You are on page 1of 133

LESSON 9

SETTING-UP COMPUTER NETWORK

INFORMATION SHEET NO. 2.1

Learning Outcome: 2.1

LEARNING /OBJECTIVES:

After reading this Information Sheet, you should be able to:

1.Identify the five types of network topology


2.Determine the advantages and disadvantages of each type of
network topology.

NETWORK DESIGN

5 TYPES OF NETWORK TOPOLOGY

Star network, star topology is one of the most common network


setups. In this configuration, every node connects to a central
network device, like a hub, switch, or computer. The central
network device acts as a server and the peripheral devices act
as clients. Depending on the type of network card used in each
computer of the star topology, a coaxial cable or an RJ-45 network
cable is used to con
Advantages of star topology

Centralized management of the network, through the use of the


central computer, hub, or switch.

Easy to add another computer to the network.

If one computer on the network fails, the rest of the network


continues to function normally.

Disadvantages of star topology

May have a higher cost to implement, especially when using a


switch or router as the central network device.

The central network device determines the performance and


number of nodes the network can handle.

If the central computer, hub, or switch fails, the entire network goes
down and all computers are disconnected from the network.

Advantages of star topology

Centralized management of the network, through the use of the


central computer, hub, or switch.

Easy to add another computer to the network.


If one computer on the network fails, the rest of the network
continues to function normally.

Disadvantages of star topology

May have a higher cost to implement, especially when using a


switch or router as the central network device.

The central network device determines the performance and


number of nodes the network can handle.

If the central computer, hub, or switch fails, the entire network goes
down and all computers are disconnected from the network.

Bus topology is a network setup in which each computer and


network device are connected to a single cable or backbone.
Depending on the type of network card used in each computer of
the bus topology, a coaxial cable or an RJ-45 network cable is used
to connect them together.
Advantages of bus topology

It works well when you have a small network.


It's the easiest network topology for connecting computers or
peripherals in a linear fashion.
It requires less cable length than a star topology.

Disadvantages of bus topology

It can be difficult to identify the problems if the whole network goes


down.
It can be hard to troubleshoot individual device issues.
Bus topology is not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into two.

A ring topology is a network configuration in which device


connections create a circular data path. Each networked device is
connected to two others, like points on a circle. Together, devices in
a ring topology are referred to as a ring network.

In a ring network, packets of data travel from one device to the next


until they reach their destination. Most ring topologies allow
packets to travel only in one direction, called a unidirectional ring
network. Others permit data to move in either direction,
called bidirectional.
Ring topology history

In the past, the ring topology was most commonly used in schools,
offices, and smaller buildings where networks were smaller.
However, today, the ring topology is seldom used, having been
switched to another type of network topology for improved
performance, stability, or support.

Advantages of ring topology

All data flows in one direction, reducing the chance of packet


collisions.

A network server is not needed to control network connectivity


between each workstation.

Data can transfer between workstations at high speeds.


Additional workstations can be added without impacting
performance of the network.

Mesh A network setup where each computer and network device is


interconnected with one another, allowing for most transmissions to
be distributed even if one of the connections go down. It is a
topology commonly used for wireless networks.

Advantages of a mesh topology

Manages high amounts of traffic, because multiple devices can


transmit data simultaneously.

A failure of one device does not cause a break in the network or


transmission of data.

Adding additional devices does not disrupt data transmission


between other devices.

Disadvantages of a mesh topology

The cost to implement is higher than other network topologies,


making it a less desirable option.

Building and maintaining the topology is difficult and time


consuming.

The chance of redundant connections is high, which adds to the


high costs and potential for reduced efficiency.
5. A hybrid topology is a type of network topology that uses two or
more differing network topologies. These topologies include a mix
of bus topology, mesh topology, ring topology, star topology,
and tree topology.

Advantages of Hybrid Network Topology

1). Reliable : Unlike other networks, fault detection and


troubleshooting is easy in this type of topology. The part in which
fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the
functioning of rest of the network. 
2) Scalable: Its easy to increase the size of network by adding new
components, without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the
requirements of the organization and by optimizing the available
resources. Special care can be given to nodes where traffic is high
as well as where chances of fault are high. 
4) Effective: Hybrid topology is the combination of two or more
topologies, so we can design it in such a way that strengths of
constituent topologies are maximized while there weaknesses are
neutralized. For example we saw Ring Topology has good data
reliability (achieved by use of tokens) and Star topology has high
tolerance capability (as each node is not directly connected to other
but through central device), so these two can be used effectively in
hybrid star-ring topology. 

Disadvantages of Hybrid Topology

1)  Complexity of Design: One of the biggest drawback of hybrid


topology is its design. Its not easy to design this type of architecture
and its a tough job for designers. Configuration and installation
process needs to be very efficient.
2)  Costly Hub: The hubs used to connect two distinct networks,
are very expensive. These hubs are different from usual hubs as
they need to be intelligent enough to work with different
architectures and should be function even if a part of network is
down.

3)  Costly Infrastructure: As hybrid architectures are usually


larger in scale, they require a lot of cables, cooling systems,
sophisticate network devices, etc.

SELF CHECK 2.1

1.___________ is one of the most common network setups. In this


configuration, every node connects to a central network device, like
a hub, switch, or computer. The central network device acts as
a server and the peripheral devices act as clients. Depending on the
type of network card used in each computer of the star topology,
a coaxial cable or an RJ-45 network cable is used to con

2.____________ is a network setup in which each computer and


network device are connected to a single cable or backbone.
Depending on the type of network card used in each computer of
the bus topology, a coaxial cable or an RJ-45 network cable is used
to connect them together.

3.__________ is a network configuration in which device connections


create a circular data path. Each networked device is connected to
two others, like points on a circle.

4.__________ A network setup where each computer and network


device is interconnected with one another, allowing for most
transmissions to be distributed even if one of the connections go
down. It is a topology commonly used for wireless networks.

5.____________ is a type of network topology that uses two or more


differing network topologies. These topologies include a mix of bus
topology, mesh topology, ring topology, star topology, and tree
topology.

ANSWER KEY 2.1

1.Star Topology 
2.Bus Topology 
3. Ring Topology 
4. Mesh Topology
5. Hybrid Topology

INFORMATION SHEET 2.2


SUBNETTING

is the strategy used to partition a single physical network into more


than one smaller logical sub-networks (subnets). An IP address
includes a network segment and a host segment. Subnets are
designed by accepting bits from the IP address's host part and
using these bits to assign a number of smaller sub-networks inside
the original network. Subnetting allows an organization to add sub-
networks without the need to acquire a new network number via
the Internet service provider (ISP). Subnetting helps to reduce the
network traffic and conceals network complexity. Subnetting is
essential when a single network number has to be allocated over
numerous segments of a local area network (LAN).Subnets were
initially designed for solving the shortage of IP addresses over the
Internet 

Each IP address consists of a subnet mask. All the class types,


such as Class A, Class B and Class C include the subnet mask
known as the default subnet mask. The subnet mask is intended
for determining the type and number of IP addresses required for a
given local network. The firewall or router is called the default
gateway. The default subnet mask is as follows:

Class A: 255.0.0.0

Class B: 255.255.0.0

Class C: 255.255.255.0

The subnetting process allows the administrator to divide a single


Class A, Class B, or Class C network number into smaller portions.
The subnets can be subnetted again into sub-subnets.

