Documente Academic
Documente Profesional
Documente Cultură
NETWORKING
TYPE OF NETWORK
According to Work:-
Peer to Peer Networking (Working Model)
Client Server Networking (Domain Model)
Benefit Of Network
Exchange Server
Novel Network
Network Terms:-
(1) Server :- Who gives the services to client.
(2) Client:- who accept the services from sever.
(3) Workstation
(4) Host:- The terms IP Address Used.
(5) Node:- Any devices which can communicate each other in a network is known as
node.
(6) Segment :- A group of P.C. is known as Segment.
(7) Back Born:- That wire who connect the all P.C.
~2~
Requirement of Networking :-
(1) Two or more P.C. (LAN card/ Ethernet)
(2) Transmission media (Hub, Cable, Punching tools etc)
(3) Protocol:- TCP/IP Address.
(1) It is printed circuit board which used to connect P.C. with transmission media. It may
be 8 bit, 16 bit, 32 bit, 64 bit, each any (Media Access control)/ ether net Address/
Physical address. It is a 48 bit binary address which is represented by 12 digit Hexa
Decimal No. The first 6 digit re-present the many feature date and last 6 digits re-
present the model no.
Command :- IP Config/All
C:\> IP Config/All
Physical Address------------
---------------------------------
Ethernet Frame Size:- source MAC + diction MAC2 + CRC (Checking Error)
1512 Byte- Around 1500 Byte
Twist Pair Cable:- There are two part of twist pair cable
(1) STP (Shielded Twisted Pair)
(2) UTP(Unshielded Twist Pair)
(1) Twist Cable :- Twist can minimize the interface (Cross talk)
(2) Straight Cable:- Use to connect between two difference devises Ex.:- P.C. to Hub, P.C.
to Switch, Hub/Switch to Printer.
(3) Cross cable:- Use to connect Between Same devices Ex. P.C. to P.C., Hub to Hub,
Switch to Switch, Switch to Hub.
~3~
Type Of Topology:-
(1) Star
(2) Bus
(3) Ring
(1) Star :- All system are connected together with a central connecting devices known as
hub or switch.
Connector:- RJ-45 (Register jack 45)
Cable:- Straight cable (UTP)
HUB Switch
(1) Single broad cast domain. (1) Single broad cast domain
(2) Single collision domain. (2) Multiple collision domain.
(3) Divide the frequency. (3) Can not divide the frequency.
(4) First layer devices(Physical layer devices) (4) Second layer devices (date link layer devices)
PROTOCOL
Sets of role and regulation for communicating between two or more devices. There are three
type of protocol.
(1) TCP/IP :- Transmission control Protocol / Internet Protocol.
(2) IPX / SPX :- Internetworking packet exchange / Sequent packet exchange (Novel)
(3) Net BEUT :- Network Bios Exchange User Interface. (IBM)
IP Address :- (1) 32 bit binary address, which is represented dotted decimal no.
(2) it is combination network & host address.
(1.126) A= Total No. of N/w = 2N (N = No. of network bit & n= No. of Host Bit)
Class :-B Network address Network address Host address Host address
~4~
Class :-C Network address Network address Network address Host address
Class :- E R& D
Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop
back adaptor diagnostic purpose.
FILE SYSTEM
PARTITION
Types of partition
(1) Primary Dos Partition :- Active Partition
(2) Extended Partition :- Logical Drive
(1) Fdisk
(2) Disk Manager (DM)
(3) Pro Magic (With out formatting)
Topic
INSTALLATION XP
Installation :-
(1) Boot the system with Win XP Bootable CD & then press any key to installation….
(1) My Computer :- First of all to right click the My computer and then select the
manage & see the table :-
Computer Management
Computer Management
(-) System Tools
(+) Event Viewer
(+) Shared folder
(+) Local User and Group (Click this)
(+) Performance Logs and Alerts
Device Manager
(-) Storage
(+) Removable Storage
Disk Defragmenter
Disk Management
(+) Services and Application
Click the Local User and Group and show the two icon (1) User (2) Group. Right click the
User and create the new user. And saw the table to create the new user.
New User
User Name :-
Full Name :-
Description :-
Password :-
Confirm Password :-
(2) Click the start menu and click the setting and then open the control panel. And choose the
Computer management or User Account to create the New User.
(3) Click the start menu and click the ran command :- MMC (Microsoft Management
Control).
Add:- Add/ Remove Snap.in :- Local User & Group :- Add :---------------Close
(All Time Save).
Command :- secpol.mse
Command :- MMC
Start :- Ran :- secpol.mse
Start :- Program :- Administrative Tools :- Local Security Policy
Group
Identity:-
(1) Collection Of User is known as Group
(2) If you have to set right & permission to more then one user, then set right /
permission on group & add user to this group.
Local Group
User
Group (Right Click) Group Name:- (255 character)
Description :- Optional
Member :- Optional
(1) Sharing :- it is used to show the file and folder and changing and saving to another
computers this is type of sharing,
C:$
D:$
E:$
These drive already share but hidden to (Administrator Control)
Step (1) :- Start menu :- Run :- Computer Name (IP Address) :- (192.168.0.2\c$)
Step (2) :- Computer management And Share folder
Step (2) :- Data :- Right Click:- Share & Security :-
~ 12 ~
Mapping
It used to a share folder as a drive & Icon then you have to make network drive.
Step (3) My computer or Network :- Right Click :- Map Network Drive :- Path(//Computer
name{IP address}/share folder).
[] Reconnect at logon Ok.
Offline File
If you want to access the shared resources, when the network is break, then use offline
file(Folder).
