3. Network Protocols:
◦ A protocol is a set of rules and guidelines for communicating data. Rules are
defined for each step and process during communication between two or more
computers. Networks have to follow these rules to successfully transmit data.
4. Common typesofprotocols:
◦ The Internet Protocol is used in concert withother protocols within the Internet
ProtocolSuite.
◦ Prominent members of which include:
Transmission Control Protocol (TCP)
Hypertext TransferProtocol (HTTP)
File TransferProtocol (FTP)
Secured Shell (SSH)
Telnet
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol version 3 (POP3)
5. HTTP:
◦ (HyperText Transfer Protocol) The
communications protocol used to connect
to Web servers on the Internet or on a
local network (intranet). The primary
function of HTTP is to establish a
connection with the server and send HTML
pages back to the user's browser.
6. File Transfer Protocol(FTP):
◦ FTP(File Transfer Protocol) is the simplest and most secure way
to exchange files over the internet
◦ Transferring files from a client computer to a server computer is
Called “Uploading” and transferring from a server to a client
“Downloading”.
◦ To access an FTP server, user must be able to connect to the
internet or an intranet (via modem or local area Network) With
an FTP client program
◦ Businesses use FTP to send files between computers, while
websites use FTP for the uploading and downloading of files
from their website's servers.
7. Secure Shell(SSH):
◦ SSH, also known as Secure Shell or
Secure Socket Shell, is a network
protocol that gives users, particularly
system administrators, a secure way
to access a computer over an
unsecured network. SSH also refers
to the suite of utilities that
implement the SSH protocol.
8. Telnet:
◦ Telnet is a simple, text-based network protocol that is used for accessing remote computers
over TCP/IP networks like the Internet. Telnet was created and launched in 1969 and,
historically speaking, you can say that it was the first Internet
◦ Telnet services enable user to login to another computer on internet from their local computer
◦ Using :
Computing power of remote computing
Software on remote computer
Database of remoter computer
◦ This action is called “Remote Login”.
9. Simple Mail Transfer Protocol(SMTP):
◦ SMTP or Simple Mail Transfer Protocol is an application that is used to send, receive, and relay outgoing
emails between senders and receivers. When an email is sent, it's transferred over the internet from one
server to another using SMTP. In simple terms, an SMTP email is just an email sent using the SMTP server.
10. Post Office Protocol version 3 (POP3):
◦ Post Office Protocol 3, or POP3, is the most commonly used protocol for receiving email over
the internet. ... POP3 is a one-way client-server protocol in which email is received and held on
the email server. The "3" refers to the third version of the original POP protocol.
15. Hyper-V
◦ Hyper-V is virtualization software that, well, virtualizes software. It can not only virtualize operating
systems but also entire hardware components, such as hard drives and network switches. Unlike Fusion
and Virtualbox, Hyper-V is not limited to the user’s device. You can use it for server virtualization, too.
◦ Hypervisor: A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by
virtually sharing its resources, such as memory and processing.
◦ Example: VMware and Hyper-V are two key examples of hypervisor, with VMware owned by Dell and
Hyper-V created by Microsoft. VMware software is made for cloud computing and virtualization, and it
can install a hypervisor on your physical servers to allow multiple virtual machines to run at the same
time.
17. Installation of Window 2012 Server
◦ System Requirements
• Although most of the servers nowadays probably have the necessary requirements for Windows Server 2012. It
will certainly be useful to know them in case you want to upgrade from an older system.
The main requirements are:
CPU socket minimum 1.4 GHz (64-bit processor) or faster for single core and
Microsoft recommends is 3.1 GHz (64-bit processor) or faster multi-core.
RAM memory minimum is 2GB, but Microsoft recommends 8GB.
160 GB hard disk with a 60 GB system partition space in your hard disk.
One important thing to note here is that the installation process itself will verify your computer hardware and let
you know if it qualifies for a Windows Server 2012 installation. If not, then you will need to upgrade your
hardware.
18. Installation
Step 1 − We can download the evaluation ISO of Windows Server 2012 R2 from the following
link − https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2012-r2
But you will need to sign in first with a Microsoft account like Hotmail for example in order to
complete the download and the good thing is that the evaluation period will last for 180 days, so
you will have enough time to know if it will be the right product for you or not.
