Sunteți pe pagina 1din 45

IEC

UNIVERS
ITY
,
SIX MONTHS INDUSTRIAL TRAINING REPORT
ON
BADDI
NETWORKING (CCNA)
AT
HCL INFOTECH SEC-11,
NOIDA (U.P)

SUBMITTED AS A PART OF COURSE CURRICULUM


BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
Under the Guidance
of
Mr. Ashwini Kumar
Mr. Chandan Singh Takuli
Mr. Suhas Mohd
Submitted To:
Er. Randeep Poonia
(HOD)

Submitted By:
Ashish Dhillon
(2012010105)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING IEC


UNIVERSITY , BADDI (H.P)

ACKNOWLEDGEMENT
I f e e l d e e p l y i n d e b t e d t o M r. As h w i n i K u ma r, w h o d e l i v e r e d
v a l u a b l e lesson on Networking, his in depth knowledge about the
subject helped me understand the s u b j e c t i n b e t t e r w a y. H i s m e t h o d
o f t e a c h i n g t h e m i n u t e d e t a i l s h e l p e d m e a l o t t o acquire the
insight into the subject.
I am also grateful to Mr. Chandan Singh Takuli, CCIE (Collabration)
for giving best knowledge about CCNA. The way he instilled
knowledge of the subject was undoubtly praise worthy and valuable.
I am also thankful to HCL Infotech as a whole that is doing yeomans
service by teaching the learner abreast with the computer, networking and
hardware knowledge that is the need of the day.
I will be failing in my duty if I do not acknowledge by Mr. Chandan Singh
Takuli who always stood by my side and encourage me during my
studies.
Last but not the least, I thank all my colleagues at HCL Infotech for
extending kind co-operation.

Ashish Dhillon

List of Figures
Figure
No.

Name of Figure

1.

Computer Network

2.

Local Area Network

3.

LAN Classification

4.

Campus Area Network

5.

Metropolitan Area Network

6.

To find location of computer using FQDN

7.

Tree Structure

8.

Structure of domain forest and domain tree

9.

Multi-Master Mode

10.

Parent child relationship model

11.

Direct sharing scenario

12.

ICS Scenario

13.

Scenario of win proxy server

14.

NAT Server

15.

VPN Server

16.

LAN Routing

17.

Static Routing

18.

Architecture of Router

19.

Variable Subnet Mask

20.

Scenario of Static Routing

21.

Scenario of Telnet

22.

Routing Table

23.

Routing Table of covered networks

24.

Routing Loops

Page No.

25.

OSPF Scenario

26.

VLAN Operation

27.

VTP Configuration

28.

VTP Pruning

29.

IEEE 802.11 Standard

List of Tables
Table No.

Name of Table

1.

Difference between Workgroup & Domain

2.

Comparison between IPv4 & IPv6

3.

Addresses Classes

4.

Category & Speed of UTP Cables

5.

Colour coding for straight Cables

6.

Colour coding for crossover Cables

7.

Colour coding for rollover Cables

8.

Operating systems

9.

Difference between Workgroup & Domain

10.

Exchange server with different OS

11.

Router Interfaces and connectors

12.

Router Ports

13.
14.

Default Address Mask in Binary and Dotted


Decimals
Decimal and Binary Values Of Subnet Masks

15.

Subnet Mask , Valid Hosts & Broadcast Address

16.

Routing Table

17.

Difference between RIPv1 & RIPv2

18.

Difference between IGRP & RIP

Page No.

CONTENTS
Sr. No.

Topic

1.

Introduction
1.1

Company Profile

2.

Literature Review

3.

Networking
3.1

Introduction to Networking

3.1.1 Models of Networking


3.1.2 Categories of Networking
3.2

IP Addresses & MAC Addresses

3.2.1 IP Address Classing


3.2.2 MAC Addressing
3.3

Networking Media

3.3.1 Ethernet Cabling


3.4

Operating System

3.4.1 Types of OS
3.5

DNS Server

3.5.1 Parts of DNS Systems


3.5.2 DNS Zone
3.6

DHCP Server

3.6.1 Working of DHCP Server


3.6.2 Installing steps of DHCP Server
3.7

Active Directory

3.7.1 Active Directory Services

Page
No.

3.7.2 Child Domain


3.8

Internet Sharing

3.8.1 Direct Sharing


3.8.2 ICS (Internet Connection Sharing)
3.8.3 Win Proxy Server
3.8.4 NAT (Network Address Translation)
3.9

Virtual Private Network (VPN)

3.9.1 VPN Components


3.9.2 Types of VPN
3.10

Routing

3.10.1 Types of Routing


3.11

Exchange Server

3.11.1 Elements of Exchange Server


3.11.2 Exchange Version
3.11.3 Requirements of Exchange Server
3.12

Open System Interconnection (OSI) Model

3.12.1 Description of different layers


3.13

Routers

3.13.1 Router Architecture and its Key Components


3.13.2 Router Interfaces & Ports
3.13.3 Modes of Router
3.13.4 Configuring Passwords
3.13.5 Managing Configurations
3.14

Subnetting

3.14.1 Advantages of Subnetting


3.14.2 Types of Subnetting

3.15

Telnet

3.15.1 To access the Device Remotely


3.15.2 Commands to assign IP addresses to Interfaces
3.16

Routing

3.16.1 Types of Routing


3.16.2 Routing Protocol Basics
3.16.3 RIP (Routing Information Protocol)
3.16.4 IGRP (Interior Gateway Routing Protocol)
3.16.5 EIGRP(Enhanced Interior Gateway Protocol)
3.16.6 OSPF(Open Shortest Path First)
3.17

LAN Switching

3.17.1 Switch
3.17.1.1 VLAN (Virtual LAN)
3.17.1.2 VLAN Trunking Protocol (VTP)
3.18

Wi-Fi (Wireless Fidelity)

3.18.1 Wireless LAN


3.18.2 Wireless Standard
3.18.3 Wireless Security
4.

Conclusion

5.

