meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77

Join the forum, it's quick and easy

meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77
meo786
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Course 6690 Exploring the Fundamentals of Network Infrastru

Go down

Course 6690  Exploring the Fundamentals of Network Infrastru Empty Course 6690 Exploring the Fundamentals of Network Infrastru

Post by Admin Thu Feb 23, 2012 11:57 am

Course 6690 Exploring the Fundamentals of Network Infrastructure in Windows Server 2008


Overview of a Physical Network Infrastructure

The Open Systems Interconnection Model

In 1978, the International Standards Organization (ISO) introduced the OSI networking model to standardize data communication and promote multivendor network interoperability.
The following are the OSI model layers, each with a specific set of network functions:
· Layer 1. This is a physical layer, and it is the lowest layer of the OSI model. This layer controls the way unstructured, raw, or bit-stream data is sent and received over a physical medium. This layer is composed of the electrical, optical, and physical components of the network. The physical layer carries the signals for all the higher layers.
· Layer 2. This is the data-link layer, and it helps the transfer of data frames from one computer to another over the physical layer. The layers above the data-link layer can also receive data transmission over the network.
· Layer 3. This is the network layer, and it controls the operation of the subnet. It determines the physical path of the data, based on the network conditions, the priority of service, and other factors.
· Layer 4. This is the transport layer, and it ensures that messages are delivered in the order in which they are sent, and that there is no loss or duplication of data.
· Layer 5. This is the session layer, and it establishes communication sessions between the processes that run on various computers. The session layer can support message-mode data transfer.
· Layer 6. This is the presentation layer, and it serves as the data translator for the network. This layer on the sending computer translates the data sent by the application layer into a common format. At the receiving computer, the presentation layer translates the common format to a format known to the application layer.
· Layer 7. This is the application layer, and it serves as the medium for users and application processes to access network services.
Components of Network Infrastructure

In a physical network infrastructure, you can control communication between computers on a network. The components of a physical network infrastructure enable the process of data flow on a computer network and troubleshoot network communication.
Workstation or client Workstations or clients are computers that users use to perform tasks, such as accessing files stored on the network, or communicating with other client computers. Other devices, such as personal organizers, can also be clients.
Servers are computers that provide services for other servers and clients.
Media in a network infrastructure is the network cabling that connects computers and other network devices.
Switches are devices that allow and control communication between computers and other network devices.
Routers are devices that move data packets from one network to another.
Firewalls are security devices that filter data packets as they are moved from one network to another. Unlike routers, you can use firewalls to set security rules and security features.
Common Types of Media
To connect the network infrastructure in your organization, you can choose media that help in the logical grouping of your network. The various media that you can use on a network are twisted-pair cables, fiber-optic cables, and wireless media.
Twisted-pair cabling is the most common cabling type that is used on internal corporate networks. A single cable consists of four pairs of wires that are twisted around each other. The maximum length of twisted-pair cabling when used for Ethernet is 100 meters. Ethernet defines the standards for wiring and signaling for the physical layer. The use of twisted-pair versions of Ethernet for connecting end systems to the network is the most widespread wired LAN technology.
Fiber-optic cabling carries light pulses rather than electrical signals. This cabling type is less susceptible to signal deterioration and can be used for longer distances. Multimode fiber-optic cabling uses a plastic core to carry the light pulses, and single-mode fiber-optic cabling uses a glass core. Multimode fiber-optic cabling supports distances up to 2 kilometers (km) for 100 megabits per second (Mbps) Ethernet, and single-mode fiber-optic cabling supports distances up to 40 km for 10 gigabits per second (Gbps) Ethernet.

