Vous êtes sur la page 1sur 31

INTERNSHIP PROJECT REPORT

(Project Semester July- December 2011)

(Exchange Server)

Submitted by Sidharth Aggarwal Regd no.-10800944 B-Tech (IT) K38T5B33


Under the Guidance of Faculty coordinator Mr. Ravi Shanker Industry coordinator Mr. Pardeep Singh Bhogal Network and Security Expert

Lovely Professional University, Phagwara

TABLE OF CONTENTS

COMPANY PROFILE. SUMMARY/ OUTLINE OF WORK. TERMS OF REFERENCES. METHODOLOGY/PROCEDURE. PROCESS AND ANALYSIS OF GENERAL FINDINGS

COMPUTER NETWORK OPERATING SYSTEM FILE ALLOCATION TABLE(FAT) NEW TECHNOLOGY FILE SYSTEM (NTFS) NETWORK TOPOLOGIES CLASSES OF NETWORKING NETWORK HARDWARE

WINDOW XP
o WINDOWS REGISTRY o MANAGING USER ACCOUNTS

o o o o

WINDOWS SERVER 2003


USERS AND GROUPS CONNECTIVITY OF CLIENT WITH SERVER 2003 SUBNETTING DOMAIN NAME SYSTEM (DNS) DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP). FILE TRANSFER PROTOCOL (FTP) IMPLEMENATION

o
o

EXCHANGE SERVER BENEFITS AND FEATURES

ACKNOWLEDGEMENT
Here, we found this golden chance to acknowledge all those people who had blessed, encouraged and supported us technically and morally through all the phases of our project. We thank almighty God for giving us this opportunity to express gratitude to all those who helped us in our training. First of all, we pay our immense gratitude to Mr. RAJEEV SOBTI, HOD, CSE/IT Dept. for his valuable guidance. It is our proud to express our heartiest gratitude to our venerable guide Mr. PARDEEP SINGH BHOGAL (NETWORK and SECURITY EXPERT, TCIL-IT) for his valuable guidance , proper advice and constant encouragement under Mr. Manoj Dhiman (Head , TCIL-IT Chandigarh) without whose expert guidance and support, this training period would have been compelling. We also express our deep thanks to the faculty and staff of CSE/IT Dept, Lovely Professional University, for their help, inspiration and moral support, which helped us a lot in the successful completion of our training. We extend our fort right thanks to our family and friends for their moral support and encouragement throughout our training and project report.

Sidharth Aggarwal(10800944)

DECLARATION

I hereby declare that the project work entitled Exchange Server is an authentic record of my own work carried out at TCIL-IT Chandigarh as requirements of Industry Internship project for the award of degree of B.Tech (IT), Lovely Professional University, Phagwara under the guidance of Mr. Pardeep Singh Bhogal (Industry Coordinator) and Mr. Ravi Shanker (Faculty Coordinator), during July to December 2011).

Sidharth Aggarwal (Signature of student) Name of Student: Sidharth Aggarwal Registration no: 10800944 Date: 5/10/2011 Certified that the above statement made by the student is correct to the best of our knowledge and belief.

(Name and Designation) Faculty Coordinator

(Name and Designation) Industry Coordinator

COMPANY PROFILE

TELECOMMUNICATIONS CONSULTANTS INDIA LTD (TCIL) Telecommunications Consultants India ltd (TCIL) is a leading ISO 9001 certified public sector enterprise under the Ministry of Communications. TCIL is a premier telecommunication consultancy and engineering company with a strong base in information technology (IT). TCIL started in 1978 with a paid up capital of one million Rupees: Its turnover during 2002-2003 financial years is 5.90 billion Rupees and is expected to reach RS.12.5 billion by the year 2005. By constantly adapting itself to the changing telecommunication technologies the world over, TCIL has been successful in establishing business in more than 50 countries. TCIL is now poised to emerge as one of the world's leading organizations in the field of telecommunications consultants and project execution. VISION "To excel in providing communication solutions globally by anticipating opportunities in technology". TRACK RECORD Since its inception in 1978, primarily to disseminate Indian telecom expertise abroad through information sharing and project execution, TCIL has come a 10:1g way. Backed by the vast network of the Department of Telecommunications, Govt. of India, in terms of trained and experienced manpower, R&D, and training facilities, TCIL has made rapid strides. Today it. is a multi-disciplinary telecom organization that provides complete telecom solutions - from concept to completion. Have operations spread over the Middle East, South East Asia, Africa and Europe. And has to its credit such prestigious projects as the rehabilitation of the telecom network for Kuwait after the Gulf War, consultancy for networking through Regional African Satellite Communication System [RASCOM] and developing software for telecom applications for the Dutch PTT. Committed to maintaining exceedingly high standards of quality, TCIL has won many awards and accolades for its efforts, which include: The Economic Times & Harvard Business School Association Award for Excellent Corporate Performance Adjudged it as the best company in consultancy and contracting fields by the Performance by the Prime Minister of India. Certified with the prestigious ISO 9001. Appreciations and commendations from clients around the world such as: Benin Republic of Yemen Botswana

