Network Theory
Network Theory
2. Ring Topology: - In Ring topology, all the computers are connected in circular form same as ring. Its data
flows in only one direction. So, if one computer fails, the remaining computer on its anti clock wise
1
direction cannot access the data same as Bus topology. We can connect here maximum 30 computers with
100 meters of coaxial cable. In Ring topology, the terminator point and the terminator cable are not used.
3. Star Topology: - In Star topology, all the computers are connected with the help of switch or hub for the
local LAN and we use repeater, router to connect the different LANs of Star topology. In this topology, if
one computer will fails it will not affect another computer on the network. But if central connectivity device
fails, it will affect the entire network. It uses more cable. We use twisted pair cable, NIC, RJ-45,
switch/Hub to connect the computers on the network.
4. Hybrid Topology: - With the hybrid topology, two or more topologies are combined to form a complete
network. For example, a hybrid topology could be the combination of a star and bus topology. These are
also the most common in use.
5. Mesh Topology: - In a mesh topology, each computer is connected to every other computer by a separate
cable. This configuration provides redundant paths through the new work, so if one computer blows up, you
don't lose the network. On a large scale, you can connect multiple LANs using mesh topology with leased
telephone lines, Thicknet coaxial cable or fiber optic cable.
Again, the big advantage of this topology is its backup capabilities by providing multiple paths through
the network.
2
Protocol
Protocol is the communication language or rule which establishes the network within the hosts (nodes) on
the network. There are different kinds of protocol.
1. TCP/IP (Transmission Control Protocol / Internet Protocol)
2. FTP (File Transfer Protocol)
3. POP (Post Office Protocol)
4. SMTP (Simple Mail Transmission Protocol)
5. IPX / SPX (Internet Packet Exchange / Sequential Packet Exchange)
6. WAP (Wireless Access Protocol)
7. DHCP (Dynamic Host Configuration Protocol)
1. TCP / IP: - The TCP / IP have 2 parts:
a. TCP: - The Transmission Control Protocol is responsible to establish communication between the two
networks, hosts on the network and the main function of TCP is to transmit the data by identifying the
host on the network.
b. IP: - The Internet Protocol is responsible to receive the packet of information or the data.
Note: The TCP / IP uses the IP address to establish the communication between the networks.
IP Address
The IP address is a numeric value of 32 bits in OCTATE configuration separated by dots (Periods). There
are 4 blocks. Each block contains 8 bit of numeric value. The range of IP address is defined by the IANA
(Internet Assigned Network Authority) from 1.0.0.0 to 255.255.255.255. Among these range the IP address is
classified in 5 classes. That are class A, B, C, D and E. Among these 5 classes of IP address, we can use only the
IP of class A, B, C. The IP of class D and E are reserved IP address. Class D is reserved for multitasking and
broadcasting purpose. And class E is reserved for future use in scientific research.
The range of IP are defined as:
Class ‘A’ 1.0.0.0 to 127.255.255.255
Class ‘B’ 128.0.0.0 to 191.255.255.255
Class ‘C’ 192.0.0.0 to 223.255.255.255
Class ‘D’ 224.0.0.0 to 239.255.255.255
Class ‘E’ 240.0.0.0 to 255.255.255.255
Note: 1) From the IP of class ‘A’, the range 127.0.0.0 is reserved for testing network.
2) From the class ‘B’, the IP range of 169.254.0.0 is reserved for Automatic IP address.
OCTATE configuration of IP Range
1.0.0.0 = 00000001.00000000.00000000.00000000
To
255.255.255.255 = 11111111.11111111.11111111.11111111
Subnet Mask
The Subnet mask is also a 32 bit numerical value in OCTATE configuration. If defines the Net ID and Host Id.
Net ID: - The term Net ID defines the total number of network in a class.
Host ID: - The term Host ID defines the total number of host in a network.
Invalid IP Address
1. Any IP address starting with 0 and the ending with 0 are the invalid IP address.
2. Any IP address starting 255 and ending with 255 are the invalid IP address.
3
Rest all others are the valid IP address.
OCTATE configuration of IP Range
Class IP Range Decimal Value of IP range Binary Value of IP Subnet Mask
range
A 1.0.0.0 1 00000001 255. 0.0.0
To To To Net ID Host ID
127.255.255.255 127 01111111
B 128.0.0.0 128 1000000 255.255. 0.0.
To To To Net ID Host ID
191.255.255.255 191 10111111
C 192.0.0.0 192 11000000 255.255.255. 0
To To To Net ID Host ID
223.255.255.255 223 11011111
D 224.0.0.0 224 11100000 255.255.255.255
To To To
239.255.255.255 239 11101111
E 240.0.0.0 240 11110000 255.255.255.255
To To 11111111
255.255.255.255 255
Total number of Network and Host in different class of IPs
Class 'A'
(1-126). (0-255).(0-255).(0-255)
Net ID Host ID
Total No. of Network = 126
Total No. of Host in a Network = (256×256×256)-2 = 16777216-2 = 16777214
Total No. of Computers = 126×16777214 = 2113928964
Class 'B'
(128-191).(0-255).(0-255).(0-255)
Net ID Host ID
Total No. of Network = 64×256 = 16384
Total No. of Host in a Network = (256×256)-2 = 65536-2 = 65534
Total No. of Computers = 16384×65534 = 1073741824
Class 'C'
(192-223).(0-255).(0-255).(0-255)
Net ID Host ID
Total No. of Network = 32×256×256 = 202752
Total No. of Host in a Network = 256-2 = 254
Total No. of Computers = 202752×254 = 532676608
IP address can be assigned in 2 ways:
1. Dynamic IP: - Dynamic IP is the changeable IP address which is automatically accepted by the hosts in
two cases:
a. In case of configuring the DHCP server when we use the client server network.
b. In case of if we do not define the manual IP. If the NIC and its driver are installed and proper
configuration is done then in the properties of TCP / IP, the radio button “Obtain an IP address
automatically” is selected.
