SlideShare a Scribd company logo
1 of 56
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
S
t
u
d
e
n
t
e
d
i
t
i
o
n
B
I
M
S
Y
S
T
E
M
A
D
M
I
N
I
S
T
R
A
T
I
O
N
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Contents
Chapter 1 : Introduction
1.1 IP Addresses
Chapter 2 :IP Address Classification
2.1 Private IP
2.2 Public IP
2.3 Default Subnet mask
2.4 Loopback IP
2.4 APIPA
Chapter 3 :Subnetting
3.1 Definition
3.2 Basic Questions of subnetting
3.2.1 What is Subnet Address / Network Id?
3.2.2 What is Usable range ?
3.3.3 What is Broadcast IP ?
3.3 Numerical Solutions (TU Old Questions )
Chapter 4 : Supernetting
4.1 Definition
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
1.0 IP Addresses
An IP address is an address used in order to uniquely
identify a device on an IP network. The address is made up of
32 binary bits, which can be divisible into a network portion
and host portion with the help of a subnet mask. The 32 binary
bits are broken into four octets (1 octet = 8 bits)
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.0 IP Address Classification
2.1 Private Address Space
 Not routable in Internet
 The assumption is that these private address ranges are not
directly connected to the Internet, so the addresses don't
have to be unique .
 A network administrator using these private addresses has
more room for subnetting, and many more assignable
addresses.
92.168.0.0 - 192.168.255.255 (65,536 IP addresses)
172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses)
2.2 Public Address Space
 A public IP address is any valid address, or number, that can be
accessed over the Internet.
 Any resources that will be available over the Internet will
require a public IP address
 Public IP addresses can be added in the Cloud Console
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.3 Default Subnet Mask
Class A -255.0.0.0 11111111.00000000. 00000000. 00000000
Class B -255.255.0.0 11111111. 11111111.00000000. 00000000
Class C -255.255.255.0 11111111. 11111111.11111111. 00000000
2.4 Loopback
Loopback is a communication channel with only one endpoint.
TCP/IP networks specify a loopback that allows client software to
communicate with server software on the same computer.
The range of addresses for loopback functionality is the range of
127.0.0.0 to 127.255.255.255
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
2.5 APIPA
 DHCP clients can automatically self-configure an IP address and subnet
mask when a DHCP server isn't available. When a DHCP client boots up,
it first looks for a DHCP server in order to obtain an IP address and
subnet mask.
 The IP address range is 169.254.0.1 through 169.254.255.254
The client also configures itself with a default class B subnet mask of
255.255.0.0
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Chapter 3 : Subnetting
3.1 Definition - What does Subnetting mean?
Subnetting is the strategy used to partition a single physical
network into more than one smaller logical sub-networks
(subnets). An IP address includes a network segment and a
host segment.
The practice of dividing a network into subnets (subnet) is a
separate and identifiable portion of an organization’s
network, typically a local area network (LAN) comprised of all
the machines on one floor, buildingor geographicallocation )
is called subnetting.
Benefits:
 Reduces the network traffic by reducing the volume of
broadcasts
 Helps to surpass the constraints in a local area network
(LAN), for example, the maximum number of permitted
hosts.
 Enables users to access a work network from their
homes; there is no need to open the complete network.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Basic Questions of Subnetting ?
 What is your subnet address?
 Broadcast address?
 Range of usable IP?
 What is your subnet mask ?
3.2.1 What is Subnet Address / Network Address ?
 Refers to an IPv4 address assigned to a network
 Eg: 192.168.1.0 , 172.16.0.0
 Lowest address is reserved as the network address
3.2.2 Broadcast address?
 uses the highest address in the network range
 Eg: 192.168.1.0 (Network ID)
192.168.1.255 (Broadcast ID)
 allows communication to all the hosts in that network
3.3.3 Range of usable IP/Host Address?
 Address assigned to each end device values between the network
address and the broadcast address
 For eg:
192.168.1.0 (Network Address)
192.168.1.255 (Broadcast Address)
192.168.1.1 - 254 (Host Addresses)
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
3.3 Numerical Solutions
1. You are the system administrator for your company’s network ,
APNIC has provided your company 22.23.44.128/25 , if your
company have to isolate your IP as required by your office
OFFICE A - 14 hosts OFFICE B -28 hosts
OFFICE C - 2 hosts OFFICE D -7 hosts
OFFICE E - 28 hosts
Find
Subnet mask , Subnet Address, Range of usable, IP Broadcast IP
 Solutions :
For Block size
2y
− 2 = hosts
Office
2y
− 2 = 28
5 bits
Office
2y
− 2 = 28
5 bits
Office
2y
− 2 = 14
4 bits
Office
2y
− 2 = 7
3 bits
Office
2y
− 2 = 2
1 bits
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Network ID Broadcast ID Usable Range Subnet mask
22.23.44.128 22.23.44.159 22.23.44.129-
22.23.44.158
/26
22.23.44.160 22.23.44.191 22.23.44.161-
22.23.44.190
/26
22.23.44.192 22.23.44.207 22.23.44.128-
22.23.44.206
/27
22.23.44.208 22.23.44.215 22.23.44.207-
22.23.44.214
/27
22.23.44.216 22.23.44.217 22.23.44.-
22.23.44.128
/27
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Practice Questions
2.Suppose you are network administrator for multinational IT Company.
Your company has five offices and you have to isolate your IP as required
by your offices.
Kathmandu Branch: must support 253 hosts
Pokhara Branch: must support 126 hosts
Biratnagar Branch: must support 62 hosts
Birgunj Branch: must support 30 hosts
Hetauda Branch: must support 14 hosts
Divide the given block of IPs into subnets to meet the above
requirements. For each subnet show the subnet address, the subnet
mask, range of the usable IP addresses, and the broadcast address in a
tabular form.
3. With given class B network: 190.190.0.0/16, subnet the network in order
to create network with following host requirements using VLSM.
a) Network-A: 8000 hosts
b) Network-B: 4000 hosts
c) Network-C: 4000 hosts
d) Network-D: 2000 hosts
e) Network-E: 1000 hosts
f) Network-F: 500 hosts
Tabulate the subnet mask, network address, broadcastaddress
and usable IP range of each subnet
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
4. the below listed details for the provided IP address
192.168.10.20 with Subnet Mask 255.255.255.192.
a. How many subnets?
b. How many host per subnets?
c. What are the valid subnets?
d. What is the broadcast address for each subnet?
e. What are the valid hosts ranges?
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Chapter 4 :Supernetting
4.1 Definition - What does Supernetting mean?
 Supernetting is the strategy used to Combining several IP
network addresses into one IP address
 Supernetting, also called Classless Inter-Domain Routing (CIDR),
is a way to aggregate multiple Internet addresses of the same
class.
4.2 Why Supernetting ?
Supernetting was created as a way to solve the problem of routing tables
growing beyond the ability of current software and people to manage and to
provide a solution to the exhaustion of Class B network address space.
4.3 Protocol supporting Supernetting ?
The Border Gateway Protocol (BGP), the prevailing exterior
(interdomain) gateway protocol and the Open Shortest Path First
(OSPF) router protocol both support supernetting.
4.4 Numerical Solutions :
 Example :
IP Network Addresses
172.16.8.0
10101100.00010000.00001000.00000000
172.16.16.0
10101100.00010000.00010000.00000000
|
|
Subnet Mask |
|
255.255.224.0 |
11111111.11111111.11100000.00000000
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
4.5 What is CIDR (/) ?
Classless inter-domain routing (CIDR) is a set of Internet
protocol (IP) standards that is used to create unique
identifiers for networks and individual devices
so a notation system was developed to make the
process more efficient and standardized.
4.6What is VLSM ?
 Variable Length Subnet Mask, abbreviated as VLSM.
 A Variable Length Subnet Mask (VLSM) is a numerical masking sequence,
or IP address subset, based on overall network requirements
 With VLSM, a network administrator can use a long mask on networks
with few hosts and a short mask on subnets with many hosts
 Key VLSM features include:
Simple network configuration
Network IP addressing through empty subnet filling
Greater efficiency than fixed-length subnet masks (FLSM)
VLSMs are used by a variety of network systems and services, including:
 Intermediate System to Intermediate System Protocol (IS-IS)
 Border Gateway Protocol (BGP)
 Enhanced Interior Gateway Routing Protocol (EIGRP)
 Cisco's Open Shortest Path First (OSPF)
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
TU Old Questions
1. What is the broadcast IP in 192.168.1.6/27?
2. To add a static route to the 10.0.0.0 network that uses a netmask of 255.0.0.0 and a
gateway of 192.168.0.1, write the necessary command?
3. Which address can be an Automatic Private IP Address (APIPA)?
4. What difference do you find between Subnetting and VLSM?
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
S
t
u
d
e
n
t
e
d
i
t
i
o
n
B
I
M
S
Y
S
T
E
M
A
D
M
I
N
I
S
T
R
A
T
I
O
N
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines
how electronic devices (like computers) should be connected over the
Internet, and how data should be transmitted between them.
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets before they can
be sent over a network, and for assembling the packets again when they
arrive.
IP - Internet Protocol
IP takes care of the communication between computers. It is responsible for
addressing, sending and receiving the data packets over the Internet.
TCP/IP Protocols For the Web
Web browsers and servers use TCP/IP protocols to connect to the Internet.
Common TCP/IP protocols are:
 HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web
browser. HTTP is used for sending requests from a web client (a browser) to a
web server, returning web content (web pages) from the server back to the
client.
 HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web
browser. HTTPS typically handles credit card transactions and other sensitive
data.
 FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Installing and configuring the TCP/IP protocol
Installing TCP/IP
TCP/IPisinstalled automaticallywhenthe WindowsServer 2003 setup process runs. It is not usually
necessary to install TCP/IP after the Windows Server 2003 setup process completed.
The instances when you might need to manually install TCP/IP are listed below:
TCP/IP was disabled when the Windows Server 2003 setup process executed.
TCP/IP was uninstalled from the computer.
How to install the TCP/IP protocol suite
1. Click Start, Control Panel, and then click Network Connections
2. In the NetworkConnectionswindow,right-clickthe networkconnection for which you want
to install TCP/IP and then click Properties from the shortcut menu.
3. If you are working with the local area connection, you will use the General tab in the
following step. If you are working with any other connection, you will use the Networking
tab
4. Click Install, and then click Protocol.
5. Click Add to open the Select Network Protocol dialog box.
6. Click Internet Protocol (TCP/IP) in the dialog box.
7. Click OK
8. Confirm that the Internet Protocol (TCP/IP) checkbox is enabled.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Troubleshooting TCP/IP
Connect to an IP Address
Try to connectto anothercomputeron yournetworkusingits IP address and the TCP/IP program or
utilityof yourchoice.Webbrowsers,ftp,andTelnetare some programsandutilitiescommonlyused
to connect to other computers with TCP/IP.
If you cannot connect to the other computer using its IP address, there is a basic connectivity
problem.
If you can connectto the other computerusing its IP address, but you are not able to connect using
the host or NetBIOS name of the other computuer, there is probably a name resolution problem.
UNABLE TO CONNECT TO A SPECIFIC IP ADDRESS
Follow the procedures in each of the following sections in order. After you finish each procedure,
check to see if you can connect to the other computer using its IP address.
 Check Your TCP/IP Configuration
When you use TCP/IP as your network protocol, an incorrect TCP/IP setting (such as an incorrect IP
address or an incorrect subnet mask) can cause communication problems.
Use the IPCONFIG command to determine your computer's basic TCP/IP settings. To do so, type
ipconfig at a command prompt.
Verify that the IP address and subnet mask displayed by the IPCONFIG command are the correct
values for your computer.
 Ping the Loopback Address
Use the PING command to verify that TCP/IP is working properly. To do so, ping the loopback
address (127.0.0.1) by typing the following command at a command prompt:
ping 127.0.0.1
If you receive an error message at this point, TCP/IP is not properly installed.
 Ping Your Computer's IP Address
If you can ping the loopback address successfully, attempt to ping your own IP address by typing
ping <IP address> at a command prompt, where <IP address> is your computer's IP address.
If you receive an error message at this point, there may be a communication problem between
WindowsNTand yournetworkadapter.To correct thisproblem, removeandreinstall your network
adapter driver.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 Clear the Address Resolution Protocol (ARP) Cache
The address resolutionprotocol (ARP) cache isa listof recently resolved IP address to Media Access
Control (MAC) address mappings. The MAC address is the unique physical address embedded in
each network adapter.
If an entry in the ARP cache is incorrect, IP datagrams may be sent to the wrong computer. To
display all mappings currently in the ARP cache, use the ARP command by typing arp -a at a
command prompt.
To remove any incorrect entries in the ARP cache, clear all entries using the following command:
