0% found this document useful (0 votes)
21 views

NMA_Solution_UNIT_IV

Uploaded by

Rajitha Natti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

NMA_Solution_UNIT_IV

Uploaded by

Rajitha Natti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SSP, Gandhinagar COMPUTER DEPT.

Shree Swaminarayan Polytechnic, Gandhinagar

COMPUTER DEPARTMENT

Subject Name : NETWORK MANAGEMENT AND ADMINISTRATION


Subject Code : (3360703)
UNIT – IV NETWORK CONFIGURATION

1. Define Backup Server.


Ans. A backup server is a type of server that enables the backup of data, files, applications and/or
databases on a specialized in-house or remote server. It combines hardware and software
technologies that provide backup storage and retrieval services to connected computers, servers
or related devices. A backup server is generally implemented in an enterprise IT environment
where computing systems across an organization are connected by a network to one or more
backup servers.
A backup server consists of standard hardware server with substantial storage capacity, mostly
with redundant storage drives and a purpose built backup server application. The backup schedule
for each computer may be installed with a client utility application or configured within the host
operating system (OS). At the scheduled time, the host connects with the backup server to initiate
the data backup process. The backup may be retrieved or recovered in the event of data loss, data
corruption or disaster recovery.
In the context of a hosting or cloud service provider, a backup server is remotely connected
through the Internet on a Web interface or through vendor application programming interfaces
(API).

2. Describe Adding of Active Directory User Account.


Ans. To add User following steps are necessary.
 Step1
– Open the Active Directory Users and Computers console by going to the Start screen and then
clicking Active Directory Users And Computers.
 Step2
– To add user select the Users container in the left pane.
 Step3
– Then right-click the Users container, choose New from the pop-up menu, and choose User from
the submenu. Pop-up New Object – User dialog box.
 Step4
• Fill up first name, Initials, Last name, Full name, User logon name, User logon name(pre-
Windows 2000) then left- click Next button.
 Step 5 :
• On clicking the Next button a New Form will be opened in which you need to provide the
Password for the new user. Also select several options that apply to the account, as follows:
• User Must Change Password at Next Logon: Users to choose their own password
when they first log in to the system.
• User Cannot Change Password: Users are not allowed to change their password.
• Password Never Expires: The password to remain feasible for as long as the user
chooses to use it.
• Account Is Disabled: This option is disables the new account.

3. Explain working of shares.


Ans. Drives and folders under Server are made available to users over the network as shared resources,
simply called shares.
NMA [3360703] 1
SSP, Gandhinagar COMPUTER DEPT.
• Share permissions apply to users who connect to a shared folder over the network.
• Read
– Read is the default permission that is assigned to the Everyone group.
Read allows:– Viewing file names and subfolder names
– Viewing data in files
– Running program files
• Change
– Change is not default permission for any group. The Change permission allows all Read
permissions, plus:– Adding files and subfolders
– Changing data in files
– Deleting subfolders and files
• Full Control
– Full Control is the default permission that is assigned to the Administrators group on the local
computer. Full Control allows all Read and Change permissions, plus:
– Changing permissions (NTFS files and folders only)
• No access
– If you apply this permission to folder or file user cannot access those file and folder.
– If you set No access permission for every group the member of that group will also receive No
access because it overrides any other permission.

4. List steps to Modify, Delete User Account.


Ans.  Modify a User Account
Log On To: users can log on to any workstation in the domain, and the domain authenticates
them. In some cases, a system might require stricter security, some specific computers in which a
user account can log on.
 Delete a User Account
Step1
Use the Active Directory Users and Computers console. Open this console by going to the Start
screen and then clicking Active Directory Users And Computers.
Step2
Select the Users folder that contains the user account.
Step3
Right-click the user account and then click Delete.

5. Define Group. Explain windows security groups.


Ans.  Group Groups are used to collect user accounts, computer accounts, and other groups into
manageable units. Working with groups instead of with individual users helps simplify network
maintenance and administration.
• Groups appear in two of the domain’s containers: Builtin and Users.
• The built-in groups are fixed. They cannot be deleted or made members of other groups.
 Security groups
Security groups can provide an efficient way to assign access to resources on your network. By
using security groups, you can:
 Assign user rights to security groups in Active Directory.
User rights are assigned to a security group to determine what members of that group can
do within the scope of a domain or forest. User rights are automatically assigned to some
security groups when Active Directory is installed to help administrators define a person’s
administrative role in the domain. For example, a user who is added to the Backup
Operators group in Active Directory has the ability to back up and restore files and
directories that are located on each domain controller in the domain. This is possible
because, by default, the user rights Backup files and directories and Restore files and
directories are automatically assigned to the Backup Operators group. Therefore, members
of this group inherit the user rights that are assigned to that group. You can use Group
Policy to assign user rights to security groups to delegate specific tasks. For more

NMA [3360703] 2
SSP, Gandhinagar COMPUTER DEPT.
information about using Group Policy, see User Rights Assignment.

 Assign permissions to security groups for resources.


Permissions are different than user rights. Permissions are assigned to the security group for
the shared resource. Permissions determine who can access the resource and the level of
access, such as Full Control. Some permissions that are set on domain objects are
automatically assigned to allow various levels of access to default security groups, such as
the Account Operators group or the Domain Admins group. Security groups are listed in
DACLs that define permissions on resources and objects. When assigning permissions for
resources (file shares, printers, and so on), administrators should assign those permissions
to a security group rather than to individual users. The permissions are assigned once to the
group, instead of several times to each individual user. Each account that is added to a
group receives the rights that are assigned to that group in Active Directory, and the user
receives the permissions that are defined for that group.
Like distribution groups, security groups can be used as an email entity. Sending an email
message to the group sends the message to all the members of the group.