Dividing the network into a number of subnets provides the


following benefits:

Reduces the network traffic by reducing the volume of broadcasts


Helps to surpass the constraints in a local area network (LAN), for
example, the maximum number of permitted hosts.

Enables users to access a work network from their homes; there is


no need to open the complete network.

5 Different Classes of IP Address Explained with Examples, Range,


Uses

Internet Protocol (IP) is a network layer, host-to-host delivery


protocol. It means it delivers a packet from one host to the other
with no knowledge about the ports within the host.

It is a connection-less protocol that makes it unreliable. Hence, it is


often clubbed with TCP. TCP is a reliable protocol from the
transport layer.

There are two versions of IP address. These are IPv4 and IPv6.

An IP address uniquely identifies each host and router. This IP


address is 32 bits long.

One of the usual IP addresses that we see.

For example, 145.10.34.3.

This address is a 32-bit address represented within the system in


binary form:
10010001.00001010.00100010.00000011

An IP address format is usually divided into two parts:

Network ID: To uniquely identify the network to which the host


belongs.

Host ID: To uniquely identify the host in a particular network.

Two hosts in the same network have the same network ID part but
different host ID part.
On the basis of this division, IP addresses are classified into various
classes.

Class A:

This Class IP address always has its first bit as 0, next 7 bits as a
network address and following 24 bits as the host address.

The range of IP addresses is 0.0.0.0 to 127.255.255.255.

This means that it allows 2^7 networks and 2^24 hosts per
network.

This class of IP address is used for the very large network. Ex. Big
Organisation

Class B:

Class B IP address always has its first bits as 10, next 14 bits as a
network address and following 16 bits as the host address.

The range of IP addresses is 128.0.0.0 to 191.255.255.255.

This means that it allows 2^14 networks and 2^16 hosts per
network.

This class of IP address is used for a medium network like


multinational companies.

Class C:

Class C IP address always has its first bits as 110, next 21 bits as a
network address and following 8 bits as the host address.

The range of IP addresses is the first block from 192.0.0.0 to


192.0.0.255 and last block from 223.255.255.0 to
223.255.255.255.
This means that it allows 2^21 networks and 2^8 hosts per
network.

This class is used for a small network such as small companies or


colleges.

Class D:

Class C IP address always has its first bits as 1110.

There is no segregation of host and network addresses.

It allows multicast which means a datagram directed to multiple


hosts.

Class E:

The address begins with 1111.

It is reserved for future use, research, and development purpose.

We can use IP address class A, B, and C for subnetting and


supernetting in a computer network.

IP Address Classes Range:

Summarizing different classes of IP address with its range and


applications:

IP Address Range Start- Application / Used


Class (Theoretical) Bits for

0.0.0.0 to Very large


A 127.255.255.255 0 networks

128.0.0.0 to
B 191.255.255.255 10 Medium networks

C 192.0.0.0 to 110 Small networks


223.255.255.255

224.0.0.0 to
D 239.255.255.255 1110 Multicast

240.0.0.0 to
E 247.255.255.255 1111 Experimental

IP address ranges for a different class in the table are theoretically


calculated. There are some special IP addresses which are reserved
for a special purpose.

Suppose,

IP addresses having all zero’s or one’s either in the network id or


host id are ruled out from all the IP address classes. These IP
addresses are used for a special purpose.

SELF CHECK 2.2

1-5 Enumerate the 5 Class of network

ANSWER KEY 2.2

A 0.0.0.0 to 127.255.255.255
B 128.0.0.0 to 191.255.255.255

C 192.0.0.0 to 223.255.255.255

D 224.0.0.0 to 239.255.255.255

E 240.0.0.0 to 247.255.255.255

INFORMATION SHEET 2.3

CONFIGURE NETWORK INTERFACE CARD SETTINGS

This panel allows you to configure the speed and duplex settings for
the Network Interface Cards (NIC) that have been enabled in the
server. MSL supports the following combinations of NICs:  

a "Local" adaptor for connection to the Local Area Network (LAN-


only mode) or

a "Local" adaptor for connection to the Local Area Network AND a


"WAN" adapter for connection to the Wide Area Network (Network
Edge mode) or
a "Local" adaptor for connection to the Local Area Network AND a
"WAN" adapter for connection to the Wide Area Network AND a
“WAN” adapter bridged to the WAN interface of the firewall (Server-
gateway with bridged interface mode).

To configure the Speed and Duplex settings of a NIC:

Note: For virtual deployments, the fields are read-only. You cannot
configure the settings from this page.

Under Configuration, click Ethernet Cards.

Set the Auto Configuration field to Off, and then click Save.

Set the Speed and Duplex parameters, and then click Save. All


other settings are read only. See the following table for descriptions
of the settings.

Note: Speed and Duplex are read only if the Ethernet card does not
support multiple options.

Setting Description

Link Yes: NIC is connected to the network.


detected No: NIC is not connected to the network.

MAC Media Access Control address of the Network


Address Interface Card

Driver Driver (for example: tg3) of the Network Interface


Card.

Data transfer rate. Available settings are determined


Speed by the Ethernet card. Only supported settings are
displayed.

Half-duplex: uses only one wire pair with a digital


signal running in both directions on the wire.

Full-duplex: uses two pairs of wires to establish a


Duplex point-to-point connection between the transmitter of
the transmitting device and the receiver of the
receiving device. Full-duplex data transfer provides
faster data transmissions than half duplex.

Auto Negotiation is an Ethernet process that allows


two connected devices to choose common
transmission parameters, such as speed, duplex
mode, and flow control. During this process, the
Auto connected devices first share these parameters and
Negotiation then choose the fastest transmission mode they both
support.

Select On to apply Auto Negotiation; select Off to


configure the Speed and Duplex settings.

INFORMATION SHEET 2.4

Networking cables 

are networking hardware used to connect one network device to


other network devices or to connect two or more computers to
share printers, scanners etc. 

What Twisted Pair Is Like and Its Cabling Standards


Twisted pair cabling is a type of wiring in which two conductors
(usually copper) of a single circuit are twisted together. Why are the
pairs twisted together? Because the two wires are carrying equal
and opposite signals, one pair can induce crosstalk in another and
the effect gets stronger along the length of the cable, which is bad
for the transmission of signal. Twisting the pairs reduce the
crosstalk between lines. Twisted pair cabling is often used in data
networks for short and medium length connections because of its
relatively lower costs compared to optical fiber and coaxial cable.

Shielded Twisted Pair vs. Unshielded Twisted Pair

Twisted pair network cables are often shielded in an attempt to


prevent electromagnetic interference. Twisted pair with shielding
are known as shielded twisted pair (STP). In contrast to STP,
unshielded twisted pair (UTP) is not surrounded by any shielding.

STP cable is also divided by overall shield and individual shield.


Individual shielded twisted pair is with aluminum foil for each
twisted pair or quad. This type of shielding protects cable from
external electromagnetic interference (EMI) entering or exiting the
cable and also protects neighboring pairs from crosstalk. Overall
shielded twisted pair is with overall foil or braided shield across all
of the pairs within the 100 Ω twisted pair cable. This type of
shielding helps prevent EMI from entering or exiting the cable. One
STP cable can have both overall and individual shielding.
Figure 1: shielded twisted pair construction.

UTP cable without shielding is more prone to outside interference.


For this reason, this cable type is more often found in indoor
telephone applications. Outdoor telephone cables contain hundreds
or thousands pairs. Pairs that have the same twisted rate within the
cable can experience some degree of crosstalk, so wire pairs are
usually selected carefully within a large cable to reduce the
crosstalk.
Most UTP cable uses RJ45 connectors, which look like telephone
connectors (RJ11) but have eight wires instead of four.

