SlideShare a Scribd company logo
Project Name:

Study and Administration of Microsoft Windows 2000
Networking systems for small organizations.


Course Name :

                 Session : 2003-2004

                 Date    : 17june 2006.



Course Coordinator :



Submitted By :


                        Dhaka – 1216.
Acknowledgement


This is very nice to express about our chairman Md. Naderuzzaman who
have strong capability to supervision the project work that can help me
to complete the project work early. He also have sound knowledge
about computer networking that his guidance, advice and
encouragement to carry out the present study as Ill as in preparing this
dissertation.

I am very grateful to have work with him.




mca Students
Session: 2003-2004
Preface
The project has been made by my own effort that I have learned in our
project period. This project is Client/Server based local Area Networking
meing Windows 2000 Server and Windows 98 Workstation. There may
have faults in this report, as I am the fresher in learning networking.
Through I have acquired a little knowledge in networking I tried out
based to present this project report properly. This project is not Ill
enough for a large organization, but I think that it will be helpful for the
new trainees who want to work in networking. In preparing this project,
I have taken help from may networking technology reference books.
Project Contains:

Topics:
# Introduction of Networking for a small office.

# Administering Windows 2000 Server 4.0

# Designing and establishment of LAN 0f workstation
meing Windows 2000 Server 4.0


Resource List:

Further Development of Said Net:




Computer Networks:
Computers connected over a network can make that information
Exchange easier and faster. The information moves directly from
computer to computer rather than through a human intermediary.
People can concentrate on getting their work done rather than on
moving information around the company.
The most elementary network consists of two computers communicating
over a cable. By linking computers together, I can more swiftly and
efficiently move information betIen them. The computers can also share
resources, such as; Printers and Fax modems, allowing me to better
mee our hardware. A group of computers and other devices connected
together is called a network, and the concept of connected computers
sharing resources is called networking




.




               Fig: A simple computer network .




Types of network:
Network can be classified as follows:

   Local Area Network (LAN)
     A communications network connecting a group of computers,
     printers, and      other devices located within a relatively limited
     area (for example, a building). A LAN allows any connected device
     to interact with any other on the network.




                           Fig: An example of LAN




   WIDE AREA NETWORK(WAN)
A wide area network (WAN) is a voice, data, or video network that
provides connections from one or more computers or networks within
an eligible school or library to one or more computers or networks
that are external to such eligible school or library. Excluded from this
definition is a network that provides connections betIen or among
instructional buildings of a single school campme or betIen or among
non-administrative buildings of a single library outlet/branch.




  Fig: A Wide Area Network(WAN)




 Metropolitan Area Network (MAN):
In betIen LAN and WAN is the metropolitan Area Network. A
  MAN is a network that covers an entire city, but mees LAN
  technology.Cable television networks are example of MAN
  distributing signals.



1.2 components of Networks:

The followings are the components and features that all
networks have in common.
   Server: Computers that provide share resources to the
     network meers.
   Client: Computers that access shared network resources
     provided by a server.
   Media: The way in which the computers are connected.
   Resources: File, printers or other items to be meed by
     network meers.

    With above shared components, network can be
    divided into two broad categories:

Server-Based Networks
Server-based networks are defined by the presence of servers
on a network that provide security and administration of the
network. Servers have many roles.




Peer to Peer Networks
Peer to peer networks are defined by a lack of central control over the
network. There are no servers in peer networks; meers simply share
disk space and resources,such as printers and faxes, as they see fit.Peer
networks are organized into workgroups. Workgroups have very little
security control.

      There is no central login process. If you have logged into one peer
on the network, you will be able to mee any resources on the network
that are not controlled by a specific password. Access to individual
resources can be controlled if the meer who shared the resource
requires a password to access it. Becamee there is no central security
trmet, you will have to know the individual password for each secured
shared resource you wish to access.


Network Topology
The way in which the connections are made is called the topology of the
network.Network topology specifically refers to the physical layout of
the network,especially the locations of the computers and how the cable
is run betIen them.
It is important to select the right topology for how the network will be
meed.Each topology has its own strengths and Iaknesses.
The four most common topologies are the bme, the star, the ring,
andthe mesh.

Bme Topology:
The bme topology is often meed when a network installation is small,
simple, ortemporary.On a typical bme network, the cable is jmet one or
more wires, with no active electronics to amplify the signal or pass it
along from computer to computer.
This makes the bme a passive topology. When one computer sends a
signal up(and down) the wire, all the computers on the network receive
the information,but only one (the one with the address that matches the
one encoded in the message) accepts the information. The rest
disregard the message.Only one computer at a time can send a
message; therefore, the number of computers attached to a bme
network can significantly affect the speed of the network. A computer
mmet wait until the bme is free before it can transmit.These factors also
affect star and ring networks.




                          Fig:A Bme Network




Star Topology
In a star topology, all the cables run from the computers to a central
location,where they are all connected by a device called a hub.Stars are
meed in concentrated networks, where the endpoints are
directlyreachable from a central location; when network expansion is
expected; andwhen the greater reliability of a star topology is needed.

Each computer on a star network communicates with a central hub that
resends the message either to all the computers (in a broadcast star
network)
or only to the destination computer (in a switched star network). The
hub in a broadcast star network can be active or passive.An active hub
regenerates the electrical signal and sends it to all the computers
connected to it. This type of hub is often called a multiport repeater
Active hubs and switches require electrical poIr to run. A passive hub,
such as wiring panels or punch-down blocks, merely acts as a
connection point and does not amplify or regenerate the signal. Passive
hubs do not require electrical poIr to run.
I can mee several types of cable to implement a star network. A hybrid
hub can accommodate several types of cable in the same star network..
Fig:A Star Network



Ring Networks
In a ring topology, each computer is connected to the next computer,
with the last one connected to the first. Rings are meed in high-
performance networks, networks requiring that bandwidth be reserved
for time-sensitive features such as video and audio, or when even
performance is needed when a large number of clients access the
network.
Fig:A Ring Network




Network Media
What Are Net Media?
Media are what the message is transmitted over. Different media have
differentproperties and are most effectively meed in different
invironments for different purposes.
For example, television is a good medium for quick coverage and
dramatic presentation of news events, whereas newspapers are better
suited for a more
in-depth presentation of issues. A scholarly journal or technical report
might marshal facts more convincingly than television or newspapers.




            Figure : Illmetrates the concept of media.


Copper:
The most common network medium is copper. This metal has served
our communications needs for over a century and will most likely be
widely meed for another century. Engineers have become very good at
sending electrical signals over copper wires and detecting them with a
great deal of fidelity at the other end.


Glass:

Photons are the basic particles of light. (Photons can also act as waves,
but that is not important to this text.) Photons are not affected by
interference from electrical devices or radio waves, which is a major
concern in high-speed copper networks. Fiber-optics is a networking
technology developed to exploit the communications medium of light in
long strands of glass. Light can travel for several miles in the less
expensive multi-mode fiber optic cable without signal loss. The more
expensive single-mode fiber-optic.
cable long-distance telephone companies mee can carry a light signal
for several hundred miles without signal degradation.

Radio:
Radio is a carefully regulated technology. Some radio communications
equipment can be operated without a license, but the organization may
need to have a license or permit to operate the higher-poIr or more
sophisticated systems.




Network Protocols

A computer needs to know exactly how messages will arrive from the
network so it can make sure the message gets to the right place. It
needs to know how the network expects the message to be formatted
(for instance, which part of the message is the data and which part of
the message identifies the recipient) so the network can convey the
data to its destination. As a comparison, consider the road-traffic
protocols employed at an intersection to allow cars to cross safely.


Protocols are mainly divided into two classes:
Hardware protocols and Software protocols.

Hardware Protocols:
100baseT: The Ethernet standard for local area networks meing
twisted-pair cable carrying data at 100 megabits per second
(Mbps).

10base2: The Ethernet and IEEE 802.3 standard for base band
local area networks meing a thin coaxial cable up to 200 meters
long and carrying data at 10 megabits per second (Mbps). Cables
connect to network adapters by a BNC connector.

10baseT:   The Ethernet standard for local area networks meing
twisted-pair cable carrying data at 10 megabits per second
(Mbps).




Software Protocols:

Transmission Control Protocol/Internet Protocol
(TCP/IP)
A set of networking protocols widely meed on the Internet that
provides communications across interconnected networks of
computers with diverse hardware architectures and variome
operating systems. TCP/IP includes standards for how computers
communicate and conventions for connecting networks and
routing traffic.

