Networking and Servers
Networking and Servers
Myicon.ico
1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. NETWORKING DEVICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1. Repeater . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2. Hub . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.1. Passive Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.2. Active Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9
1http://san24mca.blogspot.com/
2.11.3. Full-Duplex . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3. TRANSMISSION MEDIUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.1. Attenuation……………………………………………….…….. 22
4.2. Distortion……………………………………………………….. 22
4.3. Noise………………………………………………………......... 23
4.3.1. Signal-to-Noise Ratio (SNR)………………..…….…. 23
4.3.2. Throughput………………………………..………….. 23
5. ACCESS POINT…......………………………………...………….................... 24
7. NETWORK TOPOLOGY…………………………………………………..……39
9. FIREWALL……………………………………………………………….………50
9.1 How Does Firewall Management Work?.......................................50
9.2 Firewall techniques………………………………………………50
9.2.1 Packet filtering firewall………………..………………50
9.2.2 Stateful firewall………………………..………………51
9.2.3 Deep packet inspection firewall………………..………51
9.2.4 Application-aware firewall………………………..……51
9.2.5 Application proxy firewall……………….…….………51
9.3 Firewall Rules……………………………………………….……52
9.4 Types of Firewall…………………………………………………52
9.4.1 Software firewall………………………………….……52
9.4.2 Hardware firewall………………………………………..53
9.5 The Advantages and Disadvantages of Firewall ……………..…53
9.5.1 Advantages ………………………………………….…53
9.5.2 Disadvantages ……………………………….…………54
10. UTM…………………………………………………………………………..…55
11. PROTOCOL………………………………………………………………..…….57
58
11.1.2 How FTP Works?..........................................................58
11.2 TELNET [TErminaL NETwork]…………………….…….……
58
11.3 Simple Mail Transfer Protocol (SMTP)......................... .............59
11.4 POP3……………………………………………………….……61
SANDEEP, MITHILESH , SYEDUL , RABI KANT
UNIT -2
1.1 IIS……………………………………………………….………..65
1.1.1 Installation……………………………………….……..66
1.1.2 Security Features…………………………………….…70
1.2 Apache Web Server…………… ………………………..………70
1.2.1 Features ……………………………………..…………71
1.2.2 Use………………………………….…………………..71
2. TEMINAL SERVER………………………………………………………………72
4.BLADE SERVER……………………………………………………………….…89
4.6 Configuration……………………………………………………….……
954.6.1. Using the Configuration /Setup Utility program……....……95
4.6.2. Using the PXE boot agent utility program ….………...……97
NETWORKING
1. INTRODUCTION
A network is a set of machines/devices (often referred to as nodes) connected by
communication links to communicate with each other. A node can be a computer,
printer, or any other device capable of sending and/or receiving data generated by
other nodes on the network.
1.3.1 Local Area Networks (LANs) : The computers are geographically close
together (that is, in the same building). It
confined to a single building or group of
8http://san24mca.blogspot.com/
1.3.3 Wide Area Network (WAN) : A wide area network (WAN) provides long-
distance transmission of data, image, audio, and video information over large
geographic areas that’s may comprise a country, a continent, or even the whole world.
It covers a large Geographical area (Kilometers).It consists of two or more LANs.
1.3.4 Virtual Private Network (VPN) : A Virtual Private Network (VPN) is a
network technology that creates a secure network connection over a public network
such as the Internet or a private network owned by a service provider. Large
corporations, educational institutions, and government agencies use VPN technology
to enable remote users to securely connect to a private network.
A VPN can connect multiple sites over a large distance just like a Wide Area
Network (WAN). VPNs are often used to extend intranets worldwide to disseminate
information and news to a wide user base. Educational institutions use VPNs to
connect campuses that can be distributed across the country or around the world.
There are a number of VPN protocols in use that secure the transport of data
traffic over a public network infrastructure. Each protocol varies slightly in the way
that data is kept secure.
9http://san24mca.blogspot.com/
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) use
cryptography to secure communications over the Internet. Both protocols use a
"handshake" method of authentication that involves a negotiation of network
parameters between the client and server machines. To successfully initiate a
connection, an authentication process involving certificates is used. Certificates are
cryptographic keys that are stored on both the server and client.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Advantage:-
1. Cost Saving
2. Improved Scalability
3. Improved Security
4. Better Performance
5. Flexibility and Reliability
6. Greater Access to mobile user
Disadvantage:-
Personal devices of one individual: His/her PC, laptop, cell phone, PDA
To allow devices to communicate and work together.
To permit devices to become smarter: spontaneously, network and work
together.
PANs feasibility is growing with improvement of wireless technology:
End user devices that provide users with a connection to the network are also
called hosts.
These devices allow users to share, create, and obtain information. Host
devices can exist without a network, but without a network, host capabilities are
greatly reduced. Host devices are physically connected to the network media using a
network interface card (NIC). They use this connection to perform the tasks of
sending e-mails, printing reports, scanning pictures, or accessing databases.
2.1 Repeater
Repeaters are networking devices that exist at Layer 1, the Physical layer, of
the OSI reference model. To understand how a repeater works, it is important to
understand that as data leaves a source and goes out over the network, it is
transformed into either electrical or light pulses that pass along the networking
medium. These pulses are called signals. When signals leave a transmitting station,
they are clean and easily recognizable. A network repeater is a device used to expand
the boundaries of a wired or wireless (WiFi) local area network (LAN).
13http://san24mca.blogspot.com/
radio's power is limited by its antenna size. The purpose of a repeater is to regenerate
incoming electrical, wireless or optical signals that are weaker signals and then
broadcast it. With physical media like Ethernet or Wi-Fi, data transmissions can only
span a limited distance before the quality of the signal degrades. Repeaters attempt to
preserve signal integrity and extend the distance over which data can safely travel.
Repeater is to retime network signals at bit level, allowing them to travel a longer
distance on the medium. The term repeater originally meant a single port “in” device
and a single port “out” device. Today multiple-port repeaters also exist. Repeaters are
classified as layer 1 devices in the OSI model because they act only on the bit level
and look at no other information.
2.2 Hub
The central connecting device in a computer network is known as a hub. A
USB hub is a device that expands a single USB port into several so that there are
more ports available to connect devices to a host system. Every computer is directly
connected with the hub. When data packets arrives at hub, it broadcast them to all the
LAN cards in a network and the destined recipient picks them and all other computers
discard the data packets. Hub has five, eight, sixteen and more ports and one port is
known as uplink port. Here are three types of network hubs: Passive Hubs, Active
Hubs and Intelligent Hubs.
2.2.1 Passive Hubs : One of the types of a network hub is the so-called passive hub.
It's a pass-through that does not do anything more than just broadcast signals it
receives through its input port, then sends it out through the output port. It does not do
anything to regenerate or process the signals because it only functions as a connector
of different wires in a topology.
2.2.2 Active Hubs : An active hub works more than just a connector but also
regenerates the data bits to ensure the signals are strong. Another name for an active
hub is a multiport repeater. It provides an active participation in the network aside
from acting as an interface. It participates in the data communication, such as storing
14http://san24mca.blogspot.com/
signals received through the input ports, before forwarding them. It can monitor the
data it is forwarding and sometimes help improve signals before forwarding them to
other connections. Such a feature makes troubleshooting of network problems easier.
2.2.3 Intelligent Hubs : An intelligent hub can perform everything that the passive
hub and active hub do, and help manage the network resources effectively to ensure
that the performance of the network is highly efficient. An intelligent hub can help in
troubleshooting by pinpointing the actual location of the problem and help identify the
root cause and resolution. It is very adaptable to different technologies without any
need to change its configuration. The intelligent hub performs different functions such
as bridging, routing, and switching and network management.
Hubs are considered Layer 1 devices because they only regenerate the signal
and repeat it out all their ports (network connections). Hubs amplify signals and
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2.3Bridge
2.4 Switch
Switch provides similar functions as a hub or a bridge but has more advanced
features that can temporarily connect any two ports together. It contains a switch
matrix or switch fabric that can rapidly connect and disconnect ports. Unlike Hub, a
switch only forward frame from one port to the other port where the destination node
is connected without broadcast to all other ports.
2.5 Router
In an environment consisting of
several network segments with different
protocols and architecture, a bridge may
not be adequate for ensuring fast
communication among all of the
segments. A complex network needs a
device, which not only knows the address
16http://san24mca.blogspot.com/
Routers work at the Network layer of the OSI model meaning that the Routers
can switch and route packets across multiple networks. They do this by exchanging
protocol-specific information between separate networks. Routers have access to
SANDEEP, MITHILESH , SYEDUL , RABI KANT
more information in packets than bridges, and use this information to improve packet
deliveries. Routers are usually used in a complex network situation because they
provide better traffic management than bridges and do not pass broadcast traffic.
Routers can share status and routing information with one another and use this
information to bypass slow or malfunctioning connections. When data packets are
transmitted over a network (say the Internet), they move through many routers
(because they pass through many networks) in their journey from the source machine
to the destination machine. Routers work with IP packets, meaning that it works at the
level of the IP protocol.