Figure 2: RJ45 connector (up) and RJ45 adaptor (up).

The Nearest Twisted Pair to Us: Ethernet Cable

Ethernet cable is a typical type of twisted pairs, and probably the


most familiar one to us. The following table gives the basic
information of some network cable types.
Table 1: twisted pair Ethernet cable types.

Typical Bandwidt
Name Applications
Construction h

10BASE-T and 100BASE-T4


Cat 3 UTP 16 MHz
Ethernet

Cat 4 UTP 20 MHz 16Mbit/s Token Ring

100BASE-TX & 1000BASE-T


Cat 5 UTP 100 MHz
Ethernet

Cat 100BASE-TX & 1000BASE-T


UTP 100 MHz
5e Ethernet

Cat 6 STP 250 MHz 10GBASE-T Ethernet

Cat
STP 500 MHz 10GBASE-T Ethernet
6a

10GBASE-T Ethernet or
Cat 7 STP 600 MHz POTS/CATV/1000BASE-T over
single cable

10GBASE-T Ethernet or
Cat
STP 1000 MHz POTS/CATV/1000BASE-T over
7a
single cable

40GBASE-T Ethernet or
Cat 1600-
STP POTS/CATV/1000BASE-T over
8/8.1 2000 MHz
single cable

Cat STP 1600- 40GBASE-T Ethernet or


POTS/CATV/1000BASE-T over
8.2 2000 MHz
single cable

Twisted Pair Cabling: T568A or T568B?

Two wiring standards are commonly used with twisted pair cabling:
T568A and T568B. These are telecommunications standards from
TIA and EIA that specify the pin arrangements for the connectors
(often RJ45) on UTP or STP network cables. The number 568 refers
to the order in which the wires within the twisted pair cable are
terminated and attached to the connector. The signal is identical for
both.

Pin numbers are read left to right, with the connector tab facing
down. Notice that the pin-outs stay the same, and the only
difference is in the color coding of the wiring.
Figure 3: T568A and T568B wiring standards for twisted pair
cabling.

Coaxial Cable: Not Just a Video Cable

Coaxial cable is a type of cable that has an inner conductor


surrounded by a tubular insulating layer, surrounded by a tubular
conducting shield. The inner conductor and the outer shield share a
geometric axis. Many coaxial cable has an insulating outer sheath
or jacket.
Figure 4: coaxial cable construction.

Why Is Coaxial Cable Good for Radio Transmission?

Coaxial cable is used as a transmission line for radio frequency (RF)


signals. Its applications include feedlines connecting radio
transmitters and receivers with their antennas, computer network
connections, digital audio, and distributing cable television signals.
Coaxial cable has an obvious advantage over other types of radio
transmission line. In a good coaxial cable, the electromagnetic field
carrying the signal exists only in the space between the inner
conductor and the outer conducting shield. For this reason, coaxial
cables are allowed to be installed next to metal objects without
power losses that occur in other types of radio transmission line.

Widely Used Coaxial Connector Types

Many ethernet cable connector types are available in the audio,


digital, video, RF and microwave industries, each designed for a
specific purpose and application. One consideration the number of
connect-disconnect cycles that a connector pair could withstand
while still performing as expected. Here are some common coaxial
connector types.
Connector Other Maximum Frequency,
Female Male
Type Name Application

250 MHz to 1 GHz. The


“F” series connectors are
Type F Video primarily utilized in
television cable and
antenna applications.

12 GHz or more. Type N


connector was originally
designed for military
systems operating below 5
Type N / GHz, later improved to 12
GHz and higher. Type N
connectors follow the
military standard MIL-C-
39012.

100 kHz or less. Same


Phone with the names, the
TS,
plugs and phone plug is the male
TRS
jacks connector, a phone jack is
the female connector.

10 MHz. A round, press-


Phono
on connector commonly
plugs
RCA used for consumer-grade
and
audio and composite
jacks
video connections.
.5 GHz. A relatively new
connector used popularly
as an interconnect in
7/16 DIN / cellular and other so
called “wireless”
applications, especially on
towers.

18 GHz. The genderless


APC-7 (Amphenol
Precision Connector - 7
mm) offers the lowest
reflection coefficient and
APC-7 7 mm same
most repeatable
measurement of all 18
GHz connectors, notably
used for metrology and
calibration.

Table 2: coaxial connector types.

The Capable Optical Fiber Cable


Optical fiber cabling is an excellent transmission medium for its
high data capacity and supported long distances. It is indispensable
in any fiber optic network. It has a fiber/glass core within a rubber

outer coating and uses beams of light rather than electrical signals
to relay data. Because light doesn't diminish over distance the way
electrical signals do, this cabling can run for distances measured in
kilometers with transmission speeds from 10 Mbps up to 100 Gbps
or higher.

Figure 5: optical fiber cable cutaway.

The Fiber Core Size Matters: SMF and MMF

The inner fiber can be either single mode or multimode. Generally,


a single mode fiber core is 9/125µm wide, whereas a multimode
fiber core can be 62.5/125µm or 50/125µm wide. Only the early
OM1 is 62.5/125µm fiber, the later generations OM2, OM3, OM4,
OM5 50/125µm fiber. The letters “OM” stand for optical multimode.
Both multimode fiber (MMF) and single mode fiber (SMF) can be
used for high-speed transmission. MMF is often for short reach
while S
MF is for long reach.

Figure 6: multimode fiber and single mode fiber core diameters.

Multiple Fiber Optic Connectors

Optical fiber cables can be terminated with various types of fiber


optic connectors that can be plugged into different ports of devices.
The figure below shows some common fiber optic connector types,
and the LC, SC and ST are most used three types.
Figure 7: common fiber optic connector types.

In addition, there is a multi-fiber connector type called MTP/MPO


(Multi-fiber Push On). It is designed for higher bandwidth
applications such as 40GbE and 100GbE. 12- and 24-fiber versions
are currently used to directly connect into 40G and 100G
transceivers and also used in high density fiber distribution areas.
Higher fiber versions are also available (48, 72 fibers) but their use
and deployment is currently limited.
INFORMATION SHEET 2.5

CABLE RACEWAY 

selection helps organize exposed cables and wires running on your


ceiling and walls.

is the premium wire management product for routing and


organizing wiring in control panels.

WIRE DUCT is one of the cable management products developed


specifically for use within cabinets and control panels.
INFORMATION SHEET 2.5

Network connectivity checking procedures and techniques

Step 1: Confirm network connectivity

On the source server, perform a operating system level connectivity


test on established ports from source server/firewall to destination
server/firewall. The test should verify routing, network address
translation, ports, and URLs where applicable.

Telnet

Telnet is a good command to start your network connectivity tests.


Open a command prompt on your server (e.g. cmd.exe or Powershell
on Windows and a console or SSH session in Unix) and execute the
following:

Note for Windows 7 users, you may have enable the Telnet
client/command. To enable telnet on Windows 7, search in the start
menu for “Turn Windows features on or off”. Click into that menu
item and turn on the “Telnet client”.
<source_server> command prompt>> telnet <destination>
<destination_port>

$ telnet justintung.wordpress.com 80

If there is connectivity from the source server to the destination, the


telnet session should begin. On Windows and Unix, a blank screen
or area should appear with a prompt. If there is no connectivity, it
will just hang after the telnet command like the following:

Connecting To <destination_server>…

and then finally show:

Connecting To <destination_server>…Could not open connection to


the host, on port <destination_port>: Connect failed.

