ccna & mcitp project

Upload: harpreet-singh

Post on 29-Feb-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Detailed project on networking devices and servers

TRANSCRIPT

  • 7/18/2019 CCNA & MCITP Project

    1/139

    CHAPTER 1

    INTRODUCTION

    1.1 Introduction In todays rapidly changing IT marketplace, Microsoft Certificationsare

    designed to play an important role in assisting the IT professional to utilize advancing

    technologies, fine tuning troubleshooting skills and improving job satisfaction. This

    certification from Microsoft confirms your demonstrated experience and knoledge in using

    Microsoft products and solutions.

    The MCITP!Microsoft "ertified IT #rofessional$ certification is the %big certification from

    Microsoft designed to validate a professionals proven job role capabilities. &ith the MCITP

    certification, an individual can be distinguished as an IT professional ith the comprehensive

    set of Microsoft technologies ' skills necessary to perform a particular job role. The MCITP

    certificationcan highlight your field of expertise since there are several concentrations ithin

    this one certification.

    1.2 Necessity

    (ften, departmental shared computers on campus have only one or to user accounts) there is

    alays one for everyday users, and there may be a second for an administrator. The everyday

    users share the same passord and logon, and this can cause problems. *or example, any user

    ho changes a setting !anything from the desktop allpaper, to broser settings, to saved

    internet passords$ changes that setting for everyone else ho logs into that computer after

    they do. It is also difficult to ensure that users ith different campus roles have differing levels

    of access to programs, files, and settings.

    If you maintain shared computers, using the a campus+ide service called as ctive -irectory

    !also called the as -$ can save you a great deal of time by aiding in keeping softare up to

    1

  • 7/18/2019 CCNA & MCITP Project

    2/139

    date, keeping each users files and settings separate from other users files and settings, and

    alloing users to log on using Identity key credentials that they already kno. It can also help

    you to allo one group of people !for instance, faculty and staff$ to access certain programs

    and files hile keeping those programs and files hidden from another group !for instance,

    students$, depending on hat fits your departments needs. ll IT labs use something similar

    to the ctive -irectory to ensure that users can log on using the same Identity key and

    passord no matter here they go on campus

    1.3 O!ecti"es

    The Microsoft "ertified IT #rofessional) erver dministrator !M"IT#) erver dministrator$

    credential is the leading certification for &indos erver /001, providing idely recognized,

    objective validation of your ability to perform critical, current IT job roles by using Microsoft

    technologies to their best advantage. It validates our ability to handle day+to+day management

    of the server operating system, file structure, and directory services2 handle softare

    distribution and updates2 monitor servers2 provide tier+/ troubleshooting

    support2 support engineering and change+management projects2 build and configure servers2

    implement auditing policy2 perform scheduled vulnerability+assessment scans2 and monitor

    logs for firealls and intrusion+detection systems.

    It focuses on a specific job role, alloing for in+depth validation of your skill set llos you to

    earn more than one M"IT# certification, demonstrating your abilities across multiple roles

    3uilds on a combination of Microsoft "ertified Technology pecialist !M"T$ prere4uisites,

    helping you develop your technical resume ith each step in your M"IT# career path

    1.# T$e%e

    Theme of our training and project is &indos erver /001 5nterprise 5dition. &indos erver

    /001 !sometimes abbreviated as 6&in/716$ is one of Microsoft &indos8 server line of

    2

  • 7/18/2019 CCNA & MCITP Project

    3/139

    operating systems. ome of the &indos erver /001 5nterprise 5dition features are active

    directory, orkgroup and domain, user account, active directory groups, profiles, softare

    installation via directory trusting, indo server backup, certificate services etc. My industrial

    training is ill be on these features.

    1.& Introduction to Co%'any

    -ream &eavers !-&$ is a group of hard core professionals having expertise in 9ecruitments,

    Training, 3usiness ystems, 9eal 5state and Travel ervices. t present -ream &eavers is

    orking ith more than :00 ;ational and Multi+;ational "ompanies including Top 3anks,

    Insurance "ompanies, Telecom "ompanies, IT ector, 9etail ector, 3#(s as ell as #harma

    companies. &ith aggressive marketing and efficient operations the group has forayed in the top

    ten positions in most of the above services in ;orth India. &ith < years of experience in client

    servicing, the -ream &eavers group has no strategically positioned itself across various

    industries in := states across ;orth and &est India.

    Moreover presently -ream &eavers is into sales training, induction programs, soft skills and

    behavioral training, selling skills and functional training. . The strong emphasis on human

    resource development is hat motivates its >00 member orkforce to achieve highest standards

    of 4uality and productivity.

    In the recent past the company has extended its arms in the field of #roject'Industrial Trainings

    in the name of -reamTech?abs including various professional courses for 3Tech, M", Mc.

    ", Mc. IT.. -95M&5@59 is one of the nations largest "(9#(9T5 and

    "onsultancy providers backed by a team of professionals ho have successfully trained and

    placed students. -95MT5"A?3 offers a ide spectrum of technical courses and

    application courses designed to suit every skill level, as ell as the ability to consult directly

    ith organizations to tailor made learning plans for any number of employees. Their products

    3

  • 7/18/2019 CCNA & MCITP Project

    4/139

    and services have a ide appeal and are applicable those in varied positions including netork

    administrators, systems analysts, systems architects, test engineers, softare developers, help

    desk staff, IT managers, senior executives, administrative assistants and business professionals.

    -95MT5"A?3 ervice package includes product 4uality testing, training, consultation,

    facilitation and hand holding for the 4uality initiatives.

    -95MT5"A?3 has its corporate office in Balandhar!#unjab$ ith its branches in

    mritsar and "handigarh and it provides services to over /0,000 professionals annually.

    -95MT5"A?3 offers a full spectrum of vendor authorized technical, business skills,

    project management and application courses designed to suit every skill level, as ell as ability

    to consult directly ith organizations to tailor made learning plans for any number of

    employees. -ream Tech ?abs also has tie ups ith a number of IT companies hich includes

    the names of grade IT "ompanies for #lacements of students

    -ream &eavers !-&$ is a group of hard core professionals having expertise in 9ecruitments,

    5ducation, Training, 3usiness ystems, 9eal 5state and Travel ervices having its corporate

    office in Curgaon and registered office in Balandhar. t present -ream &eavers is orking ith

    more than :00 ;ational and Multi+;ational "ompanies including Top 3anks, Insurance

    "ompanies, Telecom "ompanies, IT ector, 9etail ector, 3#(s as ell as #harma companies.

    &ith aggressive marketing and efficient operations the group has forayed in the top ten

    positions in most of the above services in ;orth India. &ith < years of experience in client

    servicing, the -ream &eavers group has no strategically positioned itself across various

    industries in := states across ;orth and &est India. Moreover presently -ream &eavers is into

    sales training, induction programmes, soft skills and behavioral training, selling skills and

    functional training. . The strong emphasis on human resource development is hat motivates

    its >00 member orkforce to achieve highest standards of 4uality and productivity.

    4

  • 7/18/2019 CCNA & MCITP Project

    5/139

    In the recent past the company has extended its arms in the field of #roject'Industrial Trainings

    in the name of -ream Tech ?abs including various professional courses for 3tech, M", Mc.

    ", Mc. IT..

    1.( )eatures of Drea% Tec$ *as

    In all e aim at building better professionals for tomorro and for this purpose, e provide

    training through skilled trainers.

    :.$ "andidates get learn both the soft skills as ell as the intervie skills under the same roof

    hich is extremely beneficial in shaping their career.

    /.$ Innovation in Technology Training and "onsulting.

    >.$ "urriculums mapped ith Industry 9e4uirement.

    D.$ tate+of+the Eart IT laboratories and communication set+up.

    F.$ trategic ssociation ith Clobal Technology leaders.

    =.$ #lacement assistance ith 9esourcing through "onsultancy ervices.

    G.$ 9esume ending, 5xclusive Intervies.

    1.$ "ourse "ertification, "onfirmation ?etters.

    -ream Tech ?abs is highly modernized lab of ;orth India ith all modern amenities and the

    infrastructure to increase Technical kills of students and give the Industrial approach for their

    better future prospects.

    &53IT5)

    .dreamtechlabs.com

    5

  • 7/18/2019 CCNA & MCITP Project

    6/139

    ddress

    "*!:/+:>$Tin Tour +3lock Market, 9anjit venue , mritsar.

    #hone no H+F0:G:GD

    5+mail infodreamtechlabs.com

    CHAPTER II

    INTRODUCTION TO NET+OR,

    netork is a set of devices!often referred to as nodes$ connected by communication links.

    node can be a computer, printer, or any other device capable of sending and'or receiving data

    6

  • 7/18/2019 CCNA & MCITP Project

    7/139

    generated by other nodes on the netork. The basic purpose of establishing a netork is to

    share resources and making communication possible among devices

    *igure /.: The basic netork

    2.1Net-or Criteria

    netork must be able to meet a certain number of criteria. The most important of these are

    performance, reliability, and security. #erformance) #erformance can be measured in many

    ays, including transmit time and response time. Transmit time is the amount of time re4uired

    for a message to travel from one device to another. 9esponse time is the elapsed time beteen

    an in4uiry and a response. The performance of a netork depends on a number of factors,

    including the number of users, the type of transmission medium, the capabilities of the

    connected hardare, and the efficiency of the softare. #erformance is often evaluated by to

    netorking metrics) throughput and delay. &e often need more throughput and less delay.

    Aoever, these to criteria are often contradictory. If e try to send more data to the netork,

    e may increase throughput but e increase the delay because of traffic congestion the

    netork.

