Mcsa Notes
Mcsa Notes
Mcsa Notes
70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment 70-291: Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure 70-294: Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Networking Infrastructure 70-284: Implementing and Managing Microsoft Exchange Server 2003
Windows XP
What is Patch Patch:- A patch is a small piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance.
Flavors of Windows XP
XP Home Edition: - It is introduced for personal computers or Home purpose XP Media Center Edition: - It is used for Media center PCs. Features of Media Center edition are - It supports more graphical Options than others Viewing software for Television and Recording TV guide Movie Maker with DVD burning. XP Professional: - It is a 32 bit OS and used for small business purpose XP Professional 64 bit: - It is a 64 bit version in XP to support 64 bit processor like Itanium XP Tablet Version: - It is used for mainly Laptops which includes more power management features.
Home Edition
NO NO NO NO NO NO
Professional
YES YES YES YES (2)
Remote Desktop NO
YES
YES YES
Windows firewall NO
NO
NO NO NO YES YES NO
YES
YES YES YES YES YES YES
Recovery Console NO
Requirements of Windows XP
MINIMUM
RECOMMENDE D
RAM CPU
HDD
64 MB 233 MHz
1.5 GB
Types of Installations
1. Clean / Attended Installation 2. Unattended Installation 3. Up gradation
4. Remote Installation
5. Network Installation 6. Sys Prep
1. Clean / Attended Installation Step 1:Switch on the computer Step 2:Insert the XP OS CD Step 3:Change the Boot Sequence in Bios Setup to CD ROM first device. Step 4:Press any key at Press any key to boot from CD Step 5:Press Enter to continue. Step 6:Press F8 to agree license. Step 7:Create Partition as you want Note: C drive must have min 1.5GB Step 8:Select C partition and Press Enter Step 9:Select Format the partition using NTFS . Note: After format and copying system will restart after some time one wizard displayed Step 10:Give name and next Give Product key and Next give administrator password and next. Step 11:Select regional settings and network model next Step 12:After some time you will get windows XP desktop.
2. Unattended Installation
Step 1: Create a answer file Step Step Step Step Step 2: 3: 4: 5: 6: Insert the XP OS CD Browse the path cddrive:\support\tools\deploy\ Extract setupmgr to desktop Run Setupmgr Select Create a new answer file Select Unattended Fully Automated Windows XP Professional Setup from CD Give the answers to all and say finish
Rename the answer file to winnt.sif Copy the file to empty floppy. Go to the new system to install xp Insert the OS CD after pressing a key at Press any key to boot from CD , insert floppy. Step 7: It will installs XP without asking any thing.
3. Up gradation
Upgrade from
Upgrade to
Windows XP Professional Windows XP Professional Windows XP Professional Windows XP Professional Windows 98 and then Windows XP Professional
Windows NT 4 WS and then XP
1. Insert the Windows XP Professional CD-ROM into the CD-ROM drive. 2. At the command prompt, type d:\i386\winnt32 /checkupgradeonly. 3. Press ENTER.
Step 1: Insert the Windows XP Professional CD-ROM. Step 2: The Auto run program on the Windows XP Professional CD-ROM displays the Welcome To Microsoft Windows XP screen. Step 3: Click Install Windows XP. Step 4: Select up gradation(Recommended) Step 4: Accept the license agreement. Step 5: Enter your 25-character product key, which is located on the back of the Windows XP Professional CDROM case.
4. Remote Installation
5. Network Installation
1. Create a distribution server. The distribution server contains the installation files from the i386 folder on the Windows XP Professional CD-ROM. And Share that folder. 2. Boot the network client. On the target computer, boot from a floppy disk that includes a network client or start another operating system that can be used to connect to the distribution server. 3. Connect to the distribution server. After you start the network client on the target computer, connect to the shared folder on the distribution server that contains the Windows XP Professional installation files. 4. Run Winnt.exe or Winnt32.exe to start the Setup. Winnt.exe and Winnt32.exe reside in the shared folder on the distribution server. 5. Install Windows XP Professional. Setup restarts the local computer and begins the actual process of installing Windows XP Professional. The rest of the installation progresses in the same way as the attended installation.
The System Preparation tool (Sysprep) is a technology that you can use when performing an image-based installation. Image-based installation is a method of copying or cloning preconfigured operating systems and software applications onto destination computers. Image-based installation is the fastest method of installing an operating system and applications
DISK MANAGEMENT
1. Basic Disk The traditional industry standard is basic storage. All versions of MS-DOS, Windows, Windows NT, Windows 2000, and Windows XP support basic storage. Basic storage dictates the division of a hard disk into partitions. A basic disk can contain primary partitions, extended partitions, and logical drives
Primary
A basic disk can contain a maximum of four primary partitions, or up to three primary partitions if there is also an Extended partition. Can be marked as the active partition. The system BIOS looks to the active partition for the boot files to start the operating system (only one active Partition per hard disk). Each primary partition can be formatted And assigned a drive letter.