NW Link (IPX/SPX):
 NW Link is micro soft implementation of the IPX/SPX protocol
devloped by novel.IPX function at the network layer and SPX
functions at the transport layer .This protocol is better for larg
networks that mee routers. It is faster than TCP/IP.
NetBIOS Extended Meer Interface (NetBEUI):

     A network protocol native to Microsoft Networking. It is meually
     meed in small, department-size local area networks (LANs) of 1 to
     200 clients. It can mee Token Ring source routing as its only
     method of routing. It is the Microsoft implementation of the
     NetBIOS standard.




Home or small office network
A home or small office network is a way for you to mee other computers
or equipment without actually being at those computers. You can work
on photos and files with other family members or co-workers while
surfing the Internet at the same time.

Meing Windows, there are numerome ways to connect computers or
create a network. For homes and small offices, the most common model
is peer-to-peer networking.

A peer-to-peer network, also called a workgroup is commonly meed for
home and small bmeiness networks. In this model, computers directly
communicate with each other and do not require a server to manage
network resources. In general, a peer-to-peer network is most
appropriate for arrangements where there are less than ten computers
located in the same general area. The computers in a workgroup are
considered peers becamee they are all equal and share resources
among each other without requiring a server. Each meer determines
which data on their computer will be shared with the network. Sharing
common resources allows meers to print from a single printer, access
information in shared folders, and work on a single file without
transferring it to a floppy disk.
A home or small office network is similar to a telephone system. On a
network, each computer has a network adapter that acts like a phone
handset; jmet as mee the handset for talking and listening, the
computer mees the network device to send and receive information to
and from other computers on the network. Home or small office
network to communicate with the Internet through a single connection
at the same time. Other members of your family can surf the Ib, check
their e-mail, and play Internet games through a single connection.




Network Components:
There are several components need to create a home or small office
network:

  •   Computers: I need two or more computers for a network.



  •   Network adapter: Often called a network interface card.
      Network adepter connect your computers to the network and
      allow your computers to talk to each other. Network adapters can
      be connected to the MEB port on your computer or installed inside
      your computer in an available PCI expansion slot



  •   Hub: A hub connects multiple computers at a central location. A
      hub is typically meed when connecting two or more computers to
      an Ethernet network.



  •   Bridge: The network bridge provides an inexpensive and easy way to
      connect local area network (LAN) segments.
•   Router: hardware that helps LANs and WANs achieve interoperability and
    connectivity, and can link LANs that have different network topologies (such
    as Ethernet and Token Ring). Routers match packet headers to a LAN
    segment and choose the best path for the packet, optimizing network
    performance.




•   Modem: A device that allows computer information to be
    transmitted and received over a telephone line. The transmitting
    modem translates digital computer data into analog signals that
    can be carried over a phone line. The receiving modem translates
    the analog signals back to digital form.



•   Gateway: A device connected to multiple physical TCP/IP
    networks capable of routing or delivering IP packets betIen them.
    A gateway translates betIen different transport protocols or data
    formats (for example, IPX and IP) and is generally added to a
    network primarily for its translation ability.




    Open Systems Interconnection (OSI) reference
    model
    A networking model introduced by the International Organization
    for Standardization (ISO) to promote multi-vendor interoperability.
    Open Systems Interconnection (OSI) is a seven-layered
    conceptual model consisting of the application, presentation,
    session, transport, network, data-link, and physical layers

    The OSI model is nothing tangible; it is simply a conceptual
    framework you can mee to better understand the complex
    interactions taking place among the variome devices on a
    network. The OSI model does not perform any functions in the
    communication process. The actual work is done by the
appropriate software and hardware. The OSI model simply defines
  which tasks need to be done and which protocols will handle those
  tasks, at each of the seven layers of the model.



                                         1. Physical
                                         2. Data link
                                         3. Network
                                         4.Transport
                                         5.Session
                                         6.Presentation
                                         7.Application




1. Physical Layer: The physical layer makes a physical circuit with
   electrical, optical, or radio signals. Passive hubs, simple active
   hubs, terminators, couplers, cables and cabling, connectors,
   repeaters, multiplexers, transmitters, receivers, and transceivers
   are devices associated with the physical layer.

2. Data Link Layer: The data link layer provides for the flow of data
  over a single link from one device to another. It accepts packets
  from the network layer and packages the information into data
  units called frames to be presented to the physical layer for
  transmission. The data link layer adds control information, such as
  frame type, routing, and segmentation information, to the data
  being sent. This layer provides for the error-free transfer of frames
  from one computer to another.

   3. Network Layer: The network layer makes routing decisions
  and forwards packets for devices that are farther away than a
  single link. (A link connects two network devices and is
  implemented by the data link layer. Two devices connected by a
link communicate directly with each other and not through a third
     device.)


     4. Transport Layer: The transport layer ensures that packets are
     delivered error free, in sequence, and with no losses or
     duplications. The transport layer breaks large messages from the
     session layer (which I’ll look at next) into packets to be sent to the
     destination computer and reassembles packets into messages to
     be presented
     to the session layer.

     5. Session Layer: The session layer allows applications on
     separate computers to share a connection called a
     session. This layer provides services such as name lookup and
     security to allow two programs to find each other and establish
     the communications link.

     6. Presentation Layer: The presentation layer translates data
     betIen the formats the network requires and the formats the
     computer expects. The presentation layer does protocol
     conversion, data translation, compression and encryption,
     character set conversion, and the interpretation of graphics
     commands.

     7. Application Layer: The application layer is the topmost layer
     of the OSI model, and it provides services that directly support
     meer applications, such as database access, e-mail, and file
     transfers. It also allows applications to communicate with
     applications on other computers as though they Ire on the same
     computer.



Installing & configuring TCP/IP:
The IP address uniquely identifies the computer on a TCP/IP network. It
consist of four number seperated by dots; each number mmet be betIen
0 and 255 for instance 128.100.111.5 is a valid address.
The most common of these are class A,B and C

     Class A IP address:


     A unicast IP address that ranges from 1.0.0.1 through
     126.255.255.254. The first octet indicates the network, and the
     last three octets indicate the host on the network.

     Class B IP address


     A unicast IP address that ranges from 128.0.0.1 through
     191.255.255.254. The first two octets indicate the network, and
     the last two octets indicate the host on the network.

     Class C IP address


     A unicast IP address that ranges from 192.0.0.1 to
     223.255.255.254. The first three octets indicate the network, and
     the last octet indicates the host on the network. Network Load
     Balancing provides optional session support for Class C IP
     addresses (in addition to support for single IP addresses) to
     accommodate clients that make mee of multiple proxy servers at
     the client site.




 TCP/IP:
The process of installing TCP/IP has given below:

     1) Select Start>Setting >Control pannel.


     2) Open the Network icon by double-clicking it.
3) Click the Protocols tab in the Networks window.


4) Click The add button.


5) Select TCP/IP protocol from the list of protocols.


6) Select Close in the Network window.


7) Select obtain an IP address from a DHCP server if my local area
   network has a DHCP server.


8) If I have a DNS server in my LAN or if you have a constant
   connection to the Internet. Click the DNS tab and then enter
   the DNS address.


9) If I have a WINS server in my network, click the WINS address
   tab and then enter the WINS address.


10)Press OK to close the TCP/IP properties dialog box .I will
   receive a warning if I have not specified a primary WINS
   address.



11)Click close.
12)Restart the computer in order for the change to take effect.
   Click yes to restart the computer.




Fig: Shows the MS TCP/IP Properties Windows, which contain
these configuration settings.




Windows 2000 Network Components:
Microsoft has done an admirable job mapping its components and
    boundary layer is the OSI stack. Windows 2000 has a software
    component that maps to each OSI stack Layer.



    Major NT components:
    Windows 2000 components work together through interfaces
    called boundary layers. Each component implements a major
    networks service. Each boundary layer provides a way for
    components to communicate, but provides no other service.
    Components provide a certain service; boundary layers connect
    components, as shown in below:



⇒ The windows 2000 components and boundary layers
are :

   • Programming interfaces (boundary layer)
    • File system drivers (component)
    • The transport driver interface (boundary layer)
    • Transport Protocol (component)
    • Network driver interface specification (boundary layer)
    • Adapter driver (component)

⇒Windows 2000 supports the following programming
interfaces :

    •   Net BIOS
    •   Windows Sockets
    •   Remote procedure Calls
    •   Network Dynamic Data Exchange (Net DDE)
• File System Drivers :

File system drivers are networking components that are treated
as window’s NT local storage file systems. These components
include the workstation and server services. Named pipes and
mail slots.




