SlideShare une entreprise Scribd logo
1  sur  163
Télécharger pour lire hors ligne
Network Administration
Course Code: CIT 324
Network Administration:
Network administration is about how to handle a network. A network
administrator has full rights, access and authorities to control network.
A network administrator is responsible for keeping an organization's
computer network up-to-date and operating as intended. Any
company or organization that uses multiple computers or software
platforms needs a network admin to coordinate and connect the
different systems.
Network:
A network is collection of different computing devices that are
connected in various ways in order to communicate and share available
resources. A computer network is defined as interconnection of two or
more computers. The well-known computer network is Internet. It is a
telecommunications network that allows computers to exchange data.
What is the main purpose of computer
networking?
▪ It enhances communication and availability of information.
▪ It allows for more convenient resource sharing.
▪ It makes file sharing easier.
▪ It is highly flexible.
▪ It is an inexpensive system.
▪ It increases cost efficiency.
▪ It boosts storage capacity.
Applications of Network:
▪ Sharing of resources such as printers.
▪ Sharing of expensive software and database.
▪ Communication from one computer to another computer.
▪ Exchange of data and information among users via network.
▪ Sharing of information over geographically wide areas.
Components of Computer Network:
▪ Two or more computers.
▪ Cables as links between the computers.
▪ A “Network Interface Card” (NIC) on each computer.
▪ Hub or Switch.
▪ “Operating System” on each computer.
Advantages of a network:
Following are some important advantages of computer networks:
▪ Networks are established to share different hardware resources. So, it
reduces costs and make it possible to take advantage of expensive
computer equipment.
▪ One copy of software can be shared over a network to multiple users.
So, it is money saving and increases productivity.
▪ On a network many programmers, developers and database
administrators can work on a same project by using remote
repositories.
▪ Computers and other computing devices on a network can exchange
their information and also be able to share their data.
Disadvantages of a network:
Following are some disadvantages of computer networks:
▪ If the network is not secure the user can get unauthorized access to
any computer connected on that network. Therefore, it poses a
security risk.
▪ If the network administrator did not conduct regularly checkups. It
allows many viruses such as malware or ransomware to corrupt the
files stored in a network.
▪ It is very expensive to setup in case of large networks.
▪ In some type of networks, we need a computer (super computer)
with high storage & processing speed to fulfil the requirements of a
server which is costly at all.
Uses of a network:
Following are some important uses of computer network:
▪ Networks are used to access shared data.
▪ Networks are used to share different devices such as printers and
hard disks etc.
▪ Networks are used to send email with attachments of files etc.
▪ Networks are used to interconnect computers and other computing
devices for exchange of information.
▪ Networks are used to communicate with different people all over
world easily.
▪ In some type of networks, one damaged computer or computing
device effects the whole network.
Roles of the Network:
▪ Network role is to provide the security to the hosts.
▪ Network role is to make the coordination between the different
hosts.
▪ Network role is to make efficient and reliable communication
between the hosts.
Types of Network:
Networks are categorized according to their size, covering area and
architecture.
Types according to their size & covering area:
▪ PAN (Personal Area network)
▪ LAN (Local Area network)
▪ WAN (Wide Area network)
▪ MAN (Metropolitan Area network)
LAN (Local Area network):
A type of network in which different computing devices are connected
in a limited geographical area in order to communicate and share
available resources is known as local area network.
For example, a locally placed network of home, office, computer lab of
a school (college or university) and the network of closely positioned
group of buildings are all the examples of local area network.
MAN (Metropolitan Area network):
A type of network in which different computing devices are connected
within city in order to communicate and share available resources is
known as metropolitan area network. This type of network covers an
area of a city. It is usually used to connect two or more LANs in a city.
For example, a network placed within any city or the network
connecting different branches of a company in the same city are
examples of metropolitan area network.
PAN (Personal Area network):
A type of network in which different personal computing devices and
different technological devices are connected in a limited
geographical area (that typically extends to 10 meters) for
communication is known as personal area network.
For example, a network established for communication between
different personal devices, such as computers, laptops and mobiles are
all the examples of personal area network.
WAN (Wide Area network):
WAN stands for Wide Area Network. This type of network covers a
large geographical area. It connects computers and other devices in
different cities and countries. WAN usually consists of several LANs
connected together. It is relatively larger than LAN and extends across a
city or a metropolitan. The best-known wide area network is the
internet.
Introduction to Client and Server Environment:
A client is basically a consumer of service and Server is a provider of
services . A client requests some service from the server and the server
provides the required services to the client.
Client Server
Request
Response
Terminal Computer (User or Client Computer):
Every computer that is part of a computer network is called a terminal
or node. The users (clients) using different terminal computers can
share information and send or receive data from one terminal to
another.
Server Computer:
A server computer in a computer network is used as a central
computer. It controls other computers in the network. Server computer
is more powerful than terminals.
Different Network Models:
Types according to Network Architecture:
There are two models (architectures) of computer networks. These are as
follows:
▪ Client Server Architecture.
▪ Peer-to-Peer Architecture.
▪ Hybrid Architecture.
Client Server Architecture:
In client-server model, one or more computers work as servers and other
computers work as clients. The server computer controls the whole network.
The client computer requests a service from the server computer. The server
computer provides the requested service to the client computer.
The client server architecture is based on hardware and software
components that interacts to form system.
Client server architecture includes three
components:
▪ Client
▪ Server
▪ Communication middleware
Client:
The client is any computer process that requests services from the server.
The client is a terminal that accesses the resources available on a server.
Server:
The server is any computer process providing services to the clients.
The server is a terminal with high processing power which provides
services for the other computers on the network.
Communication middleware:
It is any computer process through which clients and servers
communicate. It is mode up of several layers of software that aid the
transmission of data and control information between clients and
servers.
Middleware Standards:
Some popular middleware standards are as under:
▪ CORBA (Common Object Request Broker Architecture).
▪ COM or DCOM.
CORBA:
CORBA (Common Object Request Broker Architecture) used de facto
network standard. CORBA is being promoted by Object Management
Group (OMG).
COM or DCOM:
COM/DCOM is being promoted by Microsoft alone.
Types of client server architecture:
▪ One-Tier Client Server.
▪ Two-Tier Client Server.
▪ Three-Tier Client Server.
One-Tier Client Server:
One tier architecture involves putting all of the required components
for the software application or technology on a single server or
platform. One-tier architecture is also known as single tier architecture.
Two-Tier Client Server:
The simplest way to connect clients and servers is a two-tier
architecture. In a two-tier architecture, any client can get service from
any server by initiating a request over the network. With two-tier
client-server architecture, the user interface is located in the user's
desktop and the services are usually supported by a machines that can
