You are on page 1of 221

MCSA 2003

70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional 70-290: Managing and Maintaining a Microsoft Windows Server 2003 Environment 70-291: Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure 70-294: Planning, Implementing and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure 70-297: Designing a Microsoft Windows Server 2003 Active Directory and Networking Infrastructure 70-284: Implementing and Managing Microsoft Exchange Server 2003

Windows XP

What is Patch Patch:- A patch is a small piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing bugs, replacing graphics and improving the usability or performance.

What is Service Pack


Service Pack:- A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.

Flavors of Windows XP

XP Home Edition: - It is introduced for personal computers or Home purpose XP Media Center Edition: - It is used for Media center PCs. Features of Media Center edition are - It supports more graphical Options than others Viewing software for Television and Recording TV guide Movie Maker with DVD burning. XP Professional: - It is a 32 bit OS and used for small business purpose XP Professional 64 bit: - It is a 64 bit version in XP to support 64 bit processor like Itanium XP Tablet Version: - It is used for mainly Laptops which includes more power management features.

Differences Between Home Edition and Professional


Feature
Backup Dynamic Disk EFS Multiprocessor Domain Membership Group Policy

Home Edition
NO NO NO NO NO NO

Professional
YES YES YES YES (2)

Remote Desktop NO

YES
YES YES

Differences Between Windows 98 , 2000 and XP


Feature System Restore Drivers Roll back Remote Desktop Remote Assistance Network Bridge Hibernate Integrated CD Burning Windows 98 NO No NO NO NO NO NO Windows 2000 p NO No Windows XP Yes Yes

Windows firewall NO

NO
NO NO NO YES YES NO

YES
YES YES YES YES YES YES

Recovery Console NO

Requirements of Windows XP

MINIMUM

RECOMMENDE D

RAM CPU
HDD

64 MB 233 MHz
1.5 GB

128 MB 300 MHz or HIGHER


2GB

Types of Installations
1. Clean / Attended Installation 2. Unattended Installation 3. Up gradation

4. Remote Installation
5. Network Installation 6. Sys Prep

1. Clean / Attended Installation Step 1:Switch on the computer Step 2:Insert the XP OS CD Step 3:Change the Boot Sequence in Bios Setup to CD ROM first device. Step 4:Press any key at Press any key to boot from CD Step 5:Press Enter to continue. Step 6:Press F8 to agree license. Step 7:Create Partition as you want Note: C drive must have min 1.5GB Step 8:Select C partition and Press Enter Step 9:Select Format the partition using NTFS . Note: After format and copying system will restart after some time one wizard displayed Step 10:Give name and next Give Product key and Next give administrator password and next. Step 11:Select regional settings and network model next Step 12:After some time you will get windows XP desktop.

2. Unattended Installation
Step 1: Create a answer file Step Step Step Step Step 2: 3: 4: 5: 6: Insert the XP OS CD Browse the path cddrive:\support\tools\deploy\ Extract setupmgr to desktop Run Setupmgr Select Create a new answer file Select Unattended Fully Automated Windows XP Professional Setup from CD Give the answers to all and say finish

Rename the answer file to winnt.sif Copy the file to empty floppy. Go to the new system to install xp Insert the OS CD after pressing a key at Press any key to boot from CD , insert floppy. Step 7: It will installs XP without asking any thing.

3. Up gradation

Upgrade from

Upgrade to

Windows Windows Windows Windows Windows

98 Me NT Workstation 4 2000 Professional 95

Windows XP Professional Windows XP Professional Windows XP Professional Windows XP Professional Windows 98 and then Windows XP Professional
Windows NT 4 WS and then XP

Windows NT 3.1, 3.5, or 3.51


Generating a Hardware Compatibility Report

1. Insert the Windows XP Professional CD-ROM into the CD-ROM drive. 2. At the command prompt, type d:\i386\winnt32 /checkupgradeonly. 3. Press ENTER.

Upgrading Compatible Windows 98 Computers

Step 1: Insert the Windows XP Professional CD-ROM. Step 2: The Auto run program on the Windows XP Professional CD-ROM displays the Welcome To Microsoft Windows XP screen. Step 3: Click Install Windows XP. Step 4: Select up gradation(Recommended) Step 4: Accept the license agreement. Step 5: Enter your 25-character product key, which is located on the back of the Windows XP Professional CDROM case.