6. What is mapping drive?


Ans. The process of simulating a disk drive with a network share is called mapping.
• Many applications that store files on the network require that the network folders be accessible
as normal drive letters.
• To create a drive mapping follow these steps:
1. Open Network from the client computer
2. Locate the share you want to map, right-click it, and choose Map Network Drive.
3. In the dialog box that appears, the name of the domain and share will already be filled in for
you. Simply select an appropriate drive letter(D:,E:..) for the mapping
4. click OK.
5. From then on, the share will appear to your computer as that drive letter, and users will see this
share’s letter in My Computer.

7. Short note on resource sharing.


Ans. Shared resources, also known as network resources, refer to computer data, information, or
hardware devices that can be easily accessed from a remote computer through a local area
network (LAN) or enterprise intranet. Successful shared resource access allows users to operate
as if the shared resource were on their own computer. The most frequently used shared network
environment objects are files, data, multimedia and hardware resources like printers, fax
machines and scanners. Shared LAN points are used by a variety of system resources, such as
hard drives, printers, scanners and network cards. File and printer sharing occur via two network
communication mechanisms: peer-to-peer (P2P) sharing and the client-server network model.
Sharing network resources requires abiding by certain constraints, as follows:
 Security: Organizations present ongoing opportunities for unauthorized shared resources.
Security mechanisms should be implemented to provide efficient parameters.
 Compatibility: Various client-server operating systems may be installed, but the client
must have a compatible OS or application to access shared resources. Otherwise, the
client may encounter issues that create communication delays and requires
troubleshooting.
 Mapping: Any shared OS hardware drive, file or resource may be accessed via mapping,
which requires a shared destination address and naming conventions.
 File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared resources
because the Internet is FTP’s backbone. File sharing is an LAN concept.

8. How to add User in User Account? Explain.


Ans. Same as answer 2 above.

NMA [3360703] 3
SSP, Gandhinagar COMPUTER DEPT.

9. Explain Types of Group.


Ans. Groups are used to collect user accounts, computer accounts, and other groups into manageable
units. Working with groups instead of with individual users helps simplify network maintenance
and administration.
There are two types of groups in Active Directory:
 Distribution groups Used to create email distribution lists.
 Security groups Used to assign permissions to shared resources.

Distribution groups
Distribution groups can be used only with email applications (such as Exchange Server) to send
email to collections of users. Distribution groups are not security enabled, which means that they
cannot be listed in discretionary access control lists (DACLs).

10. Write down steps to create Shared Drive.


Ans. Step 1. Open either My Computer or Windows Explorer on the server.
Step 2. Right-click the folder or drive you want to share, and then choose Share from the pop-up
menu.
Step 3. In the field provided, enter enough of a user’s name to identify that person in the system,
and then click Add.
Step 4. Click the down arrow next to the user’s name to set that user’s permission level. The
permission levels available are Owner, for full read and write access, plus the ability to grant
permissions to other users; Contributor, for full read and write access; and Reader, for read-only
access.
Step 5. Click the Share button to create the share. You will see a confirmatory dialog box. Click
OK, and the share will be created.

11. Explain different types of Backup.


Ans. The purpose of most backups is to create a copy of data so that a particular file or application
may be restored after data is lost, corrupted, deleted or a disaster strikes. Thus, backup is not the
goal, but rather it is one means to accomplish the goal of protecting data. Testing backups is just
as important as backing up and restoring data. Again, the point of backing up data is to enable
restoration of data at a later point in time. The most common backup types are a full
backup, incremental backup and differential backup.

Full backups
The most basic and complete type of backup operation is a full backup. As the name implies, this
type of backup makes a copy of all data to another set of media, which can be tape, disk or a
DVD or CD. The primary advantage to performing a full backup during every operation is that a
complete copy of all data is available with a single set of media. This results in a minimal time to
restore data, a metric known as a recovery time objective (RTO). However, the disadvantages are
that it takes longer to perform a full backup than other types (sometimes by a factor of 10 or
more), and it requires more storage space.

Incremental backups
An incremental backup operation will result in copying only the data that has changed since the
last backup operation of any type. The modified time stamp on files is typically used and
compared to the time stamp of the last backup. Backup applications track and record the date and
time that backup operations occur in order to track files modified since these operations. Because
an incremental backup will only copy data since the last backup of any type, it may be run as
often as desired, with only the most recent changes stored. The benefit of an incremental backup
is that they copy a smaller amount of data than a full. Thus, these operations will complete faster,

NMA [3360703] 4
SSP, Gandhinagar COMPUTER DEPT.
and require fewer medium to store the backup.

Differential backups
A differential backup operation is similar to an incremental the first time it is performed, in that it
will copy all data changed from the previous backup. However, each time it is run afterwards, it
will continue to copy all data changed since the previous full backup. Thus, it will store more
data than an incremental on subsequent operations, although typically far less than a full backup.

12. Discuss different messages used by DHCP.


Ans. Following are the different messages used by DHCP:

• DHCPDISCOVER: Client broadcast to locate available servers. It is assumed at least one of


the servers will have resources to fulfill the request.

• DHCPOFFER: Server to client in response to DHCP Discover with offer of configuration


parameters.

• DHCPREQUEST: Client broadcast to servers requesting offered parameters from one server
and implicitly declining offers from all others.

• DHCPRELEASE: Client to server release network address and canceling current lease.

• DHCPACK: Server to client with configuration parameters, including committed network


address.

• DHCPNACK: Server to client refusing request for configuration parameters (eg. requested
network address already allocated).

NMA [3360703] 5

You might also like