Configure and Administrate Server
Configure and Administrate Server
DEPARTMENT OF INFORMATION
TECHNOLOGY HNS L-III
UNIT OF COMPETENCE:- CONFIGURE AND
ADMINISTER SERVER
Prepared By Abenezer A.
Prepared By Abenezer A.
Previ Next End
2
Previ Next End
3
Previ Next End
4
Previ Next End
FUNCTIONAL REQUIREMENTS
E-Mail : [email protected]
5
Previ Next End
CLIENTS REQUIREMENTS
ISSUES
E-Mail : [email protected]
6
THIS MAY INCLUDE
IDENTIFYING OR CLARIFYING
REQUIREMENTS ISSUES
The business case Maintenance and backup
What the client considers requirements
the project’s main Bandwidth issues that may
objectives are, including affect the project
the services that are to be Role definition of parties
performed involved
What IT infrastructure is The nature of the data (e.g.
already in place text, multimedia)
Basic specifications Security needs (e.g. levels
Conflicting or overlapping of user access and
requirements privileges)
Costing 7
Previ Next End
FUNCTIONAL REQUIREMENTS
SPECIFICATION
E-Mail : [email protected]
8
Previ Next End
USER REQUIREMENTS
E-Mail : [email protected]
9
Previ Next End
TECHNICAL REQUIREMENTS
What types of computers/operating systems will the users operate?
E-Mail : [email protected]
10
Previ Next End
HARDWARE
Compatibility: will the solution work with existing systems?
E-Mail : [email protected]
12
Previ Next End
STAGE SIGN-OFF
E-Mail : [email protected]
This then would trigger the start of the next stage of the
project the development stage.
13
THE EXIT CRITERIA WILL NORMALLY
STATE THAT THE FOLLOWING ITEMS
HAVE BEEN IDENTIFIED AND AGREED TO:
Server platforms Privacy issues
Operating systems Initial timelines
Applications Budget
Hardware and software State and federal
limitations regulations.
Client and developer
responsibilities
14
IDENTIFY SPECIFICATIONS
Once requirements have been defined and client needs are
clarified, it’s time to start thinking about identifying products
that fit the solution.
In this case, we need to focus on the possible server
solutions. Remember: a server consists of
Hardware
Software
Network connections.
15
Previ Next End
CONT…
E-Mail : [email protected]
CONT….
E-Mail : [email protected]
18
Previ Next End
CONT….
E-Mail : [email protected]
Advantage of NOS
Centrally manage network resources, such as programs,
data and devices.
Secure access to a network.
Allow remote users to connect to a network.
Prepared by: Abenezer A.
CONT….
E-Mail : [email protected]
20
Previ Next End
21
Previ Next End
CONT….
Types of Network
E-Mail : [email protected]
22
Previ Next End
CONT….
1. Peer to peer network:-
E-Mail : [email protected]
23
Previ Next End
CONT…
It is easy to configure
It is not expensive to setup
Security problem
24
Previ Next End
CONT….
2. Server based network:-
E-Mail : [email protected]
networks
New technology can be put in without any problem
Server can be accessed remotely also
25
Previ Next End
CONT….
2.2. Disadvantages of client and server network:-
E-Mail : [email protected]
It is expensive to setup
Maintenance of these systems require more staff
All computers are dependent on server. If server crashes then all
computers effected
26
Previ Next End
CONT….
Types of Network Operating System
Macintosh OS X.
E-Mail : [email protected]
1.
27
Previ Next End
CONT….
1. Novell NetWare:
E-Mail : [email protected]
28
Previ Next End
CONT….
2. Microsoft Windows:
E-Mail : [email protected]
29
Previ Next End
CONT….
3. Linux/UNIX:
E-Mail : [email protected]
30
Previ Next End
CONT….
4. Macintosh OS X.
E-Mail : [email protected]
QUIZ (5%)
E-Mail : [email protected]
32
Previ Next End
Platform selection
A server’s platform will mainly depend on the type of
service provided.
33
Previ Next End
Mail Services
Web Services
Remote Access Services
File Storage And Retrieval Services
Network Access
Prepared by: Abenezer A.
Application Services.