arp -d <IP address>
Where <IP address>isan Internetaddressstoredinthe ARPcache.Use thiscommandfor eachentry
in the ARP cache until all entries have been deleted.
 Verify the Default Gateway
Use the IPCONFIG command to determine the IP address that your computer uses to access your
defaultgateway.Todoso, type "ipconfig" (without quotation marks) at a command prompt. Verify
that the IP address displayed for your default gateway is correct.
 Ping the IP Address of the Other Computer
Try to ping the IP address of the other computer. To do so, type ping <IP address> where <IP
address> is the IP address of the other computer.
 Verify Persistent Route Table Entries
Any computer using TCP/IP as a network protocol has a route table. The route a network packet
takesfromone computerusingTCP/IPto anothercomputerusingTCP/IPisdeterminedbythe route
table of the computer that sent the network packet.
Your computer's route table is automatically rebuilt each time you restart your computer. You or
your network administrator can add persistent (static) entries to your computer's route table.
Persistententriesare automaticallyreinserted in your route table each time your computer's route
table is rebuilt.
 Use the TRACERT Command
The TRACERT command reports each router or gateway crossed by a TCP/IP packet on its way to
another host. To use the TRACERT command to trace the route between your computer and the
other computer, type tracert <IP address> at a command prompt, where <IP address> is the IP
address of the other computer.
 Verify Server Services on the Other Computer
Verifythatthe appropriate server services are running on the other computer. For example, if you
are attempting to use the Telnet tool to connect to the other computer, make sure that the other
computer is configured as a Telnet server.
To verifythat the appropriate server service is running on the other computer, attempt to connect
to the other computer from another computer that is on the same subnet as the other computer.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 Check IP Security on the Server
Port settings for services on the other computer may be different than the port settings you are
using to connect.
Use the Telnet tool to verify that the other computer is configured to permit connections on the
same port you are using to connect. To do so, type the following line at a command prompt:
telnet <IP address> <port>
Where <IP address> is the IP address of the other computer and <port> is the port you are
attemptingtomake a connectionon.Forexample, if you are attempting to make an ftp connection
to the other computer on port 21, type telnet <IP address> 21.
Unable to Connect to a Specific Host or NETBios Name
If you are able toconnectto the othercomputerusingitsIPaddress,butyou are not able to connect
to the other computer using its host or NetBIOS name, there may be a name resolution problem.
There are many methods that can be used to accomplish name resolution on a network including
the following:
 HOSTS files
 Domain Name Service (DNS)
 LMHOSTS files
 Windows Internet Name Service (WINS)
 https://support.microsoft.com/en-us/kb/169790
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Microsoft Windows Server 2003
Environment Network Administration
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP (Dynamic Host Configuration Protocol)
All TCP/IP hosts, such as client computers or network devices,
require TCP/IP address and configuration data.
TCP/IP configuration data can include TCP/IP address, subnet mask
and additional IP data such as router information and information on
other types of services.
 System administrators can either manually configure and
maintain IP configuration for clients or use DHCP to dynamically
assign, configure and maintain the TCP/IP configuration data
for each host.
 DHCP is an IP standard for simplifying management of host IP
configuration .For TCP/IP-based networks, DHCP reduces the
complexity and amount of administrative work that is involved
in reconfiguring computers. When we configure the DHCP
server to support DHCP clients, the DHCP server automatically
supplies the configuration information to DHCP clients.
 Computers use the Dynamic Host Configuration Protocol for
requesting Internet Protocol parameters from a network
server, such as an IP address. The protocol operates based on
the client-server model.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
How DHCP Allocates IP Address
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP Lease Generation Process
 DHCP lease generation process is the process by which
the DHCP client receives IP addressing configuration data
from the DHCP Server .
 DHCP uses a four-step process to lease IP addressing
information to DHCP clients.
 DHCP discover
 DHCP offer
 DHCP request
 DHCP acknowledgement or DHCP negative
acknowledgement.
DHCP discovery
 The client broadcasts messages on the network subnet using
the destination address 255.255.255.255 or the specific subnet
broadcast address. A DHCP client may also request its last-
known IP address. If the client remains connected to the same
network, the server may grant the request. Otherwise, it
depends whether the server is set up as authoritative or not.
DHCP offer
 When a DHCP server receives a DHCPDISCOVER message from
a client, which is an IP address lease request, the server
reserves an IP address for the client and makes a lease offer by
sending a DHCPOFFER message to the client. This message
contains the client's MAC address, the IP address that the
server is offering, the subnet mask, the lease duration, and the
IP address of the DHCP server making the offer.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP request
 In response to the DHCP offer, the client replies with a DHCP
request, broadcast to the server, requesting the offered
address. A client can receive DHCP offers from multiple servers,
but it will accept only one DHCP offer. Based on required server
identification option in the request and broadcast messaging,
servers are informed whose offer the client has accepted.
When other DHCP servers receive this message, they withdraw
any offers that they might have made to the client and return
the offered address to the pool of available addresses.
DHCP acknowledgement
 When the DHCP server receives the DHCPREQUEST message
from the client, the configuration process enters its final phase.
The acknowledgement phase involves sending a DHCPACK
packet to the client. This packet includes the lease duration and
any other configuration information that the client might have
requested. At this point, the IP configuration process is
completed.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DHCP Lease Renewal Process
 DHCP lease renewal process is the process by which the DHCP
client renews or updates its IP address configuration data with
the DHCP server.
 At any time during the lease period, the DHCP client can send a
DHCPRELEASE packet to the DHCP server to release the IP
address configuration data and to cancel remaining lease.
 The client must renew its IP configuration data before the lease
period expires. To attempt a lease renewal, the DHCP client
sends a DHCPREQUEST packet directly to the DHCP server from
which the client obtained the lease.
 If the DHCP server is available, it renews the lease and sends
the client a DHCPACK packet that includes the new lease
duration and any updated configuration parameters.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Configuring and Managing DHCP Server
INSTALLING THE DHCP SERVICE
1. Select Start, Settings, Control Panel, Add or Remove Programs.
2. On the Add or Remove Programs page, click Add/Remove
Windows Components to open the Windows Components
Wizard.
3. Select Networking Services, as shown in Figure.
Figure DHCP is located in the Networking Services group in the
Windows Component Wizard.
4. Click the Details button to open the Networking Services window,
shown in Figure 2.2.
5. Select Dynamic Host Configuration Protocol (DHCP) and click OK.
Figure : You select the Dynamic Host Configuration Protocol
(DHCP) option to install the DHCP server.
6. Back in the Windows Components Wizard page, click Next To
begin the installation.
7. If you are prompted to supply the location of your Windows
Server 2003 CD-ROM or installation files, provide the correct
location. Windows installs the DHCP service files on your
computer.
8. When prompted that installation is complete, click Finish to close
the Windows Components Wizard.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Managing DHCP SERVER
Figure 8: DHCP Server management in Server Manager
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 9: Starting the DHCP Server MMC
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 10: The Windows Server 2008 DHCP Server MMC
Figure 11: DHCP Server Address Pool
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 12: DHCP Server Scope Options
Figure 13: Vista client received IP address from new DHCP Server
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases
Domain Name System (DNS)
DNS is a name resolution service.DNS resolves human-friendly
addresses into IP addresses.DNS is a hierarchical distributed
database that contains mappings of DNS host names to IP
addresses.
 The conceptual naming system on which DNS is based on a
hierarchical and logical tree structure called the domain
namespace.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Domain Namespace
 DNS namespace includes the root domain, top-level
domains, second-level domains, and sub-domains.
 The root domain is the root node of the DNS tree. It is
unnamed (null).
 The top-level domain is the trailing (rightmost) portion of
a domain name.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Components Of DNS ( How DNS works)
 DNS server: A computer running the DNS server service.
May be authoritative for a namespace or domain.
Resolves the name resolution request that DNS clients
submit.
 DNS client: A computer running the DNS client service.
 DNS resource records: Entries in the DNS database that
map host names to resources.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
DNS Query
 A recursive query is a query made to a DNS server, in which the
DNS client asks the DNS server to provide a complete answer to
the query.
 An iterative query is a query made to a DNS server in which the
DNS client requests the best answer that the DNS server can
provide without seeking further help from other DNS servers.
Resource Records and Record Types
1.Host (A):
 An A record resolves a host name to an IP address.
 A records are the most common and most
frequently used DNS records.
 An A record represents a computer or device on the
network.
 The address (A) resource record maps an FQDN to
an IP address, so the resolvers can request the
corresponding IP address for an FQDN. For example,
the following A resource record, located in the zone
noam.reskit.com, maps the FQDN of the server to its
IP address.
2.Pointer (PTR):
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 A PTR record is used to find the DNS name that
corresponds to an IP address.
 The PTR record is found only in a reverse lookup
zone.
 PTR records resolve an IP address to a hostname.
 The pointer (PTR) resource record in contrast to the
A resource record, maps an IP address to an FQDN.
For example, the following PTR resource record
maps the IP address of noamdc1.noam.reskit.com to
its FQDN:
3. Start Of Authority (SOA):
 An SOA resource record is the first record in any
zone file.
 An SOA resource record identifies the primary DNS
name server for the zone.
 Every zone contains a Start of Authority (SOA)
resource record at the beginning of the zone.
4. Name Server (NS):
 An NS record facilitates delegation by identifying
DNS servers for each zone.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 An NS record resolves from a domain name to a host
name.
 The name server (NS) resource record indicates the
servers authoritative for the zone. They indicate
primary and secondary servers for the zone
specified in the SOA resource record, and they
indicate the servers for any delegated zones. Every
zone must contain at least one NS record at the
zone root.
5. Mail Exchanger (MX):
 An MX resource record indicates the presence of a
Simple Mail Transfer Protocol (SMTP) e-mail server.
 An MX resource record resolves to a host name.
 A mail server priority can be set if multiple MX
records exist for a zone.
 The mail exchange (MX) resource record specifies a
mail exchange server for a DNS domain name. A
mail exchange server is a host that will either
process or forward mail for the DNS domain name.
Processing the mail means either delivering it to the
addressee or passing it to a different type of mail
transport. Forwarding the mail means sending it to
its final destination server, sending it using Simple
Mail Transfer Protocol (SMTP) to another mail
exchange server that is closer to the final
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
destination, or queuing it for a specified amount of
time.
6. Alias (CNAME):
 A CNAME resource record is a host name that refers
to another host name.
 A CNAME resource record resolves from a host
name to another host name.
 The canonical name (CNAME) resource record
creates an alias (synonymous name) for the
specified FQDN. You can use CNAME records to hide
the implementation details of your network from
the clients that connect to it.
7. Service Locator (SRV):
 An SRV resource record indicates a network service
that a host offers.
 An SRV resource record resolves from a service
name to a host name and port.
 With MX records, you can have multiple mail servers
in a DNS domain, and when a mailer needs to send
mail to a host in the domain, it can find the location
of a mail exchange server. But what about other
applications, such as the World Wide Web or telnet?
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 Service (SRV) resource records enable you to
specify the location of the servers for a specific