Each router keeps information about its neighbors (other routers in the same or
other networks). This information includes the IP address and the cost, which is in
terms of time, delay and other network considerations. This information is kept in a
routing table, found in all routers.
Routers do not look at the destination node address; they only look at the
network address. Routers will only pass the information if the network address is
known. This ability to control the data passing through the router reduces the amount
of traffic between networks and allows routers to use these links more efficiently than
bridges . Unlike bridges and switches, which use the hardware-configured MAC
address to determine the destination of the data, routers use the logic network address
such as IP address to make decisions.
NICs come in many shapes and sizes. They can be installed internally or
externally, although an internal installation is more likely. The picture illustrates an
internally installed combo (more than one type of connection) card. This card is
somewhat unusual in that it supports three connections:
The lower connection is a DB-15 connector for a thick Ethernet viper tap.
In order for a NIC to operate effectively, it must be able to carry out its interface
tasks with minimum disruption to the CPU of the computer in which it is installed.
Four methods of NIC to computer data transfer are used:
DMA:
o Data enters the NIC from the network.
o The NIC's CPU interrupts the computer's CPU.
o The computer's CPU stops other tasks and transfers the network data
into its RAM.
o If there is any data, the computer's CPU transfers the data to its RAM.
Shared memory:
o Data enters the NIC
from the network.
o The NIC's CPU stores
the data in the NIC's
RAM.
o The NIC's CPU
interrupts the
computer's CPU.
o The computer's CPU
stops other tasks and transfers the network data into its RAM.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2.7 Modem
The most familiar example is a voice band modem that turns the digital data of
a personal computer into analog audio signals that can be transmitted over a telephone
line. Modems are generally classified by the amount of data they can send in a given
time, normally measured in bits per second (bit/s, or bps). They can also be classified
by Baud, the number of times the modem changes its signal state per second.
Asymmetric Digital Subscriber Line (ADSL) is one form of the Digital
Subscriber Line technology, a data communications technology that enables faster
data transmission over copper telephone lines than a conventional voice band modem
can provide. It does this by utilizing frequencies that are not used by a voice telephone
call. Currently, most ADSL communication is full-duplex. Full-duplex ADSL
communication is usually achieved on a wire pair by either frequency-division duplex
(FDD), echo-cancelling duplex (ECD), or time-division duplex (TDD). With standard
ADSL, the band from 26.000 KHz to 137.825 kHz is used for upstream
communication, while 138 kHz –
1104 kHz is used for downstream
communication.
control protocols to control the set-up and tear-down of calls as well as audio codec
which encode speech allowing transmission over an IP network on digital audio via
an audio stream.
VoIP telephone calls can be placed either to other VoIP devices, or to normal
telephones on the PSTN (Public Switched Telephone Network).
Calls from a VoIP device to a PSTN device are commonly called "PC-to-
Phone" calls, even though the VoIP device may not be a PC.
Calls from a VoIP device to another VoIP device are commonly called "PC-
to-PC" calls, even though neither device may be a PC.
2.9 Gateway
Communication protocols
Data formatting structures
Languages
Architecture
For example, electronic mail gateways, such as X.400 gateway, receive messages
in one format, and then translate it, and forward in X.400 format used by the receiver,
and vice versa.
2.10 Connectors RJ 45
Registered Jack-45, an eight-wire connector used commonly to connect
computers onto Local-area networks (LAN), especially Ethernets.
20http://san24mca.blogspot.com/
End1 End 2
1. White(orange) 1. White(orange)
2. Orange 2. Orange
3. White(green) 3. White(green)
SANDEEP, MITHILESH , SYEDUL , RABI KANT
4. Blue 4. Blue
5. White(Blue) 5. White(Blue)
6. Green 6. Green
7. White(Brown) 7. White(Brown)
8. Brown 8. Brown
End1 End 2
1.White(orange) 1.White(Green)
2.Orange 2.Green
3.White(green) 3.White(Orange)
4.Blue 4.Blue
5.White(Blue) 5.White(Blue)
6.Green 6.Orange
7.White(Brown) 7.White(Brown)
8.Brown 8.Brown
21http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2.11.1 Simplex
2.11.2 Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the
same time. When one device is sending, the other can only receive, and vice versa. It
refers to two-way communications where only one party can transmit at a time. I.e.
in both directions but one at a time. The entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time. The half-duplex mode is used
in cases where there is no need for communication in both directions at the same time.
Example: a walkie-talkie and CB(citizen band)radios .
2.11.3 Full-Duplex
Full-Duplex:-In full duplex mode, both stations can transmit and receive
simultaneously. It refers to the transmission of data in two directions simultaneously.
For example, a telephone conversation because both parties can talk and listen at the
same time. In full duplex mode signals going in either direction share the capacity of
the link. It can occur in two ways either two separate physical paths or the capacity of
the channel is divided between signals traveling both directions.
3. TRANSMISSION MEDIUM
A transmission medium is a material substance (solid, liquid or gas) which
can propagate energy waves. For example, the transmission medium for sound
received by the ears is usually air, but solids and liquids may also act as transmission
media for sound. In other word, the transmission medium is the physical path by
which a message travels from sender to receiver. Example of Transmission media
include twisted –pair wire, coaxial cable, fiber-optic cable, and radio waves. The
absence of a material medium (the vacuum of empty space) can also be thought of as
a transmission medium for electromagnetic waves such as light and radio waves.
23http://san24mca.blogspot.com/
Signals are usually transmitted over some transmission media that are broadly
classified in to two categories:-
and coaxial cable use metallic that accept and transport signals in the form of
electrical current. Optical fiber is a glass or plastic cable that accepts and transports
signals in the form of light.
3.3.1 UTP
The most common twisted-pair cable used in communications is referred to as
unshielded twisted-pair (UTP).
3.3.2 STP
24http://san24mca.blogspot.com/
IBM has also produced a version of twisted-pair cable for its use called
shielded twisted-pair (STP). STP cable has a metal foil or braided-mesh covering that
encases each pair of insulated conductors. Although metal casing improves the quality
of cable by preventing the penetration of noise or crosstalk, it is bulkier and more
expensive
SANDEEP, MITHILESH , SYEDUL , RABI KANT
deployed. Optical Fiber consists of thin glass fibers that can carry information at
frequencies in the visible light spectrum and beyond.
The typical optical fiber consists of a very narrow strand of glass called the
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Core. A typical Core diameter is 62.5 microns (1 micron = 10-6 meters). Around the
Core is a concentric layer of glass called the Cladding. Typically Cladding has a
diameter of 125 microns .Coating the cladding is a protective coating consisting of
plastic, it is called the Jacket. Its purpose is to provide protection for the cladding and
core against such hazards as abrasion and moisture.
There are 3 primary types of transmission modes using optical fiber: They are
a) Step Mode Index
b) Graded Mode Index
c) Single Mode Index
Step Mode Index has a large core the light rays tend to bounce around,
reflecting off the cladding, inside the core. This causes some rays bounce back and
forth taking a longer path. Some take the direct path with hardly one reflections taking
shorted path.
The result is that the light rays arrive at the receiver at different times. The
signal becomes longer than the original signal. Typical Core diameter is 62.5 microns
and cladding diameter is 125 microns. LED light sources are used.
Graded Mode Index has a gradual change in the Core's Refractive Index.
This causes the light rays to be gradually bent back into the core path. This is
represented by a curved reflective path. The result is a better receive signal than Step
Index. Typical Core diameter: 42.5 microns & cladding diameter 145.5 microns. LED
light sources are used.
26http://san24mca.blogspot.com/
Single Mode Index has separate distinct Refractive Indexes for the cladding
and core. The light ray passes through the core with relatively few reflections off the
cladding. Single Mode is used for a single source of light (one color) operation. The
core diameter is very small: 9 microns & cladding diameter is 177.5 microns. It
SANDEEP, MITHILESH , SYEDUL , RABI KANT
requires a laser.
3.6 Comparison of Different mode of Optical Fibers:
4. TRANSMISSION IMPAIRMENT
Signals travel through transmission media, which are not perfect. The
27http://san24mca.blogspot.com/
imperfection causes signal impairment. This means that the signal at the beginning of
the medium is not the same as the signal at the end of the medium. What is sent is not
what is received. Three causes of impairment are attenuation, distortion, and noise.
4.1 Attenuation
Attenuation means a loss of energy. When a signal, simple or composite,
travels through a medium, it loses some of its energy in overcoming the resistance of
the medium. To compensate for this loss, amplifiers are used to amplify the signal.
Figure shows the effect of attenuation and amplification.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Decibel
To show that a signal has lost or gained strength, engineers use the unit of the
decibel. The decibel (dB) measures the relative strengths of two signals or one signal
at two different points. Note that the decibel is negative if a signal is attenuated and
positive if a signal is amplified.
dB =10 log10 p2/p1
4.2 Distortion
Distortion means that the signal changes its form or shape. Distortion can
occur in a composite signal made of different frequencies. Each signal component has
its own propagation speed (see the next section) through a medium and, therefore, its
own delay in arriving at the final destination. Differences in delay may create a
difference in phase if the delay is not exactly the same as the period duration. In other
words, signal components at the receiver have phases different from what they had at
the sender. The shape of the composite signal is therefore not the same. Figure shows
the effect of distortion on a composite signal.