References

1. INTRODUCTION
This project report pertains to six months industrial training that I had
underwent at HCL Infotech, Noida as part of curriculum of degree in
Bachelor of technology in Computer Science & Engineering as required
by IEC University (affiliated to Himachal Pradesh Technical University,
Shimla).
I learnt a lot from professional managers and skilled engineers. I had a
great learning experience as trainee in this firm. I learnt a lot about how
different networks are controlled in the industry or any department with
the help of networking processes, under CCNA.
I have learnt about different type of servers like DHCP Server, DNS
Server, NAT Server. Also I have learnt how to control the LAN, MAN
and WAN networks under CCNA.
Justification cannot be done to whatever I have learnt in these six months
within a few pages but I have still tried my best to cover as much as
possible in this report. In this report I have tried to sum up the technical
knowledge I have gained in my six months of training.

1.1 Company Profile


HCL is a leading global IT services company working with clients in the areas
that impact and redefine the core of their businesses. Since its emergence on
global landscape after its IPO in 1999, HCL has focused on 'transformational
outsourcing', underlined by innovation and value creation, offering an integrated
portfolio of services including software-led IT solutions, remote infrastructure
management, engineering and R&D services and Business services.

HCL leverages its extensive global offshore infrastructure and network of


offices in 31 countries to provide holistic, multi-service delivery in key industry
verticals including Financial Services, Manufacturing, Consumer Services,
Public Services and Healthcare & Life sciences. HCL takes pride in its
philosophy of 'Employees First, Customers Second' which empowers its 90,190
transformers to create real value for the customers. HCL Technologies, along
with its subsidiaries, had consolidated revenues of US$ 5.2 billion, as on 31st
March 2014 (on LTM basis).
HCL Technologies has portfolio of services including software-led IT solutions,
remote infrastructure management, engineering and R&D services and BPO.
HCL has global partnerships with several leading Fortune 1000 firms, including
several IT and technology majors. It provides services to industry sectors
including financial services, manufacturing, aerospace & defense, telecom,
retail & CPG, life sciences & healthcare, media & entertainment, travel,
transportation & logistics, automotive, government and energies & utilities.
As a $5.2 billion global company, HCL Technologies brings IT and engineering
services expertise under one roof to solve complex business problems for its
clients. Leveraging its extensive global offshore infrastructure and network of
offices in 31 countries.
Recognition

HCL has made it to the prestigious Forbes annual 2013 Asias Fab 50
list. This recognition highlights the regions best-of-the-best that meets a
revenue or market capitalization threshold of $3 billion.

Won the Asia-Pacific Enterprise Leadership Award (APELA) 2013

Conferred the United Nations-Women Empowerment (UN-WEP)


Leadership Award 2013

Wins IT Europa European IT Excellence Awards 2013

Ranks among the Top 10 Solution Providers in Consumer Goods


Technologys 2013 Readers Choice Awards

Wins the ICSI National Award for Excellence in Corporate Governance,


for 2012

In 2012, for the fourth time in a row, WorldBlu lists HCL as one of the
Most Democratic Workplaces in the World.

Won Workforce Management magazines 2012 Optimas Award for Global


Outlook, in recognition of its Working Across Borders program

Won the Nasscom Innovation Award 2012 for Market Facing Innovation

In 2012, it was recognized as one of Britains Top Employers for the 5th
consecutive year, for its innovative Employees First philosophy.

In 2011, received the Information Technology Services Marketing


Associations Diamond Award for Marketing Excellence in building
client loyalty and trust through its Customer Advisory Council.

Won TPIs Americas Paragon Award for Innovation Excellence and was
recognized as one of the most innovative R&D players.

HCL Technologies has been named as one of Britain's Top Employers


2010 by the Corporate Research Foundation (CRF) Institute, for the
fourth consecutive year.

HCL Technologies has been conferred with the prestigious Golden


Peacock Innovation Award for its MTaaS (a Business Service
Management centric service delivery platform) offering in the IT Sector
category in October, 2009.

HCL Customer Standard Parking Wins Oracles Empower the Green


Enterprise Award

HCL Receives 6 HR Congress Awards 2008 a recognition for having


great human resources practices

Indias Most Preferred Personal Computer Brand CNBC AWAAZ


Consumer Award 2007

HCL Technologies (HCL) was named Meritorious Performance Supplier


in Sun Microsystems' 2007 Supplier Awards program. The award
recognize companies that make outstanding contributions to Sun's record
of delivering superior technology, quality service and excellent value to
its customers.

2. LITERATURE RIEVIEW
Computer Networking is a very vast project in the present developing era of
electronics and communication. Now a days, computers are used in a wider
range. All the organizations are using multiple computers within their
departments to perform their day to day work. Computer network allows the
user to share data, share folders and files with other users connected in a
network. Computer Networking has bound the world in a very small area with it
wide networking processes like LAN, MAN, WAN.