Ghana Indonesia

Kuwait and Zimbabwe to name just a few.

FUTURE In the last decades, TCIL's core competence in the Network, Switching & Transmission Systems and Rural Telecommunication Projects has enabled it to earn respect of clients all over the world. Not the one to rest on past laurels, Tell is now using the state-of-art technology in the areas of: Information Technology Access Networks Optical Fiber Cable System(OFC) Microwave Satellite GMPCS Cellular Network Multi-media Services

SUMMARY/ OUTLINE OF WORK

During the training period at TCIL-IT, we were taught the practical implementation of NETWORKS at any ambience; may that be a classroom, a practical lab, an organization or huge company networks. We implemented the various networking concepts with the Client Server Model and used windows server 2003, client XP and thin client as the operating systems for the execution. As Windows server is very largely used, we implemented all the networking aspects, a few of them listed below, with it : Networking concepts IP Addressing DNS FTP Server Implementation Child Server DHCP Server

The report you will be reading ahead will help you gain an incite into how networking happens practically. Also all the topics include Snap Shots of the implementation which makes understanding all the more easy and effective.

TERMS OF REFERENCES
The basic scope and limitations of the report are as given below : SCOPE : The report explains the all the modules of networking we performed. The main points of its scope are: Introduction to each module briefly. Implementation steps are elaborated one by one. Snap Shots for each module step.

The report includes all the important points of troubleshooting at each step.
Also the project has been included as a different chapter with maximum possible explanation. Users depend on Exchange Server to track their tasks, keep their appointments, store important pieces of information, and communicate quickly and easily with co-workers and vendors. As users become more and more dependent on these types of tools, their requirements increase in terms of accessibility and reliability. The ultimate goal of the end users is for email to be much like the telephone. They never want to have to think twice about whether they'll have access to it and whether or not they'll get a dial tone. Proper planning is the key to being able to deliver this level of functionality and reliability. This chapter helps Exchange Server administrators to properly plan out their build or upgrade through standardized processes of planning, prototyping, and migrating or deploying Microsoft Exchange Server. Adding more features and complexity to the messaging "ecosystem" might not result in ecstatic users, but reducing spam and the resulting impact on Inboxes. Reducing the number of milliseconds it takes to send an email probably won't get noticed, but being able to guarantee access to email anywhere and anytime should.

LIMITATIONS : The report has a few limitations which may not appear now, but may evolve up a few months later : The new server 2008 has been launched and we downloaded its trial version to see how networking is done through it. This report is made mainly emphasized on the server 2003. As server 2008 is new, its networking concepts are a bit different and so are the troubleshooting points at each module. We tried implementing each module of the terminal project, but still the organizational troubleshooting may be much larger, we have tried including each aspect, but still a few points from the industrial point may vary.

METHODOLOGY/PROCEDURE
The main methodology we adopted during the training period for any networking module, be it the project also are outlined stepwise below: Listing of the networking modules with client server model (checked on the Microsoft servers website) Picking a module to implement Discussion on the module (exchange of ideas) Research on the module (Using internet for this purpose) Discussing the networking architecture to implement the module. Establishing the architecture. Implementing the network module selected on the architecture. A complete stepwise report of the modules on our records daily. Summary of the implementation Recommendations on the module and its future aspects Applications of the module implemented

Troubleshooting any module/module step (the MAIN part of any implementation)

PROCESS AND ANALYSIS OF GENERAL FINDINGS COMPUTER NETWORK


A computer network is an interconnected group of computers. , a network is any method of sharing information between two systems (human or mechanical). Networks may be classified by the network layer at which they operate according to basic reference models such as the five-layer Internet Protocol Suite model. While the seven-layer Open Systems Interconnection (OSI) reference model is better known in academia, the majority of networks use the Internet Protocol Suite (IP). Most people decide to network because: They have more than one computer and want to share one broadband Internet connection. Networking is smart, efficient and cost effective. Networking is a way to connect to the Internet, printers, game consoles and other computers in your home or small office. A network lets you effortlessly transfer files, pictures, music and information without using a disk or burning a CD. It also enables everyone in your home or office to share one broadband Internet connection, one printer, one scanner. network, Mesh network, Star-bus network, Tree or Hierarchical topology network, etc.

