MCSE Lessons

Embed Size (px)

Citation preview

  • 8/3/2019 MCSE Lessons

    1/55

    Bashir Ahmad Noori Presents 1

    MCSE (Microsoft Certified System Engineer)

    1. This course is designed keeping in view to requirements for a Network System

    Engineer or Administrator, so by learning this course you can get a job like

    Network Operation Manager, Network Administrator or Network Engineer.

    1. WINDOWS SERVER 2003 (Operating System)

    2. NETWORK INFRASTRUCTURE OF WINDOWS SERVER 2003

    3. BASIC NETWORKING CONCEPTS

    4. DEVICES USED FOR NETWORKING AND INTERNETWORKING

    5. CREATING A WORK GROUP Type Network

    6. CREATING DOMAIN TYPE Network

    ====================================================

    Operating System: Computer industry is divided into two main categories.

    1. HARDWARE

    2. SOFTWARE

    Hardware means that, the manufacturing of Computer and the Repairing of

    Computer. Means that we deal with the physical parts of the computers. While

    Software is a term which is use to operate the computer or link the different parts

    of computer will each other to make one computer. The Software part is divided

    into followings:

    1. System Software

    2. Application Software

  • 8/3/2019 MCSE Lessons

    2/55

    Bashir Ahmad Noori Presents 2

    3. CAD (Computer Aided Design)

    System Software are those program which are use to operate the computer or by

    using which we can develop the application software. So System Software is

    further divided into two categories.

    1. Operating Systems

    2. Languages of Computers

    Operating System:

    A System Software which is use to links different parts of computers, and transfer

    the require sub software in the memory of computer to make the different parts of

    computer active, like mouse, key board hard disk, monitor, these sub software arecalled device drivers, and then provide us a way for Further working.

    Explanation:

    When ever we turn on our computer, the first process after switching on the

    computer is called POST ( Power on Self Test ) , In this process computer will

    check all the internal and external parts if there is any problem in any part

    computer display the message in shape of text or by visual like beeps, After the

    post process the operating system started the work, of linking different parts of

    computer with each other through different mediums like cables or wires or

    interface, after that operating system will transfer the driver program for each

    device internally or externally attached with the computer. After drivers are the

    program provided by the manufacturer of the device. After transformation of the

    Device Drivers

    The operating System load the GUI (Graphics User Interface) Screen for further

    working. The Common Operating System we use are .

    1. Windows NT Family (Windows Server 2003)

    2. UNIX Operating System

    3. LINUX (Operating System)

    4. VMS (For Main Frame Type Computers) Operating System.

  • 8/3/2019 MCSE Lessons

    3/55

    Bashir Ahmad Noori Presents 3

    Windows Server 2003:

    Normally it contains a Program Manager when loaded; this program manager is

    divided into two main parts.

    1. Desktop Area

    2. Task Bar and Start Menu

    This is the original GUI of the Windows Server 2003. Different Operations can be

    performing at the same time in the Windows. This is because of the fast memorymanagement, memory management means that the Window Server 2003 is

    multitasking and multi-user system. First when we open a task in the windows it

    will transfer this task to memory and then the memory transfer it as an image to the

    monitor screen, so when we open the next task suddenly then the first task will

    deleted from the memory but remain its image on screen and when we click on the

    screen the task will be again transfer to memory.

    1. Installation of the Windows on Computer.

    At Least we need Pentium III computer, with 500 MMX Processor, with 256

    MB of RAM and 10 GB Hard disk Space.

    Installation means that copy the files of the operating system in the computer hard

    disk and then make them active, different types of installations are provided for

    Server 2003 operating System.

    1. Manual Installation

    2. Automatic Installation

    3. Remote Installation

  • 8/3/2019 MCSE Lessons

    4/55

    Bashir Ahmad Noori Presents 4

    4. Unattended Installation.

    The Windows Server 2003 Installation is quite different from the Windows XP

    Installation, in the Windows Server 2003 Installation we need to configure the

    networking criteria for our Computer, and set the number of clients ( if our

    computer is a Server Computer ) then setup the options for the Workgroup or

    Domain Type Networking Structure.

    Server: A Server is a technology by using we can deploy our data from one device

    to other device. A Server is also a main computer in a network which controls all

    the clients computer.

    How to Install the Windows Server 2003 in Computer.

    1. Insert the CD of windows Server 2003 in CD Drive

    2. The Boot from CD Drive Option will display after the Post process completed

    3. Press Any Key to accept the Boot from CD.

    4. The Windows SERVER 2003 Standard Setup will be started.

    5. The First Screen of the Windows Setup will copy the Hardware information of

    your computer into the memory.

    6. After loading all the devices and driver information, the Setup Welcome Screen

    will display

    7. Here you will see three options

    8. Enter to Continue

    9. R to Repair

    10. F3 to Quit from the Setup Screen.

    11. Even we want to install first time or we want to repair the windows press Enter

    Key

    12. The Windows Server License Screen will be display this is an agreement

  • 8/3/2019 MCSE Lessons

    5/55

    Bashir Ahmad Noori Presents 5

    provided by the Microsoft, and contains the term and conditions of using the

    Windows Server 2003. Here Press F8 Key to accept the agreement.

    13. the Next screen display the status of the current window installed in your

    computer, now here if you want to repair the window press r, if you want to install

    new window press Esc (Escape Key) which do not Repair

    14. The Hard Disk Partitioning Screen will display, which shows the different

    partitions already, exists in your hard disk.

    15. First we will delete all old partition and then create the new partitions

    16. Select the Partition, which you want to delete and press D from the key board.

    17. The Partition deletion information screen will display which shows the text thatwhat will happen when we delete the partition. Here Press Enter Key to continue if

    you want to delete partition or Esc to cancel the deletion process.

    18. The next screen will be the confirmation screen for deleting the partition press

    L to confirm to delete the selected partition.

    19. The partition will be deleted, do the same steps for other partition to delete.

    20. After deleting all the partition, we will re create the partition we will check how

    much space of total hard disk we have.

    21. We can set the partition size in the percentage, for example we want to set the

    C Drive Space to 50% and remaining 50% to D drive,

    22. Press C to create a Partition, The Total Space of hard disk will display in the

    partition screen, delete the space, and type the space like 6500 (Half of a 13 GB

    Hard Disk Space), and Press Enter Key to create the Partition.

    23. Now to create new partition, select the un- partition space from the screen and

    press C, Enter to accept the New Partition the Partition will be created, now we will

    format our partition where we want to install the windows, so select the first

    partition also called primary disk partition or C drive and press enter to start the

    formatting process, Formatting is a process to create track and sectors on hard

    disk where our data will store in a sequence, as first time our hard disk is like a

  • 8/3/2019 MCSE Lessons

    6/55

    Bashir Ahmad Noori Presents 6

    white paper and computer it self does not identify the actual space of the hard disk,

    so we perform the formatting process to convert this white space with the

    measurable space.

    With the formatting computer will create first Track 0, which contains a sector

    (sector 0) which has the complete information about the boot record of the hard

    disk the bootable files of windows and the directory structure of the file, This sector

    is called boot sector is our hard disk damage so it means that boot sector is

    damage. This is the first path where we enter our data in our hard disk. Every time

    formatting the Hard Disk will damage the Hard Disk so keep in mind that less

    formats the hard disk.Press Enter Key to continue the Installation.