service many clients.
Three-Tier Client Server:
The three-tier architecture overcomes the important limitations of the
two-tier architecture. In the three-tier architecture, a middleware was
added between the user system interface client environment and the
server environment. The middleware keeps track of all server locations.
It also translate clients requests into server understandable form.
Advantages of Client Server Architecture:
Some important advantages of client-server architecture (model) are as
follows:
▪ It reduces the volume of data traffic on the network.
▪ It also provides faster responses to the clients.
▪ It can use less powerful computers as clients because most of the
processing is done by the server computer.
Disadvantages of Client Server Architecture:
▪ It is expensive model because server computers are costly.
▪ The operations stop all over the network when server goes down.
Peer-to-Peer Architecture:
In a peer-to-peer architecture every computer is a client and every
computer is a server. All computers in peer-to-peer model
(architecture) have same status. There is no server computer to control
other computers. Each computer in this network can have access to the
devices and files on the other computers. Each computer
independently store its own software and information. Each node on
this network has full control over the network resources.
Advantages of Peer-to-Peer Architecture:
Some important advantages of peer-to-peer architecture (model) are as
follows:
▪ It is easy to setup.
▪ It is easy to maintain.
▪ It not require expensive server computer.
▪ It is suitable for small office of ten or less computers.
Disadvantages of Peer-to-Peer Architecture:
▪ Heavy use can slow down the network speed.
▪ It also provides less security of data because files are stored at different
locations in the network.
Hybrid Architecture:
Hybrid model is a combination of “client and server architecture” and
“peer-to-peer architecture”. Many networks use a mixture of both
network architectures. This model can provide the advantages of both
architectures.
Some Important Concepts:
Internet:
Internet is a huge collection of computers all over the world that are all
connected to one another. It is a global network of computers. It is an
example of WAN.
Intranet:
Intranet is a private and secure business network. It uses Internet technology
to provide information to the employees of the organization. It is a network
within an organization.
Extranet:
Extranet is a collection of two or more intranets. It is a network outside an
organization.
Network Protocol:
Network protocol or communication protocol is a set of rules for
exchanging information between computers on a network. The devices
in a network cannot communicate without a protocol.
Physical Structure of Network:
Topology:
Shape of a network is known as topology. The physical layout or
arrangement of connected devices in a network is called topology. A
network topology is the arrangement with which computer systems or
network devices are connected to each other. Topologies may define
both physical and logical aspect of the network. Different network
topologies are as follows:
▪ Bus Topology.
▪ Ring Topology.
▪ Star Topology.
▪ Mesh Topology.
▪ Tree Topology (Hybrid Topology).
Bus topology (Line Topology):
Bus topology is the simplest type of network. It supports a small
number of computers. In bus topology, all computers or network nodes
are connected to a common communication medium. This medium is
often a central wire known as “bus” or “backbone cable”. The
terminators are used at the end of a bus to absorb signals. A collision
can occur in bus topology if two computers transmit data at same time-
Bus topology is mostly used in peer-to-peer networks.
Working of Bus Network:
The sending computer sends the data and destination address through
the bus. The data and address move from one computer to the other in
the network. Each computer checks the address. If it matches with the
address of a computer, the computer keeps the data. Otherwise the
data moves to the next computer.
Disadvantages of Bus Network:
▪ It is difficult to troubleshoot.
▪ It only supports small number of computers.
▪ The network speed slows down as the number of computers
increases.
Advantages of Bus Network:
▪ It is simple and easy to use.
▪ It requires small length of cable to connect computers.
▪ It is less expensive.
▪ It is easy to extend a bus. It allows more computers to join network.
▪ If one node fails, it does not affect the rest of the network.
Ring topology:
In ring topology, each computer is connected to the next computer
with the last one connected to the first. Thus, a ring of computers is
formed.
Working of Ring Network:
Every computer is connected to next computer in a ring. Each
computer receives message from the previous computer and transmits
it to the next computer. The message flows in one direction. The
message is passed around the ring until it reaches the correct
destination computer.
Disadvantages of Ring Network:
▪ Failure of one computer in the ring can affect the whole network.
▪ It is difficult to troubleshoot.
▪ Adding or removing computers affect the whole network.
Advantages of Ring Network:
▪ It is less expensive than star topology.
▪ Every computer has equal access to the network.
Star topology:
All computers in Star topology are connected With central device called
"hub" or "switch". Star topology is mostly used in client-server
networks.
Working of Star Network:
The sending computer sends the data to hub. The hub sends data to
the receiving computer. Each computer in star network communicates
with a central hub.
Disadvantages of Star Network:
▪ If central hub fails, the entire network breaks down.
▪ It requires a large length of cable to connect computers.
▪ It is more expensive.
Advantages of Star Network:
▪ It is easy to maintain and modify network
▪ Adding or removing computers can be done without disturbing the
network.
▪ Finding faults becomes very simple.
▪ Single computer failure does not bring down the whole network.
▪ It is more flexible than other topologies.
Mesh topology with its working:
In a mesh topology, every device in the network is physically connected
to every other device in the network. A message can be sent on
different possible paths from source to destination. Mesh topology
provides improved performance and reliability. Mesh networks are not
used much in local area networks. It is mostly used in wide area
networks.
Disadvantages of Mesh Network:
▪ A full mesh network can be very expensive.
▪ It is difficult to install and reconfigure.
Advantages of Mesh Network:
▪ The use of dedicated link guarantees that each connection can carry
its own data load. It eliminates traffic problem.
▪ If one link becomes unusable, it does not harm the entire system.
▪ It is easy to troubleshoot.
Tree topology with its working (Hybrid Topology):
A tree topology combines the characteristics of bus and star topologies.
It consists of different groups of computers attached in star topology.
The groups are then connected to a bus backbone cable. Tree topology
is used for the expansion of an existing network.
Disadvantages of Tree Network:
▪ Overall length of each segment is limited by the type of cabling used.
▪ If the backbone line breaks, the entire segment down.
▪ It is more difficult to configure and wire than other topologies.
Advantages of Tree Network:
▪ It provides point-to-point wiring for individual segments.
▪ It is supported by several hardware and software vendors.
Types of Server:
▪ Web Server.
▪ File Server.
▪ Print Server.
▪ Application Server.
▪ Mail Server.
▪ Proxy Server.
▪ Message Server.
▪ Database Server.
Web Server:
A web server is a computer that runs website. The basic objective of
the web server is to store, process and deliver web pages to the users.
This intercommunication is done using Hypertext Transfer Protocol
(HTTP).
File Server:
A file server is a server that provides access to files. It acts as a
central file storage location that can be accessed by multiple systems.
The main function of a file server is to enable multiple users to access
the stored files and free storage space.
Print Server:
A print server, or printer server, is a device which provide us printing
services which connects printers to computers over a network.
All print jobs are sent from the computer to the server, which then
sends the print job out to a printer.
Application Server:
An application server is designed to install, operate and host
applications in a network or in an organization. It helps the clients in a
network to run the applications in an easy and the effective way.
Mail Server:
A mail server (or email server) is a computer system that sends and