Extended
A basic disk can contain only one extended partition.
Divided into logical drives, each of which can be formatted and assigned a drive letter.
2. Dynamic Disk Windows 2000 and Windows XP Professional support dynamic storage, You divide dynamic disks into volumes, which can consist of a portion, or portions, of one or more physical disks. Another advantage of the dynamic disk is to extend the size of volume
Types of volumes Simple volume Contains disk space from a single disk and is not fault tolerant.
Spanned volume Includes disk space from multiple disks (up to 32). XP writes data to a spanned volume onthe first disk , and then next and next. These volumes are not fault tolerant. Striped volume Combines areas of free space from multiple hard disks (up to 32) into one logical volume . It requires the equal space from all H.Ds. XP Professional optimizes performance by adding data to all disks at the same rate. These volumes are not fault tolerant.
A Mirrored Volume is a hard drive or other form of storage media that stores an exact copy of the data from another volume. It is used for fault tolerance, which means mirrored volume serves as a backup device in case the primary device fails.
Steps: R.C. on Mycomputer select manage Disk Management R.C. on basic disk select convert to dynamic Basic Disk System Partition Boot Partition Primary Partition Dynamic Disk Simple Volume Simple Volume Simple Volume
Extended Partition
Logical drive
Note :
System Partition: The Partition which contains the startup files such as ntldr, boot.ini, and Ntdetect.com
Boot Partition: The Partition which contains the windows operating system files
Managing Compression
Windows XP Professional supports two types of compression: NTFS compression and compressed folders.
Compressed folders
The Compressed Folders feature allows you to create a compressed folder so that all files you store in that folder are automatically compressed. The compressed folders are in reality Zip-compatible archives and can be read by any operating system or application that can read .zip files. To create a compressed folder, start Windows Explorer and then choose File | New | Compressed Folder. You can create and use compressed files and folders on both FAT and NTFS volumes.
You can encrypt compressed folders that you created using this feature.
NTFS Compression
NTFS compression enables you to compress files, folders, or an entire drive. NTFS compression is integrated directly with NTFS and can be applied by modifying the compression attribute on files and folders. If you want to set the compression state of a folder or file, right-click the folder or file in Windows Explorer, choose Properties, and then click Advanced. In the Advanced Attributes dialog box, select the Compress Contents To Save Disk Space check box. Click OK, and then, in the Properties dialog box, click Apply.
Drive Compression
To decrypt a folder or file, you clear the Encrypt Contents To Secure Data check box in a folder or files Advanced Attributes dialog box, which you access from that folder or files Properties dialog box.
Select Quota menu and select New Quota Select the User to apply quota Give the quota limits and press OK and Apply.
DISK DEFRAGMENTER
Windows XP Professional saves files and folders in the first available space on a hard disk and not necessarily in an area of contiguous space. The parts of the files and folders are scattered over the hard disk rather than being in a contiguous area. When your hard disk contains numerous fragmented files and folders, your computer takes longer to access them because it requires several additional reads to collect the various pieces. The process of finding and consolidating fragmented files and folders is called defragmenting. You access Disk Defragmenter by choosing Start | All Programs | Accessories | System Tools | Disk Defragmenter. To perform disk defragmentation 15% space in that drive should free.
Chkdsk Chkdsk attempts to repair file system errors, locate bad sectors, and recover readable information from those bad sectors and mark them to prevent their future use. To access Chkdsk, select the drive you want to check in Windows Explorer or My Computer. Choose File | Properties, click the Tools tab, and click Check Now.
Disk Cleanup
You can use Disk Cleanup to free up disk space by deleting temporary files and uninstalling programs. Disk Cleanup lists the temporary files, Internet cache files, and unnecessary programs that you can safely delete. To access Disk Cleanup, select the drive you want to check in Windows Explorer or My Computer. Choose File | Properties, click the General tab, and click Disk Cleanup.
Device Manager provides you with a graphical view of the hardware installed on your computer and helps you manage and troubleshoot it. You can use Device Manager to disable, uninstall, and update device drivers.
Device Manager also helps you determine whether the hardware on your computer is working properly.
Backup Operators: A group of user accounts with access to files that they normally would not be able to access, in order to back up those files to archive media.
Power Users: A group with limited administrative privileges on a system. Users in this group can install applications, add users and modify users they create, and create shared folders for use over a network. These users cannot perform system wide changes like installation of Service packs, or patches etc. Remote Desktop Users: A group with permission to connect to the system using Remote Desktop. Users: A group with basic system access; by default, it includes all users added to the system. Guests : A group with very low-level, temporary access to the system. Network Configuration Operators: Members in this group can have some administrative privileges to manage configuration of networking features.