4. Remote Installation

COVERED IN SERVER CONCEPTS.

5. Network Installation
1. Create a distribution server. The distribution server contains the installation files from the i386 folder on the Windows XP Professional CD-ROM. And Share that folder. 2. Boot the network client. On the target computer, boot from a floppy disk that includes a network client or start another operating system that can be used to connect to the distribution server. 3. Connect to the distribution server. After you start the network client on the target computer, connect to the shared folder on the distribution server that contains the Windows XP Professional installation files. 4. Run Winnt.exe or Winnt32.exe to start the Setup. Winnt.exe and Winnt32.exe reside in the shared folder on the distribution server. 5. Install Windows XP Professional. Setup restarts the local computer and begins the actual process of installing Windows XP Professional. The rest of the installation progresses in the same way as the attended installation.

6. System Preparation Tool

The System Preparation tool (Sysprep) is a technology that you can use when performing an image-based installation. Image-based installation is a method of copying or cloning preconfigured operating systems and software applications onto destination computers. Image-based installation is the fastest method of installing an operating system and applications

DISK MANAGEMENT

Two different types of disks 1. Basic Disk 2. Dynamic Disk

1. Basic Disk The traditional industry standard is basic storage. All versions of MS-DOS, Windows, Windows NT, Windows 2000, and Windows XP support basic storage. Basic storage dictates the division of a hard disk into partitions. A basic disk can contain primary partitions, extended partitions, and logical drives

Primary
A basic disk can contain a maximum of four primary partitions, or up to three primary partitions if there is also an Extended partition. Can be marked as the active partition. The system BIOS looks to the active partition for the boot files to start the operating system (only one active Partition per hard disk). Each primary partition can be formatted And assigned a drive letter.

Extended
A basic disk can contain only one extended partition.

An extended partition cant be Marked as the active partition.

Divided into logical drives, each of which can be formatted and assigned a drive letter.

2. Dynamic Disk Windows 2000 and Windows XP Professional support dynamic storage, You divide dynamic disks into volumes, which can consist of a portion, or portions, of one or more physical disks. Another advantage of the dynamic disk is to extend the size of volume

Types of volumes Simple volume Contains disk space from a single disk and is not fault tolerant.

Spanned volume Includes disk space from multiple disks (up to 32). XP writes data to a spanned volume onthe first disk , and then next and next. These volumes are not fault tolerant. Striped volume Combines areas of free space from multiple hard disks (up to 32) into one logical volume . It requires the equal space from all H.Ds. XP Professional optimizes performance by adding data to all disks at the same rate. These volumes are not fault tolerant.

A Mirrored Volume is a hard drive or other form of storage media that stores an exact copy of the data from another volume. It is used for fault tolerance, which means mirrored volume serves as a backup device in case the primary device fails.

Converting Basic to Dynamic

Steps: R.C. on Mycomputer select manage Disk Management R.C. on basic disk select convert to dynamic Basic Disk System Partition Boot Partition Primary Partition Dynamic Disk Simple Volume Simple Volume Simple Volume

Extended Partition
Logical drive

Simple volume for each logical drive


Simple Volume

Note :

System Partition: The Partition which contains the startup files such as ntldr, boot.ini, and Ntdetect.com
Boot Partition: The Partition which contains the windows operating system files

Managing Compression
Windows XP Professional supports two types of compression: NTFS compression and compressed folders.

Compressed folders
The Compressed Folders feature allows you to create a compressed folder so that all files you store in that folder are automatically compressed. The compressed folders are in reality Zip-compatible archives and can be read by any operating system or application that can read .zip files. To create a compressed folder, start Windows Explorer and then choose File | New | Compressed Folder. You can create and use compressed files and folders on both FAT and NTFS volumes.

You can encrypt compressed folders that you created using this feature.

NTFS Compression
NTFS compression enables you to compress files, folders, or an entire drive. NTFS compression is integrated directly with NTFS and can be applied by modifying the compression attribute on files and folders. If you want to set the compression state of a folder or file, right-click the folder or file in Windows Explorer, choose Properties, and then click Advanced. In the Advanced Attributes dialog box, select the Compress Contents To Save Disk Space check box. Click OK, and then, in the Properties dialog box, click Apply.