The courses in HCL comprises lecture and theory session, with a great focus on
active participation through smart lab plus ,that focuses on audio visual and
learning with hands-on training and equips students with an in depth domain
knowledge that is technical; it also equips students with soft skills, to face the
multi-faceted challenges of corporate world.

3. NETWORKING
3.1 Introduction to networking
Networking is a practice of linking of two or more computing devices
such as PCs, printers, faxes etc., with each other Connection between
two devices is through physical media or logical media to share
information, data and resources. Networks are made with the hardware
and software.

3.1.1 Models of Networking

Model means the connectivity of two computers. We have many types


of networking models.
(i)

Client Server Model


In a Client server model we have one server and many clients. A
Client can share the resources of server, but a server cannot share the
resources on clients.
On the point of view of administrator its very easy to control the
network because we combine with the server also at security point of
view. It is very useful because it uses user level security in which users
have to remember only one password to share the resources.

(ii)

Peer to Peer Model (Workgroup Model)


In Peer to Peer networking model all computers are in equal status,
that is we cannot manage centralization, administration security. In
Peer to Peer networking client use operating system like Window 98,
Window XP, Window 2000, Window Vista.

(iii)

Domain Model
It is a mixture of client server and peer-to-peer model. In this clients
can share their resources as peer-to-peer but with the permission of the
server as in client server model therefore it is commonly used model
because in this security is more as we can put restriction on both server
and clients.

Difference between Workgroup & Domain


Table 1
Workgroup
1. It is a peer to peer networking model.

Domain
1. It is a server based networking model.

2. There is no client and no server. All the 2. There is a centralized dedicated


computers are in equal status.
server computer called domain controller
which controls all other computers

called clients.
3. This model is recommended for small 3. This model is recommended for large
networks, up to 10 computers.
networks.
4. There is no centralized administrated 4. There is centralized administration and
separately.
each PC can be administrated and managed
from the server.
5. In this model, low grade OS like2000/XP 5. In this model high grade OS like
professional, WIN 98 etc. can be used.
WIN2000/2003 Server can be used.
6. Users accounts are created in each PC
and are called as Local Users.
6. Users accounts are created on the
server side and are called Domain Users.

3.1.2 Categories of network


Networks can be categorized as per geographical area to be covered by the
network. Computer network are divided into four categories includes: Local
Area Network (LAN), Campus Area Network (CAN), Metropolitan Area
Network (MAN) and Wide Area Network (WAN).
3.1.2.1 Local Area Network (LAN)
LAN is a computer network that is used to connect computers and work
station to share data and resources such as printers or faxes. LAN is restricted to
a small area such as home, office or college. Devices used in LAN are: HUB
and switch. Media for LAN is UTP cables. Figure 2 shows how all work
stations, server and printer are interconnected with the help of the network
device.

Types of LAN
In LANs, data can be transferred using techniques like token passing. As
per techniques used for data sharing, LANS are classified into Ethernet, Token
Bus, Token Ring and Fibre Distributed Data Interface (FDDI).Figure 3 shows
LAN classification.

Advantages of LAN
a). Provides communication in smaller networks, easy to install and configure.
b). Many users can share data or network elements at the same time which
results in fast work.

Disadvantages of LAN
a). limited number of computers are connected in a LAN.
b). LAN cannot cover large area.
c). Network performance degrades as the number of users exceeds.
3.1.2.2 Campus Area Network (CAN)
Campus Area Network is a computer network made up of two or more LANs
within a limited area. It can cover many buildings in an area. The main feature
of CAN is that all of the computers which are connected together have some
relationship to each other e.g. different buildings in a campus can be connected
using different CAN. It will help to interconnect academic departments, library
and computer laboratories. CAN is larger than LAN but smaller than WAN.
Figure 4 shows a CAN network.

Devices used in CAN are : HUB, Switch, Layer-3 switch, Access Point .And the
media used for CAN is Unshielded twisted pair of cables and fibre Optics
Cable.
3.1.2.3 Metropolitan Area Network (MAN)
MAN is the interconnection of networks in a city. MAN is not owned by a
single organization. It act as a high speed network to allow sharing resources
with in a city. MAN can also be formed by connecting remote LANs through
telephone lines or radio links. MAN supports data and voice transmission. The
best example of MAN is cable T.V network in a city.

3.1.2.4Wide Area Network (WAN)


WAN covers a wide geographical area which include multiple computers
or LANs. It connects computer networks through public networks like,
telephone system, microwave, satellite link or leased line. Most of the WANs
use leased lines for internet access as they provide faster data transfer. WAN
helps an organization to establish network between all its departments and
offices located in the same or different cities. It also enables communication
between the organization and rest world.
Devices used in WAN is only Router.
3.2 IP ADDRESSES and MAC Addresses
It is also called as logical addresses. IP is a 32 bit long and it is divided into 4
octets and dot (.) is used to separate one octet from another. It is represented in
the form of decimals. There are two versions of IP addresses:
- IPv4
- IPv6
Table 2 Comparison between IPv4 and IPv6

3.2.1 IP Address Classes


IP address is a 32 bit address. It is divided into various classes namely Class A,
Class B, Class C, Class D and Class E. TCP/IP defines Class D for experimental
purpose. TCP /IP address contains two addresses embedded within one IP
address; Network address and host address as shown in figure.

Class A consists of 8-bit network ID and 24-bit host ID. Class B consists of
16- bit network ID and 16-bit of host ID. And Class C consists of 24-bit of
network ID and 8-bit of host ID.