Step (1) :- Start :- Setting :- Control Penal :- Folder Option :- Offline file.
[] Enable Offline
[] Synchronize offline files when logon
[]Synchronize offline file when log off
Apply ok
Step (2) :- Start :- Run :- (IP address[//192.168.0.2]) :- data :- right click:- make available
offline :- ok
~ 13 ~
NTFS FEATURE
Click the Quota Entries And Click the Quota menu and create the new Quota entry and then
select the user and then limit the Quota.
Quota Entries :- Quota menu :- New Quota Entry :- Select User :- Limit Quota
Step :- Logon as user (User name) and create a folder to any drive and right click the this
folder and click the properties and then click the advanced and we click the encrypt content
to secure data and click ok and click and then apply changes to this folder, subfolder and file
and apply.
Logon as a user:- create a folder :- right click :- properties :- advanced :- click the encrypt
content to secure data. :- apply :- apply changes to this folder and subfolder and file :- ok
(Compression)
It used to compress the file and folder and save the disk space.
Full control [] []
Modify [] []
Read & Execute [] []
List Folder Contents [] []
Read [] []
Write [] []
Special Permission [] []
~ 15 ~
CLIENT – SERVER
Domain Controller :- The Machine which control the active directory services is known as
domain controller.
Active Directory :- It is a directory services in win2000/ win 2003 server operating system
which Constance the information of network servers in hole network. & easy to locket and
mileage this resource.
Command :- DCPROMO
(Domain Controller Promo)
Step to create the domain
Start :- Run :- Command (dcpromo) :- Next :- Next :- (choose the one topic)
(1) Create a new Domain tree (Click this )
(2) Additional Domain
And then
Create a new domain tree in a new forest (Choose the one topic)
(1) Child Domain Controller
(2) New Domain tree in exacting forest. (Click this)
And then
Next :- Next :-
~ 16 ~
User Profile
It is used to set the computing environment of each user that is it used to set the desktop
setting, start menu setting, favorites setting, cookies etc.
(1) Local User Profile (Default Profile) :- It automatic creative when user logon first
time. Its settings are save in document & setting folder.
(2) Roaming Profile :- It setting are environment of entire network, when user logon
from in any computer in a network or when user change its desktop setting it update
on server after logoff.
Step :-
(1) Logon as Administrator.
(2) Create a folder on any NTFS Vol. with full control sharing permission.
~ 17 ~
(3) Mandatory Profile :- Implemental of entire network when user changes its setting
from network then it can not update on server after user logoff.
Step :-
(1) Logon as user
(2) Open shared folder
(3) Open user folder
(4) Show all hidden file with extension name.
(5) Rename NTUSER.DAT to NTUSER.MAN
(6) Right click to NTUSER.DAT
(7) Advanced
(8) Encrypt
(9) Every lots
(10) logoff & then logon
Number System:-
(1) Binary system :- Base-2 0,1
(2) Octal No. :- Base-8 0,1,2,3,4,5,6,7
(3) Decimal No. :- Base-10 0,1,2,3,4,5,6,7,8,9
(4) Hexa Decimal :- Base-16 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F
IP Address :-
(1) It is a numerical No of each machine in IP Address.
(2) It is a software Address
(3) It is a 32 bit binary Address which is represented on 3 dotted decimal No.
~ 18 ~
Class :-B Network address Network address Host address Host address
Class :-C Network address Network address Network address Host address
Class :- E R& D
Note- Starting IP address 0.0.0.0 is reserved and 127.0.0.0, 127.255.255.255 is used to loop
back adaptor diagnostic purpose.
Class A: - The deplorer of IP Address set that, first bit in first Byte is always off.
Class B:- The first bit is always on and second bit is always off.
Class C:- The first two bit is always on and the third bit is always off.
Private IP Address
Class A:-
Total No of Network = 2N
= 27 = 128
Class B:-
Class C:-
Subnet Mask
Subnet Mask represented the Computer in a Network default Subnet Mask.
~ 20 ~
Dial Up – Connection
Step 2 :- Start :- Setting :- Network Connection :- New Connection Wizard :- Next :- Click
the Connect to the Internet :- Click the Connect using Dial up Mode :- ISP Name :- Airtel :-
Phone No :-
User Name(Phone No.) :- Password :- Add Shortcut :- Finish.
Backup Devices:-
(1) FDD
(2) HDD
(3) CD R/W
(4) DVD R/W
(5) Pen Drive
(6) Zip Drive (100 MB + 250 MB)
(7) LS 120
(8) Jizz Drive
(9) SAN
(1) Normal Backup:- The Backup select all file and folders during Backup (First Time).
It clear the Archive Attribute.
(2) Incremental Backup:- The Backup select all file and folder after Normal Backup or
Incremental Backup, that is creative or modified. It also clear the Archive Attribute.
(3) Differential Backup :- The Backup select all file and folder which is creative or
modified after each normal or Incremental Backup. It set the Archive Attribute.
(4) Copy Backup :- The Backup select all file and folder during consecutive to
Incremental Backup it also set the Archive Attribute.
(5) Daily Backup :- The backup select all file and folder which is creative or modified
per day. It also set the Archive Attribute.
:-Item to Backup
+ My Computer Select file and folder which is used to Backup
+ My Documents
+ Network Places
Next :-
Next:-
~ 22 ~
Advanced :-
(1) Low
(2) Letter (Click this)
Schedule Backup
Finish
Note:-
(1) Boot Drive :- Contains Windows (System Root)
(2) System Drive :- Contain Booting file always C: (Primary Partition)
(3) Booting File :- NTLDR, Boot.INI, NTdetect.com, Bootsect.doc, NT boot dd.sys,
NToskrnl.exe
Recover Console
It is a command pro console through which you have repair operating System, like create a
format partition, start and step services, repair MBR (Master Boot Record).