Tools for Managing Users and Groups Computer Management It includes the Local Users and Groups snap-in, which manages users and groups for the local system.
The User Accounts tool in Control Panel simplifies the creation and management of users. However, it lacks the ability to manage group memberships and user profile information.
Managing User Account Settings with Group Policy Local Security Policy allows you to manage settings such as the complexity of passwords that are allowed, the number of incorrect logon attempts allowed, and the logon script that runs after the user logs Policy Password on. The settings are: Enforce Password History Configures the number of passwords Windows XP remembers when requiring a user to select a unique password. If you configure this setting to 32, the user will not be allowed to use any of her last 32 passwords when setting a new password. Maximum Password Age Sets the password expiration interval for user accounts.
Controls how long an account is locked out after the lockout threshold value has been met.
Account Lockout Threshold
Controls the number of invalid logon attempts against an account before it is locked out.
Reset Account Lockout Counter After Controls the amount of time that invalid logon attempts will accumulate toward the lockout threshold. If the time set here expires, the lockout counter is reset.
Last Known Good Configuration: This option starts Windows by using the previous good configuration. After each successful boot sequence XP makes a copy of the current combination of driver and system settings and stores it as the LKGC. Directory Service Restore Mode: This mode is valid only for Windowsbased domain controllers. This mode performs a directory service repair.
Enable Boot Logging: This option turns on logging when the computer is started with any of the Safe Boot options except Last Known Good Configuration. The Boot Logging text is recorded in the Ntbtlog.txt file in the %SystemRoot% folder. Debugging Mode: This option turns on debug mode in Windows. Debugging information can be sent across a serial cable to another computer that is running a debugger. This mode is configured to use COM2.
System Restore:
It allows for the rolling back of system files, registry keys, installed programs, etc., to a previous state in the event of malfunctioning or failure. Resources Monitored Registry Files in the Windows File Protection Local User Profile System files of certain extensions (.exe, .dll etc) Some Drivers Restore Points are created When software is installed using the Windows Installer, Package Installer or other installers software is installed using the Windows Installer, Package Installer or other installers When the user installs a driver that is not digitally signed Every 24 hours of computer use When the operating system starts after being off for more than 24 hours. When the user requests it.
1. Click Start, and then click Control Panel. 2. Click Performance and Maintenance, and then click System. On the Hardware tab, click Device Manager.
Continued ..
3. Navigate to the device you wish to roll back driver, right click the name of the device and choose Properties 4. Click the Driver tab and then click Roll Back Driver.
Remote Desktop It enables you to connect to your computer across the network from virtually any computer
1. Start - Settings Control Panel System 2. Select Remote tab and select allow users to connect remotely to this computer . And select OK
Steps 1. Start Settings Control Panel System 2. Select the Computer Name tab
3. Click Connect. 4. When the Log On to Windows dialog box appears, type your user name, password, and domain (if required), and then click OK. 5. Thats all you will get the desktop of the host computer
Remote Assistance Remote Assistance provides a way for you to get the help you need when you run into problems with your computer.
Steps for using Remote Assistance The system asking for help/ support ("Assistance") is called the "Novice", the system giving help / support is called the "Expert" : Enable Remote Assistance in Novice computer Steps
1. In the Control-Panel, select the System icon: (or right-click "My Computer" on the desktop and select Properties) 2. Select the tab : Remote 3. Ensure the remote assistance option was enabled
Enter your name define how long this invitation stays open then "Continue"
For security, it is highly recommende d to define a password, which must be used by the "Expert" recipient to connect to your "Novice" system.
Select "Save Invitation", you will be asked to define the location to save the file (for example: to "My Documents" )
Access the novice computer to access invitation (start Run - \\computername press Enter) Open the invitation If a password was defined, then enter it now. Continue with YES.
Now in the Novice computer one request will comes, Novice needs to accept it.
Hardware Profiles
A hardware profile is a set of instructions that tells Windows which devices to start when you start your computer, or which settings to use for each device. Hardware profiles are especially useful if you have a portable computer.
hardware profiles let you change which devices your computer uses when you move it from location to location.
For Eg: Now your presented in one location where you want to use the cd drive , Lan card , so you can set a profile with these devices and disabling the other devices to save the Power.
