NetworkServers and Services Fundamentals
1.You are updating a LAN and need to identify NOS requirements. Thenetwork currently has three Novell NetWare 3.2 servers. You haveWindows clients that access the NetWare servers through a Windows2000 Server running GSNW. You plan to replace the NetWare serverswith new servers, eventually removing the NetWare servers from thenetwork.
a.What type of authentication is used between the Windows 2000 Serverand the NetWare servers?
Boththe Windows 2000 Server and the NetWare servers employ entirelydifferent technique and protocols for client authentication. TheWindows 2000 Server made use of the Kerberos authentication which wasemployed over IP only, while theNetWare Core Protocol is validated bythe NDSabove either IP (for NetWare 5.x and later versions) or IPX.
b.What network-centric directory structure, if any, is currently beingused?
InternetServices: Webservices are generally, Internet services that are delivered both byNetWare and Windows 2000. Switching between Web servers must be donewith great consideration on the detailed operations that differsignificantly from one server to another. A platform based on Javawas adopted by NetWare while the Windows 2000 assumes ComponentObject Model (COM) centered platform.
Windows 2000 Server- supports multiple synchronization, connector, and meta-directory technologies and publishes all services using LDAP
NetWare 5.1- supports only cross-platform NDS and does not publish all directory services using LDAP
c.If you replace the NetWare servers with NetWare 6.5 servers, howwould this impact the configuration for client access? Explain youranswer.
Anumber of add-ons and improvements to the NOS has been made by Novellwith their release of the NetWare 6.5. Significant changes are thefollowing: iManager, eDirectory, and its objects, management tool(browser-based).
• BranchOffice, software package facilitates the permission of remote officesjoining to a WAN to continue independent process, in case that thereis a malfunction at the head office while it is in the same NetWareeDirectory
• Continuousserver back up while running capability
• DirXML,for central management and synchronizationof NetWare directories withthe following: Windows NT domains, Windows 2000 Server, and WindowsServer 2003 Active Directories
• Popularopen-source Web development kit, for instance MySQL and Apache
• ServerConsolidation Utility, a service allowing the exact data and fileinformation to be shared betweennumerous servers (e.g.a specificapplication located on one server shared between numerous servers)
• VirtualOffice, a browser-based set of tools that makes the process ofharmonizing local files with the files on a server, collaborationtasks and executing electronic mail (e-mail) and printing to anyprinter connected simple
TheNSS (Novell Storage Services), a record system by the NetWare 6.5,isappliedto control its directories, files and volumes. NetWare canprovide thecustomers with unswervingadmission to NSS using thecostumers’local file contact protocol. It is a file access protocolwith the intention for the clients’ to look forward in using whenit opens, reads, and saves the files. Example, clients of Linux can,first, access and second, share NetWare 6.5 server resources with theuse of NFS, an old file access protocol that was used by UNIX-kind ofsystems. Windows consumers may use the file admission protocol CIFSor the Common Internet File Systemand the AFP, the Apple File orAppleTalk Filing Protocol, a file access on Apple systems was used bythe clients of Macintosh. Clients can open directories and folders bydefault like they were linked to a server that has the matchingfileaccess protocols by using the native file access protocols. It showsthat users for instance, a Red Hat Linux usercoupled to a Linuxserver or a Windows XP user linked to a Windows Server 2003 server.
2.You have a Windows Server 2008 Active Directory network. You areplanning to make some changes to the network and the services itoffers. The network is currently configured as a single LAN with twodomain controllers, one DHCP server, three files servers, and aMicrosoft SQL Server database server. You also have two web serversrunning Windows 2003 Server on a perimeter network that is separatedfrom the main network by a Linux server configured as a router andfirewall. (See Figure 8-10). Most network clients are running WindowsXP Professional, but some are running Mac OS X. You plan to deploy aMac OS X server that will be used to store digital video developmentprojects and commercial artwork. Collisions are becoming a problemand you plan to divide the LAN into two subnet- works connected by arouter. You are configuring a Linux computer to act as the router forthe networks.
What can you do to give PC users access to files on the Mac OS X server?
TheActive Directory in Microsoft Windows Server 2008 operating systemacts as a central core which the administrators can execute amultiplicity of tasks connected to network management. Theadministratorhas the right to use the active directory to manage useraccounts, position security policies, and updateand organize softwarecrossways to a network, and store data and settings. Different waysin accessing the AD in Server 2008 depends on the programs that arebedded in on a specific server. These steps are used to access theActive Directory in Windows Server 2008.
First:Openthe Active Directory using the default configuration accessbyopening the Active Directory Administrative Center. It is theGraphicalUser Interface or GUI.
Second: Open the AD at what timewhen active directory explorer of theMicrosoft is installed.
Third:Using the Exchange Server, open the AD in Windows Server 2008.
What network protocol changes will you have to make to current network systems?
Everydata link on a network must have unique network Id on every node linkon the same network. You can create an interconnecting subnetworks ifyou break down the major network into smaller ones. Then each datalink on the same network will have a unique network or subnet ID.They each have n IP addresses, one for every network that it isconnected.
After you subdivide the network, how many additional domain controllers will you be required to deploy, if any?
Microsoftsuggests usingmore than one domain controller. This is to havearegular failover securityof the directory.Domain controllers’ purpose is for directoryactions only andit must not run other software or act as a fileserver. It is recommended to provide at minimum two disconnecteddomain controllers and an extra domain controllers,which is optional, redundancy or performance, a separate file server, exchange server,a SQL Server, so on and so forth to carry out various serverfunctions.
d.Where should you place the domain controllers?