Compression files and folders

Drive Compression

EFS (Encrypting File System)


Encryption is the process of making information indecipherable to protect it from unauthorized viewing or use. The Encrypting File System (EFS) provides encryption for data in NTFS files stored on disk. To encrypt a folder, in the Properties dialog box for the folder, click the General tab. On the General tab, click Advanced, and then select the Encrypt Contents To Secure Data check box If an administrator removes the password on a user account, the user account loses all EFS-encrypted files,

To decrypt a folder or file, you clear the Encrypt Contents To Secure Data check box in a folder or files Advanced Attributes dialog box, which you access from that folder or files Properties dialog box.

MANAGING DISK QUOTAS


Disk quotas allow you to allocate disk space to users based on the files and folders they own. Windows XP Professional disk quotas track and control disk usage on a per-user, per-volume basis. Setting Disk Quotas You can enable disk quotas and enforce disk quota warnings and limits for all users or for individual users. Steps Select Enable Quota Management Select Deny Disk Space To Users Exceeding Quota Limit Select Quota entries for giving quotas for different users and limits

Select Quota menu and select New Quota Select the User to apply quota Give the quota limits and press OK and Apply.

DISK DEFRAGMENTER
Windows XP Professional saves files and folders in the first available space on a hard disk and not necessarily in an area of contiguous space. The parts of the files and folders are scattered over the hard disk rather than being in a contiguous area. When your hard disk contains numerous fragmented files and folders, your computer takes longer to access them because it requires several additional reads to collect the various pieces. The process of finding and consolidating fragmented files and folders is called defragmenting. You access Disk Defragmenter by choosing Start | All Programs | Accessories | System Tools | Disk Defragmenter. To perform disk defragmentation 15% space in that drive should free.

Chkdsk Chkdsk attempts to repair file system errors, locate bad sectors, and recover readable information from those bad sectors and mark them to prevent their future use. To access Chkdsk, select the drive you want to check in Windows Explorer or My Computer. Choose File | Properties, click the Tools tab, and click Check Now.

Disk Cleanup
You can use Disk Cleanup to free up disk space by deleting temporary files and uninstalling programs. Disk Cleanup lists the temporary files, Internet cache files, and unnecessary programs that you can safely delete. To access Disk Cleanup, select the drive you want to check in Windows Explorer or My Computer. Choose File | Properties, click the General tab, and click Disk Cleanup.

Managing Devices and Peripherals


Using Device Manager

Device Manager provides you with a graphical view of the hardware installed on your computer and helps you manage and troubleshoot it. You can use Device Manager to disable, uninstall, and update device drivers.
Device Manager also helps you determine whether the hardware on your computer is working properly.

User Accounts and Groups


User Account: User accounts are the basic token of identity of the persons to enter in to system and using the resources. Group: Groups contains a collection of user accounts to simplify the administration User and Group Account Permissions Depending on the permissions granted to them, users and groups can: Access file and print resources Manage access to files and printers Manage computer systems Manage other users and groups

Built-In User Accounts and Groups


Several built-in user accounts and groups are installed during system setup Built-in user accounts Administrator: The main administrative account for the system. It has permission to perform any configuration or administration task on the system. It can assign permissions and take ownership of resources even if it has not been explicitly given permission to them. Guest: Allows limited access to the system to perform basic tasks involving file and print usage or application usage. This account is disabled by default. Built-in groups Administrators: A group that has permission to manage all aspects of system operation and configuration. These accounts have all rights and privileges that a computer administrator requires to manage and configure a system.

Backup Operators: A group of user accounts with access to files that they normally would not be able to access, in order to back up those files to archive media.
Power Users: A group with limited administrative privileges on a system. Users in this group can install applications, add users and modify users they create, and create shared folders for use over a network. These users cannot perform system wide changes like installation of Service packs, or patches etc. Remote Desktop Users: A group with permission to connect to the system using Remote Desktop. Users: A group with basic system access; by default, it includes all users added to the system. Guests : A group with very low-level, temporary access to the system. Network Configuration Operators: Members in this group can have some administrative privileges to manage configuration of networking features.

Tools for Managing Users and Groups Computer Management It includes the Local Users and Groups snap-in, which manages users and groups for the local system.

