2024: Domino Containers - The Next Step. News from the Domino Container commu...
Microsoft windows server 2003
1. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
S
t
u
d
e
n
t
e
d
i
t
i
o
n
B
I
M
S
Y
S
T
E
M
A
D
M
I
N
I
S
T
R
A
T
I
O
N
2. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Contents
Chapter 1 : Introduction
1.1 IP Addresses
Chapter 2 :IP Address Classification
2.1 Private IP
2.2 Public IP
2.3 Default Subnet mask
2.4 Loopback IP
2.4 APIPA
Chapter 3 :Subnetting
3.1 Definition
3.2 Basic Questions of subnetting
3.2.1 What is Subnet Address / Network Id?
3.2.2 What is Usable range ?
3.3.3 What is Broadcast IP ?
3.3 Numerical Solutions (TU Old Questions )
Chapter 4 : Supernetting
4.1 Definition
3. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
1.0 IP Addresses
An IP address is an address used in order to uniquely
identify a device on an IP network. The address is made up of
32 binary bits, which can be divisible into a network portion
and host portion with the help of a subnet mask. The 32 binary
bits are broken into four octets (1 octet = 8 bits)
4. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.0 IP Address Classification
2.1 Private Address Space
Not routable in Internet
The assumption is that these private address ranges are not
directly connected to the Internet, so the addresses don't
have to be unique .
A network administrator using these private addresses has
more room for subnetting, and many more assignable
addresses.
92.168.0.0 - 192.168.255.255 (65,536 IP addresses)
172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses)
2.2 Public Address Space
A public IP address is any valid address, or number, that can be
accessed over the Internet.
Any resources that will be available over the Internet will
require a public IP address
Public IP addresses can be added in the Cloud Console
5. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.3 Default Subnet Mask
Class A -255.0.0.0 11111111.00000000. 00000000. 00000000
Class B -255.255.0.0 11111111. 11111111.00000000. 00000000
Class C -255.255.255.0 11111111. 11111111.11111111. 00000000
2.4 Loopback
Loopback is a communication channel with only one endpoint.
TCP/IP networks specify a loopback that allows client software to
communicate with server software on the same computer.
The range of addresses for loopback functionality is the range of
127.0.0.0 to 127.255.255.255
6. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.5 APIPA
DHCP clients can automatically self-configure an IP address and subnet
mask when a DHCP server isn't available. When a DHCP client boots up,
it first looks for a DHCP server in order to obtain an IP address and
subnet mask.
The IP address range is 169.254.0.1 through 169.254.255.254
The client also configures itself with a default class B subnet mask of
255.255.0.0
7. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Chapter 3 : Subnetting
3.1 Definition - What does Subnetting mean?
Subnetting is the strategy used to partition a single physical
network into more than one smaller logical sub-networks
(subnets). An IP address includes a network segment and a
host segment.
The practice of dividing a network into subnets (subnet) is a
separate and identifiable portion of an organization’s
network, typically a local area network (LAN) comprised of all
the machines on one floor, buildingor geographicallocation )
is called subnetting.
Benefits:
Reduces the network traffic by reducing the volume of
broadcasts
Helps to surpass the constraints in a local area network
(LAN), for example, the maximum number of permitted
hosts.
Enables users to access a work network from their
homes; there is no need to open the complete network.
8. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Basic Questions of Subnetting ?
What is your subnet address?
Broadcast address?
Range of usable IP?
What is your subnet mask ?
3.2.1 What is Subnet Address / Network Address ?
Refers to an IPv4 address assigned to a network
Eg: 192.168.1.0 , 172.16.0.0
Lowest address is reserved as the network address
3.2.2 Broadcast address?
uses the highest address in the network range
Eg: 192.168.1.0 (Network ID)
192.168.1.255 (Broadcast ID)