Minimum processor speed Recommended processor speed Minimum RAM Recommended minimum RAM Maximum RAM Symmetric multiprocessing (SMP) support Minimum disk space
Web Edition 133 MHz 550 MHz 128 MB 256 MB 2 GB Up to 2 processors 1.5 GB
Standard Edition 133 MHz 550 MHz 128 MB 256 MB 4 GB Up to 4 processors 1.5 GB
Enterprise Edition 133 MHz 733 MHz 128 MB 256 MB 32 GB Up to 8 processors 1.5 GB
64-BIT EDITIONS
Enterprise Edition Minimum processor 733 MHz speed Maximum RAM 64 GB Symmetric Up to 8 multiprocessing processors (SMP) support Minimum disk 2 GB space Datacenter Edition 733 MHz 512 GB Up to 64 processors 2 GB
Logical Topologies
Workgroup Model or Peer-To-Peer Model Domain Model or Client/Server Model
Overview
Peer-to-Peer Network Model
Hub
Computer2 Os: win 2k Prof User: u2 Computer4 Os: win Nt Workstation User: u4
Overview
Client/Server Network Model Client2
Client1
Client3
Hub
U1 U2 U3 U4
Server
Printer
Workgroups Logical grouping of computers sharing single workgroup name. No Server, No Client. Systems are independent of each other. Not Centralized No Centralized Administration No need to have server/client OS Recommended for smaller networks
At least one Server and others clients. All the clients are dependent on Server. Centralized Data Store Centralized Administration Server/Client OS required
Recommended for Big networks
WIN NT 4.0 WIN NT 5.0 -- WIN 2000 WIN NT 5.2 -- WIN 2003
Windows NT 4.0
2000 Server
2003 Server
Initially 16 bit OS, later it was enhanced to 32 bit No Active Directory concept There is SAM (Security Account Manager) database Has PDC & BDC
32 bit OS
AD concept Ver.1.0 NTDS.DIT(New Technology Directory Service)- Directory Information Tree) It has 4. DC Domain Controller ADC Additional Domain Controller CDC Child Domain Controller NDEF New Domain in the Existing Forest Depends on DNS (Domain Naming Service)
Same
Same
Windows NT 4.0
2000 Server
2003 Server
NT Domain maintain NetBIOS names No RIS (Remote Installation Service) servers There is no RSOP (Resultant Set of Policies) No VSS (Volume Shadow copying Service) No concept of Dynamic Disks
A domain follows FQDN (Fully Qualified Domain Names). .com structure RIS servers available
Same
Same
No RSOP
There is RSOP
No VSS
VSS is available
ACTIVE DIRECTORY
Active Directory is a Directory Service which Contains Information of All User Accounts and Shared Recourses on a Network.
Centralized management
Resources
Provides User Logon and Authentication Services To organize and manage: User Accounts Computers Groups and Network Resources Enables authorized Users to easily locate: Network Resources
1.Fully Integrated Security 2.Easy Administration using Group Policy 3.Scalable to any Size Network 4.Flexible
Domain Controller: Domain Controller is the first system to have Active Directory Service (ADS). This is the first system to start a Domain Tree in a new Forest. C D C: Child Domain Controller, is a sub-domain controller under a DC or a sub-domain controller which shares same domain name space. ( Follows name space Hierarchy). N D E F: New Domain Tree in the Existing Forest, is a new domain tree of or under an existing Forest DC which follows different name space.
A D C: Additional Domain Controller, acts as a Backup server for DCs, like DC, CDC and NDEF. Tree: It is an Hierarchial structure of a domain which follows same name space. Forest: Combination of multiple domain trees. Note: All the computers in the domain structure of WIN 2000 and WIN 2003 maintain FQDN ( Fully Qualified Domain Name). Note: Only one DC can exist in a complete Forest and any no. of CDCs, NDEFs, ADCs can exist.
TREE - representation
FOREST
Forest
Tree Tree
CCNA.CISCO.COM (Child Domain)
Requirements
1. Windows 2003 Server Workgroup Model 2. Static IP Address
A wizard appears click next A compatibility option appears click next 2 options appear create a new domain controller create an additional domain controller
Specify the DNS domain name and press next (ex: ccna.com)
Prompts for password, give a password and this password is used at the time of restoring Active Directory from Directory services restore mode
After installing Active Directory with DNS, 6 new options can be seen in the Administrative Tools.
Active Directory domains and trusts Active Directory sites and services Active Directory users and computers DNS Domain Controller Security Policy Domain Security Policy
PROFILES
Profile is a User-State Environment Profile contains Personal Settings of the User
like:
1.Document & Settings 2.Desktop Settings 3.Start Menu Icons 4.Program File Settings 5.Temp Folder 6.Shortcuts 7.Application Data 8.Internet Settings 9.Favorites
PROFILES
1. Local Profile
A local user profile is created the first time you log on to a computer and is stored on a computer's local hard disk. Any changes made to your local user profile are specific to the computer on which you made the changes.
2. Roaming Profile
A roaming user profile is created by your system administrator and is stored on a server. This profile is available every time you log on to any computer on the network. Changes made to your roaming user profile are updated on the server.
