Ads DNS DHCP Raid
Ads DNS DHCP Raid
Ads DNS DHCP Raid
Features of windows2003
• Multiple selection of directory objects
• Drag and Drop functionality
• Efficient search capabilities
• Saved Queries
• Install ADC in existing domains using backup media
• Universal Group membership cashing
• Domain and Forest functional levels
• Secure LDAP traffic
• Active Directory quotas
• RSOP
• Cross forest support
• Domain and domain controller renaming
• Open Active Directory Users and Computers and verify the Computers,
Users, Foreign Security Principles and domain Controller OU appear.
• Open Active Directory Sites and Services and verify the Default-First-Site
name appears.
• Verify the NTDS.dit, the Active Directory database in %system roor%NTDS
folder.
• Verify Global Catalog enabled.
• Check the computer role should be ‘Primary’ or ‘Backup’ by use the
command Net Accounts.
• Check the SYSVOL folder as shared by use the command Net share.
• Check SRV records in DNS Console.
Port Protocols
No.
88 KERBEROS
389 Lightweight Directory Access Protocol [LDAP]
443 SSL (Secure Socket Layer)
143 IMAP4
53 Domain Name System [DNS]
546 Dynamic Host Configuration Protocol [DHCPv6
client].
547 Dynamic Host Configuration Protocol [DHCPv6
server].
20,21 File Transfer Protocol [FTP]
80 Hypertext Transfer Protocol [HTTP]
110 Post office Protocol [POP]
25 Simple mail Transfer Protocol [SMTP]
23 Telnet
3389 RDP
3268 & Global Catalog lookup The De-
3269 Militarized
Zone (DMZ) prevents users outside a local or wide area network from obtaining
access to company data that is only for internal use and prevents access to all
other internal services.
Master Boot Record (MBR) is the first sector of the computer hard disk drive
used to determine from which partition a computer will boot. The MBR tells the
computer where to find and how to load the operating system.
Lmhost: A local hosts file used by Microsoft Wins Clients such as Microsoft
Windows 98 or Windows NT to provide mappings of IP addresses to NT computer
names (NetBIOS name). The lmhosts file is located in
Windows\System32\drivers\etc directory (WinXP, Win98), or
Winnt\System32\drivers\etc (W2k, W2k3).
By default, the first DC in the First Domain in the First Tree in the AD
Forest (the root domain) will be configured as the GC.
o Every forest requires at least one Global Catalog server. If a Global Catalog
server is not available, then nobody will be able to log into the domain
except for the Administrator.
o GC Server improves directory queries, support logon and provide data for
applications such as exchange server.
o Microsoft document that suggests placing a Global Catalog server into each
site. Port 3268 (Global Catalog lookup port)
o If a site does not contain GC server, configure Universal Group membership
caching to reduce user logon being denied.
o IF GC is not available UGMC is not available. If user logged on previous on
his computer, logon using cached credentials but cannot access network
access.
You must allow for the GC to replicate itself throughout the forest. This process
might take anywhere between 10-15 minutes to even several days, all
depending on the AD infrastructure.
Domain Functional Level: It provides a way to enable domain-wide Active
Directory features within your network environment.
Four domain functional levels are available: Windows 2000 mixed (default),
Windows 2000 native, Windows Server 2003 interim, and Windows Server 2003.
• The Windows 2000 mixed functional level allows a Windows 2K3 DC to
interact with domain controllers in the same domain running Windows NT
4, Windows 2000, or the Windows Server 2003 family.
• The Windows 2000 native functional level allows a W2K3 DC to interact
with domain controllers in the domain running Windows 2000 or Windows
Server 2003.
• The Windows Server 2003 interim functional level allows a W2K3 DC to
interact with domain controllers in the domain running Windows NT 4 or
Windows Server 2003.
• The Windows Server 2003 functional level allows a W2K3 DC to interact
only with domain controllers in the domain running Windows Server 2003.
