You are on page 1of 9

Adeela Farooq

Internee
Final report of internship
Hypervisor
 A hypervisor is a hardware virtualization technique that allows multiple guest
operating systems (OS) to run on a single host system at the same time.

 The guest OS shares the hardware of the host computer, such that each OS
appears to have its own processor, memory and other hardware resources.

 A hypervisor is also known as a virtual machine manager (VMM).


 The hypervisor program installed on the computer allowed the sharing of its
memory.
Types :
Hypervisors can be divided into two types:

Type 1

Also known as native or bare-metal hypervisors, these run directly on the host
computer’s hardware to control the hardware resources and to manage guest
operating systems.

Examples: Hypervisors include VMware ESXi, Citrix XenServer and Microsoft


Hyper-V hypervisor.

Type 2

Also known as hosted hypervisors, these run within a formal operating system
environment. In this type, the hypervisor runs as a distinct second layer while the
operating system runs as a third layer above the hardware.

Internet VS Intranet
INTERNET INTRANET
The Internet is a network that is An intranet network is only available to
available to anyone with an Internet- a small group of people.
connected device.
Internet can be accessed by anyone. Intranet can be accessible only by the
organization members, having login
details.

The Internet itself contains a large Intranet can be accessed from the
number of intranets. Internet but with restrictions.
Accessing the internet does not Intranet access is protected by
necessarily require a password. passwords. Only users who have the
password can access the intranet.
The internet is composed of several LAN The intranet is composed of either a
(Local Area Network), WAN (Wide Area LAN (Local Area Network) or a WAN
Network) and MAN (Metropolitan Area (Wide Area Network) or a MAN
Network). (Metropolitan Area Network).

IP(INTERNET PROTOCOL)
 Internet Protocol (IP) is the principal set (or communications protocol) of
digital message formats and rules for exchanging messages between
computers across a single network or a series of interconnected networks,
using the Internet Protocol Suite (often referred to as TCP/IP).
 Messages are exchanged as datagrams, also known as data packets or just
packets.
 The main purpose and task of IP is the delivery of datagrams from the source
host (source computer) to the destination host (receiving computer) based on
their addresses.

Internet Protocol Versions:


IPV4:

 IPv4 was the first version of IP.


 It is used to identify devices on a network using an addressing system.
 The IPv4 uses a 32-bit address scheme allowing to store 2^32 addresses which
is more than 4 billion addresses.
 IPv4 is a numeric address, and its binary bits are separated by a dot (.)
Example:
 12.244.233.165

Classes:
The IPv4 Addressing system is divided into five classes of IP Addresses. All the five
classes are identified by the first octet of IP Address.

Classes Address range


Class A 1-27
00000001-01111111
Class B 128-191
10000000-10111111
Class C 192-223
11000000-11011111
Class D 224-239
11100000-11101111
Class E 240-255

IPV6:

 IPv6 (Internet Protocol Version 6) is also called IPng.


 IPv6 is the successor to Internet Protocol Version 4 (IPv4).
 IPv6 is 128 Bit IP Address.
 iPv6 is an alphanumeric address whose binary bits are separated by a colon (:).
It also contains hexadecimal.
Example:
2001:0db8:0000:0000:0000:ff00:0042:7879

Public IP:
 It is public global addresses that are used in the Internet.
 A public IP address is an IP address that is used to access the Internet.
 A public IP address is the address that is assigned to a computing device to
allow direct access over the Internet.
 A web server, email server and any server device directly accessible from the
Internet are candidate for a public IP address.
 A public IP address is globally unique, and can only be assigned to a unique
device.

Private IP:
 A private IP address is the address space, that allow organizations to create
their own private network.
 A private IP address is an IP address that's reserved for internal use.
 When a computer is assigned a private IP address, the local devices see this
computer via its private IP address.
 Private IP addresses cannot be directly contacted over the Internet as a
computer with a public IP address can.
 There are three IP blocks (1 class A, 1 class B and 1 class C) reserved for a
private use.

IIS(INTERNET INFORMATION SERVICES)

 Internet Information Services (IIS) is a web server from Microsoft that runs on
Windows systems to serve requested HTML pages or files.
 A web server can deliver information to users in several forms, such as static
webpages coded in HTML, through file exchanges as downloads and uploads,
and text documents, image files and more.
 An IIS web server accepts requests from remote client computers and returns
the appropriate response.
 This basic functionality allows web servers to share and deliver information
across local area networks, such as corporate intranets, and wide area
networks, such as the internet.
 The two main process models for web servers are to either handle all requests
on a single thread, or to spawn a new thread for each request.