4
2. Static IP: - This is the constant IP address. This IP address is defined manually by the user from the
properties of TCP / IP.
Note: Whether we define the Static IP or Dynamic IP, both are classified as the ‘Private’ and ‘Public’ IP.
Private IP: - This IP can be used free of cost by a normal user. The range of private IP in class ‘A’, ‘B’, and ‘C’
are:
Class ‘A’ : 10.0.0.1 to 10.255.255.254
Class ‘B’ : 172.16.0.1 to 172.16.255.254
Class ‘C’ : 192.168.0.1 to 192.168.255.254
Note: The range of class ‘B’ 169.254.0.1 to 169.254.255.255 is reserved for MRIP (Microsoft Reserved Internet
Protocol) / APIPA (Automatically Provided Internet Protocol Address).
Public IP: -This IP can be used only after paying the cost. This type of IP is used by the ISP (Internet Service
Provider)
Cable
Cable is a bunch of wire which is used to transmit data or information within the network from one host to
another host or from one network to another network. There are different kinds of cable but more importantly
we use twisted pair cable.
1. Coaxial Cable: - The coaxial cable is outdated now. This cable was used in prior with the BUS topology or
Ring topology to establish the network. In this cable there lie two wires. One is the Copper wire which
transmits the Analog Signal and another one is concentric wire which transmits the digital signal. The
copper wire is protected with a white coloured inner sheath and the concentric wire is protected with a black
coloured upper sheath. It looks same as the cable of TV. The connectors used with this cable are T-
connector, BNC connector and the End connector. It has data transfer rate up to 10 MbPS. There are two
kinds of coaxial cable:
a. Thicknet
b. Thinnet
2. Twisted Pair Cable: - It is the 4 paired cables in which all the pairs are twisted together 6 turns per inch
with each other. The 4 paired cables are in different colours. They are:
[a] Orange - Orange White
[b] Green - Green White
[c] Blue - Blue White
[d] Brown - Brown White
There are two kinds of twisted pair cable:
1. STP (Shielded Twisted Pair Cable)
2. UTP (Unshielded Twisted Pair Cable)
On the basis of Category (CAT) there are different kinds of cable:
a. CAT1 > 2 paired cable > Bandwith / Data transfer rate 1-2 Mbps
b. CAT2 > 4 paired cable > Bandwith / Data transfer rate 10 Mbps
c. CAT3 > 4 paired cable > Bandwith / Data transfer rate 16 Mbps
d. CAT4 > 4 paired cable > Bandwith / Data transfer rate 20 Mbps
e. CAT5 > 4 paired cable > Bandwith / Data transfer rate 100 Mbps
f. CAT5E > 4 paired cable > Bandwith / Data transfer rate 1 GbPS/ 1000 Mbps
Among these categories, most we use CAT5 or CAT5E. Using CAT5, we can establish the network within
200 meters of long distance and using the CAT5E, we can establish the network within 500 meters of long
distance.
The connector of twisted pair cable is RJ-45.
3. Fiber Optic Cable: - The Fiber optic cable uses the light signal instead of electronic signal to transmit the
data. Its connectors are SC and ST. Its metal sheath is highly polished through which light wave passes to
transmit the data. It transmits the data in the speed of light. The transfer rate of this cable is 100-1000 Gbps.
5
Cabling
Cabling is a process of connecting the cables with its connectors. There are different kinds of cabling:
1. Parallel cabling: - Parallel cabling is done for the different devices. When we have to establish the
connection via the different connectivity devices then we make this type of cabling. The different kinds of
devices can be From Switch to computer or From Hub to computer.
2. Crossover Cabling: - The crossover cabling is done if we have to connect the same devices such as from
one computer to another, from one hub to another hub or from switch to switch.
Whether we make the simple or the crossover cable, both can be done in two ways: -
[1] Simple Cabling: - 10 Mbps
Parallel: -
"A" "B"
[1] Orange [1] Orange
[2] Orange White [2] Orange White
[3] Blue [3] Blue
[4] Blue White [4] Blue White
[5] Green [5] Green
[6] Green White [6] Green White
[7] Brown [7] Brown
[8] Brown White [8] Brown White
Cross Over:-
Formula for crossover cabling: -
1 goes to 3
2 goes to 6
3 goes to 1
6 goes to 2
"A" "B"
[1] Orange [1] Blue
[2] Orange White [2] Green White
[3] Blue [3] Orange
[4] Blue White [4] Blue White
[5] Green [5] Green
[6] Green White [6] Orange White
[7] Brown [7] Brown
[8] Brown White [8] Brown White
[2] IEEE Stander of Cabling: 100 Mbps
Parallel: -
"A" "B"
[1] Orange White [1] Orange White
[2] Orange [2] Orange
[3] Green White [3] Green White
[4] Blue [4] Blue
[5] Blue White [5] Blue White
[6] Green [6] Green
[7] Brown White [7] Brown White
[8] Brown [8] Brown
6
Formula for crossover cabling: -
1 goes to 3
2 goes to 6
3 goes to 1
6 goes to 2
Cross Over: "A" "B"
[1] Orange White [1] Green White
[2] Orange [2] Green
[3] Green White [3] Orange White
[4] Blue [4] Blue
[5] Blue White [5] Blue White
[6] Green [6] Orange
[7] Brown White [7] Brown White
[8] Brown [8] Brown
1) HUB: -
Maximum uses media
Old Media
It consists of various ports like 4, 8, 16, 32, 64 ports.
Hub sends data to all the Computers on the Network which causes collision (Confliction) problem on
the Network.
2) Switch: -
Most popular media
Latest media
It sends data directly to the destination.
No Collision problem.
It also consist various ports.
3) BRIDGE: -
It connects two different Network
It also divides a Network (LAN) into various LANs (Making easier of complex LAN).
4) ROUTER: -
Especially Router is used on WAN.
It connects the various LANs.