Telnet hang on Windows PowerShell. Same thing happens on the


normal cmd.exe window.

Moments later, we know the connectivity failed.

Other Telnet Failures

It is also possible you receive a message:

telnet: Unable to connect to remote host: Network is


unreachable

This telnet message could occur from:


Routing issues – Try a ping to the destination server (ping
<destination>). Hopefully the ping is successful, if not check
the netstat -rn to examine gateways used for routing. It could be
that a static/alternatve route needs to be created to the destination
server using an alternative gateway.

Network infrastructure down – It is possible a piece of the network


on the path to your destination server is down.

Incorrect information in telnet command – Make sure the IPs or


fully qualified domains you are using in telnet are correct.

Terminology

<source_server> is the server we are coming from and where the


command is being executed on the operating system. The firewall
should be opened from the source server and its source ports to the
destination server and its destination ports.

<destination> is the destination server IP or fully qualified domain


name (FQDN). The IP should work whether you are using an IPv4 or
IPv6 address. However, if you are testing IPv6 connectivity, it is
likely you will use a FQDN due to the long length of IPv6 addresses.

<destination_port> is the port on the destination server you are


trying to get to. The destination server should be listening on this
port. The following command  (netstat -a) can be used on the
destination server to check if the port is listening and you should be
looking for the port after the IP address and whether its state is
listening:
$ netstat -a

 Proto  Local Address          Foreign Address        State

 TCP    10.86.32.211:80            fcore:0                LISTENING

In this example, we know the machine where we are executing the


command is listening on port 80 on the IP address 10.86.32.211.

If there is no connectivity, follow steps below for troubleshooting


procedures.

Step 2: Check other stuff

Check firewall rule and network implementation

Check you have the right IPs, fully qualified domain names (FQDN),
and ports for the servers. Sometimes firewall rules are not
requested properly and more work needs to be done to make
connectivity happen such as:

Host file entries

Routing: static routes, address resolution protocol (ARP)


configurations

Network Address Translation (NAT)

Security: VPN configuration, If applicable, ensure SSL certificate


trust is in place and/or certificate exchanges installed and in place
(e.g. 1-way, 2-way SSL certificates installed, and destination
network can see successful SSL handshakes).

Servers may have several IPs – make sure the correct ones are used
and seen on the firewall(s)

Another type of test: Application Interface Test (depending on


application availability)
This type of testing occurs from the application running on the
source server and is common if you do not have access to the
servers themselves and may be easier to perform. In this test, the
application on the source server generates a test message/request
to be received on the destination server interface and source
confirms a valid response. This test confirms URL in place and
basic messaging interface is available.

Step 3: Network connectivity troubleshooting on server

1. Test Connectivity on source server(s)

a. Initial test by server operator:


Telnet to destination IP via destination port. If IPs are using
network address translation (NAT), choose the appropriate IP from
source server – the IP the firewall sees and translates from the
source server.

b. If telnet fails:
Check if static routing is done in source server routing table. Make
sure routing goes to the correct default gateway and ping default
gateway to check if it works.

Netstat – Checking the IP configuration on the server

netstat -rn

to check IP configuration on server and:

ping <destination_server>

Runs in Windows natively and in Unix sometimes under


/usr/sbin/ping

c. If server routing table is ok:


Conduct the telnet test while having network resources monitor
firewalls between source and destination points.
d. If traffic is not picked up on firewall:
Check points along the network path. If possible trace the network
route. Traffic bound for the destination address should be
monitored in case source server IPs are not seen on the firewall.

Traceroute – Find network routes

Use:

/usr/sbin/traceroute

to destination server and check for default gateway (assuming


devices along the way do not have ICMP blocked).

Step 4: Network protocol/packet analyzers

If you have exhausted the steps outlined above and there is still no

connectivity … 
you may have to use logging tools and applications traces.

The use of Wireshark, TCPdump, or similar tools for network


protocol and packet analysis on the source and/or destination
servers and firewalls will aid in the troubleshooting by checking for
abnormalities or errors in packets.

Analyzing application logs

If you are working with applications that need the network


connectivity, you can enable verbose logging on the application.
When testing web services, you can enable logging for protocol level
APIs. For example, if a Java application is a web service client and
is connecting to the web service endpoint, we could enable logging
of the HTTP implementation in Java via JVM arguments or look at

The unit of competency Setup Computer Server contains the


knowledge, skills and attitudes required for a Computer Systems
Servicing NC-II.
LEARNING OUTCOME

INFORMATION SHEET 2.1

Windows Server

Windows Server is a group of operating systems designed by


Microsoft that supports enterprise-level management, data storage,
applications, and communications. Previous versions of Windows
Server have focused on stability, security, networking, and various
improvements to the file system. Other improvements also have
included improvements to deployment technologies, as well as
increased hardware support. Microsoft has also created specialized
SKUs of Windows Server that focus on the home and small
business markets. Windows Server 2012 R2 is the latest release of
Windows Server, and focuses on cloud computing.

 DNS. (Domain Name System) The Internet's system for converting


alphabetic names into numeric IP addresses. For example, when a
Web address (URL) is typed into a browser, DNS servers return the
IP address of the Web server associated with that name.

-stands for Domain Name System. The main function of DNS is to


translate domain names into IP Addresses, which computers can
understand. It also provides a list of mail servers which accept
Emails for each domain name.

A DNS hosting service is a service that runs Domain Name


System servers. Most, but not all, domain name registrars include
DNS hosting service with registration. Free DNS hosting services
also exist. Many third-party DNS hosting services provide Dynamic
DNS.

DNS hosting service is optimal when the provider has multiple


servers in various geographic locations that provide resilience and
minimize latency for clients around the world. By operating DNS
nodes closer to end users, DNS queries travel a much shorter
distance, resulting in faster Web address resolution speed. [1]

What is DHCP?

DHCP itself is a network management tool for use with networks


working on the Transmission Control Protocol (TCP) and Internet
Protocol (IP), which combined form the TCP/IP suite of internet
protocols.

Essentially, DHCP is the protocol responsible for the management


and automatic configuration of IP addresses within a network. But
it also handles the configuration of default gateways, domain name
server (DNS) information and the assigning of correct subnet masks
for devices on the network

Terminal Services role in Windows Server 2008 allows remote


access to the server by clients running the Terminal Services client
(Remote Desktop Connection) on their computers. Effectively
decoupling the computational resource (the server on which the
Terminal Services role is installed) and the input/output (the client
computer through the use of a software client), Terminal Services
can help an organization significantly simplify its desktop
computing efforts. The Terminal Services Manager provides the
interface through which Terminal Servers, client connections,
users, and processes are managed. Use Terminal Services Manager
to manage the local Terminal Server, systems in trusted domains,
or standalone servers. You'll see some of this in action in this
column.

Print Services is available for installation as a server role on all


versions of Windows Server 2008 except the Web Server Edition. 
The Print Services Role and the associated services and features
may be installed via the new Server Manager console or
ServerManagerCMD.exe command-line role management tool.  By
default the print spooler service is installed and started on a new
installation of Windows Server 2008.  The Print Services server role
is not required to install and share printers.  However, installing the
role allows the ability to install the dependent role services and
manage the local print server using the Server Manager console. 
When a printer is shared on the server, firewall exceptions for File
and Printer Sharing (ports 137, 138, 139 and 445) are enabled.