    The format Options will display.

    1. We have two types of format process.

    1. FAT (File Allocation Table) Type Format

    2. NTFS (New Technology File System).

    FAT was insecure and covering a lot of space during the data storage on hard

    disk, while the NTFS is only cover the actual data space on hard disk and very fast

    and secure system for creating the Directory Structure on Hard Disk.

    There are two methods provided to format the hard disk.

    1. Normally Format

    2. Quick Format

    If you are formatting you hard disk first time then use the normal format option and

    if your hard disk is already formatted before so use the quick format option and

  • 8/3/2019 MCSE Lessons

    7/55

    Bashir Ahmad Noori Presents 7

    click on Enter.

    The formatting will be started and after the formatting, the computer will copy the

    windows files to continue the installation it make a temporary folder transfer the

    files from CD the hard disk and then from hard disk to memory.

    After the transformation of the files, computer will restart and the GUI Setup

    Screen will display.

    A graphical screen with different controls like text box, like combo box and

    command buttons to perform an operation required by us is called a GUI Screen.

    In the TEXT Base Setup Screen, the Collecting of Information, Dynamic Updatesand Preparing Installation options are completed, now just the Installing window

    and Finalizing Installation option will completed in this screen with in 39 minutes.

    When the installation remaining time is 33, windows setup screen will display,

    Here you can set the language option, Click on Next command button, Then

    Screen

    Will ask the COMPUTER NAME and Organization Name type the names and Click

    on Next and then type the CD Key provided to you. This is the products key,

    Type the product key and clicks on next command button.

    WHAT IS NETWORKING?

    Networking is the way for transformation of information from one computer to

    other

    Computer by means of using the network mediums like, NIC (Network Interface

    Card), Modem (Modular De modular Device), Cables, Switch, Hub, Routers, B-

    routers, Bridges and VSAT technologies.

    Networking provides the principles and methods for this connectivity is called

    protocols.

  • 8/3/2019 MCSE Lessons

    8/55

    Bashir Ahmad Noori Presents 8

    A Protocol is a set of rule which is use to make the information identification during

    the transmission from one NIC to other NIC. So Every Network Card is a standard

    of IEEE (Institute of Electrical and Electronic Engineers). This institute is in USA

    which is responsible to test any new engineer device and after the satisfaction of

    the test the IEEE permit the manufacturer to release the copies of this device in

    the Market.

    The NIC standard is Ethernet. The minimum speed of transformation of information

    of this device is 10 mbps (Mega Bytes per seconds) and maximum is 100 mbps. If

    you NIC card or your connection showing the 100 mbps speed it means that

    connection is ok.

    How the information transfer from one computer to other computer?

    1. Every computer must contain a NIC card, and this card has a port, a port is the

    way of connecting the computer with the network mediums like cables. Each cable

    has a connector or jack for Local Network, we use commonly RJ45 (Register Jack

    45) or RJ11 (Register Jack 11) and we put these connectors to the port of one

    computer.

    2. Through the cables data will be transfer means send or receive,

    3. When we send a data from a network computer, the computer memory transfer

    the data into network card memory,

    4. Then network card uses the protocol according to the network connection, the

    data will be converted into small pieces, and these pieces are called data packets,

    and then these data packets are converted to electric signals, and when the

    receiver computer receive the information, the NIC card again convert the signals

    to the packets and the packets to the original form of data.

    5. In the old days the network was not so powerful and only a single method of

    networking was used, as the networking is developed in 1960s, and there was not

    switch or hub device so the method was peer to peer, means when they send the

  • 8/3/2019 MCSE Lessons

    9/55

    Bashir Ahmad Noori Presents 9

    information each computer receive the information, but now a days we transform

    the data indirectly by using the hub and switch type devices, that data transfer from

    NIC through Cables to the switch, and switch make analysis upon data that this

    data is related to which port and then it transfer to only specific computer.

    6. If we are sending data to other computer and that computer also busy to

    receive some other computer data, then our data will wait to send. And when the

    computers free the data will display.

    7. In the Windows Server Family, we have two methods for network connectivity.

    1. WORKGROUP

    2. DNS (DOMAIN NAME SERVICE) SERVER.

    We need the following devices to make the network.

    1. Peer to Peer Networking: Cables, connectors, NIC card and Computers

    crimpling Tools.

    2. Client/Server Networking: Cables, Hubs/Switches, Connectors, Cables, NIC

    Card, Crimpling Tools and Computers.

    1. LAN (Local Area Network)

    2. WAN (Wide Area Network)

    3. MAN (Metropolitan Area Networking).

    LAN (Local Area Network):

    The range of this network is within a building, and different rooms of the building

    will connected to different computers. One computer can handle all the clients

    computers and the entire client must work under the server or main computer.

  • 8/3/2019 MCSE Lessons

    10/55

    Bashir Ahmad Noori Presents 10

    Network cabling:

    What is network cabling?

    Cable is a medium through which information usually moves from one network

    device to another. There are several types of cable, which are commonly used with

    LANs. In some cases, a network will utilize only one type of cable, other networks

    will use a variety of cable type of cable for network is related to the networks

    topology, protocol and size. Understanding the characteristic of different types of

    cable and how they relate to other aspects of network is necessary for

    development of a successful network.

    The following sections discuss the types of cables used in network and other

    related topics.

    Unshielded Twisted pair (UTP) cable

    Shielded Twisted pair (STP) cable

    Coaxial cable

    Fiber optic cable

    Unshielded Twisted pair (UTP) cable:

    Twisted pair cabling comes in two varieties: shielded and unshielded.

    Unshielded twisted pair (UTP) is the most popular and is generally the best option

    for school networks (see fig .1)

    Figure 1.

    The quality of UTP may vary from telephone grade wire to extremely high speed

    cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with

    a different number of twists per inch to help eliminate interference from adjacent

    pair and other electrical devices. The tighter the twisting, the higher the supported

    transmission rate and the greater the cost per foot. The EIA/TIA (electronic

  • 8/3/2019 MCSE Lessons

    11/55

    Bashir Ahmad Noori Presents 11

    industry association /telecommunication industry association) has established of

    UTP and rated five category of wire.

    Type Use

    Category 1 Voice

    Category 2 Data to 4Mbps (local talk)

    Category 3 Data to 10Mbps ( Ethernet)Category 4 Datato20Mbps(16 Mbps token ring)

    Category 5 Data to 100 Mbps (fast Ethernet)

    Buy the best cable you can afford; most school purchase category 3 or category 5.

    if you are designing a 10 Mbps Ethernet network and are considering the cost

    saving of buying category 3 wire instead of category 5 , remember that the

    category 5 cable will provide more room to grow as transmission technologiesincrease. Both category 3 and category 5 UTP have a maximum segment length of

    100 meters. In Florida category 5 cable is required for retrofit grants. 10Base T

    refers to the specifications for unshielded twisted pair cable (category 3, 4 or 5)

    carrying Ethernet signals. Category 6 is relatively new and is used for gigabit

    connections.

    Unshielded Twisted pair connector:

    The standard connector for unshielded twisted pair cabling is an RJ-45 connector.

    This is a plastic connector that looks like a large telephone-style connector (see

    figure 2).

    A slot allows the RJ-45 to be inserted only one way RJ stand for registered jack ,

    implying that the connector follows a standard borrowed from the telephone

    industry . This standard designates which wire goes with each pin inside the

    connector.

