mcse lessons
TRANSCRIPT
-
8/3/2019 MCSE Lessons
1/55
Bashir Ahmad Noori Presents 1
MCSE (Microsoft Certified System Engineer)
1. This course is designed keeping in view to requirements for a Network System
Engineer or Administrator, so by learning this course you can get a job like
Network Operation Manager, Network Administrator or Network Engineer.
1. WINDOWS SERVER 2003 (Operating System)
2. NETWORK INFRASTRUCTURE OF WINDOWS SERVER 2003
3. BASIC NETWORKING CONCEPTS
4. DEVICES USED FOR NETWORKING AND INTERNETWORKING
5. CREATING A WORK GROUP Type Network
6. CREATING DOMAIN TYPE Network
====================================================
Operating System: Computer industry is divided into two main categories.
1. HARDWARE
2. SOFTWARE
Hardware means that, the manufacturing of Computer and the Repairing of
Computer. Means that we deal with the physical parts of the computers. While
Software is a term which is use to operate the computer or link the different parts
of computer will each other to make one computer. The Software part is divided
into followings:
1. System Software
2. Application Software
-
8/3/2019 MCSE Lessons
2/55
Bashir Ahmad Noori Presents 2
3. CAD (Computer Aided Design)
System Software are those program which are use to operate the computer or by
using which we can develop the application software. So System Software is
further divided into two categories.
1. Operating Systems
2. Languages of Computers
Operating System:
A System Software which is use to links different parts of computers, and transfer
the require sub software in the memory of computer to make the different parts of
computer active, like mouse, key board hard disk, monitor, these sub software arecalled device drivers, and then provide us a way for Further working.
Explanation:
When ever we turn on our computer, the first process after switching on the
computer is called POST ( Power on Self Test ) , In this process computer will
check all the internal and external parts if there is any problem in any part
computer display the message in shape of text or by visual like beeps, After the
post process the operating system started the work, of linking different parts of
computer with each other through different mediums like cables or wires or
interface, after that operating system will transfer the driver program for each
device internally or externally attached with the computer. After drivers are the
program provided by the manufacturer of the device. After transformation of the
Device Drivers
The operating System load the GUI (Graphics User Interface) Screen for further
working. The Common Operating System we use are .
1. Windows NT Family (Windows Server 2003)
2. UNIX Operating System
3. LINUX (Operating System)
4. VMS (For Main Frame Type Computers) Operating System.
-
8/3/2019 MCSE Lessons
3/55
Bashir Ahmad Noori Presents 3
Windows Server 2003:
Normally it contains a Program Manager when loaded; this program manager is
divided into two main parts.
1. Desktop Area
2. Task Bar and Start Menu
This is the original GUI of the Windows Server 2003. Different Operations can be
performing at the same time in the Windows. This is because of the fast memorymanagement, memory management means that the Window Server 2003 is
multitasking and multi-user system. First when we open a task in the windows it
will transfer this task to memory and then the memory transfer it as an image to the
monitor screen, so when we open the next task suddenly then the first task will
deleted from the memory but remain its image on screen and when we click on the
screen the task will be again transfer to memory.
1. Installation of the Windows on Computer.
At Least we need Pentium III computer, with 500 MMX Processor, with 256
MB of RAM and 10 GB Hard disk Space.
Installation means that copy the files of the operating system in the computer hard
disk and then make them active, different types of installations are provided for
Server 2003 operating System.
1. Manual Installation
2. Automatic Installation
3. Remote Installation
-
8/3/2019 MCSE Lessons
4/55
Bashir Ahmad Noori Presents 4
4. Unattended Installation.
The Windows Server 2003 Installation is quite different from the Windows XP
Installation, in the Windows Server 2003 Installation we need to configure the
networking criteria for our Computer, and set the number of clients ( if our
computer is a Server Computer ) then setup the options for the Workgroup or
Domain Type Networking Structure.
Server: A Server is a technology by using we can deploy our data from one device
to other device. A Server is also a main computer in a network which controls all
the clients computer.
How to Install the Windows Server 2003 in Computer.
1. Insert the CD of windows Server 2003 in CD Drive
2. The Boot from CD Drive Option will display after the Post process completed
3. Press Any Key to accept the Boot from CD.
4. The Windows SERVER 2003 Standard Setup will be started.
5. The First Screen of the Windows Setup will copy the Hardware information of
your computer into the memory.
6. After loading all the devices and driver information, the Setup Welcome Screen
will display
7. Here you will see three options
8. Enter to Continue
9. R to Repair
10. F3 to Quit from the Setup Screen.
11. Even we want to install first time or we want to repair the windows press Enter
Key
12. The Windows Server License Screen will be display this is an agreement
-
8/3/2019 MCSE Lessons
5/55
Bashir Ahmad Noori Presents 5
provided by the Microsoft, and contains the term and conditions of using the
Windows Server 2003. Here Press F8 Key to accept the agreement.
13. the Next screen display the status of the current window installed in your
computer, now here if you want to repair the window press r, if you want to install
new window press Esc (Escape Key) which do not Repair
14. The Hard Disk Partitioning Screen will display, which shows the different
partitions already, exists in your hard disk.
15. First we will delete all old partition and then create the new partitions
16. Select the Partition, which you want to delete and press D from the key board.
17. The Partition deletion information screen will display which shows the text thatwhat will happen when we delete the partition. Here Press Enter Key to continue if
you want to delete partition or Esc to cancel the deletion process.
18. The next screen will be the confirmation screen for deleting the partition press
L to confirm to delete the selected partition.
19. The partition will be deleted, do the same steps for other partition to delete.
20. After deleting all the partition, we will re create the partition we will check how
much space of total hard disk we have.
21. We can set the partition size in the percentage, for example we want to set the
C Drive Space to 50% and remaining 50% to D drive,
22. Press C to create a Partition, The Total Space of hard disk will display in the
partition screen, delete the space, and type the space like 6500 (Half of a 13 GB
Hard Disk Space), and Press Enter Key to create the Partition.
23. Now to create new partition, select the un- partition space from the screen and
press C, Enter to accept the New Partition the Partition will be created, now we will
format our partition where we want to install the windows, so select the first
partition also called primary disk partition or C drive and press enter to start the
formatting process, Formatting is a process to create track and sectors on hard
disk where our data will store in a sequence, as first time our hard disk is like a
-
8/3/2019 MCSE Lessons
6/55
Bashir Ahmad Noori Presents 6
white paper and computer it self does not identify the actual space of the hard disk,
so we perform the formatting process to convert this white space with the
measurable space.
With the formatting computer will create first Track 0, which contains a sector
(sector 0) which has the complete information about the boot record of the hard
disk the bootable files of windows and the directory structure of the file, This sector
is called boot sector is our hard disk damage so it means that boot sector is
damage. This is the first path where we enter our data in our hard disk. Every time
formatting the Hard Disk will damage the Hard Disk so keep in mind that less
formats the hard disk.Press Enter Key to continue the Installation.