3. Mandatory Profile
A mandatory user profile is a roaming profile that can be used to specify particular settings for individuals or an entire group of users. Only system administrators can make changes to mandatory user profiles.
4. Temporary Profile
A temporary profile is issued any time that an error condition prevents the users profile from being loaded. Temporary profiles are deleted at the end of each session. Changes made by the user to their desktop settings and files are lost when the user logs off.
Local Profiles
Home Folder
Home Folder is a centralized location of the users personal files (data) Home directories and My Documents make it easier for an administrator to back up user files and manage user accounts by collecting many or all of a user's files in one location Home folder is a folder that is accessible to the user and can contain files and programs for that user. Home folder can be assigned to a individual user or can be shared by many users
Groups
Group is a logical collection of users, computers, printers and groups it self.
Group Types:
Can be classified into two varieties--a) Group Scope & b) Group Type. a) Group Scope:
Determines the logical extent to which that group can contain user and can access the resources. There are 3 types of Group Scopes. Domain Local Global Universal
DL
DL
Glo bal
Glob al
Unive rsal
Univer sal
User accounts
Access Resources
b) Group Type:
Defines level of security or level of permissions the group has. There are two types of groups.
1. Distribution group 2. Security group
Distribution Group: Distribution groups can be used only with email applications (such as Exchange) to send e-mail to a collection of users. Distribution groups are not security-enabled, which means that they cannot be listed in discretionary access control lists (DACLs).
To create a Group
Start Programs Admin. Tools ADUC Right Click on Users select New-Group Give the Group Name and Select the type and Scope
Checks and Maintains the Uniqueness of the Domain Names in the Whole Forest It is Responsible for Adding, Removing and Renaming the domain names in the whole Forest
Schema Master
Schema is a Set of Rules which is used to Define the Structure of AD Schema contains Definitions of all the Objects which are stored in AD Schema Contains 2 Parts 1. Classes Class is a Template which is used to Create an Object 2. Attributes Attributes are Properties of an Object
Schema
Properties
User Name Phone No Mobile No Address Description
Classes
Attributes
Objects
User
Computer
Printer
Share Folder
U1 U2 U3
RID Master It contains (Allocates) POOL of IDs It assigns IDs to the Objects which are created in the Domain
RID
SID
AAA.com
DID
RID
RID
RID
Mcse.AAA.com
Ccna.AAA.com
PDC Emulator 1. It Updates the Password Changes in the Domain (Native Mode) 2. It Acts as a PDC for NT 4.0 BDC Server (Mixed Mode)
U1-u1 U2-u2
U1-u1 U2-u2
DC
U1 U2
ADC
U3
CMS.com
Infrastructure Master
Infrastructure Master Maintains and Updates the Universal Group Membership information It is Used for Inter-Domain Operations
Global Catalog
Like a telephone book contains limited information about all people and businesses within a city, the global catalog contains limited information about every object in a forest Within the schema, certain attributes are marked for inclusion in the GC
Searches are commonly performed against these attributes By searching against the GC, individual domains do not have to be queried in most cases- GC can resolve Servers that hold a copy of the global catalog are called global catalog servers
Global Catalog:
Start----Programs----Admn.Tools----ADS&S----expand sites---default first site-----expand servers----expand computer 1(Sun1)---NTDS settings----right click on NTDS setting----OK.
Schema Master: Go to Run----enter regsvr32 schmmgmt.dll----press OK Run---- mmc----OK Go to file menu----add/remove snap in----add snap in----select AD Schema Directory---- add----OK. Right click on AD schema----select operations master---current schema master
Transfer of the roles If already know the DC having some Problems then we can transfer the roles from DC to ADC
For RID, PDC emulator and Infrastructure Master steps are common. Right click on ADUC----select connect to DC----select the domain---select the other computer and give OK
*Right click on Domain name and select OM----select RID and select change----give yes *PDC----select change----give yes *Infrastructure Master----select change----give yes
Transferring DNOM
Open ADDT R.C on Domain select Connect to ADC R.C on Domain Name Select Operations Master select Change Yes.
Transferring Schema Master Start Run MMC File Add/Remove Snapin Select A.D.Schema OK
From Console Root R.C. on AD Schema Change Domain Controller Specify name OK.
R.C. on AD Schema Select Operations Master Click on Change Yes OK - Exit
Roles
Connections Connect to server( name of ADC) Q Transfer Schemamaster Transfer RID master Transfer Infrastructuremaster
Transfer PDC
Q Q Exit
Seizing of the roles Role is seized to additional Domain controller if DC suddenly down In DC Run CMD Type Ntdsutil Roles Connections Connect to Server (Give ADC) Quit Seize Domain Naming Master ..