    Figure 2.

    Shielded twisted pair (STP) cable:

  • 8/3/2019 MCSE Lessons

    12/55

    Bashir Ahmad Noori Presents 12

    A disadvantage of UTP is that it may be susceptible to radio and electrical

    frequency interference. Shielded twisted pair (STP) is suitable for environments

    with electrical interference; however, the extra shielding can make the cables quite

    bulky. Shielded twisted pair is often used on networks using Token Ring topology.

    Coaxial cable:

    Coaxial cabling has a single copper conductor at its center. A plastic layer provides

    insulation between the center conductor and braided metal shield (see figure .3).

    The metal shield helps to block any outside interference from fluorescent lights,

    motors, and other computers.

    Figure 3.

    Although coaxial cabling is difficult to install, it is highly resistant to signal

    interference. In addition, it can support greater cable lengths between network

    devices than twisted pair cable. The two types of coaxial cabling are thick coaxial

    and thin coaxial.

    Thin coaxial cable is also referred to as thin net.10Base 2 refers to the

    specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the

    approximate maximum segment length being 200 meters. In fact, the maximum

    segment length is 185 meters. Thin coaxial cable is popular in school networks,

    especially linear bus networks.

    Thick coaxial cable is also referred to as thick net. 10Base 5 refers to the

    specification for thick coaxial cable carrying Ethernet signals. The 5 refers to

    maximum segment length being 500 meters. Thick coaxial cable has an extra

    protective plastic cover that helps keep moisture away from the center conductor.

    This makes thick coaxial a great choice when running longer lengths in linear bus

    networks. One disadvantage of thick coaxial cable is that it does not bend easily

    and difficult to install.

  • 8/3/2019 MCSE Lessons

    13/55

    Bashir Ahmad Noori Presents 13

    Coaxial cable connector

    The most common type of connector used with coaxial cable is the bayone-neill-

    concelman (BNC) connector (see figure.4). Different type of adapters is available

    for BNC connector, including a T-connector, barrel connector, and terminator.

    Connectors on cable are the weakest points in any network. To help avoid

    problems with your network, always use the BNC connectors that crimp, rather

    than screw, onto the cable.

    Fiber optic cable:

    Fiber optic cabling consists of a center glass core surrounded by several layers of

    protective materials (see figure .5). it transmits light rather than electric signals

    eliminating the problem of electrical interference . This makes it ideal for certain

    environments that contain a large amount of electrical interference. it has also

    made it the standard networks between buildings , due to its immunity to the

    effects to moisture and lighting.

    Fiber optic cable has the ability to transmit signals over much longer distances

    than coaxial and twisted pair. It also has capability to carry information at vastly

    greater speeds. This capacity broadens communication possibilities to include

    services such as video conferencing and interactive services . this cost of fiber

    optic cabling is comparable to copper cabling however, it is more difficult to install

    and modify . 10BaseF refers to the specification for fiber optic cable carrying

    Ethernet signals.

  • 8/3/2019 MCSE Lessons

    14/55

    Bashir Ahmad Noori Presents 14

    Fact about fiber optic cables:

    Outer insulating jacket is made of Teflon or PVC.

    Kevlar fiber helps to strengthen the cable and prevent breakage.

    A plastic coating is used to cushion the fiber center.

    Center (core) is made of glass plastic fibers.

    Fiber optic connector:

    The most common connector used with fiber optic cable is an ST connector. It isbarrel shaped, similar to a BNC connector, a newer connector; the SC is becoming

    more popular. it has squared face and easier to connect in a confined space.

    Ethernet cable summary

    Specification Cable type Maximum length

    10BaseT Unshielded twisted pair 100 meters

    10Base2 Thin coaxial 185 meters

    10Base5 Thick coaxial 500 meters

    10BaseF Fiber optic 2000 meters

    100BaseT Unshielded twisted pair 100 meters

    100BaseTX Unshielded twisted pair 220 meters

    HOW TO MAKE YOUR OWN CAT 5 TWISTED-PAIR NETWORK CABLES

    INTRODUCTION. The purpose of this article is to show you how to make the two

    kinds of cables which can be used to network two or more computers together to

    form quick and simple home or small office local area networks (LANs). These

  • 8/3/2019 MCSE Lessons

    15/55

    Bashir Ahmad Noori Presents 15

    instructions can also be used to make patch cables for networks with more

    complex infrastructure wiring.

    The two most common unshielded twisted-pair (UTP) network standards are the10

    MHz 10BASE-T Ethernet and the 100Mhz 100BASE-TX Fast Ethernet. The

    100BASE-TX standard is quickly becoming the predominant LAN standard. If you

    are starting from scratch, to build a small home or office network, this is clearly the

    standard you should choose. This article will show you how

    to make cables, which will work with both standards.

    LANS SIMPLIFIED. A LAN can be as simple as two

    computers, each having a network interface card (NIC) or

    network adapter and running network software, connected

    together with a crossover cable.

    The next step up would be a network consisting of three or more computers and a

    hub. Each of the computers is plugged into the hub with astraight-thru cable

    (the crossover function is performed by the hub).

    NETWORK CABLE AND CONNECTORS

    There are several classifications of cable used for twisted-pair networks. I'll skip

    right over them and state that I use and recommend Category 5 (or CAT 5)

    cable for all new installations. Likewise, there are several fire code

    classifications for the outer insulation of CAT 5 cable. I use CMR cable, or

    "riser cable," for most of the wiring I do. You should also be aware of CMP or

    plenum cable (a plenum is used to distribute air in a building). You may be

    required by local, state or national codes to use the more expensive plenum-

    jacketed cable if it runs through suspended ceilings, ducts, or other areas, if they

  • 8/3/2019 MCSE Lessons

    16/55

    Bashir Ahmad Noori Presents 16

    are used to circulate air or act as an air passage from one room to another. If in

    doubt, use plenum. CMR cable is generally acceptable for all applications not

    requiring plenum cable.

    CAT 5 wire is available in reel-in-box packaging. This is very handy for pulling the

    wire without putting twists in it. Without this kind of package or a cable reel stand,

    pulling wire is a two-person job. Before the advent of the reel-in-box, we used to

    put a reel of wire on a broom handle to pull it. One person would hold the broom

    handle and the other would pull and measure the cable. You will produce a

    tangled mess, if you pull the wire off the end of the reel.

    Stranded wire patch cables are often specified for cable segments running from a

    wall jack to a PC and for patch panels. They are more flexible than solid core

    wire. However, the rational for using it is that the constant flexing of patch cables

    may wear-out solid core cable--break it. I do not think this is a real concern in the

    average small network. For example, I have one solid core cable going to my

    work bench. It has probably flexed and average person's lifetime of flexes from

    the many times I have connected customer computers to my network. Also,

    stranded cable is susceptible to degradation from moisture infiltration, may use an

    alternate color code, and should not be used for cables longer than 3 Meters

    (about 10 feet).

    Most of the wiring I do simply connects computers directly to other computers or

    hubs. Solid core cable is quite suitable for this purpose and for many home and

    small business networks. I find it also quite acceptable for use as patch cables.

    You might consider stranded wire patch cables if you have a notebook computer

    you are constantly moving around.

    CAT 5 cable has four twisted pairs of wire for eight individually insulated wires.

