Networking
Networking
Definition
It is the collection of Hardware & Software which enables two or more
computers to communicate & to share the resources.
According to our computer environment, resources are divided into two
categories.
Shared Resources
Hardware Resources Software Resources
E.g.: cd rom e.g.: Application software or
Hard disk etc any Application
Advantages of Networking
Shared resources
Low cost
Communication
Security
Types of Networks
LAN
WAN
MAN
INTERNET
LOCAL AREA NETWORK
By using two or more computers to configure a network in a limited
geographical area is called as local area network.
WIDE AREA NETWORK
By using two or more computers to configure a network in unlimited
geographical area is called wide area network.
INTERNET
Networks in a network is called internet.
TOPOLOGY
The way of configuring the network is called topology.
LAN Topologies
BUS Topology
RING Topology
MESH Topology
STAR Topology
Bus Topology
In this topology, the systems are connected in serial fashion. In this topology,
data is passed on via systems.
© Dilerahamed
In this topology, the ending point of the system is connected to the starting
point of the next system and the starting point of the first system and ending
point of last system is terminated with 50Ω resistor.
Advantages
Low cost
Easy to design
Disadvantages
Difficult to trouble shoot
More traffic generates low band width
Single point of failure can collapse entire network
Ring Topology
In this topology, the systems are connected in serial fashion and the last system
ending point is connected to the starting point of the first system.
Advantages
Redundancy (double layering of cable)
Easy to troubleshoot (acknowledgement process)
Alternative route
Disadvantages
More expensive
Difficult to design
More traffic generates low bandwidth
Mesh Topology
© Dilerahamed
The minimum requirements to configure a LAN
Software
Drivers
It is a piece of software which acts as a mediator between Operating system
and our hardware.
Service
It is used for Microsoft file and print sharing purpose.
Client
It is used for Client to the particular Server.
Protocol
Protocol is the set of rules and regulations which controls the data
transmission among the systems over a network.
Types of Protocols
NETBEUI Protocol
IPX/SPX Protocol
APPLE Protocol
TCP/IP Protocol
NETBEUI Protocol
It stands for Network Basic Emulated User Interface.
It is designed by Microsoft.
It is available in all Microsoft operating systems.
By using this protocol we can communicate Microsoft operating systems
machines only.
It is a plug and play protocol, so no configuration of this protocol is required.
It is faster than when compared to any other protocol.
It occupies less space.
It is suggested for only homogeneous networks.
IPX/SPX Protocol
It is designed by Novell organization.
It stands for Internet Packet Exchange /Switched or Service Packet Exchange.
It is available in Novell operating systems & Microsoft operating systems.
© Dilerahamed
By using this protocol, we can communicate Novell to Novell & Novell to
Microsoft operating systems.
A little bit administration over head.
Some extend to heterogeneous but it is not full fledged heterogeneous typed
protocol.
APPLE Protocol
It is designed by Apple Organization.
It is available in Macintosh operating systems.
By using this operating system we can communicate Macintosh to Macintosh.
TCP/IP Protocol
It stands for Transmission Control Protocol/Internet Protocol.
It is designed by International Standard Organization (ISO).
All operating systems support this protocol, so it is the Universal protocol.
By using this protocol, we can communicate any operating system machine to
any operating system machine.
TCP/IP protocol becomes very much popular because it has the Routing
Algorithm.
ROUTING
The process of selecting best possible route to reach the destination is called
Routing.
Disadvantages
It is slower when compared with any other protocol.
It occupies more space in our hard disk.
Knowledge TCP/IP addressing is required.
SYSTEM ADDRESS
© Dilerahamed
Logical address
IP Address (32 bit)
Rules
IP address cannot start with zero & 255 and cannot end with zero and 255
IP addresses can always starts with Network Identification and ends with Host
Identification.
127 is the loop back adapter address used for self checking purpose.
E.g. 127.0.0.1
Subnet Mask:
It represents that how many octets (no. of bits) reserved for network
identification and host identification.
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
© Dilerahamed
If we want to assign a IP address to the particular system,
Syntax
My Network places→ Right click properties→
Local area connection→ Right click properties→
Select TCP/IP Protocol→ properties→
Use select the IP address→ assign the IP address and Subnet mask→ then
click OK.