The change in domain functional level is one-way only; you cannot change
from the Windows 2000 native or W2K3 functional level to the Windows 2000
mixed or W2K3 interim functional level.
Schema - The set of definitions for the universe of objects that can be stored in
a directory.
Purpose of distribute FSMO Roles: To reduce the single point of failure instances
and improve performance.
Register Schmmgmt.dll
1 Click Start, and then click Run.
.
2 Type regsvr32 schmmgmt.dll in the Open box,
. and then click OK.
3 Click OK when you receive the message that the
. operation succeeded.
Transfer the Schema Master Role
1 Click Start, click Run, type mmc in the Open box, and then click OK.
.
2 On the File, menu click Add/Remove Snap-in.
.
3 Click Add.
.
4 Click Active Directory Schema, click Add, click Close, and then click OK.
.
5 In the console tree, right-click Active Directory Schema, and then click
. Change Domain Controller.
6 Click Specify Name, type the name of the domain controller that will be the new
. role holder, and then click OK.
7 In the console tree, right-click Active Directory Schema, and then click
. Operations Master.
8 Click Change.
.
9 Click OK to confirm that you want to transfer the role, and then click Close.
.
Transfer the RID Master, PDC Emulator, and Infrastructure Master Roles
1 Click Start, point to Administrative Tools, and then click Active Directory
. Users and Computers.
2 Right-click Active Directory Users and Computers, and then click Connect
. to Domain Controller.
3 Do one of the following:
. • In the Enter the name of another domain controller box, type the name
of the domain controller that will be the new role holder, and then click OK
-or-
• In the Or, select an available domain controller list, click the domain
controller that will be the new role holder, and then click OK.
4 In the console tree, right-click Active Directory Users and Computers, point
. to All Tasks, and then click Operations Master.
5 Click the appropriate tab for the role that you want to transfer (RID, PDC, or
. Infrastructure), and then click Change.
6 Click OK to confirm that you want to transfer the role, and then click Close.
.
Replication Triggers:
The following actions trigger replication between domain controllers:
• Creating |Modifying |Moving |Deleting an object
A site link is a logical, transitive connection between two or more sites that
mirrors the network links and allows replication to occur. By default, all site links
are transitive.
A site link bridge connects two or more site links in a transport where transitivity
has been disabled in order to create a transitive and logical link between two sites
that do not have an explicit site link.
Site Link Transitivity: By default, all site links are transitive, which simply
means that if sites A and B are linked and sites B and C are linked, then site A and
site C are transitively linked. Site link transitivity is enabled or disabled by
selecting the Bridge All Site Links check box in the Properties dialog box for either
the IP or the SMTP intersite transport. By default, site link transitivity is enabled for
each transport.
The following are some reasons why you might want to disable site link
transitivity:
o To have total control over replication traffic patterns
o To avoid a particular replication path, such as a path that involves a firewall
o If your IP network is not fully routed
Pull replication is more efficient for intersite replication because the destination
domain controller knows which replication data to request. In contrast, notification
and push replication are more efficient for intrasite replication, when domain
controllers are well connected and not restrained by site link schedules.
To configure a site:
1. Create a site
2. Create a subnet and associate it with site
3. Create or move a domain controller object into the site
4. Designate a site license server for the site
To create a site:
1. Click Start, point to Administrative Tools, and then click Active Directory Sites
And Services.
2. Right-click the Sites container, and then click New Site.
3. In the New Object–Site dialog box, type the name of the new site in the
Name box. Assign a site link to the site by selecting a site link in the Link Name
column, and then click OK.
4. In the Active Directory message box, note that to finish the configuration of a
site, you must
o Ensure that the site is linked to other sites with site links as appropriate.
o Add subnets for the site to the Subnets container.
o Install one or more domain controllers in the site or move existing domain
controllers into the site.
o Select the licensing computer for the site.
5. Click OK.
To create a subnet:
1. Click Start, point to Administrative Tools, and then click Active Directory Sites
And Services.
