Professional Documents
Culture Documents
1
1.2 Benefit
1) Centralization: Unlike P2P, where there is no central administration, here in this
architecture there is a centralized control. Servers help in administering the whole set-
up. Access rights and resource allocation is done by Servers.
2) Proper Management : All the files are stored at the same place. In this way, management
of files becomes easy. Also it becomes easier to find files.
3) Back-up and Recovery possible: As all the data is stored on server it’s easy to make a
back-up of it. Also, in case of some break-down if data is lost, it can be recovered easily
and efficiently. While in peer computing we have to take back-up at every workstation.
4) Up gradation and Scalability in Client-server set-up: Changes can be made easily by just
upgrading the server. Also new resources and systems can be added by making necessary
changes in server.
5) Accessibility: From various platforms in the network, server can be accessed remotely.
6) As new information is uploaded in database, each workstation need not have its own
storage capacities increased (as may be the case in peer-to-peer systems). All the changes
are made only in central computer on which server database exists.
7) Security: Rules defining security and access rights can be defined at the time of set-up
of server.
CHAPTER NO - 2
2
2.1 Software
2.1.1 Virtual BOX
Virtual Box is a cross-platform virtualization application. What does that mean? For one thing, it
installs on your existing Intel or AMD-based computers, whether they are running Windows, Mac
or Linux operating systems. Secondly, it extends the capabilities of your existing computer so that
it can run multiple operating systems (inside multiple virtual machines) at the same time. So, for
example, you can run Windows and Linux on your Mac, run Windows Server 2008 on your Linux
server, run Linux on your Windows PC, and so on, all alongside your existing applications. You
can install and run as many virtual machines as you like -- the only practical limits are disk space
and memory.
3
Virtual Box is deceptively simple yet also very powerful. It can run everywhere from small
embedded systems or desktop class machines all the way up to datacenter deployments and even
Cloud environments.
Running multiple operating systems simultaneously - Virtual Box allows you to run
more than one operating system at a time. This way, you can run software written for one operating
system on another (for example, Windows software on Linux or a Mac) without having to reboot
to use it. Since you can configure what kinds of "virtual" hardware should be presented to each
such operating system, you can install an old operating system such as DOS or OS/2 even if your
real computer's hardware is no longer supported by that operating system.
Easier software installations - Software vendors can use virtual machines to ship entire software
configurations. For example, installing a complete mail server solution on a real machine can be a
tedious task. With Virtual Box, such a complex setup (then often called an "appliance") can be
packed into a virtual machine. Installing and running a mail server becomes as easy as importing
such an appliance into Virtual Box.
4
2.1.2 GNS3
GNS3 is a Graphical Network Simulator that allows emulation of complex networks. You may
be familiar with Virtual box or Virtual PC that are used to emulate various operating systems in a
virtual environment. These programs allow you to run operating systems such as Windows XP
Professional or Ubuntu Linux in a virtual environment on your computer. GNS3 allows the same
type of emulation using Cisco Internetwork Operating Systems. It allows you to run a Cisco IOS in
a virtual environment on your computer. GNS3 is a graphical front end to a product called
Dynagen. Dynamips is the core program that allows IOS emulation. Dinesen runs on top of
Dynamo ips to create a more user friendly, text-based environment. A user may create network
topologies using simple Windows ini-type files with Dynagen running on top of Dynamics. GNS3
takes this a step further by providing a graphical environment.
5
GNS3 allows the emulation of Cisco IOSs on your Windows or Linux based computer. Emulation
is possible for a long list of router platforms and PIX firewalls. Using an EtherSwitch card in a
router, switching platforms may also be emulated to the degree of the card’s supported
functionality. This means that GNS3 is an invaluable tool for preparing for Cisco certifications
such as CCNA and CCNP. There are a number of router simulators on the market, but they are
limited to the commands that the developer chooses to include. Almost always there are commands
or parameters that are not supported when working on a practice lab. In these simulators you are
only seeing a representation of the output of a simulated router. The accuracy of that representation
is only as good as the developer makes it. With GNS3 you are running an actual Cisco IOS, so you
will see exactly what the IOS produces and will have access to any command or parameter
supported by the IOS. In addition, GNS3 is an open source, free program for you to use. However,
due to licensing restrictions, you will have to provide your own Cisco IOSs to use with GNS3.