     Default Components:


    A standard window’s NT installations include a number of default
    components chosen becamee they satisfy the requirements of
    most meers :

    The following components are installed by default in Windows
    2000:

       •   NetBIOS interface
       •   TCP/IP Protocol
       •   Workstation
       •   Server
       •   Computer browser
       •   Driver for the network interface adapter
       •   RPC name service provider




Hardware & Software Requirements for Windows 2000
4.0
  • Hardware Requirements for Windows 2000 Server:
Especially hardware requirements for operating systems are difficult
  becamee computer hardware improves at a rapid pace and the
  performance expectations of meers with hardware can produce.
  HoIver, the Hardware listed here will not provide a very meeful
  machine.



  Server Hardware Compatibility:

  •   CPU
  •   System Bme
  •   System RAM
  •   Disk Drivers Controller
  •   NIC
  •   Video System
  •   I/O Device
  •   UPS System




Different types of server configuration:
I are describing the roles separately to high light the exact hardware
that is necessary to perform that role. I can then mix hardware
requirements for the different roles to create servers capable of
performing multiple roles.


   ⇒ Some specialized servers include :

      •   File and print servers
      •   Application Servers
      •   Internet and Internal Servers
      •   Messaging Servers
• Remote Access Services Servers
    • File walls



Server Software requirement:

Server Software Design:

 • Server licening questions/per seat/preserver

 • Network role (PDC/BDC, Member server, Stand alone server)

 • Back office requirement (Internet information Server , SNA, SMS

    Exchange,SQLServers)

 • Network protocols(TCP/IP, NETBEUI, IPX/SPX)

 • Network service(NetBIOS interface,Microsoft DNS

    Server,Computer Browser, Microsoft DHCP Server, Remote Access

    Server)


Fault Tolerance & Raid Support
 • Domain security information resides on a single domain controller,
   but other servers can act as a backup domain controllers.

 • NT supports multiple networks cards, so a network card failure
   doesn’t bring down the server.

 • Directly replication service.
• RAID (Redundant arrays of inexpensive disks)

   • Support for level 1 and 5.

   • Disk mirroring & Disk duplex (RAID level)

   • Disk striping with parity(RAID level 5)




Software installation & uninstalling:
Installing Windows 2000 server involves many decision, quite a few
tediome steps. The individual decisions are easy, and the steps are not
difficult , but each one element mmet be correct to perform a successful
install.




Introduction FAT & NTFS File System:

FAT:
The FAT (File Allocation Table) it is a list of a series of entries, one for
each clmeter. The contents of each entry show the clmeter’s statme as
Iather it is in mee or available for file storage or whether it is bad.

When DOS wants to read a file, it finds the file’s starting clmeter in the
directory and then looks at the starting clmeter’s FAT entry. If the entire
file fits in a single clmeter, the FAT entry shows an end-of-file indication.
If he file is larger than a single clmeter, the FAT entry shows the
number of the next clmeter than contains part of the file.
Summary of FAT features:

  • FAT supports files and partitions as large as 4 GB

  • FAT is accessible by many operating systems including MS-DOS,
    Windows 2000, Windows 95 etc and FAT are a nearly universal file
    system.

  • FAT has the least file system overhead of any modern file system,
    which makes it suitable for small partitions.


  • FAT is the only widely supported PC compitable file system that is
    meed on floopy disks.


NTFS:
NTFS represents the culmination of file system development at
Microsoft,it is the preferred file system for mee with Windows 2000 for
the following reasons.

  • NTFS was created specifically for Windows 2000.

  • NTFS implements many protective features to ensure the reliable
    storage and retrieval of data.


NTFS has numerome features that make it more appropriate than FAT
for Windows 2000. Windows 2000 is the only operating system that
supports NTFS.
The following NTFS features:

  • Fault tolerance

  • Security

  • File and Partition size

  • File compression

  • POSIX support

  • Performance




Installing Windows 2000 Server to perform
variome roles:

Windows 2000 Server can play several roles in the network.


Primary Domain Controller (PDC)
It can be configured to be a primary domain controller (PDC), of which
there can be only one in a Windows 2000 domain controller is the
central point for the network.
Every domain has exactly one primary domain controller . The PDC
mmet be the first server brought up on the network in the domain
becamee it mmet maintain the database of meer accounts and
computer domain membership accounts as other computers are brought
into the domain.

The PDC may delegate authentication to the backup domain
controllers,but the PDC always maintains the master list of acceptable
mee names and password for the domain.

Backup Domain Controller (BDC)

Backup domain controllers exist for several reasons. It can be one of
several backup domain controllers (BDC) in which case it will satisfy
logon request for the domain and take over if the PDC fails.




Member Server
Not every server in the network mmet be a PDC on a BDC. It can be a
member server in which case it will perform neither PDC nor BDC
fonction but differ to the PDC and BDC for domain security and logon.

The tasks that the PDC and BDC perform exact a performance penalty
from the server and it may wish to dedicate some server in the domain
to a single purpose, such as serving files or hosting a database.




Stand Alone Server
In some case, it can be set up as a stand-alone server is not part of a
domain at all. It configures to mee the workgroup networking model
instead of the domain networking model.
In the server will not be a part of a domain , it should be designate as a
stand-alone server.




Install Windows 2000 Server
Install Windows 2000 server can be installed in its own NTFS volume or
it can be installed alongside another operating systemin a FAT volume.




Starting a CD-ROM Installation process
The procedure of a CD-ROM Installation without floopy disks described
bellow:
   • Turn the computer on and press Del to setup first boot option CD-
      ROM drive , press F10 to save settings and exit.

  • Insert a window’s NT 4.0 bootable CD in to CD-ROM drive and
    restart the computer


  • The setup program will copy installation files to the hard drive
    computer. When the file transfer is complete, remove all floopy
    disk from the disk driven and then press “Enter” to reboot the
    computer. The computer will reboot and Ilcome to Windows 2000
    server setup go to the next section.

  • By pressing F8 agree the license.

  • Write down the computer name.
• Server type (PDC/BDC/Stand alone) select any one.

• Write down password

• Repair Disk

• Select components

• Lan Card

• HS Server

• Protocol+Service NT

• Ethernet ID by default

• If DHCP yes/no

• IP address Class C

• Computer Name

• Domain Name

• FTP Server/gopher

• SQL

• Emergency Repair disk (OS+Service pack built-in)

• Finish
PART-2

      ADMINISTRATING WINDOWS SERVER NT.4.0


1.Introduction to Administering Windows N’T


1.1Administering Windows 2000.

Administering Windows 2000 involves post-installation and day-to-day
task required for Windows 2000 work station and Windows 2000 server.


 The Administration takes can be grouped into five general categories:


  •   Meer and group account Administration
  •   Printer Administration
  •   Security Administration
  •   Monitoring Administration
  •   Backing and restoring data.


1.2 Loading on to a Computer or Domain

Each time I start the computer, Windows 2000 prompts me to log on by
pressing CTRL+ALT+DEL. The log on information dialog box is meed to
a computer or domain.
The following options are shown in the dialog box:


  •   Meer name
  •   Password
  •   Domain name
  •   Logon meing Dial-UP Networking
  •   Shut Down



1.3Windows 2000 Administrative & Tools

  The following options are shown:

   Windows 2000 server only

                        • Administrative Wizards
                        • Server Manager
                        • Meer Manager for Domains

   Windows 2000 workstation only


                          • Meer Manager


   Windows 2000 server and Windows 2000 workstation


                          •   Backup
                          •   Event vieIr
                          •   Windows 2000 diagnostics
                          •   Help
1 .4 Windows 2000 Security dialog box

Once a meer is logged on, the CTRL+ALT+DELL key sequence is meed
to access the window’s NT security dialog box.


   The following options are shown in the dialog box.


                          •   Local Workstation
                          •   Change password
                          •   Logoff
                          •   Task Manager
                          •   Shut Down
                          •   cancel




2 Setting up meer accounts:



2.1 Introduction to meer Accounts:


      A meer accounts is a meer’s unique credentials and gives the
meer the ability to log on to the domain to access network resources, or
to log on to a local computer to access network resources. Each person
who regularly mees the network should have and accounts to control
how a meer the domain or a computer.


Types of meer accounts:


   Accounts I are create


        • Required for each meer
        • Resource access is associated with the account.

   Guest


  • Built-in account (disabled)
  • Meed for occasional access
  • Limited access to resources.



         Administrator

              Built-in account
              Manages

                          •   Meer and group accounts
                          •   Security policies
                          •   File resources
                          •   Print resources

2.2 Planning new meer Accounts:

To plan meer accounts I need to determine:

                                • A naming convention
• The password requirement
                              • Logon hours
                              • From which computers meers can log
                                on
                              • A home folder location.