Address Classes

Table 3: Address Classes

3.2.1.1 How to Assign IP Address to Computer


An IP address assigned to a computer may either be permanent address or
address that is assigned to a computer on a time lease or for temporary basis.
Hence, the address granted to computers is divided into two categories Dynamic
IP addresses and Static addresses.
Dynamic IP Addresses
Dynamic IP addresses are assigned to the devices that require temporary
connectivity to the network or non-permanent devices such as portable
computer. The most common protocol used for assigning Dynamic IP address is
DHCP also called Dynamic Host Configuration Protocol. The DHCP grants IP
address to the computer on lease basis.
Static IP Addresses
Static IP addresses are assigned to the device on the network whose
existence in the network remains for a longer duration. These static IP
addresses are semi-permanent IP addresses which remain allocated to a specific
device for longer time e.g. Server.
3.2.1.2 How to Configure IP Address in window 2003

Right click on My Network Places-properties


Right click on working LAN card-properties
Select internet protocol (TCP/IP)-properties
Tick on-Use the following IP addresses- now fill the IP address e.g 10.0.0.1
Tick on Use the following DNS server address
Fill the preferred DNS server 10.0.0.1
Ok
Close
Now check the connectivity of computer with itself with command
Start-run-cmd-ping 10.0.0.1
3.2.2 MAC Addressing
MAC address is a hardware address that is embedded in the NIC card. It is also
known as hardware address or physical address. Every NIC card has a unique
MAC address assigned by IEEE. MAC address is used to identify the nodes at
lower levels of OSI model. The MAC address operates at the data link layer of
the OSI model.MAC address is a 12 digit hexadecimal number (48 bit address).
It is made up of numbers from 0-9 or a letter from A-F. MAC address can be
written in the format:
MM:MM:MM:SS:SS:SS
To identify the MAC address in window:
Click Start Run
Enter cmd in the Open text book
Type ipconfig /all
Press Enter
The 12 digit MAC address will be shown as say 00:11:11:EA:8D:F6
3.3 NETWORKING MEDIA
To do networking we need to use some type of media. There are many types of
media.
(i)
Coaxial Cable
(ii) Fibre optic cable
(iii) Twisted Pair of Cables
(iv) Micro- wave
(v) Satellite
Coaxial Cable

Coaxial cable consists of an insulated copper conductor surrounded by a tube


shaped copper braid outer copper tune and the inner conductor have the same
axis of curvature hence it called coaxial cable. It is basically of two types:
(i)Base Band Cable (RG 59)
(ii)Broad Band Cable (RG 58)
We used Base Band signal cable in Networking of Computers, It is so called
because it carries single frequency. Its speed is 10 Mbps and impedance is 50 .
Whereas Broad Band Cables carries multiple frequencies. Connector used for
Coaxial cable is BNC(British Novel Connector) connector. ARCnet uses RG-62
coaxial cable. It has an impedance of 93 and has a comparatively lesser
attenuation, hence yield greater distances. These cables are expensive and
provide high propagation factor.
Fibre Optical Cable
Fibre optic cable consists of a very fine fibre made from two types of glass, one
for the inner core and the other for the outer layer. Here signal is transmitted in
the form of light. Different varieties of fibre optics is used depending on the size
of the network. Single mode fibre optics is used for networks spanning longer
distance. Fibre Optics has lower propagation factor than coaxial cable. It is a
costly but more secure transmission media.
Twisted Pair Cable
There are two wires, which are twisted with each other to avoid EMI (Electro
Magnetic Induction). These cables are easy to terminate. However they have a
slightly higher value of attenuation value and hence have limited distance
covering capacity. Connector used for Twisted Pair of Cable is (Registered Jack)
RJ-45 and RJ-11. There are two types of twisted pair of cables:
STP (Shielded Twisted Pair): In this an extra wire which is called shielded
wire is wrapped over the inner cover which holds copper in pairs. This
protection is used to protect signal from external noise.
UTP (Unshielded Twisted Pair): In this type of wire no shielded cover is there
for extra protection from noise. There are different categories of UTP cables.

Categories of UTP Cables

Table 4: Category and Speed of UTP cables

3.3.1 Ethernet Cabling


There are three types of Ethernet cables:
Straight cable
Crossover cable
Rolled cable
3.3.1.1 Straight cable
It is used when we have to connect
PC TO Switch
PC to Hub
Hub to Router
Switch to Router
Colour Coding for straight Cable
TABLE 5

3.3.1.2 Crossover Cable

It is used when we have to connect:


PC to PC
Hub to Hub
Switch to switch
Router to Router
PC to Router
Hub to Switch
Colour Coding for Crossover cable
Table 6 Colour Coding for Crossover cable

3.3.1.3 Rollover Cable


Rollover cable isnt used to connect any Ethernet connections together, but
Rollover cable can be used to connect a host to a router console serial
communication (com) port.
NOTE: Straight cable and Cross cables are used for data transfer but
Rollover cables are not used for data transfer.
There are two methods for manufacturing Rollover cables:

Table 7

Colour Coding for Rollover Cable

3.4 OPERATING SYSTEM


3.4.1 Types of Operating Systems
i)
ii)

DOS (Desktop Operating System)


NOS (Network Operating System)

DOS
1. It is a desktop operating system.

NOS
1. It is a network operating system.