To open this tool Right Click on my computer and select Manage

User Accounts tool in Control Panel

The User Accounts tool in Control Panel simplifies the creation and management of users. However, it lacks the ability to manage group memberships and user profile information.

Creating User Accounts


Using computer management Locate and select Local Users And Groups in your console. And Expand it.

Managing User Account Settings with Group Policy Local Security Policy allows you to manage settings such as the complexity of passwords that are allowed, the number of incorrect logon attempts allowed, and the logon script that runs after the user logs Policy Password on. The settings are: Enforce Password History Configures the number of passwords Windows XP remembers when requiring a user to select a unique password. If you configure this setting to 32, the user will not be allowed to use any of her last 32 passwords when setting a new password. Maximum Password Age Sets the password expiration interval for user accounts.

Minimum Password Age


Prevents a user from changing passwords too frequently. Minimum Password Length Prevents users from choosing passwords that are too short to have any real strength. Password Must Meet Complexity Requirements Implements several strength requirements for a new password. It must not contain all or part of the users account name, must be at least six characters in length, and must contain characters from three of the following four categories: English uppercase characters (A through Z)

English lowercase characters (a through z)


Base 10 digits (0 through 9) Nonalphanumeric characters (such as !, $, #, %)

Account Lockout Policy


Windows XP has the following policies that control account lockouts: Account Lockout Duration

Controls how long an account is locked out after the lockout threshold value has been met.
Account Lockout Threshold

Controls the number of invalid logon attempts against an account before it is locked out.
Reset Account Lockout Counter After Controls the amount of time that invalid logon attempts will accumulate toward the lockout threshold. If the time set here expires, the lockout counter is reset.

Advanced Boot Options of XP


To get advanced boot options press F8 key at the time of starting OS. Safe Mode: This option uses a minimal set of device drivers and services to start Windows. Safe Mode With Networking: This option uses a minimal set of device drivers and services to start Windows together with the drivers that you must have to load networking. Safe Mode With Command Prompt: This option is the same as Safe mode, except that Cmd.exe starts instead of Windows Explorer. Enable VGA Mode: This option starts Windows in 640 x 480 mode by using the current video driver (not Vga.sys). This mode is useful if the display is configured for a setting that the monitor cannot display. Note: Safe mode and Safe mode with Networking load the Vga.sys driver instead.

Last Known Good Configuration: This option starts Windows by using the previous good configuration. After each successful boot sequence XP makes a copy of the current combination of driver and system settings and stores it as the LKGC. Directory Service Restore Mode: This mode is valid only for Windowsbased domain controllers. This mode performs a directory service repair.
Enable Boot Logging: This option turns on logging when the computer is started with any of the Safe Boot options except Last Known Good Configuration. The Boot Logging text is recorded in the Ntbtlog.txt file in the %SystemRoot% folder. Debugging Mode: This option turns on debug mode in Windows. Debugging information can be sent across a serial cable to another computer that is running a debugger. This mode is configured to use COM2.

System Restore:
It allows for the rolling back of system files, registry keys, installed programs, etc., to a previous state in the event of malfunctioning or failure. Resources Monitored Registry Files in the Windows File Protection Local User Profile System files of certain extensions (.exe, .dll etc) Some Drivers Restore Points are created When software is installed using the Windows Installer, Package Installer or other installers software is installed using the Windows Installer, Package Installer or other installers When the user installs a driver that is not digitally signed Every 24 hours of computer use When the operating system starts after being off for more than 24 hours. When the user requests it.

To Create Restore Point


Steps 1. Start Programs Accessories System Tools System Restore. 2. Click Create a restore point, and then click Next. 3. In the Restore point description box, type a name to identify this restore point 4. To finish creating this restore point, click Create. To Restore System to previous Steps 1. Start Programs Accessories System Tools System Restore. 2. Select Restore my Computer to an Early time 3. Select the restore point to which you want to restore 4. OK

Driver Roll Back


Each time you update a driver, Windows XP automatically saves a copy of the previous driver on your computer. If you think a recent driver update may be making your computer unstable, you can use the Driver Rollback feature to get rid of the new driver and replace it with the last one that worked. To Roll back a driver

1. Click Start, and then click Control Panel. 2. Click Performance and Maintenance, and then click System. On the Hardware tab, click Device Manager.

Continued ..

3. Navigate to the device you wish to roll back driver, right click the name of the device and choose Properties 4. Click the Driver tab and then click Roll Back Driver.