Theadditional domain controllers should be located on the site whereinthe two subnetworks are assignede.How will this impact traffic through the router?
Largenetworks usually undergone lot of traffic to and fro. Slow networkresults from high network traffic load caused by the processing ofnumerous requests by the servers. These requests are made by theworkstations inside the network. The domain controller functions byregulating all the network traffic passing back and forth the serversand the workstations. It reduces network congestion by directing thetraffic to various work stations or servers.
f.What is the minimum number of DHCP servers needed in the newconfiguration?
Theminimum number of DHCP servers needed is one. DHCP can be configuredto support multiple subnetworks.g.How will DHCP server configurations change after you deploy therouter, assuming there are DHCP clients on both subnetworks?
DynamicHost Conﬁguration Protocol or the DHCP gives the administrator tomanageandshare outfrom a central point the IP addresses and givesaNewIPaddress when the computer wasplugged inanother place in thenetwork. Arelay agent is a small program that communicates the DHCP/BOOTPmessages between the users and to the servers on differentsubnetworks. According to the standard documents that describerelated behavior and protocol design, the Request for Comments or theRFCs, relay agents are part of the DHCP and BOOTP principles androle.
h.What special router configuration will be needed?
Routersare connects the hardware and software on different physical networksegments. In order to sustain and to use the DHCP service in varioussubnets, the routers interconnecting each subnet must follow withDHCP/BOOTP relay agent abilities explained in RFC 1542. Each routermust recognize BOOTP and DHCP protocol messages and relay it properlyfor routers understand DHCP messages as BOOTP messages. It usuallyrelays DHCP packets or BOOTP packets given on the network.
i.The Linux server includes the software needed to configure it as anIP router. What additional special software would be required tosupport Windows and Mac OS X clients?
WindowsServer 2008 has basic and advanced TCP/IP diagnostic tools. BasicTCP/IP diagnostic tools are, as follows:
• IPconfig command
• NetworkConnections folder
• NetworkDiagnostics in Help and Support
• Pingcommand Advanced TCP/IP diagnostic tools:
j.What configuration changes would be needed on the clients?
IPconfiguration information includes:
Additionalconfiguration parameters that must be change are as follows:
Default gateway address,
Domain Name System (DNS) server addresses
DNS domain name
Windows Internet Name Service (WINS) server addresses
Window Client configuration
Inconfiguring Windows system as DHCP clients, the following steps mustbe followed:
open LAN card properties
click on properties and set obtain IP address automatically
LAN card porperties
Command prompt and obtain the new IP address
k.File sizes on the Mac OS X server will be very large. You want tominimize their impact on traffic through the router. How should youdo this?
Configuringthe Linux as bridge or router, given in this situation with the Linuxcomputer as the router, is one of the methods to utilize Linuxtraffic control.
Implementingthe traffic control requires creating a layer 2 bridge consisting ofthe following:
Through brctl, construct a bridge device and add to it two Ethernet ports
Implement to each of the interfaces the prioritization, shaping and policing rules
.A layer 2 access switch is linked to one of the 2 network ports. Thelocal machines are linked to this switch. On the other hand, anupstream router located on the same network is linked to the othernetwork port. The rules are implemented to outgoing traffic on bothnetwork ports. This enables useful policies to be implemented on bothinterfaces thereby controlling the traffic to and from the network,
l.What effect would the configuration changes have on the web servers?
Foran instance, the ethernet0 interface for the LAN interface andEthernet1 is for outside, the ISP or WAN physical interface. Dialer1is for the logical WAN interface. For the user’s server, the188.8.131.52 is the ISP which provides stationary IP address. Thisconfiguration is for FTP server that used ordinary TCP port 20 and21. For the servers and the workstations the LAN network used10.10.10.0 with subnet 255.255.255.0. All servers in the LAN customstationary IP address. The router is constructed as DHCP server togive IP info such as the subnet mask, the IP addresses, and the DNSthat are organized as DHCP users.
Thisconfiguration of your servers in Cisco router recommends variouspossible network plans. All in all, it suggests that network designcan be without or with port forwarding. A port forwarding means thereis Network Address Translation and/or Port Address Translationincluded. When there is no NAT or PAT, then it means that there isno port forwarding given.
(2012,May 12). 7Reasons You Will Benefit From Domain Controllers. Retrievedfrom
(2013,March 22). InstallingExchange on a domain controller is not recommended. Retrieved
(2014,February 5) ExchangeServer Analyzer. Retrieved from
(2014,February 5) SecurityConsiderations for a SQL Server Installation. Retrieved
from TechNet. Microsoft.http://technet.microsoft.com/en-us/library
Degremont,M. ( 2011, 30 June). CanI install SQL Server on a domain controller? Retrieved
fromMicrosoftSQL Server blog.Forsecurity and performance reasons, we recommend that you do notinstall a standalone SQL Server on a domain controller.
Manmaharjan,N. (2011, August 29) CreatingAdditional Domain Controller for an Existing
Posey,B. (2010, 23 August). 10tips for effective Active Directory design.Retrieved from
TechRepublic. CBSInteractive.2014, 5 February.Wheneverpossible, your domain controllers should run on dedicated servers(physical or virtual).http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html