2. It is used in small networks.

2. It is used for large networks.

3. In this OS, there is less security.

3. In this OS, there is more security.

4. In this OS, all computers are 4. In this OS, there are servers and
clients.
clients.
5. In this OS, MS-DOS, GUI 5. In this OS Win NT, Win 2000,
packageWin3.1, Win 95, Win 98, Win Win2003, LINUX, UNIX, Novell and
ME comes.
MAC comes.

3.4.1.1 Introduction to Window 2003 Server

Window server 2003 (also referred to as WIN 2k3) is a server operating system
produced by Microsoft. Introduced in 24th April 2003 as the successor to
window 2000 server, it is considered by Microsoft to be the corner stone of its
window server system line of business server products. An update version
Window Server 2003 R2 was released manufacturing on 6 th Dec, 2005. Its
successor window 2008 was released on 4th Feb, 2008. According to Microsoft,
window server 2003 is more scalable and deliver better performance than its
predecessor window 2000.
Features of Window 2003
(i)
(ii)

A significant improved version of Internet Information Service (IIS)


Increased default security over previous version due to the built in
firewall and having most services disabled by default.
(iii) Manage your server-a role management administrative tools that allow
an administrator to choose what functionality the server should
provide.
(iv) Improvement to Active Directory.
(v) Improvement to Group Policy handling and Administration.
(vi) Provides a Backup system to restore lost files.
(vii) Improved disk management, including the ability to Backup from
shadows of files, allowing the Backup of open files.
(viii) Improved security and command line tools which are part of
Microsoft initiative to bring a complete command shell to the next
version of window.
(ix) Support for a hard based Watch Dog Timer, which can restart the
server if the operating system does not suspend within a certain
amount of time.
Removed Features
The ability of creating server disk automated system recovery (ASR) is used
instead .
Edition of Window 2003
Window server 2003 comes in a number of editions, each targeted towards
a particular size and type of business. In general, all variant of window server
2003 have the ability to share files and printers, act as application server and
host message queue, provide email services, authenticate users, act as an
X.509certificate server, provide LDAP (Light Weight Directory Access

Protocol)services, serve streaming media, and to perform other server-oriented


functions.
3.5 DNS SERVER
DNS stands for domain name system. DNS system is a standard technology for
managing the names of websites and other internet domains. DNS techniques
allows you to type names into your web browser like computer networking,
about computer and allow your computer to automatically find that address on
internet. DNS is the resolution mechanism used by Window Server 2003
clients to find other computers and services running on those
computers for computers in a window 2003 network infrastructure to
talk to one another, one of the key ingredients is the DNS server .Host name
alone do not communicate globally but communicate locally, but if domain
name is added along with it then the host name can communicate globally. DNS
is use for name reservation i.e. to convert IP address to host name and host
name to IP address or the function of DNS is to resolve host name such as
www.yahoo.com to an IP address. User identify only user friendly name
and all computers and technologies identify IP address and MAC address DNS
is use to solve this problem because DNS is used to convert host name FQDN
(fully qualified domain name) to IP address and IP address to host name.

3.5.1 PARTS OF DNS SYSTEM


(i) Host name
(ii) Domain name
(iii) FQDN
(iv) Namespace
(v) DNS server
3.5.1.1 HOST NAME
Host name is a computer name and is also called is NetBIOS (network basic
Input/Output system) name. NetBIOS is actually an application layer protocol
that can use the transport services of TCP/ IP when used in routed network. A
NetBIOS name is16- byte addresses that identify a NetBIOS resource on the
network.

3.5.1.2 DOMAIN NAME


Domain name is used to identifies the internet site one can identifies the
location without having to remember the IP address of every location e.g.
yahoo.com or gmail.com
3.5.1.3FQDN
FQDN means fully qualified domain name which represents a hostname
appended to the parent name space in hierarchy. Also in fully qualified domain
name different levels of namespace are visualize as in fig below this hierarchy is
visualized the root level namespace, top level domain, and so on, in use
throughout the internet today. Left most portion of the FQDN is the host portion
of the name. A host name is alias we give to an IP address.

FQDN is a unique name in the computer on the network. We can identify host id
and location of a computer as in fig above. Suppose we want to find location of
pc1 with IP address 20.0.0.1, which is in lab2, 2 nd floor in the organization
centre. The FQDN for this is
Pc1.row3.lab2.floor2.center.com
But this address is very lengthy to locate pc1 so to simplify this we use c
name technique as:
Pc1.center.com=20.0.0.1

3.5.1.4 Domain Namespace


DNS operates in what is known as DNS namespace. The DNS namespace is an
organized, hierarchical division of DNS names. Domain namespace enable
users to easily locate the network services and resources. The domain
namespace include the root domain, the top level domain of the organization
and organize these domain in a hierarchical tree structure. Namespace works on
the hierarchical tree structure of root domain. There are total 13 root domain
working in the internet, they are A, B, C, D, E, F,G, H, I, J, K, L and M. There is
one root domain, which acts as the starting point of the fully qualified
domain names. This root domain is designated with a dot (.). Fig 7
shows the tree structure or domain namespace.

3.5.1.5 DNS server


Any computer providing domain namespace is a DNS server. DNS server is
used to convert host name FQDN into IP address and IP address into host name
FQDN. To store the name-to-IP-addresses mappings so crucial to network
communication, name server uses zone files.