    Each pair is color coded with one wire having a solid color (blue, orange, green, or

    brown) twisted around a second wire with a white background and a stripe of the

    same color. The solid colors may have a white stripe in some cables. Cable

  • 8/3/2019 MCSE Lessons

    17/55

    Bashir Ahmad Noori Presents 17

    colors are commonly described using the background color followed by the color of

    the stripe; e.g., white-orange is a cable with a white background and an orange

    stripe.

    CONNECTORS. The straight through and crossover patch cables

    discussed in this article are terminated with CAT 5 RJ-45 modular

    plugs. RJ-45 plugs are similar to those you will see on the end of

    your telephone cable except they have eight versus four or six

    contacts on the end of the plug and they are about twice as big. Make sure they

    are rated for CAT 5 wiring. (RJ means "Registered Jack"). In addition, there are

    RJ-45 plugs designed for both solid core wire and stranded wire. Others are

    designed specifically for one kind of wire or the other. Be sure you buy plugs

    appropriate for the wire you are going to use. I use plugs designed to

    accommodate both kinds of wire.

    COLOR-CODE STANDARDS

    Again, please bear with me... Let us start with simple pin-out diagrams of the two

    types of UTP Ethernet cables and watch how committees can make a can of

    worms out of them. Here are the diagrams:

    Note that the TX (transmitter) pins are connected to corresponding RX (receiver)

    pins, plus to plus and minus to minus. And that you must use a crossover cable to

  • 8/3/2019 MCSE Lessons

    18/55

    Bashir Ahmad Noori Presents 18

    connect units with identical interfaces. If you use a straight-through cable, one of

    the two units must, in effect, perform the cross-over function.

    Two wire color-code standards apply: EIA/TIA 568A and EIA/TIA 568B.The codes

    are commonly depicted with RJ-45 jacks as follows (the view is from the front of

    the jacks):

    If we apply the 568A color code and show all eight wires, our pin-out looks like:

    this.

    Note that pins 4, 5, 7, and 8 and the blue and brown pairs are not used in either

    standard. Quite contrary to what you may read elsewhere, these pins and wires

    are not used or required to implement 100BASE-TX duple Xing--they are just plain

    wasted.

    However, the actual cables are not physically that simple. In the diagrams, the

    orange pair of wires are not adjacent. The blue pair is upside-down. The right

    ends match RJ-45 jacks and the left ends do

    not. If, for example, we invert the left side of

    the 568A "straight"-thru cable to match a

    568A jack--put one 180 twist in the entire

  • 8/3/2019 MCSE Lessons

    19/55

    Bashir Ahmad Noori Presents 19

    cable from end-to-end--and twist together and rearrange the appropriate pairs, we

    get the following can-of-worms:

    This further emphasizes, I hope, the importance of the word "twist" in making

    network cables which will work. You cannot use a flat-untwisted telephone cable

    for a network cable. Furthermore, you must use a pair of twisted wires to connect

    a set of transmitter pins to their corresponding receiver pins. You cannot use a

    wire from one pair and another wire from a different pair.

    Keeping the above principles in mind, we can simplify the diagram for a 568A

    straight-thru cable by untwisting the wires, except the 180 twist in the entire

    cable, and bending the ends upward. Likewise, if we exchange the green and

    orange pairs in the 568A diagram we will get a simplified diagram for a 568B

    straight-thru cable. If we cross the

    green and orange pairs in the 568A

    diagram, we will arrive at a simplified

    diagram for a crossover cable. All three

    are shown below.

    LET'S MAKE IT SIMPLE

    There are only two unique cable ends in the

    preceding diagrams. They correspond to the

    568A and 568B RJ-45 jacks and are shown to the

    right.

    Again, the wires with colored backgrounds may

    have white stripes and may be denoted that way in diagrams found elsewhere.

  • 8/3/2019 MCSE Lessons

    20/55

    Bashir Ahmad Noori Presents 20

    For example, the green wire may be labeled Green-White--I do not bother. The

    background color is always specified first.

    Now, all you need to remember, to properly configure the cables, are the diagrams

    for the two cable ends and the following rules:

    A straight-thru cable has identical ends.

    A crossover cable has different ends.

    It makes no functional difference which standard you use for a straight-thru cable.

    You can start a crossover cable with either standard as long as the other end is the

    other standard. It makes no functional difference which end is which. Despite

    what you may have read elsewhere, a 568A patch cable will work in a network with

    568B wiring and 568B patch cable will work in a 568A network. The electrons

    couldn't care less.

    My preference is to use the 568A standard for straight-thru cables and to start

    crossover cables with a 568A end. That way all I have to remember is the diagram

    for the 568A end, that a straight-thru cable has two of them, and that the green and

    orange pairs are swapped at the other end of a crossover cable.

    LET'S MAKE SOME CABLES

    1. Pull the cable off the reel to the desired length and cut. I have a box of cable at

    one end of my shop and a mark on the floor 10' away. For cable lengths,

    which are a fraction of ten feet, I eyeball the length as I pull the cable out

    of the box (also, my feet are about one foot long). For longer cables, I pull

    it out to the ten-foot mark, go back to the box, and pull the remaining

    fraction or another ten

  • 8/3/2019 MCSE Lessons

    21/55

  • 8/3/2019 MCSE Lessons

    22/55

    Bashir Ahmad Noori Presents 22

    RJ-45 plug is crimped on.. Flatten again. There should be little or no space

    between the wires.

    6. Hold the RJ-45 plug with the clip facing down or away from you. Push the wire

    firmly into the plug. Now, inspect the darn thing... before crimping and

    wasting the plug! Looking through the bottom of the plug, the wire on the far left

    side will have a white background. The wires should alternate light and dark from

    left to right. The furthest right wire is brown. The wires should all end evenly at

    the front of the plug. The jacket should end just about, where you see it in the

    diagram--right on the line. Aren't you glad you did not crimp the plug?

    Network technology point to-point data links

    These are the most basic data communications links. Ex:

    Virtually all computers support such data links, using

    their so-called serial ports. Typically, these ports areable to operate at any standard bit rate between 300 bps and 230400bps.

    The most common hardware interface standard used in such data links is called

    RS232. In fact, a connection may be direct or may use a modem.

    Modems

    A modem allows a point-to-point data link to be carried over the analog telephonesystem (PSTN, also called POTS, or plain old telephone system), thus:

    The modem can:

  • 8/3/2019 MCSE Lessons

    23/55

    Bashir Ahmad Noori Presents 23

    Dial the telephone number of another modem under the program control, or

    answer the phone.

    Negotiate a connection at the highest common bit rate that each modem can

    support

    Perform on the fly data compression

    Perform (under some conditions) error detection and correction.

    How to make cross cable or p2p cable:

    With cat 5 cables we can easily make a cross cable, cross cable is used for

    interconnecting of two pc with windows 98/me/xp or other windows. here are show

    the ranging of color below:

    The first side of the cable:

    White orange, orange

    White green, blue

    White blue, green

    White brown , brown

    On the other side of the cable:

    White green , green

    White orange , blue

    White blue , orange

    White brown , brown

    What is protocol?

  • 8/3/2019 MCSE Lessons

    24/55

    Bashir Ahmad Noori Presents 24

    Networking Protocols: A Protocol is a rule, method, or principle, which uses the

    Network Interface card to transfer the data from one computer to other computer.

