Tuesday 15 March 2011

MCITP: Profiles

PROFILES:

Profile is a user state environment. Profile contains personal settings of the user like

  • Documents, Desktop Settings
  • Start Menu Icons, Short Cuts
  • Application Data, Downloads
  • Contacts, Favorites.
  • Pictures, Music, Video etc.
We are having 3 types of profiles.
  1. Local User Profile
  2. Roaming User Profile
  3. Mandatory User Profile
Local User Profile:  A local user profile is created the first time you log on to a computer and it is stored on a computer local hard disk at SAM data base.

Any changes made to your local user profile are specific to the computer on which you made the changes.

Roaming User Profile:  Your roaming user profile is created by your system administrator and it is stored on server.

This profile is available every time you log on the any computer on the network.

Changes made to your roaming user profile are updated on server.

Mandatory User Profile: A mandatory user profile is a roaming profile.

mandatory profiles are fixed profiles in which the user changes will not be saved.

Only administrator can make changes to mandatory profiles.


How to create user account using with Command Prompt?

Go to Command Prompt --> dsadd user cn=user name, cn=users dc=domain name, dc=com -pwd (password)

cn = canonical name

MCITP: Permissions

Permissions:

Permissions define the type of access granted to a user, group or computer to access resources.

Permissions can be applied to resources such as files, folders and printer/scanners.

Permissions like privilege to read a file, delete a file or to create a new file in folder.

We are having two types of permissions:
  1. Security level permissions
  2. Share level permissions
Security level permissions:

  • Can be implemented only on NTFS partitions.
  • Security or NTFS permissions can be set own drives, folders and files.
  • By default , security permissions will be inherited from its parent drive or folder.
  • File permissions override folder permissions.
  • Creator of file and folders are the owners.
  • Different security permissions are : Full control, Modify, Read & execute, write, read, list folder contents.
Share level permissions:
  • Cab be implemented on NTFS and FAT partitions.
  • It can be set on drives and shared folders but not files.
  • Different share permission are : Read only , Contributor, Co-Owner
         What are the shared folders?
  • Shared folder can be access from network
  • When you copy or move a shared folder the folder will no longer shared.

MCITP:USERS

USERS:

We are having two types of user accounts:

  1. Local user accounts
  2. Domain user accounts
Local User : A user account created in local database of a computer
                  Local users are generally used in workgroup model computers
                  Local user can login in only the respective computer.
Domain User : A user account created in Active Directory database.
                      Domain user are used in Domain model computers.
                      Domain user can logon to any computer in the domain.

MCITP: CLIENTS & MEMBER SERVERS , Domain

Client: A computer joined in the network with client operating system is client.

Client operating systems like windows vista, windows xp, window 2000 professional etc.

Member Server:  A computer joined in the network with server operating system is member server.

Server Operating systems like windows 2000 server, windows NT, Windows 2003, windows 2008 serve etc.

Domain :

Domain means logical boundry of computers, without domain controller we are not form a domain.

In domain we are having atleast one domain controller and domain represented by traiangle.

Thursday 10 March 2011

MCITP-Day 3: Requirements for Active Directory Services and User Accounts

Requirements for Active Directory Services:

1. Sever Operating System (Work group model computer with Server Operating System)
2. Work group model computer
3. Static IP (Internet Protocal)
4. NTFS ( New Technology File System)
5. Domain Name (Ex: yahoo.com, ram.org, google.com, ram.in, ram.edu)
6. DNS Server.

Clients & Member Servers:

Clients: A computer joined in the domain with client operating system is called as Client.

    Client Operating Systems like : Windows 2000 Professional, Windows XP, Windows Vista, Windows 7

Member Servers: A computer joined in the domain with Server Operating system is called as member server.

   Member Operating Systems like : Windows NT, Windows 2000, Windows 2003 and Windows 2008 Server

Domain: What is the Domain?

Domain means logical boundary of computers. Without domain controller we are not form a domain.

In domain we are having at least one domain controller and domain represented by triangle.



USER ACCOUNTS

We are having two types of user accounts.
  1. Local User
  2. Domain User.
1. Local User:
  • A user account created in local database of computer.
  • Local Users are generally used in work group model computers.
  • Local Users can log on only on the respective computer.
  • Local Users data can store in SAM data base. (SAM : Security Accounts Manager)

3. Domain User:
  • A user account created in Active Directory Database.
  • Domain users are used on domain model computers
  • Domain users can log on to any computer in the network



Friday 4 March 2011

MCITP - Day 2 -Topology

TOPOLOGY is one of the requirement for network.

Topology means arrangement of computers or structure of computer or design of the computer.

Types of Topology:

  1. Physical Topology:
How devices are connected to the network through the actual cables that transmit data, or the physical structure of the network, is called the physical topology.

Physical Topology are visible we are having diffrent physical topoloy
  • BUS Topology
A  bus topology consists of a main run of cable with a terminator at each end

Advantages of a Bus Topology

  • Easy to connect a computer or peripheral to a  bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.

  • RING Topology
A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring .The Token Ring protocol uses a star-wired ring topology.
  • STAR Topology
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator
Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring

Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the concentrators.
  • MESH Topology
It similary like tree topology check bellow.
  • TREE Topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.

Advantages of a Tree Topology

  • Point-to-point wiring for individual segments.
  • Supported by several hardware and software venders.

Disadvantages of a Tree Topology

  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks, the entire segment goes down.
  • More difficult to configure and wire than other topologies.

   2. Logical Topology:

Logical Topology (also referred to as Signal Topology) is a network computing term used to describe the arrangement of devices on a network and how they communicate with one another.

Logical topologies are bound to network protocols and describe how data is moved across the network


 in logical topology we are having two models.

* Work group Model or Peer-To-Peer model.
** Domain Model or Client Server Model

*Work group Model or Peer-To-Peer model.

If you are installing any operating system default your computer is workgrop model

In Work group Model one computer does not depend on any other computers.

This work group machines also called as stand alone computers.

In work group model we are creating local user accounts.

In work group model we are suing SAM database , SAM stands for Security Accounts Manager.


** Domain Model or Client Server Model

Active Directory:

Active Directory is directory service which contains information of all user accounts and shared resources on a network.

Active Directory is a centralized Hierarchical database.

Purpose of Active Directory:

Active Directory provides user log on and authentication services using KERBEROS protocol.

To centralize and de-centralize the resource management

To centrally organize and manage user accounts, computers, groups and networking resources.

Enables authorized users to easily locate network resources.




MCITP - Day 2 -Windows Operating Systems


Server Operating Systems:- Network Operating Systems.

The history of Microsoft Operating Systems

  • Windows NT 3.1 (Released in 1993)
  • Windows NT 3.5 (Released in 1994)
  • Windows NT 4.0 (Released in 1996)
  • Windows NT 5.0 was renamed as Windows 2000 Prfessional.
  • Windows .Net Server was renamed as Windows 2003 Server
  • Windows 2008 Server
Latest Server Operating System from microsoft was Windows 2008 only.

Flovors or Editions of Windows 2003 Server

  • Stadard Edition
  • Enterprise Edition
  • Data Center Edition
  • Web Edition
Flovors or Editions of Windows 2008 Server

  • Stadard Edition
  • Enterprise Edition
  • Data Center Edition
  • Web Edition was not avialable but it was developed as WEB SERVER EDITION.