Touch with us for Information Technology Solutions. Email us for your Query on Technical.gaurav@gmail.com.
Propellerads

18/10/2012

Install AD


This article was written when Windows Server 2008 was still RC1. Changes might occur later once the product is RTM'd

  1. If you have set up a domain controller previously with Windows 2000 Server, or Windows Server 2003, then you would be familiar with thedcpromo.exe command, it will also be used to set up a Domain Controller on Windows Server 2008. 

    To use the command, click on Start  > Run > and then write dcpromo > Click OK

  2. The system will start checking if Active Directory Domain Services ( AD DS) binaries are installed, then will start installing them. The binaries could be installed if you had run the dcpromo command previously and then canceled the operation after the binaries were installed.

                             

  3. The Active Directory Domain Services Installation Wizard will start, either enable the checkbox beside Use Advanced mode installationand Click Next , or keep it unselected and click on Next



    The following table lists the additional wizard pages that appear for each deployment configuration when you select the Use advanced mode installation check box.
    Deployment configuration
    Advanced mode installation wizard pages
    New forest
    Domain NetBIOS name
    New domain in an existing forest
    On the Choose a Deployment Configuration page, the option to create a new domain tree appears only in advanced mode installation.
    Domain NetBIOS name
    Source Domain Controller
    Additional domain controller in an existing domain
    Install from Media
    Source Domain Controller
    Specify Password Replication Policy (for RODC installation only)
    Create an account for a read-only domain controller (RODC) installation
    Specify Password Replication Policy
    Attach a server to an account for an RODC installation
    Install from Media
    Source Domain Controller

  4. The Operating System Compatibility page will be displayed, take a moment to read it and click Next

  5. Choose Create a new domain in a new forest, Click Next

  6. Enter the Fully Qualified Domain Name of the forest root domain inside the textboxclick Next

  7. If you selected Use advanced mode installation on the Welcome page, the Domain NetBIOS Name page appears. On this page, type the NetBIOS name of the domain if necessary or accept the default name and then click Next.

  8. Select the Forest Functional Level, choose the level you desire and click on Next. Make sure to read the description of each functional level to understand the difference between each one.

  9. In the previous step, If you have selected any Forest Functional Level other than Windows Server 2008 and clicked on Next , you would then get a page to select the Domain Functional Level. Select it and then click on Next


  10. In the Additional Domain Controller Options page, you can select to install the Domain Name Service  to your server. Note that the First domain controller in a forest must be a Global Catalog  that's why the checkbox beside Global Catalog is selected and it cannot be cleared. The checkbox is also selected by default when you install an additional domain controller in an existing domain, however you can clear this checkbox if you do not want the additional domain controller to be a global catalog server. The first domain controller in a new forest or in a new domain can not be a Read Only Domain Controller (RODC), you can later add a RODC but you must have at least one Windows Server 2008 Domain Controller.

    I want to set my DC as a DNS Server as well, so I will keep the checkbox beside DNS Server selected and click on Next


  11. If the wizard cannot create a delegation for the DNS server, it displays a message to indicate that you can create the delegation manually. To continue, click Yes
  12. Now you will have the location where the domain controller database, log files and SYSVOL are stored on the server.
    The database stores information about the users, computers and other objects on the network. the log files record activities that are related to AD DS, such information about an object being updated. SYSVOL stores Group Policy objects and scripts. By default, SYSVOL is part of the operating system files in the Windows directory

    Either type or browse to the volume and folder where you want to store each, or accept the defaults and click on Next


  13. In the Directory Services Restore Mode Administrator Password (DSRM) page, write a password and confirm it. This password is used when the domain controller is started in Directory Services Restore Mode, which might be because Active Directory Domain Services is not running, or for tasks that must be performed offline.
    Make sure that you memorize this password when you need it. I know many administrators forgot it when they most needed it !! 



    Make sure the password meet the password complexity requirements of the password policy, that is a password that contains a combination of uppercase and lowercase letters, numbers, and symbols. else you will receive the following message  :


  14. Summary page will be displayed showing you all the setting that you have set . It gives you the option to export the setting you have setup into an answer file for use with other unattended operations, if you wish to have such file, click on the Export settings button and save the file.