Wireless networking is used on corporate networks to support users who keep moving within a building or within a campus. The primary advantage of wireless networking is that cables are not used for connectivity. However, you need to place wireless access points to ensure that wireless clients are able to connect from all areas of a campus.
What Is a Network Switch? A network switch is a device that mediates data on a computer network. Network switches are an improvement over hubs that were used earlier for network connectivity. A network switch is a layer-2 device that has multiple ports. You can connect a computer or any other network device to each port. The switch tracks the location of each computer or network device, based on their media access control (MAC) addresses, and delivers data packets to the appropriate network port.
In a simple network environment, you do not need to configure the network switches. The switches automatically detect the location of each computer by monitoring network packets. In a larger network environment, you need to use advanced network switches that provide additional functionality.
Advanced network switches create Virtual Local Area Networks (VLANs) and control network communication. The switches also monitor network communication by using data packet sniffers to intercept and log traffic that passes over the network.
What Is a Network Router? A router is a layer 3 device that transmits data packets through networks. You need to connect a router to at least two networks. For example, you can connect a router to two local area networks (LANs), two wide area networks (WANs), or a LAN to an Internet service provider (ISP) network.
Routers are located at gateways where two or more networks connect. Routers help to transmit data between two networks. Routers also keep the networks connected to the Internet.
When data is sent across various locations on a network or across various networks, a router monitors and directs the data to the correct location. Routers use headers on data packets and forwarding tables to determine the best path for forwarding them. Routers use protocols such as Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) to communicate with other routers and to configure the best route between two hosts.
Gateways can be used for various purposes. On a communications network, a gateway is a network node equipped for interfacing with another network that uses different protocols.
On a TCP/IP network that has multiple subnets, you need to identify at least one TCP/IP gateway as the default gateway, so that network devices can communicate with other devices outside its subnet. Translation gateways convert protocols between various network types.
What Is a Network Firewall? A firewall is a dedicated appliance or software that inspects and regulates network traffic. A firewall is a router that operates based on a set of rules. Based on these rules, firewalls permit or deny the passage of traffic. Firewalls operate at layer 4 of the OSI model.
A firewall regulates the flow of traffic between computer networks that operate at different trust levels. For example, the Internet is a zone of no trust and an internal network is a zone of high trust. A perimeter network, also known as DMZ, demilitarized zone, or screened subnet, is located between the Internet and a trusted internal network.
By default, every firewall has a default-deny rule set. You must configure these default settings so that the firewall can function properly. In a default-deny rule set, the firewall permits the passage of only those connections that are explicitly allowed passage. The disadvantage of a default-deny configuration is that it requires a detailed understanding of all the network applications and endpoints that are used in an organization on a day-to-day basis. It may not be possible for an organization to arrive at such detailed understanding.
Therefore, many organizations implement a default-allow configuration. In a default-allow rule set, all traffic is allowed unless some connections are specifically blocked. The disadvantage of a default-allow configuration is that it allows the passage of inadvertent network connections.
A host-based firewall is software that runs directly on a networked device and protects that device against attack from malicious users on the network by controlling incoming and outgoing network traffic. Microsoft Windows Firewall is a host-based firewall that provides enhanced logging, centralized management, and more granular rules.
Organization of Logical Networks
What Is a LAN? A LAN is a network at a single physical location. The location can be a single building or multiple buildings in close proximity on a campus.
On a LAN, the connectivity between computers and other network devices is fast. A typical LAN operates at 100 Mbps or 1 Gbps. Smaller LANs use switches to connect the network devices. Larger LANs use routers, in addition to switches, to subdivide the LAN into smaller networks to manage the network traffic efficiently.