Maximum uses media on WAN.
5) REPEATER: -
It accepts the weak signal and converts into the strong signal as the source and sends the signal to the
destination.
6) GATEWAY: -
Local called routing.
Uses with routers.
Connects with different LANs.
Physical Network Setup
1. Two or more than two systems with Ethernet Controller (LAN card) and its proper driver must be installed.
2. If you have to establish the network in only 2 systems then have a crossover cabling and if you have to
establish the network in more than 2 systems with the help of central connectivity device (Switch / Hub)
then have parallel cabling for it.
3. Connect the one end of cable to the switch/hub and another end of cable to the system NIC.
4. Now start the system and assign the computer name, workgroup, IP address, and its subnet mask.
Computer name must be different.
e.g. com1, com2, com3 etc.
Workgroup must be same.
IP address:
i. Net ID must be same (for same network).
ii. Host ID must be different.
Subnet Mask must be same
7
How to change computer name and workgroup
1. Right click on ‘My Computer’.
2. Click on ‘Properties’.
3. Click on ‘Computer Name’ tab.
4. Click on ‘Change’ button.
5. Click on ‘Computer name’ box and type the computer name.
6. Click on ‘Workgroup’ and type the workgroup name.
7. Click on OK.
8. If the system asks for the administrator name then type the name of administrator and its password.
9. Click on OK / OK / OK / Yes.
How to Define IP Address and Subnet Mask
1. Right click on ‘My Network Places’.
2. Click on ‘Properties’.
3. Right click on ‘Local Area Connection’ and then choose ‘Properties’.
4. Choose ‘Internet Protocol (TCP/IP’.
5. Click on ‘Properties’
6. Type the IP address.
e.g. Com1 Com2 Com3
192.168.0.1 192.168.0.2 192.168.0.3
Net ID Host ID Net ID Host ID Net ID Host ID
7. Click on OK / Close.
How to Check the Connectivity
1. Go to ‘Run’ window.
2. Type ‘cmd’ and click on OK.
3. Now type DOS commands on Network such as:
Commands on Network
1. Ping: - This command lets you to check the connectivity between the systems on the network.
Syntax:
C:\>Ping <Computer name / IP address> and press ‘Enter’ key.
C:\>Ping 192.168.0.4
C:\>Ping com4
2. Net view: - It shows the systems on the same network.
e.g. c:\>net view
3. Net send: - This command sends the message to the specified computer name or the IP specified.
e.g. c:\>net send com1 hi
c:\>net send 192.168.0.1 hi
Instead of computer name or the IP address, if you have specified the ‘*’ mark then it will send the
specified message to all the hosts on the network.
e.g. c:\>net send * hi
4. Net User: - This command displays the list of the user currently available on the system.
e.g. c:\>net user
Using the following syntax we can create the user from the command prompt.
Syntax:Net user <user name> [Password] </add>
e.g. c:\>net user abc pop /add
Here, the user name is ‘abc’ and its password is ‘pop’.
Using the following syntax, we can delete the user.
Syntax: c:\>net user <user name> </delete>
e.g. c:\>net user abc /delete
8
5. Ipconfig: - This command displays the IP address, Subnet mask and Connection specific, DNS, Suffix
address etc.
e.g. c:\>ipconfig
6. Ipconfig/all: - Using the ‘/all’ option with ‘ipconfig’ will display the physical address (MAC), Computer
name, IP address, Subnet mask etc.
e.g. c:\>ipconfig/all
7. Hostname: - It displays the name of computer.
e.g. c:\>hostname
8. arp –a: - It displays the list of the IP of all the computers on the network.
9. Net share: - It displays the list of shared drives and the folders on the system.
e.g. c:\>net share
How to connect the computer remotely (Remote Desktop Connection)
1. Right click on ‘My computer’.
2. Click on ‘Properties’.
3. Click on ‘Remote’ tab.
4. Put check mark on ‘Allow users to connect remotely to this computer’ option.
5. Click on ‘Apply’/OK.
6 To connect:
a. Start / Program / Accessories / Communication / Remote Desktop Connection
or
Type ‘mstsc’ in ‘Run’ window.
b. Type the administrator name in the ‘User name’ box and the password.
c. Click on OK.
Note: 1. Computer must have password for administrator that you have to run remotely.
2. The computer that you connected remotely will automatically be locked. It can be unlocked only
by the password of administrator.
Net Meeting
How to install Net Meeting
1. Go to 'Run' window.
2. Type 'Conf'.
3. Click on OK.
4. Click on Next
5. Type the First name, Last name, Email address
6. Click on Next.
7. Put check mark on 'Log on to a directory server when Net meeting starts' check box.
8. Click on Next.
9. Choose 'Local area Network'.
10. Click on Next / Next / Finish.
How to establish Communication
1. Click on 'Please call' button.
2. In 'To' box type the computer name or the IP address of the computer with which you have establish
communication.
3. Click on 'Call' button.
4. Click on OK.
Now, the Destination host will get a message with two options, i.e., 'Accept' and 'Ignore' button.
5. Click on 'Accept' to establish the communication and click on 'Ignore' if you don't want to establish the
communication.
9
How to Chat
1. First establish a communication with the required host(s).
2. Click on 'Chat' button.
3. If you want to chat with all the users on communication then from 'Send to' box click on 'Everyone in chat'
and if you want to chat with any individual user then select the name from 'Send to' box.
4. In 'Message' box type the message.
5. Click on 'Send Message' button or simply press 'Enter' key.
How to share the program
1. Click on 'Share Program' button.
2. Select the program you want to share. [Note: First open program or file that you want to share].
3. Click on 'Share' button.
4. To unshared, select the program you want to unshared and then click on 'Unshare' button or 'unshared all'.
How to transfer Files
1. Click on 'Transfer files (Ctrl+F).
2. From 'File' menu, choose 'Add files' or click on 'Add file' button on the toolbar.
3. If you want to send a single file, then select the file from the list. Click on 'send a file' from the 'File' menu.
And if you want to send all the files from the list then click on 'Send all' button or choose 'Send all' from
'File' menu.
