Directory® is the Microsoft's implementation of


E-Mail : [email protected]

Directory Services its purpose is to store information about


users, resources, and other network components, and to provide
that information according to access permissions of the entity
who is requesting it.

 Active Directory (AD) is meant for use in Microsoft Windows


Prepared by: Abenezer A.

network environments and it provides central authentication and


authorization services for Windows-based computers.

114
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

CONT….
End

115
Previ Next End

CONT…

 Before we configure Active Directory, let's start with the


E-Mail : [email protected]

following core components of the Active Directory


service in details.
 Domains

 Forests

 Domain Controllers
Prepared by: Abenezer A.

 Organizational units
 Tree

 Trust
116
Previ Next End

DOMAIN
E-Mail : [email protected]

 A Domain is a logical grouping of users, computers, and

resources that makes up a security and administrative boundary.

 It is not a physical entity and doesn’t identify the actual network

topology or physical location of the network, but it provides a


Prepared by: Abenezer A.

way to secure and organize objects.

 For example, Microsoft.com and Amazon.com are domains

117
Previ Next End

FOREST
E-Mail : [email protected]

 Defines a collection of one or more domains that share a common schema,

configuration, and global catalog.

 Is a collection of trees that do not share a contiguous DNS naming

structure.
Prepared by: Abenezer A.

118
Previ Next End

SCHEMA & CONFIGURATION


E-Mail : [email protected]

Schema
 Is the configuration information that governs the
structure and content of the directory

Configuration
 Configuration defines the logical structure of a forest,
Prepared by: Abenezer A.

such as the number and configuration of sites in the


forest.

119
Previ Next End

GLOBAL CATALOG
 It contains information about all objects in the forest and, in particular, where
E-Mail : [email protected]

to find them. Global catalogs also contain membership information for

universal groups.
Prepared by: Abenezer A.

120
Previ Next End

DOMAIN CONTROLLER
E-Mail : [email protected]

 A domain controller manages information in the Active


Directory database and enables users to log on to the domain, be
authenticated for accessing resources in the domain, and search
the directory for information about users and network resources.
 Domain controllers act as the central security component of a
domain.
Prepared by: Abenezer A.

 All security and account validation is performed by a domain


controller.
 Every domain must have at least one domain controller.
121
Previ Next End

ORGANIZATIONAL UNIT

 Organizational Unit (OU) is a special container of Active Directory,


E-Mail : [email protected]

which is used to organize Active Director objects within a domain


into administrative groups or simply an organizational unit (OU) is
a logical group of Active Directory objects. An OU can contain
objects like user accounts, groups, computers, printers, file shares,
and other OUs from the same domain.
Prepared by: Abenezer A.

122
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

CONT….
End

123
Previ Next End

TREE
 An Active Directory tree is a collection of Active Directory
E-Mail : [email protected]

domains that begins at a single root and branches out into


peripheral, child domains. Domains in an Active Directory
tree share the same namespace.
Prepared by: Abenezer A.

124
Previ Next End

TRUST
 Active Directory Trust relationship is a logical link which
E-Mail : [email protected]

allows a domain to access another domain, or a forest to


access another forest. Trusts which are created
automatically are called as implicit Trusts and the trusts
which are created manually are called as Explicit Trusts.
Prepared by: Abenezer A.

125
Previ Next End

CONT…
 The following are the characteristics of Windows 2003
E-Mail : [email protected]

Trusts.
 Active Directory Trusts can be created manually (explicitly) or
automatically (implicitly).
 Active Directory Trusts can be either transitive or non transitive. A
transitive trust extends the trust relationships with other domains
and a no transitive does not allow the trust to flow to any other
Prepared by: Abenezer A.

domains in the forest.


 Active Directory Trusts can be one-way or two-way.

126
Previ Next End

TYPES OF TRUST
E-Mail : [email protected]

1. Parent-child Trust:

2. Tree-root Trust:

3. Shortcut Trust:

External Trust:
Prepared by: Abenezer A.

4.

5. Realm Trust:

6. Forest Trust: 127


Previ Next End

CONT….

 Parent-child Trust: Parent-child Trust is an completely


E-Mail : [email protected]

established, two-way, transitive trust when you add a new


child domain to a tree.
 Tree-root Trust: Tree-root Trust is an completely
established, two-way, transitive trust when you add a new
tree root domain to a forest.
Prepared by: Abenezer A.