The format Options will display.
1. We have two types of format process.
1. FAT (File Allocation Table) Type Format
2. NTFS (New Technology File System).
FAT was insecure and covering a lot of space during the data storage on hard
disk, while the NTFS is only cover the actual data space on hard disk and very fast
and secure system for creating the Directory Structure on Hard Disk.
There are two methods provided to format the hard disk.
1. Normally Format
2. Quick Format
If you are formatting you hard disk first time then use the normal format option and
if your hard disk is already formatted before so use the quick format option and
-
8/3/2019 MCSE Lessons
7/55
Bashir Ahmad Noori Presents 7
click on Enter.
The formatting will be started and after the formatting, the computer will copy the
windows files to continue the installation it make a temporary folder transfer the
files from CD the hard disk and then from hard disk to memory.
After the transformation of the files, computer will restart and the GUI Setup
Screen will display.
A graphical screen with different controls like text box, like combo box and
command buttons to perform an operation required by us is called a GUI Screen.
In the TEXT Base Setup Screen, the Collecting of Information, Dynamic Updatesand Preparing Installation options are completed, now just the Installing window
and Finalizing Installation option will completed in this screen with in 39 minutes.
When the installation remaining time is 33, windows setup screen will display,
Here you can set the language option, Click on Next command button, Then
Screen
Will ask the COMPUTER NAME and Organization Name type the names and Click
on Next and then type the CD Key provided to you. This is the products key,
Type the product key and clicks on next command button.
WHAT IS NETWORKING?
Networking is the way for transformation of information from one computer to
other
Computer by means of using the network mediums like, NIC (Network Interface
Card), Modem (Modular De modular Device), Cables, Switch, Hub, Routers, B-
routers, Bridges and VSAT technologies.
Networking provides the principles and methods for this connectivity is called
protocols.
-
8/3/2019 MCSE Lessons
8/55
Bashir Ahmad Noori Presents 8
A Protocol is a set of rule which is use to make the information identification during
the transmission from one NIC to other NIC. So Every Network Card is a standard
of IEEE (Institute of Electrical and Electronic Engineers). This institute is in USA
which is responsible to test any new engineer device and after the satisfaction of
the test the IEEE permit the manufacturer to release the copies of this device in
the Market.
The NIC standard is Ethernet. The minimum speed of transformation of information
of this device is 10 mbps (Mega Bytes per seconds) and maximum is 100 mbps. If
you NIC card or your connection showing the 100 mbps speed it means that
connection is ok.
How the information transfer from one computer to other computer?
1. Every computer must contain a NIC card, and this card has a port, a port is the
way of connecting the computer with the network mediums like cables. Each cable
has a connector or jack for Local Network, we use commonly RJ45 (Register Jack
45) or RJ11 (Register Jack 11) and we put these connectors to the port of one
computer.
2. Through the cables data will be transfer means send or receive,
3. When we send a data from a network computer, the computer memory transfer
the data into network card memory,
4. Then network card uses the protocol according to the network connection, the
data will be converted into small pieces, and these pieces are called data packets,
and then these data packets are converted to electric signals, and when the
receiver computer receive the information, the NIC card again convert the signals
to the packets and the packets to the original form of data.
5. In the old days the network was not so powerful and only a single method of
networking was used, as the networking is developed in 1960s, and there was not
switch or hub device so the method was peer to peer, means when they send the
-
8/3/2019 MCSE Lessons
9/55
Bashir Ahmad Noori Presents 9
information each computer receive the information, but now a days we transform
the data indirectly by using the hub and switch type devices, that data transfer from
NIC through Cables to the switch, and switch make analysis upon data that this
data is related to which port and then it transfer to only specific computer.
6. If we are sending data to other computer and that computer also busy to
receive some other computer data, then our data will wait to send. And when the
computers free the data will display.
7. In the Windows Server Family, we have two methods for network connectivity.
1. WORKGROUP
2. DNS (DOMAIN NAME SERVICE) SERVER.
We need the following devices to make the network.
1. Peer to Peer Networking: Cables, connectors, NIC card and Computers
crimpling Tools.
2. Client/Server Networking: Cables, Hubs/Switches, Connectors, Cables, NIC
Card, Crimpling Tools and Computers.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)
3. MAN (Metropolitan Area Networking).
LAN (Local Area Network):
The range of this network is within a building, and different rooms of the building
will connected to different computers. One computer can handle all the clients
computers and the entire client must work under the server or main computer.
-
8/3/2019 MCSE Lessons
10/55
Bashir Ahmad Noori Presents 10
Network cabling:
What is network cabling?
Cable is a medium through which information usually moves from one network
device to another. There are several types of cable, which are commonly used with
LANs. In some cases, a network will utilize only one type of cable, other networks
will use a variety of cable type of cable for network is related to the networks
topology, protocol and size. Understanding the characteristic of different types of
cable and how they relate to other aspects of network is necessary for
development of a successful network.
The following sections discuss the types of cables used in network and other
related topics.
Unshielded Twisted pair (UTP) cable
Shielded Twisted pair (STP) cable
Coaxial cable
Fiber optic cable
Unshielded Twisted pair (UTP) cable:
Twisted pair cabling comes in two varieties: shielded and unshielded.
Unshielded twisted pair (UTP) is the most popular and is generally the best option
for school networks (see fig .1)
Figure 1.
The quality of UTP may vary from telephone grade wire to extremely high speed
cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with
a different number of twists per inch to help eliminate interference from adjacent
pair and other electrical devices. The tighter the twisting, the higher the supported
transmission rate and the greater the cost per foot. The EIA/TIA (electronic
-
8/3/2019 MCSE Lessons
11/55
Bashir Ahmad Noori Presents 11
industry association /telecommunication industry association) has established of
UTP and rated five category of wire.
Type Use
Category 1 Voice
Category 2 Data to 4Mbps (local talk)
Category 3 Data to 10Mbps ( Ethernet)Category 4 Datato20Mbps(16 Mbps token ring)
Category 5 Data to 100 Mbps (fast Ethernet)
Buy the best cable you can afford; most school purchase category 3 or category 5.
if you are designing a 10 Mbps Ethernet network and are considering the cost
saving of buying category 3 wire instead of category 5 , remember that the
category 5 cable will provide more room to grow as transmission technologiesincrease. Both category 3 and category 5 UTP have a maximum segment length of
100 meters. In Florida category 5 cable is required for retrofit grants. 10Base T
refers to the specifications for unshielded twisted pair cable (category 3, 4 or 5)
carrying Ethernet signals. Category 6 is relatively new and is used for gigabit
connections.
Unshielded Twisted pair connector:
The standard connector for unshielded twisted pair cabling is an RJ-45 connector.
This is a plastic connector that looks like a large telephone-style connector (see
figure 2).
A slot allows the RJ-45 to be inserted only one way RJ stand for registered jack ,
implying that the connector follows a standard borrowed from the telephone
industry . This standard designates which wire goes with each pin inside the
connector.