service, protocol, and DNS domain. Thus, if you
have two Web servers in your domain, you can
create SRV resource records specifying which
hosts serve as Web servers, and resolvers can
then retrieve all the SRV resource records for
the Web servers.
DNS Zone Types
Primary Zone:
 Read/Write copy of a DNS database.
 A primary zone is the only zone type that can
be edited or updated because the data in the
zone is the original source of the data for all
domains in the zone
 Updates made to the primary zone are made
by the DNS server that is authoritative for the
specific primary zone. Users can also back up
data from a primary zone to a secondary zone.
Secondary Zone:
 Read-only copy of a DNS database.
 A secondary zone is a read-only copy of the zone that was
copied from the master server during zone transfer. In
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
fact, a secondary zone can only be updated through zone
transfer.
Stub Zone:
 Copy of a zone that contains only records used to locate
name servers.
 A stub zone is a new Windows Server 2003 feature. Stub
zones only contain those resource records necessary to
identify the authoritative DNS servers for the master
zone. Stub zones therefore contain only a copy of a zone,
and are used to resolve recursive and iterative queries:
 Iterative queries: The DNS server provides the best
answer it can. This can be:
o The resolved name
o A referral to a different DNS server
 Recursive queries: The DNS server has to reply with
the requested information or with an error. The
DNS server cannot provide a referral to a different
DNS server.
Active Directory Integrated Zone:
 Zone that is stored in Active Directory rather than in zone
files.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 An Active Directory-integrated zone is a zone that stores
its data in Active Directory. DNS zone files are not needed.
This type of zone is an authoritative primary zone. An
Active Directory-integrated zone’s zone data is
replicated during the Active Directory replication process.
 Active Directory-integrated zones also enjoy the Active
Directory’s security features.
Forward and Reverse Lookup Zone
 In DNS, a forward lookup is a query process
that attempts to resolve a host name to an IP
address.
 In DNS manager, forward lookup zones are
based on DNS domain names and typically
hold host (A) resource records.
 In DNS, a reverse lookup is a query process
that attempts to resolve an IP address to host
name.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 In DNS manager, reverse lookup zones are
based on the in-addr.arpa domain name and
typically hold pointer (PTR) resource records.
Installing, Managing and configuring
DNS
For DNS servers, you will be selecting the Role-based or feature-
based installation.
Next, you will choose which server you want to install the DNS server
role on from the server pool. Select the server you want, and click
next.
At this point, you will see a pop-up window informing you that some
additional tools are required to manage the DNS Server. These tools
do not necessarily have to be installed on the same server you are
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
installing the DNS role on. If your organization only does remote
administration, you do not have to install the DNS Server Tools.
However, in a crunch you may find yourself sitting at the server
console or remotely using the console and needing to manage the
DNS Server directly. In this case, you will wish you had the tools
installed locally. Unless your company policy forbids it, it is typically
prudent to install the management tools on the server where the
DNS will be housed.
Now you should see the Features window. No need to make any
changes here; just click Next.
Next is an informational window about DNS Server and what it does,
although one would assume that if you've gotten this far, you are
already aware of what it is. Click Next to move on.
This is the final confirmation screen before installation completes.
You can check the box to Restart the destination server
automatically, if you like. Installing the DNS Server does not require
a restart, but unless you've planned for the downtime, keep that box
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
unchecked, just in case.
The DNS Server role should now be installed on your server. There
should be a new DNS Role tile in your Server Manager.
Configure DNS Server in Server 2012
If you are an old pro with DNS server files, Windows Server 2012
does let you edit the files directly. However, Microsoft recommends
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
that you use the interface tools to avoid errors, especially if you are
integrating DNS with Active Directory.If you want to use the
command line to configure your DNS, use the dnscmd command. For
those of us who don't memorize TechNet for fun, a few clicks is all it
takes.
Within Server Manager, to configure the DNS Server, click the Tools
menu and select DNS. This brings up the DNS Manager window.
We need to configure how the DNS server will work before adding
any actual records. Select the DNS server to manage, then click the
Action menu, and select Configure a DNS Server. This brings up the
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Configure a DNS Server wizard.
There are three options here. You can either: configure a forward
lookup zone only, create forward and reverse lookup zone, or
configure root hints only.
A forward lookup zone allows you to do the standard DNS function of
taking a name and resolving it into an IP address.
A reverse lookup zone allows you to do the opposite, taking an IP
address and finding its name. For example, if a user is set up to print
to a printer with an IP address of 10.20.12.114, but you need to
know what name that printer goes by so you can find it, a reverse
lookup can help. ("Ah, hah! It's you Third Floor Vending Room Printer
#1. Why you give me so much trouble?)
Root hints only will not create a database of name records for
lookups, but rather will just have the IP addresses of other DNS
servers where records can be found. If you already have DNS setup
on your network, you'll probably want to continue using the same
configuration you already have. If not, use forward and backward for
most situations. (Backup zones typically don't hurt anything, and
they are nice to have when the need arises.)
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
After you've made your section, click Next.
Now, you choose whether this server will maintain the zone, or if this
server will have a read-only copy of the DNS records from another
Server. Next enter your zone name. If this is your first DNS server,
then this needs to be the root zone name for your entire
organization. For example, my zone name might be arcticllama.com.
If however, this server will be authoritative only for a subset, and
other DNS servers will be responsible for other zones, then the name
will need to reflect that. For example, us.arcticllama.com would be
the zone name for just the American part of my vast corporate
empire :) Click next when you have entered the name.
Now, you need to choose the file name where the DNS records will
be stored. The default filename is to add a .dns extension to the
name of the zone you chose in the previous window. Unless you
have a corporate policy stating otherwise, stick with the convention
to make things easier on yourself down the line.
Next you select how this server will respond to Dynamic Updates.
Although there are three choices here, only two should actually be
used in production. Select the first option to allow only secure
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
dynamic updates if you are integrating your DNS with Active
Directory. Select do not allow dynamic updates if your DNS is not
integrated with Active Directory and you don't want to allow
dynamic updates. Do not allow unsecured dynamic updates unless
you really know what you are doing and have a very good reason for
doing so.
Up next is the option to configure forwarders. If your DNS server
ever gets a query for which it has no record, it can forward that
request on to another DNS server to see if it has the answer.
For example, in order to provide name resolution for internet
connectivity, you can input your ISP name servers here, or use a DNS
provider such as OpenDNS. You can (and should) have more than
one server listed in case a DNS server is unreachable for some
reason. The order forwarders are listed in is the order they are tried,
so place your faster and most reliable forwarder at the top of the
list.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Click Next and your DNS server is now configured and ready for use.
Windows Internet Name Service (WINS)
 WINS is a software service that dynamically maps IP
addresses to NetBIOS names.
 A WINS client queries a WINS server for the IP address of
a requested server.
 WINS sends the IP address of the requested server’s
NetBIOS name to the WINS client.
 Before WINS can resolve NetBIOS names to IP addresses,
the WINS client must register with the WINS server.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 WINS servers share and update their records with other
WINS servers in the enterprise network by using
replication.
 The complete Windows Server 2003 WINS system
includes the following components:
 WINS server: Server processes name registration requests
from WINS clients, registers client’s names and IP
addresses, and responds to NetBIOS name queries that
clients submit.
 WINS database: This database stores and replicates the
NetBIOS name-to-IP address mappings for a network.
 WINS clients: These computers are configured to directly
query a WINS server. WINS clients dynamically register
their NetBIOS names with a WINS server.
 WINS proxy agent: This computer monitors name query
broadcasts on a subnet and forwards those queries
directly to a WINS server.
Managing the WINS Server Database
 The Windows 2000 WINS database uses the
performance-enhanced Extensible Storage
Engine, an updated version of the generic
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
storage engine that serves both Microsoft
Exchange 5.5 servers and Windows 2000
servers. This database imposes no limit to the
number of records that a WINS server can
replicate or store.
 The size of the database depends on the
number of WINS clients on the network, but it
is not directly proportional to the number of
active client entries. As inactive entries
proliferate, the WINS database grows, and
many WINS client entries become obsolete.
Eventually, these entries clutter the database.
 To recover the unused space, the WINS
database is compacted. In Windows 2000,
WINS server database compaction occurs as an
automatic background process during idle time
after a database update. Because the database
compaction is also dynamic, you do not need
to stop the WINS server to compact the
database; this is also known as online
compaction
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
Backing Up the WINS Database
 The WINS management console provides backup tools so that
you can back up the WINS database. After you specify a backup
directory for the database, WINS performs complete database
backups every three hours, by installation default. For specific
instructions on how to back up and restore the WINS database,
see the Windows 2000 Server Help. You should also periodically
back up the registry entries for the WINS server.
Repairing a WINS Database
 If your WINS database becomes corrupted, you can use various
options to renew its integrity. In cases in which the corruption
is limited to a specific set of records, you can repair them by
selectively increasing or decreasing the starting version number
used by the WINS server that owns the affected records. If you
choose this method, you can adjust the starting version used by
the server to force replication of uncorrupted WINS records,
which removes the affected records from other WINS servers.
 If the corruption can't be repaired, you can delete the WINS
database and entirely restore it from a backup (assuming that
one exists). You can use the WINS backup feature in the WINS
management console to make backup copies of the WINS
database.
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
WINS client registration process
 Name registration is the process of a WINS client
requesting and receiving the use of a NetBIOS name for
the services that the client makes available on the
network.
 A WINS client computer sends a name registration
request directly to the WINS server.
 The WINS server searches its database to see whether the
name exists and is active.
 If the name does not exist or is not active in the database,
it is accepted as a new registration.
 If the existing database entry is active and has an IP
address that is different from the IP address of the
registration request, WINS server must determine
whether the name and IP address in the database entry
are still in use.
 If client computer still in use then WINS server rejects the
new registration by sending negative response. Otherwise
WINS server accepts the new registration process by
sending positive response.
WINS client release process
Tribhuvan University BIM SYSTEM ADMINISTRATION
Prepared By : BISHALMAHAT
 Name release removes the names registered in the WINS
database when the WINS client shutdown or whenever a
registered service is stopped.
 When the client computer no longer requires a name
registration, it sends a name release request.
 If the WINS server finds the name in the database, the
name is marked as released.
NetBIOS
 NetBIOS is a software protocol for providing computer
communication services on local networks. Microsoft
Windows uses NetBIOS on Ethernet or Token Ring networks.
 Software applications on a NetBIOS network locate each other
via their NetBIOS names.
 A NetBIOS name is up to 16 characters long and in Windows,
separate from the computer name. Applications on other
computers access NetBIOS names over UDP port 137.