    Re/iai/ity

    7

  • 7/18/2019 CCNA & MCITP Project

    8/139

    In addition to accuracy of delivery, netork reliability is measured by the fre4uency of failure,

    the time it takes a link to recover from a failure, and the netorks robustness and catastrophe.

    ecurity

    ;etork ecurity issues include protecting data from unauthorized access, protecting data

    from damage and development, and implementing policies and procedures for recovery from

    breaches and data losses.

    2.2 T0PE O) NET+OR,

    2.2.1 *AN *oca/ Area Net-or

    local area netork !?;$ is a group of computers and associated devices that share a

    common communications line or ireless link. Typically, connected devices share the resources

    of a single processor or server ithin a small geographic area !for example, ithin an office

    building$. Jsually, the server has applications and data storage that are shared in common by

    multiple computer users. local area netork may serve as fe as to or three users !for

    example, in a home netork$ or as many as thousands of users !for example, in an *--I

    netork$.

    8

    http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=6cIvQ6GhhWLjQM&tbnid=TbCuDgA9AHji-M:&ved=0CAUQjRw&url=http://computer-network-for-you.blogspot.com/&ei=pKZWU9iKI4WtiAfezoDIDg&psig=AFQjCNHEuZ65cq9eq12f_4ZIU3tQiA6fhQ&ust=1398273897376824http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=6cIvQ6GhhWLjQM&tbnid=TbCuDgA9AHji-M:&ved=0CAUQjRw&url=http://computer-network-for-you.blogspot.com/&ei=pKZWU9iKI4WtiAfezoDIDg&psig=AFQjCNHEuZ65cq9eq12f_4ZIU3tQiA6fhQ&ust=1398273897376824
  • 7/18/2019 CCNA & MCITP Project

    9/139

    *igure /./ ?ocal area netork

    2.2.2 MAN Metro'o/itan Area Net-or$

    metropolitan area netork !M;$ is a computer netork in hich to or more computers or

    communicating devices or netorks hich are geographically separated but in same

    metropolitan city and are connected to each other are said to be connected on M;.

    Metropolitan limits are determined by local municipal corporations2 the larger the city, the

    bigger the M;, the smaller a metro city, smaller the M;. Metropolitan rea ;etork

    !M;$ is a large computer netork that spans a metropolitan area or campus. Its geographic

    scope falls beteen a &; and ?;. M;s provide Internet connectivity for ?;s in a

    metropolitan region, and connect them to ider area netorks like the Internet.

    *igure /.> !Metropolitan rea ;etork$

    2.2.3 +AN +ide Area Net-or

    9

  • 7/18/2019 CCNA & MCITP Project

    10/139

    ide area netork !&;$ is a netork that covers a broad area !i.e., any

    telecommunications netork that links across metropolitan, regional, or national boundaries$

    using private or public netork transports. 3usiness and government entities utilize &;s to

    relay data among employees, clients, buyers, and suppliers from various geographical

    locations. In essence, this mode of telecommunication allos a business to effectively carry out

    its daily function regardless of location. The Internet can be considered a &; as ell, and is

    usedby businesses, governments, organizations, and individuals for almost any purpose

    imaginable.

    *igure /.D !&ide rea ;etork$

    2.3 T0PE O) CONNECTION

    2.3.1 Point4to4Point

    netork is to or more devices connected through links. link is a communications pathay

    that transfers data from one device to another. *or visualization purpose, it is simplest to

    imagine any link as a line dran beteen to points. *or communication to occur, to devices

    must be connected in some ay to the same link at the same time. There are to possible types

    of connections) point+to+point and multipoint.

    10

    http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=l2dP8vqc_nbdfM&tbnid=w2q8bw8hNXtEXM:&ved=0CAUQjRw&url=http://www.computer-networking-success.com/computer-lan-network.html&ei=f6dWU4yNDYiGiQeb64DABA&psig=AFQjCNEk95lnsMKCoqABZ16yAC-x8m9Few&ust=1398274227892503
  • 7/18/2019 CCNA & MCITP Project

    11/139

    *igure /.F #oint+to+ point connection

    point+to+point connection provides a dedicated link beteen to devices. The entire capacity

    of the link is reserved for transmission beteen those to devices. Most point+to+point

    connections use an actual length of ire or cable to connect the to ends, but other options,

    such as microave or satellite links, are also possible. &hen you are changing television

    channels by infrared remote control, you are establishing a point+to+point connection beteen

    remote control and the televisions control system.

    2.3.2 Mu/ti'oint

    multipoint connection is one in hich more than to specific devices share a single link. In a

    multipoint environment, the capacity of the channel is shared, either spatially or temporarily. If

    several devices can use the link simultaneously, it is a spatially shared connection. If users must

    take turns, it is a timeshared connection.

    11

    http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=KuCgAuklSUkrjM&tbnid=_NtmWQyTTvvZ6M:&ved=0CAUQjRw&url=http://sharonalvandi.wordpress.com/2010/03/05/dialogues-on-sustainability/&ei=Zq5WU_-vPM3xiAel4oHQDQ&psig=AFQjCNEiXRqloSSw-FA6_IsI-DAUhNh_Ow&ust=1398275799801059
  • 7/18/2019 CCNA & MCITP Project

    12/139

    *igure /.= Multipoint connection

    2.# NET+OR, TOPO*O50

    #hysical Topology

    The term physical topology refers to the ay in hich a netork is laid out physically. To or

    more devices connect to a link2 to or more links form a topology. The topology of a netork

    is the geometric representation of the relationship of all the links and linking devices to one

    another.

    2.#.1. Point4to4'oint To'o/o6y

    The simplest topology is a permanent link beteen to endpoints. itched point+to+point

    topologies are the basic model of conventional telephony. The value of a permanent point+to+

    point netork is the value of guaranteed, or nearly so, communications beteen the to

    endpoints. The value of an on+demand point+to+point connection is proportional to the number

    of potential pairs of subscribers, and has been expressed as Metcalfe8s ?a.

    12

  • 7/18/2019 CCNA & MCITP Project

    13/139

    2.#.2 7us To'o/o6y

    *igure /.G bus topology

    3us topology is multipoint connection. (ne long cable acts as a backbone to link all the

    devices in a netork. ;odes are connected to the bus cable by drop lines and taps.

    2.#.2.1Ad"anta6es of 7us To'o/o6y

    K It is "heap, easy to handle and implement.

    K 9e4uire less cable

    K It is best suited for small netorks.

    2.#.2.2Disad"anta6es of 7us To'o/o6y

    K The cable length is limited. This limits the number of stations that can be connected.

    K This netork topology can perform ell only for a limited number of nodes

    2.#.3 tar To'o/o6y

    13

    http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=g8kuRmg25jwihM&tbnid=nOcimh8DX7n_xM:&ved=0CAUQjRw&url=http://www.bukisa.com/articles/363105_bus-topology-with-diagramadvantages-and-disadvantages&ei=b7BWU6L4C8SSiAeE-4GADQ&psig=AFQjCNGq_OYJiM85oYyFCMR9cQhZcUe-2g&ust=1398276445052922
  • 7/18/2019 CCNA & MCITP Project

    14/139

    *igure /.1 star topology

    The type of netork topology in hich each of the nodes of the netork is connected to a

    central node ith a point+to+point link in a 8hub8 and 8spoke8 fashion, the central node being the

    8hub8 and the nodes that are attached to the central node being the 8spokes8 !e.g., a collection of

    point+to+point links from the peripheral nodes that converge at a central node$ E all data that is

    transmitted beteen nodes in the netork is transmitted to this central node, hich is usually

    some type of device that then retransmits the data to some or all of the other nodes in the

    netork, although the central node may also be a simple common connection oint !such as a

    8punch+don8 block$ ithout any active device to repeat the signals.

    2.#.3.1Ad"anta6es of star to'o/o6y

    Aigh speed

    5asy to install, configure, maintain, easy to expand.

    &e can increase the devices ithout any loss

    ;o collision

    2.#.3.2 Disad"anta6es of star to'o/o6y

    If hub fails then hole netork fails

    14

    http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=JcWTNCxmnEYH0M&tbnid=xtTBzN3H-pchSM:&ved=0CAUQjRw&url=http://www.cs.umd.edu/class/fall2001/cmsc411/proj01/pub/five.html&ei=lLNWU9LtLYr8iQexoYGABQ&psig=AFQjCNFsaSbVlLF3fKdd3DODrGkfv3ohtw&ust=1398277342562580
  • 7/18/2019 CCNA & MCITP Project

    15/139

    More cables are re4uired.

    2.#.# Rin6 To'o/o6y

    *igure /.< 9ing topology

    The type of netork topology in hich each of the nodes of the netork is connected to to

    other nodes in the netork and ith the first and last nodes being connected to each other,

    forming a ring E all data that is transmitted beteen nodes in the netork travels from one node

    to the next node in a circular manner and the data generally flos in a single direction only.

    2.#.#.1Ad"anta6e of Rin6 To'o/o6y

    @ery orderly netork here every device has access to the token and the opportunity to

    transmit.

    5asier to Mange than a 3us ;etork Cood "ommunication over long distances

    Aandles high volume of traffic

    2.#.#.2Disad"anta6es of Rin6 To'o/o6y

    The failure of a single node of the netork can cause the entire netork to fail.

