Professional Documents
Culture Documents
Chapter Six: System and Network Admin Issues
Chapter Six: System and Network Admin Issues
4
Windows 2008 Standard Edition
Up to 4 physical processors allowed
Available in 32-bit or 64-bit versions
Up to 8 physical processors
32-bit version supports 64 GB RAM; 64-bit version supports 2 TB
Can be clustered; up to 16 cluster nodes permitted
Windows Server 2008 Datacenter Edition
All the features of Enterprise Edition
Up to 32 physical processors in 32-bit version, 64 processors in 64-bit
Extra fault tolerance features: hot-add and hot-replace memory or CPU
Can’t be purchased as individual license, only through volume license
Unlimited number of virtual instances
Windows Web Server 2008
Designed to run Internet Information Services (IIS)
Hardware support similar to Standard Edition
Lacks many of the features present in other editions
Typically used when roles such as Active Directory or Terminal Services
are not required 6
Directory Services
A directory service is a database that contains information about all objects on
the network.
Directory services contain data and metadata.
Metadata is information about data.
For example: A user account is data. Metadata specifies what information is
included in every user account object.
Information within directories is organized hierarchically. This means that
there is a strict set of rules as to where certain data is located within the
directory based on the properties of that data.
What objects are tracked via Directory Services?
Along with DNS, provides domain-naming services and management for a Windows domain.
Enables administrators to assign system policies, deploy software to client computers, and
assign permissions and rights to users of network resources
Active Directory, in addition to providing a place to store data and services to make that data
available, active directory
protects network objects from unauthorized access
replicates information about objects across the entire network
so that information about objects is not lost if one domain controller fails.
10
FTP server
It is a protocol used to transfer files between an FTP host/server and an FTP client
computer on the Internet.
FTP is oldest and the most commonly used to download files from the World Wide Web.
It is an alternative choice to HTTP protocol for downloading and uploading files to FTP
servers.
Common features of FTP server:
Uploading webpages to web servers for publishing on the Internet
Browsing and downloading files from public software sites
Transferring large files among two parties that are too large for email attachments
Downloading and uploading content like university’s assignments via an FTP server
• Mail delivery from a client application to the server, and from an originating server
to the destination server, is handled by the Simple Mail Transfer Protocol (SMTP).
• The primary purpose of SMTP is to transfer email between mail servers.
• One important point to make about the SMTP protocol is that it does not require
authentication. This allows anyone on the Internet to send email to anyone else or
even to large groups of people.
Mail Access Protocols
There are two primary protocols used by email client applications to retrieve email from mail servers:
Post Office Protocol (POP) and 2. IMAP
When using an IMAP mail server, email messages
Internet Message Access Protocol (IMAP).
1. POP remain on the server where users can read or delete
When using a POP server, email messages are them. It also allows client applications to create,
downloaded by email client applications. rename, or delete mail directories on the server to
organize and storage of email.
By default, most POP email clients are
IMAP is particularly useful for those organization who
automatically configured to delete the message on
the email server after it has been successfully access their email using multiple machines.
The protocol is also convenient for users connecting to
transferred. the mail server via a slow connection, because only the
For added security, it is possible to use Secure email header information is downloaded for messages
until opened.
Socket Layer (SSL) encryption for client The user also has the ability to delete messages without
authentication and data transfer sessions. viewing or downloading them.
Email Program Classifications
In email application there are three classifications 1. MTA 2. MDA 3. MUA
Each classification plays a specific role in the process of moving and managing email messages. While most
users are only aware of the specific email program they use to receive and send messages, each one is important
It is the way of accessing, controlling or managing computer device remotely through the help of
network.
It refers to any method of controlling a computer from a remote location.
Software that allows remote administration is becoming increasingly common and is often used
when it is difficult or impossible to be physically near a system in order to use it.
Technical support professionals also use remote access to connect to users' computers from
remote locations to help them for resolve issues with their systems or software.
A computer must have software that enables it to connect and communicate with a system or
resource hosted by the organization's remote access service.
Once the user's computer is connected to the remote host, it can display a window with the target
computer's desktop.
16
Remote access protocols
Common remote access protocols include the following:
❖ Point-to-Point Protocol (PPP): enables hosts to set up a direct connection between two endpoints.