More Related Content

What's hot

Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
adpeer
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
cbtvid
 
Subnetting
SubnettingSubnetting
Subnetting
swascher
 

What's hot (20)

IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Ip addressing upload
Ip addressing uploadIp addressing upload
Ip addressing upload
 
Ipv4 address
Ipv4 addressIpv4 address
Ipv4 address
 
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9eChapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
Chapter 8 - IP Subnetting, Troubleshooting and Introduction to NAT 9e
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Computer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP AddressingComputer Networking: Subnetting and IP Addressing
Computer Networking: Subnetting and IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
 
Vlsm
VlsmVlsm
Vlsm
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
 
NAT and Subnetting
NAT and Subnetting NAT and Subnetting
NAT and Subnetting
 
IP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICTIP addressing Grade 10 TLE ICT
IP addressing Grade 10 TLE ICT
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
Easy subnetting
Easy subnettingEasy subnetting
Easy subnetting
 

Viewers also liked

Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
Raja Waseem Akhtar
 
Certificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration FundamentalCertificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration Fundamental
Abdulmoiz Lakdawala
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II
Timothy Chen
 
TUTORIAL WINDOWS SERVER 2003
TUTORIAL WINDOWS SERVER 2003TUTORIAL WINDOWS SERVER 2003
TUTORIAL WINDOWS SERVER 2003
harelpi
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
► Supreme Mandal ◄
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server Administration
Raja Waseem Akhtar
 
Thailand Internet User Profile 2013
Thailand Internet User Profile 2013Thailand Internet User Profile 2013
Thailand Internet User Profile 2013
Electronic Transactions Development Agency
 
bly122_scientificpaper
bly122_scientificpaperbly122_scientificpaper
bly122_scientificpaper
Brittany Beach
 