allows communication to all the hosts in that network
3.3.3 Range of usable IP/Host Address?
Address assigned to each end device values between the network
address and the broadcast address
For eg:
192.168.1.0 (Network Address)
192.168.1.255 (Broadcast Address)
192.168.1.1 - 254 (Host Addresses)
9. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
3.3 Numerical Solutions
1. You are the system administrator for your company’s network ,
APNIC has provided your company 22.23.44.128/25 , if your
company have to isolate your IP as required by your office
OFFICE A - 14 hosts OFFICE B -28 hosts
OFFICE C - 2 hosts OFFICE D -7 hosts
OFFICE E - 28 hosts
Find
Subnet mask , Subnet Address, Range of usable, IP Broadcast IP
Solutions :
For Block size
2y
− 2 = hosts
Office
2y
− 2 = 28
5 bits
Office
2y
− 2 = 28
5 bits
Office
2y
− 2 = 14
4 bits
Office
2y
− 2 = 7
3 bits
Office
2y
− 2 = 2
1 bits
10. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Network ID Broadcast ID Usable Range Subnet mask
22.23.44.128 22.23.44.159 22.23.44.129-
22.23.44.158
/26
22.23.44.160 22.23.44.191 22.23.44.161-
22.23.44.190
/26
22.23.44.192 22.23.44.207 22.23.44.128-
22.23.44.206
/27
22.23.44.208 22.23.44.215 22.23.44.207-
22.23.44.214
/27
22.23.44.216 22.23.44.217 22.23.44.-
22.23.44.128
/27
11. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Practice Questions
2.Suppose you are network administrator for multinational IT Company.
Your company has five offices and you have to isolate your IP as required
by your offices.
Kathmandu Branch: must support 253 hosts
Pokhara Branch: must support 126 hosts
Biratnagar Branch: must support 62 hosts
Birgunj Branch: must support 30 hosts
Hetauda Branch: must support 14 hosts
Divide the given block of IPs into subnets to meet the above
requirements. For each subnet show the subnet address, the subnet
mask, range of the usable IP addresses, and the broadcast address in a
tabular form.
3. With given class B network: 190.190.0.0/16, subnet the network in order
to create network with following host requirements using VLSM.
a) Network-A: 8000 hosts
b) Network-B: 4000 hosts
c) Network-C: 4000 hosts
d) Network-D: 2000 hosts
e) Network-E: 1000 hosts
f) Network-F: 500 hosts
Tabulate the subnet mask, network address, broadcastaddress
and usable IP range of each subnet
12. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
4. the below listed details for the provided IP address
192.168.10.20 with Subnet Mask 255.255.255.192.
a. How many subnets?
b. How many host per subnets?
c. What are the valid subnets?
d. What is the broadcast address for each subnet?
e. What are the valid hosts ranges?
13. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Chapter 4 :Supernetting
4.1 Definition - What does Supernetting mean?
Supernetting is the strategy used to Combining several IP
network addresses into one IP address
Supernetting, also called Classless Inter-Domain Routing (CIDR),
is a way to aggregate multiple Internet addresses of the same
class.
4.2 Why Supernetting ?
Supernetting was created as a way to solve the problem of routing tables
growing beyond the ability of current software and people to manage and to
provide a solution to the exhaustion of Class B network address space.
4.3 Protocol supporting Supernetting ?
The Border Gateway Protocol (BGP), the prevailing exterior
(interdomain) gateway protocol and the Open Shortest Path First
(OSPF) router protocol both support supernetting.
4.4 Numerical Solutions :
Example :
IP Network Addresses
172.16.8.0
10101100.00010000.00001000.00000000
172.16.16.0
10101100.00010000.00010000.00000000
|
|
Subnet Mask |
|
255.255.224.0 |
11111111.11111111.11100000.00000000
14. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
4.5 What is CIDR (/) ?
Classless inter-domain routing (CIDR) is a set of Internet
protocol (IP) standards that is used to create unique
identifiers for networks and individual devices
so a notation system was developed to make the
process more efficient and standardized.
4.6What is VLSM ?
Variable Length Subnet Mask, abbreviated as VLSM.
A Variable Length Subnet Mask (VLSM) is a numerical masking sequence,
or IP address subset, based on overall network requirements
With VLSM, a network administrator can use a long mask on networks
with few hosts and a short mask on subnets with many hosts
Key VLSM features include:
Simple network configuration
Network IP addressing through empty subnet filling
Greater efficiency than fixed-length subnet masks (FLSM)
VLSMs are used by a variety of network systems and services, including:
Intermediate System to Intermediate System Protocol (IS-IS)
Border Gateway Protocol (BGP)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Cisco's Open Shortest Path First (OSPF)
15. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
TU Old Questions
1. What is the broadcast IP in 192.168.1.6/27?
2. To add a static route to the 10.0.0.0 network that uses a netmask of 255.0.0.0 and a
gateway of 192.168.0.1, write the necessary command?