Second Paper
Code :- 70-290
Step 1 :- Start :- Setting :- Control Panel :- Add \ Remove Program :- Add \ Remove
Window Components :- Application Server :- Details :- Select the I I S :- Details :- Select the
FTP :- Next :- Ok :- Finish.
Step 3 :- Create a Folder :- Text (Share this folder) :- Notepad (Massage) :- Save :- File
Name (Vikrant.html).
Command :- Intermgr.msc
+Com
+
+
+
+ Website (Right Click)
Terminal Server
There are two part of Terminal Server
T.S. configuration
+ Connection R.D.P(Remote Desktop Protocol) - TCP
:-Right Click
:- Properties
:- Add User
:- Set Permission
:- [] Full control
~ 26 ~
[] User Access
[] Guest Access
[] Special Permission
:- Apply :- ok
On Clint
Window XP / Window 2003
On Clint (Win95/98/NT/2000)
T.C. Clint :- Share
Windows \ system 32 \ Clint
Run: - \\192.168.0.100 :- T.C. Clint: - Win32 Setup.exe
OK
Disk Management
Command :- Compmgmt.msc
Right Click:-
Convert Dynamic Disk :-
Disk Drive:-
Convert :-
Restart
Simple Volume :- Used to Create a Simple Volume a single Dynamic Disk. It can be
extended.
Spanned Volume: - Used to Create a Spanned Volume on 2 to 32 Hard disk (Dynamic Disk)
data store frequently on a disk. It cannot support fault tolerance it increase the disk space but
not this performance. It can be also extended.
Stripe Volume: - Minimum 2 to 32 Hard disk. Data stores sequence on a stripe. It increase
the disk performance but cannot support fault tolerance. It can not be extended. It is also
known as RAID-0 (Redundant Array Inexpensive Disk-0).
Mirror Volume :- Minimum 2 to 32 Hard disk. It automatically copy the data from one
Hard disk to another Hard disk (Image). It support full fault tolerance with operating system.
It can not improve the disk performance 50% is off disk space useless unless fault access.
RAID-5 :- Minimum 3 to 32 Hard disk. Data store sequence on a stripe set with parity. It
support fault tolerance and improve the disk performance. 33% of disk space is useless.
Printer Manage
There are two type of Printer.
(1) Local Printer
(2) Network Printer
Printer Device :- It is a physical component which is used to print the hard copy of data.
Printer :- It is a software drive of print device, which is used to communicate between P.C.
(Operating system) and print device. It is different for different print device.
Print Pooling:- It is a one or more INF File, which is used to convert the print command
into a proper format that accept the print device.
HP DeskJet Driver :-
Hub/ Switch
Printer
Printer
Print Queue :- It Temporary Storage location on print sever that store the all printing
document on Entire Network.
Print Server:- The P.C. (Machine) which contain the printer driver.
Step 1 :- Start :- Setting :- Printer :- Add Printer :- Next :- [] Local Print attach the
computer :- Select One type:-
[] Select port (LPT) line printer terminal
[]Create a new port (Hub/Switch)
:- Standard TCP/IP address :- IP address:- 192.168.0.10:-
Standard Jet Direct :-
Manufacture :- ---------HP
Model No.:- DeskJet 465:-
Printer Name :-DeskJet465:- Shared As (HP DeskJet) :- Next :- Text Page:- Finish
Printer Security :-
[HP DeskJet645] :- Right Click :- Properties:- Security :- Add User & Group :- Set
Permission:-
~ 30 ~
Allow Deny
Print [yes] []
Print Document [] []
Manage Printer [] []
Requirement :- window 2000 server with service pack 2 / window 2003 server
(1) IE [Internet Explorer]
(2) IIS
(3) RAM :- 1 GB
(4) HDD :- 2 GB (100 MB for SUS Server)
(5) Internet Connection
(6) SUS :- It is download by Microsoft website (33MB) :- Install:- client :- window
2000SP-2 / XP-SP1, Window 2003
~ 31 ~
Third Paper
Host Subnet Mask No. Of Sub Block Size 2n Host Per Network
network 2N 2n-2
10000000 192.168.0.128 2 (21) 27 27-2 = 126
11000000 192.168.0.194 4 (22) 26 26-2 = 62
11100000 192.168.0.224 8 (23) 25 25-2 = 30
11110000 192.168.0.240 16 (24) 24 24-2 = 14
11111000 192.168.0.248 32 (25) 23 23-2 = 6
11111100 192.168.0.252 64 (26) 22 22-2 = 2
11111110 192.168.0.254 X 21 21-2 = 0
11111111 192.168.0.255 X 20 20-2 = 0
Sub Netting
The division of a large Network into a small Network is known as sub netting. It redoes the
collision. It saves the IP Address.