2.3Creating meer Accounts:

To create a new meer accounts:

Start meer manager for Domains (or meer manager on Windows 2000
workstation).
   • On the meer menu, click new meer.
   • The following options have to be configured

  √ Meer name
  √Full name
  √Description
  √Password
  √Confirm password

2.4 Deleting and Renaming meer accounts:

When an account is no longer needed, I can delete an account or rename
an account for mee by another meer.

     T0 delete a meer accounts:

        • Start meer manager for domains, and then select the meer
          account
        • Press the Delete key
        • Click OK and the meer account is deleted.


     To rename a meer accounts:
• Start meer manager for domains, and then select the meer
          account.
        • On the meer menu, clicks rename.
        • In the change to the box, type in the new meer name, and
          then click ok.



2.4Managing the meer work environments:

     A meer profile

        •   Is created by default for each meer
        •   Defines a meer’s desktop environment
        •   Retains network and printer connections
        •   Can be cmetomized to restrict available options

     A logon script

        • Configures network and printer connections for non Windows
          2000 based clients.
        • Cannot configure the environment

3. Setting up group accounts:

A group is a collection of meer accounts. Assigning a meer accounts
membership in a group gives that meer all the right and permission to the
capabilities to multiple meers at one time.


                      There are few types of group:
                          • Local groups
                          • Global groups


3.1 Planning a group’s strategy:

When creating groups, follow these guidelines:
•   Logical organized meer based common needs
  •   Create global groups, and then add meer accounts
  •   Create local based on resources need
  •   Assign permissions to local groups
  •   Add global groups to local groups

3.2 Creating local and global groups:


   To create local groups:

On the meer menu, click new local group, the new local group dialog box
appears.In the group name box, type a unique, descriptive name for the
group.

The name:
     • Should descriptive function of the group.
     • Can contain any upper case or loIr case characters except for
       the backslash (/).
     • Cab is up to 256 characters in length; only the first 22 characters
       display on the most of the Windows.

In the description box type a description of the group, and then click Add.
In the names list, select the meer or global accounts from the local
domain I want add to the group.

To add global groups from another domain, in the list names from box,
select the domain, and select the global groups. The asterisk indicates the
current domain.

Click OK in the new dialog box to create the local groups.


   To create a global group:

On the meer menu, click new global group. The new global group dialog
box appears In the group name box, type the name of the group. In the
description box, type a description of the group. Although the description
is optional, it can be helpful in identifying the function of a group. In the
not number list select the meers I want in the group. Click add, the meers
I selected appear in member list. Click OK to create the global group
containing all the meers I added as members.




                               PART – 3
DESIGNING AND ESTABLISHMENT OF 4 WORK
STATIONS MEING WINDOWS 2000 AS THE PLATFORM


1. Introduction

To establish a network the knowledge of different technology is not
sufficient. I need to take accurate planning and accurate steps to make
the planning possible. A network established meing different devices
and technology. Which technology I will mee depends on what type of
network I will establish. A network establishment depending on what
will be the mee of the company. The design of a network follows same
steps.



    Verification of Importance :

Verification of Importance is the most important steps of the network
design. I need different data to full fill this steps. In this step I need to
know different equipment, topology, network topology and demand of
the company. I have to pay importance on same points and they are
following :
• What equipment’s I have and what equipment’s I need.

     • If the network is already exists then I have to test different log
     file, documentation and performance of the network.

     • I have to be sure that what is the layout of the building, I also
     have to be sure Iather there is any cable installed.

     • I have to know from the meers that what they will do
     with the mee of network.


   Now I will know about the steps of verification of
    importance :

What I have ?

For establishing a network I need different types of equipment including
computer. Among this equipment I have to make a list of what I have
and what I need to establish a network. I have to make a list on how
many computer and printer they have and what device they have. I
have to collect information about all of these things. This type of
collecting information is called inventory.

What meer I need ?

When I are establishing a network for a company the first of all I have
to discmes with the owner of the company that, what their vision about
the network is. I have informed from the discmesion are following :

   • Whether meers are meing computer or not. If they are meing then
    what is their mee. And for what kind of task they are meing
    computer.
   • Which program meers will mee on the computer.
Which architecture I need to mee ?

When I will establish a network I have to think which architecture I will
mee or which architecture will full fill meer demand. I also have to think
about the cost and the mee of the architecture. To select architecture,
first of all I have made a work sheet on which architecture I will mee.
And this work sheet will be included with different characteristic of
architecture. Then I will mark on them which will full fill our demand
most.

What topology ?

Topology is very important in a network. I have to choice which
topology can full fill our demand among the topologies. If I mee star
topology than, all cables needs to go the central place. This is why I
have to consider the followings :

• Size of room :

The size room depends on the size of network. So 4 * 6 to 10 & 10 feet
room is enough for a network. In this connection I have take it in mind
that the room has sufficient space for keeping warring closet and other
devices. Becamee it is necessary for troubleshooting.

• PoIr supply :

I have to consider sufficient connection points for providing electricity to
the variome devices. It is good for keeping excess points for install
additional devices like UPS, IPS .

• Facilities in air passing :

Warring closet and other devices can produces heat, lack of sufficient air
passing can damage this devices. So I need a room which always
remain dry and facilitate in sufficient air passing.
• Security :

In a network have central warring and other devices, so that place
mmet be secured. This place should be under lock & key and entrance
restricted.




2. Server :

2.1 Operating system :

     • Windows 2000 4.0


2.2 Server Hardware :

      • Processor                  Pentium IV
      • RAM                        374 MB
      • Disk Storage              80 GB
      • Network Interface         Micro net Ethernet card(10 base 2)
      • Floppy Disk              3.5
      • Momee                     PS/2
      • Key Board                 PS/2
      • Display Adapter          sis303
      • Sound Card                Creative VB 32 MB
      • CD ROM                   52 x Asme
      • Monitor                  Samsung 15” color
      • Speaker                  Subwoofer 2.1


3. work Station :
3.1 Operating System :
        • Windows 98
        • windows XP




3.2 Hardware for work station :
     • Processor               Pentium IV
     • RAM                     128 MB
     • Disk Storage             80 GB
     • Network Interface       Micro net Ethernet card (10 base2 )
     • Floppy Disk            3.5
     • Momee                    PS/2
     • Key Board              PS/2
     • Display Adapter        sis303
     • Sound Card             Creative VB 32 MB
     • CD ROM                  52 x Asme
     • Monitor                 Samsung 15” color
     • Speaker                Subwoofer 2.1


4. Network technology :

     • LAN

5. Network Topology :

     • Star

6. Media :

    • UTP
7. Hub :

   • Active (24 ports)




8. Description :

a. Windows 2000 4.0 and work station have been installed in one
   computer and this computer configured as a server as Ill as windows
   work within the Network.


                   Specification :


     Computer name                    CCA 1
     Domain type                       PDC
     Domain name                      Experiment 1
     IP Address                       192.0.0.10
     Subnet Mask                      255.255.255.0
     Meer group                        Domain admin



b. Another computer has been configured as a server computer within
   the network under the Windows 2000 server 4.0, Networking
   operating system


                    Specification :
Computer name                   CCA 2
      Domain type                     BDC
      Domain name                    Experiment 1
      IP Address                     192.0.0.11
      Subnet Mask                    255.255.255.0
      Meer group                      Domain admin/Domain meer




C. Another computer has been configured as a server computer and
  as Ill the work station within network under the Windows XP,
  Networking operating system.


                  Specification :

     Computer name                  CCA 3
     Domain name                    Experiment 1
     Work group                     ISI. ORG
     IP Address                     192.0.0.12
     Subnet Mask                    255.255.255.0


d. Another computer has been configured as a work station within the
Network under Windows 2000 operating system.

                 Specification :

     Computer name                   CCA 4
     Domain name                     Experiment 1
     Work group                       ISI. ORG
     IP Address                      192.0.0.13



10. Conclmeion:
Computer networking is the interesting task but it demands great
sacrifices to time windows 2000 network operating system has become
a secured a software in the field of computer networking in the world. It
is a marvelome operating. In the project I have been trying to
understand the variome network protocol configurations in and
administering the network operating system.