Transactional Processing Services
Streaming Media Services
34
Previ Next End
35
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
B
U
H
Next
EQUIPMENT’S
IDENTIFYING NETWORK
End
36
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
EQUIPMENT’S
IDENTIFYING NETWORK
End
37
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
MODEM
EQUIPMENT’S
IDENTIFYING NETWORK
End
38
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
E
T
R
R
U
O
Next
EQUIPMENT’S
IDENTIFYING NETWORK
End
39
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
EQUIPMENT’S
IDENTIFYING NETWORK
End
40
End
IDENTIFY SERVER
Previ Next
TECHNOLOGIES
E-Mail : [email protected]
Optical drive.
41
Previ Next End
SYSTEM REQUIREMENTS
E-Mail : [email protected]
42
Previ Next End
WHAT IS SERVER?
Servers is large system with higher processing speed,
E-Mail : [email protected]
43
Previ Next End
SERVER-BASED NETWORK:-
E-Mail : [email protected]
44
Previ Next End
CONT…
How It Works
E-Mail : [email protected]
Successor to FAT/FAT32
Native support for long filenames, file and folder permissions,
support for large files and volumes, reliability, compression,
and encryption
Most significant is the added ability for more granular file
Prepared by: Abenezer A.
access control
47
Previ Next End
ACTIVE DIRECTORY
E-Mail : [email protected]
MICROSOFT MANAGEMENT
CONSOLE (MMC)
E-Mail : [email protected]
49
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
(MMC)
MICROSOFT MANAGEMENT CONSOLE
End
50
Previ Next End
DISK MANAGEMENT
E-Mail : [email protected]
51
Previ Next End
Shadow copies
Disk quotas
Distributed File System (DFS)
Also possible to configure options that allow redundancy,
Prepared by: Abenezer A.
52
WINDOWS NETWORKING
Previ Next End
CONCEPTS
THE WORKGROUP MODEL:
E-Mail : [email protected]
CONT….
Role of Server:
1. Domain Controller is the authentication server or security
E-Mail : [email protected]
HARDWARE OF SERVER
CPU
RAM
HDD
Prepared by: Abenezer A.
RAID Controller
FAN
POWER SUPPLY……
55
Previ Next End
CONT….
E-Mail : [email protected]
1. Blade Server
3. Tower Server
56
Previ Next End
1. BLADE SERVER
E-Mail : [email protected]
Blade server.
A server architecture that houses
multiple server modules ("blades")
in a single chassis. It is widely used
in datacenters to save space and
improve system management.
Prepared by: Abenezer A.
3. TOWER SERVER
E-Mail : [email protected]
CONT…
Choosing a NOS
E-Mail : [email protected]
Performance
Security
Prepared by: Abenezer A.
Scalability
Robustness/fault tolerance
60
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
The End
End
61
Previ Next End
Objectives:
After completing this Learning outcome the student should
be able to:
Review Hardware and software compatibility
Install Required operating system and software
Prepared by: Abenezer A.
62
Previ Next End
Computer compatibility
A family of computer models is said to be compatible if
certain software that runs on one of the models can also
be run on all other models of the family.
The computer models may differ in performance, reliability
Prepared by: Abenezer A.
63
Previ Next End
CONT…
64
Previ Next End
CONT…..
65
Previ Next End
CONT…
66
Previ Next End
CONT….
What is Hardware Compatibility?
E-Mail : [email protected]
67
Previ Next End
CONT…
E-Mail : [email protected]
68
Previ Next End
CONT…
E-Mail : [email protected]
69
Previ Next End
How well you plan these steps will determine how successful your
installation is.
Prepared by: Abenezer A.
70
Previ Next End
CONT…
Verifying Minimum Hardware Requirements
The first step of the installation is verifying that your hardware meets
E-Mail : [email protected]
71
Previ Next End
computers*
72
Previ Next End
CONT….
Selecting the Computer Name
E-Mail : [email protected]
During the server installation, the Setup Wizard will ask for the
Prepared by: Abenezer A.
CONT…
When installing Windows Server 2008, you must install and configure a
network protocol that will allow it to communicate with other machines
on the network. Currently, the most commonly used protocol is called
TCP/IP, which stands for Transmission Control Protocol/Internet
Protocol. This protocol allows computers throughout the Internet to
communicate. After you install the TCP/IP protocol, you need to
Prepared by: Abenezer A.
