Documente Academic
Documente Profesional
Documente Cultură
Lesson 7
Popular Windows Network Services and Applications
Learning Objectives
Students will learn about:
Web Servers
Remote Access
Remote Administration
Server Virtualization
ODN Skills
2.2
2.5
1-1
Lesson 1
Since many organizations could be large or spread out, you may have a need to connect
to a server remotely. Therefore, you will be discussing Remote Desktop Services. You
should emphasize that before Windows Server 2008 R2, Remote Desktop Services was
known as Terminal Services. You should also compare and contrast Remote Desktop
Connections and Remote Assistance. You should demonstrate using Remote Desktop
Connections to connect to another computer.
The last part of the lesson is server virtualization with an emphasis on Hyper-V. Of
course, you should start out with a discussion of what a virtual machine is and how it is
used by different organizations. When discussing Hyper-V, you should cover the system
requirements, including 64-bit Windows, 64-bit processors and BIOS that support
virtualization and Hardware Data Execution Prevention (DEP). Next, discuss how to
create virtual machines and the files that make up a virtual machine and how snapshots
are used with virtual machines. The last part of the discussion covers managing virtual
networks and network cards.
Key Terms
Application A grouping of content on a Web site that is defined at the root level or in a
separate folder that has specific properties, such as the application pool in which the
application runs and the permissions that are granted on the folder.
application pool A set of resources (a worker process or a set of worker processes)
used by a Web site or application that defines the memory boundaries for the Web site.
digital certificate A electronic document that can contain an encryption key to encrypt
data.
File Transfer Protocol (FTP) A standard network protocol used to transfer a file from
one host to another over a TCP/IP-based network.
HyperText Markup Language (HTML) The predominant markup language
interpreted by browsers for web pages.
hypervisor The component that is installed between the hardware and the operating
system and is the main component that manages the virtual computers.
Internet Information Services (IIS) Microsofts web server.
physical-to-virtual (P2V) conversion A process that allows you to convert a physical
computer to a virtual computer.
Remote Assistance Technology used to connect and interact with a users session on
another computer.
Remote Desktop Services Formerly known as Terminal Services, this is a Microsoft
Windows component that allows a user to access applications and data on a remote
computer over a network.
Secure Sockets Layer (SSL) A supplemental protocol used with HTTP to secure traffic
with a digital certificate.
1-2
Lesson 1
Simple Mail Transfer Protocol (SMTP) A protocol used to transfer emails over the
Internet.
snapshot A point-in-time image of a virtual machine that you can return to.
virtual directory A directory used in a Web site that corresponds to a physical
directory elsewhere on the server, on another server, or on a Web site.
virtual machine Technology that allows you to run multiple operating systems
concurrently on a single machine, which allows separation of services while keeping cost
to a minimum.
virtual private network (VPN) Technology that links two computers through a widearea network such as the Internet. To keep the connection secure, the data sent between
the two computers is encapsulated and encrypted.
web server A server that provides web pages to clients using TCP port 80.
World Wide Web (WWW) A system of interlinked hypertext documents known as
Web pages that can be viewed with a Web browser such as Internet Explorer
1-3
Lesson 1
Lesson 7
Popular Windows Network
Services and Applications
Knowledge Assessment
Fill in the Blank
Complete the following sentences by writing the correct word or words in
the blanks provided.
1.
2.
3.
4.
5.
6.
7.
8.
A snapshot is a point in time image of a virtual machine that you can return
to.
9.
10. RemoteApp is a special mode of Remote Desktop Services that allows you
to run an application in its own window.
Multiple Choice
Circle the letter that corresponds to the best answer.
1.
2.
DNS
b.
HTTP
c.
FTP
d.
Telnet
21
b. 25
1-4
Lesson 1
3.
4.
5.
c.
80
d.
443
21
b.
25
c.
80
d.
443
Virtual directory
b.
Root directory
c.
Application pool
d.
Port forwarder
Anonymous
b. Basic authentication
6.
c.
Digest authentication
d.
Windows authentication
SSTP
b.
PPTP
c.
MPE
d. IPSec
7.
Which authentication method used with VPN clients can be used with
retinal scan and fingerprint identifications?
a.
PAP
b.
CHAP
c.
MS-CHAPv2
d. EAP-MS-CHAPv2
8.
9.
Virtual machine
b.
Virtual directory
c.
Terminal server
d.
Remote access
After you create a virtual server in Hyper-V and install the operating
system, you then need to install _____________ so that the virtual server
can run more efficiently.
a.
b.
c.
1-5
Lesson 1
d.
POP2
b.
IMAP
c.
HTTP
d. SMTP
True / False
Circle T if the statement is true or F if the statement is false.
T
1.
2.
3.
To copy a digital certificate that includes the public and private key
pair, use CSR.
4.
5.
Competency Assessment
Scenario 7-1: Allowing Work from Home
You just started working as a system administrator for the Acme Corporation. Your
company decides that as a benefit to its employees, some employees can work from home
one day a week. Explain what can you do to help make this happen, what key technology
you would use, and how would you configure it.
The primary technology you will need to use is to VPN. Therefore, you will need to
install a remote access server on a computer running Windows Server 2008. You
should configure L2TP with IPSec for the best security. You will then have to
configure the client computers to access the remote access server. In addition,
depending on the applications that the user needs to access, he will use the
applications on his laptop computer or he will have to use remote desktop to access
servers or client computers within the organization.
Scenario 7-2: Isolating Server Applications
You have two network applicationsa network accounting application and a network HR
applicationthat are not processor hungry. Both of these applications must be kept
totally isolated, and both will access a centralized database server. What do you
recommend?
Some advantages of using virtual servers include isolating server applications and
utilizing computer resource more efficiently. Therefore, you should use create two
virtual servers on a single physical server. Although the applications will access a
1-6
Lesson 1
centralized database server, the applications themselves will run on the individual
servers, keeping them totally isolated.
Proficiency Assessment
Scenario 7-3: Create a Web Site
1. Install IIS.
2. Create a Web site that responds to contoso.com and
www.contoso.com using port 80 that points to
c:\Inetpub\wwwroot\contoso.
3. Add an entry in the host file that points contoso.com to the IP
address of your server.
4. Create a folder called virtual in the c:\inetpub folder.
5. Create a virtual directory that points to c:\inetpub\virtual.
6. Create an application pool called contoso.
7. Change the contoso Web site to use the contoso application pool.
2.
3.
Use the Add Roles Wizard to add the web server role.
4.
2.
3.
4.
5.
1-7
Lesson 1
6.
7.
Select the protocol for the Web site from the Type list.
8.
9.
10.
11.
12.
Click OK.
1-8