3.5.2 DNS Zone


Zone is the part of DNS database that contain record of domain or multiple
domain. If the domains represents logical division of the DNS namespace,
zones represents the physical separation of the DNS namespace. In other words
information about records of the resources within DNS domain is stored in a
zone files, and this zone files exist on hard drive of server. Zone files are
divided into one of two basic types:
Forward lookup zone: Provides host-name-to-IP-address resolution
Reverse lookup zone: Provides IP-address-to-host-name resolution
3.5.2.1 Resource record stored in a zone file
Each record stored in a zone file has a specific purpose. Some of the records set
the behaviour of the name server, others have the job of resolving a host name
or service into an IP table.
(i)NS (Name Server):
These specify the name servers that are authoritative for a given portion of DNS
namespace. These records are essential when DNS servers are performing
iterative queries to perform name resolution.
(ii)SOA (Start of Authority):
This resource record indicates the name of origin for the zone contains the name
of the server that is the primary source for information about the zone. The
information in an SOA record affect how often transfer of the zone are done
between servers authoritative for the zone. It is also used to store other
properties such as version information and timings that affect zone renewal or
expiration.
(iii)CNAME (Canonical Name):
CNAME can be used to assign multiple names of a single IP address.
For example, the server hosting the site www.abc.com is probably not named
www, but a CNAME record exist resolution of www to an IP address all the
same. The CNAME record actually points not to an IP address, but to an
existing A record in the zone.

3.5.2.2 Steps to Install and configure DNS server


Start control panel add and remove program
Add remove window components
Select networking services and click on detail button
Check box of DNS server
Ok and finish
3.5.2.3 Creating a Forward Lookup Zone
Statically fill the IP address
Start administrator tools
DNS right click on forward lookup zone
New zone next
Select primary zone next
Enter zone name (abc.com) next
Tick Allow both secure and non secure updates and secure dynamic updated
next next
now click on created zone (abc.com)
new host enter host name for global level (i.e by entering www) fill IP
address of the web server , click on add button
enter another host name, a blank host with same IP i.e do not fill its host name
Steps to change SOA and NS records
Right click on SOA records properties
Fill primary server e.g (www.abc.com) responsible person
host master.abc.com apply ok
right click on NS records
click on add button enter FQDN www.abc.com
resolve ok apply ok
Now go to start menu ping abc.com
On Client Side To access DNS server fill IP address of server then use ping
command
Eg. Ping www.abc.com

3.5.2.3 Creating a Reverse Lookup Zone


Right click on reverse lookup zone
New zone next select primary zone next
Fill Network ID next next
Select allow both non secure and non secure dynamic updates
Finish
Right click on created reverse zone new pointer
enter host IP number e.g (50.0.0.50)
enter FQDN (www.chd.com)
3.5.2.4 Some DNS Commands
(i) c:>tracert www.yahoo.com
Command is used to check the path, a data packet follow from one router to
another router.
(ii) c:>nslookup
Command display the domain name with IP (works only when reverse look up
zone is set up).
(iii)c:>ipconfig /all
This command display FQDN, IP address, MAC address.
(iv) c:>ipconfig /flushdns
This command flush or clear all the information in the cache that is retrieved
from DNS server.
(v) c:>ipconfig /displaydns
Display the current contents or entries in the cache.
(vi)c:>ip config /register
Register any DNS name
3.6 DHCP SERVER
DHCP (Dynamic Host Configuration Protocol) is a protocol that allocates IP
address to computer on a network. DHCP centralized the management of IP
address allocation and reduces human error associated with manual IP
configuration. DHCP server supplies all the necessary networking parameters.
Two things are always handed out as a part of DHCP configuration: IP address
and subnet mask. Further DHCP will frequently configure clients with optional

values, such as a default gateway, DNS server address, and the address of a
Window Internet Naming Server, if one is present.
3.6.1 Working of DHCP Server
(i)DHCP Scope
(ii)DHCP Super Scope
(iii)Exclusion IP Range
(iv)DHCP Lease Time
(v)IP Reservation
DHCP Scope
Scope having the range of IP address for providing dynamic IP address to
other computer. A group of IP address within a scope is called as DHCP scope.
DHCP Super Scope
A super scope is used to combine two or more scopes each serving different
subnets, and can make the administration of several scopes on window 2003
DHCP server more manageable. Using super scope you can group multiple
scopes as a single administrative entity that allows the client to lease from either
one. With this feature, a DHCP server can:
Support DHCP clients on a single physical network segment where multiple
logical IP networks are used. When more than one logical IP network is used on
each physical subnet or network, such configuration is called multinets.
Support DHCP clients located on the far side of DHCP and BOOTP relay
agent.
In multinet configuration, DHCP super scope can be used to group and
activate individual scope ranges of IP addresses used on your network. In this
way, a DHCP server computer can activate and provide leases from more than
one scope to clients on a single physical network.
Exclusion IP range
If you want to reserve some IP for any computer i.e. if we want that from the
series of 192.168.0.2 to 192.168.0.100 if we want that a series of IP addresses
must not be assigned automatically then at can be done using exclusive IP
range.