Figure 2.
Shielded twisted pair (STP) cable:
-
8/3/2019 MCSE Lessons
12/55
Bashir Ahmad Noori Presents 12
A disadvantage of UTP is that it may be susceptible to radio and electrical
frequency interference. Shielded twisted pair (STP) is suitable for environments
with electrical interference; however, the extra shielding can make the cables quite
bulky. Shielded twisted pair is often used on networks using Token Ring topology.
Coaxial cable:
Coaxial cabling has a single copper conductor at its center. A plastic layer provides
insulation between the center conductor and braided metal shield (see figure .3).
The metal shield helps to block any outside interference from fluorescent lights,
motors, and other computers.
Figure 3.
Although coaxial cabling is difficult to install, it is highly resistant to signal
interference. In addition, it can support greater cable lengths between network
devices than twisted pair cable. The two types of coaxial cabling are thick coaxial
and thin coaxial.
Thin coaxial cable is also referred to as thin net.10Base 2 refers to the
specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the
approximate maximum segment length being 200 meters. In fact, the maximum
segment length is 185 meters. Thin coaxial cable is popular in school networks,
especially linear bus networks.
Thick coaxial cable is also referred to as thick net. 10Base 5 refers to the
specification for thick coaxial cable carrying Ethernet signals. The 5 refers to
maximum segment length being 500 meters. Thick coaxial cable has an extra
protective plastic cover that helps keep moisture away from the center conductor.
This makes thick coaxial a great choice when running longer lengths in linear bus
networks. One disadvantage of thick coaxial cable is that it does not bend easily
and difficult to install.
-
8/3/2019 MCSE Lessons
13/55
Bashir Ahmad Noori Presents 13
Coaxial cable connector
The most common type of connector used with coaxial cable is the bayone-neill-
concelman (BNC) connector (see figure.4). Different type of adapters is available
for BNC connector, including a T-connector, barrel connector, and terminator.
Connectors on cable are the weakest points in any network. To help avoid
problems with your network, always use the BNC connectors that crimp, rather
than screw, onto the cable.
Fiber optic cable:
Fiber optic cabling consists of a center glass core surrounded by several layers of
protective materials (see figure .5). it transmits light rather than electric signals
eliminating the problem of electrical interference . This makes it ideal for certain
environments that contain a large amount of electrical interference. it has also
made it the standard networks between buildings , due to its immunity to the
effects to moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances
than coaxial and twisted pair. It also has capability to carry information at vastly
greater speeds. This capacity broadens communication possibilities to include
services such as video conferencing and interactive services . this cost of fiber
optic cabling is comparable to copper cabling however, it is more difficult to install
and modify . 10BaseF refers to the specification for fiber optic cable carrying
Ethernet signals.
-
8/3/2019 MCSE Lessons
14/55
Bashir Ahmad Noori Presents 14
Fact about fiber optic cables:
Outer insulating jacket is made of Teflon or PVC.
Kevlar fiber helps to strengthen the cable and prevent breakage.
A plastic coating is used to cushion the fiber center.
Center (core) is made of glass plastic fibers.
Fiber optic connector:
The most common connector used with fiber optic cable is an ST connector. It isbarrel shaped, similar to a BNC connector, a newer connector; the SC is becoming
more popular. it has squared face and easier to connect in a confined space.
Ethernet cable summary
Specification Cable type Maximum length
10BaseT Unshielded twisted pair 100 meters
10Base2 Thin coaxial 185 meters
10Base5 Thick coaxial 500 meters
10BaseF Fiber optic 2000 meters
100BaseT Unshielded twisted pair 100 meters
100BaseTX Unshielded twisted pair 220 meters
HOW TO MAKE YOUR OWN CAT 5 TWISTED-PAIR NETWORK CABLES
INTRODUCTION. The purpose of this article is to show you how to make the two
kinds of cables which can be used to network two or more computers together to
form quick and simple home or small office local area networks (LANs). These
-
8/3/2019 MCSE Lessons
15/55
Bashir Ahmad Noori Presents 15
instructions can also be used to make patch cables for networks with more
complex infrastructure wiring.
The two most common unshielded twisted-pair (UTP) network standards are the10
MHz 10BASE-T Ethernet and the 100Mhz 100BASE-TX Fast Ethernet. The
100BASE-TX standard is quickly becoming the predominant LAN standard. If you
are starting from scratch, to build a small home or office network, this is clearly the
standard you should choose. This article will show you how
to make cables, which will work with both standards.
LANS SIMPLIFIED. A LAN can be as simple as two
computers, each having a network interface card (NIC) or
network adapter and running network software, connected
together with a crossover cable.
The next step up would be a network consisting of three or more computers and a
hub. Each of the computers is plugged into the hub with astraight-thru cable
(the crossover function is performed by the hub).
NETWORK CABLE AND CONNECTORS
There are several classifications of cable used for twisted-pair networks. I'll skip
right over them and state that I use and recommend Category 5 (or CAT 5)
cable for all new installations. Likewise, there are several fire code
classifications for the outer insulation of CAT 5 cable. I use CMR cable, or
"riser cable," for most of the wiring I do. You should also be aware of CMP or
plenum cable (a plenum is used to distribute air in a building). You may be
required by local, state or national codes to use the more expensive plenum-
jacketed cable if it runs through suspended ceilings, ducts, or other areas, if they
-
8/3/2019 MCSE Lessons
16/55
Bashir Ahmad Noori Presents 16
are used to circulate air or act as an air passage from one room to another. If in
doubt, use plenum. CMR cable is generally acceptable for all applications not
requiring plenum cable.
CAT 5 wire is available in reel-in-box packaging. This is very handy for pulling the
wire without putting twists in it. Without this kind of package or a cable reel stand,
pulling wire is a two-person job. Before the advent of the reel-in-box, we used to
put a reel of wire on a broom handle to pull it. One person would hold the broom
handle and the other would pull and measure the cable. You will produce a
tangled mess, if you pull the wire off the end of the reel.
Stranded wire patch cables are often specified for cable segments running from a
wall jack to a PC and for patch panels. They are more flexible than solid core
wire. However, the rational for using it is that the constant flexing of patch cables
may wear-out solid core cable--break it. I do not think this is a real concern in the
average small network. For example, I have one solid core cable going to my
work bench. It has probably flexed and average person's lifetime of flexes from
the many times I have connected customer computers to my network. Also,
stranded cable is susceptible to degradation from moisture infiltration, may use an
alternate color code, and should not be used for cables longer than 3 Meters
(about 10 feet).
Most of the wiring I do simply connects computers directly to other computers or
hubs. Solid core cable is quite suitable for this purpose and for many home and
small business networks. I find it also quite acceptable for use as patch cables.
You might consider stranded wire patch cables if you have a notebook computer
you are constantly moving around.
CAT 5 cable has four twisted pairs of wire for eight individually insulated wires.