Viewers also liked (16)

Windows Server 2003 Administration
Windows Server 2003 AdministrationWindows Server 2003 Administration
Windows Server 2003 Administration
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
 
Certificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration FundamentalCertificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration Fundamental
 
Windows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals CertificateWindows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals Certificate
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II
 
TUTORIAL WINDOWS SERVER 2003
TUTORIAL WINDOWS SERVER 2003TUTORIAL WINDOWS SERVER 2003
TUTORIAL WINDOWS SERVER 2003
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server Administration
 
Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco Matter by Angel del Águila y María Blanco
Matter by Angel del Águila y María Blanco
 
Thailand Internet User Profile 2013
Thailand Internet User Profile 2013Thailand Internet User Profile 2013
Thailand Internet User Profile 2013
 
Streebo Manufacturing Apps Suite
Streebo Manufacturing Apps SuiteStreebo Manufacturing Apps Suite
Streebo Manufacturing Apps Suite
 
Skills for success
Skills for successSkills for success
Skills for success
 
diseño
diseñodiseño
diseño
 
VIKAS_RESUME
VIKAS_RESUMEVIKAS_RESUME
VIKAS_RESUME
 
Health in our body by Maria Blanco. 4th Grade
Health in our body by Maria Blanco. 4th GradeHealth in our body by Maria Blanco. 4th Grade
Health in our body by Maria Blanco. 4th Grade
 
bly122_scientificpaper
bly122_scientificpaperbly122_scientificpaper
bly122_scientificpaper
 

Similar to Microsoft windows server 2003

Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
ManojGowdaKb
 
Networking
NetworkingNetworking
Networking
Rashmi
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
Sofian .
 

Similar to Microsoft windows server 2003 (20)

Lecture 06
Lecture 06Lecture 06
Lecture 06
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Basic network training1
Basic network training1Basic network training1
Basic network training1
 
Chapter06
Chapter06Chapter06
Chapter06
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Subnet Design
Subnet DesignSubnet Design
Subnet Design
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
Chapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.pptChapter 5 Network Configuration Basics.ppt
Chapter 5 Network Configuration Basics.ppt
 
CCNA ppt Day 3
CCNA ppt Day 3CCNA ppt Day 3
CCNA ppt Day 3
 
Networking
NetworkingNetworking
Networking
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Computer-Network-PowerPoint-Slide (1).pptx
Computer-Network-PowerPoint-Slide (1).pptxComputer-Network-PowerPoint-Slide (1).pptx
Computer-Network-PowerPoint-Slide (1).pptx
 
Ccna1v3 mod10
Ccna1v3 mod10Ccna1v3 mod10
Ccna1v3 mod10
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
ip addressing & subnet.pptx
ip addressing & subnet.pptxip addressing & subnet.pptx
ip addressing & subnet.pptx
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Microsoft windows server 2003