Resolver: It is a file which will contain the mapping information of the clients. Ex. System name and its IP address
DNS Components:
The following are the Components of the DNS
DNS Name Space: The domain namespace is a hierarchical, tree-structured namespace, starting at an unnamed root used for all DNS operations.
.org
unicef.org msn.com
.com
microsoft.com.
.edu
mtu.edu msu.edu gov.au
.au
com.au
corp.microsoft.com.
corp.
microsoft.
com .
Subdomain
Second-Level Domain
Top-Level Domain
Root
DNS Zones
A Zone is a collection of host name to IP Address mappings for hosts. There are two types of zones: Forward Lookup Zone: It is used to resolve the host name to IP addresses Reverse Lookup Zone: It is used to resolve IP addresses back to host names.
Reverse Lookup
Name for 192.168.1.50?
Name = Microsoft.com DNS Server
Again these forward lookup zone and Reverse lookup zones are divided into following zones..
1. Primary Zone 2. Secondary Zone 3. Stub Zone
1. Primary Zone: A standard primary zone hosts a read/write copy of the DNS zone in which resource records are created and managed. Only one server can host and load the master copy of the zone, no additional primary servers for the zone are permitted, and only the server hosting the primary zone is allowed to accept dynamic updates and process zone changes.
2. Secondary Zone: A copy of the zone file may be stored on one or more servers to balance network load, provide fault tolerance, or avoid forcing queries across a slow, wide area network (WAN) link. A standard secondary zone is a read-only copy of the standard primary DNS zone. Performing a zone transfer, which is done by simply copying the zone file from the primary server to a secondary server, creates a secondary zone. The secondary zone database files are updated regularly from the primary zone database. 3. Stub Zone: A stub zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone. A stub zone is a pointer to the DNS server that is authoritative for that zone, and it is used to maintain or improve DNS resolution efficiency.
1. Primary Name Server: Primary name servers contain one or more primary zones.
2. Secondary Name Server: The secondary name server hosts one or more secondary zone databases. Because a zone transfer is used to create a secondary zone, the primary name server and zone already must exist to create a secondary name server.
3. Master Name Server: A name server is a master name server when it is responsible for sending updated copies of the database to other name servers. A master name server can host either a primary or secondary copy of a zone database.
4. Caching Only Name Server: Caching-only servers do not host any zones and are not authoritative for a particular domain. Caching-only DNS servers start with an empty cache and add resource record entries as the server fulfills client requests. This information is then available from its cache when answering subsequent client queries.
DNS Records
Resource Records 1. SOA (Start of Authority Record): It contains following information Authoritative server: Contains the name of the primary DNS server authoritative for the zone. Serial Number: Shows how many times the zone is updated. When a zones secondary server contacts its master server to determine whether it needs to initiate a zone transfer, the zones secondary server compares its own serial number with that of the master. If the serial number of the master server is higher, the secondary server initiates a zone transfer.
Refresh: Shows how often the secondary server for the zone checks to see whether the zone data is changed.
Retry: After sending a zone transfer request, shows how long (in seconds) the zones secondary server waits before sending another request.
Service locator (SRV) resource records enable you to specify the location of servers that provide a specific network service over a specific protocol and in a specific domain.
Other Records:
Msdcs:
Default site: Tcp: Udp:
Domain DNS zone Forest DNS zones both Provides DNS information in entire forest.
Root Hints:
The DNS Server service must be configured with the root hints to resolve queries for names that it is not having the information in its cache or it is not authoritative. Root hints contain the names and IP addresses of the DNS servers authoritative for the root zone.
Forwarder
A forwarder is a DNS server on a network used to forward DNS queries for external DNS names to DNS servers outside of that network. Two different types of forwarders 1. Standard forwarding: a DNS server on a network is designated as a forwarder by having the other DNS servers in the network forward the queries they cannot resolve locally to that DNS server. 2. Conditional forwarding: Conditional forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.