More Related Content

What's hot

Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Mayank Jain
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Nicholas Riungu
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
Ravi Rajput
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
Pulkit Singhal
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Jagan Mohan Bishoyi
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
Zaeem Hassan
 
Network and technologies
Network and technologiesNetwork and technologies
Network and technologies
Akeem Coulibaly
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networking
iicecollege
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
Uttar Tamang ✔
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to networkMiz Malinz
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
fasywan
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
pawan1809
 
Computer networks 1
Computer networks 1Computer networks 1
Computer networks 1
Vijaya Babu
 

What's hot (20)

Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Fundamentals of Computer Networking
Fundamentals of Computer NetworkingFundamentals of Computer Networking
Fundamentals of Computer Networking
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Network and technologies
Network and technologiesNetwork and technologies
Network and technologies
 
introduction to Networking
introduction to Networkingintroduction to Networking
introduction to Networking
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Module1 introduction to network
Module1 introduction to networkModule1 introduction to network
Module1 introduction to network
 
Computer network
Computer networkComputer network
Computer network
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Network Resources
Network ResourcesNetwork Resources
Network Resources
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
 
Computer networks 1
Computer networks 1Computer networks 1
Computer networks 1
 

Similar to Project. Microsoft Windows Nt Networking

fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
Sorath Peetamber
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
Ashifimrankhan1
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
nutanm610
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Govt. P.G. College Dharamshala
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
jessandy
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
MdAlifKhanRifat
 
computer networks
computer networks computer networks
computer networks
MiXvideos
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4jashleyfaye
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
gondwana university
 
Computer network
Computer networkComputer network
Computer network
NajmulIslam38
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
Damaashaad
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
David Kibuki
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
RozinaMemon1
 
Computer networks
Computer networksComputer networks
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer network
Computer networkComputer network
Computer network
Md Saylab
 

Similar to Project. Microsoft Windows Nt Networking (20)

fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
 
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPALComputer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
Computer Network By Pawan Thakur HOD CS & IT VIM BHOPAL
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
computer networks
computer networks computer networks
computer networks
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Computer network
Computer networkComputer network
Computer network
 
What is network
What  is networkWhat  is network
What is network
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Computer network
Computer networkComputer network
Computer network
 

More from bksp

Project hasib
Project hasibProject hasib
Project hasib
bksp
 
About me details
About me detailsAbout me details
About me details
bksp
 
Project hasib
Project hasibProject hasib
Project hasib
bksp
 
Project hasib
Project hasibProject hasib
Project hasibbksp
 
Football coaching
Football coachingFootball coaching
Football coachingbksp
 
Saiful hasi bsportsschool
Saiful hasi bsportsschoolSaiful hasi bsportsschool
Saiful hasi bsportsschoolbksp
 
F:\Cd2009\Projectphoto\Projectfootball\Project Hasib
F:\Cd2009\Projectphoto\Projectfootball\Project HasibF:\Cd2009\Projectphoto\Projectfootball\Project Hasib
F:\Cd2009\Projectphoto\Projectfootball\Project Hasib
bksp
 
anika
anikaanika
anika
bksp
 
V M B R Slides
V M B R SlidesV M B R Slides
V M B R Slides
bksp
 
Project Hasib
Project  HasibProject  Hasib
Project Hasib
bksp
 
Saiful Hasi Bsportsschool
Saiful Hasi BsportsschoolSaiful Hasi Bsportsschool
Saiful Hasi Bsportsschool
bksp
 

More from bksp (11)

Project hasib
Project hasibProject hasib
Project hasib
 
About me details
About me detailsAbout me details
About me details
 
Project hasib
Project hasibProject hasib
Project hasib
 
Project hasib
Project hasibProject hasib
Project hasib
 
Football coaching
Football coachingFootball coaching
Football coaching
 
Saiful hasi bsportsschool
Saiful hasi bsportsschoolSaiful hasi bsportsschool
Saiful hasi bsportsschool
 
F:\Cd2009\Projectphoto\Projectfootball\Project Hasib
F:\Cd2009\Projectphoto\Projectfootball\Project HasibF:\Cd2009\Projectphoto\Projectfootball\Project Hasib
F:\Cd2009\Projectphoto\Projectfootball\Project Hasib
 
anika
anikaanika
anika
 
V M B R Slides
V M B R SlidesV M B R Slides
V M B R Slides
 
Project Hasib
Project  HasibProject  Hasib
Project Hasib
 
Saiful Hasi Bsportsschool
Saiful Hasi BsportsschoolSaiful Hasi Bsportsschool
Saiful Hasi Bsportsschool
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Project. Microsoft Windows Nt Networking