n :- No of Host (0 form)
Host Subnet Mask No. of Sub network 2N Block Size 2n Host Per Network 2n-2
10000000,00000000 255.255.128.0 2 (21) 215 215-2 = 32766
11000000,00000000 255.255.192.0 4 (22) 214 214-2 = 16382
11100000,00000000 255.255.224.0 8 (23) 213 213-2 = 8190
11110000,00000000 255.255.240.0 16 (24) 212 212-2 = 4094
11111000,00000000 255.255.248.0 32 (25) 211 211-2 = 2046
11111100,00000000 255.255.252.0 64 (26) 210 210-2 = 1022
11111110,00000000 255.255.254.0 128 (27) 29 29-2 = 510
11111111,00000000 255.255.255.0 256 (28) 28 28-2 = 254
11111111,10000000 255.255.255.128 512 (29) 27 27-2 = 126
11111111,11000000 255.255.255.192 1024 (210) 26 26-2 = 62
11111111,11100000 255.255.255.224 2048 (211) 25 25-2 = 30
11111111,11110000 255.255.255.240 4096 (212) 24 24-2 = 14
11111111,11111000 255.255.255.248 8192 (213) 23 23-2 = 6
14
11111111,11111100
Host 255.255.255.252
Subnet Mask 16384
No. of Sub(2network
) 22Block Size 2n 22Host
-2 = Per 2 Network 2n-2
15
11111111,11111110 255.255.255.254 32768
2 N (2 ) 21 1
2 -2 = 0
16 1
11111111,11111111
10000000,00000000,00000000 255.255.255.255
255.128.0.0 65536
2 (2 (2) ) 20223 202-223-2= =0 8388606
11000000,00000000,00000000 255.192.0.0 4 (22) 222 222-2 = 4194302
11100000,00000000,00000000 255.224.0.0 8 (23) 221 221-2 = 2097150
11110000,00000000,00000000 255.240.0.0 16 (24) 220 220-2 = 1048574
11111000,00000000,00000000 255.248.0.0 32 (25) 219 219-2 = 524286
11111100,00000000,00000000 255.252.0.0 64 (26) 218 218-2 = 262142
11111110,00000000,00000000 255.254.0.0 128 (27) 217 217-2 = 131070
11111111,00000000,00000000 255.255.0.0 256 (28) 216 216-2 = 65534
11111111,10000000,00000000 255.255.128.0 512 (29) 215 215-2 = 32766
11111111,11000000,00000000 255.255.192.0 1024 (210) 214 214-2 = 16382
11111111,11100000,00000000 255.255.224.0 2048 (211) 213 213-2 = 8190
11111111,11110000,00000000 255.255.240.0 4096 (212) 212 212-2 = 4094
11111111,11111000,00000000 255.255.248.0 8192 (213) 211 211-2 = 2046
11111111,11111100,00000000 255.255.252.0 16384 (214) 210 210-2 = 1022
11111111,11111110,00000000 255.255.254.0 32768 (215) 29 29-2 = 510
11111111,11111111,00000000 255.255.255.0 65536 (216) 28 28-2 = 254
11111111,11111111,10000000 255.255.255.128 131072 (217) 27 27-2 = 126
11111111,11111111,11000000 255.255.255.192 262144 (218) 26 26-2 = 62
11111111,11111111,11100000 255.255.255.224 524288 (219) 25 25-2 = 30
11111111,11111111,11110000 255.255.255.240 1048576 (220) 24 24-2 = 14
11111111,11111111,11111000 255.255.255.248 2097152 (221) 23 23-2 = 6
11111111,11111111,11111100 255.255.255.252 4194304 (222) 22 22-2 = 2
11111111,11111111,11111110 255.255.255.254 8388608 (223) 21 21-2 = 0
11111111,11111111,11111111 255.255.255.255 16777216 (224) 20 20-2 = 0
~ 35 ~
IP Address Configuration
Static Dynamic
(1) IP leaves request. (DHCP Discover Massage) :- The client machine send the
broadcast massage to a network (Where is DHCP).
(2) IP leaves Offer :- DHCP Server send the offer massage to client machine (Threw
Mack Address) with own Identifier
DHCP Client
IP leaves Request
IP leaves Offer
Selection
IP leaves Acknowledgement
(3) IP leaves selection :- Client machine send the IP leaves selection to DHCP Server.
(4) IP leaves Acknowledgement:- DHCP Server send the acknowledgement massage to
client machine for a leaves period.
Manually Automatic
C:\> IP Config /Release Just after 50% of the leaves period client machine send the
C:\> IP Config /Renew leaves renewal process to DHCP Server, Next 87.5% of the
leaves period client machine send the leaves renewal process to
DHCP Server is not renewal the client machine of then client
release the IP address and send the Broadcast Massage.
DHCP Server :-
Command :- DHCPMGMT.MSC
Start IP Address :----------------------------------------
End IP Address :------------------------------------------
Length :------
Subnet Mask:-------
DHCP
+ Computer Name (Right Click)
+
Start End IP Address
Add +
IP Exclusions :----Optional
Next :-
Lease Duration :- 8 Days (Default) :-
Yes, I want to configure these option now.:-
Yes, I want to configure this scope:-
Default Router (Default Gateway):-
IP Address :---
Router Port :----
~ 38 ~
On Client :-
TCP/IP Properties :-
[Click this] Obtain the IP Address automatically
+Computer name
+ Address lease
+Address Pool
+Reservation (Right Click)
+Scope Option
192.168.0.5 192.168.0.7
192.168.0.8 10.0.0.5 10.0.0.6 10.0.0.7 10.0.0.8
192.168.0.6
192.168.0.4 10.0.0.4
~ 39 ~
Command :- RRASmgmt.msc
Computer name (Right Click)
+
+
:-
[] RAS
[] VPN
[]
[]
[] LAN Routing :- finish :- Yes
DHCP Server
=Static IP Address
Scope 1 :- 192.168.0.200 to 220
Gateway :- 192.168.0.4
Scope 2 :- 10.0.0.200 to 220
Gateway :- 10.0.0.4
+Computer Name
+
+ IP Routing
+
+ General :- Right click :-New routing
Protocol :- DHCP Relay Agent :- OK
OK
OK
DHCP Database
Initially data is written on Jet pack . Log file & after committed the data is written on actual
data base (DHCP.MLB) when log file full then it renamed as J 50XXX. Log.