Also, GNS3 will provide around 1,000 packets per second throughput in a virtual environment. A
normal router will provide a hundred to a thousand times greater throughput. GNS3 does not take
the place of a real router, but is meant to be a tool for learning and testing in a lab environment.
Using GNS3 in any other way would be considered improper.
Server:-2003/2008/2008R2/2012
6
2.1.4 Putty
PuTTY is a free and open-source terminal emulator, serial console and network file transfer
application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw
socket connection. It can also connect to a serial port. The name "PuTTY" has no definitive
meaning.
PuTTY was originally written for Microsoft Windows, but it has been ported to various other
operating systems. Official ports are available for some Unix-like platforms, with work-in-progress
ports to Classic Mac OS and macOS, and unofficial ports have been contributed to platforms such
as Symbian, Windows Mobile and Windows Phone.
Fig-2.1.3 Putty
7
2.1.5 Packet Tracer
Packet Tracer is a cross-platform network simulator designed by Cisco Systems to run on Mac OS,
Linux and Microsoft Windows. A similar Android app is also available. Packet Tracer allows users
to create simulated network topologies by dragging and dropping routers, switches and various
other types of network devices. A physical connection between devices is represented by a "cable"
item. Packet Tracer supports an array of simulated Application Layer protocols, as well as basic
routing with RIP, OSPF, EIGRP, BGP, to the extents required by the current CCNA curriculum. As
of version 5.3, Packet Tracer also supports the Border Gateway Protocol.
Version 6.0 added support for IOS version 15 and Hot Standby Routing Protocol. Version 6.1.1
added support for various DHCP, EIGRP and OSPF commands, improved support for Zone-Based
Firewall policies. As of version 6.2, Packet Tracer supports an embedded web server with
JavaScript and CSS support. The command line can be used for creating a router-to-pc connection.
8
2.2 Hardware
2.2.1 Server
In computing, a server is a computer program or a device that provides functionality for other
programs or devices, called "clients". This architecture is called the client–server model, and a
single overall computation is distributed across multiple processes or devices. Servers can
provide various functionalities, often called "services", such as sharing data or resources
among multiple clients, or performing computation for a client. A single server can serve
multiple clients, and a single client can use multiple servers. A client process may run on the
same device or may connect over a network to a server on a different device. Typical servers
are database servers, file servers, mail servers, print servers, web servers, game servers, and
application servers.
Client–server systems are today most frequently implemented by (and often identified with) the
request–response model: a client sends a request to the server, which performs some action and
sends a response back to the client, typically with a result or acknowledgement. Designating a
computer as "server-class hardware" implies that it is specialized for running servers on it. This
often implies that it is more powerful and reliable than standard personal computers, but
alternatively, large computing clusters may be composed of many relatively simple, replaceable
server components.
9
Server type Purpose Clients
Application Hosts web apps (computer programs that run Computers with a web
server inside a web browser) allowing users in the browser
network to run and use them, without having
to install a copy on their own computers.
Unlike what the name might imply, these
servers need not be part of the world wide
web; any local network would do.
Catalog server Maintains an index or table of contents of Any computer program that
information that can be found across a large needs to find something on
distributed network, such as computers, users, the network, such a
files shared on file servers, and web apps. Domain member
Directory servers and name servers are attempting to log in, an
examples of catalog servers. email client looking for an
email address, or a user
looking for a file
Communications Maintains an environment needed for one Communication endpoints
server communication endpoint (user or devices) to (users or devices)
find other endpoints and communicate with
them. It may or may not include a directory of
communication endpoints and a presence
detection service, depending on the openness
and security parameters of the network
Computing Shares vast amounts of computing resources, Any computer program that
server especially CPU and random-access memory, needs more CPU power
over a network. and RAM than a personal
computer can probably
afford. The client must be a
networked computer;
otherwise, there would be
no client–server model.