Wired vs. Wireless Networking Many of the same network protocols, like TCP/IP, work in both wired and wireless networks. Networks with Ethernet cables predominated in businesses, schools, and homes for several decades. Recently, however, wireless networking alternatives have emerged as the premier technology for building new computer networks. If the network is wireless-enabled, desktop computers can be set up where they're convenient in the home or small office, not just where there happens to be a wire. And laptop computer users are free to roam almost anywhere in, or around, the network without losing their connection.

OPERATING SYSTEM

An operating system (OS) is software that manages computer resources and provides programmers with an interface used to access those resources. An operating system is the software component of a computer system that is responsible for the management and coordination of activities and the sharing of the resources of the computer. An operating system performs basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating computer networking and managing files. Various operating systems include Microsoft Windows, Linux and Solaris. Microsoft. . Features of operating system:

1) Networking: Currently most operating systems support a variety of networking protocols,


hardware, and applications for using them. This means that computers running dissimilar operating systems can participate in a common network for sharing resources such as computing, files, printers, and scanners. 2) Security: A computer being secure depends on a number of technologies working properly. A modern operating system provides access to a number of resources, which are available to software running on the system, and to external devices like networks 3) File system support in operating systems: Support for file systems is highly varied among modern operating systems although there are several common file systems which almost all operating systems include support and drivers for. 4) In Microsoft Windows: Microsoft Windows presently supports NTFS and FAT file systems, along with network file systems shared from other computers, and the ISO 9660 and UDF filesystems used for CDs, DVDs, and other optical discs such as BluRay.

FILE ALLOCATION TABLE(FAT)


The primary file system used in the vast majority of PCs is FAT. This name actually stands for file allocation table, which is one of the main logical structures that the file system uses, so it's not the best name to refer to the whole file system. FAT is used by most DOS or Windows-based PCs. The file allocation table or FAT stores information about the clusters on the disk in a table. The newest FAT type, FAT32 is supported by Windows 95's OEM SR2 release, as well as Windows 98. Reason to use FAT 32: 1) FAT32 was created primarily for one reason: hard disk manufacturers began making mainstream hard disks larger than 2 GB in size, and FAT16 supports only a maximum of 2 GB per logical disk volume. FAT32 extends this up to 8 GB data can be handled even larger disks using the same basic structures.

2) It is generally believed to be a "rule" of cluster size selection that "smaller is better". FAT32 does allow the use of larger hard disks and greatly reduced cluster sizes, there is an important performance consideration in using FAT32 that is not often talked about. The following are the most common errors encountered on a FAT disk:

1) Lost Clusters: Virtually every DOS user has come across this problem. Lost clusters are
simply clusters that are marked in the FAT as being in use, but that the system cannot link to any file. 2) Cross-Linked Files: On rare occasions, two files can end up pointing to the same data on the disk. Both files will have the starting cluster number in the directory entry pointing to the same cluster number. Obviously this is a problem, since each time you use either file, you will overwrite the other one. 3) Allocation or FAT Errors: Occasionally the entries in the FAT can become corrupted or set to invalid values. Again, most disk-checking utilities will detect and correct these sorts of problems on the fly.

NEW TECHNOLOGY FILE SYSTEM (NTFS)


The NTFS file system used by Windows NT is completely different from, and incompatible with, the FAT file system that is used by DOS and the other Windows varieties. NTFS can only be used by Windows NT. NTFS is in virtually every way, far superior to FAT. It also does not have the problems with cluster sizes and hard disk size limitations that FAT does, and has other performance-enhancing features such as RAID support. The only way that NTFS is not superior to FAT is in compatibility with older software. Reason to use NTFS instead of FAT: NTFS has always been a more powerful file system than FAT or FAT32. NTFS includes many important security features such as: 1) Permissions that you can set on individual files rather than just on folders. 2) File encryption, which greatly enhances security. 3) Active Directory, which you can use to view and control network resources easily. 4) Domains, which are part of Active Directory, and which you can use to fine-tune security options while keeping administration simple. Domain controllers require NTFS. 5) Recovery logging of disk activities, which helps you restore information quickly in the event of a power failure or other system problems. 6) Disk quotas, which you can use to monitor and control the amount of disk space used by individual users.