Remote Desktop It enables you to connect to your computer across the network from virtually any computer

To Enable Remote Desktop Steps

1. Start - Settings Control Panel System 2. Select Remote tab and select allow users to connect remotely to this computer . And select OK

How to check the Computer Name

Steps 1. Start Settings Control Panel System 2. Select the Computer Name tab

How to Use Remote Desktop


Steps Computer 1 1. Enable Remote Desktop Computer 2 1. Click Start Programs Accessories Communications Remote Desktop Connection 2. In the computer name box type the computer name of the host computer (Computer1).

3. Click Connect. 4. When the Log On to Windows dialog box appears, type your user name, password, and domain (if required), and then click OK. 5. Thats all you will get the desktop of the host computer

Remote Assistance Remote Assistance provides a way for you to get the help you need when you run into problems with your computer.

Steps for using Remote Assistance The system asking for help/ support ("Assistance") is called the "Novice", the system giving help / support is called the "Expert" : Enable Remote Assistance in Novice computer Steps
1. In the Control-Panel, select the System icon: (or right-click "My Computer" on the desktop and select Properties) 2. Select the tab : Remote 3. Ensure the remote assistance option was enabled

Enable Remote Assistance in Novice computer (Continued..)

Send a invitation for remote assistance

Select the Windows Start-menu : "Programs" / "Remote Assistance",

Select Invite Someone to help you

Select Save Invitation as a file

Enter your name define how long this invitation stays open then "Continue"

For security, it is highly recommende d to define a password, which must be used by the "Expert" recipient to connect to your "Novice" system.

Select "Save Invitation", you will be asked to define the location to save the file (for example: to "My Documents" )

It is your job to advise the "Expert of the password


Share a folder which contains the invitation and intimate the expert about that folder to access invitation.

Connecting from the Expert System to give Assistance :

Access the novice computer to access invitation (start Run - \\computername press Enter) Open the invitation If a password was defined, then enter it now. Continue with YES.

Your system is then connecting to the "Novice" system :

Now in the Novice computer one request will comes, Novice needs to accept it.

This is the Novice Computer Window

This is the window in Expert computer

Hardware Profiles
A hardware profile is a set of instructions that tells Windows which devices to start when you start your computer, or which settings to use for each device. Hardware profiles are especially useful if you have a portable computer.

hardware profiles let you change which devices your computer uses when you move it from location to location.
For Eg: Now your presented in one location where you want to use the cd drive , Lan card , so you can set a profile with these devices and disabling the other devices to save the Power.

Windows Server 2003


Windows Server 2003 is the latest incarnation of the Windows server operating system and provides substantial improvements over previous versions: it is more secure, more reliable, and easier to administer.

Minimum Requirements for windows server 2003

Minimum processor speed Recommended processor speed Minimum RAM Recommended minimum RAM Maximum RAM Symmetric multiprocessing (SMP) support Minimum disk space

Web Edition 133 MHz 550 MHz 128 MB 256 MB 2 GB Up to 2 processors 1.5 GB

Standard Edition 133 MHz 550 MHz 128 MB 256 MB 4 GB Up to 4 processors 1.5 GB

Enterprise Edition 133 MHz 733 MHz 128 MB 256 MB 32 GB Up to 8 processors 1.5 GB

Datacenter Edition 400 MHz 733 MHz 512 MB 1 GB 64 GB Up to 32 processors 1.5 GB

64-BIT EDITIONS
Enterprise Edition Minimum processor 733 MHz speed Maximum RAM 64 GB Symmetric Up to 8 multiprocessing processors (SMP) support Minimum disk 2 GB space Datacenter Edition 733 MHz 512 GB Up to 64 processors 2 GB

Differences between Flavors of windows server 2003

Logical Topologies
Workgroup Model or Peer-To-Peer Model Domain Model or Client/Server Model

Overview
Peer-to-Peer Network Model

Computer1 Os: win98 User: u1 Computer3 Os: win95 User: u3

Hub

Computer2 Os: win 2k Prof User: u2 Computer4 Os: win Nt Workstation User: u4

Overview
Client/Server Network Model Client2

Client1

Client3

Hub
U1 U2 U3 U4

Server

Printer

Workgroups Logical grouping of computers sharing single workgroup name. No Server, No Client. Systems are independent of each other. Not Centralized No Centralized Administration No need to have server/client OS Recommended for smaller networks

Domains Logical grouping of systems sharing single domain

At least one Server and others clients. All the clients are dependent on Server. Centralized Data Store Centralized Administration Server/Client OS required
Recommended for Big networks

There are Three versions of Server Operating Systems released by Microsoft.