Database server Maintains and shares any form of database Spreadsheets, accounting
(organized collections of data with predefined software, asset
properties that may be displayed in a table) management software or
over a network. virtually any computer
program that consumes
well-organized data,
especially in large volumes
Fax server Shares one or more fax machines over a Any fax sender or recipient
network, thus eliminating the hassle of
physical access
File server Shares files and folder, storage space to hold Networked computers are
10
files and folders, or both, over a network the intended clients, even
though local programs can
be clients
Game server Enables several computers or gaming devices Personal computers or
to play multiplayer games gaming consoles
Mail server Makes email communication possible in the Senders and recipients of
same way that a post office makes snail mail email
communication possible
Media server Shares digital video or digital audio over a User-attended personal
network through media streaming (transmitting computers equipped with a
content in a way that portions received can be monitor and a speaker
watched or listened as they arrive, as opposed
downloading a whole huge file and then using
it)
Print server Shares one or more printers over a network, Computers in need of
thus eliminating the hassle of physical access printing something
Sound server Enables computer programs of a computer to Computer programs of the
play sound and record sound, individually or same computer
cooperatively
Proxy server Acts as an intermediary between a client and a Any networked computer
server, accepting incoming traffic from the
client and sending it to the server. Reasons for
doing so includes content control and filtering,
improving traffic performance, preventing
unauthorized network access or simply routing
the traffic over a large and complex network.
Web server Hosts web pages. A web server is what makes Computers with a web
world wide web possible. Each website has browser
one or more web servers.
11
2.2.2 Router
A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. A data packet is typically
forwarded from one router to another router through the networks that constitute the
internetwork until it reaches its destination node.
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the address information in the packet to determine
the ultimate destination. Then, using information in its routing table or routing policy, it directs
the packet to the next network on its journey. This creates an overlay internetwork.
TYPES OF ROUTER
STATIC DYNAMIC
We can`t add or remove the ports We can add or remove the ports.
of ports
TYPES OF SWITCH
Manageable Unmanageable
It is also called Configurable switch It is also called plug & play switch
CHAPTER NO - 3
13
3.1 Open Shortest Path First
OSPF (Open Shortest Path First)
OSPF is a standardized Link-State routing protocol, designed to scale efficiently to support larger
networks.
• OSPF will form neighbor relationships with adjacent routers in the same Area.
• Instead of advertising the distance to connected networks, OSPF advertises the status of directly
connected links using Link-State Advertisements (LSAs)..
• OSPF traffic is multicast either to address 224.0.0.5 (all OSPF routers) or 224.0.0.6 (all
Designated Routers).
14
Fig-3.1.1 Configuration
• OSPF uses cost as its metric, which is computed based on the bandwidth of the link. OSPF has no
hop-count limit.
• A topology table – contains a list of all possible routes to all known networks within an area.
• A routing table – contains the best route for each known network.
To solve the problem switchport vlan. A vlan is a single broadcast domain. All device connected to
the vlan receive broadcast sent by any other vlan member but diff vlan will not receive those same
broadcast.
[VLAN Membership]
Static vlan: - static vlan offer port based membership , in which switch port are assigned to specific
vlan .
Dynamic vlan :- a dynamic vlan membership is configured using a special server called a vlan
membership policy server (vmps).
15
Fig-3.2.1 Vlan
Switch(config)#vlan<vlan number>
Or
Switch#vlan database
Switch(config-if)#switchport
Switch#show vlan
16
Fig-3.2.2 Configuration
A trunk link , however can transport more than one vlan through a single switchport trunk link are most
benefit when switch are connected to other switch or switch are connected to routers.Cisco support trunking
on both fastethernet and gigabit Ethernet.
17
Vlan frame identification
Because a trunk link can transport many vlan a switch must identify frame with their respective
vlan as they are sent and received over a trunk link that is called frame tagging .
The isl is a cisco proprietary method .isl perform frame identification in layer 2 by encapsulating
each frame between a header and a trailer .
Before transmit frame isl add 26 byte header and 4 byte trailer to the frame .
IEEE 802.1q
It is open standard protocol .default encapsulation cisco 2900 switch.