How to convert the file system to NTFS 1) Open a command prompt window (one way of doing this is to click the Windows Start button, choose Run then type in cmd then click OK). 2) At the command prompt, type in convert c: /FS:NTFS. 3) Repeat this as necessary for any other drive letters (such as D:, E:, etc.) that are assigned to the local hard drives.

NETWORK TOPOLOGIES
Network topology is the study of the arrangement or mapping of the elements of a network, especially the physical (real) and logical (virtual) interconnections between nodes. A local area network (LAN) is one example of a network that exhibits both a physical topology and a logical topology. Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network.. CLASSIFICATION OF NETWORK TOPOLOGIES:

1) Bus: The type of network topology in which all the nodes of the network are connected to
a common transmission medium which has exactly two endpoints. All data that is transmitted between nodes in the network is transmitted over this common transmission medium and is able to be received by all nodes in the network virtually simultaneously.

2) Star: A star topology connects all cables to a central point of concentration. This point is
usually a hub or switch. Nodes communicate across the network by passing data through the hub. The main disadvantage of this kind of topology is that if central hub stops working then there will be no transmission at any node.

3) Ring: It is the type of network topology in which each of the nodes of the network is
connected to two other nodes in the network and with the first and last nodes being connected to each other, forming a ring. All the data that is transmitted between nodes in the network travels from one node to the next node in a circular manner and the data generally flows in a single direction only.

4) Tree: The type of network topology in which a central 'root' node (the top level of the
hierarchy) is connected to one or more other nodes that are one level lower in the hierarchy (i.e., the second level) with a point-to-point link between each of the second level nodes and the top level central 'root' node, while each of the second level nodes that are connected to the top level central 'root' node will also have one or more other nodes that are one level lower in the hierarchy (i.e., the third level) connected to it, also with a point-to-point link. The top level central 'root' node being the only node that has no other node above it in the hierarchy.

5) Mesh: The value of fully meshed networks is proportional to the exponent of the number
of subscribers, assuming that communicating groups of any two endpoints, up to and including all the endpoints. It is the type of network topology in which each of the nodes of the network is connected to each of the other nodes in the network with a point-to-point

link this makes it possible for data to be simultaneously transmitted from any single node to all of the other nodes.

CLASSES OF NETWORKING
All networks in practical use have different sizes. For example, a company that will have 50 computers, will not need a network of 5000 computers, And on the contrary, a company that needs 5000 computers does not need a network that can only hold 50 computers. This is the main reason that engineers decided that IP address space should be divided in different classes in order to meet different requirements. The following classes were created: 1) Class A: Starts with a number between 1 and 126. Only 126 of these networks are available, however each class A network can handle 16,777,214 IP addresses or computers. Its addresses are assigned to networks with a very large number of hosts. This allows for 126 networks and approximately 17 million hosts per network.

2) Class B: IP addresses of this type starts with a number between 128 and 191. Class B
addresses are used for small local area networks (LANs). The three high order bits in a class C address are always et to binary 110. This allows for 16, 384 networks and approximately 65,000 hosts per network.

3) Class C: This is the most widely used class by small businesses. When you look at the IP
address, you'll notice that class C networks start with a first number that's between 192 and 223 (205.161.74.x for example). Class C address are used for small local area networks (LANs). This allows for approximately 2 million networks.

4) Class D: It has its highest bit order set to 1-1-1-0 it is used to support multicasting. A
multicast group may contain one or more hosts. The remaining bits designated the specific group in which the client participates. Microsoft uses class D addresses for applications to multicast data to hosts on an internet work, including Windows Internet Name Service (WINS) and Microsoft NetShow.

5) Class E: It has its highest bit order set to 1-1-1-1 which is reserved for experimental use.
Class E is an experimental address that is not available for general use; It is reserved for future use.