When the Print Services role is installed, there are three role
services that are available for installation:

Print Server: The Print Server role service is a mandatory role


service for the Print Services role.  When the Print Server role is
installed, the Print Services Tools Remote Server Administration
Tool feature is also installed.  The Print Management Console (PMC)
is then accessible from Server Manager, Administrative Tools, or as
an MMC snap-in.  Although the installation of the Print Server role
service does not require a system restart, the removal of the role
service does.

Active Directory Domain Services

Purpose
Microsoft Active Directory Domain Services are the foundation for
distributed networks built on Windows 2000 Server, Windows
Server 2003 and Microsoft Windows Server 2008 operating systems
that use domain controllers. Active Directory Domain Services
provide secure, structured, hierarchical data storage for objects in a
network such as users, computers, printers, and services. Active
Directory Domain Services provide support for locating and working
with these objects.

This guide provides an overview of Active Directory Domain Services


and sample code for basic tasks, such as searching for objects and
reading properties, to more advanced tasks such as service
publication.

Windows 2000 Server and later operating systems provide a user


interface for users and administrators to work with the objects and
data in Active Directory Domain Services. This guide describes how
to extend and customize that user interface. It also describes how to
extend Active Directory Domain Services by defining new object
classes and attributes.

File Server – Although not required to share files, adding this core
role service allows you to use the Share And Storage Management
snap-in.

Distributed File System – Enables sharing files using the DFS


namespace and replicating files between DFS servers. If you select
this role service, the wizard will prompt you to configure a
namespace.

File Server Resources Manager – Installs tools for generating


storage reports, configuring quotas, and defining file screening
policies. If you select this role service, the wizard will prompt you to
enable storage monitoring on the local disks.
Services for Network File System – Provides connectivity for UNIX
client computers that use Network File System (NFS) for file
sharing. Note that most modern UNIX operating systems can
connect to standard Windows file shares, so this service is typically
not required.

Windows Search Service – Indexes files for faster searching when


clients connect to shared folders. This role service is not intended
for enterprise use. If you select this role service, the wizard will
prompt you to enable indexing on the local disks.

Windows Server 2003 File Services – Provides services compatible


with computers running Windows Server 2003.

Select the relevant options then click Next to continue.

Select Create a namespace later using DFS Management snap-in.


Click Next to continue. Select volumes to be monitored then click
Next to continue.

Set the report options then click Next to continue. Review chosen
options then click Install. Click Close to complete the installation.
File Services role is now installed.

STEP BY STEP GUIDE TO SETUP ACTIVE DIRECTORY ON


WINDOWS SERVER 2008
This tutorial will explain how to install AD on server 2008. This will
valid for windows 2008 R2 as well.

Requirement:

Minimum: Single processor with 1.4 GHz (x64 processor) or


1.3GHz (Dual Core)

Minimum: 512 MB RAM

Minimum: 32 GB or greater

The first step is to assign a ip to the server that you going to deploy
the AD. Its nessary to install it as DNS server too. So its better to
have fixed ip it doesn't mean you cannot install AD without fixed ip
address but it will solve lot of issues if you used fixed ip.
In here the server ip is 10.0.0.14. Since we going to make it as DNS
server too you should use the same ip as the preferred DNS server.

Next step is to install the Active directory roles. Unlikely the older
version of windows servers Microsoft highly recommend to use
server manager option to install roles before you run dcpromo.

 
Click on start menu and select the Server Manager

Select the roles from the right hand panel and click on add roles
option.
From the roles list select the "Active Directory Domain Services" role
and Click "Next"

Review the confirmation and click on "Next"


Review the installation confirmation and click on "Next"

It will take few minutes to complete and when its done you will get
this confirmation. And then click on "Close"
After that you will need to do a reboot.

After reboot please open up the "server Manager" again. And then
click on "Roles" there you will see the "Active Directory Domain
Services" is successfully installed in there. click on it then you will
get a window like below.

In their please pay attention to the message

So please click on that link and it will start the DCPROMO wizard.
 

So next step to go through the DC promo wizard.

To start the installation click on "Next"

Click on "Next"
Since we going to install New domain Controller in new forest please
select the option "Create a new domain in new forest" option and
click on "Next"
Now we have to provide the name for our domain controller. It must
be FQDN. In our case I used rebeladmin.com as the domain. Please
click "Next" after it.
In this window it will ask to select forest function level. If you going
to add server 2003 domain controller to your forest later don't select
the function level as server 2008. If you going to use full features of
2008 Ad you must select forest function level as server 2008. In my
case I used server 2008. Click on "Next" after the select.
In next window since it's the first DC we should make it as DNS
server too. Leave the default selection and click on "Next"
If the wizard cannot create a delegation for the DNS server, it
displays a message to indicate that you can create the delegation
manually. To continue, click "Yes"
In next window it will show up the database location. It its going to
be bigger AD its good if you can keep NTDS database in different
partition. Click on "Next" after changes.
In next window its asking to define a restore mode password. Its
more important if you had to do a restore from backup in a server
crash. Click on "Next" after filling it.
Next window is giving you a brief of the installation. Click on "Next"
Then it will start the installation of the AD. It will take some time to
complete. After complete of the installation perform a server reboot.
After the reboot now you can login to the domain. Please use the
login as following example

User name : your domain\administrator

Password : XXXXXXXX

Now its done and you can view the active directory options on
administrative tools menu
SELF-CHECK NO. 1.1-11

a.Enumerate the step by step guide in installing active directory


domain services

ANSWER KEY 1.1-11

Assign ip address in server

Select roles

Add roles

Check box in active directory domain services

Next

Next

Install

Restart

Type dcpromo

Next

Next

Create a new domain forest

Next

Type fqdn

Next
Select windows server 2008

Next

Select dns

Next

Yes

Next

Type password and confirm password

Next

reboot

DYNAMIC HOST CONFIGURATION PROTOCOL SERVICES

INFORMATION SHEET 1.1-12

STEP BY STEP GUIDE TO INSTALL DHCP ROLE AND CONFIGURE


Let’s see how we can configure DHCP server in a Windows Server
Environment. For the demo I will be using Windows 2008 R2
Server.

To start first need to log in to the server with administrator


privileges. Then start the “server Manager” by clicking on “Server
Manager” icon on task bar. Then go to “Roles”

Then click on “Add Roles” option to open Add roles Wizard.


Then it will load the Roles Wizard and select the “DHCP Server”
From the list and click next to continue.

Then it will give description about the role. Click next to continue.
Next window is asking to use which interface to serve DHCP clients.
If server has multiple NIC with multiple IP you can add them also to
serve DHCP clients.
In next window it will give opportunity to add DNS settings that
should apply for DHCP clients.
Next window is to define the WINS server details.
In next window we can add the scope, the Starting IP, End IP of the
DHCP range, subnet mask, default gateway, leased time etc.
In next Window it can configure to support IPv6 as well.
Then it will give the confirmation window before begin the install.
Click on “Install”
Once installation finishes DHCP server interface can open from
Start > Administrative Tools > DHCP
Using the DHCP it is possible to even configure multiple Scopes
configurations to the network. In a

network there can be different network segments. It is waste to


setup different DHCP servers for each segment. Instead of that it is
possible to create different Scopes to issue DHCP for the
SELF-CHECK NO. 1.1-12

a.Enumerate the step by step guide installing dhcp services

ANSWER KEY NO. 1.1-2

a.