75
Previ Next End
1. Attended installation
2. Unattended installation
76
Previ Next End
CONT…
CONT…
CONT…
3. Other Installation Options
E-Mail : [email protected]
the network.
Copy files, such as answer files and device drivers, to the same folder.
Map the folder to a drive letter on the machine where the operating
79
system is to be installed.
Previ Next End
CONT…
80
Previ Next End
1. Partitioning
2. File system
3. Licensing
4. Server name
5. Initial password
Prepared by: Abenezer A.
6. Network settings
81
Previ Next End
82
Previ Next End
After Press Any Key from the keyboard this message is appeared
E-Mail : [email protected]
Prepared by: Abenezer A.
83
Previ Next End
84
Previ Next End
85
Previ STEP
Next5. PRODUCT ACTIVATION IS NOW ALSO IDENTICAL WITH
End
THAT FOUND IN WINDOWS VISTA. ENTER YOUR PRODUCT ID IN
THE NEXT WINDOW, AND IF YOU WANT TO AUTOMATICALLY
ACTIVATE WINDOWS THE MOMENT THE INSTALLATION
E-Mail : [email protected]
86
Previ IF YOU End
Next DO NOT HAVE THE PRODUCT ID AVAILABLE RIGHT NOW, YOU
CAN LEAVE THE BOX EMPTY, AND CLICK NEXT. YOU WILL NEED TO
PROVIDE THE PRODUCT ID LATER, AFTER THE SERVER INSTALLATION
IS OVER. PRESS NO.
E-Mail : [email protected]
Prepared by: Abenezer A.
87
Previ Next End
STEP 7. BECAUSE YOU DID NOT PROVIDE THE CORRECT ID, THE
INSTALLATION PROCESS CANNOT DETERMINE WHAT KIND OF
WINDOWS SERVER 2008 LICENSE YOU OWN, AND THEREFORE YOU
E-Mail : [email protected]
88
Previ Next End
89
Previ Next End
90
Previ Next End
91
Previ Next End
92
Previ Next End
STEP 12.THE INSTALLATION NOW BEGINS, AND YOU
CAN GO AND HAVE LUNCH. COPYING THE SETUP
FILES FROM THE DVD TO THE HARD DRIVE ONLY
TAKES ABOUT ONE MINUTE. HOWEVER,
E-Mail : [email protected]
93
Previ Next End
94
Previ Next End
95
Previ Next End
96
Previ Next End
1. CD And Discs
2. Downloading
Prepared by: Abenezer A.
97
Previ Next End
DEVICE DRIVERS
A device driver is a set of instructions. The driver tells your
E-Mail : [email protected]
Step 1- Download Driver Pack Solution Download and run it easily, and it
will check your computer configurations
Prepared by: Abenezer A.
99
Previ Next End
100
Previ Next End
101
Previ Next End
102
Previ Next End
103
Previ Next End
E-Mail : [email protected]
104
Previ Next End
106
Previ Next End
CONT….
Patching
A patch is a set of changes to a computer program or its
supporting data designed to update, fix, or improve it.
Prepared by: Abenezer A.
107
Previ Next End
PRACTICAL SESSION
E-Mail : [email protected]
108
Previ Next End
109
Previ Next End
DIRECTORY SERVICE
E-Mail : [email protected]
110
Previ Next End
CONT…
single logon facility and they provide more secure authentication process.
Prepared by: Abenezer A.
available today are based upon industry standards This allows sharing of
111
Previ Next End
CONT…
Directory Services software application store data in its own
E-Mail : [email protected]
CONT….
114
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
CONT….
End
115
Previ Next End
CONT…
Forests
Domain Controllers
Prepared by: Abenezer A.
Organizational units
Tree
Trust
116
Previ Next End
DOMAIN
E-Mail : [email protected]
117
Previ Next End
FOREST
E-Mail : [email protected]
structure.
Prepared by: Abenezer A.
118
Previ Next End
Schema
Is the configuration information that governs the
structure and content of the directory
Configuration
Configuration defines the logical structure of a forest,
Prepared by: Abenezer A.