2. Double-click the Sites folder.
3. Right-click the Subnets folder, and then click New Subnet.
4. In the New Object–Subnet dialog box, type the subnet address in the Address
box. In the Mask box, type the subnet mask that describes the range of
addresses included in this site’s subnet. Choose a site to associate this subnet.
5. Click OK.
For optimum network response time and application availability, place at
least
o One domain controller in each site. A domain controller in each site
provides users with a local computer that can service query requests for
their domain over LAN connections.
o Sites with small numbers of users For sites with a small number of users,
using available bandwidth to log on and query the directory might be more
economical than adding a domain controller.
o Small sites that have client computers but no servers for sites with no
servers, a domain controller is not necessary. Users can still log on using
cached credentials if the site link fails. Because there are no server-based
resources at the site, there is no need for further authentication.
To create a domain controller object in a site:
1. Click Start, point to Administrative Tools, and then click Active Directory Sites
and Services.
2. In the Active Directory Sites and Services console tree, double-click the site
that you want to contain the new domain controller object.
3. Right-click the Servers folder, point to New, and then clicks Server.
4. In the New Object–Server dialog box, type the name for the new domain
controller object in the Name box.
5. Click OK.
If a preferred bridgehead server fails and you want the KCC to be able to fail over
to other domain controllers but there are no other preferred bridgehead servers
available, you must perform one of the following tasks at a domain controller in
each site:
o Add new domain controllers and designate them as preferred bridgehead
servers for the corresponding directory partitions, site, and transport. If
there is more than one domain represented in the site, you must add a
preferred bridgehead server for each domain.
o Remove all preferred bridgehead designations that you have made for the
corresponding directory partition, site, and transport, and allow the KCC to
select new bridgehead servers automatically.
Because the KCC creates only inbound connections, a bridgehead server cannot
create an outbound connection to another bridgehead server. This is the reason
why changes to preferred bridgehead server status must be made on a domain
controller in each affected site so that inbound connections are created in each
site.
Windows Support Tools provide the following tools for monitoring and
troubleshooting replication:
o Replmon.exe: Active Directory Replication Monitor
o Repadmin.exe: Replication Diagnostics Tool
o Dsastat.exe
Replmon.exe: Active Directory Replication Monitor
The Active Directory Replication Monitor (Replmon) enables administrators to view
the low-level status of Active Directory replication, force synchronization between
domain controllers, view the topology in a graphical format, and monitor the
status and performance of domain controller replication.
To start Replmon:
1. Click Start, point to Command Prompt, type replmon, and then press Enter.
2. In the console tree, right-click Monitored Servers, and select Add Monitored
Server.
3. On the Add Monitored Server Wizard page, select Add the Server Explicitly by
Name, and then click Next.
4. On the Add Server To Monitor page, type the name of the server you want to
monitor in the Enter The Name Of The Server To Monitor Explicitly box, and then
click Finish.
5. In the Active Directory Replication Monitor window, the server you chose for
monitoring appears in the console tree. You can now monitor replication
processes for this server.
To monitor Active Directory, you monitor the activity of the NT Directory Services
(NTDS) performance object. The counters in the NTDS performance object reflect
the functions of Active Directory, including the
o Address book (AB)
o Asynchronous thread queue (ATQ)
o Directory Replication Agent (DRA)
o Directory service (DS)
o Key distribution center (KDC)
o Kerberos authentications | LDAP | NTLM authentications | Security Accounts
Manager (SAM)
There are over 120 performance counters provided for the NTDS performance
object.
Monitoring Active Directory Performance
To monitor Active Directory performance, you must first select the performance
counters to monitor. Then you can set sampling parameters and display options.
Counter Logs: Counter logs record sampled data about hardware resources and
system services based on performance objects and counters in the same manner
as System Monitor.
Trace Logs: Trace logs collect event traces that measure performance statistics
associated with events such as disk and file I/O, page faults, and thread activity.
DHCP terminology
Term Description
A scope is the full consecutive range of possible IP addresses for a
scope
network.