4.3 Noise
noise, induced noise, crosstalk, and impulse noise, may corrupt the signal. Thermal
noise is the random motion of electrons in a wire which creates an extra signal not
originally sent by the transmitter. Induced noise comes from sources such as motors
and appliances. These devices act as sending a antenna, and the transmission medium
acts as the receiving antenna. Crosstalk is the effect of one wire on the other. One
wire acts as a sending antenna and the other as the receiving antenna. Impulse noise is
a spike (a signal with high energy in a very short time) that comes from power lines,
lightning. Figure shows the effect of noise on a signal.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
As we will see later, to find the theoretical bit rate limit, we need to know the
ratio of the signal power to the noise power. The signal-to-noise ratio is defined as
The throughput is a measure of how fast can send data through a network. In
other words, the bandwidth is a potential measurement of a link, the throughput is an
actual measurement of how fast data can send.
5. ACCESS POINT
An access point is nothing but a router that releases IP. Access point gets its IP
address range from the port address of the switch as port of switches are configured
according to VLAN. Access points are configured and installed according o the signal
location etc.
DHCP server is connected in data centre. From access points stations are connected.
We can also configure access point as DHCP server. Access points can release up to a
maximum of 60 IP addresses and it varies with the device. Access point devices can
configure MAC address within itself. Access points are distinguished by SSID
(Service Set Identifier) and we can have multiple SSID to allocate particular
bandwidth. It also helps in managing access points. Access points are mainly used in
Wi-Fi technology to transmit data to and from wireless clients.
and CSMA/CD (Carrier Sense Multiple Access with Collision Detection) for path
sharing. In short wi-fi is meant to be used generically when referring to any type of
802.11 networks.
Access points are configured using the 802.11 standards. 802.11 refers to a
family of specifications developed by IEEE for wireless LAN technology. 802.11
specifies an over-the-air interface between a wireless client and a base station or
between two wireless clients. There are several specifications in 802.11 family:-
802.11a
802.11b
802.11e
802.11f
802.11g
802.11h
802.11i
Radio Characteristics :
802.11b/g
19 dBm +/- dBm @1, 2, 5.5, 11 Mbps
19 dBm +/- dBm @6 and 9 Mbps
18 dBm +/- dBm @12 and 18 Mbps
17 dBm +/- dBm @24 and 36 Mbps
16 dBm +/- dBm @48 and 54 Mbps
SANDEEP, MITHILESH , SYEDUL , RABI KANT
802.11a
17 dBm +/- dBm @6 and 9 Mbps
16 dBm +/- dBm @12 and 18 Mbps
15 dBm +/- dBm @24 and 36 Mbps
14 dBm +/- dBm @48 and 54 Mbps
Antenna Options :
32http://san24mca.blogspot.com/
Both Radio 1 and Radio 2 require 1 antenna and can optimally use two
antennas per radio (4 antennas total for dual-radio models). Two antennas per radio
provide diversity that can improve performance and signal reception. Motorola
supports 2 antenna suites for the AP-5131. Radio 1 supports the 2.4 GHz radio and
Radio 2 refers to the AP-5131 5.2 GHz radio. However, there could be some cases
where a dual-radio AP-5131 is performing a Rogue AP detector function. In this
scenario, the AP-5131 is receiving in either 2.4 GHz or 5.2 GHz over Radio 1 or
Radio 2 antennas depending on which radio is selected for the scan.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
LED indicators :
AP-5131 utilizes seven LED indicators. Five LEDs display within four LED
slots on the front of the AP-5131 (on top of the AP-5131 housing) and two LEDs (for
above the ceiling installations) are located on the back of the device (the side
containing the LAN, WAN and antenna connectors). The five AP-5131 top housing
LEDs have the following display and functionality:-
Boot and Power Status Solid white indicates the AP-5131 is adequately
powered.
Error Conditions Solid red indicates the AP-5131 is experiencing
a problem condition requiring immediate
attention.
The LEDs on the rear of the AP-5131 are viewed using a single (customer
installed) extended light pipe, adjusted as required to suit above the ceiling
installations. The LEDs displayed using the light pipe have the following colour
display and functionality:-
Boot and Power Status Solid white indicates the AP-5131 is adequately
powered.
1. Select System Configuration Quick Setup from the AP-5131 menu tree.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
35http://san24mca.blogspot.com/
2. Enter a ‘System Name’ for the AP-5131. The system name is useful if
multiple devices are being administered.
3. Select the ‘Country’ for the AP-5131’s country of operation from the drop-
down menu.
The AP-5131 prompts the user for the correct country code on the first login. A
warning message also displays stating that an incorrect country setting may result in
illegal radio operation. Selecting the correct country is central to legally operating the
AP-5131. Each country has its own regulatory restrictions concerning electromagnetic
emissions and the maximum RF signal strength that can be transmitted. To ensure
compliance with national and local laws, be sure to set.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
4. Optionally enter the IP address of the server used to provide system time to the
AP-5131 within the Time Server field.
Once the IP address is entered, the AP-5131’s Network Time Protocol (NTP)
functionality is engaged automatically.
5. Click WAN tab to set minimum set of parameters for using the WAN
interface.
36http://san24mca.blogspot.com/
WAN port. Disable this option to effectively isolate the AP-5131’s WAN
connection. No connections to a larger network or the internet will be
possible. MUs cannot communicate beyond the configured subnets.
b. Select the ‘This Interface is a DHCP Client’ checkbox to enable DHCP for
the AP-5131 WAN connection. This is useful, if the target corporate
network or Internet Service Provider (ISP) uses DHCP.
c. Specify an ‘IP address’ for the AP-5131’s WAN connection.
d. Specify a ‘Subnet Mask’ for the AP-5131’s WAN connection. This
number is available from the ISP for a DSL or a cable-modem connection
or from an administrator if the AP-5131 connects to a larger network.
e. Specify a ‘Default Gateway’ address for the AP-5131’s WAN connection.
The ISP or a network administrator provides this address.
f. Specify the address of a ‘Primary DNS Server’. The ISP or a network
administrator provides this address.
6. Optionally use the ‘Enable PPP over Ethernet’ checkbox to enable point-to-
point over Ethernet (PPPoE) for a high speed connection that supports this
protocol.
a. Select the ‘Keep Alive’ checkbox to enable occasional communications
over the WAN port even when the client communications to the WAN are
idle. Some ISPs terminate inactive connections, while others do not. In
either case, enabling Keep-Alive maintains the WAN connection, even
when there is no traffic. If the ISP drops the connection after the idle time,
the AP-5131 automatically re-establishes the connection to the ISP.
b. Specify a ‘Username’ entered when connecting to the ISP.
c. Specify a password entered when connecting to the ISP.
7. Click the ‘LAN’ tab to set a minimum set of parameters to use the AP-5131
LAN interface.
37http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
a. Select the ‘Enable LAN Interface’ checkbox to forward data traffic over
the AP-5131 LAN connection. The LAN connection is enabled by default.
b. Use ‘This Interface’ drop-down menu to specify how network address
information is defined over the AP-5131’s LAN connection. Select ‘DHCP
Client’ if the larger corporate network uses DHCP. Select ‘DHCP Server’
to use the AP-5131 as a DHCP server over the LAN connection.
c. Enter the network-assigned ‘IP Address’ of the AP-5131.
d. The ‘Subnet Mask’ defines the size of the subnet.
e. Enter a ‘Default Gateway to define the IP address of a router the AP-5131
uses on the Ethernet as its default gateway.
f. Enter the ‘Primary DNS Server’ IP address.
g. If using DHCP Server use the ‘Address Assignment Range’ parameter to
specify a range of IP address reserved for mapping clients to the IP
addresses.
8. Enable the radio(s) using the ‘Radio Enable’ checkbox(es). If using a single
radio model, enable the radio, then select either 802.11a(5GHz) or
802.11b/g(2.4GHz) from the ‘RF Band of Operation’ field.
9. Select the ‘WLAN#1’ tab to define its ESSID security scheme for basic
operation.
a. Enter the ESSID (Extended Services Set Identification) and name
associated with the WLAN.
b. Use the ‘Available On’ checkboxes to define whether the target WLAN is
38http://san24mca.blogspot.com/
operating over the 802.11a or 802.11b/g radio. Ensure the radio selected
has been enabled.
c. Even an AP-5131 configured with minimal values must protect its data
against theft and corruption. A security policy should be configured for
WLAN1 as part of basic configuration outlined in this guide.
10. Click ‘Apply’ to save any changes to the AP-5131 Quick Setup screen.
keys, and when decrypting each is used in turn until decryption is successful. This
allows keys to be changed dynamically.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
To configure WEP128 :
1. From the AP-5131 Quick Setup Screen. Click the ‘Create’ button to the right
of the Security Policy item.
The ‘New Security Policy’ screen displays with the ‘Manually Pre-shared
key/No authentication’ and ‘No Encryption’ options selected.
2. Ensure the ‘Name’ of the security policy entered suits the intended
configuration or function of the policy. Multiple WLANs can share the same
security policy.