Location of received files
1. Open the drive containing operating system.
2. Open 'Program files'.
3. Open 'Net meeting'.
4. Open 'Received files'.
Sharing
It is a process to make drive or folders accessible with the computers on the network. We can also share the
files but we cannot share it directly. A file can be shared automatically when it is inside a shared folder.
We can create two kinds of sharing:
1. Visible Share: - The visible share can be viewed from any computer on the network.
2. Hidden Share: - To view the hidden share, we need to specify the share name followed with '$' sign.
All the hard disk drives are the default hidden share.
Process of sharing
1. Right click on the folder or the drive you want to share.
2. Click on 'Sharing and Security'.
3. Click on 'Share this folder' radio button.
4. In 'Share name' box, type the share name or let the share name that is appeared by default.
Note: If you want to make it hidden share then type the '$' sign just after the share name. And if you want to
make it the visible share then don't provide the '$' sign after the folder name.
5. Click on 'Permissions' button and click on 'Full control' check box. In Windows 2000 OS, it is the default
Full control permission.
6. Click on 'Apply' / OK.
7. Click on 'Apply' / OK.
Note: Using the net share command on the command prompt, we can view all the share (both hidden and
visible) drive or folder can be seen.
10
How to Remove the sharing
1. Right click on 'My computer'.
2. Click on 'Manage'.
3. Click on 'Shared folders'.
4. Click on 'Shares'.
5. Right click on the drive or the folder of which you want to remove the sharing.
6. Click on 'Stop sharing'.
7. Click on 'Yes'.
How to make a folder shared from Computer management
1. Go to the 'Computer Management'.
2. Double click on 'Shared folders'.
3. Click on 'Shares'.
4. Right click on the random spot on the right task pane.
5. Choose 'New' / File share / New File Share.
6. Click on Next.
7. Click on 'Browse' to select the folder you want to share.
8. Select the folder you want to share.
9. Then click on OK.
10. In 'Share name' box, type the share name.
11. Click on Next / Next / Finish.
How to access a shared drive or folder from a host computer
1. Go to 'Run' window.
2. a. For Visible:
Syntax: \\computer name\shared drive or folder name
e.g. \\com3\test [Here, 'test' is shared folder name].
b. For Hidden shared drive or folder:
Syntax: \\computer name\shared drive or folder name$
e.g. \\com3\test$ [Here, test is hidden shared folder].
\\com3\d$ [Here, d is hidden drive name].
Map Network Drive
Using the Map network drive, we can store files or folders in any computer centrally. This type of drive is called
the Network drive.
1. Have a folder in any computer and share it.
2. In this shared folder create folders with the name of users.
3. Create users in every computer with above folders' name.
4. Log on the computers with created users.
5. Right click on 'My computer'.
6. Click on 'Map Network Drive'.
7. Select the drive letter from 'Drive' box. Here default drive is appeared as 'Z:' drive
And type the location as:
Syntax: \\Server name\Shared folder name\Folder created for user
e.g. \\com3\map\ram
8. Go to any application.
9. Save it in the just created drive, i.e., created through Map network drive.
How to Disconnect Map Network Drive
1. Right click on 'My computer'.
2. Choose disconnect 'Map Network drive'
3. Select the drive you want to disconnect.
4. Click on OK.
User
User is a person who uses computer. There are two kinds of users.
1. Local User:- The user created locally in a computer while we are on peer to peer network or on a single
PC.
2. Domain User:- A user created on client server network is known as the domain user.
Password Never Expires
The default age of the password is 42 days. We can increase it maximum up to 999 days. The minimum age of
password is of 0(Zero) days. If we put checkmark on password never expires then it will cross the limit of the
maximum age i.e. 999 days or default 42 days and the user will not be prompt to change the password. But if
this check box is disabled he will start getting message "Your password will be expired in ... days. Do you want
to change your password" when you have 14 days remaining from the expiration days.
11
How to disable the Password Policies
1. Start / Program / Administrative tools / Local Security Policies.
2. Click on 'Account Policies'.
3. Click on 'Password policies'.
4. Double click on the Password length.
5. Specify the character '0' i.e. 'zero'.
6. Apply / OK.
7. Again right click on 'Password must meet complexity'
8. Click on 'Disable'.
9. Click on Apply / OK.
How to create Local User
1. Right click on My Computer.
2. Click on 'Manage'.
3. Double Click on 'User and Groups'
4. Right click on 'User'.
5. Choose 'New user'.
6. Fill up the form of new user and enable or disable the required option checkboxes like as 'User must
change password at first logon', 'Password never expires', 'Account is disable', 'User cannot change
password'
7. Click on 'Create' button.
8. Click on 'Close' button.
How to give Administrative right to a user
1. Log on by administrator.
2. Go to the Computer Management.
3. Right click on the user name to which you want give administrative right.
4. Click on Properties.
5. Click on 'Members' tab.
6. Click on 'Add' button.
7. Click on 'Advanced' button.
8. Click on 'Find now' button.
9. Click on 'Administrators'.
10. Click on OK / OK / Apply / OK
Local Security Policy
The local security policy is used to enable or disable the services for the local user.