A superscope is an administrative grouping of scopes that can be
superscop
used to support multiple logical IP subnets on the same physical
e
subnet.
Multicast scopes are supported through the use of Multicast Address
Dynamic Client Allocation Protocol (MADCAP).
Multicast
The multicast address range uses an additional address class, Class D
Scope
that includes IP addresses that range from 224.0.0.0 to
239.255.255.255 for use in IP multicasting.
exclusion An exclusion range is a limited sequence of IP addresses within a
range scope, excluded from DHCP service offerings.
After define a DHCP scope and apply exclusion ranges, the remaining
address addresses form the available address pool within the scope. Pooled
pool addresses are eligible for dynamic assignment by the server to DHCP
clients on your network.
A lease is a length of time that a DHCP server specifies, during which a
lease
client computer can use an assigned IP address..
A reservation to create a permanent address lease assignment by the
reservatio
DHCP server. Reservations assure that a specified hardware device on
n
the subnet can always use the same IP address.
option Option types are other client configuration parameters a DHCP server
types can assign when serving leases to DHCP clients.
An options class is a way for the server to further manage option
types provided to clients. When an options class is added to the server,
clients of that class can be provided class-specific option types for their
options
configuration. For Microsoft® Windows® 2000 and Windows XP, client
class
computers can also specify a class ID when communicating with the
server. Options classes can be of two types: vendor classes and user
classes.
User-defined classes are used for managing DHCP options assigned to
User Class clients identified by a common need for a similar DHCP options
configuration.
Vendor Vendor-defined classes are used for managing DHCP options assigned
Class to clients identified by vendor type.
Backup Maintaining a backup of the DHCP database protects you from data
and loss if the DHCP database is lost.
Restore • Synchronous backups that occur automatically. The default
backup interval is 60 minutes.
• Asynchronous (manual) backups, performed by using the Backup
command on the DHCP console.
DHCP discover message - The initial broadcast sent by the client to obtain a
DHCP lease. It contains the client MAC address and computer name. This is a
broadcast using 255.255.255.255 as the destination address and 0.0.0.0 as the
source address. The request is sent and then the client waits one second for an
offer. The request is repeated at 9, 13, and 16 second intervals with additional 0 to
1000 milliseconds of randomness. The attempt is repeated every 5 minutes
thereafter.
The client uses its own port 68 as the source port with port 67 as the destination
port on the server to send the request to the server. The server uses its own port
67 as the source port with port 68 as the destination port on the client to reply to
the client. Therefore the server is listening and sending on its own port 67 and the
client is listening and sending on its own port 68.
DHCP Lease Renewal - After 50% of the lease time has passed, the client will
attempt to renew the lease with the original DHCP server that it obtained the lease
from using a DHCPREQUEST message. At 87.5% of the lease completion, the
client will attempt to contact any DHCP server for a new lease. If the lease expires,
the client will send a request as in the initial boot when the client had no IP
address. If this fails, the client TCP/IP stack will cease functioning.
For balancing DHCP server usage, a good practice is to use the "80/20" rule to
divide the scope addresses between the two DHCP servers. If Server 1 is
configured to make available most (approximately 80%) of the addresses, then
Server 2 can be configured to make the other addresses (approximately 20%)
available to clients. The following illustration is an example of the 80/20 rule:
Using more than one DHCP server on the same subnet provides increased fault
tolerance for servicing DHCP clients located on it. With two DHCP servers, if one
server is unavailable, the other server can take its place and continue to lease
new addresses or renew existing clients
The DHCP Relay Agent in the Windows Server 2003 family must be configured
with the IP address of the DHCP server in order to relay DHCP requests between
Subnet A and Subnet B. For more information about setting up the DHCP Relay
Agent.
A forwarder is a DNS server that receives queries from other DNS servers that
are explicitly configured to send them.
■ Primary zone: A primary zone contains the master copy of the zone database,
where administrators make all changes to the zone’s resource records, is in the
primary zone.