18
Dynamic trunking protocol:
You can manually configure trunk link on catalyst switch for either isl or 802.1q mode .in addition.
cisco has implemented a proprietory , point to point protocol called DTP that negotiate a common
trunking mode between two switch.(30 sec)
Switch(config-if)#switchport
A switch port must be in layer 2 mode before it can support a trunk .to accomplish this you use
switchport command.You then can configure the trunk encapsulation with the switchport trunk
encapsulation command.
Isl :-Vlan are tagged by encapsulation each frame using the cisco isl protocol.
Dot1q:-Vlan are tagged in each frame using the ieee 802.1q standard.
Negotiate (default):- the encapsulating is negotiated to select either isl or ieee802.1q .if both end
support both type end support both type isl is favored.
19
Inter Vlan Communication
After creating Vlans, each Vlan has own broadcast domain. If we want communication from one
Vlan to another Vlan then we need to perform routing. There are three methods for inter vlan
communication.
In this method a special router is used for Inter Vlan. In this router, we can create one interface for
each Vlan. The physical interface of router will be connected on trunk port switch. This router will
route traffic on the same interface by swapping vlan id information with the help of frame tagging
protocol.
Router
Fa 0/0.1 – 10.0.0.1 -> Vlan1
Trunk
Vlan 1, 3, 5
T T T
1 3 5 1 3 5 1 3 5
20
Router(config)#interface fastethernet
Configuration on Router 0/0.2
Router#configter
Router(config-if)#encapsulation dot1q
Router(config)#interface fastethernet
3
0/0
Router(config-if)#ip address 11.0.0.1
Router(config-if)#no ip address
255.0.0.0
Router(config-if)#no sh
Router(config-if)#no sh
Router(config-if)#exit
Router(config-if)#exit
3.4 VRRP
Virtual Router Redundancy Protocol (VRRP) [RFC 3768] is designed to eliminate the single point
of failure inherent in the static default routed environment. Specifies an election protocol that
dynamically assigns responsibility for a virtual router to one of the VRRP routers on a LAN.VRRP
provides a function similar to a Cisco Systems, Inc. proprietary protocol named Hot Standby
Router Protocol (HSRP).A Digital Equipment Corporation, Inc. proprietary protocol named IP
Standby Protocol (IPSTB).A virtual router an abstract representation of master and backup
physical routers acting as a group consists of a Virtual Router Identifier (VRID) and a set of
associated IP address(es) across a common LAN. Master router performs packet forwarding for
local hosts answers ARP requests for these IP address(es) associated with a virtual router only one
master router doing the actual routing backup routers“back up” in case the master router fails.
Priority
A value between 0-255.
0: indicate the current Master has stopped participating in VRRP
255: for the VRRP router that owns the IP addresses associated with the virtual router
Note that if the IP address owner is available, then it will always become the Master.
1-254: for the VRRP routers backing up a virtual router .
21
Fig 3.4.1 Configuration
22
CHAPTER NO – 4
23
TYPES OF DNS SERVERS
1.Primary DNS server : It is also called Master DNS server. This DNS server had the full authority
over the zone created in it and any change can be made in the zone. The zone in this server is
called primary zone.
2. Secondary DNS server : The zone present in this server is the copy of the zone present in the
Primary DNS server. No change can be made in the secondary zone. Secondary DNS servers are
created for offering fault-tolerance and load-balancing for the DNS service.
3. Active Directory-Integrated DNS server: This DNS server is created as the result of Active
Directory Installation and it is used to provide active directory service to the clients.
4. Caching-only DNS server : This server does not contain any zone.It just stores the DNS queries
made by the clients to the other main DNS servers.When main DNS servers are not available,
clients refer to the caching-only DNS server for name resolution.
Components of the DNS Server :-
DNS Query
DNS Zone
DNS Resource Record
DNS Query:- DNS is a request for name resolution that is send to DNS server by the client in
a network. A client can send query to a DNS server or DNS server can also send a DNS query to
another DNS server.
24
DNS Query Are Two Types
1) Recursive DNS Query: In this query DNS server did not take responsible to find best
answer for client. DNS server can forward this query to next another DNS server.
25
2) Iterative DNS Query: Is a query in which the client accept the best available answer from
the DNS server. In case if the server does not know the answer , it may direct forward this
query another DNS server. All Burdon on local DNS server.