Because a LAN is an internal, trusted network, you may not want to impose constraints for data movement. All hosts on the network are also trusted. Larger organizations may implement controls such as firewalls or restricting switch ports to protect computers that contain critical or confidential data. Organizations might also encrypt traffic to protect computers on a LAN by using IP security (IPsec).
What Is a WAN? A WAN is a network that covers a broad area such as a head office and a branch office. Typically, the connectivity on a WAN is slower than the connectivity on a LAN. For example, a T-carrier (T1) connection on a WAN operates at 1.5 Mbps, whereas a LAN operates at the speed of 100 Mbps or higher.
The network connectivity service between WAN locations is usually purchased from telecommunication organizations. These organizations provide various options for WAN connectivity, based on the facilities available in the WAN locations. For LAN connectivity, an organization only needs the initial infrastructure cost. There is no ongoing cost for maintaining connectivity. In contrast, an organization has to pay a monthly fee for WAN connectivity.
What Is a Branch Office? A branch office is an office at a distant location that is connected to the head office through a WAN connection. In most cases, a branch office has:
· Fewer users. Typically, in a branch office, there may be about 10 users.
· Limited local support resources. In a branch office, there may not be a dedicated system administrator at the location. Sometimes, an employee may be designated to provide technical support as an additional responsibility.
· Limited local computing resources. A branch office may not contain a local server for users to store files.
A branch office may face certain issues in its daily functioning. The following table includes some of the issues that are faced in branch offices, and their results.
Challenge Result
Slow WAN links Access to files and applications across the WAN links is slow.
Unreliable WAN links Access to files and applications can be interrupted, causing the flow of business information at the branch office to stop.
High latency in communication Communication across the WAN links is slow.
Lack of local support resources System repairs may take time because an administrator at the head office is required to travel to the branch office.
What Is a Perimeter Network? A perimeter network is a small network that is used to isolate externally accessible resources from the LAN and the Internet.
A perimeter network is formed by using two firewalls. The first firewall is located between the Internet and the perimeter network. The second firewall is located between the perimeter network and the LAN.
The resources on the perimeter network are isolated from the intranet to protect them from malicious users. The resources are isolated from the LAN because they are considered to be at a high risk. If these resources are accessed by malicious users, isolation of these resources from the LAN protects the other resources on the LAN.
For example, you can create a perimeter network by setting up a single firewall with three ports. You can designate one port as the perimeter network, and the firewall can control the movement of data packets between the perimeter network, LAN, and the Internet.
The perimeter network allows external users to access the specific servers located on the network, while preventing access to the intranet.
What Is Remote Access? Remote access is the process used to provide users with access to LAN resources from outside the office. Remote connectivity is essential for users who work from home or other locations outside the office.
You can provide remote access to users by using dial-up or VPN connectivity. When using dial-up connectivity, remote users can connect to LAN resources by using a modem and telephone line. When using VPN connectivity, remote users can connect to LAN resources by using an encrypted connection over the Internet. Although, VPN connectivity is faster than dial-up connectivity, both provide slow access when compared to a LAN-to-LAN connection.
The challenges faced by remote users are similar to those faced by users in branch offices. To facilitate remote users to access data quickly, you can use Terminal Services in Windows Server 2008. Terminal Services helps you to control a session remotely by using a remote server that runs applications and accesses data. By using Terminal Services, you can send only the screen-retrieving information and keystrokes across the network. This is faster than sending files or application data.
You are an IT administrator at Woodgrove Bank. The organization has recently opened a branch office at a remote location. You have to provide connectivity for the network devices between the head office and the branch office. What network would you implement to help employees access resources at both the locations?
LAN.
That is not correct. You can implement LAN to allow employees to access resources between two physical locations that are located in close proximity. You should implement WAN to connect the network devices between the head office and the branch office. You use WAN to access resources between two physical locations that are not located in close proximity.