  15. DNS Installation will start

  16. Followed by installing Group Policy Management Console, the system will check first if it is installed or not.


  17. Configuring the local computer to host active  directory Domain Services and other operations will take place setting up this server as a Domain Controller









  18. Active Directory Domain Services installation will be completed, click Finish, then click on Restart Now to restart your server for the changes to take effect.




  19. Once the server is booted and you logon to it, click on  Start > Administrative Tools ,  will notice that following have been installed :
  • Active Directory Domains and Trusts
  • Active Directory Sites and Services
  • Active Directory Users and Computers
  • ADSI Edit
  • DNS
  • Group Policy Management




Summary
Setting up a Domain Controller in Windows Server 2008 to install Active Directory Domain Services is performed by running the dcpromo command. It has some new options like using Advanced Mode Installation, and exporting settings to an answer file . In my next articles, I will show you how to perform an unattended installation to set up your domain controller, and also how to set up an additional domain controller using Windows Server 2008.

10/10/2012

Encapsulation


Encapsulation

Layered protocol models rely on encapsulation, which allows one protocol to be used for relaying another's messages.


Encapsulation, closely related to the concept of Protocol Layering, refers to the practice of enclosing data using one protocol within messages of another protocol.To make use of encapsulation, the encapsulating protocol must be open-ended, allowing for arbitrary data to placed in its messages. Another protocol can then be used to define the format of that data.

Encapsulation Example

For example, consider an Internet host that requests a hypertext page over a dialup serial connection. The following scenario is likely:
First, the HyperText Transfer Protocol (HTTP) is used to construct a message requesting the page. The message, the exact format of which is unimportant at this time, is represented as follows:



Next, the Transmission Control Protocol (TCP) is used to provide the connection management and reliable delivery that HTTP requires, but does not provide itself. TCP defines a message header format, which can be followed by arbitrary data. So, a TCP message is constructed by attaching a TCP header to the HTTP message, as follows:

Now TCP does not provide any facilities for actually relaying a message from one machine to another in order to reach its destination. This feature is provided by the Internet Protocol (IP), which defines its own message header format. An IP message is constructed by attaching an IP header to the combined TCP/HTTP message:

Finally, although IP can direct messages between machines, it can not actually transmit the message from one machine to the next. This function is dependent on the actual communications hardware. In this example, we're using a dialup modem connection, so it's likely that the first step in transmitting the message will involve the Point-to-Point Protocol (PPP):

Note that I've drawn the PPP encapsulation a little differently, by enclosing the entire message, not just attaching a header. This is because PPP may modify the message if it includes bytes that can't be transmitted across the link. The receiving PPP reverses these changes, and the message emerges intact. The point to remember is that the encapsulating protocol can do anything it wants to the message - expand it, encrypt it, compress it - so long as the original message is extracted at the other end.

DoD Networking Model


DoD Networking Model

The first layered protocol model we will study is the 4-layer DoD Model. This is the model originally designed for the Internet, and is important because all of the Internet's core protocols adhere to it.


The Department of Defense Four-Layer Model was developed in the 1970s for the DARPA Internetwork Project that eventually grew into the Internet. The core Internet protocols adhere to this model, although the OSI Seven Layer Model is justly preferred for new designs.
The four layers in the DoD model, from bottom to top, are:

  1. The Network Access Layer is responsible for delivering data over the particular hardware media in use. Different protocols are selected from this layer, depending on the type of physical network.
  2. The Internet Layer is responsible for delivering data across a series of different physical networks that interconnect a source and destination machine. Routing protocols are most closely associated with this layer, as is the IP Protocol, the Internet's fundamental protocol.
  3. The Host-to-Host Layer handles connection rendezvous, flow control, retransmission of lost data, and other generic data flow management. The mutually exclusive TCP and UDP protocols are this layer's most important members.
  4. The Process Layer contains protocols that implement user-level functions, such as mail delivery, file transfer and remote login.

Cisco Menu

OSI Reference Model


What is OSI Model?