■ Stub zone: A copy of a primary zone that contains Start Of Authority (SOA) and
Name Server (NS) resource records, plus the Host (A) resource records that
identify the authoritative servers for the zone.
Active Directory-Integrated Zones: When you are running the DNS server
service on a computer that is an Active Directory domain controller and you select
the Store the Zone in Active Directory (Available Only If DNS Server is a
Domain Controller) check box while creating a zone in the New Zone Wizard, the
server does not create a zone database file.
The SOA Record: The SOA record marks the start of a zone. A DNS domain
maps into at least two zones: One for forward DNS - translating a hostname to an
IP address, and the other for reverse DNS - translating an IP address to a
hostname.
The NS Record: The NS (Name Server) record identifies the servers that are
authoritative for a given zone.
The A Record: The A (Address) records provide the mapping from hostname
to IP addresses.
The PTR Record: The PTR (Pointer) record provides the reverse mapping
from IP address to hostname. As with the A record, a host must have one for
each network interface.
The MX Record: The MX (Mail Exchange) records are used by the mail systems
to route mail more efficiently. An MX record also provides a way to deliver mail to
an alternate host when the destination host is not available.
The CNAME Record: The CNAME (Canonical name) records are used to assign
nicknames (or alias) to a host. Nicknames are commonly used to either shorten a
name, or to associate a function to a host. CNAME's must refer to a real name, not
another CNAME.
The HINFO Record: The HINFO (Host information) record specifies the
manufacturer and the operating system type. Most sites do not use HINFO records
because of security reasons, if everyone knows what type of hardware you have
and what type of OS is running, you are more vulnerable to break-ins.
The WKS Record: The WKS records are used to list well known services that a
host supports. Again for security reasons, most do not use it.
The TXT Record: The WKS record is used to add text to hosts DNS records.
Command-line utilities:
Command Description
Nslookup Used to perform query testing of the DNS domain namespace.
A command-line interface for managing DNS servers. This utility is useful in scripting batch
Dnscmd files to help automate routine DNS management tasks, or to perform simple unattended
setup and configuration of new DNS servers on your network
This command is used to view and modify IP configuration details used by the computer.
Ipconfig Additional command-line options are included with this utility to provide help in
troubleshooting and supporting DNS clients.
DNS Query Types: DNS servers recognize two types of name resolution
requests: recursive queries and iterative queries.
In a recursive query, the DNS server receiving the name resolution request takes
full responsibility for resolving the name. If the server possesses information about
the requested name, it replies immediately to the requestor. If the server has no
information about the name, it sends referrals to other DNS servers until it obtains
the information it needs. TCP/IP client computers send recursive queries to their
designated DNS servers.
In an iterative query, the servers that receive the name resolution request
immediately respond with the best information they possess at the time, whether
that information is a fully resolved name or a reference to another DNS server.
DNS servers use iterative queries when communicating with each other.
If no zone information exists for the queried name, the server then checks to see if
it can resolve the name using locally cached information from previous queries. If
a match is found here, the server answers with this information. Again, if the
preferred server can answer with a positive matched response from its cache to
the requesting client, the query is completed.
If the queried name does not find a matched answer at its preferred server —
either from its cache or zone information — the query process can continue, using
recursion to fully resolve the name. This involves assistance from other DNS
servers to help resolve the name. By default, the DNS Client service asks the
server to use a process of recursion to fully resolve names on behalf of the client
before returning an answer. In most cases, the DNS server is configured, by
default, to support the recursion process.
In order for the DNS server to do recursion properly, it first needs some helpful
contact information about other DNS servers in the DNS domain namespace. This
information is provided in the form of root hints, a list of preliminary resource
records that can be used by the DNS service to locate other DNS servers that are
authoritative for the root of the DNS domain namespace tree. Root servers are
authoritative for the domain root and top-level domains in the DNS domain
namespace tree.
Dynamic updates can be sent for any of the following reasons or events:
• An IP address is added, removed, or modified in the TCP/IP properties
configuration for any one of the installed network connections.