3. Select the ‘WEP 128 (104 bit key) checkbox. The ‘WEP 128 Setting’ field
displays within the ‘New Security Policy’ screen.
4. Configure the ‘WEP 128 Setting’ field as required to define the pass key used
to generate the WEP keys.
5. Click the ‘Apply’ button to save the security policy and return to the ‘AP-5131
Quick Setup’ screen. 40http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
6. SWITCH
A LAN switch is a local area networking device that prevents data packet
collision, and maximizes transmission speed as well as bandwidth allocation. This is a
good replacement to a network hub and solves problems associated with expanding
41http://san24mca.blogspot.com/
networks.
Switch is an intelligent, active hub that establishes, maintains, and changes logical
connections over physical circuits. Switches flexibly connect transmitters and
receivers across networks of interconnected ports and links, thereby allowing network
resources to be shared by large numbers of end users. LAN switches are packet
switches that can support multiple simultaneous transmissions, reading the destination
address of each frame and forwarding it directly to the port associated with the target
device. There is a figure of switch with 8 ports.
When we use the term switch, we must be careful because a switch can mean
two different things. We must clarify the term by adding the level at which the device
operates. We can have a two-layer switch or a three-layer switch. A three-layer
switch is used at the network layer; it is a kind of router. The two-layer switch
performs at the physical and data link layers.
6.1.1 Two-Layer Switches
A switch works at Layer 2 of the OSI model (data-link). It is a LAN device
that can also be called a multi-port bridge. A switch switches Ethernet frames between
Ethernet devices. This switches do not care about IP addresses nor do they even
examine IP addresses as the frames flow through the switch. However, unlike a hub
that just duplicates data and sends it out all ports.
A two-layer switch, as a bridge does, makes a filtering decision based on the
MAC address of the frame it received. However, a two-layer switch can be more
sophisticated. It can have a buffer to hold the frames for processing. It can have a
switching factor that forwards the frames faster. Some new two-layer switches, called
cut-through switches, have been designed to forward the frame as soon as they check
the MAC addresses in the header of the frame.
A bridge with a few ports can connect a few LANs together. A bridge with
many ports may be able to allocate a unique port to each station, with each station on
its own independent entity. This means no competing traffic (no collision, as we saw
in Ethernet).
packets. A three-layer switch is a router, but a faster and more sophisticated. The
switching fabric in a three-layer switch allows faster table lookup and forwarding.
According to the configuration and monitoring capability of switches. It categories in
to two categories that is, Managed and Unmanaged Switches.
Unmanaged switches :
An unmanaged switch simply allows Ethernet devices to communicate with
one another, such as a PC or network printer, and those are typically what we call
“plug and play.” They are shipped with a fixed configuration and do not allow any
changes to this configuration.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Managed switches :
Managed switches provide all the features of an unmanaged switch and
provide the ability to configure, manage, and monitor your LAN. And this gives you
greater control over how data travels over the network and who has access to it. Also,
managed switches use protocols such as the Simple Network Management Protocol,
or what we call SNMP, for monitoring the devices on the network. SNMP is a
protocol that facilitates the exchange of management information between network
devices. SNMP queries can determine the health of the network or the status of a
particular device. By displaying this data in an easily understood format, IT managers
located at a central site can monitor the performance of the network and quickly
detect and repair network problems without having to physically interact with the
switch.
Another important feature of a managed switch is redundancy. Redundancy
provides the ability to safeguard a network in case a connection or cable fails by
providing an alternate data path for traffic. Managed switches incorporate what is
called Spanning Tree Protocol standard, or STP, to provide path redundancy in the
network. Using the spanning-tree algorithm, STP provides redundant paths while
preventing loops that are created by multiple active paths between switches. STP
allows for one active path at a time between two network devices, preventing loops
and establishing the redundant links as a backup to keep integrated systems available
and preventing expensive downtime, which network administrator can appreciate.
In a network where a LAN switch is used, each node gets a direct connection
to a switch. That is, a node gets a dedicated connection to the switch which only it
(the node or the computer) and the switch use. This dedicated connection makes it
possible for one node to maximize use of the bandwidth available to it. After all, no
other node is competing with it for bandwidth. This means speedy data transmission.
43http://san24mca.blogspot.com/
Moreover, the connection between the node and the switch can be made using
cabling which has a separate route for data that the node is sending out and a separate
route for data that the switch is forwarding to the node. This eliminates problems of
data collision. The LAN switch is especially a vast improvement over the network
hub since it has the ability to “read” the source and destination node of a data packet
and forward the packet only to the destination node. Whenever the node transmits
data meant for another node in the local area network, the switch intercepts the data,
determines the destination and forwards the transmission to its intended destination.
Since a data packet does not get broadcasted to unnecessary segments, network
congestion is minimized and network bandwidth is conserved.
6.3 VLAN
SANDEEP, MITHILESH , SYEDUL , RABI KANT
VLAN stands for virtual local area network. A LAN can be divided into
several logical LANs called VLANs. This virtual LAN is also an IP subnet. The
whole idea of VLAN technology is to divide a LAN into logical, instead of physical,
segments. Each VLAN is a work group in the organization. If a person moves from
one group to another, there is no need to change the physical configuration. The group
membership in VLANs is defined by software, not hardware. Any station can be
logically moved to another VLAN. All members belonging to a VLAN can receive
broadcast messages sent to that particular VLAN.
A virtual local area network (VLAN) is configured by software, not by
physical wiring. Membership in a VLAN can be based on port numbers, MAC
addresses, IP addresses, IP multicast addresses, or a combination of these features.
VLANs are cost and time-efficient, can reduce network traffic, and provide an extra
measure of security. In a traditional VLAN, switches tag the VLAN traffic, and only
the devices on the same VLAN can communicate with one another. If devices on
different VLANs need to communicate, they would talk to each other via a trunk port
on a router. That trunk port and the processing power of the router would create a
bottleneck for communications. With a Layer 3 switch, routing and trunking are
performed at very high speeds.
Besides the functionality mentioned above, a VLAN has a number of other
features such as:
Three basic VLAN types that are used to determine and control VLAN
membership assignments:
Port-based VLANs
SANDEEP, MITHILESH , SYEDUL , RABI KANT
7. NETWORK
TOPOLOGY
A network topology describes the configuration of a network (how the
network components are connected together).
Desired Performance
Desired Reliability
Size(No of nodes)
Expandability of the system
Cost of the components
45http://san24mca.blogspot.com/
switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair
Cables.
next and the previous), with the last terminal being connected to the first. Data is
transmitted around the ring in one direction only; each station passing on the data to
the next station till it reaches its destination.
Faulty workstations can be isolated from the ring. When the workstation is powered
on, it connects itself into the ring. When power is off, it disconnects itself from the
ring and allows the information to bypass the workstation. Information travels around
SANDEEP, MITHILESH , SYEDUL , RABI KANT
the ring from one workstation to the next. Each packet of data sent on the ring is
prefixed by the address of the station to which it is being sent to, when a packet of
data arrives, the workstation checks to see if the packet address is the same as its own.
If it is, it grabs the data in the packet. If the packet does not belong to it, it sends the
packet to the next workstation in the ring. Ring systems use 4 pair cables (separate
send/receive). The common implementation of this topology is token ring. A break in
the ring causes the entire network to fail.
No central hub.
No central cable.
Network devices connected in a ring formation from one device to the next. Data
travels from one device to another around the ring in one direction only. There's no
danger of collisions because data always flows in one direction. If a connection is
broken, the entire network goes down.
Advantages :
Easy to install
Add or delete is easy
Fault isolation is simplified
Disadvantages :
No central hub. Central cable to which all devices are attached. Data transmission
down the line from one device to another .Only one device transmits at a time. Easy to
implement and extend. Requires less cable length than a star topology BUT If there is
a problem with the cable, the entire network goes down. Performance degrades as
additional computers are added or on heavy traffic.
Advantage :
It has multiple links, so if one route is blocked then other routes can be used
for data communication.
Each connection can have its own data load, so the traffic problem is
eliminated.
It ensures the data privacy or security, because every message travels along a
48http://san24mca.blogspot.com/
dedicated link.
Troubleshooting of this topology is easy as compared to other networks.
Its performance is not affected with heavy load of data transmission.
A mesh topology is robust.
Point to point links make fault identification and fault isolation easy
Disadvantage :
It becomes very expensive because a large number of cabling and 110 ports
are required.
It is difficult to install.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
49http://san24mca.blogspot.com/
Figure(ii):-Hybrid topology
8. OSI REFERENCE MODEL
ISO is the organization.OSI is the model. The ISO is International Standard
Organization. An ISO that cover all aspect of network communication is the Open
system Interconnection model. An open system is a set of protocols that allows any
two different systems to communicate regardless of their underlying architecture. The
OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.OSI is Open Systems
Interconnection. No one really uses this in the real world. A reference model so
others can develop detailed interfaces. Task of communication broken up into
modules or layers Value: The reference model defines 7 layers of functions that take
place at each end of communication and with each layer adding its own set of special
related functions.
Each layer expects some service from its lower layer, and provides some service to its
higher layer
The physical layer is responsible for movements of individual bits from one
hop (node) to the next. Physical interface between data transmission device (e.g.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
The data link layer is responsible for moving frames from one hop (node) to the next.