    The two computers, which are connected with each other, must have same or

    compatible protocol. The most common protocol for LAN (Local Area Network)

    System connectivity is TCP/IP (Transmission Control Protocol) / Internet Protocol,

    which is the standard by IEEE Institute of Electronics and Electrical Engineering.

    The protocol provides an address to connect form one computer to other, and this

    address is called IP Address (Internet Protocol) address, so the IP address are

    always unique. Different ways are provided to set the IP Address the most

    common use is the manually or using DHCP (Dynamic Host ConfigurationProtocol) Server. The DHCP Server provides and automatic IP address inside the

    networking zone.

    Normally in a small network, we can manually or through the remote desktop

    facility change the IP Address.

    Every thing we can access from a network possible through the IP address.

    What is IP (internet protocol) address?

    The data transformation is depending upon the protocol, which are the rules and principles

    we define to make a same environment for the sender and receiver computer. If the twocomputers are using the different protocols then the data transmission is not possible by

    simple ways. The main protocol for wan and LAN type networks are called TCP/IP,

    Transmission Control protocol/ Internet protocol. These protocols generate the unique

    address to access the computer or make the communication between the computers. These

    IP address are divided into three categories

  • 8/3/2019 MCSE Lessons

    25/55

    Bashir Ahmad Noori Presents 25

    Class A Addresses: 127.0.0.0 (satellite connection) or ISP (MAN)

    Class B addresses: 128.0.0.0 (ISP) Internet Service Provider Company (MAN)

    Class C Addresses: 192.0.0.0 (LAN and WAN)

    Step1: Create the cross through cable and connect its one end to computer NIC port and

    second to the switch or hub port.

    Then we will set the IP addresses for both computers.

    1. On the Desktop double click on the My Network Places Folder

    2. Click on View Network Connections

    3. The connection will display if you see a lock on the connection turn off the windows

    firewall option from the control pane.

    4. right mouse click on the connection and click on properties

    5. Select the Internet protocol TCP/IP

    6. Click on Properties command button

    7. and check on use the following IP address

    8. In the IP address type your IP address

    9. In the Subnet mask computer will display the end range of that IP address.

    10.Click on OK

    11.Click on OK

    12.the IP Address will be set

    13.Now to check the Internet protocol configuration use the (IPCONFIG) for short

    configuration, and if you are using the domain controller then you can see detail

    information like you domain name, IP address the subnet and so on.

  • 8/3/2019 MCSE Lessons

    26/55

    Bashir Ahmad Noori Presents 26

    14. In the run command type CMD

    15. type (IPCONFIG) or (IPCONFIG/ALL)

    16. If we want to check the connection of other computer with this computer, we will

    use the ping command.

    17.If the domain is installed in our computer then we use the (NSLOOKUP) command

    What is workgroup and how to make it?

    Work Group is a small type LAN Network not support much computers, and the

    security option of the work group computer is not much higher then a Windows server

    2003 operating system.

    We can add the clients to our workgroup computer.

    1. Move to the client computer

    2. Right mouse click on the My Computer Folder

    3. Click on Properties

    4. and select the computer name tab

    5. click on change command button

    6. and type the same name of the workgroup you set it in the server computer

    7. click on ok

    8. then restart the computer

    9. After log on it will be added to the server and the server will added to the client.

    If we want to open the other computer link, we must know the user name and the password

    of that computer.

    How to check list of computer connected in the workgroup?

    In the My Network Places folder double

  • 8/3/2019 MCSE Lessons

    27/55

    Bashir Ahmad Noori Presents 27

    Click on View workgroup Computer

    Centralized vs. Client/Server Computing

    early networks were based on the centralized-computing model. Usually, in these

    networks, one large server (a mainframe computer) handled all aspects of the

    network, while each user accessed the main server from a terminal. Because the

    centralized computer handled all the high-level computing chores, the terminals

    were typically inexpensive, low-performance computers. Today, thanks to

    improvements stemming from the rapid evolution of the personal computer, the old

    centralized model is being replaced with the client/server model. Today's users

    have the full power of a mainframe computer at their fingertips, with the added

    advantage of an interconnected network.

    Centralized Computing

    In the traditional mainframe environment, an application such as a database runs

    on a large and powerful centralized mainframe computer and is accessed by

    terminals. The terminal sends a request for information to the mainframe

    computer; the mainframe retrieves the information and then displays it on the

    terminal.

    The entire database travels from the server across the network and is downloaded

    to the client that made the request. The file access takes place through the

    network operating system (NOS) and the cable. There is very little coordination

    between the terminal and the mainframe. The data is processed on the mainframe

    and then delivered to the terminal. The data transfer between the terminal and the

    mainframe increases network traffic and slows down requests from other

    terminals.

    Client/Server computing

    the term "client/server computing" refers to the process by which data processing

    chores are shared between the client computer and the more powerful server

    computer. Figure 8.9 shows a simple client/server network with one server, three

    clients, and a printer.

  • 8/3/2019 MCSE Lessons

    28/55

    Bashir Ahmad Noori Presents 28

    The client/server approach can benefit any organization in which many people

    need continual access to large amounts of data.

    The client/server network is the most efficient way to provide:

    Database access and management for applications such as spreadsheets,

    accounting, communications, and document management.

  • 8/3/2019 MCSE Lessons

    29/55

    Bashir Ahmad Noori Presents 29

    Network management.

    Centralized file storage.

    Client/Server-Model Overview

    Most networks operate in the client/server model, also referred to as "server-based

    networking." A client workstation makes a request for data that is stored on a

    server. The client workstation processes the data using its own CPU. Data-

    processing results can then be stored on the server for future use. The data can

    also be stored on the client workstation and accessed by other client workstations

    on the network. In peer-to-peer networks, where there is no central server, each

    client workstation acts as both client and server.

    The Client

    The user generates a request at the front end. The client runs an application that:

    Presents an interface to the user.

    Formats requests for data.

    Displays data it receives from the server.

    In a client/server environment, the server does not contain the user-interface

    software. The client is responsible for presenting the data in a usable form. The

    user enters instructions from the client computer. The client computer prepares the

    input for the server. The client computer sends a request for specific information

    across the network to the server. The server processes the request, locatesthe appropriate information, and sends it back across the network to the client. The

    client computer then feeds the information to the interface, which presents the

    information to the user. The client computer can also process the information

    further, using its own CPU and software.

    The Server

  • 8/3/2019 MCSE Lessons

    30/55

    Bashir Ahmad Noori Presents 30

    The server in a client/server environment is usually dedicated to storing and

    managing data. This is where most of the actual database activity occurs. The

    server is also referred to as the back end of the client/server model because it

    fulfills the requests of the client. The server receives the structured requests from

    the clients, processes them, and sends the requested information back over the

    network to the client.The database software on the file server reacts to client

    queries by running searches. As part of a client/server system, it returns only the

    results of the searches.Back-end processing include sorting data, extracting the

    requested data, and sending that data back to the user.

    Additionally, database server software manages the data in a database including:

    Updates.

    Deletions.

    Additions.

    Security.

    Stored Procedures

    Stored procedures are short, prewritten data-processing routines that help with

    data-processing details. The procedures are stored in the server and can be used

    by any client. Stored procedures help process data. One stored procedure can be

    used by any number of clients, thus avoiding the need to incorporate the same

    routine into the code of each program.

    These stored procedures:

    Perform some of the processing usually performed by the client.