Process to implement Local Security Policy
1. Start / Program / Administrative tools
2. Click on 'Local Security Policy'.
3. Click on the '+' sign of 'Local Policies'.
4. Go to 'Security Options' or the user right assignment.
5. Define the policies.
6. Click on enable or disable or define the user's assignment.
7. Once you log off system or Restart the system.
How to Remove the Local Security Policy
1. Go to 'Run' Window.
2. Type 'mmc' and click on OK.
3. From 'File' menu choose 'Add Remove Snap-in...'
4. Click on 'Add' button.
5. Choose 'Security Configuration and Analysis' from 'Available snap - in'
6. Click on 'Add' button.
7. Click on 'Close' button.
8. Click on OK.
9. Right click on 'Security Configuration and Analysis'.
10. Choose 'Open Database'.
11. In the 'File name' box type any file name and choose 'Open' button.
12. Select 'Setup Security'.
13. Click on 'Open'.
14. Right click on 'Security Configuration and Analysis'.
15. Choose 'Configure Computer Now'.
16. Click on OK.
17. Again right click on 'Security Configuration and Analysis'.
18. Click on 'Analyze Computer Now'.
19. Click on OK.
20. Now, close the 'Console1' dialog box.
21. A default file name 'Console1' will be appeared in file name box.
12
22. Click on 'Save' button / 'Save'.
23. Now once restart the system.
NTFS Security Option
Using the NTFS file system, we can implement the file, folder security and the Quota management. But if don'[t
have the NTFS file system then we cannot implement the security and the quota management.
How to convert Fat/Fat 32 to NTFS
Syntax: convert <drive letter:> /fs:ntfs
e.g. c:\convert d: /fs:ntfs
Note: If your disk do have any volume label, the system will prompt you to specify the volume label else it
will convert without any information.
File Folder Security
1. Right click on the drive or the folder for which you want to implement the file folder security.
2. Click on 'Security' tab.
3. Click on 'Advanced' tab.
4. Disable check mark from 'Inherit from parent the permission …………….' check box.
5. Click on 'Remove' button.
6. Click on 'Apply' / OK.
7. Click on 'Add' button.
8. Click on 'Advanced'.
9. Click on 'Find Now'.
10. Select the users (Hold on 'Ctrl' key and click on users' name)
11. Click on OK / OK.
12. Click on the User name and the list of permission.
13. Define the required permission from the list by enabling or disabling the check boxes.
14. Click on Apply / OK.
How to take Owership
1. Right click on the drive or the folder for which you want to take ownership. (The ownership can be
taken only by the administrators.)
2. Click on 'Properties'.
3. Click on 'Advanced' button.
4. Click on 'Owner' tab.
5. Click on 'Administrator' or 'Administrators'.
6. Enable the check box 'Replace owner on sub containers and object check box'.
7. Click on Apply / OK.
8. Put check mark on 'Replace permissions entries on all child objects with entries ………..'
9. Click on Apply / Yes / OK / Apply / OK.
Quota Management
1. Right click on the drive from where you want to distribute the size.
2. Click on 'Properties'.
3. Click on "Quota".
4. Enable the 'Quota Management' checkbox and 'Deny disk space to users exceeding Qota limit'
checkbox.
5. Click on "limit disk space to" radio button.
6. Specify the disk space and the warning label.
7. If you want to define the different spaces to the different users then click on 'Quota Entries' button.
8. From 'Quota' menu, choose 'New Quota Entry'.
9. Click on 'Advanced'.
10. Click on 'Find Now'.
11. Select the users.
12. Click on OK / OK.
13. Click on 'Limit disk space to'.
14. Specify the disk space and the warning label.
15. Click on OK.
16. From 'Quota' Choose 'Exit'.
17. Click on 'Apply' / OK.
Internet Connection
a) Dialup Connection:
Requirements: phone line, Modem
DSL:-Digital Subscriber Line
1. Make the proper connection, phone line and modem
2. Go to properties of My Network Places
3. Choose create a new connection from task pane
4. Click on Next
13
5. Choose Connect to the Internet
6. Click on Next
7. Select Setup 'My computer manually'.
8. Click on Next
9. Choose "Connect using a dial-up modem"
10. Click on Next
11. Type the name of ISP (Internet Service Provider)
12. Click on Next
13. Type the hunting number of ISP
14. Click on Next
15. Type the user name and Password.
16. Click on Next
17. If you want to place the shortcut on the desktop then put check mark on check box "Add the shortcut to
this connection to my desktop"
18. Click on Finish.
.com=Commercial Organizations
.edu=Educational Institution
.gov=Governmental Organizations
.int=International Organizations
.net=Large network providers like ISP
.org=Non-profit Organizations
.aero=air-transport industry
.asia=Asia-pacific region
.biz=business
14
.coop=cooperatives
.info=information
.jobs=jobs companies
.mil=military
.mobi=mobile devices
.museum=museums
.name=individuals
.pro=professions
.tel=internet communications
.travel=travel and tourism industry related sites
PDC:- The first time installed active directory is called the primary domain controller. It is the main domain
controller on the network. There is only one PDC on a network.
e.g.:- kalash.net.np
ADC:- It is the helping domain for PDC. It is used for balancing load of the network; No. of ADC depends on
the load of the network.
e.g.:- saleskalash.net.np
adminkalash.net.np
marketingkalash.net.np
BDC:- The server for the backup of data is called Backup Domain Controller. If any problem occurs in the
PDC or ADC then the information are gained/ recovered from the BDC. No. of BDC depends upon the load of
the network.
Terms used on Active directory and Domain controller
1. Database folder:- It is the folder which stores all the informations about the active directory.
2. log folder:- It contains log related files.(log on and log off of domain users.)
3. SYSVOL folder (system shared volume):-It is used to stores the domain's informations that will be
replicated (transfer)to all of the other domain controllers in the domain.
15
14. Choose "Install and Configure the DNS server on this computer and set this computer to use this DNS
server as it preferred DNS server" radio button.
15. Click on Next.
16. Choose "Permissions compatible with only windows 2000 or 2003 server Operating syatem.
17. Click on Next.
18. Type the password and confirm password.
19. Next / Next.
20. If the system asks for the backup of "I386" then define the location for it.
21. At last click on Finish and Restart your computer.
How to remove Active Directory
1. Go to 'Run' window.
2. Type the command 'dcpromo'.
3. Click on OK.
4. Click on Next / OK.
5. Put check mark on "This server is the last domain controller in the domain" checkbox.
6. Click on Next / Next.
7. Put check mark on "Delete all application directory partitions on this domain controller.
8. Click on Next.
9. Type the password.
10. Click on Next / Next / Finish.
11. If the system asks to restart the system then restart it.
Domain Registration
It is a process of connecting the client computers with the domain controller. When we register the client
computer with the domain controller then the client computers are called domain member. After registration, we
can login the client computer in two ways: one is local and another is domain member when we login as a
domain member, we can use only the services that are provided by the domain controller.