3. Which address can be an Automatic Private IP Address (APIPA)?
4. What difference do you find between Subnetting and VLSM?
16. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
S
t
u
d
e
n
t
e
d
i
t
i
o
n
B
I
M
S
Y
S
T
E
M
A
D
M
I
N
I
S
T
R
A
T
I
O
N
17. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines
how electronic devices (like computers) should be connected over the
Internet, and how data should be transmitted between them.
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets before they can
be sent over a network, and for assembling the packets again when they
arrive.
IP - Internet Protocol
IP takes care of the communication between computers. It is responsible for
addressing, sending and receiving the data packets over the Internet.
TCP/IP Protocols For the Web
Web browsers and servers use TCP/IP protocols to connect to the Internet.
Common TCP/IP protocols are:
HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web
browser. HTTP is used for sending requests from a web client (a browser) to a
web server, returning web content (web pages) from the server back to the
client.
HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web
browser. HTTPS typically handles credit card transactions and other sensitive
data.
FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.
18. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Installing and configuring the TCP/IP protocol
Installing TCP/IP
TCP/IPisinstalled automaticallywhenthe WindowsServer 2003 setup process runs. It is not usually
necessary to install TCP/IP after the Windows Server 2003 setup process completed.
The instances when you might need to manually install TCP/IP are listed below:
TCP/IP was disabled when the Windows Server 2003 setup process executed.
TCP/IP was uninstalled from the computer.
How to install the TCP/IP protocol suite
1. Click Start, Control Panel, and then click Network Connections
2. In the NetworkConnectionswindow,right-clickthe networkconnection for which you want
to install TCP/IP and then click Properties from the shortcut menu.
3. If you are working with the local area connection, you will use the General tab in the
following step. If you are working with any other connection, you will use the Networking
tab
4. Click Install, and then click Protocol.
5. Click Add to open the Select Network Protocol dialog box.
6. Click Internet Protocol (TCP/IP) in the dialog box.
7. Click OK
8. Confirm that the Internet Protocol (TCP/IP) checkbox is enabled.
19. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Troubleshooting TCP/IP
Connect to an IP Address
Try to connectto anothercomputeron yournetworkusingits IP address and the TCP/IP program or
utilityof yourchoice.Webbrowsers,ftp,andTelnetare some programsandutilitiescommonlyused
to connect to other computers with TCP/IP.
If you cannot connect to the other computer using its IP address, there is a basic connectivity
problem.
If you can connectto the other computerusing its IP address, but you are not able to connect using
the host or NetBIOS name of the other computuer, there is probably a name resolution problem.
UNABLE TO CONNECT TO A SPECIFIC IP ADDRESS
Follow the procedures in each of the following sections in order. After you finish each procedure,
check to see if you can connect to the other computer using its IP address.
Check Your TCP/IP Configuration
When you use TCP/IP as your network protocol, an incorrect TCP/IP setting (such as an incorrect IP
address or an incorrect subnet mask) can cause communication problems.
Use the IPCONFIG command to determine your computer's basic TCP/IP settings. To do so, type
ipconfig at a command prompt.
Verify that the IP address and subnet mask displayed by the IPCONFIG command are the correct
values for your computer.
Ping the Loopback Address
Use the PING command to verify that TCP/IP is working properly. To do so, ping the loopback
address (127.0.0.1) by typing the following command at a command prompt:
ping 127.0.0.1
If you receive an error message at this point, TCP/IP is not properly installed.
Ping Your Computer's IP Address
If you can ping the loopback address successfully, attempt to ping your own IP address by typing
ping <IP address> at a command prompt, where <IP address> is your computer's IP address.
If you receive an error message at this point, there may be a communication problem between
WindowsNTand yournetworkadapter.To correct thisproblem, removeandreinstall your network
adapter driver.
20. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Clear the Address Resolution Protocol (ARP) Cache
The address resolutionprotocol (ARP) cache isa listof recently resolved IP address to Media Access
Control (MAC) address mappings. The MAC address is the unique physical address embedded in
each network adapter.
If an entry in the ARP cache is incorrect, IP datagrams may be sent to the wrong computer. To
display all mappings currently in the ARP cache, use the ARP command by typing arp -a at a
command prompt.
To remove any incorrect entries in the ARP cache, clear all entries using the following command:
arp -d <IP address>
Where <IP address>isan Internetaddressstoredinthe ARPcache.Use thiscommandfor eachentry
in the ARP cache until all entries have been deleted.