WIN NT 4.0 WIN NT 5.0 -- WIN 2000 WIN NT 5.2 -- WIN 2003

Differences between windows NT , 2000 Server and 2003 Server

Windows NT 4.0

2000 Server

2003 Server

Initially 16 bit OS, later it was enhanced to 32 bit No Active Directory concept There is SAM (Security Account Manager) database Has PDC & BDC

32 bit OS

32 bit as well as 64 bit


AD concept Ver.1.1 Same

AD concept Ver.1.0 NTDS.DIT(New Technology Directory Service)- Directory Information Tree) It has 4. DC Domain Controller ADC Additional Domain Controller CDC Child Domain Controller NDEF New Domain in the Existing Forest Depends on DNS (Domain Naming Service)

Same

NT Domain depends on WINS (Windows Internet Naming Service) server

Same

Windows NT 4.0

2000 Server

2003 Server

NT Domain maintain NetBIOS names No RIS (Remote Installation Service) servers There is no RSOP (Resultant Set of Policies) No VSS (Volume Shadow copying Service) No concept of Dynamic Disks

A domain follows FQDN (Fully Qualified Domain Names). .com structure RIS servers available

Same

Same

No RSOP

There is RSOP

No VSS

VSS is available

There is concept of Dynamic Same Disks

Installation of 2003 Server Enterprise edition

ACTIVE DIRECTORY

Active Directory is a Directory Service which Contains Information of All User Accounts and Shared Recourses on a Network.

Active Directory is a Centralized Hierarchical Directory Database

What Is Active Directory?


Active Directory

Directory service functionality


Organize Manage Control

Centralized management

Resources

Single point of administration

PURPOSE OF ACTIVE DIRECTORY

Provides User Logon and Authentication Services To organize and manage: User Accounts Computers Groups and Network Resources Enables authorized Users to easily locate: Network Resources

FEATURES OF ACTIVE DIRECTORY

1.Fully Integrated Security 2.Easy Administration using Group Policy 3.Scalable to any Size Network 4.Flexible

NEW FEATURES IN ACTIVE DIRECTORY 2003


Rename Domain Name Cross-Forest Trust Relationship Site-To-Site Replication is Faster

DOMAIN STRUCTURE OF WINDOWS2003:

Domain Controller: Domain Controller is the first system to have Active Directory Service (ADS). This is the first system to start a Domain Tree in a new Forest. C D C: Child Domain Controller, is a sub-domain controller under a DC or a sub-domain controller which shares same domain name space. ( Follows name space Hierarchy). N D E F: New Domain Tree in the Existing Forest, is a new domain tree of or under an existing Forest DC which follows different name space.

DOMAIN STRUCTURE OF WINDOWS-2003: (continue..)

A D C: Additional Domain Controller, acts as a Backup server for DCs, like DC, CDC and NDEF. Tree: It is an Hierarchial structure of a domain which follows same name space. Forest: Combination of multiple domain trees. Note: All the computers in the domain structure of WIN 2000 and WIN 2003 maintain FQDN ( Fully Qualified Domain Name). Note: Only one DC can exist in a complete Forest and any no. of CDCs, NDEFs, ADCs can exist.

TREE - representation

FOREST
Forest

[ Forest/ Tree root] [ Tree root]


CISCO.COM

(Tree Root) MCSE.COM

Tree Tree
CCNA.CISCO.COM (Child Domain)

Requirements
1. Windows 2003 Server Workgroup Model 2. Static IP Address

3. DNS Service 4. NTFS Partition 5. 250 MB of Free Space 6. Windows 2003 CD

To Install Active Directory


Start -> Run -> dcpromo

A wizard appears click next A compatibility option appears click next 2 options appear create a new domain controller create an additional domain controller

Select Domain controller for a new domain and press next

Select Domain in a new forest and press next

Specify the DNS domain name and press next (ex: ccna.com)

It displays net bios name and press Next

Displays the database folder path and Press Next

Displays the Shared folder in Domain path and Press Next

Select the Default option to install DNS and Select Next

Select the default option and Press Next

Prompts for password, give a password and this password is used at the time of restoring Active Directory from Directory services restore mode

Displays the summary and press next, installation starts

After completion Restart PC

After installing Active Directory with DNS, 6 new options can be seen in the Administrative Tools.