  • 1. Project Name: Study and Administration of Microsoft Windows 2000 Networking systems for small organizations. Course Name : Session : 2003-2004 Date : 17june 2006. Course Coordinator : Submitted By : Dhaka – 1216.
  • 2. Acknowledgement This is very nice to express about our chairman Md. Naderuzzaman who have strong capability to supervision the project work that can help me to complete the project work early. He also have sound knowledge about computer networking that his guidance, advice and encouragement to carry out the present study as Ill as in preparing this dissertation. I am very grateful to have work with him. mca Students Session: 2003-2004
  • 3. Preface The project has been made by my own effort that I have learned in our project period. This project is Client/Server based local Area Networking meing Windows 2000 Server and Windows 98 Workstation. There may have faults in this report, as I am the fresher in learning networking. Through I have acquired a little knowledge in networking I tried out based to present this project report properly. This project is not Ill enough for a large organization, but I think that it will be helpful for the new trainees who want to work in networking. In preparing this project, I have taken help from may networking technology reference books.
  • 4. Project Contains: Topics: # Introduction of Networking for a small office. # Administering Windows 2000 Server 4.0 # Designing and establishment of LAN 0f workstation meing Windows 2000 Server 4.0 Resource List: Further Development of Said Net: Computer Networks: Computers connected over a network can make that information
  • 5. Exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. People can concentrate on getting their work done rather than on moving information around the company. The most elementary network consists of two computers communicating over a cable. By linking computers together, I can more swiftly and efficiently move information betIen them. The computers can also share resources, such as; Printers and Fax modems, allowing me to better mee our hardware. A group of computers and other devices connected together is called a network, and the concept of connected computers sharing resources is called networking . Fig: A simple computer network . Types of network:
  • 6. Network can be classified as follows:  Local Area Network (LAN) A communications network connecting a group of computers, printers, and other devices located within a relatively limited area (for example, a building). A LAN allows any connected device to interact with any other on the network. Fig: An example of LAN  WIDE AREA NETWORK(WAN)
  • 7. A wide area network (WAN) is a voice, data, or video network that provides connections from one or more computers or networks within an eligible school or library to one or more computers or networks that are external to such eligible school or library. Excluded from this definition is a network that provides connections betIen or among instructional buildings of a single school campme or betIen or among non-administrative buildings of a single library outlet/branch. Fig: A Wide Area Network(WAN)  Metropolitan Area Network (MAN):
  • 8. In betIen LAN and WAN is the metropolitan Area Network. A MAN is a network that covers an entire city, but mees LAN technology.Cable television networks are example of MAN distributing signals. 1.2 components of Networks: The followings are the components and features that all networks have in common.  Server: Computers that provide share resources to the network meers.  Client: Computers that access shared network resources provided by a server.  Media: The way in which the computers are connected.  Resources: File, printers or other items to be meed by network meers.  With above shared components, network can be divided into two broad categories: Server-Based Networks Server-based networks are defined by the presence of servers on a network that provide security and administration of the network. Servers have many roles. Peer to Peer Networks
  • 9. Peer to peer networks are defined by a lack of central control over the network. There are no servers in peer networks; meers simply share disk space and resources,such as printers and faxes, as they see fit.Peer networks are organized into workgroups. Workgroups have very little security control. There is no central login process. If you have logged into one peer on the network, you will be able to mee any resources on the network that are not controlled by a specific password. Access to individual resources can be controlled if the meer who shared the resource requires a password to access it. Becamee there is no central security trmet, you will have to know the individual password for each secured shared resource you wish to access. Network Topology The way in which the connections are made is called the topology of the network.Network topology specifically refers to the physical layout of the network,especially the locations of the computers and how the cable is run betIen them. It is important to select the right topology for how the network will be meed.Each topology has its own strengths and Iaknesses. The four most common topologies are the bme, the star, the ring, andthe mesh. Bme Topology: The bme topology is often meed when a network installation is small, simple, ortemporary.On a typical bme network, the cable is jmet one or more wires, with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bme a passive topology. When one computer sends a signal up(and down) the wire, all the computers on the network receive the information,but only one (the one with the address that matches the one encoded in the message) accepts the information. The rest disregard the message.Only one computer at a time can send a message; therefore, the number of computers attached to a bme network can significantly affect the speed of the network. A computer
  • 10. mmet wait until the bme is free before it can transmit.These factors also affect star and ring networks. Fig:A Bme Network Star Topology In a star topology, all the cables run from the computers to a central location,where they are all connected by a device called a hub.Stars are meed in concentrated networks, where the endpoints are directlyreachable from a central location; when network expansion is expected; andwhen the greater reliability of a star topology is needed. Each computer on a star network communicates with a central hub that resends the message either to all the computers (in a broadcast star network) or only to the destination computer (in a switched star network). The hub in a broadcast star network can be active or passive.An active hub regenerates the electrical signal and sends it to all the computers connected to it. This type of hub is often called a multiport repeater Active hubs and switches require electrical poIr to run. A passive hub, such as wiring panels or punch-down blocks, merely acts as a connection point and does not amplify or regenerate the signal. Passive hubs do not require electrical poIr to run. I can mee several types of cable to implement a star network. A hybrid hub can accommodate several types of cable in the same star network..
  • 11. Fig:A Star Network Ring Networks In a ring topology, each computer is connected to the next computer, with the last one connected to the first. Rings are meed in high- performance networks, networks requiring that bandwidth be reserved for time-sensitive features such as video and audio, or when even performance is needed when a large number of clients access the network.
  • 12. Fig:A Ring Network Network Media What Are Net Media? Media are what the message is transmitted over. Different media have differentproperties and are most effectively meed in different invironments for different purposes. For example, television is a good medium for quick coverage and dramatic presentation of news events, whereas newspapers are better suited for a more
  • 13. in-depth presentation of issues. A scholarly journal or technical report might marshal facts more convincingly than television or newspapers. Figure : Illmetrates the concept of media. Copper: The most common network medium is copper. This metal has served our communications needs for over a century and will most likely be widely meed for another century. Engineers have become very good at sending electrical signals over copper wires and detecting them with a great deal of fidelity at the other end. Glass: Photons are the basic particles of light. (Photons can also act as waves, but that is not important to this text.) Photons are not affected by interference from electrical devices or radio waves, which is a major concern in high-speed copper networks. Fiber-optics is a networking technology developed to exploit the communications medium of light in long strands of glass. Light can travel for several miles in the less expensive multi-mode fiber optic cable without signal loss. The more expensive single-mode fiber-optic.
  • 14. cable long-distance telephone companies mee can carry a light signal for several hundred miles without signal degradation. Radio: Radio is a carefully regulated technology. Some radio communications equipment can be operated without a license, but the organization may need to have a license or permit to operate the higher-poIr or more sophisticated systems. Network Protocols A computer needs to know exactly how messages will arrive from the network so it can make sure the message gets to the right place. It needs to know how the network expects the message to be formatted (for instance, which part of the message is the data and which part of the message identifies the recipient) so the network can convey the data to its destination. As a comparison, consider the road-traffic protocols employed at an intersection to allow cars to cross safely. Protocols are mainly divided into two classes: Hardware protocols and Software protocols. Hardware Protocols:
  • 15. 100baseT: The Ethernet standard for local area networks meing twisted-pair cable carrying data at 100 megabits per second (Mbps). 10base2: The Ethernet and IEEE 802.3 standard for base band local area networks meing a thin coaxial cable up to 200 meters long and carrying data at 10 megabits per second (Mbps). Cables connect to network adapters by a BNC connector. 10baseT: The Ethernet standard for local area networks meing twisted-pair cable carrying data at 10 megabits per second (Mbps). Software Protocols: Transmission Control Protocol/Internet Protocol (TCP/IP) A set of networking protocols widely meed on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and variome operating systems. TCP/IP includes standards for how computers communicate and conventions for connecting networks and routing traffic. NW Link (IPX/SPX): NW Link is micro soft implementation of the IPX/SPX protocol devloped by novel.IPX function at the network layer and SPX functions at the transport layer .This protocol is better for larg networks that mee routers. It is faster than TCP/IP.
  • 16. NetBIOS Extended Meer Interface (NetBEUI): A network protocol native to Microsoft Networking. It is meually meed in small, department-size local area networks (LANs) of 1 to 200 clients. It can mee Token Ring source routing as its only method of routing. It is the Microsoft implementation of the NetBIOS standard. Home or small office network A home or small office network is a way for you to mee other computers or equipment without actually being at those computers. You can work on photos and files with other family members or co-workers while surfing the Internet at the same time. Meing Windows, there are numerome ways to connect computers or create a network. For homes and small offices, the most common model is peer-to-peer networking. A peer-to-peer network, also called a workgroup is commonly meed for home and small bmeiness networks. In this model, computers directly communicate with each other and do not require a server to manage network resources. In general, a peer-to-peer network is most appropriate for arrangements where there are less than ten computers located in the same general area. The computers in a workgroup are considered peers becamee they are all equal and share resources among each other without requiring a server. Each meer determines which data on their computer will be shared with the network. Sharing common resources allows meers to print from a single printer, access information in shared folders, and work on a single file without transferring it to a floppy disk.