At the end, if you decide to buy the license of your Windows server 2012 R2. You can purchase it
online via a Microsoft online store found in
− https://www.microsoftstore.com/store/msusa/en_US/list/Windows-
Server/categoryID.70676900?icid=BusinessR_Software_80_Windows_Server_112315
19. Installation
◦ Step 2 − After downloading the ISO of Microsoft, create a boot USB driver which can be created with the Microsoft tool
called Windows USB/DVD Download Tool and can be downloaded from the following link
− https://www.microsoft.com/en-us/download/windows-usb-dvd-download-tool
◦ After downloading the EXE file, open it and select the ISO file location and then click next like in the following
screenshot, and wait up to the end when the Boot USB is created.
20. Installation
◦ Step 3 − After completing the above given steps, plug-in the USB to the server and wait for a while till it loads the files.
This will continue for about a couple of minutes as shown in the following screenshot.
21. Installation
Step 4 − After the files are loaded, you will
see the screen of language settings of
installation, keyboard, time and currency
format. Generally, all the default ones are also
good enough to start with. Click Next.
23. Installation
◦ Step 6 − Once you have clicked on Install Now, the setup will start and it will load all the files
and the screen will look as shown in the following screenshot.
24. Installation
◦ Step 7 − Wait until the files are loaded and then you will see the following screen. Let’s
select Windows Server 2012 DataCenter Evaluation (Server with GUI) and click Next.
25. Installing
◦ Step 8 − Click “I accept the license terms” and then click on the Next button as shown in the
following screenshot.
26. Installing
◦ Step 9 − The following screen will appear.
In “Driver Options” you can create a new
partition, delete or format the Hard disk.
After you have done this process then you
can select the partition where the
Windows server 2012 R2 will be installed
in our case we have one partition. Once
all this is done, then click on Next.
27. Installing
◦ Step 10 − Let’s wait until this process
finishes during this time and then the
server will reboot.
28. Installing
◦ Step 11 − Once the reboot is
done the following screen will
appear. Set the password for the
server and then click on “Finish”.
29. Installing
◦ Step 12 − It will take some minutes until the setup finishes completely.
30. Installing
◦ Step 13 − Once all this is done, you have
completed the installation process and
the following screen will appear.
◦ Congratulations!!!
31. Questions:
1- Why do we Need to create Virtual Machine?
2- What is Port?
3- what is HHTP?
4- difference b/w SSH and Telnet.
5- Difference b/w SMTP and POP3
32. Answers:
1. The main purpose of VMs is to operate multiple operating systems at the same time, from the same piece of
hardware
For Example: Without virtualization, operating multiple systems — like Windows and Linux — would require two
separate physical units. ... Hardware requires physical space that isn't always available.
2. A port is a virtual point where network connections start and end. Ports are software-based and managed by a
computer's operating system. Each port is associated with a specific process or service.
For Example: An example of the use of ports is the delivery of email. A server used for sending and receiving email
generally needs two services. The first service is used to transport email to and from other servers. This is
accomplished with the Simple Mail Transfer Protocol (SMTP). A standard SMTP service application listens on TCP port
25 for incoming requests. The second service is usually either the Post Office Protocol (POP) or the Internet Message
Access Protocol (IMAP) which is used by email client applications on users' personal computers to fetch email
messages from the server. The POP service listens on TCP port number 110.
33. MCQS:
1- SSH stands for?
Super Secure Shell Simple Secure Shell Socket Secure Shell Secure Socket Shell
2- In which protocol Port 80 is used?
HTTP FTP SMTP NONE
3- Receiving of Mail is function of?
SMTP FTP POP3 HTTP
4- Hypervisor is also known as?
VM VMM VM-Ware NONE
5- Hyper-V is owned by?
Windows Dell Microsoft Linux
34. MCQS
6. VMware owned by?
Dell Microsoft HP Lenovo
7. SMTP use port for mail?
25 80 443 404
8. Protocols are, set of rules to govern?
Communication Standard Wired Communication NONE
9. Which of the following best describes uploading information?
Sorting data on a disk drive Sending information to a
host computer
Receiving information from
a host computer
Sorting data on a hard
drive
10. When the mail server sends mail to other mail servers it becomes ___ ?
SMTP client SMTP server Peer Master