Active Directory
 Active Directory (AD) is a Microsoft product that consists of several services
that run on windows server to manage permissions and access to networked
resources.
 Active Directory stores data as objects. An object is a single element, such as a
user, group, application or device, such as a printer.
 Active directory is just like a phone book. A phone book is a type of directory that stores
information about people, businesses, and government organizations.

 Active Directory categorizes objects by name and attributes.


 It is a primary feature of Windows Server, an operating system that runs both
local and Internet-based servers.
 For example:
The name of a user might include the name string, along with information
associated with the user, such as passwords.

Domain Controller
 A domain controller is a server that responds to authentication requests and
verifies users on computer networks.
 The primary responsibility of the DC is to authenticate and validate user access
on the network.
 It is a server on a Microsoft Windows or Windows NT network that is
responsible for allowing host access to Windows domain resources.
 A domain controller is the centerpiece of the Windows Active Directory
service.
 Early versions of Windows such as Windows NT had one domain controller per
domain, which was called a primary domain controller.
Example
 When users log into their domain, the DC checks their username, password,
and other credentials to either allow or deny access for that user.

GPO(Group Policy Object)

 Group Policy is a feature of the Microsoft windows NT family of operating


systems that controls the working environment of user accounts and
computer accounts.
 A set of Group Policy configurations is called a Group Policy Object (GPO).
 The Group Policy Object is implemented in an Active Directory system
according to various Group Policy settings including local settings, site-wide
settings, domain-level settings and settings applied to organizational units.
 The policies can include things like screen lock timeout, USB port functionality,
control panel access, and a lot more.
 Example
A Group Policy Object can include settings for password strength that require
users to set a consistently strong password.

Clustering
 Connecting two or more computers together in such a way that they behave like a single
computer.
 Clustering is used for parallel processing, load balancing and fault tolerance.
 Microsoft's clustering solution for Windows NT systems is called MSCS.
 Clustering refers to the interconnection of servers in a way that makes them appear to the
operating environment as a single system.
 The goal is to make a group of computers appear (to the outside world and to internal user
departments) as if they were one, totally integrated system that is always available and
always working fast.
 Cluster-based control structures promote more efficient use of resources in controlling
large dynamic networks.
 With cluster based control, the physical network is transformed into a virtual network of
interconnected node clusters.
 There can be one or more controllers per cluster and their functions are to make control
decisions for cluster members, construct and distribute representations of cluster state for
external use.

Types:
 Two Node Cluster
 Load-Balancing Cluster Model
 High Availability Cluster Model
 Common Management Domain Cluster

Bulk User
There are two methods for creating bulk users.
 Through CSV file
CSV file:
 CSV stands for "comma-separated values".
 CSV is a simple file format used to store tabular data, such as
a spreadsheet or database.
 Through POWER SHELL script

Window Server 2012


Windows Server 2012 codenamed "Windows Server 8"is the fifth release
of Windows Server. It is the server version of Windows 8 and succeeds Windows
Server 2008 R2. Two pre-release versions, a developer preview and a beta version,
were released during development.

Features:
 Address management
Windows Server 2012 has an IP address management (IPAM) role for
discovering, monitoring, auditing and managing the network's IP
address space.
 Hyper-V
Hyper-V 3.0 offers a scalable, virtual extensible switch that allows a
virtual network to extend its functionality in ways that were difficult or
impossible to achieve in previous versions.
 Clustering
Cluster-aware updating will be automated, which will allow the entire
cluster to stay online during the updating process with little to no loss in
availability.

Window Server 2016


 Microsoft Windows Server 2016, previously referred to as Windows Server
vNext, is a server operating system (OS).
 The server operating system is specifically developed to serve as a platform
for running networked applications.
 A highly anticipated feature of Windows Server 2016 is the inclusion of two
native containers: Windows Server Containers and Hyper-V Containers.
 Nano server (a feature of window server 2016)a lightweight installation option
that is designed to run exclusively in cloud- and container-based scenarios and
is 93% smaller than traditional Windows Server setups.
 Window defender(a feature of window server 2016) Windows Server
Antimalware is installed and enabled by default without the GUI, which is an
installable Windows feature.

You might also like