    Reduce network traffic, because a single call from the client to the server

    can begin a series of stored procedures that otherwise would require several

    requests.

  • 8/3/2019 MCSE Lessons

    31/55

    Bashir Ahmad Noori Presents 31

    Can include security controls to prevent unauthorized users from running some of

    the procedures.

    Server Hardware

    The server computers in a typical client/server environment should be morepowerful and faster than the client computers. In addition to a high-speed

    processor, these computers need lots of RAM and plenty of hard-drive space.

    These computers must be able to handle:

    Multiple requests.

    Security.

    Network management tasks.

    Any organization that implements a client/server network should use dedicated

    servers to handle the back-end functions.

    Client/Server Architecture

    There are several possible client/server arrangements. In the two primary

    arrangements, illustrated in Figure 8.11:

    The data can be placed on a single server.

    The data can be distributed across several database servers. The locations of the

    servers depend on the locations of the users and the nature of the data.

  • 8/3/2019 MCSE Lessons

    32/55

    Bashir Ahmad Noori Presents 32

  • 8/3/2019 MCSE Lessons

    33/55

    Bashir Ahmad Noori Presents 33

    Servers over a WAN periodically synchronize their databases to ensure that they

    all have the same data. A data warehouse stores large volumes of data and

    forwards the most sought-after data to an intermediate system that is able to

    format the data into its most requested form. This offloads some of the data

    processing from the main server to other servers.

  • 8/3/2019 MCSE Lessons

    34/55

    Bashir Ahmad Noori Presents 34

    Advantages of Working in a Client/Server Environment

    Client/server technology creates a powerful environment that offers many real

    benefits to organizations. A well-planned client/server system provides relatively

    inexpensive networks. These systems provide mainframe-computing capacity

    while allowing easy customization for specific applications. Because client/server

    processing sends only the results of a query across the network, it cuts down on

    network traffic. Client/server computing uses a powerful server to store data. The

    client workstation can process some or all of the requested data. On a busy

    network, this means that the processing will be distributed more efficiently than in a

    traditional mainframe-based system. Because the file services and the data are on

    the back-end server, the servers are easier to secure and maintain in one location.

    Data is more secure in a client/server environment because it can be placed in a

    secure area away from users. The data is also more secure when Windows NT

  • 8/3/2019 MCSE Lessons

    35/55

    Bashir Ahmad Noori Presents 35

    Server-based security is used to prevent unauthorized access to files. When the

    data is stored in a limited number of locations and managed by one authority,

    backups are simplified.

    Lesson Summary

    The following points summarize the main elements of this lesson:

    The client/server model has several advantages over a centralized network;

    for example, in this model, tasks are divided between client and server, resulting in

    a more efficient network. Client/server networks can be arranged in two ways: data

    can be stored on a single server or distributed across several servers.

    Client/server networks commonly use structured query language (SQL) fordatabase management. In a client/server network, the client, or front end, is

    responsible for presenting data in a useful form and for writing reports; the server,

    or back end, is responsible for storing and managing the data. Client/server

    networks can be arranged in two ways: data can be stored on a single server or

    distributed across several servers.

    A driver (sometimes called a device driver) is software that enables a computer

    to work with a particular device. Although a device might be installed on a

    computer, the computer's operating system cannot communicate with the device

    until the driver for that device has been installed and configured. It is the software

    driver that tells the computer how to work with the device so that the device can

    perform its job.

    There are drivers for nearly every type of computer device and peripheral

    including:

    Input devices, such as mouse devices.

    Hard and floppy disk drives and controllers.

    Multimedia devices, such as microphones, cameras, and recorders, NICs. Printers

    Plotters, and tape drives.

  • 8/3/2019 MCSE Lessons

    36/55

    Bashir Ahmad Noori Presents 36

    Usually, the computer is operating system works with the driver to make the device

    perform. Printers provide a good illustration of how drivers are used. Printers built

    by different manufacturers have different features and functions. It is impossible for

    computer and operating-system manufacturers to equip new computers with all the

    software required to identify and work with every type of printer. Instead, printer

    manufacturers make drivers available for each of their printers. Before your

    computer can send documents to a printer, you must install, or load, the drivers for

    that printer so that your computer will be able to communicate with it.

    Generally, manufacturers of components, such as peripherals or cards that must

    be physically installed, are responsible for supplying the drivers for theirequipment. For example, NIC manufacturers are responsible for making drivers

    available for their cards. Drivers are usually included on a disk that accompanies

    computer equipment when it is purchased. Drivers can also be downloaded from a

    service such as The Microsoft Network (MSN), CompuServe, or the manufacturer's

    Internet site or bulletin board.

    The Network Environment

    Network drivers provide communication between a NIC and the network redirector

    running in the computer. (The redirector is part of the networking software that

    accepts input/output (I/O) requests for remote files and then sends, or redirects,

    them over the network to another computer

    Drivers and the OSI Reference Model

    NIC drivers reside in the Media Access Control sub layer of the data-link layer of

    the OSI Reference Model. The Media Access Control sub layer is responsible for

    providing shared access for the computer's NICs to the physical layer. In other

    words, the NIC drivers ensure direct communication between the computer and

    the NIC. This, in turn, establishes a link between the computer and the rest of the

    network.

  • 8/3/2019 MCSE Lessons

    37/55

    Bashir Ahmad Noori Presents 37

    Chapter Summary

    The following points summarize the key concepts of this chapter:

    Choosing a Network Design

    The first step in network design is to decide whether the network will be peer-to-

    peer or server-based.

    Take a detailed inventory of all the available networking hardware, software, and

    telecommunications equipment on hand before recommending any equipment

    purchases for a new LAN. Create a map of the facility layout and the network

    (logical and physical) as the beginning of your network-documentation package.

    Installing network media is difficult, and complex configurations requirea professional installer. Basic installations can be accomplished without

    professional assistance. By knowing the specifics of each piece of hardware that

    will be on the network, you can map a network design and foresee potential

    problems.

    Addressing potential problems before implementing the network can save time and

    expense.

    Establishing a Client/Server Environment

    The client/server model has several advantages over a centralized network; in this

    model, tasks are divided between client and server, resulting in a more efficient

    network. Client/server networks can be arranged in two ways: the data can be on a

    single server or distributed across many servers.

    Client/server networks commonly use structured query language (SQL) for

    database management.

    In a client/server network, the client, or front end, is responsible for presenting data

    in a useful form and for writing reports; the server, or back end, is responsible for

    storing and managing the data. Client/server networks can be arranged in two

    ways: data can be stored on a single server or distributed across several servers.

  • 8/3/2019 MCSE Lessons

    38/55

    Bashir Ahmad Noori Presents 38

    How to make a user Account:

    Select the My Computer Folder

    Right mouse click on it

    Click on manage option

    Move Local Users and Groups

    In the List view portion

    Double Click to turn on the users

    Right mouse click on the screen and click on New User

    In the User Name Box type the Name of the User, you want to create

  • 8/3/2019 MCSE Lessons

    39/55

    Bashir Ahmad Noori Presents 39

    In the Full Name if you want to type a detail user name then type the full

    name

    In the description type the details about the account

    in the password set a password to the user

    in confirm password again type the password

    User Must Change password at first logon, means that when we log on the

    user computer asks to change the password, if you want to fix the given

    password then check off this option

    In the user Can Not change the password, it means that user has no

    permission to change its password this user will work under the administrator

    account and only the administrator is responsible to make change in the user

    password.