    The movement or changes made to netork nodes affects the performance of the entire

    netork.Dua/4rin6

    15

    http://www.google.co.in/url?sa=i&source=images&cd=&cad=rja&uact=8&docid=Sz96oKNyQuzRAM&tbnid=3OAQJEkIHmyaoM&ved=0CAgQjRw&url=http://www.louiewong.com/archives/166&ei=hbRWU_WJDY2IiQeBsoAw&psig=AFQjCNEHwWAZlQiGUcVG0gXc6a7rK1vjBA&ust=1398277637274158
  • 7/18/2019 CCNA & MCITP Project

    16/139

    The type of netork topology in hich each of the nodes of the netork is connected to to

    other nodes in the netork, ith to connections to each of these nodes, and ith the first and

    last nodes being connected to each other ith to connections, forming a double ring E the data

    flos in opposite directions around the to rings, although, generally, only one of the rings

    carries data during normal operation, and the to rings are independent unless there is a failure

    or break in one of the rings, at hich time the to rings are joined !by the stations on either

    side of the fault$ to enable the flo of data to continue using a segment of the second ring to

    bypass the fault in the primary ring.

    2.#.& Mes$ To'o/o6y

    *igure /.:0 Mesh topology

    The value of fully meshed netorks is proportional to the exponent of the number of

    subscribers, assuming that communicating groups of any to endpoints, up to and including all

    the endpoints, is approximated by 9eed8s ?a.

    2.#.&.1 )u//y connected

    16

  • 7/18/2019 CCNA & MCITP Project

    17/139

    The type of netork topology in hich each of the nodes of the netork is connected to each of

    the other nodes in the netork ith a point+to+point link E this makes it possible for data to be

    simultaneously transmitted from any single node to all of the other nodes.

    2.#.&.2Partia//y connected

    The type of netork topology in hich some of the nodes of the netork are connected to more

    than one other node in the netork ith a point+to+point link E this makes it possible to take

    advantage of some of the redundancy that is provided by a physical fully connected mesh

    topology ithout the expense and complexity re4uired for a connection beteen every node in

    the netork.

    2.#.( Tree To'o/o6y

    *igure/.::Tree topology

    The type of netork topology in hich a central 8root8 node !the top level of the hierarchy$ is

    connected to one or more other nodes that are one level loer in the hierarchy !i.e., the second

    level$ ith a point+to+point link beteen each of the second level nodes and the top level

    central 8root8 node, hile each of the second level nodes that are connected to the top level

    central 8root8 node ill also have one or more other nodes that are one level loer in the

    hierarchy !i.e., the third level$ connected to it, also ith a point+to+point link, the top level

    17

  • 7/18/2019 CCNA & MCITP Project

    18/139

    central 8root8 node being the only node that has no other node above it in the hierarchy E the

    hierarchy of the tree is symmetrical, each node in the netork having a specific fixed number,

    f, of nodes connected to it at the next loer level in the hierarchy, the number, f, being referred

    to as the 8branching factor8 of the hierarchical tree.

    2.#.(.1 Ad"anta6es of a Tree To'o/o6y

    K #oint+to+point iring for individual segments.

    K upported by several hardare and softare vendors.

    K ll the computers have access to the larger and their immediate netorks.

    2.#.(.2 Disad"anta6es of a Tree To'o/o6y

    K (verall length of each segment is limited by the type of cabling used.

    K If the backbone line breaks, the entire segment goes don.

    2.& NET+O,IN5 DE8ICE

    ;etork devices are components used to connect computers or other electronic devices

    together so that they can share files or resources like printers orfaxmachines. -evices used to

    setup a ?ocal rea ;etork !?;$ are the most common type of netork devices used by the

    public. ?; re4uires a hub, router, cabling or radio technology, netork cards, and if online

    access is desired, a high+speed modem.

    18

    http://www.wisegeek.com/what-is-a-fax.htmhttp://www.wisegeek.com/what-is-a-fax.htmhttp://www.wisegeek.com/what-are-network-cards.htmhttp://www.wisegeek.com/what-are-network-cards.htmhttp://www.wisegeek.com/what-is-a-fax.htm
  • 7/18/2019 CCNA & MCITP Project

    19/139

    2.&.1 HU794

    Aub is a central device installed in a netork. If it stops orking the netork ill stop running.

    The orking of netorking hub is very simple. It has many points. The data is sent to every

    point and it is forarded to the point here the hub finds the address of the destined computer.

    Aubs offer an inexpensive option for transporting data beteen devices, but hubs don8t offer

    any form of intelligence. Aubs can be active or passive.

    n active hubstrengthens and regenerates the incoming signals before sending the data

    on to its destination.

    #assive hubsdo nothing ith the signal.

    *igure /.:/ Aub

    2.&.2 +ITCH94

    The orking of a

    netorking Aub is not

    much different from a itch. The advancement in itches is that they have sitching table

    in them hich makes a netork more secure and faster. The difference is beteen the

    technology and techni4ue through hich data is sent. itch has the ability to store the M"

    address of computers so the data ill only be sent to the re4uired point instead of sending it to

    every point.

    19

  • 7/18/2019 CCNA & MCITP Project

    20/139

    *igure /.:> itch

    2.(.3 ROUTER94

    9outer is responsible for connecting to physical and logically different netorks. 9outers

    are connected in a series in a &; or a ?; and they are called Aop in the series. The

    orking of 9outer is very simple a 9outer in a ?; or a &; finds the I# address of the next

    hop !next router$ and the data is sent toard and so on. -+?ink, T#+?ink, ?ink+ys, "isco and

    ztec are some ell knon 9outer manufacturing companies. 9outers are of to 3asic types

    -? routers and &i+*i routers. ;early every I#, banks, organizations, universities, 5nd+users

    use 9outers to connect to internet or interconnect in to their virtual private netorks over the

    internet.

    *igure /.:D &ired router *igure /.:F&ireless router

    2.&.# MODEM94

    20

  • 7/18/2019 CCNA & MCITP Project

    21/139

    modem is a device that makes it possible for computers to communicate over telephone lines.

    The ord modem comes from Modulate and -emodulate. 3ecause standard telephone lines use

    analog signals, and computers digital signals, a sending modem must modulate its digital

    signals into analog signals. The computers modem on the receiving end must then demodulate

    the analog signals into digital signals.

    *igure /.:= Modem

    2.&.& 7RID5E) a device that connects multiple netork segments along the data link layer. It

    orks on (I layer /

    *igure/.:G 3ridge

    21

  • 7/18/2019 CCNA & MCITP Project

    22/139

    2.&.( REPEATER) a device hich amplifies or regenerates digital signals received hile

    sending them from one part of a netork into another. It orks on (I layer :.

    *igure /.:1 9epeat

    2.( OME H07RID NET+OR, DE8ICE9

    2.(.1 MU*TI*A0ER +ITCH) sitch hich, in addition to sitching on (I layer /,

    provides functionality at higher protocol layers.

    *igure /.:< Multilayer sitch

    2.(.2 PROTOCO* CON8ERTER) a hardare device that converts beteen to different

    types of transmission, such as asynchronous and synchronous transmissions.

    22

  • 7/18/2019 CCNA & MCITP Project

    23/139

    *igure /./0 #rotocol converter

    2.(.3 7RID5E ROUTER 7ROUTER9 a device that combines router and bridge

    functionality and therefore orks on (I layers / and >.

    *igure /./: 3ridge router

    2.(.# PRO:0 ER8ER) computer netork service hich allos clients to make indirect

    netork connections to other netork services.

    23

  • 7/18/2019 CCNA & MCITP Project

    24/139

    *igure /.//#roxy serve

    2.(.& )IRE+A**) a piece of hardare or softare put on the netork to prevent some

    communications forbidden by the netork policy.

    *igure /./> *ireall

    2.(.( NET+OR, ADDRE TRAN*ATOR NAT9netork service provided as hardare

    or softare that converts internal to external netork addresses and vice versa.

    (ther hardare for establishing netorks or dial+up connections)

    Mu/ti'/e;er) a device that combines several electrical signals into a single signal.

    Net-or interface contro//er) a piece of computer hardare alloing the attached computer

    to communicate by netork.

    24

  • 7/18/2019 CCNA & MCITP Project

    25/139

    *ig /./D ;etork address translator

    2.(.< +IR*E NET+OR, INTER)ACE CONTRO**ER) a piece of computer hardare

    alloing the attached computer to communicate by ?;.

    *ig /./F &ireless netork interface controller

    2.(.= *AN TETER9 ?; tester is an electronic device used to verify the electrical connections in

    a cable or other ired assembly. Cenerally a cable tester consists of)

    K source of electric current,

    volt meter,

    K sitching matrix used to connect the current source and the volt meter to all of the contact points

    in a cable.

    cable tester is used to verify that all of the intended connections exist and that there are no

    unintended connections in the cable being tested. &hen an intended connection is missing it is

    said to be 6open6. &hen an unintended connection exists it is said to be a 6short6 !as in short

    circuit$. If a connection 6goes to the rong place6 it is said to be 6misired 6 !the connection

    25

    http://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Volt_meterhttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Volt_meterhttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Short_circuit
  • 7/18/2019 CCNA & MCITP Project

    26/139

    has to faults) it is open to the correct contact and shorted to an incorrect contact$.Cenerally,

    the testing is done in to phases. The first phase, called the opens test makes sure each of the

    intended connections is good. The second phase, called the shorts test makes sure there are no

    unintended connections.

    There are to common ays to test a connection)

    :. A continuity test. "urrent is passed don the connection. If there is current the connection is

    assumed to be good. This type of test can be done ith a series combination of a battery !to provide

    the current$ and a light bulb !that lights hen there is a current$.

    /. Aresistance test. knon current is passed don the connection and the voltage that develops is

    measured. *rom the voltage and current the resistance of the connection can be calculated and

    compared to the expected value.

    There are to common ays to test for a short)

    1. A /o- "o/ta6e test. lo poer, lo voltage source is connected beteen to conductors

    that should not be connected and the amount of current is measured. If there is no current

    the conductors are assumed to be ell isolated.