Roles

Add roles

Check box dhcp services

Next

Next

Check box

Next

Select validate

Click wins is not required

Next

Add scope

Ok

Next

Disable dhcp6 stateless


install

TERMINAL SERVICES

INFORMATION SHEET 1.1-13

Install Remote Desktop Licensing Role

To start go into the Server Manager on the server that will host the
Licensing role service.
Under Roles Summary select “Add Roles”.

Click Next.
Check Remote Desktop Services and click Next.
Click Next.

Check Remote Desktop Licensing and select Next.


Discovery scopes are no longer used for licensing with Windows
2008 R2 Remote Desktop, we can assign these to our Remote
Desktop Session Host manually or through a group policy.  There is
a 120 day grace period allowed for connections to a Remote Desktop
Session Host before a license server needs to be activated.  Click
Next.

Confirm the settings and click Install.  Then click Close once the
install is completed.
SELF-CHECK NO. 1.1-13

a.Enumerat the step by step installing terminal services

ANSWER KETY 1.1-13

a.

roles

add roles

next

check box terminal services or remote desktop services

next

install

remote desktop licensing

next

install
PRINT AND SERVICES ROLE

INFORMATION SHEET NO 1.1-14

1. Installing print services

Installing print services for Windows Server 2008 R2 is done by


adding the Print and Document Services role. This role is added
using Server Manager. Print services includes four primary role
services (see Figure 1):
Print Server

LPD Service

Internet Printing

Distributed Scan Server

Figure 1. Print Server Role Services.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_1.jpg

2. Administering a print server

The print server role service adds all components necessary to set
up, share, and manage network printers. After installing this role,
you will notice that the Print Management console will be added to
Server Manager and can be accessed from the node Roles | Print
and Document Services | Print Management (see Figure 2).

Figure 2. Print Management Console.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_2.jpg

Installing a network printer on print server


Using the print management console, you can manage all your
network printers from one central console. One of the first steps
you will want to perform is to install network printers on your print
server. This can be done by performing the following steps within
the print management console:

1 Select the Printers node under Print Management | Print Servers


. | your print server name (see Figure 3).

Figure 3. Print Server Printers Node.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_3.jpg

2
Right click the Printers node and select the option Add Printer...
.

3 You can choose how to locate the printer you want to install
. including searching the network, using an existing port, or
creating a new port. In this exercise, we will choose the option to
search the network (see Figure 4). Then click Next.

Figure 4. Printer port options.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_4.jpg

4 The printer installation wizard will begin searching the local


. network for printers. After the search is complete, any network
printers found are listed in the wizard as seen in Figure 5.

Figure 5. Searching for Network Printers.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_5.jpg

5 Select the printer you want to install, and then click Next. The
. wizard will attempt to add a port for the selected printer.

6 You will next need to give the printer a name and share name
. (see Figure 6). Additionally, you can list location and comments to
make it easier for users to find the printer. For example, by using
the notation HQ/2nd/Processing Room, users can search for a
printer based on its location. When searching Active Directory for
printers, a user could enter the search HQ/2nd/* to list all
printers on the second floor in the HQ building.

Figure 6. Creating Printer Share.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_6.jpg

7 After entering relevant printer information, click Next to continue.


. Then click Next again to install the printer driver. When the
installation is complete you will receive a confirmation page.
Click Finish to close the wizard.
Once the printer has been created, you can make the printer more
accessible and easier to find by publishing it to Active Directory. To
do this, locate the printer in the printer management console and
choose properties. Then click the Sharing tab and select the
option List in Directory as seen in Figure 7. Then click OK.

Figure 7. Publishing Shared Printer to Active Directory.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_7.jpg

You can now access this printer from a Windows client by entering
the UNC path to the printer share (\\Server Name\Printer Share) or
by searching Active Directory as seen in Figure 8.

Figure 8. Searching Active Directory for Published Printer.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_8.jpg

Deploying printers using Group Policy

Additionally, you can push shared printers out to users via Group
Policy. To deploy a printer via Group Policy, perform the following:

1 Locate the printer in the printer management console. Then right


. click the printer you want to deploy and choose the option Deploy
with Group Policy. This will open the Deploy with Group Policy
window.
2 Click the Browse button to select the GPO you want to use to
. deploy the selected printer (see Figure 9). If you want to use a new
GPO specifically for deploying printers, you will need to create the
GPO prior to using the deploy with group policy option within the
print management console.

Figure 9. Deploy with Group Policy Options.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_9.jpg

3 Next you need to select whether you want the printer to be


. deployed to computers or users. By selecting computers, the
printer will be deployed to any user who logs on to computers to
which this policy is applied. If you select users, the printer will be
deployed to users to whom the policy is applied, no matter which
computer they log on to. If you want to deploy the printer to both
users and computers, select both options. Then click Add.

4 You should now see the printer listed in the Deploy with Group
. Policy windows as seen in Figure 10. Click OK to complete the
GPO setup.

Figure 10. Selecting a GPO.

image:
http://tutorial.programming4.us/image/1303/Administering
%20Print%20and%20Document%20Services_10.jpg
You can now log on to a computer that the policy is applied to and
you should see the printer installed and ready to use.

Read more at
http://tutorial.programming4.us/windows_server/windows-server-
2008-r2-file-and-print-services---administering-print-and-
document-services-(part-1).aspx#7ATpCR6yJ8ykQ1sW.99

SELF-CHECK NO. 1.1-14

a.Enumerate the step by step guide installing print services

ANSWER KETY 1.1-14

a.

Roles

Add roles

Check box print services

Next
Next

install

FILE SERVICES ROLE

In this blog post, we’ll cover the basics of the Distributed File
System (DFS) in Windows Server 2008, which offers users simplified
access to a set of file shares and helps administrators easily
maintain the file server infrastructure behind those file shares,
including options for load sharing, replication and site awareness.

Many File Servers and File Shares

It’s a common scenario. Over time, a company ends up with a large


number of file servers that were created at different times and by
different teams. The users are left to figure out where their files are
stored, mapping many drives to file shares and learning complex
UNC paths
like \\server23\ffiles and \\finance.asia.company.com\spreadshee
ts and even something like \\10.1.23.45\scratch. To complicate
things further, when an old file server is replaced, paths are broken
and mapped drives stop working. It can be challenging.

You also probably heard the proposition to invest in a complex


project to consolidate everything into a large file server or NAS
appliance. While those projects will solve the problem for a while,
you will need to spend a lot of resources to move the data around
and fix users’ mapped drives and paths. All that to have that new
server eventually become too small and need replacing again. Or
you will need many of those larger servers, starting the cycle over.

It turns out it doesn’t have to be that way. Windows Server already


provides a way to manage a large set of file shares as a consolidated
list, under common namespaces. From your users’ perspective,
each namespace looks like a single file share with many folders.
From an administrators’ perspective, you can easily add more file
servers or consolidate existing file servers without complex “forklift”
migrations. And those are just a few of the benefits of DFS.

Adding the DFS Services 

DFS Services are available on all currently supported versions of


Windows Server, but there are significant improvements in the
Windows Server 2008 editions. The DFS namespace client is
available for all currently supported versions of Windows, both
client and server. Domain-based DFS namespaces require the use
of Active Directory.