    We have local Account Policies in which the password expiry date is

    mentioned if password is expired then we type a new password by entering

    the old password.

    If check on this Option that password never expires then until our windows

    work computer will not asks for a new password or the password will notexpires.

    Account is disable if we check on this option then we can not log on the

    account until we check off this option

    We apply different permission in the above window to handle a user account,

    A user account is differ from a domain account

    Because the Server Security Structure is more power full than the XP

    windows hence the user account are protected and given in the Computer

    management option, as the control panel of the windows XP is very weak

    when a virus comes to computer it can destroy the accounts and the control

    panel folders, therefore, in server the virus cannot affect the internal process,

    the computer management process is an internal process where virus can

    not access or a hacker can not enter with out a security permission.

  • 8/3/2019 MCSE Lessons

    40/55

    Bashir Ahmad Noori Presents 40

    We can also rename and delete the accounts, listed in the user account

    section, by right mouse clicking on an account and click on delete then click

    on yes to confirm the deletion the account will be deleted.

    To rename an account right mouse click on it and click on rename type the

    new name for the account the name will be given to that user.

    In server windows every thing is in manage form. That we create a schedule

    for doing some thing and our work will be in an organize position so every

    thing is connected to its concern topic.

    1. There are the local computer users and there are the network users. The

    Network Users we can connect using the Remote Desktop or through a

    Domain Controller.2. Or we can create the clients account in the server and then we can

    implement these accounts on clients computer.

    In a Workgroup System when we talk about the Client / Server the client are

    fully under control by the server computers and the server computer canhandle all the user management activities from remote.

    Group Policies:

    A group Policy is rule, role, or method we apply on both the local computer and the

    network computer deny or access permission for these computer. In both Windows

    XP and Windows Server the command to access the group policies are same

    Gpedit.msc

    (Gpedit means Group Policy Editor and (msc means Microsoft System Console)

    Console is a window in which we perform different operation.

    We can implement the group policy for Local computer and for a network

    computer.

  • 8/3/2019 MCSE Lessons

    41/55

    Bashir Ahmad Noori Presents 41

    In the Start Menu In run command type Gpedit.msc and press enter

    A group policy is use to turn on or off a property of windows.

    When the group policy editor will display you will see a main folder with the

    name of local computer policies

    This folder contains two sub folder

    a. Computer configuration Folder

    b. User Configuration Folder

    The Computer Configuration Folder will be used by the Hard Ware Engineers

    to set the hard ware policies installed in the computer.

    The user configuration will be used by a network person to implement

    different rules and methods on the software side like on operating system

    Each User and Computer configuration folder contains three sub folder

    Software Settings

    Window Components

    Administrative Templates.

    Administrative Templates in the User configuration Folder.

    Administrative means perform the Admin work of windows XP or Windows Server,

    the Administrative work of the windows XP or Windows Server are related with its

    Desktop

    Control Panel

    User Accounts

    Task Bar and Start Menu

    Shared Folder

    Network

    System

    Windows components.

    What is the control panel of the windows XP or Server?

  • 8/3/2019 MCSE Lessons

    42/55

    Bashir Ahmad Noori Presents 42

    When we see the Windows folder structure we have two types of folders in

    windows, User define folder, and system folders

    A control panel is the combination of different system folders, which are related,

    with separate process of the devices attached with the computer. We can control

    the activities or change the activities of different devices or process like Server by

    using the control panel. There are different folders provided for different works.

    Accessibility Wizard Folder

    Add/Remove Program

    Add New Hard Ware

    Display Folder

    Key board

    Folder Options folder

    Mouse Folder

    Network Folder

    Regional and Language Settings Folder

    Administrative Tools Folder

    Sound Folder

    Printer and Faxes Folder

    Scanner and Camera

    Task bar and Start Menu Folder

    Licensing Folder

    Internet option Folder

    User Account Activities

    System Folder

  • 8/3/2019 MCSE Lessons

    43/55

    Bashir Ahmad Noori Presents 43

    Automatic Update Folder

    Date Time Folder

    Game Controller

    Fonts folder

    Mail Folder

    Portable Media Devices

    Phone and Modem Folder

    Schedule Task Folder

    Power Option Folder

    Speech folder

    The above folders are standard folders of the control panel.

    General Group policies of Control Panel:

    These policies we generally apply directly to the overall control panel folder and the

    specified control panel folders. Every group policy has three properties, Not Configure,

    Enable and Disable. The Not configure means not implemented and disable means

    implemented but not yet. Enable means that implemented.

    1. Prohibit Access to the control panel

    With the help of this policy we can lock our control panel and one can not be able to access

    the control panel.

    In the Start Menu

    Move to Run command

    type Gpedit.msc

    Move User configuration

    click on Administrative template folder

    Click on the control panel

    Double click prohibit access to control panel

  • 8/3/2019 MCSE Lessons

    44/55

    Bashir Ahmad Noori Presents 44

    Set it enable

    Click on Apply

    Click on OK

    close the gpeditor window

    refresh on desktop

    Now access the control panel the control panel will be lock.

    To unlock the control panel in the same process set the policy property to not configure.

    2. To Hide Specified items on the control panel

    By using these properties, we can hide the folders of the control panel according to our

    own choice.

    In the start Menu

    Move to Run command

    type Gpedit.msc

    Move to user configuration

    click on administrative templates

    click on control panel

    double click on To Hide specified items on the control panel

    Set the policy to enable

    Click on Show button

    Click on Add Command button and type the name of folders to hide

    click on ok

    Click on apply

    click on ok

  • 8/3/2019 MCSE Lessons

    45/55

    Bashir Ahmad Noori Presents 45

    close the gpeditor

    Refresh the desktop, open the control panel, and check the result.

    To unhide the folder use to not configure.

    3. Show Only specified control panel applets

    If we want to display only those folders, which we set in the policy in control panel, then

    we apply then policy to enable.

    Click on Start Menu

    Move to run command

    type Gpedit.msc

    move to user configuration folder

    click on administrative template

    Click on control panel

    Click on Show command button

    Click on Add command button

    type the name of the folders which you want to display

    click on ok

    click apply

    click on ok

    Refresh the desktop and open the control panel only the selected folders will display

    other folders will be hidden.

    Force Classic Control Panel Style

  • 8/3/2019 MCSE Lessons

    46/55

    Bashir Ahmad Noori Presents 46

    We have to two types of the view of the control panel.

    Category View in which we have link to open the folders

    Classic View in which the folder listing display.

    If we enable this policy then computer will only display the classic view of the control

    panel.

    Click on Start Menu

    Move to Run command

    in the run command type Gpedit.msc

    move to user configuration

    Click on Administrative template

    click on control panel

    Double click on Force Classic Control Panel Style

    Set it enable

    click on apply

    click on ok

    refresh the desktop

  • 8/3/2019 MCSE Lessons

    47/55

    Bashir Ahmad Noori Presents 47

    Group policies remain and will write latter

  • 8/3/2019 MCSE Lessons

    48/55

    Bashir Ahmad Noori Presents 48

    Domain \DNS (Domain Name Service \Server)

    A domain type network is providing fully control on the clients computer and use to setup

    its own client from a network to other network by using the networking services

    component of the windows. Domain type network is very useful for the Internet and the

    LAN (Local Area Networking) that the client is completely under the server computer and

    the domain is used because of this powerful security purpose.