It makes the physical layer appear error- free to the upper layer (network layer). It ensures
reliable communication between two directly connected nodes. Higher layers can think that a
SANDEEP, MITHILESH , SYEDUL , RABI KANT
reliable link exists between two machines, and not worry about noise, attenuation, error etc. It
Deals with framing, flow control, error control etc. It responsible for Hop-to-Hop
delivery.
Figure:-Datalink layer
Framing->The data link layer divides the stream of bits received from the network
layer into manageable data units called frames.
Physical addressing->If frames are to be distributed to different systems on the
network, the data link layer adds a header to the frame to define the sender and/or
receiver of the frame.
Flow control->The data link layer imposes a flow control mechanism to avoid
overwhelming the receiver.
Error control->Error control is normally achieved through a trailer added to the end
of the frame. It also uses a mechanism to recognize duplicate frames.
Access control->When two or more devices are connected to the same ink, data link
layer protocols are necessary to determine which device has control over the link at
any given time.
52http://san24mca.blogspot.com/
The network layer is responsible for the delivery of individual packets from
the source host to the destination host.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Figure:-Network layer
Routing : Network layer deals primarily with routing , sending packets from
source to destination when they are not directly connected. Packets may not
reach in order, get lost etc.
The transport layer is responsible for process to process delivery of the entire
message. A process is an application program running on a host.
Figure:-Transport layer
Figure:-Session layer
Translation-At the sender changes the information from its sender dependent
format into a common format. The presentation layer at the receiving machine
changes the common format into receiver-dependent format.
The application layer is responsible for providing services to the user. The
application layer enables the user, whether human or software, to access the network.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other type of distributed
information services.
Figure:-Application layer
9. Firewall
A Firewall is hardware, software, or a combination of both that is used to
prevent unauthorized programs or internet users from accessing a private network
and/or a single computer. The word firewall originally referred literally to a wall,
which was constructed to halt the spread of a fire. In the world of computer firewall
protection, a firewall refers to a network device which blocks certain kinds of network
traffic, forming a barrier between a
trusted and an untrusted network. It is
analogous to a physical firewall in the
sense that firewall security attempts to
block the spread of computer attacks.
This type of firewall has a list of firewall security rules which can block traffic
SANDEEP, MITHILESH , SYEDUL , RABI KANT
based on IP protocol, IP address and/or port number. Under this firewall management
program, all web traffic will be allowed, including web-based attacks. In this
situation, you need to have intrusion prevention, in addition to firewall security, in
order to differentiate between good web traffic (simple web requests from people
browsing your website) and bad web traffic (people attacking your website).A packet
filtering firewall has no way to tell the difference. An additional problem with packet
filtering firewalls which are not stateful is that the firewall can't tell the difference
between a legitimate return packet and a packet which pretends to be from an
established connection, which means your firewall management system configuration
will have to allow both kinds of packets into the network.
An application firewall actually examines the data in the packet, and can
therefore look at application layer attacks. This kind of firewall security is similar to
intrusion prevention technology, and, therefore, may be able to provide some of the
same functionality.
There are three caveats, however: first, for some vendors, the definition of
"deep" extends to some particular depth in the packet and does not necessarily
examine the entire packet. This can result in missing some kinds of attacks. Second,
depending on the hardware, a firewall may not have adequate processing power to
handle the deep packet inspection for your network. Be sure to ask questions about
how much bandwidth it can handle while performing such inspection. And finally,
embedded firewall management technology may not have the flexibility to handle all
attacks.
57http://san24mca.blogspot.com/
Similar to deep packet inspection except that the firewall understands certain
protocols and can parse them, so that signatures or rules can specifically address
certain fields in the protocol. The flexibility of this approach to computer firewall
protection is great and permits the signatures or rules to be both specific and
comprehensive. There are no specific drawbacks to this approach to firewall security
as generally it will yield improvements over a standard "deep packet inspection"
approach. However, some actual attacks may be overlooked (false negatives) because
the firewall security parsing routines are not robust enough to handle variations in
real-world traffic.
Firewalls rules can be customized as per your needs, requirements & security
threat levels. You can create or disable firewall filter rules based on such conditions
as:
flowing in.
A hardware firewall is a small box that connects between your computer and
your modem. Hardware firewalls are usually routers with a built in Ethernet card and
hub. Your computer or computers on your network connect to this router & access the
web. Hardware firewalls can be purchased as a stand-alone product but more recently
hardware firewalls are typically found in broadband routers, and should be considered
an important part of your system and network set-up, especially for anyone on a
broadband connection. Hardware firewalls can be effective with little or no
configuration, and they can protect every machine on a local network. Most hardware
firewalls will have a minimum of four network ports to connect other computers, but
for larger networks, business
networking firewall solutions
are available. A hardware
firewall uses packet filtering
59http://san24mca.blogspot.com/
9.5.1 Advantages
1. A feeling of increased security that your PC and contents are being protected.
2. Relatively inexpensive or free for personal use.
3. New releases are becoming user friendly.
4. You can monitor incoming and outgoing security alerts and the firewall
company will record and track down an intrusion attempt depending on the
severity.
5. Some firewalls but not all can detect viruses, worms, Trojan horses, or data
collectors.
6. All firewalls can be tested for effectiveness by using products that test for
leaks or probe for open ports.
9.5.2 Disadvantages
The advantages of unified security lies in the fact that rather than administering
multiple systems that individually handle antivirus, content filtering, intrusion
prevention and spam filtering functions, organizations now have the flexibility to
deploy a single UTM appliance that takes over all their functionality into a single rack
mountable network appliance.
perfection.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
1. Reduced complexity:
Single security
solution. Single
Vendor. Single AMC
2. Simplicity: Avoidance
of multiple software
installation and
maintenance
3. Easy Management:
Plug & Play
Architecture, Web-
based GUI for easy
management
4. Performance: Zero-
hour protection without degrading the network performance
5. Troubleshooting: Single point of contact – 24 × 7 vendor support
6. Reduced technical training requirements, one product to learn.
7. Regulatory compliance
10.3 Features
62http://san24mca.blogspot.com/
2. Anti Virus
3. Web Proxy
5. Http Proxy
6. spam filters
7. internet filter
SANDEEP, MITHILESH , SYEDUL , RABI KANT
11. PROTOCOL
A protocol is
a set of rules that
govern data
communications. It
represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating, just as a
person speaking French cannot be understood by a person who speaks only
Japanese.
Transferring files from one computer to another is one of the most common
tasks expected from a networking or internetworking environment. As a matter of
fact, the greatest volume of data exchange in the Internet today is due to file transfer.
Telnet allows you to interact with an application running on a remote computer, but it
has no facility for enabling you to copy a file from that computer’s hard disk to yours,
nor for you to upload files to the remote system. That function is carried out using
File Transfer Protocol (FTP).The FTP specification caters for several different file
types, structures and transfer modes, but in practice FTP implementations recognize
either text files or binary files. Text files are converted from their native format to 7-
bit ASCII with each line terminated by a carriage-return, line-feed pair for
transmission. They are converted back to the native text file format by the FTP client.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
FTP therefore provides a cross-platform transfer mechanism for text files. Binary files
are transmitted exactly as-is.
The well-known port 21 is used for the control connection and the well-known port 20
for the data connection.
• Command:
ftp <domain_name>
ftp <ip_address>
• Two connections established: A control connection over port 21, that remains
all through a session.
• A temporary port number, used for every file being transferred.
• New connection established for every file transfer.
• Why required?
1. For using software only available on the remote host.
2. For using devices (like printer) connected to the remote host.
• Typical scenario
Many users do a telnet to a remote server, and work there.
• Server is a bigger and faster computer.
• By default connection is established over port 23.
• Any other port number can also be specified.
telnet sca.kiit.ac.in 25
Data is sent, usually as 7-bit ASCII, in TCP packets (which you may recall are
called segments). A byte value of 255, interpret as command (IAC), means that the
bytes which follow are to be treated as Telnet commands and not user data. This is
immediately followed by a byte that identifies the command itself, and then a value.
Many commands are fixed length, so the byte after that, if not another IAC, would be
treated as user data. To send the byte 255 as data, two consecutive bytes of value 255
are used.
Operation Phases
server?
a) Connection setup
telnet servername 25
b) Exchange of command-response
• A TCP connection gets
pairs established over port number
c) Connection termination 25.
• The telnet client and the mail
a) Connection Setup server can now start a dialogue.
• Sender opens TCP connection
with receiver. 11.4 POP3
• Once connected, receiver • The client POP3 software is
identifies itself. installed on the recipient
220 <domain> service ready machine, and the server POP3
software installed on mail • • Some SMTP implementations
server. do not adhere to standard.
• The client (user agent) opens a • CRLF, truncate or wrap long
connection with the server on lines, removal of white space,
TCP port number 110. etc.
• Sends user name and password. Overview of MIME
• Can access the mails, one by • Five new message header
one. fields:
• Two modes: • MIME-version
• Delete mode – mails deleted as • Content-type
they are read • Content-transfer-encoding
• Keep mode – mails remain in • Content-Id
the mailbox • Content-description
• POP3 has commands for: • A number of content types and
• Log in transfer encoding formats
• Log out have been defined.