Process of Domain Registration
1. First of all ping the domain controller.
2. Go to the properties of TCP/IP and in the Preferred DNS server, type the IP of domain controller.
3. Go to the properties of 'My computer'.
4. Click on computer name tab / Change button.
5. Click on Domain radio button and in the domain box, type the name of domain.
E.g. apple
6. Click on OK.
7. If the computer asks for the user name and password then type the name of administrator and password
of the domain controller (server controller)
8. Click on OK / OK / OK / YES
9. Restart the system.
How to Disjoin /Disconnect from Domain
1. Go to the properties of TCP/IP and remove the IP from the Preferred DNS Server.
2. Go to the properties of 'My computer'.
3. Click on 'Computer Name' tab.
4. Click on 'Workgroup' radio button.
5. Click on OK.
6. Type the name of administrator and password.
7. Click on OK and restart the system.
How to create Domain User
1. Start / Program / Administrative tools / active directory Users and Computers.
Or
In run window type 'dsa.msc'
2. Click on '+' sign of domain name i.e. 'apple.org'
3. Right click on users.
4. Click on New / User.
5. Type the User's first name, last name, and the user logon name.
6. Click on Next/
7. Type the password for the user.
8. Click on Next.
9. Click on Finish.
How to define the computer to any user:
1. Start / Program / Administrative tools / Active directory users and computers (ADUC).
Or
In run window type 'dsa.msc' / OK
2. Right click on the user's name.
3. Choose properties.
16
4. Click on 'Account' tab.
5. Click on "Log on to" button.
6. Click on "All computers" if you want to allow the user all the computers on the network and if you
want to allow any certain computer then click on the following computers" radio button and in the
computer name box, type the computer name.
7. Click on Add button.
8. Click on Apply / OK.
How to define Logon hours
1. Go to ADUC.
2. Right click on the user name.
3. Click on 'properties'.
4. Click on 'Log on Hours'
5. Select the time and days on which you want to permit or deny the user.
6. Click on 'Logon permitted' to permit the user and choose 'logon denied' to block the permission.
7. OK / Apply / OK.
File Server
By defining a file server a user can save their files and folders centrally in a computer which is defined as file
server. To create a file server we need two folders: One is known as home folder where the documents of the
user are stored. And another is profile folder where the information of the user's desktop, cookies etc. are stored.
Process
1. In any computer make two folders named 'home' and 'profile' and then share both of them with full
permission.
2. Go to ADUC.
3. Right click on the user's name.
4. Click on 'Properties'
5. Click on 'Profile'
6. In user profile, click on profile path box and type:
Syntax: \\computer name\profile folder name\%username%
e.g. \\com4\profile\%username%
7. Click on 'Connect' radio button. A default drive letter 'Z:' will automatically appear. If you wish you
can change it also.
8. Click on "To" box type:
Syntax: \\computer name\home folder name\%username%
e.g. \\com4\home\%username%
9. Click on Apply / OK
10. Once you log off the system and then log on it.
DHCP (Dynamic Host Configuration Protocol)
The DHCP server is defined to overcome the problem of confliction of IP Address within the host on the
network. Here, we define IP range that is to be defined to client computers.
1. Start / Program / Administrative tools / Configure Your Server Wizard
2. Next / Next
3. From the 'server role box' choose DHCP server.
4. Click on Next.
5. If the system asks for the backup of 'i386' then define the location for it.
6. Click on Cancel / Finish.
Process to configure DHCP
1. Start / program / Administrative tools / DHCP
2. Right click on the FQDN (Fully Qualified Domain Name).
3. Choose "New Scope..."
4. Click on Next.
5. Type the name of the scope
E.g. testing
6. Click on Next.
7. Define the Starting and the Ending IP range
8. Click on Next.
9. In "Add exclusion", define the range of start and end IP.
10. Click on Add button.
11. Click on Next.
12. In lease duration the default age appears of 8 days. We can increase it maximum up to 999 days.
13. Click on Next.
14. Choose 'Yes I want to configure these options now'.
15. Click on Next.
16. If you are using the Router then define the IP for it else click on Next.
17. In "Parent Domain" box type the main domain name i.e. "apple.org"
17
18. In server name box, type the computer name.
e.g. com4
19. Click on "Resolve" button. By clicking on the Resolve button, the IP of the server computer will
automatically appear in IP address box.
20. Click on Add button.
21. Click on Next.
22. In 'server name' box type the name of computer and then click on 'Resolve' button.
23. Click on Add button.
24. Click on Next.
25. Click on "yes I want to activate this scope now" radio button.
26. Click on Next / Finish.
27. Right click on FQDN
28. Click on 'Authorize'
29. Now go to the client computers who are members of domain.
30. Log on as Domain Administrator.
31. Go to the properties of TCP/IP.
32. Choose "Obtain an IP address automatically" and choose "Obtain DNS server address automatically"
33. OK / Close
34. Now go to command prompt and type the command
(a) ipconfig/release and press "Enter" key.
(b) ipconfig/renew and press "Enter" key.