Active Directory domains and trusts Active Directory sites and services Active Directory users and computers DNS Domain Controller Security Policy Domain Security Policy

Joining Client to the Domain


To convert work group to a Domain (windows XP) Login as administrator in Win XP. Assign Dns server ip address in preferred dns field in IP Properties Right click on My Computer Properties In the tabs select Computer Name Click the Change button. Select the Domain option and specify the Domain Name. Click apply, OK. Prompts for Domain Administrator User & Password. Gives the configuration that it has successfully connected. Restart the Machine.

Joining Client to the Domain

Active Directory Users & Groups


There are 2 types of users 1) Local User 2) Domain User 1. Local User: Local users are created on the client machines as well as on Member Server. A local user cannot access all the resources in the network. A local user cannot login onto multiple systems. He can login where account exists. A local user account is also called as the temporary account. 2. Domain User: The domain users are created on the domain controller. The domain user account can access any resources on the entire network.

To create a Local User Account


Login as administrator on the client machine or on the member server. Right click on My Computers. Select manage. A System Management window appears. Open local Users & Groups folder. Right click on the user folder and select new user (same as groups)

To create a Domain User Account


Login as Administrator on the Domain Controller. Start Programs Admin Tools Active Directory Users and Computers Right click on the user folder Select new option and select new user.

PROFILES AND HOME FOLDER

PROFILES
Profile is a User-State Environment Profile contains Personal Settings of the User
like:

1.Document & Settings 2.Desktop Settings 3.Start Menu Icons 4.Program File Settings 5.Temp Folder 6.Shortcuts 7.Application Data 8.Internet Settings 9.Favorites

PROFILES
1. Local Profile
A local user profile is created the first time you log on to a computer and is stored on a computer's local hard disk. Any changes made to your local user profile are specific to the computer on which you made the changes.

2. Roaming Profile
A roaming user profile is created by your system administrator and is stored on a server. This profile is available every time you log on to any computer on the network. Changes made to your roaming user profile are updated on the server.

3. Mandatory Profile
A mandatory user profile is a roaming profile that can be used to specify particular settings for individuals or an entire group of users. Only system administrators can make changes to mandatory user profiles.

4. Temporary Profile
A temporary profile is issued any time that an error condition prevents the users profile from being loaded. Temporary profiles are deleted at the end of each session. Changes made by the user to their desktop settings and files are lost when the user logs off.

Users Personal Settings

Local Profiles

Home Folder
Home Folder is a centralized location of the users personal files (data) Home directories and My Documents make it easier for an administrator to back up user files and manage user accounts by collecting many or all of a user's files in one location Home folder is a folder that is accessible to the user and can contain files and programs for that user. Home folder can be assigned to a individual user or can be shared by many users

Groups
Group is a logical collection of users, computers, printers and groups it self.

Group Types:
Can be classified into two varieties--a) Group Scope & b) Group Type. a) Group Scope:
Determines the logical extent to which that group can contain user and can access the resources. There are 3 types of Group Scopes. Domain Local Global Universal

Domain Local Scope:


Group contain users from other domain but are only allowed to access domain local resources (within the domain only).

DL

DL

User accounts from Outside domain

Resources in side the domain

Global Group Scope:


Group contain users from local domain but all are allowed to access other domain resources also.

Glo bal

Glob al

User accounts from local domain

Resources out side the domain

Universal Group Scope:


Members can be both from local domain as well as from out side domain and access the resources both from local domain as well as from outside the domain.

Unive rsal

Univer sal

User accounts

Access Resources

b) Group Type:
Defines level of security or level of permissions the group has. There are two types of groups.
1. Distribution group 2. Security group

Distribution Group: Distribution groups can be used only with email applications (such as Exchange) to send e-mail to a collection of users. Distribution groups are not security-enabled, which means that they cannot be listed in discretionary access control lists (DACLs).