receives email. For example, the SMTP protocol sends messages and
handles outgoing mail requests.
Proxy Server:
A proxy server provides a gateway between users and the internet. It is
a server, referred to as an “intermediary” because it goes between
end-users and the web pages they visit online. Enhanced
security: Proxy servers can act like a firewall between your system and
the internet. So that hackers cannot access your system.
Message Server:
It is used to co-ordinate the interaction between users, documents and
applications. The data can be used in audio, video, binary, text or
graphics.
Database Server:
It is a type of application server. It allows the user to access the
centralized strong database.
Major Features and functions of the windows
server 2008:
▪ Active Directory.
▪ Server manager.
▪ Server Core.
▪ Windows Server 2008 Hyper-V.
▪ The Failover Cluster Management tool.
▪ The Disk Management console.
Active Directory:
Active Directory provides the structure to centralize the network and
store information about network resources across the entire
domain. Active Directory uses Domain Controllers to keep this
centralized storage available to network users.
Server Manager:
Server Manager is a single solution that is used as a single source for
managing identity and system information. Server Manager is enabled
by default when a Windows 2008 server is installed.
Serve Manager Button:
Server Manager Interface:
Server Core:
▪ Server Core is such a feature in which you can perform your tasks by
entering the commands.
▪ Less resources are require to install server core version.
▪ But you have to type a command to perform the every task in the
server 2008.
During Installation:
Server core 2008 Interface:
Windows Server 2008 Hyper-V:
Windows Server 2008 Hyper-V is the hypervisor-based virtualization
feature included as a role of Windows Server 2008. It contains
everything needed to create a virtual network. These virtual networks
enable IT organizations to reduce costs, to improve server utilization.
Failover Cluster Management tool:
▪ Failover support ensures that a business intelligence system remains
available for use if an application or hardware failure
occurs. Clustering provides failover support in two ways: Load
redistribution: When a node fails, the work for which it is responsible
is directed to another node or set of nodes.
▪ The Failover Cluster Management tool included with Windows Server
2008 allows you to create and manage server clusters. ...
A cluster allows you to establish high availability for general services
or for specific applications.
Disk Management Console:
The Disk Management console in Windows Server 2008 lets you
manage not only the local hard disks but also drives on other
computers running any version of Windows 2000, Windows XP,
Windows Server 2003, Windows Vista, or Windows Server 2008,
allowing an administrator to manage disk tasks and space allocations
from a workstation without having to sit at the computer that is being
administered.
Steps to install DNS in the Server 2008:
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
Step 7:
Step 8:
Step 9:
Step 10:
Step 11:
Step 12:
DHCP Installation:
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
Step 7:
Step 8:
Step 9:
IP address and its versions:
IP address stands for Internet Protocol Address IP address is the unique
Identification of a device over the internet. It is also called logical
address. There are now two versions of IP address.
▪ IPv4 addresses are 32 bits long.
▪ IPv6 addresses 128 bits long.
Difference between Static and Dynamic IP:
Private vs Public IP address:
What is the static and the dynamic IP?
▪ Static means staying the same. It is the IP which administrator have to
configure in every computer.
▪ Dynamic IP is that IP which is given by the DHCP. It is changed with
the time. Dynamic IP is more secure because it is changed according
to time.
Steps to Configure IP on Sever 2008:
MAC address:
A MAC(Media Access Control Address) address is a hardware
identification number that uniquely identifies each device on a
network. The MAC address is assigned by the company of a device
Classes of IP Address:
IP address:
IP Address is a “Unique Identification” of a device over the internet. IP
address is 32 bit.
There are basically five classes of IP address:
▪ Class A
▪ Class B
▪ Class C
▪ Class D
▪ Class E
IP address have four octet:
Subnet Mask:
Subnet mask tell us that how many networks and host bit in the IP
address subnet mask is used to divide an IP address into two parts.
One part identifies the host (computer), the other part identifies the
network to which it belongs.
NAT (Network Address Translation):
NAT stands for the “Network Address Translation”. It is a process in
which private IP address is converted into public IP address, so that,
private IP address can also be used in internet. We use NAT so that we
can save IP address.
Translation (NAT) is a process in which one or more local IP address is
translated into one or more global IP address and vice versa in order to
provide Internet access to the local hosts.
Static NAT: In static NAT one Private IP address is converted into one
Public IP address.
Dynamic NAT: Dynamic network address translation (Dynamic NAT) is a
technique in which multiple public Internet Protocol (IP) addresses are
mapped and used with an internal or private IP address.
Use dynamic NAT to translate a set of unregistered IP addresses to a
smaller set of registered addresses.
Static vs Dynamic NAT:
Static NAT provides a permanent mapping between the internal and
the public IP address.
Dynamic NAT is used when you have a “pool” of public IP addresses
that you want to assign to your internal hosts dynamically.
Advantages of NAT:
▪ IP address spaces can be saved because many hosts connect to the
global Internet by using a single dynamic external IP address.
▪ Private IP addresses can be reused.
▪ The security of private networks can be enhanced by hiding the
internal addresses from external networks.
Disadvantages of NAT:
▪ Network Address Translation (NAT) consumes the processor and
memory because NAT need to translate IPv4 addresses for all
incoming and outgoing IPv4 datagram and to keep the translation
details in memory.
▪ It slows down the network performance, therefore it creates a
problem in real-time protocols.
What is print management?
Microsoft Management Console (MMC) that enables you to install,
view and manage all of the printers in your organization from any
computer running Windows Server.
Active directory:
An active directory is the Database of users groups, services and
resources. It is basically centralized database of users, groups, services
and resources. These are also known as the object and the collection of
these objects is called active directory.
Benefits of Active directory:
▪ Multimaster Authentication and Multimaster Replication (The ability
to access and modify the ADDS from multiple points of
administrations).
▪ A single point of access to the network resources.
▪ Ability to create trust relationship with external network.
Active directory 2008 new features:
▪ Introduction to read-only domain controller.
▪ Introduction to Server Core (Change Services through the CMD means
that which is only operated by using the command).
▪ Auditing of the Active directory modifications and deletions.
▪ Ability to start active directory as a services(You don't have to down
the domain controller).
▪ Active Directory Recycle Bin.
▪ Active Directory Administrative Center.
▪ Active Directory Web Services.
▪ Offline Domain Join.
▪ Managed Service Accounts.
What is the difference between a domain
controller and Active Directory?
They are two separate things. A domain controller is the main
computer/server that runs your domain. Active Directory is the system
that runs on your domain controller and runs your domain. It stores all
the users, computers on your domain.
Active directory Domain Controller(ADDC):
The server where the active directory is installed is called active
directory domain controller. A domain controller is a server that
responds to authentication requests and verifies users on computer
networks.
Categories of active directory objects:
▪ Container Objects.
▪ Leaf Objects.
Container objects:
Container objects are the such objects which can contain the other
objects.
For example:
▪ Forest.
▪ Tree.
▪ Domain.
▪ OU.
Leaf Objects:
Leaf Objects are the objects which cannot contain the other objects in
it.
For example:
▪ User.
▪ Computer.
▪ Printer. Etc.
What is active directory domain?
In Active Directory terms, a domain is an area of a network organized
by a single authentication database. In other words, an Active
Directory domain is essentially a logical grouping of objects on a
network. Domains are created so IT teams can establish administrative
