You are on page 1of 36

6 MONTHS INDUSTRIAL

PRESENTATION

PROJECT REPORT ON
TO ACCESS
APPLICATIONS USING WEB ACCESS
THROUGH TERMINAL SERVER

Submitted By:
Veshali
(100630417998)
ECE

COMPANY PROFILE
Telecommunications Consultants India Ltd. (TCIL) is a leading ISO - certified
public sector undertaking. TCIL,a premier telecommunication consultancy and
engineering company with a strong base in Telecommunication & Information
Technology
(IT),
was
incorporated
in
1978
by
Department
ofTelecommunications (DOT), Government of India under the aegis of Ministry
of
Communications,
headed
by
Minister of Communications and Information Technology. There are four PSUs
under DoT. TCIL is one of them. Other being
Bharat Sanchar Nigam Limited (BSNL),
Mahanagar Telephone Nigam Ltd.(MTNL),
ITI Limited.
Today TCIL offers total telecom solutions for projects. TCIL has working/ is
works in almost 45 Countries mainly in Middle East Africa, South-East Africa,
South-East Asia and Europe. The Organisational Structure is formed with the
objectives of providing globallyworld-class technology and Indian expertise in
all fields of Telecommunications and to provide total Quality management &
excellence in project execution. TCIL-IT, Information Technology is a division of
TCIL. Managed by ICSIL

WHAT IS NETWORK
A computer network is an interconnected group of computers , a network is any
method of sharing information between two systems (human or mechanical).
Networks may be classified by the network layer at which they operate
according to basic reference models such as the five-layer Internet Protocol Suite
model.
While the seven-layer Open Systems Interconnection (OSI) reference model is
better known in academia, the majority of networks use the Internet Protocol
Suite (IP).
WHY NETWORK
They have more than one computer and want to share one broadband Internet
connection.
Networking is smart, efficient and cost effective.
Networking is a way to connect to the Internet, printers, game consoles and
other computers in your home or small office.
A network lets you effortlessly transfer files, pictures, music and information
without using a disk or burning a CD. It also enables everyone in your home or
office to share one broadband Internet connection, one printer, one scanner.

NETWORK TOPOLOGIES
Network topology is the study of the arrangement or mapping of the elements
of a network, especially the physical (real) and logical (virtual) interconnections
between nodes.
CLASSIFICATION OF NETWORK TOPOLOGIES
Linear bus :

Star network:

Ring network:

Bus Topology:

OSI MODEL

INTERNET PROTOCOL
Network ID: Each IP address defines the network ID and host ID. The
network ID identifies the systems that are located on the same physical
segment. All systems on the same physical segment must have the same
network ID. The network ID must be unique to the internet work.
Host ID: The host ID identifies a workstation, server, router, or other TCP/IP
host within a segment. The address for each host must be unique to the
network ID. Each IP address is 32 bits long and is composed of four OS-bit
fields, called octets. Octets are separated by periods. The octet represents a
decimal number in the range 0-255. This format is called dotted decimal
notation. The following is an example of an IP address in binary and dotted
decimal formats.

CLASSES OF NETWORKING
All networks in practical use have different sizes. For example, a company that
will have 50 computers, will not need a network of 5000 computers, And on
the contrary, a company that needs 5000 computers does not need a network
that can only hold 50 computers. This is the main reason that engineers
decided that IP address space should be divided in different classes in order to
meet different requirement.
Class A: Starts with a number between 1 and 126. Only 126 of these
networks are available, however each class A network can handle 16,777,214
IP addresses or computers. Its addresses are assigned to networks with a
very large number of hosts. This allows for 126 networks and approximately
17 million hosts per network.
Class B: IP addresses of this type starts with a number between 128 and
191. Class B addresses are used for small local area networks (LANs). This
allows for 16, 384 networks and approximately 65,000 hosts per network.
Class C: This is the most widely used class by small businesses. When you
look at the IP address, you'll notice that class C networks start with a first
number that's between 192 and 223 .Class C address are used for small local
area networks (LANs). This allows for approximately 2 million networks.