Computer Name
Wins DNS
Net Bios name (Flat name) Fully Qualify Domain Name (FQDN)
15 Character (No Special Character is used) 255 Character (India.Pak.Com)
(India)
LM Host file Host file
(2)LM Host File :- It is a simple text editor which used to keep the track of computer name
& its IP Address :-
% System Root % :- System 32 :- Drivers :- Etc :- LM Host.Txt
Win Setup
Step (1) :- Start :- Setting :- Control Penal :- Add/Remove Program:- Add/Remove
Window Component :- Network Services :- Details :- Wins :- Next :- Finish
Step (2) :- ON Client
TCP/IP Properties :- Advanced :- Wins :- Add IP Address of Wins Server :- OK
On Server :-
Start :- Run :- Winsmgmt.msc
Computer
+Active Registration (Right Click :- Find By Owner)
+ Replication Partner
Command :- Winsmgmt.Msc
Replication Partner :-
.UK
.MII .US
.Edu . .Nic .IN
Com .Gor
.Com
Sub Domain
~ 44 ~
Gmail.Co
Yahoo.Co m
m Rediff.Co
m
DNS Query
(7) Resolve
R
E INTEL.COM
C IP Address
U
R
S
I
V
E
ON
CLIENT
XP
C:\>IP Config /DisplyDNS (To saw the Resolver cache table Entry)
C:\>IP Config /FlushDNS (To Delete cache table on Client)
C:\>DNSCMD /clearcache (To delete the cache table on Server)
Note :- Must be install the Support Tool
Zone
DOMAIN FOREST
ZONE
Forward Lookup Reverse Lookup
(1)Contain the Information of Host Name to IP (1)Contain the Information of IP Address to Host Name.
Address. (2) IP Address ---to------Host Name
(2) Host Name ----to-------IP Address
Zone Type:-
On Window 2000:-
(1)Standard Primary Zone
(2)Standard Secondary Zone
(3)Active Directory Integration
On Window 2003 :-
(1)Standard Primary Zone:- (Contain the Read/Write copy of Zone Database)
(2)standard Secondary Zone:- (Contain the Read only copy Primary Zone Database)
(3)Stub Zone :- (Start of Authority Name Server)
(4)Active Directory Integration :- (For Active Directory)
~ 47 ~
Computer Name
+Forward Lookup Zone (Right Click)
+Reverse Lookup Zone
:-Allow Dynamic Update [] Secure (Click this) & [] Non Secure :- Next :- Finish
Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone (Right Click)
Address in DNS :- Allow Dynamic Update [] Secure (Click this) & Non Secure :- Next :-
finish.
Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone
+ 192.168.0.X
Zone Transfer
The Process of replicating one DNS to another DNS is Called Zone Transfer.
Computer Name
+Forward Lookup Zone
+ Vikrant.com (Right Click)
+Reverse Lookup Zone
+ 192.168.0.X
Right click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Following DNS
Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone
+ 192.168.0.X (Right Click)
Right Click :- Properties :- Zone Transfer :- [] Allow Zone Transfer :- [] Only Follow DNS
Server
192.168.0.6
IP Address Secondary Server DNS :- Add :- OK
~ 49 ~
Secondary Zone
Computer Name
+Forward Lookup Zone (Right Click)
192.168.0.5
:- Master DNS Primary IP address :- Next :- Ok
Computer Name
+Forward Lookup Zone
+ Vikrant.com
+Reverse Lookup Zone (Right Click)
Same Processes
DNS Forwarder
It is process the which DNS client Query can forward from one DNS Server to another DNS
Server.
~ 50 ~
202.56.230.6 Add
:- Apply :- ok
Resource Record
Host Record :- Contain the Host Name & its IP address Forward Lookup.
PTR (Pointer Record) :- Contain the IP Address & its Host name in Reverse Lookup.
SRV (Server Record) :- Contain the Site, Domain & Protocol. Information.
(1) Site
(2) TCP
(3) UDP
(4) Domain
(5) Forest
DNS Database
Primary.DNS Secondry.DNS Active Direction Integration
Computer name
+ Forward Lookup
+ Vikrant. Com
+ Reverse Lookup
+ 192.168.0.6
View :- Advanced
Used to Connect two more P.C. through Dial-up Connection (Telephone Line).
Telephone Line
PSTN (Public Switch Telephone Network) ISDN (Integrated Service Digital Network
PSTN ISDN
(1)Carry Analog signal (1) Carry Digital Signal
(2) Cannot Carry Voice/Data Simultaneously. (2) Can carry Voice/Data Simultaneously.
(3) Slow (64 KBPS)
(3)Fast:-
BSI (Basic Rate Interface) :- 128 KBPS
PRI (Primary Rate Interface) :- 1.544 KBPS
Command :- RRASmgmt.msc
Right click :- Configure & enabling :- RRAS :- Next :- select the Dial Up/ VPN
If you select the Dial up then next process Click the Dial up :- Next :- IP Address (To click
the [*]Automatically Assign IP Address) :- if you are not click the automatically Assign ip
Address then you are give the static IP Address:- next :- Finish
Window Authentication
Radius Authentication
Authentication Method
(1) PAP (Password Authentication Protocol)
(2) SPAP (Shiva Password Authentication Protocol) Encrypted.
(3) CHAP (Challenge Hand Shaking Authentication Protocol) Non Microsoft.