  • 17. A home or small office network is similar to a telephone system. On a network, each computer has a network adapter that acts like a phone handset; jmet as mee the handset for talking and listening, the computer mees the network device to send and receive information to and from other computers on the network. Home or small office network to communicate with the Internet through a single connection at the same time. Other members of your family can surf the Ib, check their e-mail, and play Internet games through a single connection. Network Components: There are several components need to create a home or small office network: • Computers: I need two or more computers for a network. • Network adapter: Often called a network interface card. Network adepter connect your computers to the network and allow your computers to talk to each other. Network adapters can be connected to the MEB port on your computer or installed inside your computer in an available PCI expansion slot • Hub: A hub connects multiple computers at a central location. A hub is typically meed when connecting two or more computers to an Ethernet network. • Bridge: The network bridge provides an inexpensive and easy way to connect local area network (LAN) segments.
  • 18. Router: hardware that helps LANs and WANs achieve interoperability and connectivity, and can link LANs that have different network topologies (such as Ethernet and Token Ring). Routers match packet headers to a LAN segment and choose the best path for the packet, optimizing network performance. • Modem: A device that allows computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a phone line. The receiving modem translates the analog signals back to digital form. • Gateway: A device connected to multiple physical TCP/IP networks capable of routing or delivering IP packets betIen them. A gateway translates betIen different transport protocols or data formats (for example, IPX and IP) and is generally added to a network primarily for its translation ability. Open Systems Interconnection (OSI) reference model A networking model introduced by the International Organization for Standardization (ISO) to promote multi-vendor interoperability. Open Systems Interconnection (OSI) is a seven-layered conceptual model consisting of the application, presentation, session, transport, network, data-link, and physical layers The OSI model is nothing tangible; it is simply a conceptual framework you can mee to better understand the complex interactions taking place among the variome devices on a network. The OSI model does not perform any functions in the communication process. The actual work is done by the
  • 19. appropriate software and hardware. The OSI model simply defines which tasks need to be done and which protocols will handle those tasks, at each of the seven layers of the model. 1. Physical 2. Data link 3. Network 4.Transport 5.Session 6.Presentation 7.Application 1. Physical Layer: The physical layer makes a physical circuit with electrical, optical, or radio signals. Passive hubs, simple active hubs, terminators, couplers, cables and cabling, connectors, repeaters, multiplexers, transmitters, receivers, and transceivers are devices associated with the physical layer. 2. Data Link Layer: The data link layer provides for the flow of data over a single link from one device to another. It accepts packets from the network layer and packages the information into data units called frames to be presented to the physical layer for transmission. The data link layer adds control information, such as frame type, routing, and segmentation information, to the data being sent. This layer provides for the error-free transfer of frames from one computer to another. 3. Network Layer: The network layer makes routing decisions and forwards packets for devices that are farther away than a single link. (A link connects two network devices and is implemented by the data link layer. Two devices connected by a
  • 20. link communicate directly with each other and not through a third device.) 4. Transport Layer: The transport layer ensures that packets are delivered error free, in sequence, and with no losses or duplications. The transport layer breaks large messages from the session layer (which I’ll look at next) into packets to be sent to the destination computer and reassembles packets into messages to be presented to the session layer. 5. Session Layer: The session layer allows applications on separate computers to share a connection called a session. This layer provides services such as name lookup and security to allow two programs to find each other and establish the communications link. 6. Presentation Layer: The presentation layer translates data betIen the formats the network requires and the formats the computer expects. The presentation layer does protocol conversion, data translation, compression and encryption, character set conversion, and the interpretation of graphics commands. 7. Application Layer: The application layer is the topmost layer of the OSI model, and it provides services that directly support meer applications, such as database access, e-mail, and file transfers. It also allows applications to communicate with applications on other computers as though they Ire on the same computer. Installing & configuring TCP/IP: The IP address uniquely identifies the computer on a TCP/IP network. It consist of four number seperated by dots; each number mmet be betIen 0 and 255 for instance 128.100.111.5 is a valid address.
  • 21. The most common of these are class A,B and C Class A IP address: A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network. Class B IP address A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network. Class C IP address A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make mee of multiple proxy servers at the client site. TCP/IP: The process of installing TCP/IP has given below: 1) Select Start>Setting >Control pannel. 2) Open the Network icon by double-clicking it.
  • 22. 3) Click the Protocols tab in the Networks window. 4) Click The add button. 5) Select TCP/IP protocol from the list of protocols. 6) Select Close in the Network window. 7) Select obtain an IP address from a DHCP server if my local area network has a DHCP server. 8) If I have a DNS server in my LAN or if you have a constant connection to the Internet. Click the DNS tab and then enter the DNS address. 9) If I have a WINS server in my network, click the WINS address tab and then enter the WINS address. 10)Press OK to close the TCP/IP properties dialog box .I will receive a warning if I have not specified a primary WINS address. 11)Click close.
  • 23. 12)Restart the computer in order for the change to take effect. Click yes to restart the computer. Fig: Shows the MS TCP/IP Properties Windows, which contain these configuration settings. Windows 2000 Network Components:
  • 24. Microsoft has done an admirable job mapping its components and boundary layer is the OSI stack. Windows 2000 has a software component that maps to each OSI stack Layer. Major NT components: Windows 2000 components work together through interfaces called boundary layers. Each component implements a major networks service. Each boundary layer provides a way for components to communicate, but provides no other service. Components provide a certain service; boundary layers connect components, as shown in below: ⇒ The windows 2000 components and boundary layers are : • Programming interfaces (boundary layer) • File system drivers (component) • The transport driver interface (boundary layer) • Transport Protocol (component) • Network driver interface specification (boundary layer) • Adapter driver (component) ⇒Windows 2000 supports the following programming interfaces : • Net BIOS • Windows Sockets • Remote procedure Calls • Network Dynamic Data Exchange (Net DDE)
  • 25. • File System Drivers : File system drivers are networking components that are treated as window’s NT local storage file systems. These components include the workstation and server services. Named pipes and mail slots. Default Components: A standard window’s NT installations include a number of default components chosen becamee they satisfy the requirements of most meers : The following components are installed by default in Windows 2000: • NetBIOS interface • TCP/IP Protocol • Workstation • Server • Computer browser • Driver for the network interface adapter • RPC name service provider Hardware & Software Requirements for Windows 2000 4.0 • Hardware Requirements for Windows 2000 Server:
  • 26. Especially hardware requirements for operating systems are difficult becamee computer hardware improves at a rapid pace and the performance expectations of meers with hardware can produce. HoIver, the Hardware listed here will not provide a very meeful machine. Server Hardware Compatibility: • CPU • System Bme • System RAM • Disk Drivers Controller • NIC • Video System • I/O Device • UPS System Different types of server configuration: I are describing the roles separately to high light the exact hardware that is necessary to perform that role. I can then mix hardware requirements for the different roles to create servers capable of performing multiple roles. ⇒ Some specialized servers include : • File and print servers • Application Servers • Internet and Internal Servers • Messaging Servers
  • 27. • Remote Access Services Servers • File walls Server Software requirement: Server Software Design: • Server licening questions/per seat/preserver • Network role (PDC/BDC, Member server, Stand alone server) • Back office requirement (Internet information Server , SNA, SMS Exchange,SQLServers) • Network protocols(TCP/IP, NETBEUI, IPX/SPX) • Network service(NetBIOS interface,Microsoft DNS Server,Computer Browser, Microsoft DHCP Server, Remote Access Server) Fault Tolerance & Raid Support • Domain security information resides on a single domain controller, but other servers can act as a backup domain controllers. • NT supports multiple networks cards, so a network card failure doesn’t bring down the server. • Directly replication service.
  • 28. • RAID (Redundant arrays of inexpensive disks) • Support for level 1 and 5. • Disk mirroring & Disk duplex (RAID level) • Disk striping with parity(RAID level 5) Software installation & uninstalling: Installing Windows 2000 server involves many decision, quite a few tediome steps. The individual decisions are easy, and the steps are not difficult , but each one element mmet be correct to perform a successful install. Introduction FAT & NTFS File System: FAT: The FAT (File Allocation Table) it is a list of a series of entries, one for each clmeter. The contents of each entry show the clmeter’s statme as Iather it is in mee or available for file storage or whether it is bad. When DOS wants to read a file, it finds the file’s starting clmeter in the directory and then looks at the starting clmeter’s FAT entry. If the entire file fits in a single clmeter, the FAT entry shows an end-of-file indication. If he file is larger than a single clmeter, the FAT entry shows the number of the next clmeter than contains part of the file.
  • 29. Summary of FAT features: • FAT supports files and partitions as large as 4 GB • FAT is accessible by many operating systems including MS-DOS, Windows 2000, Windows 95 etc and FAT are a nearly universal file system. • FAT has the least file system overhead of any modern file system, which makes it suitable for small partitions. • FAT is the only widely supported PC compitable file system that is meed on floopy disks. NTFS: NTFS represents the culmination of file system development at Microsoft,it is the preferred file system for mee with Windows 2000 for the following reasons. • NTFS was created specifically for Windows 2000. • NTFS implements many protective features to ensure the reliable storage and retrieval of data. NTFS has numerome features that make it more appropriate than FAT for Windows 2000. Windows 2000 is the only operating system that supports NTFS.
  • 30. The following NTFS features: • Fault tolerance • Security • File and Partition size • File compression • POSIX support • Performance Installing Windows 2000 Server to perform variome roles: Windows 2000 Server can play several roles in the network. Primary Domain Controller (PDC) It can be configured to be a primary domain controller (PDC), of which there can be only one in a Windows 2000 domain controller is the central point for the network.
  • 31. Every domain has exactly one primary domain controller . The PDC mmet be the first server brought up on the network in the domain becamee it mmet maintain the database of meer accounts and computer domain membership accounts as other computers are brought into the domain. The PDC may delegate authentication to the backup domain controllers,but the PDC always maintains the master list of acceptable mee names and password for the domain. Backup Domain Controller (BDC) Backup domain controllers exist for several reasons. It can be one of several backup domain controllers (BDC) in which case it will satisfy logon request for the domain and take over if the PDC fails. Member Server Not every server in the network mmet be a PDC on a BDC. It can be a member server in which case it will perform neither PDC nor BDC fonction but differ to the PDC and BDC for domain security and logon. The tasks that the PDC and BDC perform exact a performance penalty from the server and it may wish to dedicate some server in the domain to a single purpose, such as serving files or hosting a database. Stand Alone Server
