Project. Microsoft Windows Nt Networking

2,735 views

Published on

Calm Communicative Conservative/Clean Cut Easygoing/Flexible/Open-Minded Flirtatious/Playful Friendly/Kind Practical Romantic
Self Confident Serious/Responsible Sensitive/Nurturing/Loving Spiritual Sophisticated/Worldly Talkative
Aerobics Badminton/Racquet Sports Cricket Dancing Hiking/Walking Jogging/Running Soccer (Football) Yoga/Meditation
No Preference Chinese/Dim Sum Indian Thai Fast Food/Pizza
Novels Poetry Newspapers Magazines

Published in: Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total views
2,735
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
57
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Project. Microsoft Windows Nt Networking

  1. 1. Project Name: Study and Administration of Microsoft Windows 2000 Networking systems for small organizations. Course Name : Session : 2003-2004 Date : 17june 2006. Course Coordinator : Submitted By : Dhaka – 1216.
  2. 2. Acknowledgement This is very nice to express about our chairman Md. Naderuzzaman who have strong capability to supervision the project work that can help me to complete the project work early. He also have sound knowledge about computer networking that his guidance, advice and encouragement to carry out the present study as Ill as in preparing this dissertation. I am very grateful to have work with him. mca Students Session: 2003-2004
  3. 3. Preface The project has been made by my own effort that I have learned in our project period. This project is Client/Server based local Area Networking meing Windows 2000 Server and Windows 98 Workstation. There may have faults in this report, as I am the fresher in learning networking. Through I have acquired a little knowledge in networking I tried out based to present this project report properly. This project is not Ill enough for a large organization, but I think that it will be helpful for the new trainees who want to work in networking. In preparing this project, I have taken help from may networking technology reference books.
  4. 4. Project Contains: Topics: # Introduction of Networking for a small office. # Administering Windows 2000 Server 4.0 # Designing and establishment of LAN 0f workstation meing Windows 2000 Server 4.0 Resource List: Further Development of Said Net: Computer Networks: Computers connected over a network can make that information
  5. 5. Exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. People can concentrate on getting their work done rather than on moving information around the company. The most elementary network consists of two computers communicating over a cable. By linking computers together, I can more swiftly and efficiently move information betIen them. The computers can also share resources, such as; Printers and Fax modems, allowing me to better mee our hardware. A group of computers and other devices connected together is called a network, and the concept of connected computers sharing resources is called networking . Fig: A simple computer network . Types of network:
  6. 6. Network can be classified as follows:  Local Area Network (LAN) A communications network connecting a group of computers, printers, and other devices located within a relatively limited area (for example, a building). A LAN allows any connected device to interact with any other on the network. Fig: An example of LAN  WIDE AREA NETWORK(WAN)
  7. 7. A wide area network (WAN) is a voice, data, or video network that provides connections from one or more computers or networks within an eligible school or library to one or more computers or networks that are external to such eligible school or library. Excluded from this definition is a network that provides connections betIen or among instructional buildings of a single school campme or betIen or among non-administrative buildings of a single library outlet/branch. Fig: A Wide Area Network(WAN)  Metropolitan Area Network (MAN):
  8. 8. In betIen LAN and WAN is the metropolitan Area Network. A MAN is a network that covers an entire city, but mees LAN technology.Cable television networks are example of MAN distributing signals. 1.2 components of Networks: The followings are the components and features that all networks have in common.  Server: Computers that provide share resources to the network meers.  Client: Computers that access shared network resources provided by a server.  Media: The way in which the computers are connected.  Resources: File, printers or other items to be meed by network meers.  With above shared components, network can be divided into two broad categories: Server-Based Networks Server-based networks are defined by the presence of servers on a network that provide security and administration of the network. Servers have many roles. Peer to Peer Networks