(4) MSCHAP (Microsoft Challenge Hand Shaking Authentication Protocol) 95/98.NT.
(5) MSCHAP-2 (----------------------------Version 2) 2000/XP/2003.
(6) EAP (Extelcible Authentication Protocol) :- For Smart Card Authentication.
ON Client
Step 7 :- Start :- Setting :- Network Connection :- Create New Connection :- Click the
Connect to MY Workplace :- Dial Up :- Connection Name XYZ :- Phone No. (Give the RAS
Server Telephone No.) :- Next :- Next :- Finish
ISI Internet
VPN Server
Client XP
User Name :- Administrator
Password :- ----------
IP Address :- (Public IP Address) Internet ISI
PPTP L2TP
128 Client From VPN Client 128 Client from VPN Client
RADIUS
Remote Authentication Dial in User Services.
Also Known As IAS (Internet Authentication Services)
Sometimes it is also known as – AAA
A:- Authentication
A:- Authorization
A:- Accounting
RADIUS Server
RAS VPN
RAS RAS VPN VPN
Authorization
Authentication
Accounting
RAS RAS RAS VPN VPN VPN
CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT
~ 55 ~
Radius Feature
(1) Support Remote Access Policy
(2) Win 2003 Standard Edition support 50 Radius client
(3) Win 2003 Enterprise Edition, Then Unlimited Client
Note :- If more then one RAS/VPN Sever then, use Radius Server for Authentication.
IAS Server & RAS/VPN both are same (Domain/Workgroup).
IAS
+ Radius Client (Right Click)
Right Click :- New Radius Client :- Friendly Name (XYZ) :- Client IP Address (RAS/VPN
IP Address) Add:- Next :- Secret Key :- 12345, Confirm Key :- 12345 :- Next :- Finish.
Secret Key (Click Change) :- Secret Key 12345, Confirm Key 12345 :- OK
~ 56 ~
(Routing Protocol)
IP Address
Private Public
=>10.X.X.X
=>172.16.X.X
=>192.168.X.X
Right Click :- Confirm & Enable RRAS :- Next :- Click to Remote Access & NAT :- Create
a New Domain :- Dial up Connection :- Next :- Interface Name (XYZ) by Default (Remote
Router) :- Click to Connect Only Dial up / ISD Line. :- Select Modem :- Phone No. :- Airtel
(172315) :- Router Proceed :- User Name :- Airtel (Register) :- Domain & Password is
Optional :- Finish
[IP Secourity]
To Block Access
IP Security
Run :- Secpol.msc :- IP Security Policy :- Create Policy :- Name (XYZ) :- Next :- Next :-
Next :- Local N/W :- O.A. Active Directory default :- Next :- Yes :- Finish :- Add :- Next
This shared role does not Specify :- 2 :- Internet does not access any body in my computer :-
next :- Local N/W :- O.A. Active Directory default (keyboard O.S. Protocol) :- Next :- Yes
(Click) All Icm Traffic (Only one IP)
:- Edit :- Add :- Next :- Next :- Next :- Next :- Finish
This in [XXX name]
In IP New Security Policy :- Right :- [click] Un Assign
IN IP Client
Run :- //192.168.0.32
Run :- Secpol.msc :- IP Security :- Right click :- All Task :- Export :- File Name (Vikrant).
In Next PC
Run :-//192.168.0.1 (Server)
OK :- (Vikrant) :- Copy :- Desktop :- Paste :- Next,
Run :- Secpol.msc :- IP Security :- All Task :-Import :- Desktop :- (Vikrant) :- New IP
Security :- Right Click :- Assign & Un Assignly.
~ 58 ~
~ 59 ~
{Active Directory}
(1) It is a centralized database in Win 2000 / 2003 Server Operating System. That
contains Network Object & Resources
EX :- User
Organization Unit
Group
Contacts
Computer
Shared Folder
Printer Etc.
Active Directory :-
%System Root% :- NTDS :- NTDS.DIT (Actual Database File) :
Edb.log :- Current log file :- 10 MB
~ 60 ~
Edb.001.log
Edb002.log Renamed Log File :- 10 MB
Res 1 .log
Res 2 .log Reserve Log File :- 10 MB
Edb.Chk :- Check Point file
Temp.Cdb :- Temporary File
IT.COM
D.C. NETTECH
.COM
CCNA.
MCSE. IT. Forest
IT, A.NET
COM TECH. B.NET
COM
COM TECH.
COM
~ 61 ~
Domain :- It is a logical Grouping of in a network (Forest) well at list one domain controllers
are present.
Domain Controller :- Window 2000/2003 Server machine which contains the active
directory database. It is a physical component.
Member Server :- Win 2000/2003 Server machine which is a part of domain controller but
does not contain active directory database.
Parent Root Domain :- The First Domain Controller is known as Parent Root Domain.
Which contains all 5 FSMO Roles (Flexible Single Master Operation).
Global Catalog Server :- It contains the complete information of own domain and personal
information of other Domain. By default the first domain controller Parent Root Domain is
known as Global Catalog Server. But we are to create more then one Global Catalog Server.
Schema :- The structure of Active Directory contains object classes and attribute classes.
Schema of A.D. can be modified by user account which is a member of Domain Admin,
Enterprise Admin, Schema Admin.
By default Administrator of Parent Root Domain (GC Catalog Server) Can be
modified the schema of active directory.
~ 62 ~
D.C. A.D.C.
Run :- Dcsite.msc
{Active Directory}
Requirement of Active Directory
=> Window 2000/ 2003 Server
=>At least One NTFS VOL.