WAN.
That is correct. You should implement WAN to connect the network devices between the head office and the branch office. You use WAN to access resources between two physical locations that are not located in close proximity.

Perimeter Network.
That is not correct. You can create a perimeter network to isolate externally accessible resources over the LAN and over the Internet. This increases the security of the accessible resources. You should implement WAN to connect the network devices between the head office and the branch office. You use WAN to access resources between two physical locations that are not located in close proximity.

Remote Access.

You are an IT administrator at Woodgrove Bank. You need to provide remote access for employees who are traveling from one office to another. The organization, at the same time, does not have additional telephone lines. Considering the existing infrastructure of the organization, what method should you use to provide remote access to the employees?
VPN connectivity.
That is correct. You can use VPN connectivity to provide remote access to employees traveling from one office to another. On a VPN connection, you use an encrypted connection over the Internet to connect to LAN resources, and you do not require telephones or modems for connectivity.

Dial-up connectivity.
That is not correct. In dial-up connectivity, you need to connect to LAN resources by using a modem and a telephone line. You should use VPN connectivity to provide remote access to employees traveling from one office to another. On a VPN connection, you use an encrypted connection over the Internet to connect to LAN resources, and you do not require telephones or modems for connectivity.

LAN.
That is not correct. You use LAN to access resources between two physical locations that are located in close proximity. You should use VPN connectivity to provide remote access to employees traveling from one office to another. On a VPN connection, you use an encrypted connection over the Internet to connect to LAN resources, and you do not require telephones or modems for connectivity.

Perimeter network.
Overview of Active Directory
What Is Active Directory? Active Directory is a central repository of network information that is used for logon security and application configuration. The information stored in Active Directory includes user accounts, computer accounts, application configuration information, and subnet addresses.
Active Directory is organized into domains, trees, and forests. Domains are a collection of administratively defined objects that share a common directory database, security policies, and trust relationships with other domains. Each domain is an administrative boundary for objects.
Domain trees are collections of domains that are grouped together in hierarchical structures. When you add a domain to a tree, it becomes a child of the tree root domain. The domain to which a child domain is attached is called the parent domain.
A forest is a complete instance of Active Directory. Each forest acts as a top-level container that houses all domain containers for that particular Active Directory instance. A forest can contain one or more domain container objects that share a common logical structure, global catalog, directory schema, and directory configuration.
Active Directory consists of multiple partitions that include:
· Domain partition. The domain partition holds information that is specific to a domain, such as computer accounts and user accounts. The domain partition has subsets of data that are replicated to domain controllers outside the domain, such as global catalog servers.
· Configuration partition. The configuration partition holds configuration information related to Active Directory and Active Directory applications. The configuration partition is replicated to all domain controllers in an Active Directory forest.
· Schema partition. The schema partition consists of a list of allowed objects and attributes in Active Directory. The schema partition is replicated to all domain controllers in an Active Directory forest.
· Application partition. The application directory partition is replicated only to specific domain controllers. You should use application directory partitions for Active Directory–integrated DNS zones to reduce replication traffic and the amount of data stored in the global catalog.
Active Directory simplifies security management. Active Directory also provides extensibility, redundant storage of security information, and a method for distributing group policies.
What Is a Domain Controller? A domain controller is a computer that holds a copy of Active Directory information which includes a copy of the local domain partition, the configuration partition, and the schema partition.
When you try to access a domain, you need to provide user and computer credentials. These credentials are sent to the domain controller for verification.
Many applications use domain controllers to query Active Directory information. For example, Microsoft Exchange Server reads configuration information from Active Directory.
You can use Domain Name System (DNS) to locate domain controllers. If DNS is configured incorrectly, users may not be able to log on to the server, or the logon times will be very slow.
Some domain controllers are also configured as global catalog servers. A global catalog server contains a subset of the domain information for all domains in a forest. This is useful when applications need to query Active Directory information for all domains in a forest. For example, Microsoft Office Outlook 2007 queries Active Directory to build an address list for all Microsoft Exchange Server 2003 recipients in an organization.
How To Join a Server to an Active Directory Domain In Windows Server 2008, you can effectively manage network resources by joining an Active Directory domain to another. Verify the computer name and the workgroup of NYC-SVR1, and then change its system properties. Enter the name of the domain on which you want to join NYC-SVR1. Enter the name and password for NYC-SVR1. Notice that you are connected to WoodgroveBank.com.
Restart the computer to apply the change in the domain. Open the Active Directory Users and Computers console and verify that NYC-SVR1 has been joined to WoodgroveBank.com. Now, log on to NYC-SVR1 to verify the joining. Open Control Panel and verify that the user name, Administrator, from WoodgroveBank.com is a member of the Administrators group.
This demonstration showed you how to join a domain.
You are the IT administrator at Woodgrove Bank. A new team of accountants has recently joined the organization. You need to add their e-mail addresses in the company mailing list. Which part of Active Directory should you use to store this information?
Select the one best answer.