• Fetch messages Content Types
• Delete messages • Text body
IMAP4 • Multipart
• Provides the following extra • Mixed, Parallel, Alternative
features: • Message
• A user can check the email • RFC 822, Partial,
header before downloading. • External-body
68http://san24mca.blogspot.com/
UNIT - 2
SEVERS
A computer, or a software package, that provides a specific kind of service to
client software running on other computers. The term can refer to a particular piece of
software, such as a WWW server, or to the machine on which the software is running,
e.g. "Our mail server is down today, that's why e-mail isn't getting out." A single
server machine can (and often does) have several different server software packages
running on it, thus providing many different servers to clients on the network.
Sometimes server software is designed so that additional capabilities can be added to
the main program by adding small programs known as servlets
1. WEB SERVER
A web server is a computer programs that delivers (serves) content, such as this
web page, using the Hypertext Transfer Protocol.
In other word, a web server is a computer that stores websites and their related
71http://san24mca.blogspot.com/
files for viewing on the Internet. Visitors wishing to access the sites and files simply
type in the corresponding URL to the site they wish to view. Web hosting is big
business in the age of electronic commerce.
Every Web server has an IP Address and possibly a domain name. For example, if
you enter the URL http://www.pcwebopedia.com/index.html in your browser, this
sends a request to the server whose domain name is pcwebopedia.com. The server
then fetches the page named index.html and sends it to your browser. Any Computer
can be turned into a Web server by installing server software and connecting the
machine to the Internet. There are many Web server software applications, including
public domain software from NCSA and Apache, and commercial packages from
Microsoft, Netscape and others.Here is mainly two type of server use in wide range
are: - IIS and Apache web server.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
1.1 IIS
IIS is used to make your computer a web server. If we want to have a web server for
developing dynamic websites or want to publish website on our own server then we
install the IIS. IIS is used on windows plate form. For other plate form we have
different web servers. E.g. apache for Linux. IIS takes request from user and executes
(response) the required files and sends result back to the user.
1.1.1 Installation
To install IIS you must have your operating systems CD (Win XP or Win 2K). Click
Start, point to Control Panel and click Add or Remove Programs.
In the Internet Information Service (IIS) dialog box, put a check mark in
the World Wide Web Service check box and click OK
74http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Click OK on the Application Server dialog box
After installation of IIS a user will be able to configure IIS according to his/her
requirement.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
1.1.2 Security Features
Authentication changed slightly between IIS 6.0 and IIS 7, most notably in that the
anonymous user which was named "IUSR_{machinename}" is a built-in account in
Vista and future operating systems and named "IUSR". Notably, in IIS 7, each
77http://san24mca.blogspot.com/
authentication mechanism is isolated into its own module and can be installed or
uninstalled.
functionality and performance. The majority of web servers using Apache run a Unix-
like operating system.
1.2.1 Features
1.2.2 Use
78http://san24mca.blogspot.com/
Apache is primarily used to serve both static content and dynamic Web pages
on the World Wide Web. Many web applications are designed expecting the
environment and features that Apache provides.
Apache is used for many other tasks where content needs to be made available
in a secure and reliable way. One example is sharing files from a personal computer
over the Internet. A user who has Apache installed on their desktop can put arbitrary
files in Apache's document root which can then be shared.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2. TEMINAL SERVER
The Terminal Server component of the Microsoft Windows Server™ 2003
operating system can deliver the Windows desktop, in addition to Windows-based
applications, from a centralized server to virtually any desktop computing device,
including those that cannot run Windows. Terminal Services transmits only the user
interface of the program to the client computer. Terminal services in windows Server
2003 can enhance an enterprise’s deployment capabilities for a variety of scenarios,
allowing substantial flexibility in application and management infrastructure. The
client computer then returns keyboard and mouse clicks to be processed by the server.
Terminal Server uses the Remote Desktop Protocol (RDP) to communicate between
client and server. Client computers connecting to the terminal server can run
Windows (including the Microsoft™ Windows™ CE operating system) or run on
other operating systems such as the Apple Macintosh or even UNIX (using a third-
party add-on). Each user sees only their individual session, which is managed
transparently by the server operating system and is independent of any other client
session.
This system allows terminal servers to obtain and manage terminal server
client access license (TS CAL) tokens for devices and users connecting to a terminal
server.
2.2 Components
80http://san24mca.blogspot.com/
Component Description
RdpDD.sys Captures the Windows user interface and translates it into a form
that is readily converted by RDPWD into the RDP protocol
Termdd.sys The RDP protocol, which listens for RDP client connections on a
TCP port.
Tdtcp.sys Packages the RDP protocol onto the underlying network protocol,
TCP/IP.
Wlnotify.dll Runs in the session’s WinLogon process to create processes in the
user session.
Win32k.sys Manages the Windows GUI environment by taking the mouse and
keyboard inputs and sending them to the appropriate application.
WinLogon.exe This system service handles user logons and logoffs and processes
the special Windows key combination Ctrl-Alt-Delete. WinLogon
is responsible for starting the Windows shell (which is usually
Windows Explorer).
portion of the image into physical memory with pointers from the virtual kernel
address space for that session if Win32k.sys has not already been loaded. By design, it
always attaches to a previously loaded image’s code (Win32k.sys) if one already
exists in memory (that is, from any active application or session). The data (or non-
shared) section of this image is then allocated to the new session from a newly created
Session Space pageable kernel memory section.
Unlike the console session, Terminal Server client sessions are configured to
load separate drivers for the display, keyboard, and mouse. The display driver is the
Remote Desktop Protocol (RDP) display device driver (rdpdd.dll), and the mouse and
keyboard drivers are replaced with the RDP driver Rdpwd.sys. These drivers allow
the RDP client session to be both available and interactive, remotely. Finally,
Terminal Server also invokes a connection listener thread for the RDP protocol
(Termdd.sys), which listens for RDP client connections on a TCP port.
At this point, the CSRSS process exists under its own SessionID namespace,
with its data instantiated per process as necessary. Any processes created from within
this SessionID will execute within the Session Space of the CSRSS process
automatically. This prevents processes with different SessionIDs from accessing
another session data.
terminal servers. For terminal servers that are running Windows Server 2003, there
are two types of Terminal Server CALs:
Per Device
Per User
Which CAL you choose depends on how you plan to use Terminal Server. By default,
Terminal Server is configured in Per Device mode, but it can be switched to Per User
mode using the Terminal Services Configuration tool (TSCC.msc). You can serve
both license types from the same license server.
A Terminal Server license server on your network manages the Terminal Services
CALs. A license server stores all Terminal Server CAL tokens that have been
SANDEEP, MITHILESH , SYEDUL , RABI KANT
installed for a terminal server and tracks the license tokens that have been issued to
clients.
which the user accesses Terminal Server. Check the EULA for the applications that
you plan to host to determine if they support per user licensing.
Next, create an account for your additional server on the Windows Small Business
Server network, and then join the server to the network.
25. Provide the file system location where the license server database
should be installed on the Terminal Server license server, click Next,
and then click Finish. The default location for the license server
database is systemroot\System32\LServer.
longer allow clients to connect unless it locates a Terminal Server license server to
issue client licenses. Licensing wizard properties, such as activation method and
company information, set during the activation process, can be changed later.
Small Business Server 2003, your users’ data will be backed up along with the rest of
the server. For information about redirecting users’ My Documents folders from the
terminal server to the Windows Small Business Server 2003, click Start, click Help
and Support, and then search for "Folder redirection."
To ensure that users’ My Documents folders synchronize with the server, tell the
users to log off from their terminal server sessions rather than simply close the
session.
Step 8: Install Client Applications
You can use the client applications on the computer running Windows Small
Business Server 2003 and install them on the terminal server. You can also install
other client applications on the terminal server. For more information about installing
and running applications with Terminal Server, click Start, click Help and Support,
and the search for "Terminal Server." For more information about installing Microsoft
Office 2003 in a Terminal Server environment, see the whitepaper "Deploying Office
2003 in a Windows Terminal Services Environment" at the Microsoft Web site
(http://go.microsoft.com/fwlink/?LinkId=24921).
Installing Outlook
You can install Microsoft® Office Outlook® 2003 on the terminal server from the
server running Small Business Server 2003.
To install Outlook
Finish. Ensure that you close the wizard that launches along with Setup.
Installing Internet Explorer :
You do not need to install Internet Explorer on the terminal server; the correct version
of Internet Explorer is included with Windows Server 2003. The Favorites menu and
connection settings are configured by Client Setup. Some links on the Favorites menu
point to items that require the installation of Microsoft ActiveX® controls or
certificates. To prepare Internet Explorer for these links, use the following procedure.
running Windows Small Business Server 2003. For more information about hosting
Fax Services on the additional server, click Start, click Help and Support, and then
search for "Using Fax."
To configure Fax Services for Terminal Server users, you need to configure the
terminal server and each client computer that will use the service. Use the following
procedure to configure the terminal server for using fax. When you are configuring
the client computers to use the Terminal Server, you will also need to configure the
client computers to use fax.