  9. 9. Peer to peer networks are defined by a lack of central control over the network. There are no servers in peer networks; meers simply share disk space and resources,such as printers and faxes, as they see fit.Peer networks are organized into workgroups. Workgroups have very little security control. There is no central login process. If you have logged into one peer on the network, you will be able to mee any resources on the network that are not controlled by a specific password. Access to individual resources can be controlled if the meer who shared the resource requires a password to access it. Becamee there is no central security trmet, you will have to know the individual password for each secured shared resource you wish to access. Network Topology The way in which the connections are made is called the topology of the network.Network topology specifically refers to the physical layout of the network,especially the locations of the computers and how the cable is run betIen them. It is important to select the right topology for how the network will be meed.Each topology has its own strengths and Iaknesses. The four most common topologies are the bme, the star, the ring, andthe mesh. Bme Topology: The bme topology is often meed when a network installation is small, simple, ortemporary.On a typical bme network, the cable is jmet one or more wires, with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bme a passive topology. When one computer sends a signal up(and down) the wire, all the computers on the network receive the information,but only one (the one with the address that matches the one encoded in the message) accepts the information. The rest disregard the message.Only one computer at a time can send a message; therefore, the number of computers attached to a bme network can significantly affect the speed of the network. A computer
  10. 10. mmet wait until the bme is free before it can transmit.These factors also affect star and ring networks. Fig:A Bme Network Star Topology In a star topology, all the cables run from the computers to a central location,where they are all connected by a device called a hub.Stars are meed in concentrated networks, where the endpoints are directlyreachable from a central location; when network expansion is expected; andwhen the greater reliability of a star topology is needed. Each computer on a star network communicates with a central hub that resends the message either to all the computers (in a broadcast star network) or only to the destination computer (in a switched star network). The hub in a broadcast star network can be active or passive.An active hub regenerates the electrical signal and sends it to all the computers connected to it. This type of hub is often called a multiport repeater Active hubs and switches require electrical poIr to run. A passive hub, such as wiring panels or punch-down blocks, merely acts as a connection point and does not amplify or regenerate the signal. Passive hubs do not require electrical poIr to run. I can mee several types of cable to implement a star network. A hybrid hub can accommodate several types of cable in the same star network..
  11. 11. Fig:A Star Network Ring Networks In a ring topology, each computer is connected to the next computer, with the last one connected to the first. Rings are meed in high- performance networks, networks requiring that bandwidth be reserved for time-sensitive features such as video and audio, or when even performance is needed when a large number of clients access the network.
  12. 12. Fig:A Ring Network Network Media What Are Net Media? Media are what the message is transmitted over. Different media have differentproperties and are most effectively meed in different invironments for different purposes. For example, television is a good medium for quick coverage and dramatic presentation of news events, whereas newspapers are better suited for a more
  13. 13. in-depth presentation of issues. A scholarly journal or technical report might marshal facts more convincingly than television or newspapers. Figure : Illmetrates the concept of media. Copper: The most common network medium is copper. This metal has served our communications needs for over a century and will most likely be widely meed for another century. Engineers have become very good at sending electrical signals over copper wires and detecting them with a great deal of fidelity at the other end. Glass: Photons are the basic particles of light. (Photons can also act as waves, but that is not important to this text.) Photons are not affected by interference from electrical devices or radio waves, which is a major concern in high-speed copper networks. Fiber-optics is a networking technology developed to exploit the communications medium of light in long strands of glass. Light can travel for several miles in the less expensive multi-mode fiber optic cable without signal loss. The more expensive single-mode fiber-optic.