Server 1 A 192.168.0.10
Note: - WINS (Windows Internet Naming Server) it convert NetBIOS into IP address. WINS is old
version of the DNS server
27
2. In the results pane, under Roles Summary, click Add roles.
4. Click on install
28
Fig 4.2.4 DNS Installation
1. Click on close.
29
1. Open DNS server management console and right click on forward lookup zone. Give the
zone name e.g. pit. Local
2. Click on next
30
Fig 4.3.3 Configuration DNS Server
4. Click on next
C:>tracert www.yahoo.com :--Command is use to check the path a data packet follow from one
router to another router.
C:>Ipconfig /all :-Display the IP address with FQDN, IP address MAC address.
CHAPTER NO - 5
32
5.1 Active Directory (AD)
We can manage all users and security centralizes with the help of ADS. In simple terms, AD is a
database containing list of user accounts, computer accounts, shared folders, printers, groups and
group policy objects present in the domain network. The service running AD is called Active
Directory Service (ADS). Client PCs use the protocol LDAP (Lightweight Directory Access
Protocol) to access the ADS. Port Number use 389 in LDAP.
Use of DNS in Domain Network
DNS in the Microsoft Domain Network helps in the following ways:
1. DNS provides ADS service to the clients.
2. Clients locate DCs through DNS.
3. DNS provides Name Resolution Service in the network.
4. Active Directory Domain Network is given the same name as the DNS domain
network
1. Domain.
A domain is a group of computer connected logically in a network. The domain enables the
system Administrator to simplify the process of managing the computer and user on the
network.
Types of Domain
1. Domain forest.
A forest is created when you configure the win 2k3 server computer as a domain controller. A
forest is a collection of multiple domain link together and relationship between the domains. You
can add domain tree and domain in a forest.
33
2. Domain Tree.
A domain tree is made up when there is a parent child relationship between domains in a forest.
The child domain name must include the complete parent domain name.
A tree is set of two or more domains sharing common namespace. For example, we can create a
parent domain and then a child domain. (mail.yahoo.com) mail child domain yahoo parent domain.
2. Domain Controller.
PDC – Primary Domain Controller.
ADC - Additional Domain Controller.
CDC- Child Domain Controller.
RODC-Read Only Domain Controller
NTR-NEW TREE ROOT
1. PDC – This is first domain controller in the domain all entrees are created in it like user
account, group policy OU etc.
2. ADC – This is true copy of the PDC. This domain controller is use for fault tolerance and
load balance. All Active Directory database is replicated automatically with PDC.
3. CDC – This domain controller is sub domain of the PDC. This is use for load balancing
34
4. RODC -A read-only domain controller (RODC) is a server that hosts an Active Directory
database's read-only partitions and responds to security authentication requests.
5. NTR-Create a new domain tree only when you need to create a domain whose DNS
namespace is not related to the other domains in the forest.
35
2. It checks if the binaries of active directory domain services are already installed or not.
3. If AD not installed already than, welcome wizard will be displayed on the screen. Click next
to continue.
4. Click next.
36
5. This wizard provides two options
Either you can create a new forest or you can create a different domain in the same forest.
37
6. Here it asks to provide a full description of domain name that you wish to proceed with.
38
7. Provide a NETBIOS name of the domain so that the previous windows users are able to
connect to this domain.
8. In the active directory installation wizard, it asks for the forest functional level and provides a
drop down list to choose from.
39
Fig 5.3.6 Installation of AD
9. As the forest level, the next step is to select a domain functional level from the drop down list.
40
Fig 5.3.7 Installation of AD
10. In additional domain controller options, it asks if you want to install dns server service on this
domain. If yes, select the DNS option under the ‘select additional options for this domain’.
41
Fig 5.3.8 Installation of AD
11. Next step shows the path where database, log files as well as the SYSVOL folders would be
stored. You can change the location by providing another path through browse.
12. Here it asks for the ‘directory restore mode administrator password’. One thing you need to
remember is that the ‘restore mode administrator account’ is different from the ‘domain
administrator account’.