• An IP address lease changes or renews with the DHCP server any one of the
installed network connections. For example, when the computer is started or
if the ipconfig /renew command is used.
• The ipconfig /registerdns command is used to manually force a refresh of
the client name registration in DNS.
• At startup time, when the computer is turned on.
• A member server is promoted to a domain controller.
When one of the previous events triggers a dynamic update, the DHCP Client
service (not the DNS Client service) sends updates. This is designed so that if a
change to the IP address information occurs because of DHCP, corresponding
updates in DNS are performed to synchronize name-to-address mappings for the
computer. The DHCP Client service performs this function for all network
connections used on the system, including connections not configured to use
DHCP.
Dynamic updates are typically requested when either a DNS name or IP address
changes on the computer. For example, suppose a client named "oldhost" is first
configured in System properties with the following names:
In this example, no connection-specific DNS domain names are configured for the
computer. Later, the computer is renamed from "oldhost" to "newhost", resulting
in the following name changes on the system:
Once the name change is applied in System properties, you are prompted to
restart the computer. When the computer restarts Windows, the DHCP Client
service performs the following sequence to update DNS:
1. The DHCP Client service sends a start of authority (SOA) type query
using the DNS domain name of the computer.
The client computer uses the currently configured FQDN of the computer
(such as "newhost.example.microsoft.com") as the name specified in this
query.
2. The authoritative DNS server for the zone containing the client
FQDN responds to the SOA-type query.
For standard primary zones, the primary server (owner) returned in the SOA
query response is fixed and static. It always matches the exact DNS name as
it appears in the SOA RR stored with the zone. If, however, the zone being
updated is directory-integrated, any DNS server loading the zone can
respond and dynamically insert its own name as the primary server (owner)
of the zone in the SOA query response.
3. The DHCP Client service then attempts to contact the primary DNS
server.
The client processes the SOA query response for its name to determine the
IP address of the DNS server authorized as the primary server for accepting
its name. It then proceeds to perform the following sequence of steps as
needed to contact and dynamically update its primary server:
b. If this update fails, the client next sends an NS-type query for the zone
name specified in the SOA record.
c. When it receives a response to this query, it sends an SOA query to
the first DNS server listed in the response.
d. After the SOA query is resolved, the client sends a dynamic update to
the server specified in the returned SOA record.
e. If this update fails, then the client repeats the SOA query process by
sending to the next DNS server listed in the response.
4. Once the primary server is contacted that can perform the update,
the client sends the update request and the server processes it.
The server also checks to ensure that updates are permitted for the client
request. For standard primary zones, dynamic updates are not secured, so
any client attempt to update succeeds. For Active Directory–integrated
zones, updates are secured and performed using directory-based security
settings.
Note that names are not removed from DNS zones if they become inactive or are
not updated within the refresh interval (7 days). DNS does not use a mechanism to
release or tombstone names, although DNS clients do attempt to delete or update
old name records when a new name or address change is applied.
When the DHCP Client service registers A and PTR resource records for a
computer, it uses a default caching Time to Live (TTL) of 15 minutes for host
records. This determines how long other DNS servers and clients cache a
computer's records when they are included in a query response.
RAID (Redundant Array of Independent Disks)
RAID is a method of combining multiple disk drives into a single entity in order to
improve the overall performance and reliability of your system. The different
options for combining the disks are referred to as RAID levels. There are several
different levels of RAID available depending on the needs of your system. One of
the options available to you is whether you should use a Hardware RAID solution
or a Software RAID solution.
RAID Hardware is always a disk controller to which you can cable up the disk
drives. RAID Software is a set of kernel modules coupled together.
For Highest performance, the controller must be able to perform two concurrent separate Reads per mirrored pair
or two duplicate Writes per mirrored pair.
RAID Level 1 requires a minimum of 2 drives to implement
Each entire data block is written on a data disk; parity for blocks in the same rank is generated on Writes,
recorded in a distributed location and checked on Reads.