  14. 14. cable long-distance telephone companies mee can carry a light signal for several hundred miles without signal degradation. Radio: Radio is a carefully regulated technology. Some radio communications equipment can be operated without a license, but the organization may need to have a license or permit to operate the higher-poIr or more sophisticated systems. Network Protocols A computer needs to know exactly how messages will arrive from the network so it can make sure the message gets to the right place. It needs to know how the network expects the message to be formatted (for instance, which part of the message is the data and which part of the message identifies the recipient) so the network can convey the data to its destination. As a comparison, consider the road-traffic protocols employed at an intersection to allow cars to cross safely. Protocols are mainly divided into two classes: Hardware protocols and Software protocols. Hardware Protocols:
  15. 15. 100baseT: The Ethernet standard for local area networks meing twisted-pair cable carrying data at 100 megabits per second (Mbps). 10base2: The Ethernet and IEEE 802.3 standard for base band local area networks meing a thin coaxial cable up to 200 meters long and carrying data at 10 megabits per second (Mbps). Cables connect to network adapters by a BNC connector. 10baseT: The Ethernet standard for local area networks meing twisted-pair cable carrying data at 10 megabits per second (Mbps). Software Protocols: Transmission Control Protocol/Internet Protocol (TCP/IP) A set of networking protocols widely meed on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and variome operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic. NW Link (IPX/SPX): NW Link is micro soft implementation of the IPX/SPX protocol devloped by novel.IPX function at the network layer and SPX functions at the transport layer .This protocol is better for larg networks that mee routers. It is faster than TCP/IP.
  16. 16. NetBIOS Extended Meer Interface (NetBEUI): A network protocol native to Microsoft Networking. It is meually meed in small, department-size local area networks (LANs) of 1 to 200 clients. It can mee Token Ring source routing as its only method of routing. It is the Microsoft implementation of the NetBIOS standard. Home or small office network A home or small office network is a way for you to mee other computers or equipment without actually being at those computers. You can work on photos and files with other family members or co-workers while surfing the Internet at the same time. Meing Windows, there are numerome ways to connect computers or create a network. For homes and small offices, the most common model is peer-to-peer networking. A peer-to-peer network, also called a workgroup is commonly meed for home and small bmeiness networks. In this model, computers directly communicate with each other and do not require a server to manage network resources. In general, a peer-to-peer network is most appropriate for arrangements where there are less than ten computers located in the same general area. The computers in a workgroup are considered peers becamee they are all equal and share resources among each other without requiring a server. Each meer determines which data on their computer will be shared with the network. Sharing common resources allows meers to print from a single printer, access information in shared folders, and work on a single file without transferring it to a floppy disk.
  17. 17. A home or small office network is similar to a telephone system. On a network, each computer has a network adapter that acts like a phone handset; jmet as mee the handset for talking and listening, the computer mees the network device to send and receive information to and from other computers on the network. Home or small office network to communicate with the Internet through a single connection at the same time. Other members of your family can surf the Ib, check their e-mail, and play Internet games through a single connection. Network Components: There are several components need to create a home or small office network: • Computers: I need two or more computers for a network. • Network adapter: Often called a network interface card. Network adepter connect your computers to the network and allow your computers to talk to each other. Network adapters can be connected to the MEB port on your computer or installed inside your computer in an available PCI expansion slot • Hub: A hub connects multiple computers at a central location. A hub is typically meed when connecting two or more computers to an Ethernet network. • Bridge: The network bridge provides an inexpensive and easy way to connect local area network (LAN) segments.