c.gtld-servers.net a.gtld-servers.net [192.26.92.30] [192.5.6.30] e.root-servers.net [192.203.230.10] i.gtld-servers.net g-gtld-servers.net [192.36.144.133] [192.42.93.30] d.root-servers.net [128.8.10.90] b.gtld-servers.net c.gtld-servers.net [203.181.106.5] [192.26.92.30] Is Am I authoritative? a.root-servers.net I dont know. Ask: name in cache? [198.41.0.4] d.gtld-servers.net i.gtld-servers.net [192.31.80.30] [192.36.144.133] h.root-servers.net [128.63.2.53] Delegation: dns2.cp.msft.net l.gtld-servers.net[207.46.138.21] No [203.181.106.5] [192.41.162.30] b.gtld-servers.net c.root-servers.net [192.33.4.12] server1.microsoft.com=192.168.7.99 dns1.cp.msft.net f.gtld-servers.net[207.46.138.20] [192.35.51.30] [192.31.80.30] microsoft.com. = d.gtld-servers.net g.root-servers.net [192.112.36.4] server1.microsoft.com=192.168.7.99 dns1.tk.msft.net [207.46.232.37] j.gtld-servers.net l.gtld-servers.net [210.132.100.101] [192.41.162.30] f.root-servers.net [192.5.5.241] [207.46.232.38] Recursivedns2.tk.msft.net Query: server1.microsoft.com. [207.46.138.21] k.gtld-servers.netdns2.cp.msft.net [213.177.194.5] [192.35.51.30] f.gtld-servers.net dns3.uk.msft.net [213.199.144.151] e.gtld-servers.netdns1.cp.msft.net [192.12.94.30] [207.46.138.20] j.gtld-servers.net Am Is dns4.uk.msft.net [213.199.144.152]name in cache? dns1.tk.msft.net I authoritative? [207.46.232.37] Recursive Query: server1.microsoft.com. [202.153.114.101][210.132.100.101] m.gtld-servers.netk.gtld-servers.net [213.177.194.5] dns3.jp.msft.net [207.46.72.123] dns2.tk.msft.net [207.46.232.38] Yes No e.gtld-servers.net [192.12.94.30] dns4.jp.msft.net dns3.uk.msft.net [213.199.144.151] Cache response [207.46.72.124] m.gtld-servers.net [202.153.114.101] dns1.dc.msft.net [207.68.128.151] dns4.uk.msft.net [213.199.144.152] dns2.dc.msft.net [207.68.128.152] dns3.jp.msft.net Preferred DNS Server: 10.1.1.1 [207.46.72.123] dns1.sj.msft.net [207.46.97.11] dns4.jp.msft.net [207.46.72.124] dns1.dc.msft.net [207.68.128.151] dns2.dc.msft.net [207.68.128.152] http/tcp session- 192.168.7.99 dns1.sj.msft.net [207.46.97.11]
TLD Server
192.168.7.99
http://server1.microsoft.com
Types of Queries
There are two different type of queries 1. Recursive Query 2. Iterative Query
1. Recursive Query: A query made from a client to a DNS server in which the server assumes the full workload. DNS server returns
either a complete answer or negative. Issued by: Client computers and DNS servers configured to use forwarder(s)
2. Iterative Query: Receiving server may return an answer, a negative response, or a referral to other DNS server(s). Typically issued by DNS servers not configured to use forwarders for resolution of queries.
Installation of DNS
Requirements 1. DC or Member server or Standalone server 2. Static IP Address 3. 2003 OS CD Installation Steps 1. Select Start Settings Control Panel. 2. In the Control Panel dialog box, double-click Add/Remove Programs. 3. In the Add/Remove Programs dialog box, click Add/Remove Windows Components. 4. In the Windows Components Wizard dialog box, highlight Networking Services, and click Details. 5. In the Networking Services dialog box, select the check box next to Domain Naming System protocol (DNS), and click OK. 6. In the Windows Components Wizard dialog box, click Next. 7. Completing the Windows Components Wizard screen, click Finish.
4. The Zone Type screen appears, as shown in Figure. Accept the default option of Primary Zone and Remove the check mark form "Store the zone in Active Directory", click Next. [check mark is for active directory integrated zone]
5. In the Zone Name screen, type in the name of the zone you are creating. This name is usually the FQDN of the DNS domain that the zone will contain, such as MICROSOFT.COM Click Next.
6. The Zone File screen appears. In this screen, you can either create a new zone file for the new zone, or configure the new zone to use an existing file. Click Next. 7. In Dynamic Update Select "do not allow dynamic update", click Next.
8. The Completing the New Zone Wizard screen appears. Click Finish.
Creating Host Record Steps 1. Select Start Programs Administrative Tools DNS. 2. Right Click the zone and select New Host
3. In the host name dialog box enter the Host name for which you are configuring the record 4. In the IP address dialog box enter the corresponding IP address of the host 5. Click Add Host.
Creating Reverse Lookup Zone Steps 1. Select Start Programs Administrative Tools DNS. 2. In the DNS dialog box, click the + next to the DNS servers name in the left pane. 3. In the left pane, highlight the Reverse Lookup Zones folder. Select Action. New Zone. 4. The Zone Type screen appears, as shown in Figure Accept the default option of primary and click Next.
5. In the next screen, type the network ID of your network on which you domain is working.
6. The Zone File screen appears. In this screen, you can either create a new zone file for the new zone, or configure the new zone to use an existing file. Click Next.