boundaries between different network entities.
Domain:
▪ Domain is the logical groups of the computers.
▪ Share a central active directory database.
▪ Running different versions of Microsoft operating systems on the
computers .
▪ Domain is represented by the triangle.
A domain is defined as a logical group of network objects (computers,
users, devices) that share the same Active Directory database.
Doma
in
Domain
Domain Diagram:
What are the tree objects?
▪ Tree objects are logical group of network resources and devices.
▪ Can contain one or more domains configured in the parent child
relationship. (by using same name namespaces)
▪ It is the collection of two or more domain which uses same name
spaces and there is a parent child relationship within the tree.
Diagram and name spaces:
Active directory forest:
Active directory forest is the collection of one or more tree and it is the
largest container object in the active directory environment.
User can access the all forest in the active directory by using the single
username and password.
Diagram:
What is OU?
OU is stands for the Organizational Unit. It is the
smallest container object in the active directory.
OUs are Active Directory (AD) containers that hold
other AD objects.
Organizational Units are useful when you want to
deploy group policy settings to a subset of users,
groups, and computers within your domain. OU
OU
OU OU OU
OU
Domain
What is FQDN?
A fully qualified domain name (FQDN) is the complete domain
name for a specific computer or host on the internet.
The FQDN consists of two parts: the hostname and the domain name.
What is “User” in Active Directory?
User accounts are created and stored as objects in Active
Directory Domain Services. User accounts can be used by
human users or programs such as system services use to log on to a
computer. Each user or application that accesses resources in a
Windows domain must have an account in the Active Directory server.
What is meant by Exchange Server?
Microsoft Exchange Server is a mail server and
calendaring server developed by Microsoft. It mostly runs on
Windows Server operating systems.
What is the difference between Windows
server and Exchange server?
The main difference between Windows Server and Exchange Server is
that Windows Server refers to Microsoft server operating system
while Exchange Server is a mail server and calendaring server that runs
on Windows Server Operating Systems. Windows Server and Exchange
Server are two Microsoft products.
What is the mailbox server?
▪ Mailbox servers contain mailbox databases that process, render, and
store data.
▪ Mailbox Server role hosts mailbox databases where user and
resource mailboxes are stored.
Diagram:
What is the mailbox management?
▪ Email management is a systematic approach to
maximizing the efficiency of email practices and
minimizing the negative effects that email handling
can have on an individual's productivity and job
satisfaction.
▪ This tool lets you check for messages that are older
than a specified age and move those messages into a
folder. Mailbox Manager can then automatically
delete the messages the next time it runs.
Installation and Deployment of the
mailbox server role.
.
What is PUBLIC folder?
Public folders are designed for shared access and
provide an easy and effective way to collect, organize,
and share information with other people in your
workgroup or organization. Public folders help organize
content in a deep hierarchy that's easy to browse.
Method to create Public Folder:
What is address list?
An address list is a collection of mail-enabled recipient objects in
exchange Online. Address lists are based on recipient filters. You can
filter by recipient type (for example, mailboxes and mail contacts) and
recipient properties (for example: Company or State or Province).
What is exchange management shell?
The Exchange Management Shell is built on Windows Power
Shell technology and provides a powerful command-line interface that
enables the automation of Exchange administration tasks
Steps to open Exchange Management Shell:
▪ Open the Exchange Management Shell in Windows Server 2016.
▪ Click Start > Microsoft Exchange Server 2016 > Exchange
Management Shell.
Benefits of exchange management shell:
▪ The Exchange Management Shell also provides a “robust”(The Ability
to remove errors during the execution of the program) and flexible
scripting platform.
▪ Reduce the complexity of current Microsoft Visual Basic scripts,
improving the efficiency of the tasks being run. Tasks that previously
required many lines in Visual Basic scripts can now be done by using
as little as one line of code.
▪ By taking advantage of the Exchange Management Shell's capabilities,
you are now able to create new email accounts and configure store
database properties.
What is RBAC?
Role Based Access Control (RBAC) is the permissions model used in
Microsoft Exchange Server 2013. In Exchange 2013, RBAC
now controls both the administrative tasks that can be performed and
the extent to which users can now administer their own mailbox and
distribution groups.
What is the RBAC?
Role-based access control (RBAC) restricts network access based on a
person's role within an organization and has become one of the main
methods for advanced access control. The roles in RBAC refer to the
levels of access that employees have to the network.
Benefits Of RBAC:
With hundreds or thousands of employees, security is more easily
maintained by limiting unnecessary access to sensitive
information based on each user's established role within the
organization. Other advantages include: Reducing administrative work
and IT support.
What is the Load Balancing?
Load balancing is the process of distributing network traffic across
multiple servers. This ensures no single server bears too much demand.
It also increases availability of applications and websites for users.
What is RAS?
A remote access service connects a client to a host computer, known as
a remote access server. The most common approach to this service
is remote control of a computer by using another device which needs
internet or any other network connection.
For example we control our home computer by sitting in our office by
using internet connection.
What is DNS and its purpose?
DNS stands for Domain Name System. The main function of DNS is to
translate domain names into IP Addresses, which computers can
understand. It also provides a list of mail servers which accept Emails
for each domain name.
What is the difference between DNS and
WINS?
WINS stands for Windows Internet Name Service and DNS stands for
Domain Name System. As the name suggests, WINS is specifically for
devices based on Windows, like PC’s or laptops or NT servers. On the
other hand, DNS is mainly for servers and network devices.
What is an event viewer?
The Event Viewer is a tool in Windows that displays detailed
information about significant events on your computer. Event Viewer
can be helpful when troubleshooting problems and errors in windows
and the other programs.
Steps to open the event viewer:
Step 1:
Event Viewer:
Types of events:
▪ Application event.
▪ Security event.
▪ Setup event.
▪ System event.
▪ Forwarded event.
Event is every thing that occurs in a computer system.
Something that happens is an event. For example the pressing the
keyboard button and movement of the mouse.
What is the application event?
Application event is used to record events written by applications and
services. The applications may be commercial applications, like SQL
Server or Exchange server.
What is the purpose of an security event?
Security event is used to record events related to security, such as
logon attempts and resource access.
What is the purpose of the setup event?
Setup event creates log files for all actions that occur during
installation. If you are experiencing problems installing Windows,
consult the log files to troubleshoot the installation.
What is the purpose of the system event?
System log files may contain information about device changes, device
drivers and system changes or events.
Example: For example if we change our system time then log file will be
created in the system event about changing the time.
What is the purpose of forwarded event in
event viewer?
Forwarded event records events written by other computers in the
same network. By using the Forwarded Events log, you can keep track
of the event logs of several other computers from one central location.
What is troubleshooting?
Troubleshooting is the process of diagnosing the source of a problem.
It is used to fix problems with hardware, software, and many other
products.
Troubleshooting is a form of problem solving, often applied to repair
failed products or processes on a machine or a system.