  • 1. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Microsoft Windows Server 2003 Environment Network Administration S t u d e n t e d i t i o n B I M S Y S T E M A D M I N I S T R A T I O N
  • 2. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Contents Chapter 1 : Introduction 1.1 IP Addresses Chapter 2 :IP Address Classification 2.1 Private IP 2.2 Public IP 2.3 Default Subnet mask 2.4 Loopback IP 2.4 APIPA Chapter 3 :Subnetting 3.1 Definition 3.2 Basic Questions of subnetting 3.2.1 What is Subnet Address / Network Id? 3.2.2 What is Usable range ? 3.3.3 What is Broadcast IP ? 3.3 Numerical Solutions (TU Old Questions ) Chapter 4 : Supernetting 4.1 Definition
  • 3. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 1.0 IP Addresses An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits)
  • 4. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 2.0 IP Address Classification 2.1 Private Address Space  Not routable in Internet  The assumption is that these private address ranges are not directly connected to the Internet, so the addresses don't have to be unique .  A network administrator using these private addresses has more room for subnetting, and many more assignable addresses. 92.168.0.0 - 192.168.255.255 (65,536 IP addresses) 172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses) 10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses) 2.2 Public Address Space  A public IP address is any valid address, or number, that can be accessed over the Internet.  Any resources that will be available over the Internet will require a public IP address  Public IP addresses can be added in the Cloud Console
  • 5. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 2.3 Default Subnet Mask Class A -255.0.0.0 11111111.00000000. 00000000. 00000000 Class B -255.255.0.0 11111111. 11111111.00000000. 00000000 Class C -255.255.255.0 11111111. 11111111.11111111. 00000000 2.4 Loopback Loopback is a communication channel with only one endpoint. TCP/IP networks specify a loopback that allows client software to communicate with server software on the same computer. The range of addresses for loopback functionality is the range of 127.0.0.0 to 127.255.255.255
  • 6. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 2.5 APIPA  DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available. When a DHCP client boots up, it first looks for a DHCP server in order to obtain an IP address and subnet mask.  The IP address range is 169.254.0.1 through 169.254.255.254 The client also configures itself with a default class B subnet mask of 255.255.0.0
  • 7. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Chapter 3 : Subnetting 3.1 Definition - What does Subnetting mean? Subnetting is the strategy used to partition a single physical network into more than one smaller logical sub-networks (subnets). An IP address includes a network segment and a host segment. The practice of dividing a network into subnets (subnet) is a separate and identifiable portion of an organization’s network, typically a local area network (LAN) comprised of all the machines on one floor, buildingor geographicallocation ) is called subnetting. Benefits:  Reduces the network traffic by reducing the volume of broadcasts  Helps to surpass the constraints in a local area network (LAN), for example, the maximum number of permitted hosts.  Enables users to access a work network from their homes; there is no need to open the complete network.
  • 8. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Basic Questions of Subnetting ?  What is your subnet address?  Broadcast address?  Range of usable IP?  What is your subnet mask ? 3.2.1 What is Subnet Address / Network Address ?  Refers to an IPv4 address assigned to a network  Eg: 192.168.1.0 , 172.16.0.0  Lowest address is reserved as the network address 3.2.2 Broadcast address?  uses the highest address in the network range  Eg: 192.168.1.0 (Network ID) 192.168.1.255 (Broadcast ID)  allows communication to all the hosts in that network 3.3.3 Range of usable IP/Host Address?  Address assigned to each end device values between the network address and the broadcast address  For eg: 192.168.1.0 (Network Address) 192.168.1.255 (Broadcast Address) 192.168.1.1 - 254 (Host Addresses)
  • 9. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 3.3 Numerical Solutions 1. You are the system administrator for your company’s network , APNIC has provided your company 22.23.44.128/25 , if your company have to isolate your IP as required by your office OFFICE A - 14 hosts OFFICE B -28 hosts OFFICE C - 2 hosts OFFICE D -7 hosts OFFICE E - 28 hosts Find Subnet mask , Subnet Address, Range of usable, IP Broadcast IP  Solutions : For Block size 2y − 2 = hosts Office 2y − 2 = 28 5 bits Office 2y − 2 = 28 5 bits Office 2y − 2 = 14 4 bits Office 2y − 2 = 7 3 bits Office 2y − 2 = 2 1 bits
  • 10. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Network ID Broadcast ID Usable Range Subnet mask 22.23.44.128 22.23.44.159 22.23.44.129- 22.23.44.158 /26 22.23.44.160 22.23.44.191 22.23.44.161- 22.23.44.190 /26 22.23.44.192 22.23.44.207 22.23.44.128- 22.23.44.206 /27 22.23.44.208 22.23.44.215 22.23.44.207- 22.23.44.214 /27 22.23.44.216 22.23.44.217 22.23.44.- 22.23.44.128 /27
  • 11. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Practice Questions 2.Suppose you are network administrator for multinational IT Company. Your company has five offices and you have to isolate your IP as required by your offices. Kathmandu Branch: must support 253 hosts Pokhara Branch: must support 126 hosts Biratnagar Branch: must support 62 hosts Birgunj Branch: must support 30 hosts Hetauda Branch: must support 14 hosts Divide the given block of IPs into subnets to meet the above requirements. For each subnet show the subnet address, the subnet mask, range of the usable IP addresses, and the broadcast address in a tabular form. 3. With given class B network: 190.190.0.0/16, subnet the network in order to create network with following host requirements using VLSM. a) Network-A: 8000 hosts b) Network-B: 4000 hosts c) Network-C: 4000 hosts d) Network-D: 2000 hosts e) Network-E: 1000 hosts f) Network-F: 500 hosts Tabulate the subnet mask, network address, broadcastaddress and usable IP range of each subnet
  • 12. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 4. the below listed details for the provided IP address 192.168.10.20 with Subnet Mask 255.255.255.192. a. How many subnets? b. How many host per subnets? c. What are the valid subnets? d. What is the broadcast address for each subnet? e. What are the valid hosts ranges?
  • 13. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Chapter 4 :Supernetting 4.1 Definition - What does Supernetting mean?  Supernetting is the strategy used to Combining several IP network addresses into one IP address  Supernetting, also called Classless Inter-Domain Routing (CIDR), is a way to aggregate multiple Internet addresses of the same class. 4.2 Why Supernetting ? Supernetting was created as a way to solve the problem of routing tables growing beyond the ability of current software and people to manage and to provide a solution to the exhaustion of Class B network address space. 4.3 Protocol supporting Supernetting ? The Border Gateway Protocol (BGP), the prevailing exterior (interdomain) gateway protocol and the Open Shortest Path First (OSPF) router protocol both support supernetting. 4.4 Numerical Solutions :  Example : IP Network Addresses 172.16.8.0 10101100.00010000.00001000.00000000 172.16.16.0 10101100.00010000.00010000.00000000 | | Subnet Mask | | 255.255.224.0 | 11111111.11111111.11100000.00000000
  • 14. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT 4.5 What is CIDR (/) ? Classless inter-domain routing (CIDR) is a set of Internet protocol (IP) standards that is used to create unique identifiers for networks and individual devices so a notation system was developed to make the process more efficient and standardized. 4.6What is VLSM ?  Variable Length Subnet Mask, abbreviated as VLSM.  A Variable Length Subnet Mask (VLSM) is a numerical masking sequence, or IP address subset, based on overall network requirements  With VLSM, a network administrator can use a long mask on networks with few hosts and a short mask on subnets with many hosts  Key VLSM features include: Simple network configuration Network IP addressing through empty subnet filling Greater efficiency than fixed-length subnet masks (FLSM) VLSMs are used by a variety of network systems and services, including:  Intermediate System to Intermediate System Protocol (IS-IS)  Border Gateway Protocol (BGP)  Enhanced Interior Gateway Routing Protocol (EIGRP)  Cisco's Open Shortest Path First (OSPF)
  • 15. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT TU Old Questions 1. What is the broadcast IP in 192.168.1.6/27? 2. To add a static route to the 10.0.0.0 network that uses a netmask of 255.0.0.0 and a gateway of 192.168.0.1, write the necessary command? 3. Which address can be an Automatic Private IP Address (APIPA)? 4. What difference do you find between Subnetting and VLSM?
  • 16. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Microsoft Windows Server 2003 Environment Network Administration S t u d e n t e d i t i o n B I M S Y S T E M A D M I N I S T R A T I O N
  • 17. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT What is TCP/IP? TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines how electronic devices (like computers) should be connected over the Internet, and how data should be transmitted between them. TCP - Transmission Control Protocol TCP is responsible for breaking data down into small packets before they can be sent over a network, and for assembling the packets again when they arrive. IP - Internet Protocol IP takes care of the communication between computers. It is responsible for addressing, sending and receiving the data packets over the Internet. TCP/IP Protocols For the Web Web browsers and servers use TCP/IP protocols to connect to the Internet. Common TCP/IP protocols are:  HTTP - Hyper Text Transfer Protocol HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.  HTTPS - Secure HTTP HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data.  FTP - File Transfer Protocol FTP takes care of transmission of files between computers.
  • 18. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Installing and configuring the TCP/IP protocol Installing TCP/IP TCP/IPisinstalled automaticallywhenthe WindowsServer 2003 setup process runs. It is not usually necessary to install TCP/IP after the Windows Server 2003 setup process completed. The instances when you might need to manually install TCP/IP are listed below: TCP/IP was disabled when the Windows Server 2003 setup process executed. TCP/IP was uninstalled from the computer. How to install the TCP/IP protocol suite 1. Click Start, Control Panel, and then click Network Connections 2. In the NetworkConnectionswindow,right-clickthe networkconnection for which you want to install TCP/IP and then click Properties from the shortcut menu. 3. If you are working with the local area connection, you will use the General tab in the following step. If you are working with any other connection, you will use the Networking tab 4. Click Install, and then click Protocol. 5. Click Add to open the Select Network Protocol dialog box. 6. Click Internet Protocol (TCP/IP) in the dialog box. 7. Click OK 8. Confirm that the Internet Protocol (TCP/IP) checkbox is enabled.
  • 19. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Troubleshooting TCP/IP Connect to an IP Address Try to connectto anothercomputeron yournetworkusingits IP address and the TCP/IP program or utilityof yourchoice.Webbrowsers,ftp,andTelnetare some programsandutilitiescommonlyused to connect to other computers with TCP/IP. If you cannot connect to the other computer using its IP address, there is a basic connectivity problem. If you can connectto the other computerusing its IP address, but you are not able to connect using the host or NetBIOS name of the other computuer, there is probably a name resolution problem. UNABLE TO CONNECT TO A SPECIFIC IP ADDRESS Follow the procedures in each of the following sections in order. After you finish each procedure, check to see if you can connect to the other computer using its IP address.  Check Your TCP/IP Configuration When you use TCP/IP as your network protocol, an incorrect TCP/IP setting (such as an incorrect IP address or an incorrect subnet mask) can cause communication problems. Use the IPCONFIG command to determine your computer's basic TCP/IP settings. To do so, type ipconfig at a command prompt. Verify that the IP address and subnet mask displayed by the IPCONFIG command are the correct values for your computer.  Ping the Loopback Address Use the PING command to verify that TCP/IP is working properly. To do so, ping the loopback address (127.0.0.1) by typing the following command at a command prompt: ping 127.0.0.1 If you receive an error message at this point, TCP/IP is not properly installed.  Ping Your Computer's IP Address If you can ping the loopback address successfully, attempt to ping your own IP address by typing ping <IP address> at a command prompt, where <IP address> is your computer's IP address. If you receive an error message at this point, there may be a communication problem between WindowsNTand yournetworkadapter.To correct thisproblem, removeandreinstall your network adapter driver.