Group Policy
How to create Domain User
1. Start / Program / Administrative tools / active directory Users and Computers.
Or
In run window type 'dsa.msc'
2. Click on '+' sign of domain name i.e. 'apple.org'
3. Right click on users.
4. Click on New / User.
5. Type the User's first name, last name, and the user logon name.
6. Click on Next/
7. Type the password for the user.
8. Click on Next.
9. Click on Finish.
18
How to create Group
1. Right click on the container in which you have to create group.
2. Point to New / Click on Group.
3. In 'Group name' box, type the group name.
4. From group type select 'Security' or 'Distribution'.
How to add users to any Group:
1. Right click on the group name in which you want to add the users as its members.
2. Click on 'Properties'.
3. Click on 'Members' tab.
4. Click on 'Add' button.
5. Click on 'Advanced' / 'Find Now'
6. Select users from the list.
7. Click on OK / OK
8. Click on Apply / OK.
19
How to Connect the Domain controller from the Client computers
1. Start / Program / Accessories/ Communication / Remote desktop connection.
2. In computer name box type the name of server computer
3. Click on 'Connect'
4. Type the name of administrator and password.
5. Click on OK.
If the Remote desktop connection is not available in client computer then how to
install it:
1. o to 'Run' window and type:
Syntax:
\\computer name of server computer\Home drive letter followed with $ sign.
e.g. \\com4\g$
2. Click on OK.
3. Open 'Windows' folder.
4. Open 'system 32' folder.
5. Open 'clients' folder.
6. Open 'tsclient' folder.
7. Open 'win32' folder.
8. Double click on Setup icon.
9. Click on Next.
10. Choose "I accept the terms in the license agreement"
11. Click on Next.
12. Type the name of the administrator.
13. Specify whether you want to allow this application for all the users or only for the administrator and
then click on Next.
14. Click on install /Finish.
How to configure the terminal server connection in more than one computers:
1. Start / Program / Administrative tools/ Terminal Server Configuration.
2. Double click on "Server Settings"
3. Double click on "Restrict each user to one session".
4. Disable the checkbox "Restrict each user to one session".
5. Click on OK.
DNS Server
The DNS server is used to configure the local domain.
It resolves/ translates website's name to IP address and IP address to website's name.
e.g. www.everest.com.np=200.0.0.1
200.0.0.1=www.everest.com.np
Process to Install (Domain Name System)
1. Start / Program / Administrative tools / Configure Your Server Wizard.
2. Choose DNS from the 'Server role' box.
3. Click on Next / Next.
4. Click on Cancel / Finish.
How to Configure the DNS
1. Start / Program / Administrative tools / DNS.
2. Click on the '+' sign of server name.
3. Right click on 'Reverse look up zones'.
4. Choose 'New zone'
5. Click on Next.
6. Choose 'Primary zone'
7. Click on Next.
8. Choose "To all DNS servers in the Active Directory domain ...."
9. Click on Next.
10. In Network ID type the Net ID of your server computer.
e.g. 192.168.0
20
11. Click on Next
12. Choose "Allow only secure dynamic updates"
13. Click on Next / Finish.
14. Right click on "Forward lookup zones".
15. Choose 'new zone'.
16. Click on Next
17. Choose 'Primary zone'
18. Next
19. Choose 'To all DNS server in the active directory domain..."
20. Click on Next.
21. Type the zone name in 'Zone name' box.
e.g. modelnepal.com
22. Click on Next.
23. Choose "Allow only secure Dynamic updates".
24. Click on Next / Finish.
25. Define the IP for the 'New zone'.
a) Go to the properties of TCP/IP.
b) Click on 'Advanced' button.
c) Click on 'Add' on 'IP Address' option and type the IP address and subnet mask for it.
d) Click on Add.
e) Click on Close.
26. Right click on the recently created zone name i.e. modelnepal.com
27. Choose 'New Host (A)'
28. In "Name (Use parent domain name if blank)" box type "www".
29. Type the IP recently you have created for that domain e.g. 192.168.0.200
30. Put check mark on "Create associated Pointer ...." and "Allow any authenticated user...." checkbox.
31. Click on 'Add Host' button / OK
32. Click on Done.
33. Now in the client computers
a) Go to the command prompt.
b) Ping "192.168.0.200"
c) ping "www.modelnepal.com"
IIS (Internet Information Service)
The IIS also uses the same IP defined for the DNS. The contents for the Web site are loaded on IIS.
Process to Install IIS
1. Start / Program / Administrative tools / Configure your server wizard.
2. From the 'Server Role Box' choose "Application Server (IIS, ASP.Net)
3. Click on Next.
4. Put check mark on "Front Page server extensions" and "Enable Asp.Net" check boxes.
5. Click on Next /Next.
6. If the system asks for the backup for the 'I386' then define the location for it.
7. Click on Finish.
Process to Configure IIS
1. Start / Program/ Administrative tools
2. Click on 'Internet Service Manager' or 'Internet Information Service (IIS) Manager.
3. Right click on Website container.
4. Go to New and choose 'websites'.
5. Click on Next.
6. In "Description" box type the name of the website that describes the website to help for identifying the
site.
7. Click on Next.
8. Choose the IP address that you have defined for the DNS.
9. Click on Next.
10. Now define the location for the web site.
11. Click on Next.
21
12. Define the access permissions by putting check marks in the boxes.
Note: Don't enable the check box "Write".
13. Click on Next
14. Click on Finish.
15. Right click on the description name of the site recently you have created.
16. Click on Properties.
17. Click on Documents tab.
18. Remove the default tab.
19. Click on Add button.
20. Type "Index.htm"
21. Click on OK.
22. Again click on Add button.
23. Type "Index.php"
24. Click on OK.
25. Click on Apply button
26. Click on OK.
27. Now in the client computers load/run internet explorer and type "www.modelnepal.com"
28. Click on 'Go'.
Mail Server
Using the Mail server it starts 2 kinds of services:
(i) PoP3
(ii) SMTP
The PoP3 is responsible to send the mail and the SMTP is responsible to receive the mail.