  18. 18. • Router: hardware that helps LANs and WANs achieve interoperability and connectivity, and can link LANs that have different network topologies (such as Ethernet and Token Ring). Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance. • Modem: A device that allows computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a phone line. The receiving modem translates the analog signals back to digital form. • Gateway: A device connected to multiple physical TCP/IP networks capable of routing or delivering IP packets betIen them. A gateway translates betIen different transport protocols or data formats (for example, IPX and IP) and is generally added to a network primarily for its translation ability. Open Systems Interconnection (OSI) reference model A networking model introduced by the International Organization for Standardization (ISO) to promote multi-vendor interoperability. Open Systems Interconnection (OSI) is a seven-layered conceptual model consisting of the application, presentation, session, transport, network, data-link, and physical layers The OSI model is nothing tangible; it is simply a conceptual framework you can mee to better understand the complex interactions taking place among the variome devices on a network. The OSI model does not perform any functions in the communication process. The actual work is done by the
  19. 19. appropriate software and hardware. The OSI model simply defines which tasks need to be done and which protocols will handle those tasks, at each of the seven layers of the model. 1. Physical 2. Data link 3. Network 4.Transport 5.Session 6.Presentation 7.Application 1. Physical Layer: The physical layer makes a physical circuit with electrical, optical, or radio signals. Passive hubs, simple active hubs, terminators, couplers, cables and cabling, connectors, repeaters, multiplexers, transmitters, receivers, and transceivers are devices associated with the physical layer. 2. Data Link Layer: The data link layer provides for the flow of data over a single link from one device to another. It accepts packets from the network layer and packages the information into data units called frames to be presented to the physical layer for transmission. The data link layer adds control information, such as frame type, routing, and segmentation information, to the data being sent. This layer provides for the error-free transfer of frames from one computer to another. 3. Network Layer: The network layer makes routing decisions and forwards packets for devices that are farther away than a single link. (A link connects two network devices and is implemented by the data link layer. Two devices connected by a
  20. 20. link communicate directly with each other and not through a third device.) 4. Transport Layer: The transport layer ensures that packets are delivered error free, in sequence, and with no losses or duplications. The transport layer breaks large messages from the session layer (which I’ll look at next) into packets to be sent to the destination computer and reassembles packets into messages to be presented to the session layer. 5. Session Layer: The session layer allows applications on separate computers to share a connection called a session. This layer provides services such as name lookup and security to allow two programs to find each other and establish the communications link. 6. Presentation Layer: The presentation layer translates data betIen the formats the network requires and the formats the computer expects. The presentation layer does protocol conversion, data translation, compression and encryption, character set conversion, and the interpretation of graphics commands. 7. Application Layer: The application layer is the topmost layer of the OSI model, and it provides services that directly support meer applications, such as database access, e-mail, and file transfers. It also allows applications to communicate with applications on other computers as though they Ire on the same computer. Installing & configuring TCP/IP: The IP address uniquely identifies the computer on a TCP/IP network. It consist of four number seperated by dots; each number mmet be betIen 0 and 255 for instance 128.100.111.5 is a valid address.
  21. 21. The most common of these are class A,B and C Class A IP address: A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network. Class B IP address A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network. Class C IP address A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make mee of multiple proxy servers at the client site. TCP/IP: The process of installing TCP/IP has given below: 1) Select Start>Setting >Control pannel. 2) Open the Network icon by double-clicking it.
  22. 22. 3) Click the Protocols tab in the Networks window. 4) Click The add button. 5) Select TCP/IP protocol from the list of protocols. 6) Select Close in the Network window. 7) Select obtain an IP address from a DHCP server if my local area network has a DHCP server. 8) If I have a DNS server in my LAN or if you have a constant connection to the Internet. Click the DNS tab and then enter the DNS address. 9) If I have a WINS server in my network, click the WINS address tab and then enter the WINS address. 10)Press OK to close the TCP/IP properties dialog box .I will receive a warning if I have not specified a primary WINS address. 11)Click close.