  • 20. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  Clear the Address Resolution Protocol (ARP) Cache The address resolutionprotocol (ARP) cache isa listof recently resolved IP address to Media Access Control (MAC) address mappings. The MAC address is the unique physical address embedded in each network adapter. If an entry in the ARP cache is incorrect, IP datagrams may be sent to the wrong computer. To display all mappings currently in the ARP cache, use the ARP command by typing arp -a at a command prompt. To remove any incorrect entries in the ARP cache, clear all entries using the following command: arp -d <IP address> Where <IP address>isan Internetaddressstoredinthe ARPcache.Use thiscommandfor eachentry in the ARP cache until all entries have been deleted.  Verify the Default Gateway Use the IPCONFIG command to determine the IP address that your computer uses to access your defaultgateway.Todoso, type "ipconfig" (without quotation marks) at a command prompt. Verify that the IP address displayed for your default gateway is correct.  Ping the IP Address of the Other Computer Try to ping the IP address of the other computer. To do so, type ping <IP address> where <IP address> is the IP address of the other computer.  Verify Persistent Route Table Entries Any computer using TCP/IP as a network protocol has a route table. The route a network packet takesfromone computerusingTCP/IPto anothercomputerusingTCP/IPisdeterminedbythe route table of the computer that sent the network packet. Your computer's route table is automatically rebuilt each time you restart your computer. You or your network administrator can add persistent (static) entries to your computer's route table. Persistententriesare automaticallyreinserted in your route table each time your computer's route table is rebuilt.  Use the TRACERT Command The TRACERT command reports each router or gateway crossed by a TCP/IP packet on its way to another host. To use the TRACERT command to trace the route between your computer and the other computer, type tracert <IP address> at a command prompt, where <IP address> is the IP address of the other computer.  Verify Server Services on the Other Computer Verifythatthe appropriate server services are running on the other computer. For example, if you are attempting to use the Telnet tool to connect to the other computer, make sure that the other computer is configured as a Telnet server. To verifythat the appropriate server service is running on the other computer, attempt to connect to the other computer from another computer that is on the same subnet as the other computer.
  • 21. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  Check IP Security on the Server Port settings for services on the other computer may be different than the port settings you are using to connect. Use the Telnet tool to verify that the other computer is configured to permit connections on the same port you are using to connect. To do so, type the following line at a command prompt: telnet <IP address> <port> Where <IP address> is the IP address of the other computer and <port> is the port you are attemptingtomake a connectionon.Forexample, if you are attempting to make an ftp connection to the other computer on port 21, type telnet <IP address> 21. Unable to Connect to a Specific Host or NETBios Name If you are able toconnectto the othercomputerusingitsIPaddress,butyou are not able to connect to the other computer using its host or NetBIOS name, there may be a name resolution problem. There are many methods that can be used to accomplish name resolution on a network including the following:  HOSTS files  Domain Name Service (DNS)  LMHOSTS files  Windows Internet Name Service (WINS)  https://support.microsoft.com/en-us/kb/169790
  • 22. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Microsoft Windows Server 2003 Environment Network Administration
  • 23. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT DHCP (Dynamic Host Configuration Protocol) All TCP/IP hosts, such as client computers or network devices, require TCP/IP address and configuration data. TCP/IP configuration data can include TCP/IP address, subnet mask and additional IP data such as router information and information on other types of services.  System administrators can either manually configure and maintain IP configuration for clients or use DHCP to dynamically assign, configure and maintain the TCP/IP configuration data for each host.  DHCP is an IP standard for simplifying management of host IP configuration .For TCP/IP-based networks, DHCP reduces the complexity and amount of administrative work that is involved in reconfiguring computers. When we configure the DHCP server to support DHCP clients, the DHCP server automatically supplies the configuration information to DHCP clients.  Computers use the Dynamic Host Configuration Protocol for requesting Internet Protocol parameters from a network server, such as an IP address. The protocol operates based on the client-server model.
  • 24. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT How DHCP Allocates IP Address
  • 25. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT DHCP Lease Generation Process  DHCP lease generation process is the process by which the DHCP client receives IP addressing configuration data from the DHCP Server .  DHCP uses a four-step process to lease IP addressing information to DHCP clients.  DHCP discover  DHCP offer  DHCP request  DHCP acknowledgement or DHCP negative acknowledgement. DHCP discovery  The client broadcasts messages on the network subnet using the destination address 255.255.255.255 or the specific subnet broadcast address. A DHCP client may also request its last- known IP address. If the client remains connected to the same network, the server may grant the request. Otherwise, it depends whether the server is set up as authoritative or not. DHCP offer  When a DHCP server receives a DHCPDISCOVER message from a client, which is an IP address lease request, the server reserves an IP address for the client and makes a lease offer by sending a DHCPOFFER message to the client. This message contains the client's MAC address, the IP address that the server is offering, the subnet mask, the lease duration, and the IP address of the DHCP server making the offer.
  • 26. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT DHCP request  In response to the DHCP offer, the client replies with a DHCP request, broadcast to the server, requesting the offered address. A client can receive DHCP offers from multiple servers, but it will accept only one DHCP offer. Based on required server identification option in the request and broadcast messaging, servers are informed whose offer the client has accepted. When other DHCP servers receive this message, they withdraw any offers that they might have made to the client and return the offered address to the pool of available addresses. DHCP acknowledgement  When the DHCP server receives the DHCPREQUEST message from the client, the configuration process enters its final phase. The acknowledgement phase involves sending a DHCPACK packet to the client. This packet includes the lease duration and any other configuration information that the client might have requested. At this point, the IP configuration process is completed.
  • 27. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT DHCP Lease Renewal Process  DHCP lease renewal process is the process by which the DHCP client renews or updates its IP address configuration data with the DHCP server.  At any time during the lease period, the DHCP client can send a DHCPRELEASE packet to the DHCP server to release the IP address configuration data and to cancel remaining lease.  The client must renew its IP configuration data before the lease period expires. To attempt a lease renewal, the DHCP client sends a DHCPREQUEST packet directly to the DHCP server from which the client obtained the lease.  If the DHCP server is available, it renews the lease and sends the client a DHCPACK packet that includes the new lease duration and any updated configuration parameters.
  • 28. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Configuring and Managing DHCP Server INSTALLING THE DHCP SERVICE 1. Select Start, Settings, Control Panel, Add or Remove Programs. 2. On the Add or Remove Programs page, click Add/Remove Windows Components to open the Windows Components Wizard. 3. Select Networking Services, as shown in Figure. Figure DHCP is located in the Networking Services group in the Windows Component Wizard. 4. Click the Details button to open the Networking Services window, shown in Figure 2.2. 5. Select Dynamic Host Configuration Protocol (DHCP) and click OK. Figure : You select the Dynamic Host Configuration Protocol (DHCP) option to install the DHCP server. 6. Back in the Windows Components Wizard page, click Next To begin the installation. 7. If you are prompted to supply the location of your Windows Server 2003 CD-ROM or installation files, provide the correct location. Windows installs the DHCP service files on your computer. 8. When prompted that installation is complete, click Finish to close the Windows Components Wizard.
  • 29. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT
  • 30. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Managing DHCP SERVER Figure 8: DHCP Server management in Server Manager
  • 31. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Figure 9: Starting the DHCP Server MMC
  • 32. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Figure 10: The Windows Server 2008 DHCP Server MMC Figure 11: DHCP Server Address Pool
  • 33. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Figure 12: DHCP Server Scope Options Figure 13: Vista client received IP address from new DHCP Server
  • 34. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Figure 14: Win 2008 DHCP Server has the Vista client listed under Address Leases Domain Name System (DNS) DNS is a name resolution service.DNS resolves human-friendly addresses into IP addresses.DNS is a hierarchical distributed database that contains mappings of DNS host names to IP addresses.  The conceptual naming system on which DNS is based on a hierarchical and logical tree structure called the domain namespace.
  • 35. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Domain Namespace  DNS namespace includes the root domain, top-level domains, second-level domains, and sub-domains.  The root domain is the root node of the DNS tree. It is unnamed (null).  The top-level domain is the trailing (rightmost) portion of a domain name.
  • 36. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Components Of DNS ( How DNS works)  DNS server: A computer running the DNS server service. May be authoritative for a namespace or domain. Resolves the name resolution request that DNS clients submit.  DNS client: A computer running the DNS client service.  DNS resource records: Entries in the DNS database that map host names to resources.
  • 37. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT DNS Query  A recursive query is a query made to a DNS server, in which the DNS client asks the DNS server to provide a complete answer to the query.  An iterative query is a query made to a DNS server in which the DNS client requests the best answer that the DNS server can provide without seeking further help from other DNS servers. Resource Records and Record Types 1.Host (A):  An A record resolves a host name to an IP address.  A records are the most common and most frequently used DNS records.  An A record represents a computer or device on the network.  The address (A) resource record maps an FQDN to an IP address, so the resolvers can request the corresponding IP address for an FQDN. For example, the following A resource record, located in the zone noam.reskit.com, maps the FQDN of the server to its IP address. 2.Pointer (PTR):
  • 38. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  A PTR record is used to find the DNS name that corresponds to an IP address.  The PTR record is found only in a reverse lookup zone.  PTR records resolve an IP address to a hostname.  The pointer (PTR) resource record in contrast to the A resource record, maps an IP address to an FQDN. For example, the following PTR resource record maps the IP address of noamdc1.noam.reskit.com to its FQDN: 3. Start Of Authority (SOA):  An SOA resource record is the first record in any zone file.  An SOA resource record identifies the primary DNS name server for the zone.  Every zone contains a Start of Authority (SOA) resource record at the beginning of the zone. 4. Name Server (NS):  An NS record facilitates delegation by identifying DNS servers for each zone.
  • 39. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  An NS record resolves from a domain name to a host name.  The name server (NS) resource record indicates the servers authoritative for the zone. They indicate primary and secondary servers for the zone specified in the SOA resource record, and they indicate the servers for any delegated zones. Every zone must contain at least one NS record at the zone root. 5. Mail Exchanger (MX):  An MX resource record indicates the presence of a Simple Mail Transfer Protocol (SMTP) e-mail server.  An MX resource record resolves to a host name.  A mail server priority can be set if multiple MX records exist for a zone.  The mail exchange (MX) resource record specifies a mail exchange server for a DNS domain name. A mail exchange server is a host that will either process or forward mail for the DNS domain name. Processing the mail means either delivering it to the addressee or passing it to a different type of mail transport. Forwarding the mail means sending it to its final destination server, sending it using Simple Mail Transfer Protocol (SMTP) to another mail exchange server that is closer to the final
  • 40. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT destination, or queuing it for a specified amount of time. 6. Alias (CNAME):  A CNAME resource record is a host name that refers to another host name.  A CNAME resource record resolves from a host name to another host name.  The canonical name (CNAME) resource record creates an alias (synonymous name) for the specified FQDN. You can use CNAME records to hide the implementation details of your network from the clients that connect to it. 7. Service Locator (SRV):  An SRV resource record indicates a network service that a host offers.  An SRV resource record resolves from a service name to a host name and port.  With MX records, you can have multiple mail servers in a DNS domain, and when a mailer needs to send mail to a host in the domain, it can find the location of a mail exchange server. But what about other applications, such as the World Wide Web or telnet?