If we want to see the IP address in CUI (character user interface),
Syntax:
Start→ Run→ Type cmd→ Type ipconfig
If we want to see the IP address with physical address,
Syntax:
Start→ Run→ Type cmd→ Type ipconfig/all
If we want to check the communication between two systems,
Syntax:
Start→ Run→ Type cmd→
Type ping < Destination address >
Eg: ping 100.10.10.3
Note: If reply comes with data packets list (TTL list) then, we decide to
perfect communication between two systems.
Note: If reply comes with “request timed out” then we decide to troubleshoot
in physical connections between two systems.
Note: If reply comes with “Destination host unreachable” then we decide to
troubleshoot in IP addressing.
DATA TRANSMISSION
OPERATING SYSTEM
Definition
Operating system is the interface between user and system (computer).
According to the user interface, Operating systems can be divided into
two types.
© Dilerahamed
1. GUI (Graphical User Interface)
2. CUI (character User Interface)
According to Microsoft Operating systems, Operating systems can be divided
into two types.
1. Desktop Operating systems
Eg: Windows 95, Windows 98, Windows ME, Windows XP
2. Network Operating systems
Eg: Windows NT 4.0, Windows 2000 Server Edition, Windows 2000
Professional Edition, Windows 2003 Server professional Edition,
Windows 2003 (Enterprise, Standard, Web) Editions.
Syntax:
→ Press any key to Boot from CD
→ Select O.S. we want to install
→ Hard disk can be partitioned at the time of O.S. Installation
→ To partition press C
→ to install in partition press Enter
→ Installation takes place on its own
→ Keep on pressing Next
→ Enter Person name and Company name
→ Enter CD key
→ Enter Number of Conferment Connections (Clients)
→ Enter NET BIOS name (Computer Name)
→ Type Administrator Password (Local)
→ Date and Time Settings (GMT + 5:30)
→ Select Typical Settings
→ Select Work Group (we can also make client to a Domain)
© Dilerahamed
→ Remove 2003 O.S. CD from CDROM
→ Finish
Operating System takes place in 5 steps.
1. Collecting Information
2. Dynamic Update
3. Preparing Installation
4. Installing Windows
5. Finalizing Installation
© Dilerahamed
Hidden Share:
Run with $:
If we create a file and share it and if the “Share Name” is with ‘$’ e.g. hidden$,
then the folder will not be visible for access in the Network.
If we want to access such folders,
Syntax:
Start→ Run→ Type “\\system name\folder name$
e.g. \\mcse2\hidden$
Shortcut for viewing Shared Resources of a particular System:
Syntax:
Start→ Run→ “\\Destination System IP address or System Name “
Eg: \\100.10.10.2 or \\mcse2 (where mcse2 is the System Name).
If we want to create a Local User Account.
Syntax:
Start→ Programs→ Administrative tools→ Computer
Management→ Local Users→ Right click New user→
Enter user Name and Logon Name→ Enter the Password→
Apply→ Ok.
CLIENT SERVER
© Dilerahamed
Eg: twintowers.com
If we want to configure a client machine to the Domain controller, first we
must enter the Domain IP address in preferred DNS server of client machine.
Syntax:
My Network places→ properties→ LAN properties→ TCP/IP properties→
Select “preferred DNS server”→ Enter the Domain IP address.
Domain Controller Promotion:
The system which we want to make a Domain controller, that system should
be having Windows 2000/2003 Server based Operating system.
Syntax:
Start→ Run→ Type “dcpromo” (Active Directory Service Installation)→
Next→ Select Domain controller for a new domain→ Select Domain in a New
forest→ Next→ Enter the Domain Name (eg: wrangler.com)→ verify Domain
Net BIOS name→ verify NTDS folder→ Next→ verify Sys Vol folder→
Next→ verify permission compatible with Windows 2000/2003 Operating
systems→ Next→ Enter the Restore mode (Recovery) password→ Next→
Select DNS middle option→ Ok.
Note: After creating Domain Controller, to check whether Domain is created
perfectly,
Syntax:
Start→ Programs→ Administrative Tools→ DNS→ Forward Lookup Zones→
Domain Controller→ 6 Folders should be there.