=>TCP/IP Configure
=>Administrative Control
{Group}
Creating Group :- Start :- Run :- Dsa.msc
A.D. user & Group
+India.com
+ Built-in
+ Computer
+
+
+
+ User (Right Click)
Group Type:-
Security :- Right can be assign to this group.
Distribution :- Right can not be Assign to this group. It is used for mailing purpose .
Group Scope:-
{1}Domain Local :- Open group membership
Ex:- User of any domain in a forest can be member of this group.
Limited resources access permission
Ex:- Member of this group can assess the resources locally.
{2}Global :- Limited group membership
Ex. User of local Domain Controller can be member of this group.
~ 64 ~
Printer
Domain Local (XYZ)
N1 N1
N2
It.com A1
N2 A2
B1
A.it.com
B.it.com
Global
A1 , A2 B1 , B2
Note :- Universal Security Group can not be created when domain function level raise to
mixed mode it only create, when it is in native mode & Win 2003 mode.
Right click :- Raise Domain :- Funchal Level :- Current Mixed (Change the Native) :- Raise
Group (Built-in)
Note :- Built-in Local Group is automatically created when O.S. is installed & after DC
Promo, some extra group are also created known domain group (User Container).
Contacts (Object) :-
E-Mail Address & User, which is on other Domain controller.
Ex. :- Yahoo.com / Rediff mail.com etc.
Use in exchange server (Mailing Purpose)
Computer (Object) :- It automatically created on domain controller, when we join the client
machine to Domain.
{FSMO ROLES}
FSMO (Flexible Single Master Operation)
Schema Master :- It D.C. holding this role can music that schema of Active Directory be
modified
It.Com No Roles
It.com
D.C. 5 Roles
A.D.C.
A.It.com B.It.com
C.D.C. C.D.C. 3 Roles
~ 67 ~
=>D.C. holding these Roles becomes unavailable then A.D. Schema cannot be modified.
=> Domain Naming Master :- D.C. Holding this Roles can ensure that addition of other
D.C. in forest.
=> D.C. holding this Roles become unavailable then we cannot promote / D.C. mort other
D.C. in forest.
=> PDC :- It act as a PDC for Win NT B.D.C. that is backward compatible.
2000
NT XP A.D.C. D.C.
=> Global Catalog Server must not hold this Roles. Infrastructure Master can up to date User
& Group membership from G.C. Server on same Domain Controller then it cannot work
properly.
~ 68 ~
Roles When
NTDSUTIL : Roles
: Connections
: Connect to Server Comp.It.Com
: Quit
: Seafaring Schema Master
: Seize Domain Naming Master
: Seize PDC
: Seize RID
: Seize Infrastructure Master
(1) Polices:- Set of rules based which can be linked or associated with [Domain, Site &
O.U. (Computer User)].
(2) Rights :- Assigned to user & Group e.g. Allow logon locally.
(3) Permission :- Object e.g. file & Folder, printer etc
- Sharing Permission
- NTFS Permission
{Policies}
Software Deployment
Assigning Publishing
+Computer Configuration
+ Software Setting
+Software Installation :- New Policy //SRV1/SFT (Network Path)
.MSI :- (Click This) Assigned :- Ok
+Windows Setting
+Administrative Template
+User Configuration
+ Software Setting
+Software Installation :- New Package :-//SRV1/SFT/ (Network Path)
.MSI ;- (Click This) Published :- Ok
+ Window Setting
+ Administrative Template
Note :- For Computer Based Policy, client machine must be restarted to affect the change
(Policy)
[Application]
Setup Command = \\SRV1\SFT\Setup.exe
Display Version = 5.0
Friendly Name = “Acrobat Reader”
Path: C:\ SFT (Save this file )
Fill Name :- ABC.ZAP
File Type :- All File :- Ok
[Active Directory Sites & Services]
Server Server
Server 2 Server 3 5 6
Intra Site
Local Bridge Head Server Intra site
Replication Timing
() None
() One per Hour (1 Hour)
() Twice Per Hour (30Minite)
() Four time Per Hour (15Minite)
(1) Database is automatically compressed is larger then 50KB in Inter site Replication.
(2) Each Site must have at least on local Bridge server which reduces WAN Traffic.
Site Link :- A logical connection between different site which is to be created manually.
(1) IP Link :- IP Link is preferred is WAN connection is fast Reliable & Permanent.
(2) SMTP Link :- SMTP Link can be used in if WAN connection is slow, Tempory &
Non-Reliable.
Run :- DSsite.Msc
AD Site & Site Link
~ 73 ~
Paper
Exchange Server 2003
Topic
(3) Folders
a. Public Folder
b. Personal Folder (PST)
c. Private Folder
d. Delegation
e. Mail Box Rights
a. Backup / Restore
b. Recovery Of Deleted Mail Box
c. Recovery Of Deleted Items
(1) Security
(2) Customized Mail Box Setting
(3) Monitoring
(4) Massage Tracking
(5) Group Ware
Etc
Mail Box
:- Consists of
Inbox
Outbox
Sent Item
Deleted Item
Drafts Etc
Exchange server
Exchange Client
MAPI Client (Massaging Application POP3 Client (Post Office Protocol Version
Programming Interface) 3.0)
Massages are not downloaded to the local disk of Massages are downloaded to the local disk (By
machine. Default)
e.g. Microsoft Outlook 2003 e.g. Outlook Express
Microsoft Outlook
Third Party Software Etc.