Contenu connexe

Tendances

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and softwareavinash gupta
 
Chapter1 introduction to computer systems
Chapter1 introduction to computer systemsChapter1 introduction to computer systems
Chapter1 introduction to computer systemsMuhammad Waqas
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsShweta Shah
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating SystemImtiaz Ahmed
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configurationRohit Phulsunge
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating systemMohammad Alam
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating SystemLuka M G
 
Install and configure linux
Install and configure linuxInstall and configure linux
Install and configure linuxVicent Selfa
 
IP tables,Filtering.pptx
IP tables,Filtering.pptxIP tables,Filtering.pptx
IP tables,Filtering.pptxAyeCS11
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linuxnejadmand
 

Tendances (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Types of server
Types of serverTypes of server
Types of server
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Os ppt
Os pptOs ppt
Os ppt
 
System software and Application software
System software and Application softwareSystem software and Application software
System software and Application software
 
computer hardware and software
computer hardware and softwarecomputer hardware and software
computer hardware and software
 
Operating systems
Operating systems Operating systems
Operating systems
 
Chapter1 introduction to computer systems
Chapter1 introduction to computer systemsChapter1 introduction to computer systems
Chapter1 introduction to computer systems
 
Basic Server PPT (THDC)
Basic Server PPT (THDC)Basic Server PPT (THDC)
Basic Server PPT (THDC)
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
introduction To Operating System
introduction To Operating Systemintroduction To Operating System
introduction To Operating System
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Install and configure linux
Install and configure linuxInstall and configure linux
Install and configure linux
 
IP tables,Filtering.pptx
IP tables,Filtering.pptxIP tables,Filtering.pptx
IP tables,Filtering.pptx
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linux
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Web
Web Web
Web
 

Similaire à Network administration Book

unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfshubhangisonawane6
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First SemesterHem Pokhrel
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 aEashaGupta
 
Lesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxLesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxMonarGAngeles
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317Khondoker Sadia
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networkingsaritasingh19866
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.pptAssemNazirova2
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
 
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxINTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxGajananBhusare5
 
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxINTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxraja653423
 

Similaire à Network administration Book (20)

unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Lesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptxLesson 2-Introduction to Network.pptx
Lesson 2-Introduction to Network.pptx
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
 
unit 4-1.pptx
unit 4-1.pptxunit 4-1.pptx
unit 4-1.pptx
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.ppt
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
 
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxINTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
 
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptxINTRODUCTION_TO_COMPUTER_NETWORKS.pptx
INTRODUCTION_TO_COMPUTER_NETWORKS.pptx
 

Dernier

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Dernier (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Network administration Book