Network ID: Each IP address defines the network ID and host ID. The network ID identifies the systems that are located on the same physical segment. All systems on the same physical segment must have the same network ID. The network ID must be unique to the internet work. Host ID: The host ID identifies a workstation, server, router, or other TCP/IP host within a segment. The address for each host must be unique to the network ID. Each IP address is 32 bits long and is composed of four OS-bit fields, called octets. Octets are separated by periods. The octet represents a decimal number in the range 0-255. This format is called dotted decimal notation. The following is an example of an IP address in binary and dotted decimal formats. Binary format Dotted decimal notation 10000011.01101011.00000011.00011000 131.107.3.24 Class A B C IP address w.x.y.z w.x.y.z w.x.y.z Network ID w w.x w.x.y Host ID x.y.z y.z z

Follow this guideline when assigning network IDs and host IDs: The network ID cannot be 127. This ID is reserved for loopback functions. The network ID and host ID cannot be 255 (all bits set 1). If all bits are set to 1, the address is interpreted as a broadcast rather than a host ID. The network ID and host ID bits cannot all be set to 0. If all bits are set to 0, the address is interpreted to mean this network only. The host ID must be unique to the local network ID.

NETWORK HARDWARE
All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, in the Category 5 cable or Less common are microwave links (as in IEEE 802.11) or optical cable ("optical fiber").Some of the practically used network hardware are:

1) Network card: A NIC or Network Interface Card is a circuit board or chip, which allows
the computer to communicate to other computers on a Network. This board when connected to a cable or other method of transferring data such as infrared can share resources, information and computer hardware. Local or Wide area networks are generally

used for large businesses as well as are beginning to be found in homes as home users begin to have more then one computer.

2) Ethernet: Ethernet cards are usually purchased separately from a computer, although
many computers (such as the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair cables .If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection

3) Networking Cables: CROSS CABLES (Unshielded Twisted Pair-8 columns) UTP cable
is a medium that is composed of pairs of wires. UTP cable is used in a variety of networks. Each of the eight individual copper wires in UTP cable is covered by an insulating material. In addition, the wires in each pair are twisted around each other. It reduces crosstalk between the pairs in UTP cable, the number of twists in the wire pairs varies. 4) Shielded twisted-pair (STP) cable combines the techniques of shielding, cancellation, and wire twisting. The four pairs of wires then are wrapped in an overall metallic braid or foil, usually 150-ohm cable. As specified for use in Ethernet network installations, STP reduces electrical noise both within the cable (pair-to-pair coupling, or crosstalk) and from outside the cable (EMI and RFI). STP usually is installed with STP data connector, which is created especially for the STP cable. However, STP cabling also can use the same RJ connectors that UTP uses.

5) RJ 45 CONNECTORS: UTP cable often is installed using a Registered Jack 45 (RJ-45)


connector. The RJ-45 is an eight-wire connector used commonly to connect computers onto a local-area network .After connecting the RJ-45 to the cable, it is used to connect the client and the server. Instead one server can be connected to various clients using a switch. Then PING both the client and server with their static IPs. The reply indicates that the PCs are now connected. Commonly used types of UTP cabling are as follows: Category 1Used for telephone communications. Not suitable for transmitting data. Category 2Capable of transmitting data at speeds up to 4 megabits per second (Mbps). Category 3Used in 10BASE-T networks. Can transmit data at speeds up to 10 Mbps. Category 4Used in Token Ring networks. Can transmit data at speeds up to 16 Mbps. Category 5Can transmit data at speeds up to 100 Mbps.

Category 5eUsed in networks running at speeds up to 1000 Mbps (1 gigabit per second [Gbps]). Category 6Typically, Category 6 cable consists of four pairs of 24 American Wire Gauge (AWG) copper wires. Category 6 cables is currently the fastest standard for UTP. When comparing UTP and STP, keep the following points in mind: a) The speed of both types of cable is usually satisfactory for local-area distances. b) These are the least-expensive media for data communication. UTP is less expensive than STP. c) Because most buildings are already wired with UTP, many transmission standards are adapted to use it, to avoid costly rewiring with an alternative cable type.

6) Network Hub: A network hub or concentrator is a device for connecting multiple twisted
pair or fiber optic Ethernet devices together, making them act as a single network segment. Hubs work at the physical layer of the OSI model. The device is thus a form of multiport repeater. Network hubs are also responsible for forwarding a jam signal to all ports if it detects a collision. The main reason for purchasing hubs rather than switches was its price. This has largely been eliminated by reductions in the price of switches, but hubs can still be useful in special circumstances.

7) Repeaters: As signals travel along a network cable they degrade and become distorted in
a process that is called attenuation. If a cable is long enough, the attenuation will finally make a signal unrecognizable by the receiver. A Repeater enables signals to travel longer distances over a network. Repeaters work at the OSI's Physical layer.