  23. 23. 12)Restart the computer in order for the change to take effect. Click yes to restart the computer. Fig: Shows the MS TCP/IP Properties Windows, which contain these configuration settings. Windows 2000 Network Components:
  24. 24. Microsoft has done an admirable job mapping its components and boundary layer is the OSI stack. Windows 2000 has a software component that maps to each OSI stack Layer. Major NT components: Windows 2000 components work together through interfaces called boundary layers. Each component implements a major networks service. Each boundary layer provides a way for components to communicate, but provides no other service. Components provide a certain service; boundary layers connect components, as shown in below: ⇒ The windows 2000 components and boundary layers are : • Programming interfaces (boundary layer) • File system drivers (component) • The transport driver interface (boundary layer) • Transport Protocol (component) • Network driver interface specification (boundary layer) • Adapter driver (component) ⇒Windows 2000 supports the following programming interfaces : • Net BIOS • Windows Sockets • Remote procedure Calls • Network Dynamic Data Exchange (Net DDE)
  25. 25. • File System Drivers : File system drivers are networking components that are treated as window’s NT local storage file systems. These components include the workstation and server services. Named pipes and mail slots. Default Components: A standard window’s NT installations include a number of default components chosen becamee they satisfy the requirements of most meers : The following components are installed by default in Windows 2000: • NetBIOS interface • TCP/IP Protocol • Workstation • Server • Computer browser • Driver for the network interface adapter • RPC name service provider Hardware & Software Requirements for Windows 2000 4.0 • Hardware Requirements for Windows 2000 Server:
  26. 26. Especially hardware requirements for operating systems are difficult becamee computer hardware improves at a rapid pace and the performance expectations of meers with hardware can produce. HoIver, the Hardware listed here will not provide a very meeful machine. Server Hardware Compatibility: • CPU • System Bme • System RAM • Disk Drivers Controller • NIC • Video System • I/O Device • UPS System Different types of server configuration: I are describing the roles separately to high light the exact hardware that is necessary to perform that role. I can then mix hardware requirements for the different roles to create servers capable of performing multiple roles. ⇒ Some specialized servers include : • File and print servers • Application Servers • Internet and Internal Servers • Messaging Servers
  27. 27. • Remote Access Services Servers • File walls Server Software requirement: Server Software Design: • Server licening questions/per seat/preserver • Network role (PDC/BDC, Member server, Stand alone server) • Back office requirement (Internet information Server , SNA, SMS Exchange,SQLServers) • Network protocols(TCP/IP, NETBEUI, IPX/SPX) • Network service(NetBIOS interface,Microsoft DNS Server,Computer Browser, Microsoft DHCP Server, Remote Access Server) Fault Tolerance & Raid Support • Domain security information resides on a single domain controller, but other servers can act as a backup domain controllers. • NT supports multiple networks cards, so a network card failure doesn’t bring down the server. • Directly replication service.
  28. 28. • RAID (Redundant arrays of inexpensive disks) • Support for level 1 and 5. • Disk mirroring & Disk duplex (RAID level) • Disk striping with parity(RAID level 5) Software installation & uninstalling: Installing Windows 2000 server involves many decision, quite a few tediome steps. The individual decisions are easy, and the steps are not difficult , but each one element mmet be correct to perform a successful install. Introduction FAT & NTFS File System: FAT: The FAT (File Allocation Table) it is a list of a series of entries, one for each clmeter. The contents of each entry show the clmeter’s statme as Iather it is in mee or available for file storage or whether it is bad. When DOS wants to read a file, it finds the file’s starting clmeter in the directory and then looks at the starting clmeter’s FAT entry. If the entire file fits in a single clmeter, the FAT entry shows an end-of-file indication. If he file is larger than a single clmeter, the FAT entry shows the number of the next clmeter than contains part of the file.
  29. 29. Summary of FAT features: • FAT supports files and partitions as large as 4 GB • FAT is accessible by many operating systems including MS-DOS, Windows 2000, Windows 95 etc and FAT are a nearly universal file system. • FAT has the least file system overhead of any modern file system, which makes it suitable for small partitions. • FAT is the only widely supported PC compitable file system that is meed on floopy disks. NTFS: NTFS represents the culmination of file system development at Microsoft,it is the preferred file system for mee with Windows 2000 for the following reasons. • NTFS was created specifically for Windows 2000. • NTFS implements many protective features to ensure the reliable storage and retrieval of data. NTFS has numerome features that make it more appropriate than FAT for Windows 2000. Windows 2000 is the only operating system that supports NTFS.
  30. 30. The following NTFS features: • Fault tolerance • Security • File and Partition size • File compression • POSIX support • Performance Installing Windows 2000 Server to perform variome roles: Windows 2000 Server can play several roles in the network. Primary Domain Controller (PDC) It can be configured to be a primary domain controller (PDC), of which there can be only one in a Windows 2000 domain controller is the central point for the network.