128
Previ Next End

CONT…

 Shortcut Trust: Shortcut Trust is an clearly created, transitive


E-Mail : [email protected]

trust between two domains in a forest to improve user logon


times. Shortcut Trust will make a trust path shorter between two
domains in the same forest. The Shortcut Trust can be one-way
or two-way.
 External Trust: External Trust is explicitly created, non-transitive
Prepared by: Abenezer A.

trust between Windows Server 2003 domains that are in different


forests or between a Windows Server 2003 domain and
Windows NT 4 domain. The External Trust can be one-way or
two-way. 129
Previ Next End

CONT….
 Realm Trust: Realm Trust is explicitly created transitive or
E-Mail : [email protected]

non-transitive trust between a non Windows Kerberos realm


and a Windows Server 2003 domain. This trust helps to create
trust relationship between Windows Server 2003 domain and
any Kerberos version 5 realm. The Realm Trust can be and
one-way or two-way.
Prepared by: Abenezer A.

 Forest Trust: Forest Trust is explicitly transitive (between two


forests) created trust between two forest root domains. The
Forest Trust can be one-way or two-way.
130
Previ Next End

PRE REQUEST TO INSTALL ACTIVE


DIRECTORY
E-Mail : [email protected]

 Install Network Driver


 Give IP address to server computer
 Check file NTFS or Not…
 Give password to server computer
 Established Network Between server computer and client
Prepared by: Abenezer A.

computer or connect network cable b/n client and server


computer
 Insert windows server 2003 sp2 or sp3 CD/DVD
131
Previ Next End

OPERATION SHEET
E-Mail : [email protected]

Install Active Directory (Operation Sheet)


 To install Active Directory on Windows Server 2003
 Click Start, click Run, type dcpromo, and then click OK.
Prepared by: Abenezer A.

132
Previ Next End

CONT…
1. On the first page of the Active Directory Installation Wizard, click Next.
E-Mail : [email protected]
Prepared by: Abenezer A.

133
Previ Next End

CONT…
 On the next page of the Active Directory Installation Wizard, click Next
E-Mail : [email protected]
Prepared by: Abenezer A.

134
CONT…
 On the Domain Controller Type page, click Domain Controller for a new
domain, and then click Next

135
CONT…

 On the Create New Domain page, click Domain in a new forest, and then
click Next

136
CONT…

 On the New Domain Name page, in the Full DNS name for new domain box, type
corp.contoso.com, and then click Next

137
CONT…

Accept the domain NETBIOS name.


(NetBIOS names provides for down-level compatibility.)

138
CONT…
Note:
If your AD has been planned and the growth factor has been taken into account I
would recommend to plan these locations right from the beginning. Logs and
database should be on a different partition. This will improve performance

139
CONT…
Type a password (record this password part of your secure server documentation)
click next.
Note: This password does not need to be the same as your domain administrator
password. To read more regarding this topic click on the "AD help link" on the same
window

140
CONT…

141
Previ Next End

MANAGING USERS AND GROUPS


E-Mail : [email protected]

 You have to create user accounts on each server when someone joins
your organization and remove those accounts when someone leaves.
 Users have to provide a user name and password each time someone
accesses resources on a different server. When it’s time to change
users’ passwords, users must do so on each server
Prepared by: Abenezer A.

142
Previ Next End

INTRODUCTION TO THE USER


ACCOUNT
E-Mail : [email protected]

 A user Account provides a user with the ability to log on to


the domain to gain access to network resources or to log on
to a computer to gain access to resource on that computer
Prepared by: Abenezer A.

143
Previ Next End
CONT…

Types of User Account


E-Mail : [email protected]

1. Local user accounts


2. Domain user accounts
3. Built-in user account
Prepared by: Abenezer A.

144
Previ Next End

1. LOCAL USER ACCOUNTS


 Is an account that allows users to log on at and gain access to
E-Mail : [email protected]

resource on only the computer where you create the local user
account

 Do not create local user account on computer that require


access to Domain resources, because the domain does not
recognize local user account properties or assign access
Prepared by: Abenezer A.

permissions for domain resources unless he or she connects to


the local computer using the Action menu on the computer
management console 145
Previ Next End

USE OF LOCAL USER ACCOUNTS


E-Mail : [email protected]

 Provide access to resources on the local computer

 Are created in the local security database

Similarly certain built in local groups are:


Administrators,
Users, Guests, and
Backup operators.
Prepared by: Abenezer A.