8) Bridges: Like a repeater, a bridge can join segments or workgroup LANs. However, a
bridge can also divide a network to isolate traffic or problems. For example, if the volume of traffic from one or two computers or a single department is flooding the network with data and slowing down entire operation, a bridge can isolate those computers or that department

9) Routers: In an environment consisting of several network segments with different


protocols and architecture, a bridge may not be adequate for ensuring fast communication among all of the segments. A complex network needs a device, which not only knows the address of each segment, but also can determine the best path for sending data and filtering broadcast traffic to the local segment. Such device is called a Router. Routers work at the Network layer of the OSI model meaning that the Routers can switch and route packets across multiple networks. Access routers, including SOHO, are located at customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost.

10)

Gateways: Gateways make communication possible between different architectures and environments. They repackage and convert data going from one environment to another so that each environment can understand the other's environment data. A gateway repackages information to match the requirements of the destination system. Gateways can change the format of a message so that it will conform to the application program at the receiving end of the transfer.

WINDOWS SERVER 2003


INTRODUCTION Windows Server 2003, brings many new features and improvements that make the network administrators job easier. This chapter will briefly summarize whats new in 2003 and introduce you to the four members of the Windows Server 2003 family: the Web Edition, the Standard Edition, the Enterprise Edition, and the Datacenter Edition. Well also discuss how licensing works with Windows Server 2003, and provide a head up on some of the issues you might encounter when installing the new OS or upgrading from Windows 2000. WINDOWS 2003 FAMILY Windows Server 2003 comes in four editions : Windows Server 2003 Web Edition Standard Edition Enterprise Edition Datacenter Server

Each edition has its own benefits:

Web Edition is the least expensive and least functional version. However, if your server is only used for hosting Web pages, then it is a perfect choice. Standard Edition is the next step up from Web Edition. Most of the features in Windows Server 2003 are supported in Standard Edition. If you need features not provided by Standard Edition or hardware not supported on Standard Edition, then Enterprise Edition would be the next logical choice. Almost every feature in Windows Server 2003 is supported in Enterprise Edition. If you need to use Windows System Resource Manager or you need super powerful hardware, then Datacenter Edition is your only choice.

NEW FEATURES Microsoft has enhanced most of the features carried over from Windows 2000 Server and has added some new features for Windows Server 2003. For example: Active Directory has been updated to improve replication, management, and migrations. File and Print services have been updated to make them more dependable and quicker. The number of nodes supported in clustering has been increased and new tools have been added to aid in cluster management. Terminal Server better supports using local resources when using the Remote Desktop Protocol. IIS 6.0, Media Services 9.0, and XML services have been added to Windows Server 2003.

USERS AND GROUPS


USER: No one can work in a company, use any computer, or attach to any network without access to a user account. A user account is like the key to your car. Without the key, you cannot drive anywhere. EXPLORING USERS AND MANAGEMENT TOOLS: Windows Server 2003 ships with tools to manage local logon accounts and Active Directory accounts. These tools are Users and Passwords and Local Users and Groups on standalone machines (including workstations running Windows Server 2003 Professional) and member servers and Active Directory Users and Computers on domain controllers.

In the left pane, the snap-in loads the tree that represents the domain that you are managing. You can select a number of built-in folders, as the following list describes: The Built-in folder contains the built-in or default groups created as you installed Active Directory and promoted the server to a domain controller. The Computers folder contains any computers that are added to the domain you are managing. It is empty if you have not added any computers to the domain at this stage. The Domain Controllers folder always contains at least one computer . . . the domain controller on which you are currently working. The ForeignSecurityPrincipals folder is the default container for security identifiers (SIDs) associated with objects from other trusted domains. The Users folder contains built-in user and group accounts. The LostAndFound folder contains objects that have been orphaned. The System folder contains built-in system settings.

CREATING USER ACCOUNT : Select the domain, right-click the DCP OU, and choose New User from the pop-up menu. The New Object User dialog box opens, as shown in Fig

Adding the password to the New Object User dialog box.

SETTING PROPERTIES: After the account is created, you need to set the properties that define the users rights and privileges, access to resources, contact information, and so on. To access the property sheets of the user account object, simply double-click the account in Active Directory or right-click it and choose Properties from the context menu.

GROUP: Groups are collections of users, contacts, computers, and other groups (a process known as nesting). Groups are supported in Active Directory and in the local computers security subsystem.