Configuration partition.
That is not correct. The configuration partition stores configuration information related to Active Directory and Active Directory applications. The domain partition stores information that is specific to a particular domain, such as computer and user accounts.

Domain partition.
That is correct. The domain partition stores information that is specific to a particular domain, such as computer and user accounts.

Schema partition.
That is not correct. The schema partition contains the list of allowed objects and attributes in Active Directory. The domain partition stores information that is specific to a particular domain, such as computer and user accounts.

Global Catalog server.
That is not correct. The Global Catalog server contains a subset of the domain information for all domains in the entire forest. The domain partition stores information that is specific to a particular domain, such as computer and user accounts.


Which of the following options contains a subset of the domain information for all domains in a forest?
Select the one best answer.

Schema partition.
That is not correct. The schema partition contains the list of allowed objects and attributes in Active Directory. A global catalog server contains a subset of the domain information for all domains in a forest.

DNS.
That is not correct. DNS is used to locate domain controllers. A global catalog server contains a subset of the domain information for all domains in a forest.

Global catalog server.
That is correct. A global catalog server contains a subset of the domain information for all domains in a forest.

Domain partition.
Overview of Server Roles and Features


What Are Server Roles? Server roles describe the primary function of a server. Windows Server 2008 provides various server roles you can use, such as Active Directory Domain Services (AD DS) or Web Server (IIS).
You can install one or more roles on a Windows Server 2008 installation. For example, in a large enterprise, computers can be configured to perform a single role to ensure sufficient scalability. In a small organization, many roles can be combined on a single computer.
In Windows Server 2008, the Server Manager administrative tool is used to install and remove server roles.
Most server roles also have role services. You can control the role functionality that is installed and enabled on your computer with the help of role services. For example, the Print Services role allows you to enable or disable role services such as the print server, Line Printer Daemon (LPD) service, or Internet printing.
What Are Server Features? A server feature describes an auxiliary or supporting function of a server. You can install a server feature to augment the functionality of an installed server role. For example, you can install the Failover Clustering feature after installing a specific role, such as the File Services role, to make the server role more effective.
The following server features are available in Windows Server 2008, and you can install them by using Server Manager:
· Supporting services
· Microsoft .NET Framework 3.0
· BitLocker Drive Encryption
· Network Load Balancing
· Group Policy Management
· Desktop Experience
· Message Queuing
· Windows Server Backup
· Windows PowerShell
What Is Server Core? Server Core is a new installation option that you can use for installing Windows Server 2008. It provides a minimal environment for running specific server roles. The graphical user interface (GUI) is not included as part of the Server Core installation.
After you install and configure Windows Server 2008, you can manage it either locally at the command prompt or remotely by using Remote Desktop. You can also manage the server remotely by using Microsoft Management Console (MMC) or command-line tools that support remote use.
The Server Core installation option of Windows Server 2008 provides the following benefits:
· Reduced maintenance
· Reduced attack surface
· Reduced management
· Reduced disk space requirements
· Increased performance
A server running a Server Core installation supports the following server roles:
· AD DS
· Active Directory Lightweight Directory Services (AD LDS)
· Dynamic Host Configuration Protocol (DHCP) server
· DNS server
· File Services
· Hyper-V
· Print Server
· Streaming Media Services
· Web Server
You are an IT administrator at Woodgrove Bank. Your organization wants to implement Windows Server 2008. You also need to install server roles and server features on Windows Server 2008. How can you control the functionality of the server roles that are installed and enabled on your computer?
Select the one best answer.