146
Previ Next End

2. DOMAIN USER ACCOUNTS


E-Mail : [email protected]

 Domain user accounts allow users to log on to the domain and gain

access to resources anywhere on the network. The user provides

his or her user name and password during the logon process.

 You create a domain user account in a container or an


Prepared by: Abenezer A.

organizational unit(OU)in the copy of the active Directory

Database(called the Directory) on a domain controller

147
Previ Next End

USE OF DOMAIN USER ACCOUNTS


E-Mail : [email protected]

 Provide access to network resources

 Provide the access token for authentication

 Are created in Active Directory on a domain controller


The example of certain built in domain groups are:
Account Operators,
Administrators,
Prepared by: Abenezer A.

Backup Operators,
Network Configuration Operators,
Performance Monitor Users, and
Users.
148
Previ Next End

3. BUILT-IN USER ACCOUNTS


E-Mail : [email protected]

 Is an account which is created automatically creates


accounts called built-in accounts.
 Two commonly used built-in accounts are Administrator
and Guest
Prepared by: Abenezer A.

149
Previ Next End

USER PROFILES
E-Mail : [email protected]

 The system creates a user profile the first time that a user
logs on to a computer.
 At following logons, the system loads the user's profile, and
then other system components configure the user's
environment according to the information in the profile.
Prepared by: Abenezer A.

150
Previ Next End

TYPES OF USER PROFILES


E-Mail : [email protected]

1. Local User Profiles

2. Roaming User Profiles

3. Mandatory User Profiles

4. Temporary User Profiles


Prepared by: Abenezer A.

151
Previ Next End

1. LOCAL USER PROFILES


E-Mail : [email protected]

 A local user profile is created the first time that a user logs
on to a computer.
 The profile is stored on the computer's local hard disk.
 Changes made to the local user profile are specific to the
user and to the computer on which the changes are made.
Prepared by: Abenezer A.

152
Previ Next End

2. ROAMING USER PROFILES


E-Mail : [email protected]

 A roaming user profile is a copy of the local profile that is


copied to, and stored on, a server share.
 This profile is downloaded to any computer that a user logs
onto on a network. Changes made to a roaming user profile
are synchronized with the server copy of the profile when the
user logs off.
Prepared by: Abenezer A.

 The advantage of roaming user profiles is that users do not


need to create a profile on each computer they use on a
network.
153
Previ Next End

3. MANDATORY USER PROFILES


E-Mail : [email protected]

 A mandatory user profile is a type of profile that


administrators can use to specify settings for users.
 Only system administrators can make changes to mandatory
user profiles. Changes made by users to desktop settings are
lost when the user logs off.
Prepared by: Abenezer A.

154
Previ Next End

4. TEMPORARY USER PROFILES


E-Mail : [email protected]

 A temporary profile is issued each time that an error


condition prevents the user's profile from loading.
Temporary profiles are deleted at the end of each session,
and changes made by the user to desktop settings and files
are lost when the user logs off. Temporary profiles are only
available on computers running Windows 2000 and later.
Prepared by: Abenezer A.

155
Previ Next End

DYNAMIC HOST CONFIGURATION OF


PROTOCOL (DHCP)
E-Mail : [email protected]

 DHCP needs to be assign IP dynamically for

client by server computer.

Advantage
Prepared by: Abenezer A.

 To be absence repeated of Address or host

number as well as need to ordered users


156
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

IN
S TAL L DHC P
End

157
Previ Next End

HOW TO TEST DHCP


E-Mail : [email protected]

 To test this, Windows Server 2008 DHCP server. To be


safe, I have no other devices on this network segment.
 I did an IPCONFIG /RELEASE then an IPCONFIG
/RENEW and verified that I received an IP address from
the new DHCP server, as you can see below:
Prepared by: Abenezer A.

158
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

CONT….
End

159
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

CONT…
End

160
Previ Next End

FILE TRANSFER PROTOCOL (FTP)


 Is a standard network protocol used to transfer computer files from one
E-Mail : [email protected]

host to another host over a TCP-based network, such as the Internet.