DHCP Leased Time


DHCP lease time is validity of IP address. By default DHCP lease time is 8 days
minimum, 1 day maximum 999 days, 23 hours to 53 day. Within 8 days:After 80% of day clients demand new IP sometimes server refuse the client
request.
After 87.5% of days it will retry, and if the server did not give the new IP
address then the client will receive APIPA address (Automatic Private IP
Address).
When a DHCP client is unable to locate a DHCP server, the client picks out a
random IP address from the private APIPA address range of 169.254.*.*, with a
subnet mask of 255.255.0.0. The 169.254.*.* IP range is private because that
network number is not in use on the internet, it is random because the client
generates an arbitrary host number for that network.
The significance of APIPA is that DHCP client computers that cannot find a
DHCP server can still be assigned an IP address and communicate with other
computers on the same subnet mask that also cannot find DHCP server. It
allows communication when DHCP server is down or just plain not there. Note
that APIPA does not assign a default gateway, and therefore it cannot
communicate with any computer that lives on the other side of a router.
IP Reservation
There are some DHCP clients that you want to be the DHCP clients, but you
will also want to make sure that they get same IP address every time. This can
be done by statically filling the IP address. We can reserve IP address with the
help of MAC address for a particular computer.
3.6.2 Installation Steps of DHCP Server
Start control panel
Add and remove program add and remove window components
Select networking services and click on detail button
Check box of DHCP server
Ok finish
3.6.2.1Steps To Configure DHCP Server
Start program administrative tool
Select DHCP

Create new scope in action menu new scope next


Give scope name next
Give IP address range next
add exclusion name next
check lease duration next finish
After DHCP server is configured, it is required to be authorized and DHCP
scope should be active. For that select DHCP server and click on authorize in
action menu. Then right click on scope name and click on active.
3.6.2.2 On Client Side
Go to LAN card properties select TCP/IP protocol properties
Select obtain IP address automatically
Go to command prompt (cmd)
Give command
3.6.2.3Backup of DHCP Server
We can take backup of all the configuration in DHCP server with the help
of administrator. Backup means to export the DHCP database to another system,
as it is helpful in case due to any reason our data is corrupted or deleted, we can
take our database from the place where it is stored. Steps of taking back up:
Stop the DHCP server and disable the DHCP server services
Copy the DHCP server directory to a temporary location, say pen drive or on a
new DHCP server.
3.6.3DHCP Relay Agent
The DHCP relay agent is a software that listen DHCP discover packet and
forward to DHCP server. In window 2003 server system the DHCP relay agent
can be enabled as a part of Routing and Remote Access (RRAS).
3.6.3.1 Steps To Configure DHCP Relay Agent
Set the network, fill the IP address and select two LAN cards
Open Routing and Remote Access enable Routing and Remote Access
Right click on general new routing protocols
Select DHCP relay agent
New interface
Select LAN card which is to be connected to the cross cable i.e L1
Ok

Right click on relay agent properties


Enter IP address of DHCP server
Add apply ok
3.7 ACTIVE DIRECTORY
With the release of Windows 2000, Microsoft introduced Active Directory, a
scalable, robust directory service. Active Directory is used to create server
based networking. Active Directorys job is to store and make available a
Directory database i.e. information about the user, its class, name, address,
mails, phone numbers, location.
Active Directory is a technology created by Microsoft that provides a variety
of network services like Directory Services, DNS based naming and other
network information. Active Directory also allows administrator to assign
policies, deploy software and apply critical updates to an organizations. Active
Directory was previewed in 1999, released first with window 2000 server
edition and revised to extend functionally and improve administration in
Window 2003. Additional improvements were made in Window server 2003
and Window server 2008.
The fundamental building block of Microsofts Directory services continues to
be a domain. A domain is logically grouping of network resources, including
shares, printers, groups and users accounts. The user account represents the
individual to domain, and allows for different type of access and different types
of tasks. Every users account is unique. It has uniqueness of the user account
that allows administrator to control access for every member of domain.
There are two types of user accounts: local account and domain account. Local
accounts are maintained in the local database of a computer and cannot be used
to grant access to network resources. Local users are primarily used to
administer a computer or to allow several people to share a single computer that
is not a member of a domain. Whereas domain users accounts are much more
widely used in organizations that local user accounts because they allow for
central administration and user can log onto any computer in the domain.
Domain user accounts are stored in Active Directory.
3.7.1 Active Directory Services
A computer network can be divided logically into two networking models.
Workgroup
Domain

Difference Between Workgroup and Domain


Table 9
Workgroup
Domain
1. It is a peer-to-peer networking 1. It is a server based networking
model.
model.
2. There is no client and no 2. There is a centralized dedicated
server. All computers are in server computer
called
domain
equal status.
controller (DC) which controls all
other computers called clients.
3. This model is recommended 3. This model is recommended for
for small networks (up to 10 large networks.
pcs).
4. There is no centralized 4. There is centralized administration
Administration and each PC is and each PC can be administrated and
administrated separately.
managed from the server.
5. In this model, low grade
operating system like 2000/xp
professional, win 98 etc. can be
used.
6. Workgroup can be given names
like sales, HR, accounts etc.

5. In this model high grade operating


system, like win2000/2003 server are
used.
6. Domain can also given names like
abc.com, xyz.com etc.

7. User accounts are created in 7. User accounts are created on


each PC and are called as sever side DC and are called as
Local Users.
Domain Users.
Active Directory uses domain to hold objects, each domain has security
boundary. Users must authenticates to the domain in which their users account
resides before they can access resources, such as a shared folders. Active
Directory also links related domains in a hierarchical structure and users can
access resources in any of the domain in which their user account resides. The
hierarchical structures of related domain is called a tree, and all domains in the
tree share the same Domain Name System (DNS) namespace. All the domains

and the trees in a single organization are called a forest. All domains in the
forest share same schema.
3.7.1.1 Types of Domain
Domain Forest
Domain Tree
Organization unit
Domain Forest
A forest is created when window 2k3 server computer is configured as a domain
controller. A forest is a collection of multiple domain link together and
relationship between the domains.
Domain Tree
A domain tree is made up when there is a parent child relationship between the
domain in the forest. The child domain includes the complete parent domain
name. a tree is a set of two or more domains sharing common namespace e.g we
can create a parent domain and then child domain like mail.yahoo.com; where
mail- child domain, yahoo- parent domain.