GROUP ACCOUNTS: There are some of the predefined groups which are given as: Administrators. The only user account placed into this group at installation is the Administrator. Administrators do not get access to everyones files and folders by virtue of the wide power that they are given in this group. Users. The local Users group is the default group for any user account created in Windows Server 2003. Account Operators. This group gives wide administrative power to its members. Operators can create users and groups and can edit and delete most users and groups from the domain (permissions permitting). Backup Operators. Members can back up and restore systems, but they can use a backup program only to back up files and folders. They can also log on to domain controllers and backup servers and shut them down. Print Operators. Members can create, delete, and manage the print sharepoints on print servers. Server Operators. Members can manage member servers.

GROUP POLICY: The change-control tool on Windows Server 2003 is the Group Policy Object Editor (GPOE or just GPE). This application is an MMC snap-in from which policy can be applied to the security principalscomputer, users, and groupsof a Windows 2000 and Windows Server 2003 network.

LOCAL POLICY: The local policy governs the local accounts that you set up on the computer itself, in its native or machine-specific domain, but the local policy is overridden by the policies of higher precedence, unless you take the steps to avert that behavior.

CONFIGURATION AND CONNECTIVITY OF CLIENT WITH WINDOWS SERVER 2003


After understanding what a file system and partitioning was, we set up the client-server model by choosing Windows XP as a client and Windows Server 2003 as a Server. The installation mechanisms were understood and then a practice session of the installation was performed. Troubleshooting during the installation was one of the most interesting parts in the setup (e.g., the case of missing files). After the installation, the following actions were monitored : The Active Directory Users (forming the ADC) and the DNS was setup by performing a task of dcpromo in the command prompt of the server with the installation CD inserted. During the setup the server was given Domain name. Now install the XP as client on other pc to use it as a client. Client had to be in that Domain of the Server and also a member of the ADC to complete the setup of the client and server model.

Lastly for the execution of this model and to bring the Client in the domain of the server, connectivity of the client and server was required, which was the next step we performed.

DOMAIN NAME SYSTEM (DNS)


The heart of naming in AD is DNS. in a network of only Windows 2000 and later systems and applications united through an Active Directory domain. DNS is important, as you need it to find things on the Internet. DNS is, for those just joining us, a name resolution system invented in 1984 for the Internet. It enables you to point your Web browser to a friendly name such as www.continental.com. It makes e-mail work smoother and has proven itself to be an easily expanded way of maintaining names in the largest network in the world. DNSs ability to grow its scalabilityis a real plus for the Active Directory, as Microsoft hopes that the AD will be the basis of some very large networks. To summarize what happened when your local DNS server tried to resolve www.google.com: 1. First, your DNS server decided to find the google.com DNS server. 2. To find the google.com DNS server, your DNS server decided to look for the addresses of the com domains DNS servers, as com is google.coms parent domain. 3. To find the com domains DNS server, your DNS server decided to look for the root DNS servers. 4. It knew the IP addresses of the root DNS servers through its local root hints file. 5. Using the IP address of a root DNS server, it asked that root DNS server for the address of a DNS server for the com domain. 6. The root DNS server told your DNS server the addresses of the com domains DNS servers. 7. Your DNS server then took one of those addresses and asked that com DNS server for the addresses of the google.com DNS servers. 8. That DNS server for the com domain told your DNS server the addresses of google.coms two DNS servers. 9. Your DNS server then asked one of google.coms DNS servers to resolve the name www.google.com. 10. The google.com DNS server resolved the address, returning the IP address of www.google.com.

DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP)


Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked devices (clients) to obtain various parameters necessary for the clients to operate in an Internet Protocol (IP) network. By using this protocol, system administration workload greatly decreases, and devices can be added to the network with minimal or no manual configurations. The Microsoft Windows Server 2003 network operating system builds on the longstanding Microsoft support for the Dynamic Host Configuration Protocol (DHCP)an open, industry standard that reduces

the complexity of administering TCP/IP-based networks. Each host computer connected to a TCP/IP network must have a unique IP address. DHCP frees network administrators from manually configuring IP addresses for individual desktop computers. DHCP Features in Windows Server 2003: DHCP in Windows Server 2003 includes enhancements to RFCs 2131 and 2132, which make DHCP easier to deploy and manage than other implementations. These enhancements include: 1. Integration of DHCP with Domain Name System (DNS). 2. Enhanced monitoring and statistical reporting. 3. DHCP vendor-specific and class ID option support. 4. Multicast address allocation. 5. Unauthorized DHCP server detection. 6. Windows clustering for high availability. 7. Automatic and alternate client configuration. 8. Command-line management