The OSI Model is used to describe networks and network application.
Layers of OSI  Model 
Three are Sever Layers of OSI Model :
OSI Layer Diagram:
  
7)  Application Layer : The application layer provider different services to the application. Example of services provided by this layer are file transfer, electronic messaging e-mail, virtual terminal access and network management.
6) Presentation Layer : The Presentation layer is responsible for protocol conversion, date encryption/decryption, Expanding graphics command and the date compression. This layer makes the communications between two host possible.
5) Session Layer : This layer is responsible for establishing the process-to-process communication between the host in the network. This layer is responsible for establishing and ending the sessions across the network. The interactive login is an example of services provided by this layer in which the connective are re-connected in care of any interruption.
4) Transport Layer : This layer is responsible for end-to-end delivers of messages between the networked hosts. It first divides the streams of data into chunks or packets before transmission and  then the receiving computer re-assembles the packets. It also guarantee error free data delivery without loss or duplications.
3) Network Layer : This layer is responsible for translating the logical network address and names into their physical address ( MAC address). This layer is also responsible for addressing, determining routes for sending and managing network problems such as packet switching, data congestion and routines.
2) Data Link Layer : Data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to other computer via physical layer. Data link layer is used by hubs and switches for their operation.
1) Physical Layer : Physical  Layer is responsible for transmitting row bit stream over the physical cable. The physical layer defines the hardware items such as cables, cards, voltages etc.
How to remember the layer of OSI model?
The easiest way to remember the different layers of OSI Model is to use the mnemonic "All people seem To need Data Processing":
LayerName
Mnemonic
7ApplicationAll
6PresentationPeople
5SessionSeem
4TransportTo
3NetworkNeed
2Data LinkData
1PhysicalProcessing

Menu 2003 server

Windows 2003 installation



Windows Server 2003 system requirements.
There are different editions of serve 2003 it depends which edition you have planned to install
Windows Server 2003 EditionNumber of ProcessorsProcessor SpeedRAMAvailable Disk Space (for Setup)
Web1–2133 megahertz (MHz) minimum; 550 MHz recommended128 megabytes (MB) minimum; 256 MB recommended; 2 GB maximum1.5 gigabytes (GB)
Standard1–4133 MHz minimum; 550 MHz recommended128 MB minimum; 256 MB recommended; 4 GB maximum1.5 GB
Enterprise1–8133 MHz minimum; 550 MHz recommended128 MB minimum; 256 MB recommended; 32 GB maximum1.5 GB
Datacenter8–32400 MHz minimum512 MB minimum; 64 GB maximum1.5 GB
Now we are going see how to install Server 2003 Standard Edition.
Insert a boot disk in a CD/DVD rom boot the system from CD,
Press any key to boot form CD.
image
Set up will load minimum drives from CD.
image
Press enter key (↵) to run Setup.
image
Agree the licensing agreement by press F8 to agree.
image
Delete the existing partition & create a new partition.
image
Format the partition.
image
Set up will format the partition to install windows.
image
Now Setup Will copy files required for installation.
image
After copying the system will restart automatically.
image
After restarting Setup will prepare to install.
image
At this point of time your Screen might flicker your keyboard & mouse may not work for some movement.
image
It will ask for regional settings don’t worry leave default click on Next.
image
Give the name & Organizing click on Next.
image
Enter the product key which you will be provided by Microsoft.
image
This will ask you how clients & servers are connected to your network so it will keep track or license of your clients & Server.
image
Now it will prompt for computer Name & to set the password click on Next.
image
Set the Date & Time Zone & click on Next.
image
Select the typical for standalone select custom for Network configuration.
image
Select Internet Protocol (TCP/IP) click on properties.
image
Give an IP address of your network click on ok.
image
Click on next to finish the wizard.
image
If you have a domain controller give the domain name to join this serve to domain.
image
It will prompt for user credential type the user name & password it will be joined to domain click o next & finish the wizard.
image
None for a while the setup will complete.
image
After completing the system will restart.
image
image
This is how the server installation is desktop systems of workstations systems.
imageimage
Desktop                                                          Workstation
In Servers you will be provided a Driver CD or a Floppy, first You need to Configure RAID than boot form driver CD of a Floppy follow up the wizard than it will ask you the server 2003 CD to insert in CD\DVD, you can configure RAID even after installation of server.
Server
image