(Existing User) :- Select User Account :- Right Click :- Create Mail Box :- Next :- Ok
User: -------------
Password: ---------
Ok
:-
:- OK
Password :----
~ 78 ~
Start :- Program :- Microsoft Office :- Microsoft Outlook :- Click This () Create New Mail
Account :-
:- :- Next :- OK
Exchange Server :- 192.168.0.1
Mail Box :- Administrator
{Folder}
Personal Folder :-
PST :- Personal Storage Type
:- PST Folder can be Password Protected
:- It is Created from MS-Outlook
:- Default Size :- 2GB
Creating .PST Folder
:- Open Ms-Outlook
~ 79 ~
Public Folder :-
:- Public Folder is access to every on (By Default)
:- Can be created from Ms-Outlook also Creating Public Folder.
:- Open Ms-Outlook
+Inbox
+Outbox
+Sent Item
+Deleted Item
+Public Folder (Right Click)
C:\Exchange2003\Setup+I386\Setup.exe” /Disasterrecovery
.edb .stm
=> Initially massage are written into Transaction log file (e00.log) which of 5MB and later
on committed to actual database. When this log file full then renamed as exxxxxx.log
=> There are two Reserved log file of 5MB.
Storage Group :-
=> Is a logical container which consists of Mail Box & Public Folder.
=>By default first storage is created during installation which contains only two stores ie on
mail Box store & One Public store. But maximum we can have four storage Group & each
store group can have max. five stores :- (Enterprise Edition Only)
+First Organization
+ Server
+Com1
+ Protocol
+ Storage Group :- - - - Right Click :- Create New Storage Group :- Second
+ First Storage Group Storage Group :- Ok
+ Mail Box Store
+ Public Store
+
+
+
+
+ Second Storage Group : - - - Right Click :- Create New Mail Box Store :- First
+ First Storage Group Store :- Do You Went to Mount this Store :- Yes :- Ok
+First Organization
+ Server
{Internet Mailing & SMTP Connector}
+ Comp 1
+ Connector :- Right Click :- Create SMTP Connector :-
Connector Name :- Vikrant Kumar
Start :- Program :- Exchange Server :- System Manager
Local :--- :- Comp 1 :- Server :-
Bridgehead
Address Scope :- Domain :-*
[] Click This Allow massage to be Replayed
to these Domain :- Ok
~ 82 ~
+ Protocol
+ POP 3
+ HTTP
+ SMTP
+SMTP Virtual Server :- Delivery :- Advanced : External DNS
Add :- 202.56.215.6
202.56.230.6 :- Ok
Server
1
Server2
Server3
Connector
# Each Routing Group must have at least one local bridgehead Server.
{Connector}
Logical Link or Connection between different routing groups.
Types of Connector :-
(1) RGC (Routing Group Connector) :- RGC is preferred if WAN connection is fast
reliable & Permanent
(a) Can not be used for Internet Mailing
(b) Not Configurable
(c) Uses either SMTP or RPC as Transportation Protocol
(a) Can be used even if WAN connection is slow, Temporary & Non-
Reliable.
(b) Can be used for Internet Mailing also
(c) Configurable
(d) Uses SMTP as Transportation Protocol.
{Administrative Group}
Is a logical container which can contain.
System Polices
Routing Group
Public Folder
Benefits :-
(1) Management & Administration
(2) Delegate Control
+ Routing Group :- Right Click :- Create New Routing Group :- Second Routing
Group:- Ok
:- CA Name :- Vikrant
:- Next :- Ok
Step 2 :-
Start :- Program :- Administrative Tools :- IIS
+Comp1
+ Website
+ Default Web Site :- Properties :-
+
+
+
Server Certificate :- () Create New Certificate (Click This) :- () Send Request to on line
Certificate Authority (Click This) :- Next :- Next :- Next :- Ok
~ 86 ~
+
+
+
+ Default Website :- Right Click :- STOP & START :- Service :- OK
+
+
+First Organization
+ Server
+ Comp 1 :- Properties :- () Click this This is My Front end
Server :- Ok
+ Comp 2
~ 87 ~
{Trouble Shooting}
Backup:-
(1) System State Data Backup :-
()
()
() Backup System State Data :- Next :- Ok (Click this)
(2) IIS :-
=> Database is not checked for errors => Error checking is performed during
during Backup. Backup
=> Renamed Transaction file are not => Renamed transaction log file are
automatically deleted even after the automatically or incremental backup.
Backup.
Run :- NT Backup
Backup Software
Backup :- ()
() Backup Selected File & Folder.
Third Party Software Built in () :-
e.g. VERITAS NTBackup +Microsoft Exchange server
ARC Serue etc + Comp 1
+ Ms-Information Store
() First Storage Group (Click this)
() Second Storage Group (Click This)
:- Next :- OK
{Recovery}
~ 89 ~
Step 1 :- Install win 2003 Server with same computer Name & IP Address & component.
Step 2 :- Install IIS & ASP.NET
Step 3 :- Restore IIS
Step 4 :- Restore System State Data Backup.
Step 5 :- Insert Exchanged data base.
Run :- E:\setup\I386\Setup.exe/Disasterrecovery
Step 1 :- Create a User account with same name or different name :- But do not create Mail
Box.
Run :- DSA.MSC
Step 2 :-
Start :- Program :- Microsoft Exchange :- System Manager
+First Organization
+ Server
+ Comp 1
+ Protocol
+ storage Group
+ Mail Box Store
+ Mail Box :- (Deleted Mail Box) (X.Abc) :- Right
Click :- Reconnect :- Vikrant :- Ok
~ 90 ~
Tools
+ Inbox
+ Outbox
+ Drafts
+ Deleted :- Select this Folder
+
+
On Server Machine
System Manager