  • 32. In some case, it can be set up as a stand-alone server is not part of a domain at all. It configures to mee the workgroup networking model instead of the domain networking model. In the server will not be a part of a domain , it should be designate as a stand-alone server. Install Windows 2000 Server Install Windows 2000 server can be installed in its own NTFS volume or it can be installed alongside another operating systemin a FAT volume. Starting a CD-ROM Installation process The procedure of a CD-ROM Installation without floopy disks described bellow: • Turn the computer on and press Del to setup first boot option CD- ROM drive , press F10 to save settings and exit. • Insert a window’s NT 4.0 bootable CD in to CD-ROM drive and restart the computer • The setup program will copy installation files to the hard drive computer. When the file transfer is complete, remove all floopy disk from the disk driven and then press “Enter” to reboot the computer. The computer will reboot and Ilcome to Windows 2000 server setup go to the next section. • By pressing F8 agree the license. • Write down the computer name.
  • 33. • Server type (PDC/BDC/Stand alone) select any one. • Write down password • Repair Disk • Select components • Lan Card • HS Server • Protocol+Service NT • Ethernet ID by default • If DHCP yes/no • IP address Class C • Computer Name • Domain Name • FTP Server/gopher • SQL • Emergency Repair disk (OS+Service pack built-in) • Finish
  • 34. PART-2 ADMINISTRATING WINDOWS SERVER NT.4.0 1.Introduction to Administering Windows N’T 1.1Administering Windows 2000. Administering Windows 2000 involves post-installation and day-to-day task required for Windows 2000 work station and Windows 2000 server. The Administration takes can be grouped into five general categories: • Meer and group account Administration • Printer Administration • Security Administration • Monitoring Administration • Backing and restoring data. 1.2 Loading on to a Computer or Domain Each time I start the computer, Windows 2000 prompts me to log on by pressing CTRL+ALT+DEL. The log on information dialog box is meed to a computer or domain.
  • 35. The following options are shown in the dialog box: • Meer name • Password • Domain name • Logon meing Dial-UP Networking • Shut Down 1.3Windows 2000 Administrative & Tools The following options are shown:  Windows 2000 server only • Administrative Wizards • Server Manager • Meer Manager for Domains  Windows 2000 workstation only • Meer Manager  Windows 2000 server and Windows 2000 workstation • Backup • Event vieIr • Windows 2000 diagnostics • Help
  • 36. 1 .4 Windows 2000 Security dialog box Once a meer is logged on, the CTRL+ALT+DELL key sequence is meed to access the window’s NT security dialog box.  The following options are shown in the dialog box. • Local Workstation • Change password • Logoff • Task Manager • Shut Down • cancel 2 Setting up meer accounts: 2.1 Introduction to meer Accounts: A meer accounts is a meer’s unique credentials and gives the meer the ability to log on to the domain to access network resources, or to log on to a local computer to access network resources. Each person
  • 37. who regularly mees the network should have and accounts to control how a meer the domain or a computer. Types of meer accounts:  Accounts I are create • Required for each meer • Resource access is associated with the account.  Guest • Built-in account (disabled) • Meed for occasional access • Limited access to resources.  Administrator  Built-in account  Manages • Meer and group accounts • Security policies • File resources • Print resources 2.2 Planning new meer Accounts: To plan meer accounts I need to determine: • A naming convention
  • 38. • The password requirement • Logon hours • From which computers meers can log on • A home folder location. 2.3Creating meer Accounts: To create a new meer accounts: Start meer manager for Domains (or meer manager on Windows 2000 workstation). • On the meer menu, click new meer. • The following options have to be configured √ Meer name √Full name √Description √Password √Confirm password 2.4 Deleting and Renaming meer accounts: When an account is no longer needed, I can delete an account or rename an account for mee by another meer. T0 delete a meer accounts: • Start meer manager for domains, and then select the meer account • Press the Delete key • Click OK and the meer account is deleted. To rename a meer accounts:
  • 39. • Start meer manager for domains, and then select the meer account. • On the meer menu, clicks rename. • In the change to the box, type in the new meer name, and then click ok. 2.4Managing the meer work environments: A meer profile • Is created by default for each meer • Defines a meer’s desktop environment • Retains network and printer connections • Can be cmetomized to restrict available options A logon script • Configures network and printer connections for non Windows 2000 based clients. • Cannot configure the environment 3. Setting up group accounts: A group is a collection of meer accounts. Assigning a meer accounts membership in a group gives that meer all the right and permission to the capabilities to multiple meers at one time. There are few types of group: • Local groups • Global groups 3.1 Planning a group’s strategy: When creating groups, follow these guidelines:
  • 40. Logical organized meer based common needs • Create global groups, and then add meer accounts • Create local based on resources need • Assign permissions to local groups • Add global groups to local groups 3.2 Creating local and global groups:  To create local groups: On the meer menu, click new local group, the new local group dialog box appears.In the group name box, type a unique, descriptive name for the group. The name: • Should descriptive function of the group. • Can contain any upper case or loIr case characters except for the backslash (/). • Cab is up to 256 characters in length; only the first 22 characters display on the most of the Windows. In the description box type a description of the group, and then click Add. In the names list, select the meer or global accounts from the local domain I want add to the group. To add global groups from another domain, in the list names from box, select the domain, and select the global groups. The asterisk indicates the current domain. Click OK in the new dialog box to create the local groups.  To create a global group: On the meer menu, click new global group. The new global group dialog box appears In the group name box, type the name of the group. In the
  • 41. description box, type a description of the group. Although the description is optional, it can be helpful in identifying the function of a group. In the not number list select the meers I want in the group. Click add, the meers I selected appear in member list. Click OK to create the global group containing all the meers I added as members. PART – 3 DESIGNING AND ESTABLISHMENT OF 4 WORK STATIONS MEING WINDOWS 2000 AS THE PLATFORM 1. Introduction To establish a network the knowledge of different technology is not sufficient. I need to take accurate planning and accurate steps to make the planning possible. A network established meing different devices and technology. Which technology I will mee depends on what type of network I will establish. A network establishment depending on what will be the mee of the company. The design of a network follows same steps.  Verification of Importance : Verification of Importance is the most important steps of the network design. I need different data to full fill this steps. In this step I need to know different equipment, topology, network topology and demand of the company. I have to pay importance on same points and they are following :
  • 42. • What equipment’s I have and what equipment’s I need. • If the network is already exists then I have to test different log file, documentation and performance of the network. • I have to be sure that what is the layout of the building, I also have to be sure Iather there is any cable installed. • I have to know from the meers that what they will do with the mee of network.  Now I will know about the steps of verification of importance : What I have ? For establishing a network I need different types of equipment including computer. Among this equipment I have to make a list of what I have and what I need to establish a network. I have to make a list on how many computer and printer they have and what device they have. I have to collect information about all of these things. This type of collecting information is called inventory. What meer I need ? When I are establishing a network for a company the first of all I have to discmes with the owner of the company that, what their vision about the network is. I have informed from the discmesion are following : • Whether meers are meing computer or not. If they are meing then what is their mee. And for what kind of task they are meing computer. • Which program meers will mee on the computer.
  • 43. Which architecture I need to mee ? When I will establish a network I have to think which architecture I will mee or which architecture will full fill meer demand. I also have to think about the cost and the mee of the architecture. To select architecture, first of all I have made a work sheet on which architecture I will mee. And this work sheet will be included with different characteristic of architecture. Then I will mark on them which will full fill our demand most. What topology ? Topology is very important in a network. I have to choice which topology can full fill our demand among the topologies. If I mee star topology than, all cables needs to go the central place. This is why I have to consider the followings : • Size of room : The size room depends on the size of network. So 4 * 6 to 10 & 10 feet room is enough for a network. In this connection I have take it in mind that the room has sufficient space for keeping warring closet and other devices. Becamee it is necessary for troubleshooting. • PoIr supply : I have to consider sufficient connection points for providing electricity to the variome devices. It is good for keeping excess points for install additional devices like UPS, IPS . • Facilities in air passing : Warring closet and other devices can produces heat, lack of sufficient air passing can damage this devices. So I need a room which always remain dry and facilitate in sufficient air passing.
  • 44. • Security : In a network have central warring and other devices, so that place mmet be secured. This place should be under lock & key and entrance restricted. 2. Server : 2.1 Operating system : • Windows 2000 4.0 2.2 Server Hardware : • Processor Pentium IV • RAM 374 MB • Disk Storage 80 GB • Network Interface Micro net Ethernet card(10 base 2) • Floppy Disk 3.5 • Momee PS/2 • Key Board PS/2 • Display Adapter sis303 • Sound Card Creative VB 32 MB • CD ROM 52 x Asme • Monitor Samsung 15” color • Speaker Subwoofer 2.1 3. work Station :
  • 45. 3.1 Operating System : • Windows 98 • windows XP 3.2 Hardware for work station : • Processor Pentium IV • RAM 128 MB • Disk Storage 80 GB • Network Interface Micro net Ethernet card (10 base2 ) • Floppy Disk 3.5 • Momee PS/2 • Key Board PS/2 • Display Adapter sis303 • Sound Card Creative VB 32 MB • CD ROM 52 x Asme • Monitor Samsung 15” color • Speaker Subwoofer 2.1 4. Network technology : • LAN 5. Network Topology : • Star 6. Media : • UTP
  • 46. 7. Hub : • Active (24 ports) 8. Description : a. Windows 2000 4.0 and work station have been installed in one computer and this computer configured as a server as Ill as windows work within the Network. Specification : Computer name CCA 1 Domain type PDC Domain name Experiment 1 IP Address 192.0.0.10 Subnet Mask 255.255.255.0 Meer group Domain admin b. Another computer has been configured as a server computer within the network under the Windows 2000 server 4.0, Networking operating system Specification :
  • 47. Computer name CCA 2 Domain type BDC Domain name Experiment 1 IP Address 192.0.0.11 Subnet Mask 255.255.255.0 Meer group Domain admin/Domain meer C. Another computer has been configured as a server computer and as Ill the work station within network under the Windows XP, Networking operating system. Specification : Computer name CCA 3 Domain name Experiment 1 Work group ISI. ORG IP Address 192.0.0.12 Subnet Mask 255.255.255.0 d. Another computer has been configured as a work station within the Network under Windows 2000 operating system. Specification : Computer name CCA 4 Domain name Experiment 1 Work group ISI. ORG IP Address 192.0.0.13 10. Conclmeion:
  • 48. Computer networking is the interesting task but it demands great sacrifices to time windows 2000 network operating system has become a secured a software in the field of computer networking in the world. It is a marvelome operating. In the project I have been trying to understand the variome network protocol configurations in and administering the network operating system.