Verify the Default Gateway
Use the IPCONFIG command to determine the IP address that your computer uses to access your
defaultgateway.Todoso, type "ipconfig" (without quotation marks) at a command prompt. Verify
that the IP address displayed for your default gateway is correct.
Ping the IP Address of the Other Computer
Try to ping the IP address of the other computer. To do so, type ping <IP address> where <IP
address> is the IP address of the other computer.
Verify Persistent Route Table Entries
Any computer using TCP/IP as a network protocol has a route table. The route a network packet
takesfromone computerusingTCP/IPto anothercomputerusingTCP/IPisdeterminedbythe route
table of the computer that sent the network packet.
Your computer's route table is automatically rebuilt each time you restart your computer. You or
your network administrator can add persistent (static) entries to your computer's route table.
Persistententriesare automaticallyreinserted in your route table each time your computer's route
table is rebuilt.
Use the TRACERT Command
The TRACERT command reports each router or gateway crossed by a TCP/IP packet on its way to
another host. To use the TRACERT command to trace the route between your computer and the
other computer, type tracert <IP address> at a command prompt, where <IP address> is the IP
address of the other computer.
Verify Server Services on the Other Computer
Verifythatthe appropriate server services are running on the other computer. For example, if you
are attempting to use the Telnet tool to connect to the other computer, make sure that the other
computer is configured as a Telnet server.
To verifythat the appropriate server service is running on the other computer, attempt to connect
to the other computer from another computer that is on the same subnet as the other computer.
21. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Check IP Security on the Server
Port settings for services on the other computer may be different than the port settings you are
using to connect.
Use the Telnet tool to verify that the other computer is configured to permit connections on the
same port you are using to connect. To do so, type the following line at a command prompt:
telnet <IP address> <port>
Where <IP address> is the IP address of the other computer and <port> is the port you are
attemptingtomake a connectionon.Forexample, if you are attempting to make an ftp connection
to the other computer on port 21, type telnet <IP address> 21.
Unable to Connect to a Specific Host or NETBios Name
If you are able toconnectto the othercomputerusingitsIPaddress,butyou are not able to connect
to the other computer using its host or NetBIOS name, there may be a name resolution problem.
There are many methods that can be used to accomplish name resolution on a network including
the following:
HOSTS files
Domain Name Service (DNS)
LMHOSTS files
Windows Internet Name Service (WINS)
https://support.microsoft.com/en-us/kb/169790
22. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
23. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP (Dynamic Host Configuration Protocol)
All TCP/IP hosts, such as client computers or network devices,
require TCP/IP address and configuration data.
TCP/IP configuration data can include TCP/IP address, subnet mask
and additional IP data such as router information and information on
other types of services.
System administrators can either manually configure and
maintain IP configuration for clients or use DHCP to dynamically
assign, configure and maintain the TCP/IP configuration data
for each host.
DHCP is an IP standard for simplifying management of host IP
configuration .For TCP/IP-based networks, DHCP reduces the
complexity and amount of administrative work that is involved
in reconfiguring computers. When we configure the DHCP
server to support DHCP clients, the DHCP server automatically
supplies the configuration information to DHCP clients.
Computers use the Dynamic Host Configuration Protocol for
requesting Internet Protocol parameters from a network
server, such as an IP address. The protocol operates based on
the client-server model.
24. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
How DHCP Allocates IP Address
25. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP Lease Generation Process
DHCP lease generation process is the process by which
the DHCP client receives IP addressing configuration data
from the DHCP Server .
DHCP uses a four-step process to lease IP addressing
information to DHCP clients.
DHCP discover
DHCP offer
DHCP request
DHCP acknowledgement or DHCP negative
acknowledgement.
DHCP discovery
The client broadcasts messages on the network subnet using
the destination address 255.255.255.255 or the specific subnet
broadcast address. A DHCP client may also request its last-
known IP address. If the client remains connected to the same
network, the server may grant the request. Otherwise, it
depends whether the server is set up as authoritative or not.
DHCP offer
When a DHCP server receives a DHCPDISCOVER message from
a client, which is an IP address lease request, the server
reserves an IP address for the client and makes a lease offer by
sending a DHCPOFFER message to the client. This message
contains the client's MAC address, the IP address that the
server is offering, the subnet mask, the lease duration, and the
IP address of the DHCP server making the offer.
26. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP request
In response to the DHCP offer, the client replies with a DHCP
request, broadcast to the server, requesting the offered
address. A client can receive DHCP offers from multiple servers,
but it will accept only one DHCP offer. Based on required server
identification option in the request and broadcast messaging,
servers are informed whose offer the client has accepted.
When other DHCP servers receive this message, they withdraw
any offers that they might have made to the client and return
the offered address to the pool of available addresses.
DHCP acknowledgement
When the DHCP server receives the DHCPREQUEST message
from the client, the configuration process enters its final phase.
The acknowledgement phase involves sending a DHCPACK
packet to the client. This packet includes the lease duration and
any other configuration information that the client might have
requested. At this point, the IP configuration process is
completed.
27. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP Lease Renewal Process
DHCP lease renewal process is the process by which the DHCP
client renews or updates its IP address configuration data with
the DHCP server.
At any time during the lease period, the DHCP client can send a
DHCPRELEASE packet to the DHCP server to release the IP
address configuration data and to cancel remaining lease.
The client must renew its IP configuration data before the lease
period expires. To attempt a lease renewal, the DHCP client
sends a DHCPREQUEST packet directly to the DHCP server from
which the client obtained the lease.
If the DHCP server is available, it renews the lease and sends
the client a DHCPACK packet that includes the new lease
duration and any updated configuration parameters.
28. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Configuring and Managing DHCP Server
INSTALLING THE DHCP SERVICE
1. Select Start, Settings, Control Panel, Add or Remove Programs.
2. On the Add or Remove Programs page, click Add/Remove
Windows Components to open the Windows Components
Wizard.
3. Select Networking Services, as shown in Figure.
Figure DHCP is located in the Networking Services group in the
Windows Component Wizard.
4. Click the Details button to open the Networking Services window,
shown in Figure 2.2.
5. Select Dynamic Host Configuration Protocol (DHCP) and click OK.
Figure : You select the Dynamic Host Configuration Protocol
(DHCP) option to install the DHCP server.
6. Back in the Windows Components Wizard page, click Next To
begin the installation.
7. If you are prompted to supply the location of your Windows
Server 2003 CD-ROM or installation files, provide the correct
location. Windows installs the DHCP service files on your
computer.
8. When prompted that installation is complete, click Finish to close
the Windows Components Wizard.
30. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Managing DHCP SERVER
Figure 8: DHCP Server management in Server Manager
31. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 9: Starting the DHCP Server MMC
32. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 10: The Windows Server 2008 DHCP Server MMC
Figure 11: DHCP Server Address Pool
33. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 12: DHCP Server Scope Options
Figure 13: Vista client received IP address from new DHCP Server
34. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases
Domain Name System (DNS)
DNS is a name resolution service.DNS resolves human-friendly
addresses into IP addresses.DNS is a hierarchical distributed
database that contains mappings of DNS host names to IP
addresses.
The conceptual naming system on which DNS is based on a
hierarchical and logical tree structure called the domain
namespace.
35. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Domain Namespace
DNS namespace includes the root domain, top-level
domains, second-level domains, and sub-domains.
The root domain is the root node of the DNS tree. It is
unnamed (null).
The top-level domain is the trailing (rightmost) portion of
a domain name.
36. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Components Of DNS ( How DNS works)
DNS server: A computer running the DNS server service.
May be authoritative for a namespace or domain.
Resolves the name resolution request that DNS clients
submit.
DNS client: A computer running the DNS client service.
DNS resource records: Entries in the DNS database that
map host names to resources.
37. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DNS Query
A recursive query is a query made to a DNS server, in which the
DNS client asks the DNS server to provide a complete answer to
the query.
An iterative query is a query made to a DNS server in which the
DNS client requests the best answer that the DNS server can
provide without seeking further help from other DNS servers.
Resource Records and Record Types
1.Host (A):
An A record resolves a host name to an IP address.
A records are the most common and most
frequently used DNS records.
An A record represents a computer or device on the
network.
The address (A) resource record maps an FQDN to
an IP address, so the resolvers can request the
corresponding IP address for an FQDN. For example,
the following A resource record, located in the zone
noam.reskit.com, maps the FQDN of the server to its
IP address.
2.Pointer (PTR):
38. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
A PTR record is used to find the DNS name that
corresponds to an IP address.