Class D: It has its highest bit order set to 1-1-1-0 it is used to support
multicasting. A multicast group may contain one or more hosts. The
remaining bits designated the specific group in which the client participates.
Microsoft uses class D addresses for applications to multicast data to hosts
on an internet work, including Windows Internet Name Service (WINS) and
Microsoft NetShow.
Class E: It has its highest bit order set to 1-1-1-1 which is reserved for
experimental use. Class E is an experimental address that is not available
for general use; It is reserved for future use.

WINDOW SERVER 2008R2


Introduction:
Windows Server 2008 R2, brings many new features and improvements that
make the network administrators job easier.
WINDOW SERVER 2008R2 FAMILY
Window server 2008R2 Standard.
Window server 2008R2 Standard Core,
Window server 2008R2 Data Center.
Window server 2008R2 Data Center Core.
Window server 2008R2 Enterprise.
Window server 2008R2 Enterprise Core.

PROJECT
To Access Applications Using
Web Access Through Terminal
Server

BASIC ARCHITECTURE OF TS

Termin
al
Server

Clients

Clients

The architecture above how various clients are connected to the


Terminal server (two-way) using any network architecture where
they use the applications installed on the terminal including the
internet connection also at times with/without permission and
themselves dont need to be intelligent computers , that is why
they are called thin clients.

REQUIREMENTS OF TERMINAL
SERVER
1.
2.
3.
4.

Microsoft server 2008


Domain name server (DNS)
Domain controller (ACTIVE DIRECTORY)
Dynamic host configuration protocol (DHCP)

DOMAIN NAME SERVER


It translates domain and computer DNS names to IP Addresses. If we plan
to setup this server as domain controller and it is the first domain controller
in the domain, select the domain controller role. In this case domain
controller role configures the server so that DNS and Active Directory work
together.

(AD)

DOMAIN CONTROLLER

Domain Controller stores the directory data and manages user logon
processes and directory searches.
. Below are the steps to install DNS controller on the server:
Type dcpromo in run dialogue box.

USERS AND GROUPS


Users: No one can work in a company, use any computer, or attach to any
network without access to a user account. A user account is like the key to
your car. Without the key, you cannot drive anywhere.

Groups: Groups are collections of users, contacts, computers, and other


groups (a process known as nesting). Groups are supported in Active
Directory and in the local computers security subsystem.

DYNAMIC HOST CONFIGURATION


PROTOCOL (DHCP)
Dynamic Host Configuration Protocol (DHCP) is a protocol used by
networked devices (clients) to obtain various parameters necessary for the
clients to operate in an Internet Protocol (IP) network.

BENEFITS - REMOTE DESKTOP SERVICES


Connectivity and Communication
Data Sharing
Data Management and virtualization

Authentication
Security
To centralize control of users

To avoid the need of liscence because terminal server work for 120 days
without liscence on trial basis.
To access applications using web access

Installation Of Terminal Server:


Step 1:open server manager on server 2008 enterprise.

Step 2: click on add roles & select terminal services & ts web access then next & next.

Step 3 : click on terminal server. And next.

Step 4: select the do not require option -> configure later ->next->next ->install ->close->re

Set up remote desktop connectipon on window & server:

Step 1: go to server and right click on computer . select properties.


Step 2: click on remote settings and select remote allow connection from computer option
Step 3: apply and ok.

Set group policies on server:


Step 1: open run dialog box on servertype gpedit.msc in dialog box.

Step 2: select computer configuration -> select windows settings-> security settings ->
local policies.->select user right assignments.
Step 3:select log on locally (policy). Right click on properties & select add user group
.click on advanced then find now.
Step4: select terminal services & click ok. Then apply & click ok.

Create users on server:


Step 1: stert-> select administrator tools ->active directory users & computers.

Step2: right click on screen->select new-> create user->give username &password> select user cant change password and select ok.

Select applications which you want to give to the clients:


Step1:start-> admin tools->terminal services->ts remote app manager.

Step2: right click on table & add remote app programs & click on next..

Set environment for application :

Connect the client with terminal server by remote desktop connection:

Access applications using web access:


Step1 :Fill ip of server in url & enter.
Step2: give username & password.

Thank you .

You might also like