RAID Level 5 requires a minimum of 3 drives to implement
RAID Levels 0+1 (01) and 1+0 (10) (Required Minimum 4 hard disks)
Common Name(s): RAID 0+1, 01, 0/1, "mirrored stripes", RAID 1+0, 10, 1/0, "striped mirrors"
• Strengths: Highest performance, highest data protection (can tolerate multiple drive failures).
• Weaknesses: High redundancy cost overhead; Because all data is duplicated, twice the storage
capacity is required; Requires minimum of four drives.
CLUSTER
Clustering is a technology, which is used to provide high availability for mission
critical applications. We can configure cluster by installing MCS (Microsoft Cluster
Service) component from Add/Remove programs, which can available in Enterprise
Editions and Data Center Edition.
NLB (Network Load Balancing) Cluster for balancing load between servers.
This cluster will not provide any high availability.
Server Cluster provides high availability by configuring active-active or active-
passive cluster.
Quorum: A shared storage need to provide for all servers which keeps information
about clustered application and session state is useful in FAILOVER situation. This
is very important if quorum disk fails entire cluster will fails.
Heartbeat is a private connectivity between the servers in the cluster, which is
used to identify the status of other servers in cluster.
FIREWALL
A firewall is used to prevent unauthorized users from accessing private networks
that are connected to other networks.
Typically, a firewall prevents external users from accessing internal corporate
network from the Internet.
INTERNETWORKING
Internetworking: Take two or more LANs or WANS and connect them via a Router
and configure a logical address networking scheme with a protocol like IP.
Routers: are used to connect networks together and route packets of data from
one network to another.
By default routers break up a broadcast domain and collision domain.
By default routers don’t forward broadcast.
Switches: The main purpose of switch is to make a LAN work better, to optimize
its performance and providing more bandwidth for LAN users.
Switches don’t forward packets to other networks.
“Switch“frames from one port to another within the switched network.
By default, switches break up broadcast domain and collision domain.
Each and Every port on a switch represent its own collision domain.
OSI (Open System Interconnection): In 1970, the OSI reference model was
created by ISO (International Organization for Standardization).
OSI Model: It is the primary architectural model for networks. It described how
data and network information are communicated from an application on one
computer through the network media, to an application on another computer.The
primary purpose of OSI model is to allow different vendors network to
interoperate.
OSI Layers: The OSI has seven different layers, divided into two groups. The top
3 layers define how the application within the end stations will communicate with
each other and with users. The bottom 4 layers defined how data is transmitted
end to end.
11 1 1
22 2 2
33 3 3
66 6 6
WG
G
WO
B
WB
O
WB
B
Subnetting: Take one larger network and break it into a bunch of smaller
networks.
Routing Protocol: It is used by routers to dynamically find all the networks in the
internetwork and to ensure that all routers have the same routing table.
Eg.: RIP, IGRP, EIGRP & OSPF
Routed Protocols: This can be used to send user data (packets) through the
established enterprise.
Eg.: IP & IPX
Types of Routing:
1. Static Routing
2. Default Routing
3. Dynamic Routing
Dynamic Routing: Protocols are used to find networks and update routing tables
on routers.
RIP (Routing Information Protocol): It send the complete routing table out to
all active interfaces every 30 seconds.
Hop count – 15 by default
IGRP (Interior Gateway Routing Protocol): Same as RIP but use Autonomous
System Number. All routers must be the same number inorder to share routing
table information.
Hop count – 100 by default
Autonomous System Number – 1 to 65535
Access List: It can be used to permit or deny packets moving through the router.
Access list is filtering unwanted packets when implementing security policies.
Pre-requisites:
• .NET Framework
• ASP.NET
• WWW Service
• SMTP
• NNTP
User Recipient:
• Mailbox enabled user – Mailbox in exchange server, user account in AD
• Mail enabled user – does not have mailbox in Exchange Server. Official Email
ID assign to personal Email ID.