The PTR record is found only in a reverse lookup
zone.
PTR records resolve an IP address to a hostname.
The pointer (PTR) resource record in contrast to the
A resource record, maps an IP address to an FQDN.
For example, the following PTR resource record
maps the IP address of noamdc1.noam.reskit.com to
its FQDN:
3. Start Of Authority (SOA):
An SOA resource record is the first record in any
zone file.
An SOA resource record identifies the primary DNS
name server for the zone.
Every zone contains a Start of Authority (SOA)
resource record at the beginning of the zone.
4. Name Server (NS):
An NS record facilitates delegation by identifying
DNS servers for each zone.
39. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
An NS record resolves from a domain name to a host
name.
The name server (NS) resource record indicates the
servers authoritative for the zone. They indicate
primary and secondary servers for the zone
specified in the SOA resource record, and they
indicate the servers for any delegated zones. Every
zone must contain at least one NS record at the
zone root.
5. Mail Exchanger (MX):
An MX resource record indicates the presence of a
Simple Mail Transfer Protocol (SMTP) e-mail server.
An MX resource record resolves to a host name.
A mail server priority can be set if multiple MX
records exist for a zone.
The mail exchange (MX) resource record specifies a
mail exchange server for a DNS domain name. A
mail exchange server is a host that will either
process or forward mail for the DNS domain name.
Processing the mail means either delivering it to the
addressee or passing it to a different type of mail
transport. Forwarding the mail means sending it to
its final destination server, sending it using Simple
Mail Transfer Protocol (SMTP) to another mail
exchange server that is closer to the final
40. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
destination, or queuing it for a specified amount of
time.
6. Alias (CNAME):
A CNAME resource record is a host name that refers
to another host name.
A CNAME resource record resolves from a host
name to another host name.
The canonical name (CNAME) resource record
creates an alias (synonymous name) for the
specified FQDN. You can use CNAME records to hide
the implementation details of your network from
the clients that connect to it.
7. Service Locator (SRV):
An SRV resource record indicates a network service
that a host offers.
An SRV resource record resolves from a service
name to a host name and port.
With MX records, you can have multiple mail servers
in a DNS domain, and when a mailer needs to send
mail to a host in the domain, it can find the location
of a mail exchange server. But what about other
applications, such as the World Wide Web or telnet?
41. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Service (SRV) resource records enable you to
specify the location of the servers for a specific
service, protocol, and DNS domain. Thus, if you
have two Web servers in your domain, you can
create SRV resource records specifying which
hosts serve as Web servers, and resolvers can
then retrieve all the SRV resource records for
the Web servers.
DNS Zone Types
Primary Zone:
Read/Write copy of a DNS database.
A primary zone is the only zone type that can
be edited or updated because the data in the
zone is the original source of the data for all
domains in the zone
Updates made to the primary zone are made
by the DNS server that is authoritative for the
specific primary zone. Users can also back up
data from a primary zone to a secondary zone.
Secondary Zone:
Read-only copy of a DNS database.
A secondary zone is a read-only copy of the zone that was
copied from the master server during zone transfer. In
42. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
fact, a secondary zone can only be updated through zone
transfer.
Stub Zone:
Copy of a zone that contains only records used to locate
name servers.
A stub zone is a new Windows Server 2003 feature. Stub
zones only contain those resource records necessary to
identify the authoritative DNS servers for the master
zone. Stub zones therefore contain only a copy of a zone,
and are used to resolve recursive and iterative queries:
Iterative queries: The DNS server provides the best
answer it can. This can be:
o The resolved name
o A referral to a different DNS server
Recursive queries: The DNS server has to reply with
the requested information or with an error. The
DNS server cannot provide a referral to a different
DNS server.
Active Directory Integrated Zone:
Zone that is stored in Active Directory rather than in zone
files.
43. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
An Active Directory-integrated zone is a zone that stores
its data in Active Directory. DNS zone files are not needed.
This type of zone is an authoritative primary zone. An
Active Directory-integrated zone’s zone data is
replicated during the Active Directory replication process.
Active Directory-integrated zones also enjoy the Active
Directory’s security features.
Forward and Reverse Lookup Zone
In DNS, a forward lookup is a query process
that attempts to resolve a host name to an IP
address.
In DNS manager, forward lookup zones are
based on DNS domain names and typically
hold host (A) resource records.