By using Server Core.
That is not correct. Server Core is a new installation option for Windows Server 2008, and it provides a minimal environment for running specific server roles. You can use role services to control the functionality of the roles that are installed and enabled on your computer.

By using role services.
That is correct. You can use role services to control the functionality of the roles that are installed and enabled on your computer.

By using Server Manager.
That is not correct. Server Manager is used for the installation and removal of server roles in Windows Server 2008. You can use role services to control the functionality of the roles that are installed and enabled on your computer.

By using server features.
That is not correct. Server features are an auxiliary or supporting function of a server. You can install server features to augment the functionality of an installed role. You can use role services to control the functionality of the roles that are installed and enabled on your computer.
Which of the following options reduces the need for maintenance, disk space requirements, and attack surface in Windows Server 2008?
Select the one best answer.

Failover Clustering.
That is not correct. Failover Clustering is a server feature that increases the effectiveness of a specific server role. The Server Core installation option reduces the need for maintenance, disk space requirements, and attack surface in Windows Server 2008.

Web Server role.
That is not correct. The Web Server role allows you to share information with users on the Internet, an intranet, or an extranet. The Server Core installation option reduces the need for maintenance, disk space requirements, and attack surface in Windows Server 2008.

Remote Desktop.
That is not correct. Remote Desktop is a feature of Windows Server 2008 that allows users to connect remotely to a computer and access programs, files, and network resources. The Server Core installation option reduces the need for maintenance, disk space requirements, and attack surface in Windows Server 2008.

Server Core.
That is correct. The Server Core installation option reduces the need for maintenance, disk space requirements, and attack surface in Windows Server 2008.
Lab: Exploring the Fundamentals of Network Infrastructure
Scenario You are a network administrator at Woodgrove Bank, a travel bookings company operating with 20 employees. The organization has the following requirements:
· Employees need to use Microsoft Office applications to create correspondence and perform financial analysis.
· Employees need an e-mail and calendaring solution.
· Employees need to share files between them.
· Clients need to download travel information. A Web site is needed to facilitate this.
· Employees may require remote access to company data from home.
· Employees need wireless network access in the conference room.
Woodgrove Bank has opened two new branch offices. The new branch offices need to be connected to the head office by using WAN links. As a network administrator, you need to examine the LAN components, WAN components, and join a server to the domain.
Exercise Information There are three main exercises in this lab. Each one is designed to help you achieve one or more learning objectives.
Exercise 1: Examining the Components of a LAN
· Create a diagram that includes the necessary network components for a LAN.
· Compare your diagram to the sample diagram provided on the lab review page.
Exercise 2: Examining the Components of a WAN
In this exercise, you will:
· Create a diagram that includes the necessary network components for a WAN.
· Compare your diagram to the sample diagram provided on the lab review page.
Exercise 3: Joining a Server to a Domain
In this exercise, you will:
· Join a server to the domain controller.
· Verify domain membership.

Exercise 1: Examining the Components of a LAN
1. 1. Based on the scenario, draw a diagram that includes the necessary network components for the Local Area Network of Woodgrove Bank.
Answer:
Exercise 2: Examining the Components of a WAN
2. 1. Based on the scenario, draw a diagram that includes the necessary network components for the Wide Area Network of Woodgrove Bank.
Answer:
Course 6690: Exploring the Fundamentals of Network Infrastructure

Print this page.