Connection, and then log on to the terminal server using the Remote
Desktop Connection.
42. Click Start, click Printers and Faxes, and then double-click Add a
printer. The Add Printer wizard starts.
43. Click Next.
44. Click A network printer, or a printer attached to another computer,
and then click Next.
45. Click Find a printer in the directory, and then click Next .
46. In the Find Printers dialog box, click Find Now.
In the search results list, a printer named Fax should appear. Select the printer
named Fax, and then click OK.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
47. Click No when asked if you want to set this printer as the default
printer, and then click Finish.
Client
To connect to Terminal server remotely following step required.
Click Start, click All Programs, click Accessories, click Communication, and then
click Remote Desktop Connection.
89http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
After Click on the Connect button the client will be connected to the terminal server
and a terminal server GUI interface will appear on the client computer .
2.5 Advantages
Advantage Description
Rapid, Terminal server is great for rapidly deploying Windows-based application
centralized to
deployment of computing devices across an enterprise- especially applications that are
applications frequently updated, infrequently used, or hard to manage.
When an application is managed on terminal Server, and not on each
device,
administrators can be certain that users are running the latest version of
the
application.
Low-bandwidth Terminal server considerably reduces the amount of network bandwidth
access to data required
to access data remotely. Using Terminal Server to run an application over
bandwidth-constrained connections, such as dial-up or shared WAN links,
is very
effective for remotely accessing and manipulating large amount s of data
because
only a screen view of the data is transmitted, rather than the data itself.
Windows Terminal Server helps users become more productive by enabling access
90http://san24mca.blogspot.com/
anywhere to
current applications on any device- including under-powered hardware
and
Non-Windows desktops. And because Terminal Server lets you use
Windows anywhere, you can take advantage of extra processing
capabilities from newer, lighter-weight devices such as the Pocket PC.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
3.1 Installation :
91http://san24mca.blogspot.com/
Both the system partition and the partition on which we install WSUS 3.0 SP2
must be formatted with the NTFS file system.
Minimum 1 GB of free space on the system partition.
Minimum 2 GB of free space on the volume on which database files will be
SANDEEP, MITHILESH , SYEDUL , RABI KANT
stored.
Minimum 20 GB of free space is required on the volume on which content is
stored, 30 GB is recommended
5. In the SQL setup dialog enter the SQL server instance for WSUS.
If WSUS database was installed with the default WMSDE database then
enter LOCALHOST\WSUS in the SQL Instance textbox.
If WSUS database was installed on a different SQL server then enter the
name of the SQL server in the SQL Instance textbox.
Enter the default Root web location for WSUS. Enter a website title and footer for the
WSUS Easy Reporter website. Click ‘Next’.
6. In the Select Installation Address dialog choose the site that WSUS is installed
in (Default is Default Web Site).
93http://san24mca.blogspot.com/
* A new website can be created beforehand and then chosen. The website will have to
have host headers set and our DNS server should have an alias (CNAME) created for
the site. Enter a virtual directory name. This is the name that we will connect to in the
address bar of our browser (i.e. http://LOCALHOST/WSUSReports). Click ‘Next’.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
pane.
3. If we choose to synchronize from another WSUS server, specify the server
name and the port on which this server will communicate with the upstream
server.
4. To use SSL, select the Use SSL when synchronizing update information check
box. In that case the servers will use port 443 for synchronization. (Make sure
that both this server and the upstream server support SSL.)
5. If this is a replica server, select the “This is a replica of the upstream server”
check box.
6. At this point, we are finished with upstream server configuration. Click Next,
or select Specify proxy server from the left navigation pane.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Save and download information about our upstream server and proxy server.
Choose the language of the updates.
Select the products for which we want to receive updates.
Choose the classifications of updates.
Specify the synchronization schedule for this server.
In Windows Server Update Services 3.0 (WSUS 3.0 SP2), the WSUS Setup
automatically configures IIS to distribute the latest version of Automatic Updates to
each client computer that contacts the WSUS server. The best way to configure
Automatic Updates depends on the network environment. In an environment that uses
Active Directory service, we can use an existing domain–based Group Policy object
(GPO) or create a new GPO. In an environment without Active Directory, use the
Local GPO. In this step, we will configure Automatic Updates and then point the
client computers to the WSUS server.
95http://san24mca.blogspot.com/
SANDEEP, MITHILESH , SYEDUL , RABI KANT
4. BLADE SERVER
A blade server is a stripped down server computer with a modular design
optimized to minimize the use of physical space and energy Features and
specifications
4.2 FEATURES
The different blade manufacturers vary in specific configurations for their blade
servers and chassis, but the focus still remains to strip extraneous components from
the blades so the blades' components can focus on essential processing and services.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Each blade is a server by itself and generally dedicated to a single computing task
such as file sharing, SSL, data processing, Web page serving, cache management
,video/audio streaming, or firewall etc. Blade servers provide greater I/0 connectivity,
hot swap drives, and RAID-5 capabilities.
4.2.1 Virtualization
In a single blade chassis, you can have different operating systems, different memory
capacities, a mix and match of 32-bit or 64-bit CPUs, and so on. Once you have these,
you can always run virtualization software on top. Also, blades let you pair your
dynamic software with dynamic hardware, making deployment and management of
virtual servers much easier.
4.2.3 Power:
The blade relies on the chassis to provide Power. In all chassis power switching
balances power load and requirements across the component blades' demands. The
technology ensures that power isn't wasted running underused blades, but in times of
high demand there is sufficient power available. Employing power supply unit
redundancy is necessary for critical servers.
4.2.4 Cooling
A full chassis may generate considerable heat from the activity of component blades,
so high demand blade servers require effective cooling from their chassis to operate
efficiently. The chassis' internal management systems may shut down the entire
system if the temperature rises above a certain point. It's critical, then, to follow the
directions of the blade server chassis' manufacturer when managing the server's
cooling. This might include air space around the chassis, the use of plugs for empty
97http://san24mca.blogspot.com/
4.2.5 Storage
There may be some limited storage on a blade server, and there may be additional
storage provided by a chassis. However, with the use of a SAN ,the chassis and blades
can be completely free of storage, removing the inherent heat, noise, and reliability
problems from the system completely. Everything from booting to data storage can be
done over the SAN, enabling the blade servers to be focused entirely on processing.
This configuration can increase reliability and reduce space requirements by
partitioning storage resources in one centralized location and computing resources in
another. This also eliminates storage Despite the advantages of storage outside the
blade chassis, many blades have the capacity to take one or two hard drives, usually
SATA.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
4.3 SPECIFICATION
Environment
Memory Size Air temperature :
Minimum :512 Height: 24.5 cm Blade server on :100 C to 350C
MB Depth: 44.6 cm Altitude : 0 to 914 m
Maximum : 4 Width: 2.9 cm Blade server off : -400 to 600C
GB Maximum weight: 5.4 kg Humidity
Blade sever on : 8% to 80%
Blade server off : 5% to 80%
NOTE: The OS in the blade server must provide USB support for the blade server to
recognize and use the keyboard ,mouse ,CD-ROM drive , and diskette drive. The
blade center unit uses USB
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2. Management server
3. SAN
4.4.1.Chassis: The chassis forms the housing for the blade servers, providing the necessary
services for the blades. Chassis vary in the number of blades they accept, usually from 6 to
16. It has two view front view and rear view and in between these two view there is a
mother board of blade server
PM PM SM MM FM
PM PM SM MM FM
BLOWER Rear view
BLADES
Mother board
Front view
PM stands for Power module , which manage the power control for blade server.
All the 4 power module work simultaneously and if one fails then other take care of
the power control.
SM stands for Switch module , which is connected with layer 3 switch . Both the
switch module work simultaneously and if one fail then other take care of them.
MM stands for management module . It manage all the deices within a chassis . Here
one is primary and another is secondary .When primary works then secondary holds
the idle condition .This is called the heart of the System.
FM stands for fiber module .Which is connected with SAN. Both the fiber module
work simultaneously and if one fail then other take care of them
It use the IBM directory server software and installed in any of the Blade . The blade
which has that software will act as an administrator . It manage all the blades. It has
two hard disk and a processor of 3.0 MHz
SANDEEP, MITHILESH , SYEDUL , RABI KANT
A KVM ( Keyboard ,
Visual Display Unit,
Mouse) switch is a
hardware device that
allows a user to control
multiple computers from
a single keyboard, video
monitor and mouse.
Although multiple
computers are connected to the KVM, typically a smaller number of computers can be
controlled at any given time.
100http://san24mca.blogspot.com/
4.5 RAID
Redundant Array of Independent Disks (RAID) is the combining of several hard drive
into a single unit. There are a number of RAID levels, among them the most popular
are RAID 0, RAID 1 and RAID 5, which require controllers to support them. Two
or more disk drive are combined and the result is fault tolerance and good
performance. These disks drives are usually used on servers .
disks
In a RAID 0 system, data
are split up in blocks that
get written across all the
drives in the array. By
using multiple disks (at 2 n 0
RAI least 2) at the same time, (none
D 0 RAID 0 offers superior )
I/O performance. This
performance can be
enhanced further by using
multiple controllers,
ideally one controller per
disk
Data are stored twice by
writing them to both the
data disk (or set of data
disks) and a mirror disk 1
(or set of disks).If a disk 2 (size n-1
RAI fails, the controller uses of the disks
D1 either the data drive or small
the mirror drive for data -est
recovery and continues disk)
operation
larger. Instead of a
dedicated parity disk,
parity information is
spread across all the
drives. You need at least
3 disks for a RAID 5
array
still acceptable.
Like RAID 3, this
is complex
technology.
4.6 CONFIGURATION
The following configuration programs are provided with the blade server:
1.Configuration /Setup Utility program : This is part of the basic input /output
system(BIOS) code in blade server .
SANDEEP, MITHILESH , SYEDUL , RABI KANT
2.PXE boot agent utility program : The Preboot eXecution Environment(PXE) boot
agent utility program is part of the BIOS code in the blade server . Use it to select the
boot protocol and other boot options.
NOTE : If you forget the power-on password , you can regain access to the blade
server through one of the following methods
Change the position of the power-on password override switch to bypass the
power-on password check the next time the blade server is turned on .
NOTE : Shut down the OS ,turn off the blade server , and remove the blade server
from the BladeCenter unit to access the switches.
Start Options : Select this choice to view or change the start options . This
choice appears only on the full Configuration / Setup Utility main menu .
Advance Setup : Select this choice to change setting for advanced hardware
features .
System Partition Visibility : Select this choice to specify whether the System
Partition is to be visible or hidden .
Memory Settings : Select this choice to manually enable a pair of memory
SANDEEP, MITHILESH , SYEDUL , RABI KANT
DIMMs.
CPU options : Select this choice to enable or disable the microprocessor
cache .
PCI Bus Control : Select this choice to view and set interrupts for PCI
devices and to configure the master-latency-timer value for the blade server.
Integrated System Management Processor Settings : Select this choice to
enable or disable the Reboot on System NMI option on the menu . If you
enable this option , the blade server will automatically restart 60 seconds after
the services processor issues a Non-Maskable Interrupt (NMI) to the blade
server .
Error Logs : Select this choice to view or clear the POST error log.
Select POST Error Log to view the three most recent error codes and messages .
Save Settings : Select this choice to save the changes , made in the settings.
Restore Settings : Select this choice to cancel the changes , made in the
setting and restore the previous settings.
Load Default Settings : Select this choice to cancel the changes ,made in the
setting and restore the vendor’s settings.
Exit Setup : Select this choice to exit from the Configuration /Setup Utility
program . If you have not saved the changes you have made in the settings,
you are whether you want to save the changes or exit without saving them.
2.When the Broadcom NetXtreme Boot Agent vX.X.X prompt appears ,press
Ctrl+S.
NOTE:
If the PXE setup prompt is not displayed ,use the Configuration /Setup Utility
104http://san24mca.blogspot.com/
3. Use the arrow keys or press Enter to select a choice from the menu.
4. Follow the instructions on the screen to change the setting of the selected items ,
then press Enter .
Two Ethernet controllers are integrated on the blade server system board which
enables simultaneously transmission and reception of data on the Ethernet Local Area
Network (LAN). However a device driver must install to enable the blade server OS
to address the Ethernet controllers . For device drivers and information about
configuring your Ethernet controllers use the Broadcom NetXtreme Gigabit Ethernet
Software .Ethernet controllers support failover, which provides automatic redundancy
for Ethernet controllers . Without failover only one Ethernet controller from each
server attached to each virtual LAN or subnet. With failover you can configure more
than one Ethernet controller from each server to attach to the same virtual LAN or
subnet . If you have configured the controllers for failover and the primary link fails ,
the secondary controller takes over . When the primary link is restored , the Ethernet
traffic switches back to the primary Ethernet controller
4.8.1 ADVANTAGES
Take less space : Greater density and better use of the server form factor highly
reduces the total space requirements of the blade server deployment as compared to
tower or rack mounted servers.
105http://san24mca.blogspot.com/
Single monitor : KVM switch helps to monitor all the server by only one system .
Easier Physical Deployment : Since the chassis is responsible for providing the once
redundant parts of a server, deployment of a blade server simply involves the
placement of the chassis and sliding in the blades. Redundant power modules and
consolidated communication bays simplify integration into data centers.
4.8.2 DISADVANTAGES
Expensive configuration
Although plugging in a new server blade into the blade server is easy once the system
is running, initial configuration can be labor-intensive and expensive in complex
application environments. This disadvantage comes with the fact that blade servers
are specialized computing equipment and their configuration and administration often
requires training provided by the vendor which may not be cheap unless you have a
special free-training deal with the vendor.
If you do not fill the blade chassis with server blades, you are not fully utilizing it.
Blade chassis are often made to hold 14 or 16 server blades.
The general rule of thumb is that blade servers are not suitable and economical for
applications requiring less than 5-10 servers. Applications requiring less than 5-10
server blades (10-20 CPUs) are best devoted to standalone server systems.
106http://san24mca.blogspot.com/
Incompatible Chassis
Blade systems vary between manufacturers. Once you bought blade server from a
particular vendor, it is not always easy to switch to another vendor because of
servicing agreements and also because a competitor is unlikely going to have the
same expertise in your equipment as your vendor. You could theoretically use your
server blades in competitor's blade chassis, but practically blade chassis are not
standardized. It is unlikely that IBM would get together with Dell and HP to share
chassis. Chassis is what makes their products unique. Server blades are often designed
to only run in the company's own chassis.
Business case
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Blade servers are not the best solution for everything. If you have a very large
transaction processing application requiring high read/write ratios, then you may run
into bottle neck with your bus speeds, memory limitations, disk access, and network
I/O. Email and Web serving are situations where blade computing suits well.
One often forgotten disadvantage is HVAC. While individual stand-alone servers can
be distributed throughout the building and may not necessarily need special
accommodations for cooling, blade servers being very powerful these days produce
massive amounts of heat per square foot. If untreated, this could melt them down.
When purchasing blade servers, it is important to keep in mind that additional
resources will be needed also for HVAC.
5. DHCP SERVER
A DHCP
assigns IP addresses to client
computers. This is very often
used in enterprise networks to
reduce configuration efforts.
All IP addresses of all
computers are stored in a
database that resides on a
server machine.
DHCP supports four strategies for IP address allocation. These are independent
features. A particular server can offer any or none of them.
1. Manual. The unique client identifier-to-IP address binding has been made by
an administrator. Therefore the DHCP service should not reallocate IP
addresses of this type to other clients after the lease expires. This type of IP
address allocation is useful when the administrator wants a host to maintain
the same IP address but still wants to detect when an IP address is no longer
107http://san24mca.blogspot.com/
108http://san24mca.blogspot.com/
109http://san24mca.blogspot.com/
111http://san24mca.blogspot.com/
112http://san24mca.blogspot.com/
Enter the IP address range that you want to exclude and click on next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Select lease duration how long a client can use an IP address assigned to it
from this scope. It is recommended to add longer leases for a fixed network (in
the office for example) and shorter leases for remote connections or laptop
computers and click next
113http://san24mca.blogspot.com/
You are given a choice of whether or not you wish to configure the DHCP
options for the scope now or later. You can select Yes, I want to radio button
and click next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
Enter the router, or gateway, IP address click next. The client computers will
then know which router to use and click next
114http://san24mca.blogspot.com/
Enter the DNS and domain name settings can be entered. The DNS server IP
address will be distributed by the DHCP server and given to the client click
next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
If you have WINS setup then here is where to enter the IP Address of the
WINS server. You can just input the server name into the appropriate box and
press Resolve” to allow it to find the IP address itself click next
115http://san24mca.blogspot.com/
Now you need to activate this scope now and click next
SANDEEP, MITHILESH , SYEDUL , RABI KANT
DHCP Server new scope installation was finished and click finish
116http://san24mca.blogspot.com/
Now your server is now a DHCP server message and click finish
SANDEEP, MITHILESH , SYEDUL , RABI KANT
5.2 Configuring DHCP
117http://san24mca.blogspot.com/
the reservation name, desired IP address, MAC address and description – choose
whether you want to support DHCP or BOOTP and press add. The new reservation
will be added to the list.
SANDEEP, MITHILESH , SYEDUL , RABI KANT
So it is very easy to configure DHCP server in win server 2003 now you can
configure your windows client pc to check your DHCP server is working or not.
If you want to install and configure win server 2003 domain controller with DNS
setup check here .
5.3 Advantages and Disadvantages
Advantages :
allows a router to act as a BOOTP relay for an interface which has more than
one IP network or subnet IP address.
Here are some features that are not part of the DHCP server itself, but related to the
way it is administered.
Disadvantages:
1. Only some of the DHCP client implementations work properly with the DHCP
Server in windows server 2003.
2. The information in DHCP server is automatically delivered to all the DHCP clients
Thus , it become important to put correct information into DHCP server.
3. If there is a single DHCP server and it is not available, lease will not be requested or
renewed ,this way it will be single point of failure for the network.
4. In order to use DHCP on a multi segment network , DHCP server or relay agent
should be placed on each segment .you can also ensure that the router is forwarding
Bootstrap protocol Broadcasts.