In DNS, a reverse lookup is a query process
that attempts to resolve an IP address to host
name.
44. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
In DNS manager, reverse lookup zones are
based on the in-addr.arpa domain name and
typically hold pointer (PTR) resource records.
Installing, Managing and configuring
DNS
For DNS servers, you will be selecting the Role-based or feature-
based installation.
Next, you will choose which server you want to install the DNS server
role on from the server pool. Select the server you want, and click
next.
At this point, you will see a pop-up window informing you that some
additional tools are required to manage the DNS Server. These tools
do not necessarily have to be installed on the same server you are
45. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
installing the DNS role on. If your organization only does remote
administration, you do not have to install the DNS Server Tools.
However, in a crunch you may find yourself sitting at the server
console or remotely using the console and needing to manage the
DNS Server directly. In this case, you will wish you had the tools
installed locally. Unless your company policy forbids it, it is typically
prudent to install the management tools on the server where the
DNS will be housed.
Now you should see the Features window. No need to make any
changes here; just click Next.
Next is an informational window about DNS Server and what it does,
although one would assume that if you've gotten this far, you are
already aware of what it is. Click Next to move on.
This is the final confirmation screen before installation completes.
You can check the box to Restart the destination server
automatically, if you like. Installing the DNS Server does not require
a restart, but unless you've planned for the downtime, keep that box
46. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
unchecked, just in case.
The DNS Server role should now be installed on your server. There
should be a new DNS Role tile in your Server Manager.
Configure DNS Server in Server 2012
If you are an old pro with DNS server files, Windows Server 2012
does let you edit the files directly. However, Microsoft recommends
47. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
that you use the interface tools to avoid errors, especially if you are
integrating DNS with Active Directory.If you want to use the
command line to configure your DNS, use the dnscmd command. For
those of us who don't memorize TechNet for fun, a few clicks is all it
takes.
Within Server Manager, to configure the DNS Server, click the Tools
menu and select DNS. This brings up the DNS Manager window.
We need to configure how the DNS server will work before adding
any actual records. Select the DNS server to manage, then click the
Action menu, and select Configure a DNS Server. This brings up the
48. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Configure a DNS Server wizard.
There are three options here. You can either: configure a forward
lookup zone only, create forward and reverse lookup zone, or
configure root hints only.
A forward lookup zone allows you to do the standard DNS function of
taking a name and resolving it into an IP address.
A reverse lookup zone allows you to do the opposite, taking an IP
address and finding its name. For example, if a user is set up to print
to a printer with an IP address of 10.20.12.114, but you need to
know what name that printer goes by so you can find it, a reverse
lookup can help. ("Ah, hah! It's you Third Floor Vending Room Printer
#1. Why you give me so much trouble?)
Root hints only will not create a database of name records for
lookups, but rather will just have the IP addresses of other DNS
servers where records can be found. If you already have DNS setup
on your network, you'll probably want to continue using the same
configuration you already have. If not, use forward and backward for
most situations. (Backup zones typically don't hurt anything, and
they are nice to have when the need arises.)
49. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
After you've made your section, click Next.
Now, you choose whether this server will maintain the zone, or if this
server will have a read-only copy of the DNS records from another
Server. Next enter your zone name. If this is your first DNS server,
then this needs to be the root zone name for your entire
organization. For example, my zone name might be arcticllama.com.
If however, this server will be authoritative only for a subset, and
other DNS servers will be responsible for other zones, then the name
will need to reflect that. For example, us.arcticllama.com would be
the zone name for just the American part of my vast corporate
empire :) Click next when you have entered the name.
Now, you need to choose the file name where the DNS records will
be stored. The default filename is to add a .dns extension to the
name of the zone you chose in the previous window. Unless you
have a corporate policy stating otherwise, stick with the convention
to make things easier on yourself down the line.
Next you select how this server will respond to Dynamic Updates.
Although there are three choices here, only two should actually be
used in production. Select the first option to allow only secure
50. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
dynamic updates if you are integrating your DNS with Active
Directory. Select do not allow dynamic updates if your DNS is not
integrated with Active Directory and you don't want to allow
dynamic updates. Do not allow unsecured dynamic updates unless
you really know what you are doing and have a very good reason for
doing so.
Up next is the option to configure forwarders. If your DNS server
ever gets a query for which it has no record, it can forward that
request on to another DNS server to see if it has the answer.