42
Fig 5.3.9 Installation of AD
13. In the installation wizard, this step gives summary of every option you choose while creating
domain. You can also save the settings for further use by exporting the summary on another
volume.
14. As you click next, it checks for the group policy management console.
43
Fig 5.3.10 Installation of AD
44
Fig 5.4.1 Configuration of AD
2. Your created domain name ‘lkc.local’ would be shown on the left side. Right click on
the domain ‘lkc.local’ and create a new organizational unit under the name ‘IT’.
45
Fig 5.4.2 Configuration of AD
4. Now in the OU named ‘IT’ , create a user with first name, user logon name and click
next.
46
Fig 5.4.3 Configuration of AD
6. It also grants the permissions like password never expires or the user can change
password by himself or not etc.
7. Full details of a particular user are shown, if you want to change any detail you may go
back to those steps. Else click finish and the user would be created.
47
8. Under the IT OU the list will be provided with all the details of users created in
lkc.local.
9. Right click on the user and go to properties. Here you can edit any stting or permission
of this user related to account, profile or environment etc.
48
Fig 5.4.6 Configuration of AD
10. Right click the user and choose the group from the select groups dialogue box.
11. In the object types, choose the group which you want.
49
Fig 5.4.8 Configuration of AD
CHAPTER NO - 6
50
It is a set of client and server services that allow an organization using Microsoft Windows servers
to organize many distributed SMB file shares into a distributed file system. DFS provides location
transparency and redundancy to improve data availability in the face of failure or heavy load by
allowing shares in multiple different locations to be logically grouped under one folder, or DFS
root.
DFS Replication
Early versions of DFS used Microsoft's File Replication Service (FRS) which provides basic file
replication capability between servers. FRS identifies changed or new files, and copies the latest
version of the entire file to all servers.
Windows Server 2003 R2 introduced "DFS Replication" (DFSR) which improves on FRS by only
copying those parts of files which have changed (remote differential compression), by using data
compression to reduce network traffic, and by allowing administrators flexible configuration
options for limiting network traffic with a customizable schedule.
51
Fig 6.2.1 Installation of DFS
52
Fig 6.2.2 Installation of DFS
3. Give the dfs namespace and click on next
53
5. Click on select and give the user name and password to authenticate the user for
configuration of DFS
6. Add namespace
54
1. Open DFS management console and click on namaespace.
55
Fig 6.3.2 Configuration of DFS Server
4. click on browse button and select server name and folder name also.
56
5. Again add new folder
File servers are commonly found in schools and offices, where users use a LAN to connect their
client computers.
A file server may be dedicated or non-dedicated. A dedicated server is designed specifically for use
as a file server, with workstations attached for reading and writing files and databases.
File servers may also be categorized by the method of access: Internet file servers are frequently
accessed by File Transfer Protocol (FTP) or by HTTP (but are different from web servers, that
often provide dynamic web content in addition to static files). Servers on a LAN are usually
accessed by SMB/CIFS protocol (Windows and Unix-like) or NFS protocol (Unix-like systems).
Database servers, that provide access to a shared database via a database device driver,
are not regarded as file servers as they may require Record locking.
59
3. Click on install
60
4. Click on close button.
5. We can manage file server using share and storage management console.
CHAPTER NO - 7
7.2 Conclusion
According to college structure ,we need to centralized the database and to overcome this need we
placed PDC in college and to restrict users base for related services and to give access to resources
GPO(Group Policy Objects) comes into the picture.
The project was successful in overcoming the disadvantages of a manually assigning the ip
addresses. The colleges located in two different could share their data with the help of trust created
between PDC and NTR.
We can manage the whole network of college site from the one core device at college site.
7.3 Bibliography
62
1. Name of the Book : MCITP Enterprise Administrator Core Requirements
Author’ s Name: Dan Holme, Danielle Ruest, Nelson Ruest
2. Name of the Book: Windows Server 2008 Enterprise Administrator Study Guide
Author Name: Samuel Johnson
3. Name of the Book: CCNA Routing and Switching Complete Study Guide:
Author Name: Todd Lammle
Websites links:
www.networksolutions.com
www.wikipedia.org
www.technet.microsoft.com
www.cisco.com
63