Organization Unit (OU)


Organization unit is the smallest unit in a domain network that can contain
users, computer groups, shared folders, printers and group policy object in
simple words. OU means department like sale department, accounts department
like sales, accounts in accompany OU can be used to apply different security
policies to computer and users indifferent department. OU also helps in dividing
administration among different administrator of managing only computer and
users of sales department.
3.7.1.2 Types of Domain Controller
(i)
(ii)
(iii)

PDC : Primary domain controller


ADC : Additional domain controller
BDC : Backup domain controller

Primary Domain Controller (PDC)


This is the first domain controller, in this domain all entries are created in it like
users account, group policy, Organization unit etc. All FSMO role are done in
PDC.
Additional Domain Controller (ADC)
It is a domain network, it is important to have more than one DC so that if one
DC fails, the other DC will continue serving the client. There is also load
balancing of Active Directory Service if we have more than one DC. The first
DC we create is simply called PDC and if we create an extra DC then that DC is
known as ADC. ADC has same configuration of AD as primary domain
controller. All domain controllers in a domain networking are masters. We can
make a change in the active directory of any domain controller and that change
is replicated to all other domain controllers. Replication takes place among all
the domain controllers and itis controlled automatically. If we create a user in
the first domain controller, it is automatically created in the ADC because of
replication. All the domain controllers in the domain networking are peers and
this model is called as multi- master model.

3.7.1.3 Requirements of Active Directory


(i)
(ii)
(iii)
(iv)
(v)
(vi)

Window 2000/2003 server computer.


At least one NTFS partition.
Static IP address
At least 1GB free hard disk space
LAN card enabled and connected to the network
Install DNS, if not installed of Active Directory and configure it.

It should be noted that active directory cannot work without DNS.DNS is


automatically installed and configured during the Active Directory installation.
3.7.1.4 Installation of Active Directory
First of all fill the static IP address, then install DNS service into it and after that
install the Active Directory
start run dcpromo
Ok
Welcome to active directory next next
Select domain controller for a new domain e.g. (gmail.com)
Next
Domain NETBIOS name (gmail.com)
Next
Data folder, folder new tech directory service next (SYS VOL)
Next
Click on install and configure the DNS server on this computer to use thisDNS
server as its preferred DNS server.
Tick on permission compatible only with window server
Next
Enter the restore mode and the password
next next finish
now restart computer
Command used for the removal of Active Directory
start run dcpromo

This command is also used to remove active directory, if after this command the
active directory is not removed then type
start run
cmd dcpromo /forceremoval
Ok
How to identify Active Directory installation
Start administrator tool
After that if three options specified if come, it means that Active Directory has
been installed
Active Directory domain and trusts
Active Directory sites and services
Active Directory users and computer
Open DNS console by
Administrator tools DNS
Forward lookup zone msdcs.exam.edu
start of authority (SOA)
name server (NS) Now ping active directory with domain name like
start run ping gmail.com
Backup of Active Directory
Active Directory backup come in use when there is some problem in active
directory. If there is any problem in active directory then remove it and restore
the backup.
Start run ntbackup ok
Select advance mode and untick that is already ticked
Select backup
Select system state
Change backup path browse keep in your hardware and then send it to the pen
drive
D:\adbackup

3.7.2CHILD DOMAIN
A domain is created say xyz.com. This domain is known as parent domain or
the root domain. Now chd.xyz.com will be the child domain or the sub
domain of xyz.com.

A child domain is created to ease administration in a very large domain


network. We can create the parent domain in the head office of the company and
the child domain in the branch offices.
Each branch office will have its own administrator to manage the users of the
child domain present in the branch office.
A true relationship is automatically created between the parent domain and the
child domain. This means users in the child domain can access the file server of
the parent domain. Moreover users of either domain can use clients of either
domain for logging in the domain but a user can always logon only in the
domain in which his account resides, though he physically can use client pc of
parent or client domain. Users of either domain can logon its own domain from
either side but only when it use its own domain name. Users of parent domain
can communicate with child domain but he has to use its domain name for that.
3.7.2.1 Steps to create child domain

First of all install the active directory on pc1 i.e. on the parent domain. Now
make Tom user on it. On pc2 create the child domain, then make users on it,
user- Ram Below are the steps to create child domain.
Fill the IP address in the child domain
Now ping to the parent domain with the domain name (xyz.com)
Run dcpromo ok
next select domain controller for a new domain
next select child domain and existing domain name (mcse.com)
next
enter username, password and domain name
enter user parent domain name also enter child domain name
enter complete DNS name i.e. xyz.mcse.com
next next next next
It should be noted that parent domain can logon into child domain but on the
other hand child domain cannot logon to the parent domain. Also parent domain
can apply policies or security on the child domain. Make the client member by
entering particular user with its domain name.
First right click on My Computer
Properties
Computer name
Change
Write domain name ok
Now logoff start and then write user name Tom
Domain name - mcse.com
Again logoff and check the other user
Start-user name- abc
Domain name mail.mcse.com
3.8 INTERNET SHAREING
We can share a single internet connection to multiple computers with the help
of networking or internet sharing. There are four ways to share internet.

S-ar putea să vă placă și