 Is a protocol for exchanging files over the Internet. FTP uses the Internet's
TCP/IP protocols to enable data transfer.
 A member of the TCP/IP suite of protocols, used to copy files between
two computers on the Internet. Both computers must support their
respective FTP roles: one must be an FTP client and the other an FTP
Prepared by: Abenezer A.

server.
 FTP is most commonly used to download a file from a server using the
Internet or to upload a file to a server.
 It use 21 port number throughout internet. 161
Previ Next End

WEB SERVER(IIS)
 Is a member server which helps as to manage and control the file which
E-Mail : [email protected]

is created by HTML, XHTML ASP language with the given specific port

number 80 with the given protocol (HTTP/HTTPS).

 Web servers a computer that is maintained by a system administrator or

internet service provider (ISP) and that responds to requests from a user's

browser.

Provide information to user on the internet


Prepared by: Abenezer A.

 Distribute application to user over the internet instead of through physical

media, such as CD, flash disk, floppy disk and other external memory.

162
Previ Next End
DIFFERENCE BETWEEN
FTP&WEB
WEB Server FTP Server

 Web server is just a server  FTP stands for File Transfer


that hosts web pages. Protocol. This creates a
connection between computers
 Uses HTTP (Hypertext to allow uploading and
Transfer Protocol ) downloading of files.
HTTPS(secured) which is a  Use TCP /IP protocol which help
set of rules used to control to send and receive simple files.
how multimedia, code and  Once connected you can browse
text based files are give up through the files in your FTP
via web browsers served client and basically drag and
from a local or remote web drop them to your side.
servers.  Use 21 port number.
 Used 80 port number.
163
Previ Next End

CONT..
 HTTP is a protocol used by the  While the FTP protocol is
World Wide Web that allows
used to transfer files from a
the transfer of files from a web
server to a user’s web browser computer to and from an
for viewing web pages on the FTP server. FTP facilitates
Internet.
the transfer of files from
 HTTP transfers only web page
content to the browser so as to one computer to another.
view it. The transferred file is  FTP, on the other hand,
not saved in the memory space.
transfers the whole file to
HTTP does not require a
password and user name to the another computer, and
access the server to transfer the file is saved in memory.
files. 164
Previ Next End

CONT..
 HTTP is faster and more efficient  Whereas the FTP protocol
for transferring smaller files.
requires authentication.
HTTP is able to use a single
connection to transfer multiple  While FTP is faster and more
files, efficient in transferring larger
 HTTP only transfers the contents files.
of a web page into a browser for
viewing.
 While FTP requires a new
 HTTP is a one-way system as connection to be created with
files are transported only from the each file transfer.
server onto the workstation’s
 FTP is a two-way system as
browser. The files are transferred
but not downloaded, therefore not files are transferred back and
copied into the memory of the forth between server and
receiving device. workstation 165
Previ Next End

DOMAIN NAME SYSTEM (DNS)


 Domain Name System (DNS) is a naming system based on
E-Mail : [email protected]

a distributed database used in Transmission Control


Protocol/Internet Protocol (TCP/IP) networks to translate
computer names to Internet Protocol (IP) addresses.
 DNS is most commonly associated with the Internet.
However, private networks use DNS extensively to resolve
Prepared by: Abenezer A.

computer names and to locate computers within their local


networks and the Internet.

Maryhelpcollege.com TO 192.168.11.1
166
Previ Next End

DNS PROVIDES THE FOLLOWING BENEFITS:


 DNS names are user-friendly, which means that they are
E-Mail : [email protected]

easier to remember than IP addresses.


 DNS names remain more constant than IP addresses. An IP
address for a server can change, but the server name
remains the same.
 DNS allows users to connect to local servers using the
Prepared by: Abenezer A.

same naming convention as the Internet.


 Generally DNS is used for translating host names to IP
addresses and the reverse.
167
Previ Next End

PRINT SERVER
 It is a server that use to centralize printing job. It helps
E-Mail : [email protected]

network administrator control who can and to specify it


availability time in that network which save printer resource
and cost.
 Print servers can be used to save costs by utilizing one
printing device for multiple workstations as opposed to
individual printers.
Prepared by: Abenezer A.