  • 2. Network Administration: Network administration is about how to handle a network. A network administrator has full rights, access and authorities to control network. A network administrator is responsible for keeping an organization's computer network up-to-date and operating as intended. Any company or organization that uses multiple computers or software platforms needs a network admin to coordinate and connect the different systems.
  • 3. Network: A network is collection of different computing devices that are connected in various ways in order to communicate and share available resources. A computer network is defined as interconnection of two or more computers. The well-known computer network is Internet. It is a telecommunications network that allows computers to exchange data.
  • 4. What is the main purpose of computer networking? ▪ It enhances communication and availability of information. ▪ It allows for more convenient resource sharing. ▪ It makes file sharing easier. ▪ It is highly flexible. ▪ It is an inexpensive system. ▪ It increases cost efficiency. ▪ It boosts storage capacity.
  • 5. Applications of Network: ▪ Sharing of resources such as printers. ▪ Sharing of expensive software and database. ▪ Communication from one computer to another computer. ▪ Exchange of data and information among users via network. ▪ Sharing of information over geographically wide areas. Components of Computer Network: ▪ Two or more computers. ▪ Cables as links between the computers. ▪ A “Network Interface Card” (NIC) on each computer. ▪ Hub or Switch. ▪ “Operating System” on each computer.
  • 6. Advantages of a network: Following are some important advantages of computer networks: ▪ Networks are established to share different hardware resources. So, it reduces costs and make it possible to take advantage of expensive computer equipment. ▪ One copy of software can be shared over a network to multiple users. So, it is money saving and increases productivity. ▪ On a network many programmers, developers and database administrators can work on a same project by using remote repositories. ▪ Computers and other computing devices on a network can exchange their information and also be able to share their data.
  • 7. Disadvantages of a network: Following are some disadvantages of computer networks: ▪ If the network is not secure the user can get unauthorized access to any computer connected on that network. Therefore, it poses a security risk. ▪ If the network administrator did not conduct regularly checkups. It allows many viruses such as malware or ransomware to corrupt the files stored in a network. ▪ It is very expensive to setup in case of large networks. ▪ In some type of networks, we need a computer (super computer) with high storage & processing speed to fulfil the requirements of a server which is costly at all.
  • 8. Uses of a network: Following are some important uses of computer network: ▪ Networks are used to access shared data. ▪ Networks are used to share different devices such as printers and hard disks etc. ▪ Networks are used to send email with attachments of files etc. ▪ Networks are used to interconnect computers and other computing devices for exchange of information. ▪ Networks are used to communicate with different people all over world easily. ▪ In some type of networks, one damaged computer or computing device effects the whole network.
  • 9. Roles of the Network: ▪ Network role is to provide the security to the hosts. ▪ Network role is to make the coordination between the different hosts. ▪ Network role is to make efficient and reliable communication between the hosts.
  • 10. Types of Network: Networks are categorized according to their size, covering area and architecture. Types according to their size & covering area: ▪ PAN (Personal Area network) ▪ LAN (Local Area network) ▪ WAN (Wide Area network) ▪ MAN (Metropolitan Area network)
  • 11. LAN (Local Area network): A type of network in which different computing devices are connected in a limited geographical area in order to communicate and share available resources is known as local area network.
  • 12. For example, a locally placed network of home, office, computer lab of a school (college or university) and the network of closely positioned group of buildings are all the examples of local area network. MAN (Metropolitan Area network): A type of network in which different computing devices are connected within city in order to communicate and share available resources is known as metropolitan area network. This type of network covers an area of a city. It is usually used to connect two or more LANs in a city. For example, a network placed within any city or the network connecting different branches of a company in the same city are examples of metropolitan area network.
  • 13. PAN (Personal Area network): A type of network in which different personal computing devices and different technological devices are connected in a limited geographical area (that typically extends to 10 meters) for communication is known as personal area network.
  • 14. For example, a network established for communication between different personal devices, such as computers, laptops and mobiles are all the examples of personal area network.
  • 15. WAN (Wide Area network): WAN stands for Wide Area Network. This type of network covers a large geographical area. It connects computers and other devices in different cities and countries. WAN usually consists of several LANs connected together. It is relatively larger than LAN and extends across a city or a metropolitan. The best-known wide area network is the internet.
  • 16. Introduction to Client and Server Environment: A client is basically a consumer of service and Server is a provider of services . A client requests some service from the server and the server provides the required services to the client. Client Server Request Response
  • 17. Terminal Computer (User or Client Computer): Every computer that is part of a computer network is called a terminal or node. The users (clients) using different terminal computers can share information and send or receive data from one terminal to another. Server Computer: A server computer in a computer network is used as a central computer. It controls other computers in the network. Server computer is more powerful than terminals.
  • 18. Different Network Models: Types according to Network Architecture: There are two models (architectures) of computer networks. These are as follows: ▪ Client Server Architecture. ▪ Peer-to-Peer Architecture. ▪ Hybrid Architecture. Client Server Architecture: In client-server model, one or more computers work as servers and other computers work as clients. The server computer controls the whole network. The client computer requests a service from the server computer. The server computer provides the requested service to the client computer.
  • 19. The client server architecture is based on hardware and software components that interacts to form system. Client server architecture includes three components: ▪ Client ▪ Server ▪ Communication middleware Client: The client is any computer process that requests services from the server. The client is a terminal that accesses the resources available on a server.
  • 20. Server: The server is any computer process providing services to the clients. The server is a terminal with high processing power which provides services for the other computers on the network. Communication middleware: It is any computer process through which clients and servers communicate. It is mode up of several layers of software that aid the transmission of data and control information between clients and servers. Middleware Standards: Some popular middleware standards are as under: ▪ CORBA (Common Object Request Broker Architecture). ▪ COM or DCOM.
  • 21. CORBA: CORBA (Common Object Request Broker Architecture) used de facto network standard. CORBA is being promoted by Object Management Group (OMG). COM or DCOM: COM/DCOM is being promoted by Microsoft alone. Types of client server architecture: ▪ One-Tier Client Server. ▪ Two-Tier Client Server. ▪ Three-Tier Client Server.
  • 22. One-Tier Client Server: One tier architecture involves putting all of the required components for the software application or technology on a single server or platform. One-tier architecture is also known as single tier architecture. Two-Tier Client Server: The simplest way to connect clients and servers is a two-tier architecture. In a two-tier architecture, any client can get service from any server by initiating a request over the network. With two-tier client-server architecture, the user interface is located in the user's desktop and the services are usually supported by a machines that can service many clients.
  • 23. Three-Tier Client Server: The three-tier architecture overcomes the important limitations of the two-tier architecture. In the three-tier architecture, a middleware was added between the user system interface client environment and the server environment. The middleware keeps track of all server locations. It also translate clients requests into server understandable form. Advantages of Client Server Architecture: Some important advantages of client-server architecture (model) are as follows:
  • 24. ▪ It reduces the volume of data traffic on the network. ▪ It also provides faster responses to the clients. ▪ It can use less powerful computers as clients because most of the processing is done by the server computer. Disadvantages of Client Server Architecture: ▪ It is expensive model because server computers are costly. ▪ The operations stop all over the network when server goes down.
  • 25. Peer-to-Peer Architecture: In a peer-to-peer architecture every computer is a client and every computer is a server. All computers in peer-to-peer model (architecture) have same status. There is no server computer to control other computers. Each computer in this network can have access to the devices and files on the other computers. Each computer independently store its own software and information. Each node on this network has full control over the network resources.
  • 26. Advantages of Peer-to-Peer Architecture: Some important advantages of peer-to-peer architecture (model) are as follows: ▪ It is easy to setup. ▪ It is easy to maintain. ▪ It not require expensive server computer. ▪ It is suitable for small office of ten or less computers. Disadvantages of Peer-to-Peer Architecture: ▪ Heavy use can slow down the network speed. ▪ It also provides less security of data because files are stored at different locations in the network.
  • 27. Hybrid Architecture: Hybrid model is a combination of “client and server architecture” and “peer-to-peer architecture”. Many networks use a mixture of both network architectures. This model can provide the advantages of both architectures.
  • 28. Some Important Concepts: Internet: Internet is a huge collection of computers all over the world that are all connected to one another. It is a global network of computers. It is an example of WAN. Intranet: Intranet is a private and secure business network. It uses Internet technology to provide information to the employees of the organization. It is a network within an organization. Extranet: Extranet is a collection of two or more intranets. It is a network outside an organization.
  • 29. Network Protocol: Network protocol or communication protocol is a set of rules for exchanging information between computers on a network. The devices in a network cannot communicate without a protocol.