119
Previ Next End
GLOBAL CATALOG
It contains information about all objects in the forest and, in particular, where
E-Mail : [email protected]
universal groups.
Prepared by: Abenezer A.
120
Previ Next End
DOMAIN CONTROLLER
E-Mail : [email protected]
ORGANIZATIONAL UNIT
122
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
CONT….
End
123
Previ Next End
TREE
An Active Directory tree is a collection of Active Directory
E-Mail : [email protected]
124
Previ Next End
TRUST
Active Directory Trust relationship is a logical link which
E-Mail : [email protected]
125
Previ Next End
CONT…
The following are the characteristics of Windows 2003
E-Mail : [email protected]
Trusts.
Active Directory Trusts can be created manually (explicitly) or
automatically (implicitly).
Active Directory Trusts can be either transitive or non transitive. A
transitive trust extends the trust relationships with other domains
and a no transitive does not allow the trust to flow to any other
Prepared by: Abenezer A.
126
Previ Next End
TYPES OF TRUST
E-Mail : [email protected]
1. Parent-child Trust:
2. Tree-root Trust:
3. Shortcut Trust:
External Trust:
Prepared by: Abenezer A.
4.
5. Realm Trust:
CONT….
128
Previ Next End
CONT…
CONT….
Realm Trust: Realm Trust is explicitly created transitive or
E-Mail : [email protected]
OPERATION SHEET
E-Mail : [email protected]
132
Previ Next End
CONT…
1. On the first page of the Active Directory Installation Wizard, click Next.
E-Mail : [email protected]
Prepared by: Abenezer A.
133
Previ Next End
CONT…
On the next page of the Active Directory Installation Wizard, click Next
E-Mail : [email protected]
Prepared by: Abenezer A.
134
CONT…
On the Domain Controller Type page, click Domain Controller for a new
domain, and then click Next
135
CONT…
On the Create New Domain page, click Domain in a new forest, and then
click Next
136
CONT…
On the New Domain Name page, in the Full DNS name for new domain box, type
corp.contoso.com, and then click Next
137
CONT…
138
CONT…
Note:
If your AD has been planned and the growth factor has been taken into account I
would recommend to plan these locations right from the beginning. Logs and
database should be on a different partition. This will improve performance
139
CONT…
Type a password (record this password part of your secure server documentation)
click next.
Note: This password does not need to be the same as your domain administrator
password. To read more regarding this topic click on the "AD help link" on the same
window
140
CONT…
141
Previ Next End
You have to create user accounts on each server when someone joins
your organization and remove those accounts when someone leaves.
Users have to provide a user name and password each time someone
accesses resources on a different server. When it’s time to change
users’ passwords, users must do so on each server
Prepared by: Abenezer A.
142
Previ Next End
143
Previ Next End
CONT…
144
Previ Next End
resource on only the computer where you create the local user
account
146
Previ Next End
Domain user accounts allow users to log on to the domain and gain
his or her user name and password during the logon process.
147
Previ Next End
Backup Operators,
Network Configuration Operators,
Performance Monitor Users, and
Users.
148
Previ Next End
149
Previ Next End
USER PROFILES
E-Mail : [email protected]
The system creates a user profile the first time that a user
logs on to a computer.
At following logons, the system loads the user's profile, and
then other system components configure the user's
environment according to the information in the profile.
Prepared by: Abenezer A.
150
Previ Next End
151
Previ Next End
A local user profile is created the first time that a user logs
on to a computer.
The profile is stored on the computer's local hard disk.
Changes made to the local user profile are specific to the
user and to the computer on which the changes are made.
Prepared by: Abenezer A.
152
Previ Next End
154
Previ Next End
155
Previ Next End
Advantage
Prepared by: Abenezer A.
IN
S TAL L DHC P
End
157
Previ Next End
158
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
CONT….
End
159
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
CONT…
End
160
Previ Next End
server.
FTP is most commonly used to download a file from a server using the
Internet or to upload a file to a server.
It use 21 port number throughout internet. 161
Previ Next End
WEB SERVER(IIS)
Is a member server which helps as to manage and control the file which
E-Mail : [email protected]
is created by HTML, XHTML ASP language with the given specific port
internet service provider (ISP) and that responds to requests from a user's
browser.
media, such as CD, flash disk, floppy disk and other external memory.
162
Previ Next End
DIFFERENCE BETWEEN
FTP&WEB
WEB Server FTP Server
CONT..
HTTP is a protocol used by the While the FTP protocol is
World Wide Web that allows
used to transfer files from a
the transfer of files from a web
server to a user’s web browser computer to and from an
for viewing web pages on the FTP server. FTP facilitates
Internet.
the transfer of files from
HTTP transfers only web page
content to the browser so as to one computer to another.
view it. The transferred file is FTP, on the other hand,
not saved in the memory space.
transfers the whole file to
HTTP does not require a
password and user name to the another computer, and
access the server to transfer the file is saved in memory.
files. 164
Previ Next End
CONT..
HTTP is faster and more efficient Whereas the FTP protocol
for transferring smaller files.
requires authentication.
HTTP is able to use a single
connection to transfer multiple While FTP is faster and more
files, efficient in transferring larger
HTTP only transfers the contents files.
of a web page into a browser for
viewing.
While FTP requires a new
HTTP is a one-way system as connection to be created with
files are transported only from the each file transfer.
server onto the workstation’s
FTP is a two-way system as
browser. The files are transferred
but not downloaded, therefore not files are transferred back and
copied into the memory of the forth between server and
receiving device. workstation 165
Previ Next End
Maryhelpcollege.com TO 192.168.11.1
166
Previ Next End
PRINT SERVER
It is a server that use to centralize printing job. It helps
E-Mail : [email protected]
168
Previ Next End
CONT…
A print server, or printer server, is a device that
E-Mail : [email protected]
169
Previ Next End
1. Save time: users can not move from place to place to find
printer and to printer their document.
2. Save cost: save cost that incurred to buy printer for each
user of the company which need to have printer.
3. Allow administrator to control the printer and simple to
upgrade the networked printer.
170
Previ Next End
BACK UP SERVER
It is a server option which helps us to take a backup of the
E-Mail : [email protected]
171
Previ Next End
CONT….
Is a feature helps us to make a backup or a copy of
E-Mail : [email protected]
address and a DNS suffix. The suffix will be used to fully-qualify the server name. To
begin:
174
Previ Next End
CONT…
3. For the Preferred DNS Server , enter the loopback address 127.0.0.1 . This tells the server
to use its own DNS server service for name resolution, rather than using a separate server.
E-Mail : [email protected]
4. When the Advanced TCP/IP Settings window comes up, click the DNS tab, enter
firewall.test on the DNS suffix for this connection text field, check Register this
connection's address in DNS , check Use this connection's DNS suffix in DNS registration
, and click OK , OK , and then Close
Prepared by: Abenezer A.
175
Previ Next End
CONT..
Now that we have configured our server with a static IP address and a
E-Mail : [email protected]
3. When the Windows Components Wizard comes up, scroll down and
highlight Networking Services and then click the Details button.
Prepared by: Abenezer A.
4. When the Networking Services window comes up, place a check mark
next to Domain Name System (DNS) and click OK and OK again.
176
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
End
177
Previ Next End
CONT…
Note that, during the install, Windows may generate an error
E-Mail : [email protected]
178
Previ Next End
CONT…
After this, DNS should be successfully installed. To launch the DNS
E-Mail : [email protected]
179
Previ Next End
CONT…
180
Previ Next End
181
Previ Next End
184
Previ Next End
STEPS TO CREATING A PRIMARY REVERSE LOOKUP
ZONE
1. On the DNS MMC, right-click the Reverse Lookup Zones
node and choose New Zone .
E-Mail : [email protected]
185
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
CONT…
End
186
Previ Next End
187
Previ Next End
8. If not already selected, select the Primary Zone option and the
Store The Zone In Active Directory option. Click Next when you
are ready.
E-Mail : [email protected]
13. Click Finish to end the wizard. The Configure Your Server
wizard reappears and in forms you that the DNS service was
successfully installed. Click the Finish button.
188
Prepared by: Abenezer A. E-Mail : [email protected]
Previ
Next
Cont’d
End
189