Each pair is color coded with one wire having a solid color (blue, orange, green, or
brown) twisted around a second wire with a white background and a stripe of the
same color. The solid colors may have a white stripe in some cables. Cable
-
8/3/2019 MCSE Lessons
17/55
Bashir Ahmad Noori Presents 17
colors are commonly described using the background color followed by the color of
the stripe; e.g., white-orange is a cable with a white background and an orange
stripe.
CONNECTORS. The straight through and crossover patch cables
discussed in this article are terminated with CAT 5 RJ-45 modular
plugs. RJ-45 plugs are similar to those you will see on the end of
your telephone cable except they have eight versus four or six
contacts on the end of the plug and they are about twice as big. Make sure they
are rated for CAT 5 wiring. (RJ means "Registered Jack"). In addition, there are
RJ-45 plugs designed for both solid core wire and stranded wire. Others are
designed specifically for one kind of wire or the other. Be sure you buy plugs
appropriate for the wire you are going to use. I use plugs designed to
accommodate both kinds of wire.
COLOR-CODE STANDARDS
Again, please bear with me... Let us start with simple pin-out diagrams of the two
types of UTP Ethernet cables and watch how committees can make a can of
worms out of them. Here are the diagrams:
Note that the TX (transmitter) pins are connected to corresponding RX (receiver)
pins, plus to plus and minus to minus. And that you must use a crossover cable to
-
8/3/2019 MCSE Lessons
18/55
Bashir Ahmad Noori Presents 18
connect units with identical interfaces. If you use a straight-through cable, one of
the two units must, in effect, perform the cross-over function.
Two wire color-code standards apply: EIA/TIA 568A and EIA/TIA 568B.The codes
are commonly depicted with RJ-45 jacks as follows (the view is from the front of
the jacks):
If we apply the 568A color code and show all eight wires, our pin-out looks like:
this.
Note that pins 4, 5, 7, and 8 and the blue and brown pairs are not used in either
standard. Quite contrary to what you may read elsewhere, these pins and wires
are not used or required to implement 100BASE-TX duple Xing--they are just plain
wasted.
However, the actual cables are not physically that simple. In the diagrams, the
orange pair of wires are not adjacent. The blue pair is upside-down. The right
ends match RJ-45 jacks and the left ends do
not. If, for example, we invert the left side of
the 568A "straight"-thru cable to match a
568A jack--put one 180 twist in the entire
-
8/3/2019 MCSE Lessons
19/55
Bashir Ahmad Noori Presents 19
cable from end-to-end--and twist together and rearrange the appropriate pairs, we
get the following can-of-worms:
This further emphasizes, I hope, the importance of the word "twist" in making
network cables which will work. You cannot use a flat-untwisted telephone cable
for a network cable. Furthermore, you must use a pair of twisted wires to connect
a set of transmitter pins to their corresponding receiver pins. You cannot use a
wire from one pair and another wire from a different pair.
Keeping the above principles in mind, we can simplify the diagram for a 568A
straight-thru cable by untwisting the wires, except the 180 twist in the entire
cable, and bending the ends upward. Likewise, if we exchange the green and
orange pairs in the 568A diagram we will get a simplified diagram for a 568B
straight-thru cable. If we cross the
green and orange pairs in the 568A
diagram, we will arrive at a simplified
diagram for a crossover cable. All three
are shown below.
LET'S MAKE IT SIMPLE
There are only two unique cable ends in the
preceding diagrams. They correspond to the
568A and 568B RJ-45 jacks and are shown to the
right.
Again, the wires with colored backgrounds may
have white stripes and may be denoted that way in diagrams found elsewhere.
-
8/3/2019 MCSE Lessons
20/55
Bashir Ahmad Noori Presents 20
For example, the green wire may be labeled Green-White--I do not bother. The
background color is always specified first.
Now, all you need to remember, to properly configure the cables, are the diagrams
for the two cable ends and the following rules:
A straight-thru cable has identical ends.
A crossover cable has different ends.
It makes no functional difference which standard you use for a straight-thru cable.
You can start a crossover cable with either standard as long as the other end is the
other standard. It makes no functional difference which end is which. Despite
what you may have read elsewhere, a 568A patch cable will work in a network with
568B wiring and 568B patch cable will work in a 568A network. The electrons
couldn't care less.
My preference is to use the 568A standard for straight-thru cables and to start
crossover cables with a 568A end. That way all I have to remember is the diagram
for the 568A end, that a straight-thru cable has two of them, and that the green and
orange pairs are swapped at the other end of a crossover cable.
LET'S MAKE SOME CABLES
1. Pull the cable off the reel to the desired length and cut. I have a box of cable at
one end of my shop and a mark on the floor 10' away. For cable lengths,
which are a fraction of ten feet, I eyeball the length as I pull the cable out
of the box (also, my feet are about one foot long). For longer cables, I pull
it out to the ten-foot mark, go back to the box, and pull the remaining
fraction or another ten
-
8/3/2019 MCSE Lessons
21/55
-
8/3/2019 MCSE Lessons
22/55
Bashir Ahmad Noori Presents 22
RJ-45 plug is crimped on.. Flatten again. There should be little or no space
between the wires.
6. Hold the RJ-45 plug with the clip facing down or away from you. Push the wire
firmly into the plug. Now, inspect the darn thing... before crimping and
wasting the plug! Looking through the bottom of the plug, the wire on the far left
side will have a white background. The wires should alternate light and dark from
left to right. The furthest right wire is brown. The wires should all end evenly at
the front of the plug. The jacket should end just about, where you see it in the
diagram--right on the line. Aren't you glad you did not crimp the plug?
Network technology point to-point data links
These are the most basic data communications links. Ex:
Virtually all computers support such data links, using
their so-called serial ports. Typically, these ports areable to operate at any standard bit rate between 300 bps and 230400bps.
The most common hardware interface standard used in such data links is called
RS232. In fact, a connection may be direct or may use a modem.
Modems
A modem allows a point-to-point data link to be carried over the analog telephonesystem (PSTN, also called POTS, or plain old telephone system), thus:
The modem can:
-
8/3/2019 MCSE Lessons
23/55
Bashir Ahmad Noori Presents 23
Dial the telephone number of another modem under the program control, or
answer the phone.
Negotiate a connection at the highest common bit rate that each modem can
support
Perform on the fly data compression
Perform (under some conditions) error detection and correction.
How to make cross cable or p2p cable:
With cat 5 cables we can easily make a cross cable, cross cable is used for
interconnecting of two pc with windows 98/me/xp or other windows. here are show
the ranging of color below:
The first side of the cable:
White orange, orange
White green, blue
White blue, green
White brown , brown
On the other side of the cable:
White green , green
White orange , blue
White blue , orange
White brown , brown
What is protocol?
-
8/3/2019 MCSE Lessons
24/55
Bashir Ahmad Noori Presents 24
Networking Protocols: A Protocol is a rule, method, or principle, which uses the
Network Interface card to transfer the data from one computer to other computer.