Policies
© Dilerahamed
3. Deny logon as a Service→ Not defined
4. Deny logon as locally→ Not defined
5. Deny logon through Terminal Services→ Not defined
CRIMPING OF CABLES
1. Orange 1. Orange
2. Orange white 2. Orange white
3. Green 3. Green
4. Green white 4. Green white
5. Blue 5. Blue
6. Blue white 6. Blue white
7. Brown 7. Brown
8. Brown white 8. Brown white
1. Orange 1. Green
2. Orange white 2. Blue white
3. Green 3. Orange
4. Green white 4. Green white
5. Blue 5. Blue
6. Blue white 6. Orange white
7. Brown 7. Brown
8. Brown white 8. Brown white
Logic: (1 ↔ 3, 2 ↔ 6.)
Roll over Cabling (Router Cabling) (one side reverse to other side)
© Dilerahamed
Domain User
To Disable an Account:
This is used to disable the user account.
Syntax:
Right click User→ Disable the particular User Account.
Reset Password:
This is used to change the password of a particular User Account.
Syntax:
Right click particular User→ Move.
Delete:
It is used to delete the User Account.
Syntax:
Right click particular User→ delete.
Restrict the User Account:
By default the user can logon to all computers. If we want to restrict the user,
to logon to particular computer we can use this option.
© Dilerahamed
Syntax:
Start→ Programs→ Administrative Tools→ Active Directory Computers and
Users→ Select Domain→ Select Users→ Right Click Particular User→
Properties→ Select Account Tab→ Logon to→ select the Computer to logon
to.
Logon to (Time to Time):
User can logon from the selected time to time.
USER PROFILES
Profiles:
To maintain our own individual desktop settings at the time of user login,
Profiles are used.
By using profiles, we can maintain desktop settings i.e. wallpapers,
screensavers, desktop icons, Start menu options, Internet Explorer Favorites
and cookies, Windows Dictionary etc; at the time of User login.
Profile types:
1. Local Profile
2. Roaming profile
3. Mandatory Profile
Local Profile
Local Profile is created at the time of first time User logon on the Domain
Controller.
Roaming profile
After Roaming process, we can maintain our own individual desktop settings
at the time of logon in any Client machine over a Network.
Roaming process
As an Administrator on Domain Controller, after creating the Local Profile,
Share the “Documents and Settings” folder
Syntax:
Go to Boot Partition→ Documents and Settings→ Right click→ Sharing and
Security→ Share with proper permissions to the specified User or
Everyone.
Syntax:
Go to programs→ Administrative Tools→ Active Directory Users and
Computers→ Select Users→ Select particular User→ Right click→
Properties→ Profile tab→ Profile option→ Enter the UNC path (Universal
Naming Context or Conventional path) Profile path→ “ \\System
name\Shared folder name\User name “.
Eg: \\mcse2\ds\ahamed
© Dilerahamed
Note: After Roaming process, we must first logon with that particular User
Account on the Domain Controller.
If we want to see the User Profile status,
Syntax:
My Computer→ Right click→ Properties→ Advanced→ User Profiles→
Settings.
Mandatory Profile
After Roaming Process, as an Administrator we can fix the Desktop Settings to
the particular User Account.
Note: After creating Mandatory Profile, User cannot change the Desktop
Settings.
As an Administrator on Domain Controller,
Syntax:
Go to Boot Partition→ Documents and Settings→ Select User folder→ Open→
Rename the “ntuser.dat” as “ntuser.man “.
Logon Script
Logon Scripts are used to execute the predefined executable files such as
“calc.exe”, at the time of User Logon.
As an Administrator on Domain Controller,
Syntax:
1. Search the executable file path
Eg: Boot Partition\Windows\system32\calc.exe
2. Run notepad→ Enter executable file path
Eg: \\mcse2 (System Name)\Windows\system32\calc.exe
3. Save the file with “ .bat “ extension and save in Boot
Partition\windows\SysVol\SysVol\Domain controller\Scripts\File Name
Eg: c:\windows\SysVol\ SysVol\microsoft.com\scripts\calc.bat
4. Share the “Windows” folder to everyone or a particular User with proper
permissions.
5. Go to programs→ Administrative Tools→ Active Directory Users and
Computers→ Select Users→ Select particular User→ Right click→
Properties→ Profile tab→ Logon Script option→ Enter the Batch file name
(e.g. “calc.bat” )
© Dilerahamed
Map Network Drive:
By using Map Network Drive, we can access particular Resource in shortcut
method.
Syntax:
Browse the shared Resource→ Select Resource→ Right Click→ Map Network
Drive→ Assign Drive letter→ Finish.
To open Map Network Drive Resource
Syntax:
Go to My Computer→ Open.
Home Folder:
By using Home Folder Concept, as an Administrator, we can assign our
Domain Hard Disk space to the particular User or Remote system.
Syntax:
As an administrator on Domain Controller, create a folder and share with
proper permissions to the specified User.
Start→ Programs→ Administrative Tools→ Active Directory Users and
Computers→ Select Users→ Select particular User→ Right click→
Properties→ Profile tab→ In “Home Folder” option, select connect and assign
drive letter→ Enter the UNC path (\\Domain Controller system
name\shared folder name\User name).
FILE SYSTEMS
After Switching the Power on, the system goes through these processes.
1. POST (Power On Self Test)
It checks the Processor, RAM, Display Card etc.
2. System Configuration
It checks the Configuration about Processor speed, RAM size, Hard Disk size
etc.
3. Booting
The process of loading System files and Bootable files of Operating system
from Secondary Storage device (Hard Disk) to Micro Processor is called
Booting.
Partitions:
According to our Windows 2003 Server Operating system, we are having two
types of partitions.
1. System Partition
It contains Bootable files.
2. Boot Partition (System Root)
It contains Windows folder.
© Dilerahamed
o Data is stored in Clusters.
o Track 0 is also called as MBR (Master Boot Record).
The MBR (Master Boot Record) contains,
1. Partition information
2. Root Directory
3. Bootable Files
4. File System
Partition information:
It contains the information about Logical drives.
Root Directory:
File system writes file properties i.e. file name, file type, file location, file
attributes (read, write, and archive) in Root Directory.
Bootable Files:
According to Windows 2003 Server Operating System, there are five Bootable
files.
1. NTLDR
2. BOOT.INI
3. BOOT SECT.DOS
4. NT BOOT DO.SYS
5. NT DETECT.COM
FILE SYSTEM
File System is the file databases which maintains the read or write operations
on a physical disk by maintaining the sector information.
When the data is stored in the physical disk, it may be stored in multiple
clusters.
A table is created in File System. This Table maps file to the Clusters, where
they are located and contains information about their sequential order. So, the
file was located and read.
File System in different flavors:
1. FAT 16 (File Allocation Table – 16 Bit)
2. FAT 32 (File Allocation Table – 32 Bit)
3. NTFS (Network File System)
FAT 16:
FAT 16 is also referred as FAT, is widely used in Windows NT 4.0 operating
system and earlier versions of Operating systems.
A table entry is 16 bits per entry.
FAT 32:
FAT 32 is used to differentiate between the versions.
It was introduced with Windows 95 operating system.
When FAT 32 was introduced, the table length was extended to 32 bits per
entry.
© Dilerahamed
NTFS:
NTFS File System was introduced with Windows NT 4.0 operating system and
has been some improvements. Again NTFS was introduced as NTFS File
System 5.0 with Microsoft Windows Server 2000 and fully supported by
Microsoft Windows 2003 Server.
NTFS was a Master File Team (MFT). It is similar to FAT 16 and FAT32 but,
more efficient. NTFS because of having different Architecture is not readable
by Windows 98 and earlier operating systems.
Although Microsoft Windows 2003 Server supports FAT32 and NTFS, it is
highly recommended to format using NTFS File System.
NTFS File System was required, when Active Directory Service is installed.
By using NTFS File System, we can have Compression, Encryption, File and
Folder level Security and Disk Quotas.
Note: We can convert FAT32 to NTFS file system of particular Partition in
GUI mode but, we will lose the Data of that particular Partition.
Note: We can also convert FAT32 to NTFS file system of the particular
Partition in CUI mode. We would not loose the Data.
Syntax:
Start→ Run→ Type cmd→ Ok→ in the Command prompt type,
“convert <drive letter>:/fs:ntfs “.
e.g. convert d:/fs:ntfs
Compression:
By using Compression, we can compress the contents of the particular folder
or file to save the disk space.
Syntax:
Right click the folder→ Properties→ Advanced→ Select “Compress the
Contents to save disk space”→ Ok.
Encryption:
By using Encryption, we can encrypt the data in the particular file or folder to
secure the data.
Syntax:
Right click the folder→ Properties→ Advanced→ Select “Encrypt the data of a
particular file or folder”→ Ok.
Disk Quotas:
By using Disk Quotas, as an Administrator we can assign limited disk space to
a particular User.
Syntax:
Select particular disc→ Right click→ Properties→ Quotas→ Enable Quota
management→ Select “Deny Disk space to users exceeding Quota limit.
Limit Disk space to:
Set warning level to:
Select the Quota logging options for this volume
© Dilerahamed
In logging options,
→ Select “log event when a User exceeds the Quota limit”
→ Select “log event when a User exceeds their warning level”
→ Go to Quota entry tab→ Quota menu→ New Quota entry→ Advanced→
Find now→ Select particular User→ set Disk space and warning level→ Ok→
Apply→ Ok.
NAMING SERVICES
Database
MCSE1→ 100.10.10.1
MCSE2→ 100.10.10.2
MCSE3→ 100.10.10.3
WINS is the process of resolving NETBIOS Names to IP addresses.
STEP 1:
WINS Server Installation:
Syntax:
Start→ Settings→ Control Panel→ Add/Remove Programs→ Add/Remove
Windows Components→ Networking Services→ Details→ WINS→ Ok.
STEP 2:
WINS Server Configuration:
Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Advanced→ Select WINS
Tab→ Enter the WINS Server IP address.
STEP 2:
WINS Client Configuration:
Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Advanced→ Select WINS
Tab→ Enter the WINS Server IP address.
Domain Naming Service (DNS):
Database
MCSE1→ 100.10.10.1
MCSE2→ 100.10.10.2
MCSE3→ 100.10.10.3
© Dilerahamed
DNS is the process of resolving Domain Name space to IP address.
DNS Server Installation:
When we run “ dcpromo.exe “, the Active Directory Service and DNS Service
will be installed in that particular machine.
If we want to install the DNS Service manually,
Syntax:
Start→ Settings→ Control Panel→ Add/Remove Programs→ Add/Remove
Windows Components→ Networking Services→ Details→ DNS→ Ok.
DNS Server Configuration:
Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Enter the DNS Server IP address in
“Preferred DNS Server”.
DNS Client Configuration:
Syntax:
Right click My Network Places→ Properties→ LAN Connection→
Properties→ Select TCP/IP→ Properties→ Enter the DNS Server IP address in
“Preferred DNS Server”.
DHCP
© Dilerahamed
SCOPE
The Scope contains the full configuration details of DHCP Network.
Syntax:
Start→ Programs→ Administrative Tools→ Services→ DHCP→ Right click
our Computer Name→ New Scope→
→ Enter the Scope Name
→ Address Range: Start: 100.10.10.2
End: 100.10.10.14
→ Exclude Range: Start: 100.10.10.4
End: 100.10.10.7
→ Lease duration: 8 days (By default)
→ No, I will Configure later.
Lease Duration:
After 50% of Lease Duration, the DHCP Client tries to renew the IP address
until 87.4% Lease Duration.
If we want to renew the IP address on Client Machine,
Syntax:
Start→ Run→ Cmd
→” ipconfig/renew “
→ “ipconfig/release “
Microsoft Reserved IP address: (169.254.x.x)
This range of IP address assigned to the DHCP clients at the time of
completing the Lease Duration period.
Reservations:
The process of assigning wanted IP address to the particular DHCP Client
Machine through Net BIOS name and MAC address of that particular DHCP
Client Machine.
Syntax:
Select Reservation Option→ Right click→ New→
Reservation→ Net BIOS Name: MCSE4 (Computer name)
MAC address : 2B-4E-8F-3C-E5
IP address : 100.10.10.10 (wanted IP address)
The Transaction between DHCP Server and DHCP Client
1. Discover
Client Machine searching for DHCP Server
2. Offer
DHCP Server ready to assign the IP address
3. Request
Client Machine request for an IP address
4. Acknowledgement
DHCP Server sends IP address with Acknowledgement to the Client Machine.
© Dilerahamed
Note: After creating the Scope, as an Administrator we must “activate” the
scope and “authorize” the DHCP Server
Activate:
Syntax:
Right click the Scope→ Activate
Authorization:
Syntax:
Right click the DHCP Server (System Name)→Right click→
Authorize.
© Dilerahamed
After creating the Website,
Right click the Website→ Description Name→ Properties→ Documents tab→
remove the previous default Web pages and add our Web page (sample.html).
Step 5:
Editing the ETC host file:
Syntax:
Boot Partition→ Windows→ System32→ Drivers→ ETC→ Host→ Open with
Notepad→ Enter the additional IP address <Website Name >
(e.g. 150.10.10.25 www.chiru.com)
On Client side,
Do the same above 5th Step process.
Step 2:
Saving our Files:
Syntax:
Save the required files with their own file extensions and save in, Boot
Partition→ Inetpub→ FTP root.
Step 3:
Adding the additional IP address:
Syntax:
My Network Places→ Right click→ Properties→ LAN Connection→ Right
click→ Properties→ TCP/IP→ Properties→ Advanced→ IP settings→ Add→
Assign the IP address and Subnet Mask.
Step 4:
FTP Creation:
Syntax:
Start→ Programs→ Administrative Tools→ Internet information Services→
Websites→ Right click→ New Website→ Enter the Description (e.g.
sample) → Next→ Select the additional IP address (150.10.10.25) and verify
the html default port number (21) → Next→ In FTP user isolation, select “Do
not isolate Users”→ Next→ Enter the Home Directory path through→
Browse→ My Computer→ Boot Partition→ Inetpub→ FTP root→ Ok→
Next→ verify the permissions→ Finish.
Step 5:
To open the FTP Site in Internet Explorer,
© Dilerahamed
Syntax:
Go to Internet Explorer→ type “ftp:// Additional IP address “
e.g. ftp://150.10.10.25
Disk Management
Disk Management:
Syntax:
Right click My Computer→ Manage→ Storage→ Disk Management.
HDD configuration is of two interfaces.
1. Integrated Device Electronics (IDE):
IDE can have two Devices to be connected.
2. Small Computer System Interface (SCSI):
SCSI can have 32 Devices to an interface.
By using Disk Management we can create,
1. Disk Partition
2. Simple and Spanned Volumes
3. Spanned and Stripped Volumes
4. RAID Levels or Fault Tolerance
Note: We can create four Primary Partitions (BASIC)
Note: RAID - Redundant Array of Independent Disk
Note: RAID 0 - Simple + Spanned (Disk Stripping)
Simple Volume:
Combining two or more free spaces in one Hard Disk is called Simple
Volume.
Minimum Hardware Requirements:
1. One Hard Disk
2. Number of IDE Controllers – 1
Spanned Volumes:
Combining two or more uneven free spaces on multiple Hard Disks is called
Spanned Volume.
Minimum Hardware Requirements:
1. Number of IDE Controllers – 1
2. Hard disks – 2
Stripped Volumes:
Combining two or more even free spaces on Multiple Hard Disks is called
Stripped Volume.
Minimum Hardware Requirements:
1. Number of IDE Controllers – 1
2. Hard disks – 2
Simple/Spanned Stripped
mbine two or more
Uneven free spaces. Even free spaces.
© Dilerahamed
2. Data is written serially 2. Data is written parallels.
(Serial writing).
3. Writing and Reading Data is 3. Writing and Reading Data is
Slow (Disk Performance is poor). Faster (Disk Performance is fast)
System Tools
Disk Defragmenter:
Sometimes we create, remove, move, copy and edit files. They can become
fragmented.
When a file is written to Disk, it is written to Clusters. Clusters are tiny
parts of the Drive where information is stored. When a file is moved or
deleted, opened, the non-contagious clusters are not removed as well thereby
creating a fragment. The process of de-fragmenting removes lost Clusters and
also records in a more efficient order. De-fragmentation will improve the
performance of the System.
© Dilerahamed
Syntax:
Start→ Programs→ Accessories→ System Tools→ Disk Defragmenter.
Disk Cleanup:
To remove the temporary internet files, compressed old files, empty the
Recycle Bin. Disk Cleanup is provided as a utility.
Syntax:
Start→ Programs→ Accessories→ System Tools→ Disk Cleanup.
Chkdsk:
This Command is used to scan and fix the errors on the disk
Syntax:
Run Cmd→ type “chkdsk <drive letter>: and press enter.
e.g. c:\chkdsk d: (where ‘d’ is the ‘d’ partition)
BACKUP
Backup:
Backup is the plan in which recovery from sudden failures is possible.
Every file contains an Archive bit as one of its hidden attributes.
This attribute setting is to indicate that the file was created or after it has been
modified and needs to be included in the Backup set.
When the Archive bit is set to 1 that indicates the file was created or it has
been modified.