7. In the dynamic update, Select do not allow Dynamic Update. click Next
8. The Completing the New Zone Wizard screen appears. Click Finish.
Client Side
1. 2. 3. 4. Logon to Client System as an administrator. Select Start Settings Network Connections. Right click on your LAN card , Go to Properties. In the connections Properties dialog box, Select again properties and highlight Internet Protocol (TCP/IP) and click Properties. 5. In the Internet Protocol (TCP/IP) Properties dialog box, specify the preferred DNS server as the DNS servers address on which you have configured 6. In the connections Properties dialog box, click OK.
Static IP addressing: Assigning IP address manually on a console machine is called Static IP addressing. Disadvantages: 1.It is time consuming 2.Possibility of mishap 3.Less secured 4.No centralized database for computer like, names, ip addresses and their MAC addresses can be maintained directly.
Dynamic IP addressing: Assigning IP addressing to the machines from a remote system is called dynamic IP addressing.
Ex: DHCP
DHCP
It gives IP Addresses Automatically to the Clients who is requesting for an IP Address It can assign the subnet mask, default gateway, domain name and DNS server IP also. Centralized IP Address Management DHCP prevents IP address Conflicts and helps conserve the use of client IP Address on the Network DHCP reduces the complexity and amount of administrative work by assigning TCP/IP configuration Client IP configuration is updated automatically
DHCP Terms and Definitions DHCP server A computer running the DHCP Server service that holds information about available IP addresses and related configuration information as defined by the DHCP administrator and responds to requests from DHCP clients. DHCP client A computer that gets its IP configuration information by using DHCP. Scope A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service. Lease The length of time for which a DHCP client can use a DHCP-assigned IP address configuration.
Reservation A specific IP address within a scope permanently set aside for leased use by a specific DHCP client. Exclusion/exclusion range One or more IP addresses within a DHCP scope that are not allocated by the DHCP Server service. Exclusions ensure that the specified IP addresses will not be offered to clients by the DHCP server as part of the general address pool. Superscope A configuration that allows a DHCP server to provide leases from more than one scope to clients on a single physical network segment. Automatic Private IP Addressing (APIPA) A TCP/IP feature in Windows XP and Windows Server 2003 that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 with a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for automatic addressing, the Automatic private IP address alternate configuration setting is selected, and a DHCP server is not available.
DHCP ACKNOWLEDGEMENT
DHCP Client
DHCP Server
DHCP Process
DHCP process can be classified into four stages: 1. DHCPDiscover Broadcast by a DHCP client when it first attempts to connect to the network. The DHCPDiscover message requests IP address information from a DHCP server 2. DHCPOffer Broadcast by each DHCP server that receives the client DHCPDiscover message and has an IP address configuration to offer to the client. 3. DHCPRequest Broadcast by a DHCP client after it selects a DHCPOffer. The DHCPRequest message contains the IP address from the DHCPOffer that it selected. 4. DHCPAck Broadcast by a DHCP Server after saving client name and MAC address, client IP address and also leased duration and acknowledges the client.
Other Messages
DHCPNack Broadcast by a DHCP server to a DHCP client denying the clients DHCPRequest message. This might occur if the requested address is incorrect because the client moved to a new subnet or because the DHCP clients lease has expired and cannot be renewed. DHCPDecline Broadcast by a DHCP client to a DHCP server, informing the server that the offered IP address is declined because it appears to be in use by another computer. DHCPRelease Sent by a DHCP client to a DHCP server, relinquishing an IP address and canceling the remaining lease. This is unicast to the server that provided the lease. DHCPInform Sent from a DHCP client to a DHCP server, asking only for additional local configuration parameters; the client already has a configured IP address.
Installation of DHCP
Requirements of DHCP 1. Standalone Computer (DC or Member Server) 2. Static IP address Installation Start Settings Control Panel Add Remove Programs Add Remove Windows Components Scroll down the list select Networking Services and click details and select DHCP and select ok and Next.
The Plug and Play (PnP) basic input/output system (BIOS) automatically identifies PnP devices and arbitrates their resource requests.
The tabs of the volume Properties dialog box are: General Lists the volume label, type, file system, used space, free space, and total disk capacity. It also allows you to run Disk Cleanup, and on NTFS volumes it allows you to compress the drive and choose to have the Indexing Service index the disk for fast file searching. Tools Allows you to check the partition or volume for errors, defragment it, and back it up. Hardware Shows you all drives on the computer and allows you to view the properties of each device, including the manufacturer, location, and status of the device. It also allows you to access the troubleshooter for the device. Sharing Allows you to share the drive, set permissions on the share, and determine the type of caching for the share. Security Allows you to set the NTFS permissions. This tab is available only if the partition or volume is formatted with the NTFS file system. Quota Allows you to enable and configure quota management. This tab is available only if the partition or volume is formatted with the NTFS file system.