  • 30. Physical Structure of Network: Topology: Shape of a network is known as topology. The physical layout or arrangement of connected devices in a network is called topology. A network topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Different network topologies are as follows: ▪ Bus Topology. ▪ Ring Topology. ▪ Star Topology. ▪ Mesh Topology. ▪ Tree Topology (Hybrid Topology).
  • 31. Bus topology (Line Topology): Bus topology is the simplest type of network. It supports a small number of computers. In bus topology, all computers or network nodes are connected to a common communication medium. This medium is often a central wire known as “bus” or “backbone cable”. The terminators are used at the end of a bus to absorb signals. A collision can occur in bus topology if two computers transmit data at same time- Bus topology is mostly used in peer-to-peer networks.
  • 32. Working of Bus Network: The sending computer sends the data and destination address through the bus. The data and address move from one computer to the other in the network. Each computer checks the address. If it matches with the address of a computer, the computer keeps the data. Otherwise the data moves to the next computer.
  • 33. Disadvantages of Bus Network: ▪ It is difficult to troubleshoot. ▪ It only supports small number of computers. ▪ The network speed slows down as the number of computers increases. Advantages of Bus Network: ▪ It is simple and easy to use. ▪ It requires small length of cable to connect computers. ▪ It is less expensive. ▪ It is easy to extend a bus. It allows more computers to join network. ▪ If one node fails, it does not affect the rest of the network.
  • 34. Ring topology: In ring topology, each computer is connected to the next computer with the last one connected to the first. Thus, a ring of computers is formed.
  • 35. Working of Ring Network: Every computer is connected to next computer in a ring. Each computer receives message from the previous computer and transmits it to the next computer. The message flows in one direction. The message is passed around the ring until it reaches the correct destination computer.
  • 36. Disadvantages of Ring Network: ▪ Failure of one computer in the ring can affect the whole network. ▪ It is difficult to troubleshoot. ▪ Adding or removing computers affect the whole network. Advantages of Ring Network: ▪ It is less expensive than star topology. ▪ Every computer has equal access to the network.
  • 37. Star topology: All computers in Star topology are connected With central device called "hub" or "switch". Star topology is mostly used in client-server networks.
  • 38. Working of Star Network: The sending computer sends the data to hub. The hub sends data to the receiving computer. Each computer in star network communicates with a central hub.
  • 39. Disadvantages of Star Network: ▪ If central hub fails, the entire network breaks down. ▪ It requires a large length of cable to connect computers. ▪ It is more expensive. Advantages of Star Network: ▪ It is easy to maintain and modify network ▪ Adding or removing computers can be done without disturbing the network. ▪ Finding faults becomes very simple. ▪ Single computer failure does not bring down the whole network. ▪ It is more flexible than other topologies.
  • 40. Mesh topology with its working: In a mesh topology, every device in the network is physically connected to every other device in the network. A message can be sent on different possible paths from source to destination. Mesh topology provides improved performance and reliability. Mesh networks are not used much in local area networks. It is mostly used in wide area networks.
  • 41. Disadvantages of Mesh Network: ▪ A full mesh network can be very expensive. ▪ It is difficult to install and reconfigure. Advantages of Mesh Network: ▪ The use of dedicated link guarantees that each connection can carry its own data load. It eliminates traffic problem. ▪ If one link becomes unusable, it does not harm the entire system. ▪ It is easy to troubleshoot.
  • 42. Tree topology with its working (Hybrid Topology): A tree topology combines the characteristics of bus and star topologies. It consists of different groups of computers attached in star topology. The groups are then connected to a bus backbone cable. Tree topology is used for the expansion of an existing network.
  • 43. Disadvantages of Tree Network: ▪ Overall length of each segment is limited by the type of cabling used. ▪ If the backbone line breaks, the entire segment down. ▪ It is more difficult to configure and wire than other topologies. Advantages of Tree Network: ▪ It provides point-to-point wiring for individual segments. ▪ It is supported by several hardware and software vendors.
  • 44. Types of Server: ▪ Web Server. ▪ File Server. ▪ Print Server. ▪ Application Server. ▪ Mail Server. ▪ Proxy Server. ▪ Message Server. ▪ Database Server.
  • 45. Web Server: A web server is a computer that runs website. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP). File Server: A file server is a server that provides access to files. It acts as a central file storage location that can be accessed by multiple systems. The main function of a file server is to enable multiple users to access the stored files and free storage space.
  • 46. Print Server: A print server, or printer server, is a device which provide us printing services which connects printers to computers over a network. All print jobs are sent from the computer to the server, which then sends the print job out to a printer. Application Server: An application server is designed to install, operate and host applications in a network or in an organization. It helps the clients in a network to run the applications in an easy and the effective way.
  • 47. Mail Server: A mail server (or email server) is a computer system that sends and receives email. For example, the SMTP protocol sends messages and handles outgoing mail requests. Proxy Server: A proxy server provides a gateway between users and the internet. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online. Enhanced security: Proxy servers can act like a firewall between your system and the internet. So that hackers cannot access your system.
  • 48. Message Server: It is used to co-ordinate the interaction between users, documents and applications. The data can be used in audio, video, binary, text or graphics. Database Server: It is a type of application server. It allows the user to access the centralized strong database.
  • 49. Major Features and functions of the windows server 2008: ▪ Active Directory. ▪ Server manager. ▪ Server Core. ▪ Windows Server 2008 Hyper-V. ▪ The Failover Cluster Management tool. ▪ The Disk Management console.
  • 50. Active Directory: Active Directory provides the structure to centralize the network and store information about network resources across the entire domain. Active Directory uses Domain Controllers to keep this centralized storage available to network users. Server Manager: Server Manager is a single solution that is used as a single source for managing identity and system information. Server Manager is enabled by default when a Windows 2008 server is installed.
  • 53. Server Core: ▪ Server Core is such a feature in which you can perform your tasks by entering the commands. ▪ Less resources are require to install server core version. ▪ But you have to type a command to perform the every task in the server 2008.
  • 55. Server core 2008 Interface:
  • 56. Windows Server 2008 Hyper-V: Windows Server 2008 Hyper-V is the hypervisor-based virtualization feature included as a role of Windows Server 2008. It contains everything needed to create a virtual network. These virtual networks enable IT organizations to reduce costs, to improve server utilization.
  • 57. Failover Cluster Management tool: ▪ Failover support ensures that a business intelligence system remains available for use if an application or hardware failure occurs. Clustering provides failover support in two ways: Load redistribution: When a node fails, the work for which it is responsible is directed to another node or set of nodes. ▪ The Failover Cluster Management tool included with Windows Server 2008 allows you to create and manage server clusters. ... A cluster allows you to establish high availability for general services or for specific applications.
  • 58. Disk Management Console: The Disk Management console in Windows Server 2008 lets you manage not only the local hard disks but also drives on other computers running any version of Windows 2000, Windows XP, Windows Server 2003, Windows Vista, or Windows Server 2008, allowing an administrator to manage disk tasks and space allocations from a workstation without having to sit at the computer that is being administered.
  • 59. Steps to install DNS in the Server 2008: Step 1:
  • 80. IP address and its versions: IP address stands for Internet Protocol Address IP address is the unique Identification of a device over the internet. It is also called logical address. There are now two versions of IP address. ▪ IPv4 addresses are 32 bits long. ▪ IPv6 addresses 128 bits long.
  • 81. Difference between Static and Dynamic IP:
  • 82. Private vs Public IP address:
  • 83. What is the static and the dynamic IP? ▪ Static means staying the same. It is the IP which administrator have to configure in every computer. ▪ Dynamic IP is that IP which is given by the DHCP. It is changed with the time. Dynamic IP is more secure because it is changed according to time.
  • 84. Steps to Configure IP on Sever 2008:
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90. MAC address: A MAC(Media Access Control Address) address is a hardware identification number that uniquely identifies each device on a network. The MAC address is assigned by the company of a device
  • 91. Classes of IP Address: IP address: IP Address is a “Unique Identification” of a device over the internet. IP address is 32 bit. There are basically five classes of IP address: ▪ Class A ▪ Class B ▪ Class C ▪ Class D ▪ Class E
  • 92. IP address have four octet:
  • 93.
  • 94. Subnet Mask: Subnet mask tell us that how many networks and host bit in the IP address subnet mask is used to divide an IP address into two parts. One part identifies the host (computer), the other part identifies the network to which it belongs.
  • 95. NAT (Network Address Translation): NAT stands for the “Network Address Translation”. It is a process in which private IP address is converted into public IP address, so that, private IP address can also be used in internet. We use NAT so that we can save IP address. Translation (NAT) is a process in which one or more local IP address is translated into one or more global IP address and vice versa in order to provide Internet access to the local hosts.
  • 96.
  • 97.
  • 98. Static NAT: In static NAT one Private IP address is converted into one Public IP address. Dynamic NAT: Dynamic network address translation (Dynamic NAT) is a technique in which multiple public Internet Protocol (IP) addresses are mapped and used with an internal or private IP address. Use dynamic NAT to translate a set of unregistered IP addresses to a smaller set of registered addresses. Static vs Dynamic NAT: Static NAT provides a permanent mapping between the internal and the public IP address. Dynamic NAT is used when you have a “pool” of public IP addresses that you want to assign to your internal hosts dynamically.
  • 99. Advantages of NAT: ▪ IP address spaces can be saved because many hosts connect to the global Internet by using a single dynamic external IP address. ▪ Private IP addresses can be reused. ▪ The security of private networks can be enhanced by hiding the internal addresses from external networks.