The Backup program will then set the Archive bit to zero which is called as
clearing the Archive bit.
If the file does not change by the next scheduled Backup, that file is skipped.
The Archive bit settings is dependent on what type of Backup is being run.
Types of Backup:
1. Normal Backup
2. Incremental Backup
3. Differential Backup
4. Copy Backup
5. Daily Backup
Normal Backup:
Normal Backup sometimes referred to as full Backup. This Backup is the most
complete type of Backup.
A Normal Backup takes large amounts of time to backup.
A Normal Backup clears the Archive bit of all files after backup.
Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Next→
Select “Backup Files and Settings”→ Next→ Select “let me choose what to
backup”→ Next→ Select the “folder” to backup→ Next→ Choose a place to
© Dilerahamed
save your backup and type a name for the backup → Next→ Click
“Advanced” tab→ Select “Normal” in select the type of backup→ Next→
Select “Verify data after backup” and Deselect or Select “Disable volume
shadow copy”→ Next→ Select “Append this backup to the existing
backups”→ Next→ Select “Now or Later” to run the backup→ Next→ Finish.
To restore a Normal Backup:
Syntax:
Open the saved Normal Backup file→ Next→ Select “Restore files and
settings”→ Next→ In the File, Select the Desired Normal Backup File→
Next→ Advanced→ Select “Original Location” to restore file→ Next→ Select
“Leave existing files (recommended)”→ Next→ Finish.
Incremental Backup:
Incremental Backup is the quickest method for performing backup of data.
An Incremental Backup backups only the new files and modified files and
Archive bit is set to 1, since the Normal Backup and Incremental Backup.
It also clears the Archive bit of all files after Backup.
To do a complete restore, we must restore the Normal Backup and previous
Incremental Backups.
Syntax:
Start→ Programs→ Accessories→ System Tools→ Backup→ Next→ Select
“Backup Files and Settings”→ Next→ Select “let me choose what
to backup”→ Next→ Select the “folder” to backup→ Next→ Choose a place to
save your backup and type a name for the backup → Next→ Click
“Advanced” tab→ Select “Incremental” in ‘select the type of backup’→
Next→ Select “Verify data after backup” and Deselect or Select “Disable
volume shadow copy”→ Next→ Select “Append this backup to the existing
backups”→ Next→ Select “Now or Later” to run the backup→ Next→ Finish.
Note: To do a complete Incremental Backup restore, we must first restore the
Normal Backup and previous Incremental Backups.
Syntax:
After restoring the Normal Backup then,
Open the saved Incremental Backup file→ Next→ Select “Restore files and
settings”→ Next→ In the File, Select the Desired Incremental Backup File→
Next→ Advanced→ Select “Original Location” to restore file→ Next→ Select
“Replace existing files if they are older than backup files”→ Next→ Finish.
Differential backup:
It backup’s all that have changed or newly added files since the last full
backup.
When a Differential backup is used, it backup’s all files with the archive bit set
to ‘1’ but, it does not clear the archive bit.
By not clearing the archive bit, the Differential backup will backup the same
file on two separate dates even if the file does not change.
© Dilerahamed
To do a complete restore, we must restore the normal backup first and last
Differential backup next.
Copy backup:
Copy backup is just like Copy. It backup’s only files specified, regardless of
whether the archive bit is set to ‘1’ or not & it does not clear the archive bit.
They may be made when a company requires keeping data for extended
length of time.
Daily backup:
It backup’s only new files or modified files on the day.
It does not clear the archive bit.
Terminal Service
By using Terminal Service, we can access our entire system in Remote system.
Terminal Server Configuration:
Syntax:
Start→ Settings→ Control panel→ Add/Remove Programs→ Add/Remove
Windows Components→ Select “Terminal Services” and “Terminal Server
Licensing”→ Install.
Share the “Windows” folder to the specified User with proper permissions.
Terminal Client Configuration:
Syntax:
In the Client machine, browse the Shared Terminal Server “Windows”
folder→ System32→ Clients→ TS Client→ Win32→ Setup.exe
To access the Terminal Server in Terminal Client machine,
Syntax:
Start→ Programs→ Remote Desktop Connection→ Enter the Terminal Server
System Name and IP address and then Connect.
In Windows 2003 Server, we don’t need to install Terminal Service.