Note:
These lab instructions are located on the Launch the Lab page of the course, as well as in the expandable Lab Instructions pane of the launched lab. Both sets contain the same information, so please use the instructions from the location you feel is most convenient.
Lab Scenario
You are a network administrator at Woodgrove Bank, a travel bookings company operating with 20 employees. The organization has the following requirements:
· Employees need to use Microsoft Office applications to create correspondence and perform financial analysis.
· Employees need an e-mail and calendaring solution.
· Employees need to share files between them.
· Clients need to download travel information. A Web site is needed to facilitate this.
· Employees may require remote access to company data from home.
· Employees need wireless network access in the conference room.
Woodgrove Bank has opened two new branch offices. The new branch offices need to be connected to the head office by using WAN links. As a network administrator, you need to examine the LAN components, WAN components, and join a server to the domain.
Exercise 1: Joining a Server to the Domain
In this exercise, you will:
· Join a server to the domain controller.
· Verify domain membership.
Task 1: You are logged on to the NYC-DC1 server with the user name, WoodgroveBank\Administrator, and the password, Pa$$w0rd. Proceed to the next task.
1. If you need to log on to the NYC-DC1 server, click the Ctrl-Alt-Delete button.
2. Enter the following:
o Username: WoodgroveBank\Administrator
o Password: Pa$$w0rd
Task 2: You are logged on to the NYC-SVR1 server with the user name, NYC-SVR1\Localadmin, and the password, Pa$$w0rd. Proceed to the next task.
1. If you need to log on to the NYC-SVR1 server, click the Ctrl-Alt-Delete button.
2. Enter the following:
o Username: NYC-SVR1\Localadmin
o Password: Pa$$w0rd
Task 3: Join a server to the domain controller.
1. Verify the computer name and workgroup name by using the system properties.
2. Join the NYC-SVR1 server to the WoodGroveBank.com domain name by using the following information:
o User name: Administrator
o Password: Pa$$w0rd
3. Verify that the NYC-SVR1 server is created in the NYC-DC1 domain controller by using Active Directory Users and Computers.
Result
You have joined a server, NYC-SVR1, to the domain controller.
Task 4: Log on to the NYC-SVR1 server with the user name, WoodgroveBank\Administrator, and the password, Pa$$w0rd.
1. If you need to log on to the NYC- SVR1 server, click the Ctrl-Alt-Delete button.
2. Enter the following:
o Username: WoodgroveBank\Administrator
o Password: Pa$$w0rd
Task 5: Verify domain membership.
1. Verify that the administrators of WoodgroveBank have the administrator rights by using Control Panel.
Result
You have verified the domain membership.
Task 6: You have completed all tasks in this exercise.
1. A successful completion of the tasks in this exercise results in the following outcomes:
o The server, NYC-SVR1, is joined to the domain controller.
o Domain membership is verified.
Lab Resources
There are no additional lab resources for this lab.

Note:
Printable versions of the lab instructions and lab detailed steps are available from the Launch the Lab page and Lab Review page, respectively, of the course.
In this lab, you explored the framework related to the infrastructure of a physical network in Windows Server 2008. You identified the network components needed for the LAN and WAN connections. You also joined a server to a domain and verified the administrator rights of the domain.
You may find it useful to review your approach now and consider the following questions:
1. Which type of remote access uses an encrypted connection over the Internet?
Answer: VPN remote access uses an encrypted connection over the Internet.
2. How many firewalls are required to form a perimeter network?
Answer: Two firewalls are required to form a perimeter network.
Exercise 1: Examining the Components of a LAN
3. 1. Based on the scenario, draw a diagram that includes the necessary network components for the Local Area Network of Woodgrove Bank.
Answer:
The following are the components for the Local Area Network:
1. 1. A server for sharing files
2. 2. Workstations for users to log on
3. 3. A switch to connect the workstations and server
4. 4. Media connecting the workstations and server to the switch
5. 5. A wireless access point for the boardroom
6. 6. A perimeter network for hosting the Web server used by clients
7. 7. Firewalls to create the perimeter network
8. 8. A remote access server in the perimeter network for VPN connectivity
9. 9. An e-mail server in the perimeter network
Exercise 2: Examining the Components of a LAN
4. 1. Based on the scenario, draw a diagram that includes the necessary network components for the Wide Area Network of Woodgrove Bank.
Answer:
The following are the components for the Wide Area Network:
1. 1. Branch office 1
2. 2. Branch office 2
3. 3. Routers connecting to the physical locations
4. 4. WAN links between the physical locations