The two computers, which are connected with each other, must have same or
compatible protocol. The most common protocol for LAN (Local Area Network)
System connectivity is TCP/IP (Transmission Control Protocol) / Internet Protocol,
which is the standard by IEEE Institute of Electronics and Electrical Engineering.
The protocol provides an address to connect form one computer to other, and this
address is called IP Address (Internet Protocol) address, so the IP address are
always unique. Different ways are provided to set the IP Address the most
common use is the manually or using DHCP (Dynamic Host ConfigurationProtocol) Server. The DHCP Server provides and automatic IP address inside the
networking zone.
Normally in a small network, we can manually or through the remote desktop
facility change the IP Address.
Every thing we can access from a network possible through the IP address.
What is IP (internet protocol) address?
The data transformation is depending upon the protocol, which are the rules and principles
we define to make a same environment for the sender and receiver computer. If the twocomputers are using the different protocols then the data transmission is not possible by
simple ways. The main protocol for wan and LAN type networks are called TCP/IP,
Transmission Control protocol/ Internet protocol. These protocols generate the unique
address to access the computer or make the communication between the computers. These
IP address are divided into three categories
-
8/3/2019 MCSE Lessons
25/55
Bashir Ahmad Noori Presents 25
Class A Addresses: 127.0.0.0 (satellite connection) or ISP (MAN)
Class B addresses: 128.0.0.0 (ISP) Internet Service Provider Company (MAN)
Class C Addresses: 192.0.0.0 (LAN and WAN)
Step1: Create the cross through cable and connect its one end to computer NIC port and
second to the switch or hub port.
Then we will set the IP addresses for both computers.
1. On the Desktop double click on the My Network Places Folder
2. Click on View Network Connections
3. The connection will display if you see a lock on the connection turn off the windows
firewall option from the control pane.
4. right mouse click on the connection and click on properties
5. Select the Internet protocol TCP/IP
6. Click on Properties command button
7. and check on use the following IP address
8. In the IP address type your IP address
9. In the Subnet mask computer will display the end range of that IP address.
10.Click on OK
11.Click on OK
12.the IP Address will be set
13.Now to check the Internet protocol configuration use the (IPCONFIG) for short
configuration, and if you are using the domain controller then you can see detail
information like you domain name, IP address the subnet and so on.
-
8/3/2019 MCSE Lessons
26/55
Bashir Ahmad Noori Presents 26
14. In the run command type CMD
15. type (IPCONFIG) or (IPCONFIG/ALL)
16. If we want to check the connection of other computer with this computer, we will
use the ping command.
17.If the domain is installed in our computer then we use the (NSLOOKUP) command
What is workgroup and how to make it?
Work Group is a small type LAN Network not support much computers, and the
security option of the work group computer is not much higher then a Windows server
2003 operating system.
We can add the clients to our workgroup computer.
1. Move to the client computer
2. Right mouse click on the My Computer Folder
3. Click on Properties
4. and select the computer name tab
5. click on change command button
6. and type the same name of the workgroup you set it in the server computer
7. click on ok
8. then restart the computer
9. After log on it will be added to the server and the server will added to the client.
If we want to open the other computer link, we must know the user name and the password
of that computer.
How to check list of computer connected in the workgroup?
In the My Network Places folder double
-
8/3/2019 MCSE Lessons
27/55
Bashir Ahmad Noori Presents 27
Click on View workgroup Computer
Centralized vs. Client/Server Computing
early networks were based on the centralized-computing model. Usually, in these
networks, one large server (a mainframe computer) handled all aspects of the
network, while each user accessed the main server from a terminal. Because the
centralized computer handled all the high-level computing chores, the terminals
were typically inexpensive, low-performance computers. Today, thanks to
improvements stemming from the rapid evolution of the personal computer, the old
centralized model is being replaced with the client/server model. Today's users
have the full power of a mainframe computer at their fingertips, with the added
advantage of an interconnected network.
Centralized Computing
In the traditional mainframe environment, an application such as a database runs
on a large and powerful centralized mainframe computer and is accessed by
terminals. The terminal sends a request for information to the mainframe
computer; the mainframe retrieves the information and then displays it on the
terminal.
The entire database travels from the server across the network and is downloaded
to the client that made the request. The file access takes place through the
network operating system (NOS) and the cable. There is very little coordination
between the terminal and the mainframe. The data is processed on the mainframe
and then delivered to the terminal. The data transfer between the terminal and the
mainframe increases network traffic and slows down requests from other
terminals.
Client/Server computing
the term "client/server computing" refers to the process by which data processing
chores are shared between the client computer and the more powerful server
computer. Figure 8.9 shows a simple client/server network with one server, three
clients, and a printer.
-
8/3/2019 MCSE Lessons
28/55
Bashir Ahmad Noori Presents 28
The client/server approach can benefit any organization in which many people
need continual access to large amounts of data.
The client/server network is the most efficient way to provide:
Database access and management for applications such as spreadsheets,
accounting, communications, and document management.
-
8/3/2019 MCSE Lessons
29/55
Bashir Ahmad Noori Presents 29
Network management.
Centralized file storage.
Client/Server-Model Overview
Most networks operate in the client/server model, also referred to as "server-based
networking." A client workstation makes a request for data that is stored on a
server. The client workstation processes the data using its own CPU. Data-
processing results can then be stored on the server for future use. The data can
also be stored on the client workstation and accessed by other client workstations
on the network. In peer-to-peer networks, where there is no central server, each
client workstation acts as both client and server.
The Client
The user generates a request at the front end. The client runs an application that:
Presents an interface to the user.
Formats requests for data.
Displays data it receives from the server.
In a client/server environment, the server does not contain the user-interface
software. The client is responsible for presenting the data in a usable form. The
user enters instructions from the client computer. The client computer prepares the
input for the server. The client computer sends a request for specific information
across the network to the server. The server processes the request, locatesthe appropriate information, and sends it back across the network to the client. The
client computer then feeds the information to the interface, which presents the
information to the user. The client computer can also process the information
further, using its own CPU and software.
The Server
-
8/3/2019 MCSE Lessons
30/55
Bashir Ahmad Noori Presents 30
The server in a client/server environment is usually dedicated to storing and
managing data. This is where most of the actual database activity occurs. The
server is also referred to as the back end of the client/server model because it
fulfills the requests of the client. The server receives the structured requests from
the clients, processes them, and sends the requested information back over the
network to the client.The database software on the file server reacts to client
queries by running searches. As part of a client/server system, it returns only the
results of the searches.Back-end processing include sorting data, extracting the
requested data, and sending that data back to the user.
Additionally, database server software manages the data in a database including:
Updates.
Deletions.
Additions.
Security.
Stored Procedures
Stored procedures are short, prewritten data-processing routines that help with
data-processing details. The procedures are stored in the server and can be used
by any client. Stored procedures help process data. One stored procedure can be
used by any number of clients, thus avoiding the need to incorporate the same
routine into the code of each program.
These stored procedures:
Perform some of the processing usually performed by the client.
Reduce network traffic, because a single call from the client to the server
can begin a series of stored procedures that otherwise would require several
requests.
-
8/3/2019 MCSE Lessons
31/55
Bashir Ahmad Noori Presents 31
Can include security controls to prevent unauthorized users from running some of
the procedures.
Server Hardware
The server computers in a typical client/server environment should be morepowerful and faster than the client computers. In addition to a high-speed
processor, these computers need lots of RAM and plenty of hard-drive space.
These computers must be able to handle:
Multiple requests.
Security.
Network management tasks.
Any organization that implements a client/server network should use dedicated
servers to handle the back-end functions.
Client/Server Architecture
There are several possible client/server arrangements. In the two primary
arrangements, illustrated in Figure 8.11:
The data can be placed on a single server.
The data can be distributed across several database servers. The locations of the
servers depend on the locations of the users and the nature of the data.
-
8/3/2019 MCSE Lessons
32/55
Bashir Ahmad Noori Presents 32
-
8/3/2019 MCSE Lessons
33/55
Bashir Ahmad Noori Presents 33
Servers over a WAN periodically synchronize their databases to ensure that they
all have the same data. A data warehouse stores large volumes of data and
forwards the most sought-after data to an intermediate system that is able to
format the data into its most requested form. This offloads some of the data
processing from the main server to other servers.
-
8/3/2019 MCSE Lessons
34/55
Bashir Ahmad Noori Presents 34
Advantages of Working in a Client/Server Environment
Client/server technology creates a powerful environment that offers many real
benefits to organizations. A well-planned client/server system provides relatively
inexpensive networks. These systems provide mainframe-computing capacity
while allowing easy customization for specific applications. Because client/server
processing sends only the results of a query across the network, it cuts down on
network traffic. Client/server computing uses a powerful server to store data. The
client workstation can process some or all of the requested data. On a busy
network, this means that the processing will be distributed more efficiently than in a
traditional mainframe-based system. Because the file services and the data are on
the back-end server, the servers are easier to secure and maintain in one location.
Data is more secure in a client/server environment because it can be placed in a
secure area away from users. The data is also more secure when Windows NT
-
8/3/2019 MCSE Lessons
35/55
Bashir Ahmad Noori Presents 35
Server-based security is used to prevent unauthorized access to files. When the
data is stored in a limited number of locations and managed by one authority,
backups are simplified.
Lesson Summary
The following points summarize the main elements of this lesson:
The client/server model has several advantages over a centralized network;
for example, in this model, tasks are divided between client and server, resulting in
a more efficient network. Client/server networks can be arranged in two ways: data
can be stored on a single server or distributed across several servers.
Client/server networks commonly use structured query language (SQL) fordatabase management. In a client/server network, the client, or front end, is
responsible for presenting data in a useful form and for writing reports; the server,
or back end, is responsible for storing and managing the data. Client/server
networks can be arranged in two ways: data can be stored on a single server or
distributed across several servers.
A driver (sometimes called a device driver) is software that enables a computer
to work with a particular device. Although a device might be installed on a
computer, the computer's operating system cannot communicate with the device
until the driver for that device has been installed and configured. It is the software
driver that tells the computer how to work with the device so that the device can
perform its job.
There are drivers for nearly every type of computer device and peripheral
including:
Input devices, such as mouse devices.
Hard and floppy disk drives and controllers.
Multimedia devices, such as microphones, cameras, and recorders, NICs. Printers
Plotters, and tape drives.
-
8/3/2019 MCSE Lessons
36/55
Bashir Ahmad Noori Presents 36
Usually, the computer is operating system works with the driver to make the device
perform. Printers provide a good illustration of how drivers are used. Printers built
by different manufacturers have different features and functions. It is impossible for
computer and operating-system manufacturers to equip new computers with all the
software required to identify and work with every type of printer. Instead, printer
manufacturers make drivers available for each of their printers. Before your
computer can send documents to a printer, you must install, or load, the drivers for
that printer so that your computer will be able to communicate with it.
Generally, manufacturers of components, such as peripherals or cards that must
be physically installed, are responsible for supplying the drivers for theirequipment. For example, NIC manufacturers are responsible for making drivers
available for their cards. Drivers are usually included on a disk that accompanies
computer equipment when it is purchased. Drivers can also be downloaded from a
service such as The Microsoft Network (MSN), CompuServe, or the manufacturer's
Internet site or bulletin board.
The Network Environment
Network drivers provide communication between a NIC and the network redirector
running in the computer. (The redirector is part of the networking software that
accepts input/output (I/O) requests for remote files and then sends, or redirects,
them over the network to another computer
Drivers and the OSI Reference Model
NIC drivers reside in the Media Access Control sub layer of the data-link layer of
the OSI Reference Model. The Media Access Control sub layer is responsible for
providing shared access for the computer's NICs to the physical layer. In other
words, the NIC drivers ensure direct communication between the computer and
the NIC. This, in turn, establishes a link between the computer and the rest of the
network.
-
8/3/2019 MCSE Lessons
37/55
Bashir Ahmad Noori Presents 37
Chapter Summary
The following points summarize the key concepts of this chapter:
Choosing a Network Design
The first step in network design is to decide whether the network will be peer-to-
peer or server-based.
Take a detailed inventory of all the available networking hardware, software, and
telecommunications equipment on hand before recommending any equipment
purchases for a new LAN. Create a map of the facility layout and the network
(logical and physical) as the beginning of your network-documentation package.
Installing network media is difficult, and complex configurations requirea professional installer. Basic installations can be accomplished without
professional assistance. By knowing the specifics of each piece of hardware that
will be on the network, you can map a network design and foresee potential
problems.
Addressing potential problems before implementing the network can save time and
expense.
Establishing a Client/Server Environment
The client/server model has several advantages over a centralized network; in this
model, tasks are divided between client and server, resulting in a more efficient
network. Client/server networks can be arranged in two ways: the data can be on a
single server or distributed across many servers.
Client/server networks commonly use structured query language (SQL) for
database management.
In a client/server network, the client, or front end, is responsible for presenting data
in a useful form and for writing reports; the server, or back end, is responsible for
storing and managing the data. Client/server networks can be arranged in two
ways: data can be stored on a single server or distributed across several servers.
-
8/3/2019 MCSE Lessons
38/55
Bashir Ahmad Noori Presents 38
How to make a user Account:
Select the My Computer Folder
Right mouse click on it
Click on manage option
Move Local Users and Groups
In the List view portion
Double Click to turn on the users
Right mouse click on the screen and click on New User
In the User Name Box type the Name of the User, you want to create
-
8/3/2019 MCSE Lessons
39/55
Bashir Ahmad Noori Presents 39
In the Full Name if you want to type a detail user name then type the full
name
In the description type the details about the account
in the password set a password to the user
in confirm password again type the password
User Must Change password at first logon, means that when we log on the
user computer asks to change the password, if you want to fix the given
password then check off this option
In the user Can Not change the password, it means that user has no
permission to change its password this user will work under the administrator
account and only the administrator is responsible to make change in the user
password.
We have local Account Policies in which the password expiry date is
mentioned if password is expired then we type a new password by entering
the old password.
If check on this Option that password never expires then until our windows
work computer will not asks for a new password or the password will notexpires.
Account is disable if we check on this option then we can not log on the
account until we check off this option
We apply different permission in the above window to handle a user account,
A user account is differ from a domain account
Because the Server Security Structure is more power full than the XP
windows hence the user account are protected and given in the Computer
management option, as the control panel of the windows XP is very weak
when a virus comes to computer it can destroy the accounts and the control
panel folders, therefore, in server the virus cannot affect the internal process,
the computer management process is an internal process where virus can
not access or a hacker can not enter with out a security permission.
-
8/3/2019 MCSE Lessons
40/55
Bashir Ahmad Noori Presents 40
We can also rename and delete the accounts, listed in the user account
section, by right mouse clicking on an account and click on delete then click
on yes to confirm the deletion the account will be deleted.
To rename an account right mouse click on it and click on rename type the
new name for the account the name will be given to that user.
In server windows every thing is in manage form. That we create a schedule
for doing some thing and our work will be in an organize position so every
thing is connected to its concern topic.
1. There are the local computer users and there are the network users. The
Network Users we can connect using the Remote Desktop or through a
Domain Controller.2. Or we can create the clients account in the server and then we can
implement these accounts on clients computer.
In a Workgroup System when we talk about the Client / Server the client are
fully under control by the server computers and the server computer canhandle all the user management activities from remote.
Group Policies:
A group Policy is rule, role, or method we apply on both the local computer and the
network computer deny or access permission for these computer. In both Windows
XP and Windows Server the command to access the group policies are same
Gpedit.msc
(Gpedit means Group Policy Editor and (msc means Microsoft System Console)
Console is a window in which we perform different operation.
We can implement the group policy for Local computer and for a network
computer.
-
8/3/2019 MCSE Lessons
41/55
Bashir Ahmad Noori Presents 41
In the Start Menu In run command type Gpedit.msc and press enter
A group policy is use to turn on or off a property of windows.
When the group policy editor will display you will see a main folder with the
name of local computer policies
This folder contains two sub folder
a. Computer configuration Folder
b. User Configuration Folder
The Computer Configuration Folder will be used by the Hard Ware Engineers
to set the hard ware policies installed in the computer.
The user configuration will be used by a network person to implement
different rules and methods on the software side like on operating system
Each User and Computer configuration folder contains three sub folder
Software Settings
Window Components
Administrative Templates.
Administrative Templates in the User configuration Folder.
Administrative means perform the Admin work of windows XP or Windows Server,
the Administrative work of the windows XP or Windows Server are related with its
Desktop
Control Panel
User Accounts
Task Bar and Start Menu
Shared Folder
Network
System
Windows components.
What is the control panel of the windows XP or Server?
-
8/3/2019 MCSE Lessons
42/55
Bashir Ahmad Noori Presents 42
When we see the Windows folder structure we have two types of folders in
windows, User define folder, and system folders
A control panel is the combination of different system folders, which are related,
with separate process of the devices attached with the computer. We can control
the activities or change the activities of different devices or process like Server by
using the control panel. There are different folders provided for different works.
Accessibility Wizard Folder
Add/Remove Program
Add New Hard Ware
Display Folder
Key board
Folder Options folder
Mouse Folder
Network Folder
Regional and Language Settings Folder
Administrative Tools Folder
Sound Folder
Printer and Faxes Folder
Scanner and Camera
Task bar and Start Menu Folder
Licensing Folder
Internet option Folder
User Account Activities
System Folder
-
8/3/2019 MCSE Lessons
43/55
Bashir Ahmad Noori Presents 43
Automatic Update Folder
Date Time Folder
Game Controller
Fonts folder
Mail Folder
Portable Media Devices
Phone and Modem Folder
Schedule Task Folder
Power Option Folder
Speech folder
The above folders are standard folders of the control panel.
General Group policies of Control Panel:
These policies we generally apply directly to the overall control panel folder and the
specified control panel folders. Every group policy has three properties, Not Configure,
Enable and Disable. The Not configure means not implemented and disable means
implemented but not yet. Enable means that implemented.
1. Prohibit Access to the control panel
With the help of this policy we can lock our control panel and one can not be able to access
the control panel.
In the Start Menu
Move to Run command
type Gpedit.msc
Move User configuration
click on Administrative template folder
Click on the control panel
Double click prohibit access to control panel
-
8/3/2019 MCSE Lessons
44/55
Bashir Ahmad Noori Presents 44
Set it enable
Click on Apply
Click on OK
close the gpeditor window
refresh on desktop
Now access the control panel the control panel will be lock.
To unlock the control panel in the same process set the policy property to not configure.
2. To Hide Specified items on the control panel
By using these properties, we can hide the folders of the control panel according to our
own choice.
In the start Menu
Move to Run command
type Gpedit.msc
Move to user configuration
click on administrative templates
click on control panel
double click on To Hide specified items on the control panel
Set the policy to enable
Click on Show button
Click on Add Command button and type the name of folders to hide
click on ok
Click on apply
click on ok
-
8/3/2019 MCSE Lessons
45/55
Bashir Ahmad Noori Presents 45
close the gpeditor
Refresh the desktop, open the control panel, and check the result.
To unhide the folder use to not configure.
3. Show Only specified control panel applets
If we want to display only those folders, which we set in the policy in control panel, then
we apply then policy to enable.
Click on Start Menu
Move to run command
type Gpedit.msc
move to user configuration folder
click on administrative template
Click on control panel
Click on Show command button
Click on Add command button
type the name of the folders which you want to display
click on ok
click apply
click on ok
Refresh the desktop and open the control panel only the selected folders will display
other folders will be hidden.
Force Classic Control Panel Style
-
8/3/2019 MCSE Lessons
46/55
Bashir Ahmad Noori Presents 46
We have to two types of the view of the control panel.
Category View in which we have link to open the folders
Classic View in which the folder listing display.
If we enable this policy then computer will only display the classic view of the control
panel.
Click on Start Menu
Move to Run command
in the run command type Gpedit.msc
move to user configuration
Click on Administrative template
click on control panel
Double click on Force Classic Control Panel Style
Set it enable
click on apply
click on ok
refresh the desktop
-
8/3/2019 MCSE Lessons
47/55
Bashir Ahmad Noori Presents 47
Group policies remain and will write latter
-
8/3/2019 MCSE Lessons
48/55
Bashir Ahmad Noori Presents 48
Domain \DNS (Domain Name Service \Server)
A domain type network is providing fully control on the clients computer and use to setup
its own client from a network to other network by using the networking services
component of the windows. Domain type network is very useful for the Internet and the
LAN (Local Area Networking) that the client is completely under the server computer and
the domain is used because of this powerful security purpose.