To add the DFS Services to Windows Server 2008, you will use the
Server Manager tool. First, you need to expand the "Roles" item on
the tree to make sure that the File Service role is installed. Then
you will right-click on "File Services" and click on option to
"Add Role Services". That's where you you will find the option to add
DFS:
Another way to add the DFS Services is using the
ServerManagerCmd.EXE command line tool. You can also use
ServerManagerCmd to make sure that the right role and role
services are installed. Here's a sample command line:

C:\>servermanagercmd -query | find "[FS"

[X] File Server [FS-FileServer]


[X] Distributed File System [FS-DFS]

[X] DFS Namespaces [FS-DFS-Namespace]

[X] DFS Replication [FS-DFS-Replication]

[ ] File Server Resource Manager [FS-Resource-Manager]

[X] Services for Network File System [FS-NFS-Services]

[ ] Windows Search Service [FS-Search-Service]

[ ] Windows Server 2003 File Services [FS-Win2003-Services]

[ ] File Replication Service [FS-Replication]

[ ] Indexing Service [FS-Indexing-Service]

C:\>

DFS Namespaces

A DFS namespace is basically a place where you will have links to


all your file shares. From an administrator point of view, you should
think of it as a folder structure where you keep the list of target file
shares. Your users will see it as a single share with many folders
and they will have no idea that they are navigating across a set of
servers to get to the subfolders and files.

When configuring DFS, you have a choice of using a domain-based


or a stand-alone namespace. If you already have Active Directory
deployed, you should consider using a domain-based namespace. If
you’re not using Active Directory, your only choice is a stand-alone
one.

The main advantage of the domain-based namespaces is that your


configuration will be stored in Active Directory and you won’t have
to rely on a single server to provide the namespace information to
your clients. The path users refer to uses the name of the domain
and it will not need to change because your namespace server name
changed (only if you change your domain name). With a stand-alone
DFS, that server name becomes part of the main path to the
namespace.
There are also two domain-based DFS modes: Windows Server 2008
mode and Windows Server 2000 mode. Windows Server 2008 mode
(which requires Windows Server 2003 forest functional level,
Windows Server 2008 domain functional level and Windows Server
2008 running on all namespace servers) includes support for more
than 5,000 folders with targets per namespace and access-based
enumeration.

Creating a Namespace

After you install the service, your next step is to create the
namespace. Here’s are the steps to create a domain-based
namespace:

Start “DFS Management” from the “Administrative Tools”. On the


tree on the left side, click on “Namespaces”.
Click on “New Namespace…” action on the panel on the right to
start the “New Namespace Wizard”.
Enter the name of the namespace server and click “Next”.
Enter the name of the namespace and click “Next”.
Select the type of Namespace and click “Next”. In my case, I’m using
a domain-based namespace with 2008 mode enabled. On the review
screen, click “Create” and then click “Close” when it’s done. You will
end up with a brand new namespace with no folders:
Note: DFS-N “namespaces” are also sometimes called “namespace
roots” or simply “roots”. This naming convention was used in older
versions of DFS-N and you will also see it in the command-line
tools.

Adding Folders to the Namespace

After your create the namespace, you will add folders to it,
specifying the associated folder target. This means pointing to the
actual file shares, making each one appear to users as a folder
under the namespace. Before you do that, you want to think long
and hard about the folder structure you’re creating. A basic goal of
DFS is to create a stable infrastructure that will not constantly
change on your users.

To start, click on the “New Folder…” action on the panel on the


right. In the example below, I will enter the name of the folder which
as “Finance”. I will also enter one associated folder target, which
will be “\\JOSEBDA-N2\FinanceDocs” (this share was configured
beforehand). Here are the results right before I click “OK” to create
the new folder:

Finally, here’s the end result in the “DFS Management” window:


I could also have folders with no targets (just to create a hierarchy
in the namespace) or folders with multiple folder targets.

Note: DFS-N “folders” are also sometimes called “links”. DFS-N


“folder targets” and also sometimes called “link targets”. These
naming conventions were used in older versions of DFS-N and you
will also see it in the command-line tools.
Multiple Targets

It’s useful to have multiple copies of the same data stored in


different file servers. One reason for that is fault-tolerance (if one
server is unavailable, you can still access the other one). The other
reason is to choose the copy of the data that is closer to you. If
you’re in a branch office and you want to access a very large file,
you would rather get a copy from a server in that branch.

It’s actually quite simple to add more folder targets to an existing


folder or create the folder with multiple targets initially. All you have
to do is make sure that you provide the multiple targets for the
same folder in that namespace when you configure it.
If you’re using domain-based DFS, the clients will be directed to the
target that is closest to them. If there is no target nearby, the clients
will be pointed to a remote one. This is similar to what happens
when clients are looking for a domain controller. DFS uses the site
information in Active Directory to determine which server works
best.

Having multiple file servers serving the same data is also useful for
maintenance. If you need to apply a security update or add some
memory to the server, you can count on the fact that there is at
least another server out there that can service client requests while
that specific server is down.

DFS Replication

At this point, you’re probably thinking: How does the data get
copied across multiple servers?

Well, Windows Server includes a component to replicate data


between file servers in case you need that. It’s called DFS-R
(Distributed File System Replication). DFS-R was introduced with
Windows Server 2003 R2 (replacing the old NTFRS with many
advantages). DFS-R can be used for both domain-based and stand-
alone DFS.

To replicate files between two (or more) shares, you need to create a
replication group and specify a few things like which servers will
replicate (members) and what they will replicate (replicated folders).
DFS-R is aware of site topology. It also has options to
control scheduling and the use of bandwidth (throttling). DFS-R
uses Remote Differential Compression (RDC), meaning that only
changes in the files are sent over the network, not the entire file.
There are specific changes in Windows Server 2008 DFS-R,
including improved performance, better network bandwidth
utilization, quicker recovery from unexpected shutdowns and
support for Read-Only Domain Controllers.

Configuring Replication

When you create multiple folder targets for a folder, the DFS
Management tool will offer you to automatically setup the
replication group:
Assuming you have installed the DFS-R role service on both
servers, it will go ahead and setup replication for you. It’s done via
the “Replicate Folder Wizard”.

To start, it will ask you the replication group name and the
replicated folder name:
It will then verify if the server working as folder targets for that DFS
folder can be a replication member. Our two servers are eligible:

Next, you need to select one of the servers as the primary member.
This should be the server that contains the files you want to
replicate and will be the authoritative server during the initial
replication:
You will also need to select a topology. This is important if you have
a larger number of servers and need to control how they replicate.
For instance, if you have a central server in HQ and several branch
servers, you can make sure the branch servers do not try to
replicate with each other directly, but always replicate only with the
HQ servers. In our case, with only two servers, "Full Mesh" will do:
Finally, you need to select the bandwidth and schedule. This will
allow you do restrict the amount of bandwidth that DFS-R can use
and also specify specific times during the day when replication is
allowed. In this case, I will keep it simple, replicating at all hours
and using the full bandwidth.
After the review screen, the wizard will set up replication for you.
Here’s the end result:
DFS Tools

As you saw, the most common administration activities related to


DFS-N and DFS-R can be performed using the “DFS Management”
MMC. This tool will show up under “Administrative Tools” after you
add the DFS role service in Server Manager.

You can also add just the MMC for remote management of a DFS
namespace server from a server that does not have the actual DFS
Services installed. You will find that option in Server Manager,
under Add Feature, Remote Server Administration Tools (RSAT),
Role Administration Tools, File Services Tools.