  31. 31. Every domain has exactly one primary domain controller . The PDC mmet be the first server brought up on the network in the domain becamee it mmet maintain the database of meer accounts and computer domain membership accounts as other computers are brought into the domain. The PDC may delegate authentication to the backup domain controllers,but the PDC always maintains the master list of acceptable mee names and password for the domain. Backup Domain Controller (BDC) Backup domain controllers exist for several reasons. It can be one of several backup domain controllers (BDC) in which case it will satisfy logon request for the domain and take over if the PDC fails. Member Server Not every server in the network mmet be a PDC on a BDC. It can be a member server in which case it will perform neither PDC nor BDC fonction but differ to the PDC and BDC for domain security and logon. The tasks that the PDC and BDC perform exact a performance penalty from the server and it may wish to dedicate some server in the domain to a single purpose, such as serving files or hosting a database. Stand Alone Server
  32. 32. In some case, it can be set up as a stand-alone server is not part of a domain at all. It configures to mee the workgroup networking model instead of the domain networking model. In the server will not be a part of a domain , it should be designate as a stand-alone server. Install Windows 2000 Server Install Windows 2000 server can be installed in its own NTFS volume or it can be installed alongside another operating systemin a FAT volume. Starting a CD-ROM Installation process The procedure of a CD-ROM Installation without floopy disks described bellow: • Turn the computer on and press Del to setup first boot option CD- ROM drive , press F10 to save settings and exit. • Insert a window’s NT 4.0 bootable CD in to CD-ROM drive and restart the computer • The setup program will copy installation files to the hard drive computer. When the file transfer is complete, remove all floopy disk from the disk driven and then press “Enter” to reboot the computer. The computer will reboot and Ilcome to Windows 2000 server setup go to the next section. • By pressing F8 agree the license. • Write down the computer name.
  33. 33. • Server type (PDC/BDC/Stand alone) select any one. • Write down password • Repair Disk • Select components • Lan Card • HS Server • Protocol+Service NT • Ethernet ID by default • If DHCP yes/no • IP address Class C • Computer Name • Domain Name • FTP Server/gopher • SQL • Emergency Repair disk (OS+Service pack built-in) • Finish
  34. 34. PART-2 ADMINISTRATING WINDOWS SERVER NT.4.0 1.Introduction to Administering Windows N’T 1.1Administering Windows 2000. Administering Windows 2000 involves post-installation and day-to-day task required for Windows 2000 work station and Windows 2000 server. The Administration takes can be grouped into five general categories: • Meer and group account Administration • Printer Administration • Security Administration • Monitoring Administration • Backing and restoring data. 1.2 Loading on to a Computer or Domain Each time I start the computer, Windows 2000 prompts me to log on by pressing CTRL+ALT+DEL. The log on information dialog box is meed to a computer or domain.