    There are following four levels of domain

    .com

    .org .edu .af

    (.Com) is the commercial domain

    (.org) is under the .com

    (.edu) is under the .com

    (.af) is under the .com

    www.abc.af

    How to make a Domain?

    1. First you install the Server 2003 windows in your computer

    2. Then we have to add the following components from the add/remove program folder

    of the control panel, Windows components tab.

    a. Application Server: This component contains the Internet Information

    Server, Network DTC Com+ Object and Application Server console

    b. Insert the Server 2003 CD in the Drive

    c. Open the Control Panel

    d. Open the Add/Remove Programs Folder

    http://www.abc.af/http://www.abc.af/
  • 8/3/2019 MCSE Lessons

    49/55

    Bashir Ahmad Noori Presents 49

    e. Click on Add/Remove Windows components

    f. Check on following components

    i. Application Server

    ii. Management and Monitoring Tools

    iii. Networking Services

    iv. Click on Next to install the components.

    The folders will be added to your administrative tools folder of control panel after the

    installation.

    How to install Domain & Active Directory Services?

    An Active Directory is a special Database for the Network Server and Client information

    Accounts. It uses a Forest System and in this system all the domain and client accountsexists. We can install the active directory database by using the Server 2003 system.

    Click on Start Menu

    in the Run command Type DCPROMO ( Directory Console Promotion )

    The Active directory wizard screen will be started

    click on next command button

    In the operating system security information screen click on next command button

    In the domain controller type screen you will see two option

    o Domain Controller for a new Domain means that if your computer is installing

    this domain first then it will be a new domain

    o Additional Domain Controller for an existing Domain means that we have

    already a domain in this computer or some other computer which will be our

    main domain and our computer will work under that domain as a child domain

    Select the first option That Domain Controller For a New Domain

    Click on Next command button

    Create a New Domain Screen will display which contains the following three

    options

  • 8/3/2019 MCSE Lessons

    50/55

    Bashir Ahmad Noori Presents 50

    o Domain in a New Forest means that if we are newly installing the domain in

    our computer as an independent domain then select first option

    o Child Domain in an existing forest means that if we already have a domain or

    domains in the forest in the same computer or other computer then we will

    select this option

    o Domain Tree in an Existing forest means that we do not want to work under

    any domain of this computer and we want to install another independent

    domain so select this option

    Select the Domain in New Forest and click on Next

    New Domain Name Screen will be display

    Here type your full domain Like Ariana.com and click on next command button

    The NetBIOS ( Networking Basic Input Output System) screen will display asks for

    the NetBIOS Name leave the name as it is and click on next command button

    The Database and Log Folder Screen will display the Database Folder will be

    C:\Windows\NTDS and the log files folder will be the same name click on next

    command button

    The Shared System Volume screen will display this screen means that whenever anyother computer access the domain it send a copy of the domain to that computer.

    Click on Next command button

    The DNS Registration Diagnostics Screen will Display which contains the following

    three options

    I corrected the problem perform the Diagnostic Test Again Leave this options

    Install and configure the DNS in this computer select this option I correct the problem late and configure the DNS manually leave this option

    Click on next command button

    The Permissions Screen will display, which contains the two options

    one for windows 2000 do not select for 2003

  • 8/3/2019 MCSE Lessons

    51/55

    Bashir Ahmad Noori Presents 51

    second for windows 2000 and windows 2003 server select this option and click on

    next command button

    Directory Service Restore Mode Administration Password screen will display type a

    password and confirm it and click on next command button

    Click on Next and Click on Next the Installation will be Started.

    How to make client Accounts?

    First, check the connection between the Server and the Client Computer by applying

    the Ping command in the run.

    Move to Client computer and set the server domain and IP to link the client

    computer with the server computer.

    In the Client computer in the My Computer right mouse click

    Click on properties

    My Computer Properties will display

    Select Computer Name Tab

    Click on Change command button

    Select Domain Option

    Write the server domain name like ariana

    Click on ok

    Computer will asks the server user name and password type the server user name

    like administrator and password

    Click on ok

    After some time you will receive a message welcome to Ariana Domain.

    Then Restart your computer.

    Now after restarting the computer

    Go to client computer and do these actions.

    Select the my network places folder in the client computer

    Right mouse click on it

    Click on properties

  • 8/3/2019 MCSE Lessons

    52/55

    Bashir Ahmad Noori Presents 52

    The network connection will display

    Right mouse click on the connection

    Click on properties

    Select the TCP /IP protocol

    Click on properties command button

    In the Preferred DNS type the server computer IP like 192.168.0.10

    Click on ok

    Click on close.

    If we do not give this the Server IP in the client computer, it takes a long time to log

    on.

    Come back to the Server computer.

    In the Server Computer

    Open the control panel

    And open the administrative tools folder

    Open the Active Directory Users and Computer folder

    Click on Computer and check the client computer Name the Client computer will be

    link with the server computer.

    After the making and checking of connection between server computer and client

    computer, we can create a client by doing these actions.

    Before creating a client account

    In the administrative tools folder of the computer double click on dns folder and

    open it

    We have two options in this folder

    Forward lookup zones and reverse lookup zone, a lookup zone is use to deploy the

    domain to the client computer and forward zone is use to deploy the server settings

    to client computer and reverse is receive the client settings to server computer.

    Select the forward zone right mouse click on it

    Click on new zone the new zone wizard will be started

  • 8/3/2019 MCSE Lessons

    53/55

    Bashir Ahmad Noori Presents 53

    Click on next and select the primary zone and click on next

    Select all domain server in the forest of ariana.com and click on next

    Type the zone name any and click on next command button

    Select allow security zone for dynamic updates ( active directory recommended )

    and click on next command button

    Then click on finish command button

    Now the forward lookup zone will be created

    We will create our server as a host

    Click on the created forward lookup zone like Peshawar and right mouse click on it

    and click on new host ( a ) in the new host name window type you domain name like

    ariana

    In the ip address type the server ip like 192.168.0.10.

    Click on add host command button a message will display that host for ariana.

    Peshawar successfully created.

    Click on ok and click on done

    Now we will create the reverse lookup zone

    Right mouse click on it

    Click on new zone

    The reverse lookup zone wizard will be started

    Click on next command button

    Select primary zone and click on next command button

    Select to all zone in DNS active directory forest ariana.com

    Click on next command button

    In the network id always type class c ip, 192.168.0

    Click on next command button

    Click on next

    Click on finish

    The reserve zone will be created. Close the DNS folder

  • 8/3/2019 MCSE Lessons

    54/55

    Bashir Ahmad Noori Presents 54

    Now we will make the client account for our client computer.

    Open the active directory user and computer folder

    All the client accounts will work under the organizational unit; OU is the grouping

    of the clients according to our organizational work.

    In the domain name right mouse

    Move to new

    Click on organizational unit

    Type the OU name and click on ok

    The OU will be created

    Now right mouse click on the OU

    Move to new

    Click on user account

    Type the user name

    Click on next

    Uncheck user change the password on next log on

    Check the user can not change the password

    Check the user password never expire

    Set the password for the user

    Confirm the password

    Click on ok

    The user account will be created.

    End of the lesson up to current Date.

  • 8/3/2019 MCSE Lessons

    55/55

    Bashir Ahmad Noori Presents 55