Process to Install Mail Server (PoP3/SMTP)
1. Start / Program / Administrative tools / Configure your server wizard.
2. From the list of "Server role" choose 'Mail server (PoP3/SMTP)'
3. Click on Next / Next.
4. In the email domain name box, type the domain name
e.g. fortune.org
5. Click on Next / Next.
6. If the system asks for the backup of 'I386' then define the location for it.
7. At last click on Finish.
Process to Configure PoP3
1. Start / Program / Administrative tools / PoP3 server.
2. Click on the '+' sign of server name i.e. 'com4'
3. Click on 'Domain Name'
4. Click on 'Add mail box and type the mail box name (user name)
Note: If the mail box name and the user name are same and it is available in ADUC then disable the
'create associated user for this mail box' checkbox and if you want to create the user name according to
the mail box name then enable this check box.
5. Type the password and the confirm password.
6. Click on OK.
7. Now go to ADUC and create an OU.
8. Create a group inside that OU. The group type must be 'distribution'
9. Add the users in recently created group.
a) Select the Users.
b) Right click on it.
c) Choose 'Add to group'
d) Click on 'Advanced'
e) Click on 'Find now'
f) Select the group name
g) Click on OK / OK.
10. Now go to the client computers and load 'Outlook Express'
a) Start / Program / Outlook express.
Or
22
In run window type 'msimn' and / OK.
11. Open tools menu.
12. Choose "Accounts..."
13. Click on 'Add' button.
14. Click on 'Mail...'
15. In the 'Display Name' box type the user name and click on Next.
16. In the 'Email Address' box, type the:
Syntax:
<username>@<domain name>
e.g. ram@fortune.org
17. Click on Next.
18. In "Incoming mail" and the 'Outgoing mail server' box, define the IP of the mail server computer.
e.g. 192.168.0.4
19. Click on Next.
20. At the end of appeared account name, add:
Syntax: "@<domain name>"
e.g. ram@fortune.org
21. In password box type the password.
22. Click on Next / Finish.
23. Click on Close.
To Create Mail
1. Click on 'Create mail' button.
2. Type the mail ID to who you want to send message.
3. Type the subject.
4. Type the message.
5. Click on Send button.
To receive the Mail
Click on 'Send/Recv' button.
In the Mail server computer the location of the mail box is : Homedrive
e.g. "e:\inetpub\mailroot\mailbox\fortune.org"
Print Server
A computer which is defined for central printing and which can define the printer security and services for the
users is known as 'Printer Server'.
1. Start / Program / Administrative tools / Configure your Server Wizard /Next /Next.
2. From the list of "Server Role" choose "Print Server"
3. Click on Next / Next.
4. Choose "Windows 2000 and windows XP clients only" if you want this server only for the 2000 and
XP OSs and choose "All windows clients" for any OS in client systems.
5. Click on Next /Next /Next.
6. Choose "Local Printer Attached to this computer".
7. Click on Next / Next.
8. Select the manufacturer and the printer from list.
9. Click on Next.
10. A box of printer name will appear. If you wish then, change the printer name and click on Next.
11. The 'Printer Sharing' button will appear
If you want to share the printer then click on share box and type the share name. The default share
name will also appear automatically.
And if you do not want to share then click on 'Do not share this printer'.
12. Click on Next.
13. If you want to print out a test page then click on 'Yes' else click on 'No'.
14. Click on Next / Finish.
15. Now in the client computers:
23
a) Go to 'Run' window
b) Type "\\computer name (server computer)
Or
\\Ip address of server computer
c) Right click on the shared printer.
d) Click on Connect
Printer Security
1. In the printer server computer, log on by administrator.
2. Right click on printer.
3. Click on 'Properties'
4. Click on 'Security' tab.
5. If you want to add any user to whom you want to give the permission click on 'Add' button.
6. Advanced / Find Now / Select the user /OK / OK.
7. From the list of permission put check mark on allow options.
8. Click on Apply / OK.
Defining Printer time
1. Go to the properties of printer.
2. Click on 'Advanced' tab.
3. Click on 'Available from' radio button and define the time.
4. Click on Apply / OK.
Backup (Disaster recovery)
Back up is a process to store data of the system in any drive we can take the backup of a file, folder or a
complete drive. We can also take the backup of all the data in a system. In case of windows server operating
system, to take the backup of domain controller where the active directory, DNS, DHCP, File server, Print
server, Mail server etc. are stored, we need to take the backup of 'System state'. Taking the backup of system
state, it stores all the backup of system state; it stores all the information of the domain controller.
Process
1. Start / Program / Accessories / System tools / Backup.
2. Click on Next.
3. Choose 'Backup files and settings' option
4. Click on Next.
5. Click on 'Let me choose what to backup'.
6. Click on Next.
7. Click on the '+' sign on My computer.
8. Put tick mark on 'System state'
9. Click on Next.
10. Click on 'Browse' button and define the location and file name where you want to store the backup
data.
11. Click on Next.
12. Do not click on 'Finish' button.
13. Click on 'Advanced' button.
14. From the 'Type of backup', for the first time, choose 'Normal' and for the next time, choose
'Incremental'.
15. Click on Next / Next.
16. Choose 'Append this backup to the existing backups' if you have selected 'Incremental' and for
'Normal', choose 'Replace the existing backups'.
17. Click on Next.
18. If you have to take the backup sharp now then choose "Now", and if you want to create any schedule
for the backup then choose 'Later' and click on 'Set schedule' button.
19. Click on Next.
20. Click on Finish.
24
How to Restore the Backup
1. Restart the system and start pressing 'F8' key. By pressing the 'F8' key, startup options will appear on the
screen. From that options choose "Directory services restore mode (Windows domain controllers only)"
2. Press 'Enter' key.
3. Open the folder containing the backup file that you want to restore.
4. Right click on the backup file and choose 'Open'.
5. Choose 'Restore file and settings' radio button.
6. Click on Next.
7. Click on the '+' sign of file and file name.
8. Click on the checkbox of the 'system state'.
9. Click on Next.
10. Click on 'Advanced' button.
11. Choose 'Original location'.
12. Click on Next.
13. Click on OK.
14. Choose 'Leave the existing files (Recommended)'.
15. Click on Next / Next / Finish / Close.
16. Restart the system.
25