Another way to manage DFS-N is to use DFSUTIL.EXE, which is a


command line tool. There are plenty of options and you can
automate pretty much any DFS-related activity, from creating a
namespace to adding folders to exporting the entire configuration to
troubleshooting. DFSUTIL.EXE is an in-box tool in Windows Server
2008. Here’s a sample screen for DFSUTIL:
C:\>dfsutil

DESCRIPTION:
Manages DFS Namespaces, servers and clients.

NOTES:
* Use the Dfsutil /oldcli command to use of the original Dfsutil
syntax.
* Use the /? parameter after any command to display help for the
command.
* Dfsutil commands use the original Distributed File System
terminology,
  with updated DFS Namespaces terminology provided as
explanation for most
  commands.
* If you specify at the end of a command an object (such as a
namespace server)
  about which you want information, most commands will display
the information
  without requiring further parameters or commands. For example,
when using the
  Dfsutil Root command, you can append a namespace root to the
command to view
  information about the root.

EXAMPLES:
Dfsutil Root
Dfsutil /oldcli
Dfsutil /?

------ Commands Supported ------


Root                  Displays,creates,removes,imports,exports
namespace roots.
Link                  Displays, creates, removes, or moves folders
(links).
Target                Displays,creates,modifies folder targets (link
targets).
Property              Displays or modifies a folder target or namespace
server.
Client                Displays or modifies client information or registry
keys.
Server                Displays or modifies namespace configuration on
the server.
Diag                  Perform diagnostics or view dfsdirs/dfspath.
Domain                Displays all domain-based namespaces in a
domain.
Cache                 Displays or flushes the client cache.

C:\>

Note: DFSCMD is an older version of the DFS-N command-line tool.


You should use DFSUTIL instead.
For DFS-R, the command line tool is DFSRADMIN.EXE. Here’s a
sample screen:

C:\>dfsradmin

=== Supported Objects ===


You can perform actions on the following objects:
Bulk          Perform several actions by using a single input file
Conn          Perform actions on connections between members of a
replication group
Health        Generate a health report for one or more members of a
              replication group
Mem           Perform actions on a member of a replication group
Membership    Perform actions related to a member's participation
in a
              replicated folder
PropRep       Generate propagation report for one or more
propagation test files
PropTest      Generate and drop a propagation test file on a
membership,
              used for testing replication
RF            Perform actions on a folder that is replicated between
members
              of a replication group
RG            Perform actions on a group of computers that
participates in
              replication
Sub           Perform actions related to a member's subscription in
              replication groups

Type "DfsrAdmin <Object> /?" for detailed help.


Usage: DfsrAdmin <Object> <Action> [<SubObject>] [<SubAction>]
       </Parameter:Value> ... [</Optional-Parameter:Value> ...]
       [/Domain:<value>] [/DC:<value>] [/CSV] [/Force]

=== Optional Parameters Supported For All Commands ===


/Domain: Specify the domain for the replication group
/DC:     Specify the domain controller to connect to in the
replication
         group's domain
/Force:  Specify that a failed operation is skipped when an action
causes a
         series of operations to be performed

=== Optional Parameter Supported For All List Commands ===


/CSV:    Dumps the list output in CSV format

C:\>

Conclusion
I hope this provided you a good overview of DFS. There’s a lot more
to talk about, as you probably guessed. One could write an entire
book on this. If you like what you read so far, I suggest you start
working with it on a test environment and look at the links below
for additional information. You users will thank you…

SELF CHECK NO 1.1-15

a.Enumerate the step by step guide of installing files servies

ANSWER KETY 1.1-15

a.

roles

add roles

check box file services

check box file services resource manager

check box distributed file system


nextc

next

install

DNS ROLE SERVICES


DNS (DOMAIN NAME SERVICE)

This is the main and commonly used name resolution technique in


modern computer networks. There are two main name space
principles, the domain name hierarchy and IP space. DNS
represents the domain hierarchy and provide translation services
for it and IP name spaces. DNS servers will keep records about
hostnames along with the ip addresses and depend on the queries it
will translate IP addresses to hostname or hostnames to IP
addresses. Users more like to use user-friendly domain names,
hostnames instead of complex ip addresses. If you look in to IPV6
it’s really hard to use IP address to communicate as it’s too
complex. With use of DNS you don’t need to keep track of those ip
addresses.
 
There is lot of DNS servers available from different vendors but it’s
all doing the same thing. Most popular DNS servers are Microsoft
Windows DNS servers and BIND DNS servers runs on linux/unix
kernel. 
 
These DNS servers will holds different type of service records such
as Mail exchange (MX) which defines the domain mail server
settings, Name Server Records (NS), Canonical Name Record
(CNAME) to represent alias for another DNS name etc.

Let’s look how you can simply setup DNS server on Windows Server
2008 R2.

1.    As the first option you need to log in to the server with
administrator privileges. Then click on “Server Manager” in the Task
Bar. It will load the server manager interface. From it select “Roles”.
2.    Then click on “Add Roles” to continue. It will load the add roles
wizard. Click on “Next”
3.    From the list select “DNS server” and click on “Next” to
continue.
4.    Then it will give description about DNS server. Click “Next” to
Continue.
5.    Then it will give Confirmation and click on “Install” to continue.
6.    Once it install it will give a confirmation.
7.    After the installation you can start the server interface by Start
> Administrative Tools > DNS
8.    Now we need to create Lookup Zones. Let’s starts with Forward
Lookup Zones. First right click on “Forward Lookup Zone” and Add
new Zone.
9.    It will open new Wizard and click on “Next” then new window
will appear select “Primary Zone” since this going to be the first DC
server. Click on Next after selecting.
10.    In next window it ask about the Zone name. you have to put
same name you used as prefix name in previous step.

11.    In next window click on option “Allow both nonsecure and


secure dynamic updates” option to accept updates automatically to
DNS Zone. and click “Next” it will end the wizard and click on
“Finish” to create Zone.
12.    The next step is to create “Reverse Lookup Zone”. in DNS
window right click on “Reverse Lookup Zone” and click Create new
Zone
13.    In next window click on “Next” to start and select “Primary
Zone” as its first server and click on next
14.    In next window in network id section put the first 3 segments
of the ip range. And click on Next
15.    In next window keep default name for the zone name and
click on next.

16.    In updates window allow “Allow both nonsecure and secure


dynamic updates” and click on next

17.    In next window click on finish and it will create the zone. With
this we done with the DNS server setup.
After create the necessary zone files, we can add records to the
zones. Computers that need to be accessed from Active Directory
and DNS domains must have DNS records. Although there are
many different types of DNS records, most of these record types
aren't commonly used. Let’s see some of the DNS records available.

•    A (address) Maps a host name to an IP address. When a


computer has multiple adapter cards or IP addresses, or both, it
should have multiple address records.
•    CNAME (canonical name) Sets an alias for a host name. For
example, using this record, zeta.microsoft.com can have an alias as
www.greenwich.com
•    MX (mail exchange) Specifies a mail exchange server for the
domain, which allows mail to be delivered to the correct mail
servers in the domain.
•    NS (name server) Specifies a name server for the domain,
which allows DNS lookups within various zones. Each primary and
secondary name server should be declared through this record.
•    PTR (pointer) Creates a pointer that maps an IP address to a
host name for reverse lookups.
•    SOA (start of authority) Declares the host that's the most
authoritative for the zone and, as such, is the best source of DNS
information for the zone. Each zone file must have an SOA record
(which is created automatically when you add a zone).

You might also like