There are following four levels of domain
.com
.org .edu .af
(.Com) is the commercial domain
(.org) is under the .com
(.edu) is under the .com
(.af) is under the .com
www.abc.af
How to make a Domain?
1. First you install the Server 2003 windows in your computer
2. Then we have to add the following components from the add/remove program folder
of the control panel, Windows components tab.
a. Application Server: This component contains the Internet Information
Server, Network DTC Com+ Object and Application Server console
b. Insert the Server 2003 CD in the Drive
c. Open the Control Panel
d. Open the Add/Remove Programs Folder
http://www.abc.af/http://www.abc.af/ -
8/3/2019 MCSE Lessons
49/55
Bashir Ahmad Noori Presents 49
e. Click on Add/Remove Windows components
f. Check on following components
i. Application Server
ii. Management and Monitoring Tools
iii. Networking Services
iv. Click on Next to install the components.
The folders will be added to your administrative tools folder of control panel after the
installation.
How to install Domain & Active Directory Services?
An Active Directory is a special Database for the Network Server and Client information
Accounts. It uses a Forest System and in this system all the domain and client accountsexists. We can install the active directory database by using the Server 2003 system.
Click on Start Menu
in the Run command Type DCPROMO ( Directory Console Promotion )
The Active directory wizard screen will be started
click on next command button
In the operating system security information screen click on next command button
In the domain controller type screen you will see two option
o Domain Controller for a new Domain means that if your computer is installing
this domain first then it will be a new domain
o Additional Domain Controller for an existing Domain means that we have
already a domain in this computer or some other computer which will be our
main domain and our computer will work under that domain as a child domain
Select the first option That Domain Controller For a New Domain
Click on Next command button
Create a New Domain Screen will display which contains the following three
options
-
8/3/2019 MCSE Lessons
50/55
Bashir Ahmad Noori Presents 50
o Domain in a New Forest means that if we are newly installing the domain in
our computer as an independent domain then select first option
o Child Domain in an existing forest means that if we already have a domain or
domains in the forest in the same computer or other computer then we will
select this option
o Domain Tree in an Existing forest means that we do not want to work under
any domain of this computer and we want to install another independent
domain so select this option
Select the Domain in New Forest and click on Next
New Domain Name Screen will be display
Here type your full domain Like Ariana.com and click on next command button
The NetBIOS ( Networking Basic Input Output System) screen will display asks for
the NetBIOS Name leave the name as it is and click on next command button
The Database and Log Folder Screen will display the Database Folder will be
C:\Windows\NTDS and the log files folder will be the same name click on next
command button
The Shared System Volume screen will display this screen means that whenever anyother computer access the domain it send a copy of the domain to that computer.
Click on Next command button
The DNS Registration Diagnostics Screen will Display which contains the following
three options
I corrected the problem perform the Diagnostic Test Again Leave this options
Install and configure the DNS in this computer select this option I correct the problem late and configure the DNS manually leave this option
Click on next command button
The Permissions Screen will display, which contains the two options
one for windows 2000 do not select for 2003
-
8/3/2019 MCSE Lessons
51/55
Bashir Ahmad Noori Presents 51
second for windows 2000 and windows 2003 server select this option and click on
next command button
Directory Service Restore Mode Administration Password screen will display type a
password and confirm it and click on next command button
Click on Next and Click on Next the Installation will be Started.
How to make client Accounts?
First, check the connection between the Server and the Client Computer by applying
the Ping command in the run.
Move to Client computer and set the server domain and IP to link the client
computer with the server computer.
In the Client computer in the My Computer right mouse click
Click on properties
My Computer Properties will display
Select Computer Name Tab
Click on Change command button
Select Domain Option
Write the server domain name like ariana
Click on ok
Computer will asks the server user name and password type the server user name
like administrator and password
Click on ok
After some time you will receive a message welcome to Ariana Domain.
Then Restart your computer.
Now after restarting the computer
Go to client computer and do these actions.
Select the my network places folder in the client computer
Right mouse click on it
Click on properties
-
8/3/2019 MCSE Lessons
52/55
Bashir Ahmad Noori Presents 52
The network connection will display
Right mouse click on the connection
Click on properties
Select the TCP /IP protocol
Click on properties command button
In the Preferred DNS type the server computer IP like 192.168.0.10
Click on ok
Click on close.
If we do not give this the Server IP in the client computer, it takes a long time to log
on.
Come back to the Server computer.
In the Server Computer
Open the control panel
And open the administrative tools folder
Open the Active Directory Users and Computer folder
Click on Computer and check the client computer Name the Client computer will be
link with the server computer.
After the making and checking of connection between server computer and client
computer, we can create a client by doing these actions.
Before creating a client account
In the administrative tools folder of the computer double click on dns folder and
open it
We have two options in this folder
Forward lookup zones and reverse lookup zone, a lookup zone is use to deploy the
domain to the client computer and forward zone is use to deploy the server settings
to client computer and reverse is receive the client settings to server computer.
Select the forward zone right mouse click on it
Click on new zone the new zone wizard will be started
-
8/3/2019 MCSE Lessons
53/55
Bashir Ahmad Noori Presents 53
Click on next and select the primary zone and click on next
Select all domain server in the forest of ariana.com and click on next
Type the zone name any and click on next command button
Select allow security zone for dynamic updates ( active directory recommended )
and click on next command button
Then click on finish command button
Now the forward lookup zone will be created
We will create our server as a host
Click on the created forward lookup zone like Peshawar and right mouse click on it
and click on new host ( a ) in the new host name window type you domain name like
ariana
In the ip address type the server ip like 192.168.0.10.
Click on add host command button a message will display that host for ariana.
Peshawar successfully created.
Click on ok and click on done
Now we will create the reverse lookup zone
Right mouse click on it
Click on new zone
The reverse lookup zone wizard will be started
Click on next command button
Select primary zone and click on next command button
Select to all zone in DNS active directory forest ariana.com
Click on next command button
In the network id always type class c ip, 192.168.0
Click on next command button
Click on next
Click on finish
The reserve zone will be created. Close the DNS folder
-
8/3/2019 MCSE Lessons
54/55
Bashir Ahmad Noori Presents 54
Now we will make the client account for our client computer.
Open the active directory user and computer folder
All the client accounts will work under the organizational unit; OU is the grouping
of the clients according to our organizational work.
In the domain name right mouse
Move to new
Click on organizational unit
Type the OU name and click on ok
The OU will be created
Now right mouse click on the OU
Move to new
Click on user account
Type the user name
Click on next
Uncheck user change the password on next log on
Check the user can not change the password
Check the user password never expire
Set the password for the user
Confirm the password
Click on ok
The user account will be created.
End of the lesson up to current Date.
-
8/3/2019 MCSE Lessons
55/55
Bashir Ahmad Noori Presents 55