DEFINING AND CONFIGURING SCOPES IN DHCP: Administrators create an administrative grouping of computers called a scope for each physical subnet. Administrators plan scopes based on the needs of specific groups of users, with appropriate lease durations defined for the related scopes. A scope has the following properties: 1. A range of possible IP addresses from which to include or exclude addresses used in DHCP service lease offerings. 2. A unique subnet mask to determine the subnet related to a given IP address. 3. A scope name assigned when the scope is created. 4. Lease duration values to be assigned to DHCP clients that receive dynamically allocated IP addresses. 5. Reservations. 6. Options.

FILE TRANSFER PROTOCOL (FTP) IMPLEMENATION IN SERVER 2003


Although the use of File Transfer Protocol is not the only way to send a file from one location to another, it is by far the most widely supported as far as the Internet is concerned. FTP was one of the original means of copying files from one location to another on the Internet, long before the days of graphical browsers, HTTP, and Web sites. In IIS 6, the FTP service now includes support for individual user directories. This feature can be used to permit access to private directories while preventing users from seeing or writing to directories other than their own An FTP server handles the process of transferring files from one computer to another Set Up An Ftp Server In Windows Server 2003 : Steps To Create Ftp Site:

Entering an FTP site description in the FTP Site Creation Wizard. Assigning IP addresses and ports in the FTP Site Creation Wizard. Setting user isolation options for a new FTP site. Setting the FTP site home directory in the FTP Site Creation Wizard. Setting access permissions in the FTP Site Creation Wizard i.e. read or write.

FTP Site Properties For example, you might want to have a logon message displayed to users connecting to your system, or you may want to limit the number of simultaneous users on your system. To open the

properties pages for your new FTP site, highlight the icon for your new site in the scope pane of iis.msc and then select Properties from the Action menu.

Fig: FTP site properties Security Account Properties

Fig: Editing security accounts properties

On an FTP server, there are generally two types of connection that users typically make: anonymous logins or user logins. Anonymous logins are overwhelmingly common on the Internet, and this is how most publicly accessible FTP servers run.

Exchange Server Features and Benefits


Email Exchange Server makes email much easier to use and administer. Centralized Address Lists: All email accounts are automatically added to the "Global Address List" which is available to all users. Centralized Groups: Groups of users (e.g. departments, committees etc.) can be created within ExchangeServer and then appear in the "Global Address List" which is available to all users when addressing email. Public Folders Public Folders are centralized folders that can be accessed by all users. Access to these folders can be restricted (by user or group) to provide whatever level of security is required. Public Folders can contain various kinds of information including contact info, appointments, Tasks, or Email. Some examples of public folders include: Contact information for clients/customers or vendors.

Calendars to schedule the use of shared resources like meeting rooms.

Group Enabled Outlook Features With Exchange Server, everything in Outlook becomes "shared". Your calendar, task list, inbox, etc. can all be viewed or modified by other users. You decide how much, if any, access you want to allow to your information. Meeting Planner Exchange Server features a Meeting Planner that enables you to select users for a meeting, checks each user's calendar to determine a free time, and then notifies each user and updates their calendars with the scheduled meeting. Out of Office Assistant Exchange Server provides a simple tool to notify others when you are out of the office. When you are preparing to be out of the office you can customize an email message, which will be automatically sent out when you receive email. You can even have your email forwarded to another person or mailbox so nothing falls through the cracks.

Outlook Web Access Outlook Web Access is Web browser based version of Outlook with almost all the same features. It enables you to access your email, calendar, contacts, etc. any time, from any computer, via the internet. Administration Exchange Server provides easier and more complete administration of email. With standard POP3 email, everything is stored on each users individual PC. With Exchange Server, all the data is stored in a database on the server. There are many benefits to this:

All email, contacts, calendars, etc. are included in the daily backup of the server. When a computer crashes or experiences a hard drive failure, the email will not be lost because it is stored on the server. If the server fails, the email can be restored from the backup.

When a user gets a new computer, you don't need to move the email data file and email address lists to the new computer. When you have Exchange Server you just configure the new PC which mailbox to access on the server.

Exchange server has some anti-spam features in place, adding another layer to your control of unwanted emails.

Vous aimerez peut-être aussi