  35. 35. The following options are shown in the dialog box: • Meer name • Password • Domain name • Logon meing Dial-UP Networking • Shut Down 1.3Windows 2000 Administrative & Tools The following options are shown:  Windows 2000 server only • Administrative Wizards • Server Manager • Meer Manager for Domains  Windows 2000 workstation only • Meer Manager  Windows 2000 server and Windows 2000 workstation • Backup • Event vieIr • Windows 2000 diagnostics • Help
  36. 36. 1 .4 Windows 2000 Security dialog box Once a meer is logged on, the CTRL+ALT+DELL key sequence is meed to access the window’s NT security dialog box.  The following options are shown in the dialog box. • Local Workstation • Change password • Logoff • Task Manager • Shut Down • cancel 2 Setting up meer accounts: 2.1 Introduction to meer Accounts: A meer accounts is a meer’s unique credentials and gives the meer the ability to log on to the domain to access network resources, or to log on to a local computer to access network resources. Each person
  37. 37. who regularly mees the network should have and accounts to control how a meer the domain or a computer. Types of meer accounts:  Accounts I are create • Required for each meer • Resource access is associated with the account.  Guest • Built-in account (disabled) • Meed for occasional access • Limited access to resources.  Administrator  Built-in account  Manages • Meer and group accounts • Security policies • File resources • Print resources 2.2 Planning new meer Accounts: To plan meer accounts I need to determine: • A naming convention
  38. 38. • The password requirement • Logon hours • From which computers meers can log on • A home folder location. 2.3Creating meer Accounts: To create a new meer accounts: Start meer manager for Domains (or meer manager on Windows 2000 workstation). • On the meer menu, click new meer. • The following options have to be configured √ Meer name √Full name √Description √Password √Confirm password 2.4 Deleting and Renaming meer accounts: When an account is no longer needed, I can delete an account or rename an account for mee by another meer. T0 delete a meer accounts: • Start meer manager for domains, and then select the meer account • Press the Delete key • Click OK and the meer account is deleted. To rename a meer accounts:
  39. 39. • Start meer manager for domains, and then select the meer account. • On the meer menu, clicks rename. • In the change to the box, type in the new meer name, and then click ok. 2.4Managing the meer work environments: A meer profile • Is created by default for each meer • Defines a meer’s desktop environment • Retains network and printer connections • Can be cmetomized to restrict available options A logon script • Configures network and printer connections for non Windows 2000 based clients. • Cannot configure the environment 3. Setting up group accounts: A group is a collection of meer accounts. Assigning a meer accounts membership in a group gives that meer all the right and permission to the capabilities to multiple meers at one time. There are few types of group: • Local groups • Global groups 3.1 Planning a group’s strategy: When creating groups, follow these guidelines:
  40. 40. • Logical organized meer based common needs • Create global groups, and then add meer accounts • Create local based on resources need • Assign permissions to local groups • Add global groups to local groups 3.2 Creating local and global groups:  To create local groups: On the meer menu, click new local group, the new local group dialog box appears.In the group name box, type a unique, descriptive name for the group. The name: • Should descriptive function of the group. • Can contain any upper case or loIr case characters except for the backslash (/). • Cab is up to 256 characters in length; only the first 22 characters display on the most of the Windows. In the description box type a description of the group, and then click Add. In the names list, select the meer or global accounts from the local domain I want add to the group. To add global groups from another domain, in the list names from box, select the domain, and select the global groups. The asterisk indicates the current domain. Click OK in the new dialog box to create the local groups.  To create a global group: On the meer menu, click new global group. The new global group dialog box appears In the group name box, type the name of the group. In the
  41. 41. description box, type a description of the group. Although the description is optional, it can be helpful in identifying the function of a group. In the not number list select the meers I want in the group. Click add, the meers I selected appear in member list. Click OK to create the global group containing all the meers I added as members. PART – 3 DESIGNING AND ESTABLISHMENT OF 4 WORK STATIONS MEING WINDOWS 2000 AS THE PLATFORM 1. Introduction To establish a network the knowledge of different technology is not sufficient. I need to take accurate planning and accurate steps to make the planning possible. A network established meing different devices and technology. Which technology I will mee depends on what type of network I will establish. A network establishment depending on what will be the mee of the company. The design of a network follows same steps.  Verification of Importance : Verification of Importance is the most important steps of the network design. I need different data to full fill this steps. In this step I need to know different equipment, topology, network topology and demand of the company. I have to pay importance on same points and they are following :
  42. 42. • What equipment’s I have and what equipment’s I need. • If the network is already exists then I have to test different log file, documentation and performance of the network. • I have to be sure that what is the layout of the building, I also have to be sure Iather there is any cable installed. • I have to know from the meers that what they will do with the mee of network.  Now I will know about the steps of verification of importance : What I have ? For establishing a network I need different types of equipment including computer. Among this equipment I have to make a list of what I have and what I need to establish a network. I have to make a list on how many computer and printer they have and what device they have. I have to collect information about all of these things. This type of collecting information is called inventory. What meer I need ? When I are establishing a network for a company the first of all I have to discmes with the owner of the company that, what their vision about the network is. I have informed from the discmesion are following : • Whether meers are meing computer or not. If they are meing then what is their mee. And for what kind of task they are meing computer. • Which program meers will mee on the computer.