  • 41. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  Service (SRV) resource records enable you to specify the location of the servers for a specific service, protocol, and DNS domain. Thus, if you have two Web servers in your domain, you can create SRV resource records specifying which hosts serve as Web servers, and resolvers can then retrieve all the SRV resource records for the Web servers. DNS Zone Types Primary Zone:  Read/Write copy of a DNS database.  A primary zone is the only zone type that can be edited or updated because the data in the zone is the original source of the data for all domains in the zone  Updates made to the primary zone are made by the DNS server that is authoritative for the specific primary zone. Users can also back up data from a primary zone to a secondary zone. Secondary Zone:  Read-only copy of a DNS database.  A secondary zone is a read-only copy of the zone that was copied from the master server during zone transfer. In
  • 42. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT fact, a secondary zone can only be updated through zone transfer. Stub Zone:  Copy of a zone that contains only records used to locate name servers.  A stub zone is a new Windows Server 2003 feature. Stub zones only contain those resource records necessary to identify the authoritative DNS servers for the master zone. Stub zones therefore contain only a copy of a zone, and are used to resolve recursive and iterative queries:  Iterative queries: The DNS server provides the best answer it can. This can be: o The resolved name o A referral to a different DNS server  Recursive queries: The DNS server has to reply with the requested information or with an error. The DNS server cannot provide a referral to a different DNS server. Active Directory Integrated Zone:  Zone that is stored in Active Directory rather than in zone files.
  • 43. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  An Active Directory-integrated zone is a zone that stores its data in Active Directory. DNS zone files are not needed. This type of zone is an authoritative primary zone. An Active Directory-integrated zone’s zone data is replicated during the Active Directory replication process.  Active Directory-integrated zones also enjoy the Active Directory’s security features. Forward and Reverse Lookup Zone  In DNS, a forward lookup is a query process that attempts to resolve a host name to an IP address.  In DNS manager, forward lookup zones are based on DNS domain names and typically hold host (A) resource records.  In DNS, a reverse lookup is a query process that attempts to resolve an IP address to host name.
  • 44. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  In DNS manager, reverse lookup zones are based on the in-addr.arpa domain name and typically hold pointer (PTR) resource records. Installing, Managing and configuring DNS For DNS servers, you will be selecting the Role-based or feature- based installation. Next, you will choose which server you want to install the DNS server role on from the server pool. Select the server you want, and click next. At this point, you will see a pop-up window informing you that some additional tools are required to manage the DNS Server. These tools do not necessarily have to be installed on the same server you are
  • 45. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT installing the DNS role on. If your organization only does remote administration, you do not have to install the DNS Server Tools. However, in a crunch you may find yourself sitting at the server console or remotely using the console and needing to manage the DNS Server directly. In this case, you will wish you had the tools installed locally. Unless your company policy forbids it, it is typically prudent to install the management tools on the server where the DNS will be housed. Now you should see the Features window. No need to make any changes here; just click Next. Next is an informational window about DNS Server and what it does, although one would assume that if you've gotten this far, you are already aware of what it is. Click Next to move on. This is the final confirmation screen before installation completes. You can check the box to Restart the destination server automatically, if you like. Installing the DNS Server does not require a restart, but unless you've planned for the downtime, keep that box
  • 46. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT unchecked, just in case. The DNS Server role should now be installed on your server. There should be a new DNS Role tile in your Server Manager. Configure DNS Server in Server 2012 If you are an old pro with DNS server files, Windows Server 2012 does let you edit the files directly. However, Microsoft recommends
  • 47. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT that you use the interface tools to avoid errors, especially if you are integrating DNS with Active Directory.If you want to use the command line to configure your DNS, use the dnscmd command. For those of us who don't memorize TechNet for fun, a few clicks is all it takes. Within Server Manager, to configure the DNS Server, click the Tools menu and select DNS. This brings up the DNS Manager window. We need to configure how the DNS server will work before adding any actual records. Select the DNS server to manage, then click the Action menu, and select Configure a DNS Server. This brings up the
  • 48. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Configure a DNS Server wizard. There are three options here. You can either: configure a forward lookup zone only, create forward and reverse lookup zone, or configure root hints only. A forward lookup zone allows you to do the standard DNS function of taking a name and resolving it into an IP address. A reverse lookup zone allows you to do the opposite, taking an IP address and finding its name. For example, if a user is set up to print to a printer with an IP address of 10.20.12.114, but you need to know what name that printer goes by so you can find it, a reverse lookup can help. ("Ah, hah! It's you Third Floor Vending Room Printer #1. Why you give me so much trouble?) Root hints only will not create a database of name records for lookups, but rather will just have the IP addresses of other DNS servers where records can be found. If you already have DNS setup on your network, you'll probably want to continue using the same configuration you already have. If not, use forward and backward for most situations. (Backup zones typically don't hurt anything, and they are nice to have when the need arises.)
  • 49. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT After you've made your section, click Next. Now, you choose whether this server will maintain the zone, or if this server will have a read-only copy of the DNS records from another Server. Next enter your zone name. If this is your first DNS server, then this needs to be the root zone name for your entire organization. For example, my zone name might be arcticllama.com. If however, this server will be authoritative only for a subset, and other DNS servers will be responsible for other zones, then the name will need to reflect that. For example, us.arcticllama.com would be the zone name for just the American part of my vast corporate empire :) Click next when you have entered the name. Now, you need to choose the file name where the DNS records will be stored. The default filename is to add a .dns extension to the name of the zone you chose in the previous window. Unless you have a corporate policy stating otherwise, stick with the convention to make things easier on yourself down the line. Next you select how this server will respond to Dynamic Updates. Although there are three choices here, only two should actually be used in production. Select the first option to allow only secure
  • 50. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT dynamic updates if you are integrating your DNS with Active Directory. Select do not allow dynamic updates if your DNS is not integrated with Active Directory and you don't want to allow dynamic updates. Do not allow unsecured dynamic updates unless you really know what you are doing and have a very good reason for doing so. Up next is the option to configure forwarders. If your DNS server ever gets a query for which it has no record, it can forward that request on to another DNS server to see if it has the answer. For example, in order to provide name resolution for internet connectivity, you can input your ISP name servers here, or use a DNS provider such as OpenDNS. You can (and should) have more than one server listed in case a DNS server is unreachable for some reason. The order forwarders are listed in is the order they are tried, so place your faster and most reliable forwarder at the top of the list.
  • 51. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Click Next and your DNS server is now configured and ready for use. Windows Internet Name Service (WINS)  WINS is a software service that dynamically maps IP addresses to NetBIOS names.  A WINS client queries a WINS server for the IP address of a requested server.  WINS sends the IP address of the requested server’s NetBIOS name to the WINS client.  Before WINS can resolve NetBIOS names to IP addresses, the WINS client must register with the WINS server.
  • 52. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  WINS servers share and update their records with other WINS servers in the enterprise network by using replication.  The complete Windows Server 2003 WINS system includes the following components:  WINS server: Server processes name registration requests from WINS clients, registers client’s names and IP addresses, and responds to NetBIOS name queries that clients submit.  WINS database: This database stores and replicates the NetBIOS name-to-IP address mappings for a network.  WINS clients: These computers are configured to directly query a WINS server. WINS clients dynamically register their NetBIOS names with a WINS server.  WINS proxy agent: This computer monitors name query broadcasts on a subnet and forwards those queries directly to a WINS server. Managing the WINS Server Database  The Windows 2000 WINS database uses the performance-enhanced Extensible Storage Engine, an updated version of the generic
  • 53. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT storage engine that serves both Microsoft Exchange 5.5 servers and Windows 2000 servers. This database imposes no limit to the number of records that a WINS server can replicate or store.  The size of the database depends on the number of WINS clients on the network, but it is not directly proportional to the number of active client entries. As inactive entries proliferate, the WINS database grows, and many WINS client entries become obsolete. Eventually, these entries clutter the database.  To recover the unused space, the WINS database is compacted. In Windows 2000, WINS server database compaction occurs as an automatic background process during idle time after a database update. Because the database compaction is also dynamic, you do not need to stop the WINS server to compact the database; this is also known as online compaction
  • 54. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT Backing Up the WINS Database  The WINS management console provides backup tools so that you can back up the WINS database. After you specify a backup directory for the database, WINS performs complete database backups every three hours, by installation default. For specific instructions on how to back up and restore the WINS database, see the Windows 2000 Server Help. You should also periodically back up the registry entries for the WINS server. Repairing a WINS Database  If your WINS database becomes corrupted, you can use various options to renew its integrity. In cases in which the corruption is limited to a specific set of records, you can repair them by selectively increasing or decreasing the starting version number used by the WINS server that owns the affected records. If you choose this method, you can adjust the starting version used by the server to force replication of uncorrupted WINS records, which removes the affected records from other WINS servers.  If the corruption can't be repaired, you can delete the WINS database and entirely restore it from a backup (assuming that one exists). You can use the WINS backup feature in the WINS management console to make backup copies of the WINS database.
  • 55. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT WINS client registration process  Name registration is the process of a WINS client requesting and receiving the use of a NetBIOS name for the services that the client makes available on the network.  A WINS client computer sends a name registration request directly to the WINS server.  The WINS server searches its database to see whether the name exists and is active.  If the name does not exist or is not active in the database, it is accepted as a new registration.  If the existing database entry is active and has an IP address that is different from the IP address of the registration request, WINS server must determine whether the name and IP address in the database entry are still in use.  If client computer still in use then WINS server rejects the new registration by sending negative response. Otherwise WINS server accepts the new registration process by sending positive response. WINS client release process
  • 56. Tribhuvan University BIM SYSTEM ADMINISTRATION Prepared By : BISHALMAHAT  Name release removes the names registered in the WINS database when the WINS client shutdown or whenever a registered service is stopped.  When the client computer no longer requires a name registration, it sends a name release request.  If the WINS server finds the name in the database, the name is marked as released. NetBIOS  NetBIOS is a software protocol for providing computer communication services on local networks. Microsoft Windows uses NetBIOS on Ethernet or Token Ring networks.  Software applications on a NetBIOS network locate each other via their NetBIOS names.  A NetBIOS name is up to 16 characters long and in Windows, separate from the computer name. Applications on other computers access NetBIOS names over UDP port 137.