Exercise 1: Joining a Server to the Domain
Task 1: You are logged on to the NYC-DC1 server with the user name, WoodgroveBank\Administrator, and the password, Pa$$w0rd. Proceed to the next task.
1. There are no detailed steps for this task.
Task 2: You are logged on to the NYC-SVR1 server with the user name, NYC-SVR1\Localadmin, and the password, Pa$$w0rd. Proceed to the next task.
1. There are no detailed steps for this task.
Task 3: Join a server to the domain controller.
1. Verify the computer name and workgroup name by using the system properties.
a. On the Start menu of NYC-SVR1, right-click Computer, and then click Properties. The System window appears.
b. In the Computer name, domain, and workgroup settings area of the System window, note that the Computer name is NYC-SVR1 and the Workgroup name is WORKGROUP.
2. Join the NYC-SVR1 server to the WoodGroveBank.com domain name by using the following information:
o User name: Administrator
o Password: Pa$$w0rd
a. In the Computer name, domain, and workgroup settings area of the System window, click Change settings. The System Properties dialog box appears.
b. On the Computer Name tab of the System Properties dialog box, click Change. The Computer Name/Domain Changes dialog box appears.
c. In the Member of area of the Computer Name/Domain Changes dialog box, click Domain.
d. In the Domain box, type WoodgroveBank.com, and then click OK. The Windows Security dialog box appears.
e. In the Windows Security dialog box, in the User name box, type Administrator, in the Password box, type Pa$$w0rd, and then click OK. The Computer Name/Domain Changes message box appears.
f. In the Computer Name/Domain Changes message box, click OK. The Computer Name/Domain Changes message box appears.
g. In the Computer Name/Domain Changes message box, click OK.
h. In the System Properties dialog box, click Close. The Microsoft Windows message box appears.
i. In the Microsoft Windows message box, click Restart Now.
3. Verify that the NYC-SVR1 server is created in the NYC-DC1 domain controller by using Active Directory Users and Computers.
a. On the Start menu of NYC-DC1, point to Administrative Tools, and then click Active Directory Users and Computers. The Active Directory Users and Computers console appears.
b. In the tree pane of the Active Directory Users and Computers console, expand WoodgroveBank.com, and then click Computers. The Computers result pane appears.
c. In the Name list of the Computers result pane, note that the NYC-SVR1 server is created.
d. In the Active Directory Users and Computers console, click the Close button.
Task 4: Log on to the NYC-SVR1 server with the user name, WoodgroveBank\Administrator, and the password, Pa$$w0rd.
1. There are no detailed steps for this task.
Task 5: Verify domain membership.
1. Verify that the administrators of WoodgroveBank have the administrator rights by using Control Panel.
a. On the Start menu of NYC-SVR1, click Control Panel. The Control Panel appears.
b. In Control Panel, double-click User Accounts. The User Accounts window appears.
c. In the User Accounts window, click Manage User Accounts. The User Accounts dialog box appears.
d. In the Users for this computer box of the User Accounts dialog box, note that the local administrators of WoodgroveBank is a member of the Administrators group.
e. In the User Accounts dialog box, click the Close button.
f. In the User Accounts window, click the Close button.
Task 6: You have completed all tasks in this exercise.
1. There are no detailed steps for this task.

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Course 6690  Exploring the Fundamentals of Network Infrastru Left_bar_bleue0 / 1000 / 100Course 6690  Exploring the Fundamentals of Network Infrastru Right_bar_bleue

Rate by Admin :
Course 6690  Exploring the Fundamentals of Network Infrastru Left_bar_bleue0 / 1000 / 100Course 6690  Exploring the Fundamentals of Network Infrastru Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum