Professional Documents
Culture Documents
Internee
Final report of internship
Hypervisor
A hypervisor is a hardware virtualization technique that allows multiple guest
operating systems (OS) to run on a single host system at the same time.
The guest OS shares the hardware of the host computer, such that each OS
appears to have its own processor, memory and other hardware resources.
Type 1
Also known as native or bare-metal hypervisors, these run directly on the host
computer’s hardware to control the hardware resources and to manage guest
operating systems.
Type 2
Also known as hosted hypervisors, these run within a formal operating system
environment. In this type, the hypervisor runs as a distinct second layer while the
operating system runs as a third layer above the hardware.
Internet VS Intranet
INTERNET INTRANET
The Internet is a network that is An intranet network is only available to
available to anyone with an Internet- a small group of people.
connected device.
Internet can be accessed by anyone. Intranet can be accessible only by the
organization members, having login
details.
The Internet itself contains a large Intranet can be accessed from the
number of intranets. Internet but with restrictions.
Accessing the internet does not Intranet access is protected by
necessarily require a password. passwords. Only users who have the
password can access the intranet.
The internet is composed of several LAN The intranet is composed of either a
(Local Area Network), WAN (Wide Area LAN (Local Area Network) or a WAN
Network) and MAN (Metropolitan Area (Wide Area Network) or a MAN
Network). (Metropolitan Area Network).
IP(INTERNET PROTOCOL)
Internet Protocol (IP) is the principal set (or communications protocol) of
digital message formats and rules for exchanging messages between
computers across a single network or a series of interconnected networks,
using the Internet Protocol Suite (often referred to as TCP/IP).
Messages are exchanged as datagrams, also known as data packets or just
packets.
The main purpose and task of IP is the delivery of datagrams from the source
host (source computer) to the destination host (receiving computer) based on
their addresses.
Classes:
The IPv4 Addressing system is divided into five classes of IP Addresses. All the five
classes are identified by the first octet of IP Address.
IPV6:
Public IP:
It is public global addresses that are used in the Internet.
A public IP address is an IP address that is used to access the Internet.
A public IP address is the address that is assigned to a computing device to
allow direct access over the Internet.
A web server, email server and any server device directly accessible from the
Internet are candidate for a public IP address.
A public IP address is globally unique, and can only be assigned to a unique
device.
Private IP:
A private IP address is the address space, that allow organizations to create
their own private network.
A private IP address is an IP address that's reserved for internal use.
When a computer is assigned a private IP address, the local devices see this
computer via its private IP address.
Private IP addresses cannot be directly contacted over the Internet as a
computer with a public IP address can.
There are three IP blocks (1 class A, 1 class B and 1 class C) reserved for a
private use.
Internet Information Services (IIS) is a web server from Microsoft that runs on
Windows systems to serve requested HTML pages or files.
A web server can deliver information to users in several forms, such as static
webpages coded in HTML, through file exchanges as downloads and uploads,
and text documents, image files and more.
An IIS web server accepts requests from remote client computers and returns
the appropriate response.
This basic functionality allows web servers to share and deliver information
across local area networks, such as corporate intranets, and wide area
networks, such as the internet.
The two main process models for web servers are to either handle all requests
on a single thread, or to spawn a new thread for each request.
Active Directory
Active Directory (AD) is a Microsoft product that consists of several services
that run on windows server to manage permissions and access to networked
resources.
Active Directory stores data as objects. An object is a single element, such as a
user, group, application or device, such as a printer.
Active directory is just like a phone book. A phone book is a type of directory that stores
information about people, businesses, and government organizations.
Domain Controller
A domain controller is a server that responds to authentication requests and
verifies users on computer networks.
The primary responsibility of the DC is to authenticate and validate user access
on the network.
It is a server on a Microsoft Windows or Windows NT network that is
responsible for allowing host access to Windows domain resources.
A domain controller is the centerpiece of the Windows Active Directory
service.
Early versions of Windows such as Windows NT had one domain controller per
domain, which was called a primary domain controller.
Example
When users log into their domain, the DC checks their username, password,
and other credentials to either allow or deny access for that user.
Clustering
Connecting two or more computers together in such a way that they behave like a single
computer.
Clustering is used for parallel processing, load balancing and fault tolerance.
Microsoft's clustering solution for Windows NT systems is called MSCS.
Clustering refers to the interconnection of servers in a way that makes them appear to the
operating environment as a single system.
The goal is to make a group of computers appear (to the outside world and to internal user
departments) as if they were one, totally integrated system that is always available and
always working fast.
Cluster-based control structures promote more efficient use of resources in controlling
large dynamic networks.
With cluster based control, the physical network is transformed into a virtual network of
interconnected node clusters.
There can be one or more controllers per cluster and their functions are to make control
decisions for cluster members, construct and distribute representations of cluster state for
external use.
Types:
Two Node Cluster
Load-Balancing Cluster Model
High Availability Cluster Model
Common Management Domain Cluster
Bulk User
There are two methods for creating bulk users.
Through CSV file
CSV file:
CSV stands for "comma-separated values".
CSV is a simple file format used to store tabular data, such as
a spreadsheet or database.
Through POWER SHELL script
Features:
Address management
Windows Server 2012 has an IP address management (IPAM) role for
discovering, monitoring, auditing and managing the network's IP
address space.
Hyper-V
Hyper-V 3.0 offers a scalable, virtual extensible switch that allows a
virtual network to extend its functionality in ways that were difficult or
impossible to achieve in previous versions.
Clustering
Cluster-aware updating will be automated, which will allow the entire
cluster to stay online during the updating process with little to no loss in
availability.