    2. A $i6$ "o/ta6e test. gain a voltage source is connected but this time the voltage is of

    several hundred volts. The increased voltage ill make the test more likely to find

    connections that are nearly shorted since the higher voltage ill cause the insulation of

    nearly shorted ires to break don.

    26

    http://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Electrical_resistancehttp://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Electrical_resistance
  • 7/18/2019 CCNA & MCITP Project

    27/139

    *igure /./= ?an tester

    2.(.> CRIMPIN5 TOO*9 crimping tool is a tool designed to cri%'or connect a connector to the end of a cable. *or example,

    netork cables and phone cables are created using a crimping tool to connect the 9B+DF and 9B+::

    connectors to the end of the cable. In the picture to the right, is an example of hat a crimping tool

    looks like. This example shos a tool capable of crimping both 9B+:: and 9B+DF connectors.

    It is actually a multi+function tool that can be used for making crafts and jeelry or for fishing

    to crimp the ires in a fishermans rod for example. &hats good about the crimping tool is that

    it has a lot of practical usage and its also an uncomplicated tool to use There are actually

    various crimping tools in the market and each is designed for a specific task so hen youre out

    to buy a crimping tool, first determine for hat task you ant to use it for) is it for jeelry

    making or making fish lures perhapsL (nce you kno, then the next step is to pick out the right

    crimping tool size as each crimping job re4uires different sizes.

    Its also important to choose the right type of sleeve for your crimping tool. "rimp sleeves also come in

    different types. The three common crimp sleeve types are) round section, oval section and the double

    barrel. The round section is made out of brass and is used for making knots hile the oval section

    sleeve, hich is the more idely used type of sleeve is also available in brass as ell as copper alloys

    and aluminum.

    27

    http://www.computerhope.com/jargon/r/rj45.htmhttp://www.computerhope.com/jargon/r/rj11.htmhttp://www.computerhope.com/jargon/r/rj45.htmhttp://www.computerhope.com/jargon/r/rj11.htm
  • 7/18/2019 CCNA & MCITP Project

    28/139

    *igure /./G "rimping tool

    2.(.1? PUNCHIN5 TOO*9

    punch is a hardmetalrod ith a shaped tip at one end and a blunt butt end at the other,

    hich is usually struck by a hammer.Most oodorkers prefer to use aball+peen hammer for

    using punches. #unches are used to drive objects, such as nails, or to form an impression of the

    tip on a ork piece. -ecorative punches may also be used to create a pattern or even form an image.

    *igure /./1 #unching tool

    The orld of connectors has a much smaller orld of acronyms all its on. They consist of

    such acronyms as 9B, M, T, T;", 3;", @.>/, -I;, -3, ; and more. (ne aspect that

    might complicate the orld of connectors is that many of these connectors are also knon by

    more than one name.

    28

    http://en.wikipedia.org/wiki/Hardnesshttp://en.wikipedia.org/wiki/Metalhttp://en.wikipedia.org/wiki/Hammerhttp://en.wikipedia.org/wiki/Ball-peen_hammerhttp://en.wikipedia.org/wiki/Nail_(fastener)http://en.wikipedia.org/wiki/Hardnesshttp://en.wikipedia.org/wiki/Metalhttp://en.wikipedia.org/wiki/Hammerhttp://en.wikipedia.org/wiki/Ball-peen_hammerhttp://en.wikipedia.org/wiki/Nail_(fastener)
  • 7/18/2019 CCNA & MCITP Project

    29/139

    Most of us kno that a connector is best knon for providing the physical link beteen to

    components. ome example of the use of a connector might be a connector linking a cable and

    a netork interface card or ;I" card, a connector linking a transceiver and a cable or even a

    connector linking to cable segments.

    &hen using an electrical cable, a connection is established hen the conducting ires are

    Boined by ay of connectors in order to make and maintain continuous contact, alloing the

    signal to simply move along the cable across the contact.

    &hen using fibre+optic cable, it takes much more ork to manage and maintain good

    connections due to the degree of fit beteen the to fibre cores. The fit determines the 4uality

    of the connection beteen the fibre cores. To complicate matters, the diameters involved in this

    fit are smaller than a human hair.

    "onnections differ in various ays, hich help in determining here that type of connector can

    be used. These features include)

    K hape

    K ize

    K Cender

    K "onnection mechanism

    K *unction

    In some cases, it is necessary to use a special adapter in order to use different types of

    connector combinations. n example of this is hen using an ;+series connector and a 3;"

    adapter in order to connect thick to thin coaxial cable.

    nother difference beteen connectors is their sturdiness, the ease of attaching and detaching

    the connector, and the amount of signal loss that may occur at the connection point.

    29

  • 7/18/2019 CCNA & MCITP Project

    30/139

    &hen determining the type of connector that is used, it is important to take into consideration

    the components being used, and, as far as netorks, the type of cable and architecture being

    used. n 5thernet netork that is using a coaxial cable ould use different connectors beteen

    the cable and the ;I", as opposed to an I3M Token 9ing netork that is using a shielded

    tisted+pair cable.

    &hen about a half a dozen types of connectors available for electrical cable, there are also

    about a dozen more types of connectors available for use hen using a fiber+optic cable.

    2.

  • 7/18/2019 CCNA & MCITP Project

    31/139

    *igure /./< 9B DF "onnector

    2.+line

    jack$, and 9B=: !for a D+line telephone jack$, all of hich utilize =+position modular

    connectors.

    n 9B:: jack typically utilizes / out of the = positions, so they can be ired ith a =#/"

    modular jack !=+position, /+conductor$. Aoever, these types of jacks are very rare. Most

    31

    http://www.tech-faq.com/how-to-install-telephone-wiring.htmlhttp://www.tech-faq.com/utp.htmlhttp://www.tech-faq.com/how-to-install-telephone-wiring.htmlhttp://www.tech-faq.com/utp.html
  • 7/18/2019 CCNA & MCITP Project

    32/139

    often, an 9B:: jack is a =#D" jack !=+position, D+conductor$, ith to of the four ires running

    to the junction box unused. The extra ires can be pressed into service for a variety of

    applications including preventing a pulse+dial telephone from ringing the extension phone bells

    !an %anti+tinkle circuit$, as a ground for selective ringers, poering an ?.5.-. ring+indicator

    operating off of the ringer signal, etc.

    *igure /.>0 9B :: "onnector.

    2.

  • 7/18/2019 CCNA & MCITP Project

    33/139

    netorks. 3;" connectors are made to match the characteristic impedanceof cable at either F0

    ohms or GF ohms. It is usually applied for fre4uencies belo D CAz and voltages belo F00

    @olts.O/Pimilar connectors using the bayonet connection principle exist, and a threaded

    connector is also available. Jnited tates military standard MI?+#9*+>

  • 7/18/2019 CCNA & MCITP Project

    34/139

    is more important in determining the limitations of transmission. *or unguided media, the

    bandidth of the signal produced by the transmitting antenna is more important than the

    medium in determining transmission characteristics. (ne key property of signals transmitted by

    antenna is directionality. In general, signals at loer fre4uencies are omnidirectional2 that is,

    the signal propagates in all directions from the antenna. t higher fre4uencies, it is possible to

    focus the signal into a directional beam. In considering the design of data transmission systems,

    key concerns are data rate and distance) the greater the data rate and distance the better.

    number of design factors relating to the transmission medium and the signal determine the data

    rate and distance)

    7and-idt$9 ll other factors remaining constant, the greater the bandidth

    of a signal, the higher the data rate that can be achieved.

    Trans%ission i%'air%ents9 Impairments, such as attenuation, limit the distance.

    *or guided media, tisted pair generally suffers more impairment than coaxial cable,

    hich in turn suffers more than optical fiber.

    Interference9 Interference from competing signals in overlapping fre4uency bands

    can distort or ipe out a signal. Interference is of particular concern for unguided

    media but is also a problem ith guided media. *or guided media, interference can be

    caused by emanations from nearby cables. *or example, tisted pairs are often bundled

    together and conduits often carry multiple cables. Interference can also be experienced

    from unguided transmissions. #roper shielding of a guided medium can minimize this

    problem.

    Nu%er of recei"ers9 guided medium can be used to construct a point+topoint

    link or a shared link ith multiple attachments. In the latter case, each attachment

    34

  • 7/18/2019 CCNA & MCITP Project

    35/139

    introduces some attenuation and distortion on the line, limiting distance and'or data

    rate

    2.= C*AI)ICATION O) TRANMIION MEDIA

    *igure /.>/ "lassification of transmission media

    2.= 5UIDED TRANMIION MEDIA

    2.=.1T-isted Pair Ca/e

    The most popular netork cabling is tisted pair. It is light eight, easy to install, inexpensive

    and support many different types of netork. It also supports the speed of :00 mbps. Tisted

    35

  • 7/18/2019 CCNA & MCITP Project

    36/139

    pair cabling is made of pairs of solid or stranded copper tisted along each other. The tists are

    done to reduce vulnerably to 5MI and cross talk. The number of pairs in the cable depends on

    the type. The copper core is usually //+&C or /D+&CBas measured on the merican ire

    gauge standard. There are to types of tisted pairs cabling

    *igure /.>> Tisted pair cable

    :. Jnshielded tisted pair !JT#$

    /. hielded tisted pair !T#$

    2.=.1.1 Uns$ie/ded t-isted 'air UTP

    JT# is more common. It can be either voice grade or data grade depending on the condition.

    JT# cable normally has an impedance of :00 ohm. JT# cost less than T# and easily available

    due to its many use. There are five levels of data cabling.

    Cate6ory 1

    These are used in telephone lines and lo speed data cable.

    Cate6ory 2

    These cables can support up to D mbps implementation.

    36

  • 7/18/2019 CCNA & MCITP Project

    37/139

    Cate6ory 3

    These cable supports up to := mbps and are mostly used in :0 mbps.

    Cate6ory #

    These are used for large distance and high speed. It can support /0mps.

    Cate6ory &

    This is the highest rating for JT# cable and can support up to :00mps.

    JT# cables consist of / or D pairs of tisted cable. "able ith / pair use 9B+:: connector and D

    pair cable use 9B+DF connector.

    2.=.1.1.1 C$aracteristics of UTP:. lo cost

    /. easy to install

    >. Aigh speed capacityD. Aigh attenuation

    F. 5ffective to 5MI

    =. :00 meter limit

    2.=.1.1.2 Ad"anta6es of UTP

    :. 5asy installation

    /. "apable of high speed for ?;

    >. ?o cost

    2.=.1.1.3 Disad"anta6es of UTP

    :. hort distance due to attenuation

    2.=.1.2 $ie/ded T-isted Pair TP

    T# is heavier and more difficult to manufacture, but it can greatly improve the signaling rate

    in a given transmission scheme Tisting provides cancellation of magnetically induced fields

    and currents on a pair of conductors. Magnetic fields arise around other heavy current+carrying

    37

  • 7/18/2019 CCNA & MCITP Project

    38/139

    conductors and around large electric motors. @arious grades of copper cables are available, ith

    Crade F being the best and most expensive. Crade F copper, appropriate for use in :00+Mbps

    applications, has more tists per inch than loer grades. More tists per inch means more

    linear feet of copper ire used to make up a cable run, and more copper means more money.

    hielding provides a means to reflect or absorb electric fields that are present around cables.

    hielding comes in a variety of forms from copper braiding or copper meshes to aluminized.

    Mylar tape rapped around each conductor and again around the tisted pair. 3M has defined

    category for T# cable.

    Ty'e 1

    T# features to pairs of //+&C

    Ty'e 2

    This type include type : ith D telephone pairs

    Ty'e (

    This type feature to pairs of standard shielded /=+&C

    Ty'e .#.2 RADIO TRANMIION

    In radio transmission a radiating antenna is used to convert a time+varying electric current into

    an electromagnetic ave or field, hich freely propagates through a non+conducting medium

    such as air or space. In a broadcast radio channel, a directional antenna radiates a transmitted

    signal over a ide service area. In a point+to+point radio channel, a directional transmitting

    antenna is used to focus the ave into a narro beam, hich is directed toard a single

    receiver site. In either case the transmitted electromagnetic ave is picked up by a remote

    receiving antenna and reconverted to an electric current.

    46

  • 7/18/2019 CCNA & MCITP Project

    47/139

    *igure /.>< 9adio transmission

    Radio +a"e

    Radio -a"e 'ro'a6ation is not constrained by any physical conductor or aveguide. This

    makes radio ideal for mobile communications, satellite and deep+space communications,

    broadcast communications, and other applications in hich the laying of physical connections

    may be impossible or very costly. (n the other hand, unlike guided channels such as ire or

    optical fiber , the medium through hich radio aves propagate is highly variable, being

    subject to diurnal, annual, and solar changes in the ionosphere, variations in the density of

    ater droplets in the troposphere, varying moisture gradients, and diverse sources of reflection

    and diffraction.

    2.=.#.3 MICRO+A8E

    Microave transmission is line of sight transmission. The transmit station must be in visible

    contact ith the receive station. This sets a limit on the distance beteen stations depending on

    the local geography. Typically the line of sight due to the 5arths curvature is only F0 km to the

    horizonS 9epeater stations must be placed so the data signal can hop, skip and jump across the

    country. Microaves operate at high operating fre4uencies of > to :0 CAz. This allos them to

    carry large 4uantities of data due to their large bandidth.

    2.=.#.3.1 Ad"anta6es of %icro-a"e

    :. They re4uire no right of ay ac4uisition beteen toers.

    /. They can carry high 4uantities of information due to their high operating fre4uencies.

    >. ?o cost land purchase) each toer occupies only a small area.

    47

  • 7/18/2019 CCNA & MCITP Project

    48/139

    D. Aigh fre4uency'short avelength signals re4uire small antennae.

    2.=.#.3.2 Disad"anta6es of %icro-a"e

    :. ttenuation by solid objects) birds, rain, sno and fog.

    /. 9eflected from flat surfaces like ater and metal.

    >. -iffracted !split$ around solid objects.

    D. 9eflected by atmosphere, thus causing beam to be projected aay from receiver.

    2.>.#.# ATE**ITE

    atellites are transponders !units that receive on one fre4uency and retransmit on another$ that

    are set in geostationary orbits directly over the e4uator. These geostationary orbits are >=,000

    km from the 5arths surface. t this point, the gravitational pull of the 5arth and the centrifugal

    force of 5arths rotation are balanced and cancel each other out. "entrifugal force is the

    rotational force placed on the satellite that ants to fling it out into space.

    The uplink is the transmitter of data to the satellite. The donlink is the receiver of data.

    Jplinks and donlinks are also called 5arth stations because they are located on the 5arth. The

    footprint is the shadoN that the satellite can transmit to, the shado being the area that can

    receive the satellites transmitted signal.

    48

  • 7/18/2019 CCNA & MCITP Project

    49/139

    *igure/.D0 satellite transmission

    C$a'ter 3

    PH0ICA* MODE* UED IN NET+OR,IN5

    3.1C*IENT ER8ER MODE*

    The c/ientser"er %ode/ is an approach to computer netork programming developed at

    Qerox #9"during the :

  • 7/18/2019 CCNA & MCITP Project

    50/139

    The model assigns one of to roles to the computersin a netork) "lientor server. serveris

    a computer system that selectively shares its resources2 a client is a computer or computer

    programthat initiates contact ith a server in order to make use of a resource. -ata, "#Js,

    printers, and data storage devicesare some examples of resources.

    This sharing of computer resources is called time-sharing, because it allos multiple people to

    use a computer !in this case, the server$ at the same time. 3ecause a computer does a limited

    amount of ork at any moment, a time+sharing system must 4uickly prioritize its tasks to

    accommodate the clients.

    "lients and servers exchange messages in a re4uest+response messaging pattern) The client

    sends a re4uest, and the server returns a response. To communicate, the computers must have a

    common language, and they must follo rules so that both the client and the server kno hat

    to expect. The language and rules of communication are defined in a communications protocol.

    ll client+server protocols operate in theapplication layer.

    &hether a computer is a client, a server, or both, it can serve multiple functions. *or example, a

    single computer can run eb serverand file serversoftareat the same time to serve different

    data to clients making different kinds of re4uests. "lient softare can also communicate ith

    server softare on the same computer.O:P "ommunication beteen servers, such as to

    synchronize data, is sometimes called inter+server or inter+servercommunication.

    50

    https://en.wikipedia.org/wiki/Computerhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Client_(computing)https://en.wikipedia.org/wiki/Server_(computing)https://en.wikipedia.org/wiki/Resource_(computer_science)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Data_(computing)https://en.wikipedia.org/wiki/CPUhttps://en.wikipedia.org/wiki/Printer_(computing)https://en.wikipedia.org/wiki/Data_storage_devicehttps://en.wikipedia.org/wiki/Time-sharinghttps://en.wikipedia.org/wiki/Computer_multitaskinghttps://en.wikipedia.org/wiki/Request-responsehttps://en.wikipedia.org/wiki/Messaging_patternhttps://en.wikipedia.org/wiki/Communications_protocolhttps://en.wikipedia.org/wiki/Application_layerhttps://en.wikipedia.org/wiki/Web_serverhttps://en.wikipedia.org/wiki/File_serverhttps://en.wikipedia.org/wiki/Softwarehttps://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1https://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1https://en.wikipedia.org/wiki/Computerhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Client_(computing)https://en.wikipedia.org/wiki/Server_(computing)https://en.wikipedia.org/wiki/Resource_(computer_science)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Data_(computing)https://en.wikipedia.org/wiki/CPUhttps://en.wikipedia.org/wiki/Printer_(computing)https://en.wikipedia.org/wiki/Data_storage_devicehttps://en.wikipedia.org/wiki/Time-sharinghttps://en.wikipedia.org/wiki/Computer_multitaskinghttps://en.wikipedia.org/wiki/Request-responsehttps://en.wikipedia.org/wiki/Messaging_patternhttps://en.wikipedia.org/wiki/Communications_protocolhttps://en.wikipedia.org/wiki/Application_layerhttps://en.wikipedia.org/wiki/Web_serverhttps://en.wikipedia.org/wiki/File_serverhttps://en.wikipedia.org/wiki/Softwarehttps://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1
  • 7/18/2019 CCNA & MCITP Project

    51/139

    *igure>.: erver+client model

    3.1.1Ad"anta6es of C/ient er"er Net-ors

    :. Centra/iation9Jnlike #/#, here there is no central administration, here in this

    architecture there is a centralized control. ervers help in administering the hole set+up.

    ccess rights and resource allocation is done by ervers.

    /. Pro'er Mana6e%ent9ll the files are stored at the same place. In this ay, management

    of files becomes easy. lso it becomes easier to find files.

    >. 7ac4u' and Reco"ery 'ossi/e9 s all the data is stored on server its easy to make a

    back+up of it. lso, in case of some break+don if data is lost, it can be recovered easily

    and efficiently. &hile in peer computing e have to take back+up at every orkstation.

    D. U' 6radation and ca/ai/ityin C/ient4ser"er set4u'9"hanges can be made easily by

    just upgrading the server. lso ne resources and systems can be added by making

    necessary changes in server.

    F. Accessii/ity9*rom various platforms in the netork, server can be accessed remotely. s

    ne information is uploaded in database, each orkstation need not have its on storage

    capacities increased !as may be the case in peer+to+peer systems$. ll the changes are made

    only in central computer on hich server database exists.

    51

    http://www.ianswer4u.com/2011/12/earned-value-management-analysis.htmlhttp://www.ianswer4u.com/2011/10/characteristics-of-good-software.htmlhttp://www.ianswer4u.com/2011/12/earned-value-management-analysis.htmlhttp://www.ianswer4u.com/2011/10/characteristics-of-good-software.html
  • 7/18/2019 CCNA & MCITP Project

    52/139

    =. ecurity99ules defining security and access rights can be defined at the time of set+up of

    server.

    G. ervers can play different roles for different clients.

    3.1.2Disad"anta6es of C/ient er"er Net-or

    :. "ongestion in ;etork) Too many re4uests from the clients may lead to congestion, hich

    rarely takes place in #/# netork. (verload can lead to breaking+don of servers. In peer+

    to+peer, the total bandidth of the netork increases as the number of peers increase.

    /. "lient+erver architecture is not as robust as a #/# and if the server fails, the hole netork

    goes don. lso, if you are donloading a file from server and it gets abandoned due to

    some error, donload stops altogether. Aoever, if there ould have been peers, they

    ould have provided the broken parts of file.

    >. "ost) It is very expensive to install and manage this type of computing.

    D. ou need professional IT people to maintain the servers and other technical details of

    netork.

    3.2 PEER TO PEER MODE* peer+to+peer !abbreviated to #/#$ computer netork is one in hich each computer in the

    netork can act as a client or server for the other computers in the netork, alloing shared

    access to various resources such as files,peripherals, and sensors ithout the need for a central

    server. #/# netorks can be set up ithin the home, a business, or over the Internet. 5ach

    netork type re4uires all computers in the netork to use the same or a compatible program to

    connect to each other and access files and other resources found on the other computer. #/#

    netorks can be used for sharing content such as audio, video, data, or anything in digital

    format.

    #/# is a distributed application architecture that partitions tasks or orkloads among peers.

    #eers are e4ually privileged participants in the application. 5ach computer in the netork is

    referred to as a node. The oner of each computer on a #/# netork ould set aside a portion

    52

    http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Node_(networking)
  • 7/18/2019 CCNA & MCITP Project

    53/139

    of its resourcesRsuch as processing poer, disk storage, or netork bandidthRto be made

    directly available to other netork participants, ithout the need for central coordination by

    servers or stable hosts.O:P#eers are both suppliers and consumers of resources, in contrast to the

    traditional clientEserver model here only the server supply !send$, and clients consume

    !receive$ data. 5merging collaborative #/# systems are going beyond the era of peers doing

    similar things hile sharing resources, and are looking for diverse peers that can bring in

    uni4ue resources and capabilities to a virtual community thereby empoering it to engage in

    greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial

    to all the peers.

    The first #/# distributed system platform as #ipes #latform by #eer ?ogic. (ne of #eer

    ?ogics first licensees as Texas Instrumentsin :

  • 7/18/2019 CCNA & MCITP Project

    54/139

    *igure >./ peer to peer model

    3.2.1Ad"anta6es of Peer4to4'eer net-orin6

    :. It is easy to install and so is the configuration of computers on this netork,/. ll the resources and contents are shared by all the peers, unlike server+client architecture

    here erver shares all the contents and resources.

    >. #/# is more reliable as central dependency is eliminated. *ailure of one peer doesnt affect

    the functioning of other peers. In case of "lient Eerver netork, if server goes don hole

    netork gets affected.

    D. There is no need for full+time ystem dministrator. 5very user is the administrator of his

    machine. Jser can control their shared resources

    F. The over+all cost of building and maintaining this type of netork is comparatively very

    less.

    3.2.2Disad"anta6es dra-acs of Peer to 'eer arc$itecture

    54

  • 7/18/2019 CCNA & MCITP Project

    55/139

    :. In this netork, the hole system is decentralized thus it is difficult to administer. That is one

    person cannot determine the hole accessibility setting of hole netork.

    /. ecurity in this system is very less viruses, spyares, Trojans2 etc. malares can easily transmit

    over this #+/+# architecture.

    >. -ata recovery or backup is very difficult. 5ach computer should have its on back+up system

    D. ?ot of movies, music and other copyrighted files are transferred using this type of file

    transfer. #/# is the technology used in torrents.

    Table >.: -ifference beteen #eer to #eer and "lient erver ;etork

    Peer4to4Peer Net-ors C/ienter"er Net-ors

    K 5asy to set up More difficult to set up

    K ?ess expensive to install More expensive to install

    K "an be implemented on a ide range of

    operating systems

    variety of operating systems can be

    supported on the client computers, but the

    server needs to run an operating system that

    supports netorking

    K More time consuming to maintain the

    softare being used !as computers must

    be managed individually$

    ?ess time consuming to maintain the softare

    being used !as most of the maintenance is

    managed from the server$

    K @ery lo levels of security supported or

    none at all. These can be very

    cumbersome to set up, depending on the

    operating system being used

    Aigh levels of security are supported, all of

    hich are controlled from the server. uch

    measures prevent the deletion of essential

    system files or the changing of settings

    K Ideal for netorks ith less than :0

    computers

    ;o limit to the number of computers that can

    be supported by the netork

    K -oes not re4uire a server 9e4uires a server running a server operating

    55

  • 7/18/2019 CCNA & MCITP Project

    56/139

    system

    K -emands a moderate level of skill to

    administer the netork

    -emands that the netork administrator has a

    high level of IT skills ith a good orking

    knoledge of a server operating system

    3.3 COMPUTER NET+OR, ARCHITECTURTE

    The term netorking model, or netorking architecture, refers to an organized set of

    documents. Individually, these documents describe one small function re4uired for a netork.

    These documents may define a protocol, hich is a set of logical rules that devices must follo

    to communicate. (ther documents may define some physical re4uirements for netorking, for

    example, it may define the voltage and current levels used on a particular cable. "ollectively,

    the documents referenced in a netorking model define all the details of ho to create a

    complete orking netork. To create a orking netork, the devices in that netork need to

    follo the details referenced by a particular netorking model. &hen multiple computers and

    other netorking devices implement these protocols, physical specifications, and rules, and the

    devices are then connected correctly, the computers can successfully communicate.

    3.# OIMODE*

    The (pen ystems Interconnection model !(I$ is a conceptual model that characterizes and

    standardizes the internal functions of a communication system by partitioning it into abstraction

    layers. The model is a product of the (pen ystems Interconnection project at the International

    (rganization for tandardization !I($, maintained by the identification I('I5" GD

  • 7/18/2019 CCNA & MCITP Project

    57/139

    calls the next loer layer to send and receive packets that make up the contents of that path.

    To instances at one layer are connected by a horizontal connection on that layer.

    *igure >.> (I model

    Table >./ ?ayers of (I model

    57

  • 7/18/2019 CCNA & MCITP Project

    58/139

    3.#.1. DECRIPITION O) OI *A0ER

    58

    (I Model

    -ata unit ?ayer *unction

    Aost

    layers

    -ata

    G. pplication ;etork process to application

    =.presentation

    -ata representation, encryption and decryption,

    convert machine dependent data to machine

    independent data

    F.ession

    Interhost communication, managing sessions

    beteen applications

    egments D.Transport

    9eliable delivery of packets beteen points on a

    netork.

    Media

    layers

    #acket'datagram >. ;etork

    ddressing, routing and !not necessarily reliable$

    delivery of datagrams beteen points on a netork.

    3ot'*reame /.-ata link reliable direct point+to+point data connection.

    3it :. physical

    !not necessarily reliable$ direct point+to+point

    data connection.

  • 7/18/2019 CCNA & MCITP Project

    59/139

    ccording to recommendation Q./00, there are seven layers, labeled : to G, ith layer : at the

    bottom.

    *ayer 19 P$ysica/ /ayer

    The physical layer has the folloing major functions)

    It defines the electrical and physical specifications of the data connection. It defines the

    relationship beteen a device and a physical transmission medium !e.g., a copper or

    fiber optical cable$. This includes the layout of pins, voltages, line impedance, cable

    specifications, signal timing, hubs, repeaters, netork adapters, host bus adapters !A3

    used in storage area netorks$ and more.

    It defines the protocol to establish and terminate a connection beteen to directly

    connected nodes over a communications medium. It may define the protocol for flo

    control.

    It defines a protocol for the provision of a !not necessarily reliable$ connection beteen

    to directly connected nodes, and the Modulation or conversion beteen the

    representation of digital data in user e4uipment and the corresponding signals

    transmitted over the physical communications channel. This channel can involve

    physical cabling !such as copper and optical fiber$ or a ireless radio link.

    The physical layer of #arallel "I operates in this layer, as do the physical layers of

    5thernet and other local+area netorks, such as token ring, *--I, ITJ+T C.hn, and

    I555 10/.::, as ell as personal area netorks such as 3luetooth and I555 10/.:F.D.

    *ayer 29 Data /in /ayer

    The data link layer provides a reliable link beteen to directly connected nodes, by

    detecting and possibly correcting errors that may occur in the physical layer.

    59

  • 7/18/2019 CCNA & MCITP Project

    60/139

    #oint+to+#oint #rotocol !###$ is an example of a data link layer in the T"#'I# protocol

    stack.

    The ITJ+T C.hn standard, hich provides high+speed local area netorking over

    existing ires !poer lines, phone lines and coaxial cables$, includes a complete data

    link layer hich provides both error correction and flo control by means of a selective

    repeat liding &indo #rotocol.

    *ayer 39 Net-or /ayer

    The netork layer provides the functional and procedural means of transferring variable

    length data se4uences !called datagrams$ from one node to another connected to the

    same netork. netork is a medium to hich many nodes can be connected, on

    hich every node has an address and hich permits nodes connected to it to transfer

    messages to other nodes connected to it by merely providing the content of a message

    and the address of the destination node and letting the netork find the ay to deliver

    !6route6$ the message to the destination node. In addition to message routing, the

    netork may !or may not$ implement message delivery by splitting the message into

    several fragments, delivering each fragment by a separate route and reassembling the

    fragments, report delivery errors, etc.

    -atagram delivery at the netork layer is not guaranteed to be reliable.

    number of layer+management protocols, a function defined in the Management

    nnex, I( GD

  • 7/18/2019 CCNA & MCITP Project

    61/139

    The transport layer provides the reliable sending of data packets beteen nodes !ith

    addresses$ located on a netork, providing reliable data transfer services to the upper

    layers.

    n example of a transport layer protocol in the standard Internet protocol stack is T"#,

    usually built on top of the I# protocol.

    The transport layer controls the reliability of a given link through flo control,

    segmentation'-5 segmentation, and error control. ome protocols are state+ and

    connection +oriented.

    This means that the transport layer can keep track of the segments and retransmit those

    that fail. The transport layer also provides the acknoledgement of the successful data

    transmission and sends the next data if no errors occurred. The transport layer creates

    packets out of the message received from the application layer. #acketizing is a process

    of dividing the long message into smaller messages.

    (I defines five classes of connection+mode transport protocols ranging from class 0

    !hich is also knon as T#0 and provides the least features$ to class D !T#D, designed

    for less reliable netorks, similar to the Internet$. "lass 0 contains no error recovery,

    and as designed for use on netork layers that provide error+free connections. "lass D

    is closest to T"#, although T"# contains functions, such as the graceful close, hich

    (I assigns to the session layer. lso, all (I T# connection+mode protocol classes

    provide expedited data and preservation of record boundaries. -etailed characteristics

    of T#0+D classes are shon in the folloing table.

    *ayer &9 ession /ayer

    The session layer controls the dialogues !connections$ beteen computers. It

    establishes, manages and terminates the connections beteen the local and remote

    61

  • 7/18/2019 CCNA & MCITP Project

    62/139

    application. It provides for full+duplex, half+duplex, or simplex operation, and

    establishes checkpointing, adjournment, termination, and restart procedures. The (I

    model made this layer responsible for gracefulclose of sessions, hich is a property of

    the Transmission "ontrol #rotocol, and also for session checkpointing and recovery,

    hich is not usually used in the Internet #rotocol uite. The session layer is commonly

    implemented explicitly in application environments that use remote procedure calls.

    *ayer (9 Presentation /ayer

    The presentation layer establishes context beteen application+layer entities, in hich

    the application+layer entities may use different syntax and semantics if the presentation

    service provides a mapping beteen them. If a mapping is available, presentation

    service data units are encapsulated into session protocol data units, and passed don the

    T"#'I# stack.

    This layer provides independence from data representation !e.g., encryption$ by

    translating beteen application and netork formats. The presentation layer transforms

    data into the form that the application accepts. This layer formats and encrypts data to

    be sent across a netork. It is sometimes called the syntax layer.

    The original presentation structure used the 3asic 5ncoding 9ules of bstract yntax

    ;otation (ne !;.:$, ith capabilities such as converting an 53"-I"+coded text file

    to an "II+coded file, or serialization of objects and other data structures from and to

    QM?.

    *ayer

  • 7/18/2019 CCNA & MCITP Project

    63/139

    This layer interacts ith softare applications that implement a communicating

    component. uch application programs fall outside the scope of the (I model.

    pplication+layer functions typically include identifying communication partners,

    determining resource availability, and synchronizing communication. &hen identifying

    communication partners, the application layer determines the identity and availability of

    communication partners for an application ith data to transmit.

    3.2 T$e TCPIP Protoco/ Arc$itecture

    T"#'I# defines a large collection of protocols that allo computers to communicate. T"#'I# defines

    the details of each of these protocols inside documents called 9e4uests for "omments !9*"$. 3y

    implementing the re4uired protocols defined in T"#'I# 9*"s, a computer can be relatively confident

    that it can communicate ith other computers that also implement T"#'I#.

    n easy comparison can be made beteen telephones and computers that use T"#'I#. ou go

    to the store and buy a phone from one of a dozen different vendors. &hen you get home and

    plug in the phone to the same cable in hich your old phone as connected, the ne phone

    orks. The phone vendors kno the standards for phones in their country and build their

    phones to match those standards. imilarly, a computer that implements the standard

    netorking protocols defined by T"#'I# can communicate ith other computers that also use

    the T"#'I# standards. ?ike other netorking architectures, T"#'I# classifies the various

    protocols into different categories or layers. Table outlines the main categories in the T"#'I#

    architectural model.

    Table >.> example of (I layers

    TCPIP Arc$itecture *ayer E;a%'/e Protoco/s

    pplication ATT#, #(#>, MT#

    63

  • 7/18/2019 CCNA & MCITP Project

    64/139

    Transport T"#, J-#

    Internet I#

    ;etork ccess 5thernet, *rame 9elay

    3.#.2 T$e TCPIP A''/ication *ayer

    T"#'I# application layer protocols provide services to the application softare running on a

    computer. The application layer does not define the application itself, but rather it defines

    services that applications needRsuch as the capability to transfer a file in the case of ATT#. In

    short, the application layer provides an interface beteen softare running on a computer and

    the netork itself. rguably, the most popular T"#'I# application today is the eb broser.

    Many major softare vendors either have already changed or are changing their softare to

    support access from a eb broser. nd thankfully, using a eb broser is easyRyou start a

    eb broser on your computer and select a ebsite by typing in the name of the ebsite, and

    the eb page appears.

    3.2.2T$e TCPIP Trans'ort *ayer

    The T"#'I# application layer includes a relatively large number of protocols, ith ATT# being

    only one of those. The T"#'I# transport layer consists of to main protocol options) the

    Transmission Control Protocol !T"#$ and the User Datagram Protocol !J-#$. The key

    difference beteen T"# and J-# is that T"# provides a ide variety of services to

    applications, hereas J-# does not. *or example, routers discard packets for many reasons,

    including bit errors, congestion, and instances in hich no correct routes are knon. s you

    have read already, most data+link protocols notice errors !a process called error detection$ but

    then discard frames that have errors. T"# provides for retransmission !error recovery$ and help

    to avoid congestion !flo control$, hereas J-# does not. s a result, many application

    64

  • 7/18/2019 CCNA & MCITP Project

    65/139

    protocols choose to use T"#. Aoever, do not let J-#s lack of services make you think that

    J-# is orse than T"#. 3y providing fe services, J-# needs feer bytes in its header

    compared to T"#, resulting in feer bytes of overhead in the netork. J-# softare does not

    slo don data transfer in cases here T"# may purposefully slo don. lso, some

    applications, notably today voice over I# !@oI#$ and video over I#, do not need error recovery,

    so they use J-#. o, J-# also has an important place in T"#'I# netorks today.

    3.2.3T$e TCPIP Internet *ayer

    The internet layer of the T"#'I# netorking model, primarily defined by the Internet Protocol

    !I#$, orks much like the postal service. I# defines addresses so that each host computer can

    have a different I# address, just as the postal service defines addressing that allos uni4ue

    addresses for each house, apartment, and business. imilarly, I# defines the process of routing

    so that devices called routers can choose here to send packets of data so that they are

    delivered to the correct destination. Bust as the postal service created the necessary

    infrastructureto be able to deliver lettersRpost offices, sorting machines, trucks, planes, and

    personnelRthe internet layer defines the details of ho a netork infrastructure should be

    created so that the netork can deliver data to all computers in the netork. I# defines logical

    addresses, calledIP addresses, hich allo each T"#'I#+speaking device !called I# hosts$ to

    have an address ith hich to communicate. I# also defines routing, the process of ho a

    router should forard, or route, packets of data.

    3.#.#T$e TCPIP Net-or Access *ayer

    The netork access layer defines the protocols and hardare re4uired to deliver data across

    some physical netork. The term network access refers to the fact that this layer defines ho to

    physically connect a host computer to the physical media over hich data can be transmitted.

    65

  • 7/18/2019 CCNA & MCITP Project

    66/139

    *or instance, 5thernet is one example protocol at the T"#'I# netork access layer. 5thernet

    defines the re4uired cabling, addressing, and protocols used to create an 5thernet ?;.

    ?ikeise, the connectors, cables, voltage levels, and protocols used to deliver data across &;

    links are defined in a variety of other protocols that also fall into the netork access layer.

    CHAPTER #

    TRAININ5 +OR,

    INTRODUCTION TO +IND+O+ E8ER 2??=

    #.1 +$y +indo-s er"er 2??= )oundation?

    &indos erver /001 *oundation is designed to meet your needs better than traditional

    Microsoft server+based solutions)

    #.1.15enera/ 'ur'ose er"er

    &indos *oundation erver provides you ith a dependable and affordable technology

    foundation for running your business applications as ell as sharing information and resources.

    3eing based on &indos erver /001, you can run not only core infrastructure, terminal

    services and identity management solutions for your business E you can support you core ?(3

    66

  • 7/18/2019 CCNA & MCITP Project

    67/139

    applications built on the simplicity and technical capabilities that &indos erver /001

    provides.

    #.1.2 Pro"ides c$anne/ con"enience

    3uying &indo erver *oundation could never be easier. &indos erver *oundation comes

    pre+installed along ith your server hardare saving you the efforts of separately procuring

    and installing the operating system on the server hardare. nd as &indos erver *oundation

    is supported by an extensive netork of trusted Microsoft partners, you can rest assured that

    your investment is reliable.

    #.1.3 Mae your first ser"er in"est%ent

    5nsuring your initial server investment is key to the success of your IT, &indos *oundation

    provides an ideal first server supporting your single+server netork. &indos erver

    *oundation can be also deployed in a variety of ays to meet your needs E providing

    flexibility. 3est of all, &indos erver *oundation is full upgradable to higher versions for

    hen your business gros E the &indos erver family gros ith you. ou can kno that

    your investment in &indos *oundation server ill ensure you data and applications ill be

    reliable, secure and provide room for you to gro as needed.

    #.1.# Editions

    &indos erver /001 tandard !I+>/ and x1=+=D$

    &indos erver /001 5nterprise !I+>/ and x1=+=D$

    &indos erver /001 -atacenter !I+>/ and x1=+=D$

    67

  • 7/18/2019 CCNA & MCITP Project

    68/139

    &indos A#" erver /001 !"odenamed 6ocrates6$ !replacing &indos "ompute

    "luster erver /00>$

    &indos &eb erver /001 !I+>/ and x1=+=D$

    &indos torage erver /001 !"odenamed 6Magni6$ !I+>/ and x1=+=D$

    &indos mall 3usiness erver /001 !"odenamed 6"ougar6$ !x1=+=D$ for small

    businesses

    &indos 5ssential 3usiness erver /001 !"odenamed 6"entro6$ !x1=+=D$ for medium+

    sized businesses!-iscontinued$

    &indos erver /001 for Itanium+based ystems

    &indos erver /001 *oundation !"odenamed 6?ima6$ !x1=+=D$ (5M only

    erver "ore is available in the &eb, tandard, 5nterprise and -atacenter editions. It is not

    available in the Itanium edition. erver "ore is simply an alternate installation option supported

    by some of the editions, and not a separate edition by itself. 5ach architecture has a separate

    installation -@-. The >/+bit version of &indos erver /001 tandard 5dition is available to

    verified students for free through Microsoft8s -ream park program.

    #.1.& yste% reuire%ents9

    ystem re4uirements for &indos erver /001 are as follos)

    Minimum for &indos erver /0019ecommended for &indos erver /001 Minimum for

    &indos erver /001 9/ 9ecommended for &indos erver /001 9/ #rocessor:CAz!I+

    >/$ or :.D CAz !x1=+=D$ or Intel Itanium // CAz or faster:.D CAz !x1=+=D processor$ or Intel

    Itanium // CAz or fasterMemoryF:/ M39M!may limit performance and some

    features$/ C3 9M or higher

    68

    http://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Random_access_memoryhttp://en.wikipedia.org/wiki/Random_access_memoryhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Random_access_memory
  • 7/18/2019 CCNA & MCITP Project

    69/139

    Maximum !>/+bit systems$) D C3 9M !tandard$ or =D C3 9M !5nterprise,

    -atacenter$

    Maximum !=D+bit systems$) 1 C3 !*oundation$ or >/ C3 9M !tandard$ or / T3

    9M !5nterprise, -atacenter and Itanium+3ased ystems$

    F:/ M3 9M Maximum) 1 C3 !*oundation$ or >/ C3 !tandard$ or / T3 !5nterprise,

    -atacenter, and Itanium+3ased ystems$@ideo adapter and monitor uper @C!100 U

    =00$uper @C !100 U =00$ or higher resolution uper @C !100 U =00$uper @C !100 U

    =00$ or higher resolution Aard drive disk free space

    Minimum !;on+*oundation >/+bit systems$) /0 C3 or greater

    Minimum !;on+*oundation =D+bit systems$) >/ C3 or greater

    *oundation) :0 C3 or greater.

    "omputers ith more than := C3 of 9M re4uire more disk space for paging,

    hibernation, and dump files

    D0 C3 or higher

    >/ C3 or greater for editions other than *oundation

    *oundation) :0 C3 or more

    "omputers ith more than := C3 of 9M re4uire more disk space for paging,

    hibernation, and dump files

    >/ C3 or greater for editions other than *oundation

    *oundation) :0 C3 or more

    69

    http://en.wikipedia.org/wiki/Super_VGAhttp://en.wikipedia.org/wiki/Super_VGA
  • 7/18/2019 CCNA & MCITP Project

    70/139

    "omputers ith more than := C3 of 9M re4uire more disk space for paging,

    hibernation, and dump files

    #.1.( 7ENE)IT)

    5nterprise+class) + Improve performance and scale capacity more efficiently to run your

    largest orkloads hile enabling robust recovery options to protect against outages.

    imple and cost+effective)+ -eliver multi+tenant+aare storage and netorking multi+

    tenancy capabilities for storage and netorking on lo+cost, industry+standard

    hardare.

    pplication focused) + &ith enhanced support for open frameorks, you can build,

    deploy, and scale applications and ebsites ith more flexibility by unlocking

    application portability beteen on+premises environments and public and service

    provider clouds.

    Jser+centric) + -eploy a virtual desktop infrastructure and loer storage costs

    significantly using a broad range of storage options and @A- -5 duplication.

    #.2 HO+ TO INTA** +INDO+ ER8ER 2??=

    Installing &indos erver /001 is pretty straightforard and is very much like installing

    &indos @ista, but I thought I8d list the necessary steps here for additional information. *or

    those of you ho have never installed @ista before, the entire installation process is different

    than it used to be in previous Microsoft operating systems, and notably much easier to perform.

    Table D.:ystem re4uirements for &indos erver /001 are as follos)

    70

  • 7/18/2019 CCNA & MCITP Project

    71/139

    Mini%u% for

    +indo-s er"er

    2??=

    Reco%%ended for

    +indo-s er"er

    2??=

    Mini%u% for

    +indo-s er"er

    2??= R2

    Reco%%end

    ed for

    +indo-s

    er"er 2??=

    R2

    Processor : CAz !I+>/$ or

    :.D CAz !x1=+=D$

    or Intel Itanium /

    / CAz or faster

    :.D CAz !x1=+=D

    processor$ or Intel

    Itanium /

    Me%ory F:/ M3 9M

    !may limit

    performance and

    some features$

    / C3 9M or

    higher

    Maximum !>/+

    bit systems$)

    D C3 9M

    !tandard$ or

    =D C3 9M

    !5nterprise,

    -atacenter$

    Maximum !=D+

    bit systems$)

    1 C3

    !*oundation$ or

    >/ C3 9M

    !tandard$ or

    / T3 9M

    !5nterprise,

    F:/ M3 9M Maximum) 1

    C3

    !*oundation$

    or >/ C3

    !tandard$ or

    / T3

    !5nterprise,

    -atacenter,

    and Itanium+

    3ased

    ystems$

    71

  • 7/18/2019 CCNA & MCITP Project

    72/139

    -atacenter and

    Itanium+3ased

    ystems$

    Hard

    dri"e dis

    free s'ace

    Minimum

    !;on+

    *oundation >/+

    bit systems$)

    /0 C3 or

    greater

    Minimum

    !;on+

    *oundation =D+

    bit systems$)

    >/ C3 or

    greater

    *oundation) :0

    C3 or greater.

    "omputers

    ith more than

    := C3 of 9M

    D0 C3 or higher >/ C3 or greater

    for editions other

    than *oundation

    *oundation) :0

    C3 or more

    "omputers ith

    more than := C3

    of 9M re4uire

    more disk space

    for paging,

    hibernation, and

    dump files

    72

  • 7/18/2019 CCNA & MCITP Project

    73/139

    re4uire more

    disk space for

    paging,

    hibernation,

    and dump files

    #.2. PROCEDURE TO INTA** +INDO+ ER8ER 2??=

    :. Insert the appropriate +indo-s er"er 2??= insta//ation %ediainto your -@- drive. If

    you don8t have an installation -@- for &indos erver /001, you can donload one for

    free from Microsoft8s &indos /001 erver Trial ebsite

    73

  • 7/18/2019 CCNA & MCITP Project

    74/139

    *igureD.: displaying indo loading file

    /. 9eboot the computer The install indo izard appears as shon in figure

    >. elect the language for installation /an6ua6e and other regional options, make your

    selection and press Ne;t.

    74

    http://www.petri.co.il/images/core_inst_1.gif
  • 7/18/2019 CCNA & MCITP Project

    75/139

    V

    *igure D./ displaying the install indo izard

    D. ;ext, press Insta// No- to begin the installation process.

    *igure D.> displaying the install indo page

    75

    http://www.petri.co.il/images/core_inst_3.gifhttp://www.petri.co.il/images/core_inst_2.gif
  • 7/18/2019 CCNA & MCITP Project

    76/139

    F. "lick the install no button to star the installation process of &indo erver /001.type the

    product key for the activation page appears

    *igure D.D displaying the type your product key for activation page

    =.If you do not have the #roduct I- available right no, you can leave the box empty, and click

    ;ext. ou ill need to provide the #roduct I- later, after the server installation is over. #ress

    ;o.

    *igure D.F displaying the type your product key for activation page

    76

    http://www.petri.co.il/images/core_inst_5.gifhttp://www.petri.co.il/images/core_inst_4.gif
  • 7/18/2019 CCNA & MCITP Project

    77/139

    =. 3ecause you did not provide the correct I-, the install