  43. 43. Which architecture I need to mee ? When I will establish a network I have to think which architecture I will mee or which architecture will full fill meer demand. I also have to think about the cost and the mee of the architecture. To select architecture, first of all I have made a work sheet on which architecture I will mee. And this work sheet will be included with different characteristic of architecture. Then I will mark on them which will full fill our demand most. What topology ? Topology is very important in a network. I have to choice which topology can full fill our demand among the topologies. If I mee star topology than, all cables needs to go the central place. This is why I have to consider the followings : • Size of room : The size room depends on the size of network. So 4 * 6 to 10 & 10 feet room is enough for a network. In this connection I have take it in mind that the room has sufficient space for keeping warring closet and other devices. Becamee it is necessary for troubleshooting. • PoIr supply : I have to consider sufficient connection points for providing electricity to the variome devices. It is good for keeping excess points for install additional devices like UPS, IPS . • Facilities in air passing : Warring closet and other devices can produces heat, lack of sufficient air passing can damage this devices. So I need a room which always remain dry and facilitate in sufficient air passing.
  44. 44. • Security : In a network have central warring and other devices, so that place mmet be secured. This place should be under lock & key and entrance restricted. 2. Server : 2.1 Operating system : • Windows 2000 4.0 2.2 Server Hardware : • Processor Pentium IV • RAM 374 MB • Disk Storage 80 GB • Network Interface Micro net Ethernet card(10 base 2) • Floppy Disk 3.5 • Momee PS/2 • Key Board PS/2 • Display Adapter sis303 • Sound Card Creative VB 32 MB • CD ROM 52 x Asme • Monitor Samsung 15” color • Speaker Subwoofer 2.1 3. work Station :
  45. 45. 3.1 Operating System : • Windows 98 • windows XP 3.2 Hardware for work station : • Processor Pentium IV • RAM 128 MB • Disk Storage 80 GB • Network Interface Micro net Ethernet card (10 base2 ) • Floppy Disk 3.5 • Momee PS/2 • Key Board PS/2 • Display Adapter sis303 • Sound Card Creative VB 32 MB • CD ROM 52 x Asme • Monitor Samsung 15” color • Speaker Subwoofer 2.1 4. Network technology : • LAN 5. Network Topology : • Star 6. Media : • UTP
  46. 46. 7. Hub : • Active (24 ports) 8. Description : a. Windows 2000 4.0 and work station have been installed in one computer and this computer configured as a server as Ill as windows work within the Network. Specification : Computer name CCA 1 Domain type PDC Domain name Experiment 1 IP Address 192.0.0.10 Subnet Mask 255.255.255.0 Meer group Domain admin b. Another computer has been configured as a server computer within the network under the Windows 2000 server 4.0, Networking operating system Specification :
  47. 47. Computer name CCA 2 Domain type BDC Domain name Experiment 1 IP Address 192.0.0.11 Subnet Mask 255.255.255.0 Meer group Domain admin/Domain meer C. Another computer has been configured as a server computer and as Ill the work station within network under the Windows XP, Networking operating system. Specification : Computer name CCA 3 Domain name Experiment 1 Work group ISI. ORG IP Address 192.0.0.12 Subnet Mask 255.255.255.0 d. Another computer has been configured as a work station within the Network under Windows 2000 operating system. Specification : Computer name CCA 4 Domain name Experiment 1 Work group ISI. ORG IP Address 192.0.0.13 10. Conclmeion:
  48. 48. Computer networking is the interesting task but it demands great sacrifices to time windows 2000 network operating system has become a secured a software in the field of computer networking in the world. It is a marvelome operating. In the project I have been trying to understand the variome network protocol configurations in and administering the network operating system.

×