168
Previ Next End

CONT…
 A print server, or printer server, is a device that
E-Mail : [email protected]

connects printers to server computers over a network. It


accepts print jobs from all client computers and sends the jobs
to the appropriate printers.
 A print server may be a networked computer with one or more
shared printers. Alternatively a print server may be a
Prepared by: Abenezer A.

dedicated device on the network, with connections to the


LAN and one or more printers.

169
Previ Next End

Advantage and Disadvantage of shared printer

Advantage of shared Pinter


E-Mail : [email protected]

1. Save time: users can not move from place to place to find
printer and to printer their document.
2. Save cost: save cost that incurred to buy printer for each
user of the company which need to have printer.
3. Allow administrator to control the printer and simple to
upgrade the networked printer.

Disadvantage of shared printer


Prepared by: Abenezer A.

 Some times it is disadvantageous because proprietary


commands are not usable Restricts user fr.om using printer
personally.
 May have data traffic.

170
Previ Next End

BACK UP SERVER
It is a server option which helps us to take a backup of the
E-Mail : [email protected]

whole computer information or a single drive. File server also


used to take backup but it takes only shared folders file.
We can take a backup of our data in to two ways
 Whole computer information backup
 Single drive backup
Prepared by: Abenezer A.

We do not need to install the backup server, we use through


accessory of server computer or client computer.

171
Previ Next End

CONT….
 Is a feature helps us to make a backup or a copy of
E-Mail : [email protected]

the original document for the safety of the original


data.
 Helps us to protect our operating system, volume,
files, and application data and data can be saved
Prepared by: Abenezer A.

to single or multiple disks, DVD, removable media,


or remote shared folders. They can be schedule to
run automatically or manually.
172
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
End
Previ Next End

INSTALL DNS ON WINDOWS SERVER 2003


Before installing and configuring DNS on our server we have to perform some
E-Mail : [email protected]

preliminary tasks. Specifically, we have to configure the server with a static IP

address and a DNS suffix. The suffix will be used to fully-qualify the server name. To

begin:

 When the Internet Protocol (TCP/IP) window

comes up, enter an IP address , subnet mask

and default gateway IP addresses that are all

compatible with your LAN.


Prepared by: Abenezer A.

 Our LAN is on a 192.168.1.0/24 network, so

our settings are as follows:

174
Previ Next End

CONT…
 3. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This tells the server
to use its own DNS server service for name resolution, rather than using a separate server.
E-Mail : [email protected]

After filling out those fields , click the Advanced button.

 4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter
firewall.test on the DNS suffix for this connection text field, check Register this
connection's address in DNS , check Use this connection's DNS suffix in DNS registration
, and click OK , OK , and then Close
Prepared by: Abenezer A.

175
Previ Next End
CONT..

 Now that we have configured our server with a static IP address and a
E-Mail : [email protected]

DNS suffix, we are ready to install DNS. To do this:

1. Go to Start > Control Panel > Add or Remove Programs .

2. When the Add or Remove Program window launches, click


Add/Remove Windows Components on the left pane.

3. When the Windows Components Wizard comes up, scroll down and
highlight Networking Services and then click the Details button.
Prepared by: Abenezer A.

4. When the Networking Services window comes up, place a check mark
next to Domain Name System (DNS) and click OK and OK again.

176
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
End

177
Previ Next End

CONT…
 Note that, during the install, Windows may generate an error
E-Mail : [email protected]

maintaining that it could not find a file needed for DNS


installation. If this happens, insert your Windows Server
2003 CD into the server's CD-ROM drive and browse to the
i386 directory. The wizard should automatically find the file
and allow you to select it. After that, the wizard should
resume the install.
Prepared by: Abenezer A.

178
Previ Next End

CONT…
 After this, DNS should be successfully installed. To launch the DNS
E-Mail : [email protected]

MMC, go to Start > Administrative Tools > DNS


Prepared by: Abenezer A.

179
Previ Next End

CONT…

 On the left pane of the DNS MMC, there is a server node


E-Mail : [email protected]

with three nodes below it, titled Forward Lookup Zones,


Reverse Lookup Zones and Event Viewer.
 The Forward Lookup Zones node stores zones that are used
to map host names to IP addresses, whereas the Reverse
Lookup Zones node stores zones that are used to map IP
Prepared by: Abenezer A.

addresses to host names.

