Académique Documents
Professionnel Documents
Culture Documents
Network Network is data communication mechanism. Computer Network Computer network is the process of connecting two or more than two computers to share the data and resources. The resources can be any peripheral devices such as CD-ROM, Pen drive, Hard disk drive, Printer etc. and the data can be the folders and the files available in the share folder because a file is shared only when that file is available in the shared folder. Classification of Network Network can be classified as: (a) On the basis of Media: - On the basis of media there are two kinds of network. (i) Wired (Guided) Media: - On the guided media, we can establish the network physically with the help of coaxial cable twisted pair cable, NIC, RJ 45, RJ 11, Fiber Optic cable etc. (ii) Unwired (Unguided) Media: - This type of network is created with the help of WAP (Wireless Access Protocol). The wireless media uses USB, NIC, Infrared, Radio wave, Bluetooth, Link Sys, and Router etc. (b) On the basis of Scope: - On the basis of scope there are three kinds of network. This is also called the network on geographical base. They are as follows: (i) LAN (Local Area Network): - When the network is established in a single room, single floor, or in a single building within 500 meters of long distance then it is called LAN. In this network, we can connect maximum of 254 computers. A LAN can be both the wired and unwired. (ii) MAN (Metropolitan Area Network): - When two or more than two LAN(s) are connected with the help of Repeater, Router etc. then it is known as MAN. (iii) WAN (Wide Area Network): - When the network expands country wise, within continent or world wise then it is called WAN. To establish the network of WAN, we use VSAT (Very Small Aperture Terminal) or Satellite. (c) On the basis of Function/Model: - On the basis of function there are two kinds of network: (i) Peer to Peer Network: - In this network, we use the client Operating system. We can also use the server operating system. But the services of server cannot be taken from it. In this network, all the computers are administrated or managed individually. We assume a computer as a server. This type of network is useful for small organization. It has no server so has no security. (ii) Client Server Network: - In this network, the main computer which provides or blocks the services uses server operating system also called domain controller. And other computers are known as client computers which uses client operating system. These computers are administrated and managed by the domain controller. Here, all the client user accounts are created in the domain controller. The client computers are also called domain members. The client server starts different kinds of facilities such as Active directory, FTP (File Transfer Protocol), DNS, IIS, DHCP, etc. Topology Topology is the physical layout of computer which describes that how computers are connected, arranged, managed, and flow of the data from one host to another host. There are different kinds of topology: 1. Bus Topology: - In Bus topology, we can connect maximum 30 computers with 100 meters of coaxial cable. We use terminator cap at the end of the both side of the coaxial cable to block the flow of information. In this topology, we use BNC connector, T connector, LAN card, Terminator cable to connect the computers on the network. If the main cable will fail, it will affect the entire network.
amrit_razz@live.com
Page 1
3.
Star Topology: - In Star topology, all the computers are connected with the help of switch or hub for the local LAN and we use repeater, router to connect the different LANs of Star topology. In this topology, if one computer will fails it will not affect another computer on the network. But if central connectivity device fails, it will affect the entire network. It uses more cable. We use twisted pair cable, NIC, RJ-45, switch/Hub to connect the computers on the network.
4.
Hybrid Topology: - With the hybrid topology, two or more topologies are combined to form a complete network. For example, a hybrid topology could be the combination of a star and bus topology. These are also the most common in use.
amrit_razz@live.com
Page 2
Protocol Protocol is the communication language or rule which establishes the network within the hosts (nodes) on the network. There are different kinds of protocol. 1. 2. 3. 4. 5. 6. 7. TCP/IP (Transmission Control Protocol / Internet Protocol) FTP (File Transfer Protocol) POP (Post Office Protocol) SMTP (Simple Mail Transmission Protocol) IPX / SPX (Internet Packet Exchange / Sequential Packet Exchange) WAP (Wireless Access Protocol) DHCP (Dynamic Host Configuration Protocol)
1.
TCP / IP: - The TCP / IP have 2 parts: a. TCP: - The Transmission Control Protocol is responsible to establish communication between the two networks, hosts on the network and the main function of TCP is to transmit the data by identifying the host on the network.
b. IP: - The Internet Protocol is responsible to receive the packet of information or the data. Note: The TCP / IP uses the IP address to establish the communication between the networks.
amrit_razz@live.com
Page 3
1) From the IP of class A, the range 127.0.0.0 is reserved for testing network. 2) From the class B, the IP range of 169.254.0.0 is reserved for Automatic IP address.
OCTATE configuration of IP Range 1.0.0.0 = 00000001.00000000.00000000.00000000 To 255.255.255.255 = 11111111.11111111.11111111.11111111 Subnet Mask The Subnet mask is also a 32 bit numerical value in OCTATE configuration. If defines the Net ID and Host Id. Net ID: - The term Net ID defines the total number of network in a class. Host ID: - The term Host ID defines the total number of host in a network.
Invalid IP Address 1. 2. Any IP address starting with 0 and the ending with 0 are the invalid IP address. Any IP address starting 255 and ending with 255 are the invalid IP address.
amrit_razz@live.com
Page 4
255.255.255.255
Total number of Network and Host in different class of IPs Class 'A' (1-126). (0-255).(0-255).(0-255) Net ID Host ID Total No. of Network = 126 Total No. of Host in a Network = (256256256)-2 = 16777216-2 = 16777214 Total No. of Computers = 12616777214 = 2113928964 Class 'B' (128-191).(0-255).(0-255).(0-255) Net ID Host ID Total No. of Network = 64256 = 16384 Total No. of Host in a Network = (256256)-2 = 65536-2 = 65534 Total No. of Computers = 1638465534 = 1073741824 Class 'C' (192-223).(0-255).(0-255).(0-255) Net ID Host ID Total No. of Network = 32256256 = 202752 Total No. of Host in a Network = 256-2 = 254 Total No. of Computers = 202752254 = 532676608
amrit_razz@live.com
Page 5
Cable Cable is a bunch of wire which is used to transmit data or information within the network from one host to another host or from one network to another network. There are different kinds of cable but more importantly we use twisted pair cable.
1.
Coaxial Cable: - The coaxial cable is outdated now. This cable was used in prior with the BUS topology or Ring topology to establish the network. In this cable there lie two wires. One is the Copper wire which transmits the Analog Signal and another one is concentric wire which transmits the digital signal. The copper wire is protected with a white coloured inner sheath and the concentric wire is protected with a black coloured upper sheath. It looks same as the cable of TV. The connectors used with this cable are T-connector, BNC connector and the End connector. It has data transfer rate up to 10 MbPS. There are two kinds of coaxial cable: a. Thicknet b. Thinnet
2.
Twisted Pair Cable: - It is the 4 paired cables in which all the pairs are twisted together 6 turns per inch with each other. The 4 paired cables are in different colours. They are: [a] Orange Orange White [b] Green Green White [c] Blue Blue White [d] Brown Brown White
amrit_razz@live.com
Page 6
a. b. c. d. e. f.
Among these categories, most we use CAT5 or CAT5E. Using CAT5, we can establish the network within 200 meters of long distance and using the CAT5E, we can establish the network within 500 meters of long distance.The connector of twisted pair cable is RJ-45. 3. Fiber Optic Cable: - The Fiber optic cable uses the light signal instead of electronic signal to transmit the data. Its connectors are SC and ST. Its metal sheath is highly polished through which light wave passes to transmit the data. It transmits the data in the speed of light. The transfer rate of this cable is 100-1000 Gbps. Cabling Cabling is a process of connecting the cables with its connectors. There are different kinds of cabling: 1. Parallel cabling: - Parallel cabling is done for the different devices. When we have to establish the connection via the different connectivity devices then we make this type of cabling. The different kinds of devices can be From Switch to computer or From Hub to computer. 2. Crossover Cabling: - The crossover cabling is done if we have to connect the same devices such as from one computer to another, from one hub to another hub or from switch to switch. Whether we make the simple or the crossover cable, both can be done in two ways: [1] Simple Cabling: - 10 Mbps Parallel: "A" [1] Orange [2] Orange White [3] Blue [4] Blue White [5] Green [6] Green White [7] Brown [8] Brown White "B" [1] Orange [2] Orange White [3] Blue [4] Blue White [5] Green [6] Green White [7] Brown [8] Brown White
amrit_razz@live.com
Page 7
Cross Over:Formula for crossover cabling: 1 goes to 3 2 goes to 6 3 goes to 1 6 goes to 2 "A" [1] Orange [2] Orange White [3] Blue [4] Blue White [5] Green [6] Green White [7] Brown [8] Brown White
"B" [1] Blue [2] Green White [3] Orange [4] Blue White [5] Green [6] Orange White [7] Brown [8] Brown White
[2] IEEE Stander of Cabling: 100 Mbps Parallel: "A" [1] Orange White [2] Orange [3] Green White [4] Blue [5] Blue White [6] Green [7] Brown White [8] Brown
"B" [1] Orange White [2] Orange [3] Green White [4] Blue [5] Blue White [6] Green [7] Brown White [8] Brown
Formula for crossover cabling: 1 goes to 3 2 goes to 6 3 goes to 1 6 goes to 2 Cross Over: "A" [1] Orange White [2] Orange [3] Green White [4] Blue [5] Blue White [6] Green [7] Brown White [8] Brown "B" [1] Green White [2] Green [3] Orange White [4] Blue [5] Blue White [6] Orange [7] Brown White [8] Brown
amrit_razz@live.com
Page 8
2)
3)
BRIDGE: It connects two different Network It also divides a Network (LAN) into various LANs (Making easier of complex LAN). ROUTER: Especially Router is used on WAN. It connects the various LANs. Maximum uses media on WAN. REPEATER: It accepts the weak signal and converts into the strong signal as the source and sends the signal to the destination. GATEWAY: Local called routing. Uses with routers. Connects with different LANs. Physical Network Setup Two or more than two systems with Ethernet Controller (LAN card) and its proper driver must be installed. If you have to establish the network in only 2 systems then have a crossover cabling and if you have to establish the network in more than 2 systems with the help of central connectivity device (Switch / Hub) then have parallel cabling for it. Connect the one end of cable to the switch/hub and another end of cable to the system NIC. Now start the system and assign the computer name, workgroup, IP address, and its subnet mask. Computer name must be different. e.g. com1, com2, com3 etc. Workgroup must be same. IP address: i. Net ID must be same (for same network). ii. Host ID must be different. Subnet Mask must be same
4)
5)
6)
1. 2.
3. 4.
amrit_razz@live.com
Page 9
1. 2. 3. 4. 5. 6. 7. 8. 9.
1. 2. 3. 4. 5. 6.
Commands on Network 1. Ping: - This command lets you to check the connectivity between the systems on the network. Syntax: C:\>Ping <Computer name / IP address> and press Enter key. C:\>Ping 192.168.0.4 C:\>Ping com4 2. Net view: - It shows the systems on the same network. e.g. c:\>net view 3. Net send: - This command sends the message to the specified computer name or the IP specified. e.g. c:\>net send com1 hi c:\>net send 192.168.0.1 hi Instead of computer name or the IP address, if you have specified the * mark then it will send the specified message to all the hosts on the network. e.g. c:\>net send * hi 4. Net User: - This command displays the list of the user currently available on the system. e.g. c:\>net user Using the following syntax we can create the user from the command prompt. Syntax:Net user <user name> [Password] </add> e.g. c:\>net user abc pop /add Here, the user name is abc and its password is pop.
amrit_razz@live.com
Page 10
Net Meeting How to install Net Meeting 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Go to 'Run' window. Type 'Conf'. Click on OK. Click on Next Type the First name, Last name, Email address Click on Next. Put check mark on 'Log on to a directory server when Net meeting starts' check box. Click on Next. Choose 'Local area Network'. Click on Next / Next / Finish.
amrit_razz@live.com
Page 11
amrit_razz@live.com
Page 12
Another way to view the shared drives or the folders: 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 1. 2. Right click on 'My computer'. Click on 'Manage'. Click on 'Shared folders'. Click on 'Shares'. How to Remove the sharing Right click on 'My computer'. Click on 'Manage'. Click on 'Shared folders'. Click on 'Shares'. Right click on the drive or the folder of which you want to remove the sharing. Click on 'Stop sharing'. Click on 'Yes'. How to make a folder shared from Computer management Go to the 'Computer Management'. Double click on 'Shared folders'. Click on 'Shares'. Right click on the random spot on the right task pane. Choose 'New' / File share / New File Share. Click on Next. Click on 'Browse' to select the folder you want to share. Select the folder you want to share. Then click on OK. In 'Share name' box, type the share name. Click on Next / Next / Finish. How to access a shared drive or folder from a host computer Go to 'Run' window. a. For Visible: Syntax: \\computer name\shared drive or folder name e.g. \\com3\test [Here, 'test' is shared folder name]. b. For Hidden shared drive or folder: Syntax: \\computer name\shared drive or folder name$ e.g. \\com3\test$ [Here, test is hidden shared folder]. \\com3\d$ [Here, d is hidden drive name].
Map Network Drive Using the Map network drive, we can store files or folders in any computer centrally. This type of drive is called the Network drive. 1. Have a folder in any computer and share it. 2. In this shared folder create folders with the name of users. 3. Create users in every computer with above folders' name. 4. Log on the computers with created users. 5. Right click on 'My computer'. 6. Click on 'Map Network Drive'. 7. Select the drive letter from 'Drive' box. Here default drive is appeared as 'Z:' drive And type the location as: Syntax: \\Server name\Shared folder name\Folder created for user e.g. \\com3\map\ram 8. Go to any application. 9. Save it in the just created drive, i.e., created through Map network drive. How to Disconnect Map Network Drive 1. Right click on 'My computer'. 2. Choose disconnect 'Map Network drive' 3. Select the drive you want to disconnect. 4. Click on OK.
amrit_razz@live.com
Page 13
1. 2. 3. 4. 5. 6. 7.
amrit_razz@live.com
Page 14
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.
NTFS Security Option Using the NTFS file system, we can implement the file, folder security and the Quota management. But if don'[t have the NTFS file system then we cannot implement the security and the quota management.
How to convert Fat/Fat 32 to NTFS Syntax: convert <drive letter:> /fs:ntfs e.g. c:\convert d: /fs:ntfs Note: If your disk do have any volume label, the system will prompt you to specify the volume label else it will convert without any information. File Folder Security 1. Right click on the drive or the folder for which you want to implement the file folder security. 2. Click on 'Security' tab. 3. Click on 'Advanced' tab. 4. Disable check mark from 'Inherit from parent the permission .' check box. 5. Click on 'Remove' button. 6. Click on 'Apply' / OK. 7. Click on 'Add' button. 8. Click on 'Advanced'. 9. Click on 'Find Now'. 10. Select the users (Hold on 'Ctrl' key and click on users' name) 11. Click on OK / OK. 12. Click on the User name and the list of permission. 13. Define the required permission from the list by enabling or disabling the check boxes. 14. Click on Apply / OK.
amrit_razz@live.com
Page 15
1. 2. 3. 4. 5. 6. 7. 8. 9.
Internet Connection a) Dialup Connection: Requirements: phone line, Modem DSL:-Digital Subscriber Line Make the proper connection, phone line and modem Go to properties of My Network Places Choose create a new connection from task pane Click on Next Choose Connect to the Internet Click on Next Select Setup 'My computer manually'. Click on Next Choose "Connect using a dial-up modem" Click on Next Type the name of ISP (Internet Service Provider) Click on Next Type the hunting number of ISP Click on Next Type the user name and Password. Click on Next If you want to place the shortcut on the desktop then put check mark on check box "Add the shortcut to this connection to my desktop" Click on Finish.
amrit_razz@live.com
Page 16
1. 2. 3. 4. 5.
1. 2. 3.
Client Server Active Directory Active Directory is the main database file which stores all the information about the users. It starts and blocks the different kinds of services such as the group policy, DHCP, DNS, IIS, Mail Server etc. When we install active directory in a computer that computer becomes the Domain Computer. Top Level Domain Name .com=Commercial Organizations .edu=Educational Institution .gov=Governmental Organizations .int=International Organizations .net=Large network providers like ISP .org=Non-profit Organizations .aero=air-transport industry .asia=Asia-pacific region .biz=business .coop=cooperatives .info=information .jobs=jobs companies .mil=military .mobi=mobile devices .museum=museums .name=individuals .pro=professions .tel=internet communications .travel=travel and tourism industry related sites
amrit_razz@live.com
Page 17
1. 2. 3.
There are three types of Domain Controller Primary Domain Controller (PDC) Additional Domain Controller (ADC) Backup Domain Controller (BDC)
PDC:- The first time installed active directory is called the primary domain controller. It is the main domain controller on the network. There is only one PDC on a network. e.g.:- kalash.net.np ADC:- It is the helping domain for PDC. It is used for balancing load of the network; No. of ADC depends on the load of the network. e.g.:- saleskalash.net.np adminkalash.net.np marketingkalash.net.np BDC:- The server for the backup of data is called Backup Domain Controller. If any problem occurs in the PDC or ADC then the information are gained/ recovered from the BDC. No. of BDC depends upon the load of the network. Terms used on Active directory and Domain controller 1. 2. 3. Database folder:- It is the folder which stores all the informations about the active directory. log folder:- It contains log related files.(log on and log off of domain users.) SYSVOL folder (system shared volume):-It is used to stores the domain's informations that will be replicated (transfer)to all of the other domain controllers in the domain. Tree:- Entire network of a organization Forest:-Entire network of two or more than two organizations.
4. 5.
1. 2. 3. 4. 5. 6.
Requirements to Install Active Directory The system must be containing Server Operating system (OS). The system must have NIC and its proper driver. The IP address must be configured. In the preferred DNS server the same IP must be defined. Backup of "I386" or the CD containing the folder named "I386". The computer name must be configured. 1 GB of free space in Home drive. Process to Install Active Directory Go to Run Window. Type the command 'dcpromo'. Click on OK / Next / Next. Choose "Domain controller for a new domain". Click on Next. Choose "Domain in a new Forest". Click on Next. Choose "Yes, I will configure the DNS client". Click on Next. In the 'Full DNS name for new Domain' box, type the domain name such as 'apple.org'. Click on Next. In the "Net BIOS name", name of domain will automatically appear. Click on Next / Next / Next. Choose "Install and Configure the DNS server on this computer and set this computer to use this DNS server as it preferred DNS server" radio button. Click on Next. Choose "Permissions compatible with only windows 2000 or 2003 server Operating syatem.
amrit_razz@live.com
Page 18
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
Domain Registration It is a process of connecting the client computers with the domain controller. When we register the client computer with the domain controller then the client computers are called domain member. After registration, we can login the client computer in two ways: one is local and another is domain member when we login as a domain member, we can use only the services that are provided by the domain controller. Process of Domain Registration Go to the properties of TCP/IP. Provide an IP address and in the Preferred DNS server, type the IP of domain controller. Ping the domain controller (Server Computer). Go to the properties of 'My computer'. Click on computer name tab / Change button. Click on Domain radio button and in the domain box, type the name of domain. E.g. apple Click on OK. If the computer asks for the user name and password then type the name of administrator and password of the domain controller (server controller) Click on OK / OK / OK / YES Restart the system. How to Disjoin /Disconnect from Domain Go to the properties of TCP/IP and remove the IP from the Preferred DNS Server. Go to the properties of 'My computer'. Click on 'Computer Name' tab. Click on 'Workgroup' radio button. Click on OK. Type the name of administrator and password. Click on OK and restart the system.
1. 2. 3. 4. 5. 6. 7. 8. 9.
1. 2. 3. 4. 5. 6. 7.
amrit_razz@live.com
Page 19
1.
2. 3. 4. 5. 6. 7. 8. 9.
1.
2. 3. 4. 5. 6.
7. 8.
1. 2. 3. 4. 5. 6. 7.
File Server By defining a file server a user can save their files and folders centrally in a computer which is defined as file server. To create a file server we need two folders: One is known as home folder where the documents of the user are stored. And another is profile folder where the information of the user's desktop, cookies etc. are stored. Process In any computer make two folders named 'home' and 'profile' and then share both of them with full permission. Go to ADUC. Right click on the user's name. Click on 'Properties' Click on 'Profile' In user profile, click on profile path box and type: Syntax: \\computer name\profile folder name\%username% e.g. \\com4\profile\%username% Click on 'Connect' radio button. A default drive letter 'Z:' will automatically appear. If you wish you can change it also. Click on "To" box type: Syntax: \\computer name\home folder name\%username% e.g. \\com4\home\%username% Click on Apply / OK Once you log off the system and then log on it.
1. 2. 3. 4. 5. 6.
7. 8.
9. 10.
amrit_razz@live.com
Page 20
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34.
amrit_razz@live.com
Page 21
1.
2. 3. 4. 5. 6. 7. 8. 9.
1. 2. 3. 4.
amrit_razz@live.com
Page 22
1. 2. 3. 4. 5. 6. 7. 8.
1. 2. 3.
Group Policy: Group policy is created in the main domain controller to enable or disable the facilities for the domain users. 1. Go to ADUC. 2. Create an OU. 3. Create some users inside the OU. 4. Create a group inside that OU. The group type must be security. 5. Make all the users inside the group. 6. Right click on the OU. 7. Click on Properties. 8. Click on 'Group Policy' tab. 9. Click on 'New' button. 10. In "New group policy object" type the policy's name and press 'Enter' key. 11. Click on 'Edit' button. 12. From the 'user configuration' choose 'Administrative Templates'. 13. Double click on the container as it is required. 14. On the right task pane select the policy and double click on it. 15. Click on 'Enable ' radio button. 16. Apply / OK 17. From the 'File' menu choose 'Exit' 18. Put check mark on 'Block policy inheritance' check box. 19. Click on Apply / OK 20. Now to check it log on by users in client computers. Terminal Server Using the terminal server a system administrator can control and manage the server computer from any domain member. For this at first, we need to install terminal server in server computer and if the remote desktop connection is not available in client computer (Host/ Domain member) in that case we need to install Terminal server in client computers.
amrit_razz@live.com
Page 23
1. 2. 3. 4. 5. 6. 7.
1. 2. 3. 4. 5.
If the Remote desktop connection is not available in client computer then how to install it: 1. o to 'Run' window and type: Syntax: \\computer name of server computer\Home drive letter followed with $ sign. e.g. \\com4\g$ 2. Click on OK. 3. Open 'Windows' folder. 4. Open 'system 32' folder. 5. Open 'clients' folder. 6. Open 'tsclient' folder. 7. Open 'win32' folder. 8. Double click on Setup icon. 9. Click on Next. 10. Choose "I accept the terms in the license agreement" 11. Click on Next. 12. Type the name of the administrator. 13. Specify whether you want to allow this application for all the users or only for the administrator and then click on Next. 14. Click on install /Finish.
1. 2. 3. 4. 5.
How to configure the terminal server connection in more than one computers: Start / Program / Administrative tools/ Terminal Server Configuration. Double click on "Server Settings" Double click on "Restrict each user to one session". Disable the checkbox "Restrict each user to one session". Click on OK.
amrit_razz@live.com
Page 24
1. 2. 3. 4.
Start / Program / Administrative tools / Configure Your Server Wizard. Choose DNS from the 'Server role' box. Click on Next / Next. Click on Cancel / Finish. How to Configure the DNS
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25.
Start / Program / Administrative tools / DNS. Click on the '+' sign of server name. Right click on 'Reverse look up zones'. Choose 'New zone' Click on Next. Choose 'Primary zone' Click on Next. Choose "To all DNS servers in the Active Directory domain ...." Click on Next. In Network ID type the Net ID of your server computer. e.g. 192.168.0 Click on Next Choose "Allow only secure dynamic updates" Click on Next / Finish. Right click on "Forward lookup zones". Choose 'new zone'. Click on Next Choose 'Primary zone' Next Choose 'To all DNS server in the active directory domain..." Click on Next. Type the zone name in 'Zone name' box. e.g. modelnepal.com Click on Next. Choose "Allow only secure Dynamic updates". Click on Next / Finish. Define the IP for the 'New zone'. a) Go to the properties of TCP/IP. b) Click on 'Advanced' button. c) Click on 'Add' on 'IP Address' option and type the IP address and subnet mask for it. d) Click on Add. e) Click on Close. Right click on the recently created zone name i.e. modelnepal.com Choose 'New Host (A)' In "Name (Use parent domain name if blank)" box type "www". Type the IP recently you have created for that domain e.g. 192.168.0.200 Put check mark on "Create associated Pointer ...." and "Allow any authenticated user...." checkbox.
amrit_razz@live.com
Page 25
IIS (Internet Information Service) The IIS also uses the same IP defined for the DNS. The contents for the Web site are loaded on IIS. Process to Install IIS Start / Program / Administrative tools / Configure your server wizard. From the 'Server Role Box' choose "Application Server (IIS, ASP.Net) Click on Next. Put check mark on "Front Page server extensions" and "Enable Asp.Net" check boxes. Click on Next /Next. If the system asks for the backup for the 'I386' then define the location for it. Click on Finish.
1. 2. 3. 4. 5. 6. 7.
Process to Configure IIS 1. Start / Program/ Administrative tools 2. Click on 'Internet Service Manager' or 'Internet Information Service (IIS) Manager. 3. Right click on Website container. 4. Go to New and choose 'websites'. 5. Click on Next. 6. In "Description" box type the name of the website that describes the website to help for identifying the site. 7. Click on Next. 8. Choose the IP address that you have defined for the DNS. 9. Click on Next. 10. Now define the location for the web site. 11. Click on Next. 12. Define the access permissions by putting check marks in the boxes. Note: Don't enable the check box "Write". 13. Click on Next 14. Click on Finish. 15. Right click on the description name of the site recently you have created. 16. Click on Properties. 17. Click on Documents tab. 18. Remove the default tab. 19. Click on Add button. 20. Type "Index.htm" 21. Click on OK. 22. Again click on Add button. 23. Type "Index.php" 24. Click on OK. 25. Click on Apply button 26. Click on OK. 27. Now in the client computers load/run internet explorer and type "www.modelnepal.com" 28. Click on 'Go'.
amrit_razz@live.com
Page 26
Mail Server Using the Mail server it starts 2 kinds of services: (i) PoP3 (ii) SMTP The PoP3 is responsible to send the mail and the SMTP is responsible to receive the mail. Process to Install Mail Server (PoP3/SMTP) Start / Program / Administrative tools / Configure your server wizard. From the list of "Server role" choose 'Mail server (PoP3/SMTP)' Click on Next / Next. In the email domain name box, type the domain name e.g. fortune.org Click on Next / Next. If the system asks for the backup of 'I386' then define the location for it. At last click on Finish. Process to Configure PoP3 Start / Program / Administrative tools / PoP3 server. Click on the '+' sign of server name i.e. 'com4' Click on 'Domain Name' Click on 'Add mail box and type the mail box name (user name) Note: If the mail box name and the user name are same and it is available in ADUC then disable the 'create associated user for this mail box' checkbox and if you want to create the user name according to the mail box name then enable this check box. Type the password and the confirm password. Click on OK. Now go to ADUC and create an OU. Create a group inside that OU. The group type must be 'distribution' Add the users in recently created group. a) Select the Users. b) Right click on it. c) Choose 'Add to group' d) Click on 'Advanced' e) Click on 'Find now' f) Select the group name g) Click on OK / OK. Now go to the client computers and load 'Outlook Express' a) Start / Program / Outlook express. Or In run window type 'msimn' and / OK. Open tools menu. Choose "Accounts..." Click on 'Add' button. Click on 'Mail...' In the 'Display Name' box type the user name and click on Next. In the 'Email Address' box, type the: Syntax: <username>@<domain name> e.g. ram@fortune.org
1. 2. 3. 4. 5. 6. 7.
1. 2. 3. 4.
5. 6. 7. 8. 9.
10.
amrit_razz@live.com
Page 27
Print Server A computer which is defined for central printing and which can define the printer security and services for the users is known as 'Printer Server'.
1.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
Start / Program / Administrative tools / Configure your Server Wizard /Next /Next. From the list of "Server Role" choose "Print Server" Click on Next / Next. Choose "Windows 2000 and windows XP clients only" if you want this server only for the 2000 and XP OSs and choose "All windows clients" for any OS in client systems. Click on Next /Next /Next. Choose "Local Printer Attached to this computer". Click on Next / Next. Select the manufacturer and the printer from list. Click on Next. A box of printer name will appear. If you wish then, change the printer name and click on Next. The 'Printer Sharing' button will appear If you want to share the printer then click on share box and type the share name. The default share name will also appear automatically. And if you do not want to share then click on 'Do not share this printer'. Click on Next. If you want to print out a test page then click on 'Yes' else click on 'No'. Click on Next / Finish. Now in the client computers: a) Go to 'Run' window b) Type "\\computer name (server computer) Or
amrit_razz@live.com
Page 28
d) Click on Connect Printer Security In the printer server computer, log on by administrator. Right click on printer. Click on 'Properties' Click on 'Security' tab. If you want to add any user to whom you want to give the permission click on 'Add' button. Advanced / Find Now / Select the user /OK / OK. From the list of permission put check mark on allow options. Click on Apply / OK. Defining Printer time Go to the properties of printer. Click on 'Advanced' tab. Click on 'Available from' radio button and define the time. Click on Apply / OK.
1. 2. 3. 4. 5. 6. 7. 8.
1. 2. 3. 4.
Backup (Disaster recovery) Back up is a process to store data of the system in any drive we can take the backup of a file, folder or a complete drive. We can also take the backup of all the data in a system. In case of windows server operating system, to take the backup of domain controller where the active directory, DNS, DHCP, File server, Print server, Mail server etc. are stored, we need to take the backup of 'System state'. Taking the backup of system state, it stores all the backup of system state; it stores all the information of the domain controller.
1.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.
Process Start / Program / Accessories / System tools / Backup. Click on Next. Choose 'Backup files and settings' option Click on Next. Click on 'Let me choose what to backup'. Click on Next. Click on the '+' sign on My computer. Put tick mark on 'System state' Click on Next. Click on 'Browse' button and define the location and file name where you want to store the backup data. Click on Next. Do not click on 'Finish' button. Click on 'Advanced' button. From the 'Type of backup', for the first time, choose 'Normal' and for the next time, choose 'Incremental'. Click on Next / Next. Choose 'Append this backup to the existing backups' if you have selected 'Incremental' and for 'Normal', choose 'Replace the existing backups'. Click on Next. If you have to take the backup sharp now then choose "Now", and if you want to create any schedule for the backup then choose 'Later' and click on 'Set schedule' button. Click on Next. Click on Finish.
amrit_razz@live.com
Page 29
amrit_razz@live.com
Page 30