  • 100. Disadvantages of NAT: ▪ Network Address Translation (NAT) consumes the processor and memory because NAT need to translate IPv4 addresses for all incoming and outgoing IPv4 datagram and to keep the translation details in memory. ▪ It slows down the network performance, therefore it creates a problem in real-time protocols.
  • 101. What is print management? Microsoft Management Console (MMC) that enables you to install, view and manage all of the printers in your organization from any computer running Windows Server.
  • 102. Active directory: An active directory is the Database of users groups, services and resources. It is basically centralized database of users, groups, services and resources. These are also known as the object and the collection of these objects is called active directory.
  • 103. Benefits of Active directory: ▪ Multimaster Authentication and Multimaster Replication (The ability to access and modify the ADDS from multiple points of administrations). ▪ A single point of access to the network resources. ▪ Ability to create trust relationship with external network.
  • 104. Active directory 2008 new features: ▪ Introduction to read-only domain controller. ▪ Introduction to Server Core (Change Services through the CMD means that which is only operated by using the command). ▪ Auditing of the Active directory modifications and deletions. ▪ Ability to start active directory as a services(You don't have to down the domain controller). ▪ Active Directory Recycle Bin. ▪ Active Directory Administrative Center. ▪ Active Directory Web Services. ▪ Offline Domain Join. ▪ Managed Service Accounts.
  • 105. What is the difference between a domain controller and Active Directory? They are two separate things. A domain controller is the main computer/server that runs your domain. Active Directory is the system that runs on your domain controller and runs your domain. It stores all the users, computers on your domain.
  • 106. Active directory Domain Controller(ADDC): The server where the active directory is installed is called active directory domain controller. A domain controller is a server that responds to authentication requests and verifies users on computer networks.
  • 107. Categories of active directory objects: ▪ Container Objects. ▪ Leaf Objects. Container objects: Container objects are the such objects which can contain the other objects. For example: ▪ Forest. ▪ Tree. ▪ Domain. ▪ OU.
  • 108. Leaf Objects: Leaf Objects are the objects which cannot contain the other objects in it. For example: ▪ User. ▪ Computer. ▪ Printer. Etc.
  • 109. What is active directory domain? In Active Directory terms, a domain is an area of a network organized by a single authentication database. In other words, an Active Directory domain is essentially a logical grouping of objects on a network. Domains are created so IT teams can establish administrative boundaries between different network entities.
  • 110. Domain: ▪ Domain is the logical groups of the computers. ▪ Share a central active directory database. ▪ Running different versions of Microsoft operating systems on the computers . ▪ Domain is represented by the triangle. A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database. Doma in Domain
  • 112. What are the tree objects? ▪ Tree objects are logical group of network resources and devices. ▪ Can contain one or more domains configured in the parent child relationship. (by using same name namespaces) ▪ It is the collection of two or more domain which uses same name spaces and there is a parent child relationship within the tree.
  • 113. Diagram and name spaces:
  • 114. Active directory forest: Active directory forest is the collection of one or more tree and it is the largest container object in the active directory environment. User can access the all forest in the active directory by using the single username and password.
  • 116. What is OU? OU is stands for the Organizational Unit. It is the smallest container object in the active directory. OUs are Active Directory (AD) containers that hold other AD objects. Organizational Units are useful when you want to deploy group policy settings to a subset of users, groups, and computers within your domain. OU OU OU OU OU OU Domain
  • 117. What is FQDN? A fully qualified domain name (FQDN) is the complete domain name for a specific computer or host on the internet. The FQDN consists of two parts: the hostname and the domain name.
  • 118. What is “User” in Active Directory? User accounts are created and stored as objects in Active Directory Domain Services. User accounts can be used by human users or programs such as system services use to log on to a computer. Each user or application that accesses resources in a Windows domain must have an account in the Active Directory server.
  • 119. What is meant by Exchange Server? Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It mostly runs on Windows Server operating systems.
  • 120. What is the difference between Windows server and Exchange server? The main difference between Windows Server and Exchange Server is that Windows Server refers to Microsoft server operating system while Exchange Server is a mail server and calendaring server that runs on Windows Server Operating Systems. Windows Server and Exchange Server are two Microsoft products.
  • 121. What is the mailbox server? ▪ Mailbox servers contain mailbox databases that process, render, and store data. ▪ Mailbox Server role hosts mailbox databases where user and resource mailboxes are stored.
  • 123. What is the mailbox management? ▪ Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction. ▪ This tool lets you check for messages that are older than a specified age and move those messages into a folder. Mailbox Manager can then automatically delete the messages the next time it runs.
  • 124. Installation and Deployment of the mailbox server role.
  • 125. .
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141. What is PUBLIC folder? Public folders are designed for shared access and provide an easy and effective way to collect, organize, and share information with other people in your workgroup or organization. Public folders help organize content in a deep hierarchy that's easy to browse.
  • 142. Method to create Public Folder:
  • 143. What is address list? An address list is a collection of mail-enabled recipient objects in exchange Online. Address lists are based on recipient filters. You can filter by recipient type (for example, mailboxes and mail contacts) and recipient properties (for example: Company or State or Province).
  • 144.
  • 145. What is exchange management shell? The Exchange Management Shell is built on Windows Power Shell technology and provides a powerful command-line interface that enables the automation of Exchange administration tasks
  • 146. Steps to open Exchange Management Shell: ▪ Open the Exchange Management Shell in Windows Server 2016. ▪ Click Start > Microsoft Exchange Server 2016 > Exchange Management Shell.
  • 147.
  • 148. Benefits of exchange management shell: ▪ The Exchange Management Shell also provides a “robust”(The Ability to remove errors during the execution of the program) and flexible scripting platform. ▪ Reduce the complexity of current Microsoft Visual Basic scripts, improving the efficiency of the tasks being run. Tasks that previously required many lines in Visual Basic scripts can now be done by using as little as one line of code. ▪ By taking advantage of the Exchange Management Shell's capabilities, you are now able to create new email accounts and configure store database properties.
  • 149. What is RBAC? Role Based Access Control (RBAC) is the permissions model used in Microsoft Exchange Server 2013. In Exchange 2013, RBAC now controls both the administrative tasks that can be performed and the extent to which users can now administer their own mailbox and distribution groups.
  • 150. What is the RBAC? Role-based access control (RBAC) restricts network access based on a person's role within an organization and has become one of the main methods for advanced access control. The roles in RBAC refer to the levels of access that employees have to the network.
  • 151. Benefits Of RBAC: With hundreds or thousands of employees, security is more easily maintained by limiting unnecessary access to sensitive information based on each user's established role within the organization. Other advantages include: Reducing administrative work and IT support.
  • 152. What is the Load Balancing? Load balancing is the process of distributing network traffic across multiple servers. This ensures no single server bears too much demand. It also increases availability of applications and websites for users.
  • 153. What is RAS? A remote access service connects a client to a host computer, known as a remote access server. The most common approach to this service is remote control of a computer by using another device which needs internet or any other network connection. For example we control our home computer by sitting in our office by using internet connection.
  • 154. What is DNS and its purpose? DNS stands for Domain Name System. The main function of DNS is to translate domain names into IP Addresses, which computers can understand. It also provides a list of mail servers which accept Emails for each domain name.
  • 155. What is the difference between DNS and WINS? WINS stands for Windows Internet Name Service and DNS stands for Domain Name System. As the name suggests, WINS is specifically for devices based on Windows, like PC’s or laptops or NT servers. On the other hand, DNS is mainly for servers and network devices.
  • 156. What is an event viewer? The Event Viewer is a tool in Windows that displays detailed information about significant events on your computer. Event Viewer can be helpful when troubleshooting problems and errors in windows and the other programs.
  • 157. Steps to open the event viewer: Step 1:
  • 159. Types of events: ▪ Application event. ▪ Security event. ▪ Setup event. ▪ System event. ▪ Forwarded event. Event is every thing that occurs in a computer system. Something that happens is an event. For example the pressing the keyboard button and movement of the mouse.
  • 160. What is the application event? Application event is used to record events written by applications and services. The applications may be commercial applications, like SQL Server or Exchange server. What is the purpose of an security event? Security event is used to record events related to security, such as logon attempts and resource access.
  • 161. What is the purpose of the setup event? Setup event creates log files for all actions that occur during installation. If you are experiencing problems installing Windows, consult the log files to troubleshoot the installation. What is the purpose of the system event? System log files may contain information about device changes, device drivers and system changes or events. Example: For example if we change our system time then log file will be created in the system event about changing the time.
  • 162. What is the purpose of forwarded event in event viewer? Forwarded event records events written by other computers in the same network. By using the Forwarded Events log, you can keep track of the event logs of several other computers from one central location.
  • 163. What is troubleshooting? Troubleshooting is the process of diagnosing the source of a problem. It is used to fix problems with hardware, software, and many other products. Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system.