180
Previ Next End

SETTING UP A CACHE-ONLY DNS SERVER


 A cache-only DNS server contains no zones or resource
E-Mail : [email protected]

records. Its only function is to cache answers to queries that


it processes, that way if the server receives the same query
again later, rather than go through the recursion process
again to answer the query, the cache-only DNS server would
just return the cached response, thereby saving time.
Prepared by: Abenezer A.

 With that said, our newly installed DNS server is already a


cache-only DNS server!

181
Previ Next End

CREATING A PRIMARY FORWARD LOOKUP ZONE


 With its limited functionality, a cache-only DNS server is best
E-Mail : [email protected]

suited for a small office environment or a small remote


branch office. However, in a large enterprise where Active
Directory is typically deployed, more features would be
needed from a DNS server, such as the ability to store
records for computers, servers and Active Directory. The
DNS server stores those records in a database, or a zone .
 DNS has a few different types of zones, and each has a
Prepared by: Abenezer A.

different function. We will first create a primary forward


lookup zone titled firewall.test . We do not want to name it
firewall.cx , or any variation that uses a valid top-level
domain name, as this would potentially disrupt the clients'
182
Previ Next End

STEPS TO CREATE FORWARD LOOKUP ZONES


1. On the DNS MMC, right-click the Forward Lookup Zones
E-Mail : [email protected]

node and choose New Zone .


2. When the New Zone Wizard comes up, click Next .
3. On the Zone Type screen, make sure that Primary zone is
selected and click Next .
4. On the Zone Name screen, type firewall.test .
5. On the Zone File screen, click Next .
6. On the Dynamic Update screen, make sure that “ Do not
Prepared by: Abenezer A.

allow dynamic updates ” is selected and click Next .


7. On the next screen, click Finish .
We now have a foundation that we can place resource records in
for name resolution by internal clients. 183
Previ Next End

CREATING A PRIMARY REVERSE LOOKUP ZONE

 Different to the forward lookup zone, a reverse lookup zone


E-Mail : [email protected]

is used by the DNS server to resolve IP addresses to host


names. Not as frequently used as forward lookup zones,
reverse lookup zones are often used by anti-spam systems in
countering spam and by monitoring systems when logging
events or issues. To create a reverse lookup zone:
Prepared by: Abenezer A.

184
Previ Next End
STEPS TO CREATING A PRIMARY REVERSE LOOKUP
ZONE
1. On the DNS MMC, right-click the Reverse Lookup Zones
node and choose New Zone .
E-Mail : [email protected]

2. When the New Zone Wizard comes up, click Next .


3. On the Zone Type screen, make sure that Primary zone is
selected and click Next .
4. On the Reverse Lookup Zone Name screen, enter 192.168.1
and click Next .
5. On the Zone File screen, click Next .
6. On the Dynamic Update screen, make sure that “Do not
Prepared by: Abenezer A.

allow dynamic updates” is selected and click Next .


7. On the next screen, click Finish .

185
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

CONT…
End

186
Previ Next End

Exercise 1: Installing and Configuring the DNS Service


1. Open the Configure Your Server Wizard by selecting Start _
Administrative Tools _ Configure Your Server.
E-Mail : [email protected]

2. Click Next to dismiss the Welcome screen and click Next


again to dismiss the Preliminary Steps screen.
3. Click the DNS Server item in the Server Role list and click
Next to continue.
4. Click Next on the Summary page to complete the DNS
installation.
5. The Configure A DNS Sever Wizard automatically appears.
Click Next to dismiss the Welcome screen.
6. Select the Create Forward And Reverse Lookup Zones radio
Prepared by: Abenezer A.

button and click Next to


continue. If you want to create a caching-only server, you can
select the Configure Root Hints Only option.

187
Previ Next End

8. If not already selected, select the Primary Zone option and the
Store The Zone In Active Directory option. Click Next when you
are ready.
E-Mail : [email protected]

9. Enter sybex.com in the Zone Name field and click Next to


continue.
10. Select the Allow Only Secure Dynamic Updates radio button
and click Next.
11. If not already selected, select No, Don’t Create A Reverse
Lookup Zone Now and click Next to continue.
12. If not already selected, select the No, It Should Not Forward
Queries radio button and click Next to continue
Prepared by: Abenezer A.

13. Click Finish to end the wizard. The Configure Your Server
wizard reappears and in forms you that the DNS service was
successfully installed. Click the Finish button.

188
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next

Cont’d
End

189

You might also like