Terminal Server Configuration:
Syntax:
Right Click My Computer→ Properties→ Remote tab→ On Remote Desktop
Window→ Mark the “Allow Users to connect remotely to this Computer.
To open the Terminal Server in Remote System,
Syntax:
Go to Remote system,
Start→ Programs→ Accessories→ Communications→ Remote Desktop
Connection→ Enter the Terminal Server “System” name.
Offline Enabling
By enabling the Offline files, we can obtain all the resources in networking
disabled condition also.
Syntax: (Step 1)
Go to My Computer→ Open→ Go to Tools menu→ Folder Options→ Select
the “Offline files” tab→ Mark the “Enable Offline files” option→ Mark the
“Synchronize all offline files when logging on or logging off” option→ Mark
the “Display a remainder every selected minutes” option→ Mark the “Create
an offline files shortcut on the desktop” option→ Mark the “Encrypt offline
files to secure and to examine the drive’s space” option→ Apply→ Ok.
© Dilerahamed
Step 2: Browse the offline resource (wanted resource) → through Run
→\\Source system name→ Right click the wanted resource→ Make available
offline.
Synchronization: (Step 3)
By using the Synchronization, all the modified resources (Offline folders), are
updated in the Source system manually or dynamically.
By dynamically:
Syntax:
Go to My Computer→ Tools menu→ Synchronize→ Mark the Offline files→
Go to “Setup” tab→ Again mark the “Offline files” option→ Mark the “When
I logon to my Computer or logoff to my Computer→ Go to “Idle” tab→ Mark
the “Offline file or folder”→ Go to “Advanced” tab→ Enter the minimum
minutes for “Automatically Synchronize the specified items after my
Computer has been idle for”→ Enter the minimum time and mark the “While
my Computer remains idle, repeat Synchronization every→ Mark the
“Prevent the Synchronization when my Computer is running on battery
power” option→ Ok→ Apply→ Ok.
Event Viewers
Event Viewers:
Windows 2003 Server O.S. includes a set of Log files that are configured and
presented within the Event Viewers.
Syntax:
Right click My Computer→ Manage→ Computer Management (Local)
→ Event Viewers.
Application Log file:
Developers of an Application can program their software to report
Configuration changes, Errors or other Events in these Log files.
System Log:
Windows 2003 Server O.S. will report Events about Service start or abnormal
Shut Down, Device failures and so on to these Logs.
Security Log:
Windows 2003 Server O.S. will report Events about Logon and resource
occurs Events.
Directory Service Log:
This Log contains Log information about the Active Directory Events.
DNS Server Log:
This Log contains Log information about DNS Server Log events.
File replication Service:
This Log Contains Log information about replicated files Log Events.
© Dilerahamed
Run as Administrator:
On Domain when logon as User, if we want to run as Administrator,
Step 1:
Right click Taskbar→ Properties→ Start Menu→ Customize→ Select “Display
Administrative Tools”
Step 2:
Start→ Programs→ Administrative Tools→ Right click “Active Directory
Users and Computers”→ Run as→ Enter as administrator.
e.g. User Name: Novell\administrator
Password : iiht@447
If we want to do administrator work on Client System,
Syntax:
My Computer→ Boot Partition→ Windows→ System32→ Double click
“Adminpak.msi”→ Run the installation→ Finish.
Task Manager
Task Manager:
Press (Ctrl + Alt + Del) to view the Task Manager.
We will have five options.
1. Applications
2. Processes
3. Performance
4. Networking
5. Users
Applications:
It displays the status of Applications (whether running or not responding).
Processes:
It gives the list of recent processes that took place i.e. the list of latest
executable files with User Name and Memory usage.
Performance:
It gives the Graphs of CPU usage history, Page file usage history.
Networking:
It gives the Graphs of usage of Network at present and gives Adapter name,
Network utilization and link speed and share information.
Users:
It gives the User accounts information.
© Dilerahamed
Loop Back Adapter
Loop Back Adapter Installation:
Syntax:
Disable the NIC if we have it
→ Start→ Settings→ Control Panel→ Add Hardware→ Next→ Select “Yes, I
have already connected the hardware→ Next→ Select “Add a new Hardware
Device”→ Next→ Select “Install a Hardware that I manually select from a
list”→ Next→ Select “Network Adapters”→ Next→ Select “Microsoft”→ and
Select “Microsoft Loop back Adapter”→ Next→ Finish.
© Dilerahamed