For example, in order to provide name resolution for internet
connectivity, you can input your ISP name servers here, or use a DNS
provider such as OpenDNS. You can (and should) have more than
one server listed in case a DNS server is unreachable for some
reason. The order forwarders are listed in is the order they are tried,
so place your faster and most reliable forwarder at the top of the
list.
51. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Click Next and your DNS server is now configured and ready for use.
Windows Internet Name Service (WINS)
WINS is a software service that dynamically maps IP
addresses to NetBIOS names.
A WINS client queries a WINS server for the IP address of
a requested server.
WINS sends the IP address of the requested server’s
NetBIOS name to the WINS client.
Before WINS can resolve NetBIOS names to IP addresses,
the WINS client must register with the WINS server.
52. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
WINS servers share and update their records with other
WINS servers in the enterprise network by using
replication.
The complete Windows Server 2003 WINS system
includes the following components:
WINS server: Server processes name registration requests
from WINS clients, registers client’s names and IP
addresses, and responds to NetBIOS name queries that
clients submit.
WINS database: This database stores and replicates the
NetBIOS name-to-IP address mappings for a network.
WINS clients: These computers are configured to directly
query a WINS server. WINS clients dynamically register
their NetBIOS names with a WINS server.
WINS proxy agent: This computer monitors name query
broadcasts on a subnet and forwards those queries
directly to a WINS server.
Managing the WINS Server Database
The Windows 2000 WINS database uses the
performance-enhanced Extensible Storage
Engine, an updated version of the generic
53. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
storage engine that serves both Microsoft
Exchange 5.5 servers and Windows 2000
servers. This database imposes no limit to the
number of records that a WINS server can
replicate or store.
The size of the database depends on the
number of WINS clients on the network, but it
is not directly proportional to the number of
active client entries. As inactive entries
proliferate, the WINS database grows, and
many WINS client entries become obsolete.
Eventually, these entries clutter the database.
To recover the unused space, the WINS
database is compacted. In Windows 2000,
WINS server database compaction occurs as an
automatic background process during idle time
after a database update. Because the database
compaction is also dynamic, you do not need
to stop the WINS server to compact the
database; this is also known as online
compaction
54. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Backing Up the WINS Database
The WINS management console provides backup tools so that
you can back up the WINS database. After you specify a backup
directory for the database, WINS performs complete database
backups every three hours, by installation default. For specific
instructions on how to back up and restore the WINS database,
see the Windows 2000 Server Help. You should also periodically
back up the registry entries for the WINS server.
Repairing a WINS Database
If your WINS database becomes corrupted, you can use various
options to renew its integrity. In cases in which the corruption
is limited to a specific set of records, you can repair them by
selectively increasing or decreasing the starting version number
used by the WINS server that owns the affected records. If you
choose this method, you can adjust the starting version used by
the server to force replication of uncorrupted WINS records,
which removes the affected records from other WINS servers.
If the corruption can't be repaired, you can delete the WINS
database and entirely restore it from a backup (assuming that
one exists). You can use the WINS backup feature in the WINS
management console to make backup copies of the WINS
database.
55. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
WINS client registration process
Name registration is the process of a WINS client
requesting and receiving the use of a NetBIOS name for
the services that the client makes available on the
network.
A WINS client computer sends a name registration
request directly to the WINS server.
The WINS server searches its database to see whether the
name exists and is active.
If the name does not exist or is not active in the database,
it is accepted as a new registration.
If the existing database entry is active and has an IP
address that is different from the IP address of the
registration request, WINS server must determine
whether the name and IP address in the database entry
are still in use.
If client computer still in use then WINS server rejects the
new registration by sending negative response. Otherwise
WINS server accepts the new registration process by
sending positive response.
WINS client release process
56. Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Name release removes the names registered in the WINS
database when the WINS client shutdown or whenever a
registered service is stopped.
When the client computer no longer requires a name
registration, it sends a name release request.
If the WINS server finds the name in the database, the
name is marked as released.
NetBIOS
NetBIOS is a software protocol for providing computer
communication services on local networks. Microsoft
Windows uses NetBIOS on Ethernet or Token Ring networks.
Software applications on a NetBIOS network locate each other
via their NetBIOS names.
A NetBIOS name is up to 16 characters long and in Windows,
separate from the computer name. Applications on other
computers access NetBIOS names over UDP port 137.