❖ Internet Protocol Security (IPsec ): security protocols used to enable authentication and encryption
services to secure the transfer of IP packets over the internet.
❖ Point-to-Point Tunneling (PPTP) : one of the oldest protocols for implementing virtual private
networks, but PPTP is not very secure.
❖ Terminal Access Controller Access Control System (TACACS): remote authentication protocol
which is common to Unix networks that enables a remote access server to forward a user's password
to an authentication server to determine whether access to a given system should be allowed or not.
❖ Remote Authentication Dial-In User Service (RADIUS) : a protocol developed in 1991 and published as
an Internet Standard track specification in 2000. it is designed to enable remote access servers to
communicate with a central server to authenticate dial-in users and authorize their access to the requested
system or service. 17
DNS server
A DNS server is a computer server that contains a database of public IP addresses and their associated
hostnames, In most cases serves to resolve, or translate, those names to IP addresses as requested.
DNS servers run special software and communicate with each other using special protocols. In most cases, a primary and
a secondary DNS server are configured on the router or computer when you connect to the internet service provider.
There are two DNS servers in case one of them happens to fail, in which case the second is used to resolve hostnames
requested.
Domain Name System (DNS) is a most important of Internet services which converts host names into IP addresses
and vice versa. If a host name includes its complete domain name, it is said to be a Fully Qualified Host Name (FQHN).
The DNS client is called the ‘resolver’, and the DNS server is called the ‘name server’.
Why DNS ?
It is easier to remember a host name than it is to remember an IP address.
Name has more meaning to a user than a 4 byte number.
Applications such as FTP, HTTP, email, etc., all require the user to input a destination.
The application takes the host name supplied by the user and forwards it to DNS for translation to an IP address.
18
How does DNS work?
DNS works by exchanging messages between client and server machines.
A client application will pass the destination host name to the DNS process to get the IP address.
The application then sits and waits for the response to return.
Most of the time DNS were used as distribution rather than the centralized format
Flexibility and scalability. the DHCP server makes available to the client are
defined by the DHCP administrator.
DHCP lease - This defines the duration for which a DHCP
DHCP Messages
server assigns an IP address to a DHCP client.
All DHCP messages are carried in User Datagram
The lease duration can be any amount of time between
Protocol (UDP) using the well-known port 1 minute and 999 days, or it can be unlimited.
numbers 67 (from the server) and 68 (to the client). The default lease duration is eight days.
UDP operates at the Transport Layer of the
OSI model.
Automatic Private IP Addressing (APIPA)
If the DHCP client is unable to locate a DHCP server and is not configured with an alternate
configuration, the computer configures itself with a 169.254.0.0/255.255.0.0 IP address.
The auto-configured computer then tests to verify that the IP address it has chosen is not already in
use by using a gratuitous ARP broadcast.
If the chosen IP address is in use, the computer randomly selects another address. The computer
makes up to 10 attempts to find an available IP address.
DHCP Scoping
Determines which IP addresses are allocated to clients.
Defines a set of IP addresses and associated configuration information that can be supplied to a client.
A scope must be defined before DHCP clients can use the server for dynamic TCP/IP configuration.
Administrator can configures many scopes on a DHCP server as needed for the network environment.
The IP addresses defined in a DHCP scope must be contiguous and are associated with a subnet mask.
DHCP Options
DHCP options are additional client-configuration parameters that a DHCP server can assign when
serving leases to DHCP clients.
DHCP options are configured using the DHCP console and can apply to scopes.
There are four types of DHCP options in Windows Server 2008:
1. Server options: apply to all clients of the DHCP server. Admin can uses these options for parameters as
common across all scopes on the DHCP server.
2. Scope options: apply to all clients within a scope and are the most used set of options. Scope options override
server options.
3. Class options: provide DHCP parameters to DHCP clients based on type either vendor classes or user classes.
4. Client options apply to individual clients. Client options override all other options (server, scope, and class).
Proxy Server
Samba is an open source implementation of the Server Message Block (SMB) protocol.
It allows the networking of Microsoft Windows, Linux, UNIX, and other operating systems together.
This means you can use a Linux server to provide file sharing, printing, and other services to other
non-native Linux clients such as Microsoft Windows.
Samba's use of SMB protocol that allows it to appear as a Windows server to Windows clients.