Security Group: Security groups are used to provide access to


resources on a network. Security groups are also used to assign user rights in Active Directory and to assign permissions on shared resources on the network. Security groups are listed in DACLs that define permissions on resources and objects.

To create a Group
Start Programs Admin. Tools ADUC Right Click on Users select New-Group Give the Group Name and Select the type and Scope

Adding User to a Group


Start Programs Admin. Tools ADUC Select Users Option R.C on Username select Add to a Group Give the group name and select OK

Roles of Active Directory

Roles of a Domain Controller Roles


Global Catalog Server Operation Masters Domain Naming Master Schema Master

Forest Wide Roles

RID Master PDC Emulator Infrastructure Master

Domain Wide Roles

Domain Naming Master

Checks and Maintains the Uniqueness of the Domain Names in the Whole Forest It is Responsible for Adding, Removing and Renaming the domain names in the whole Forest

Schema Master

Schema is a Set of Rules which is used to Define the Structure of AD Schema contains Definitions of all the Objects which are stored in AD Schema Contains 2 Parts 1. Classes Class is a Template which is used to Create an Object 2. Attributes Attributes are Properties of an Object

Schema
Properties
User Name Phone No Mobile No Address Description

Classes

Attributes

Objects

User

Computer

Printer

Share Folder

U1 U2 U3

RID Master It contains (Allocates) POOL of IDs It assigns IDs to the Objects which are created in the Domain
RID

SID
AAA.com

DID

RID
RID

RID

Mcse.AAA.com

Ccna.AAA.com

PDC Emulator 1. It Updates the Password Changes in the Domain (Native Mode) 2. It Acts as a PDC for NT 4.0 BDC Server (Mixed Mode)

U1-u1 U2-u2

U1-u1 U2-u2

Want to Change the Password: U1 to XYz

DC
U1 U2

ADC
U3

CMS.com

Infrastructure Master

Infrastructure Master Maintains and Updates the Universal Group Membership information It is Used for Inter-Domain Operations

Global Catalog
Like a telephone book contains limited information about all people and businesses within a city, the global catalog contains limited information about every object in a forest Within the schema, certain attributes are marked for inclusion in the GC
Searches are commonly performed against these attributes By searching against the GC, individual domains do not have to be queried in most cases- GC can resolve Servers that hold a copy of the global catalog are called global catalog servers

Steps to check Active Directory Roles:

Global Catalog:

Start----Programs----Admn.Tools----ADS&S----expand sites---default first site-----expand servers----expand computer 1(Sun1)---NTDS settings----right click on NTDS setting----OK.
Schema Master: Go to Run----enter regsvr32 schmmgmt.dll----press OK Run---- mmc----OK Go to file menu----add/remove snap in----add snap in----select AD Schema Directory---- add----OK. Right click on AD schema----select operations master---current schema master

DNOM: Start----programs----Admn.Tools----ADD&T----Right click on ADDT----select Operations master

RID, INFRASTRUCTURE AND PDC EMULATOR:

Start----programs----Admn.Tools----AD users and computers----Right click on Domain Name----select OM

Installing ADC in a Domain


Requirements DC and DNS Server os computer Steps Assign DNS server Address in server os computer ip properties Start Run Dcpromo Select Additional Domain Controller Give administrator user name and password of DC Give DC domain name Displays Database folder NTDS path and press next Displays Shared folder SYSVOL path and press next Displays Summary and press next and installation starts Restart the server

Transfer of the roles If already know the DC having some Problems then we can transfer the roles from DC to ADC

For RID, PDC emulator and Infrastructure Master steps are common. Right click on ADUC----select connect to DC----select the domain---select the other computer and give OK

*Right click on Domain name and select OM----select RID and select change----give yes *PDC----select change----give yes *Infrastructure Master----select change----give yes

Transferring DNOM
Open ADDT R.C on Domain select Connect to ADC R.C on Domain Name Select Operations Master select Change Yes.

Transferring Schema Master Start Run MMC File Add/Remove Snapin Select A.D.Schema OK

From Console Root R.C. on AD Schema Change Domain Controller Specify name OK.
R.C. on AD Schema Select Operations Master Click on Change Yes OK - Exit

Transferring Roles from Command Prompt


In DC Run Cmd Type ntdsutil

Roles
Connections Connect to server( name of ADC) Q Transfer Schemamaster Transfer RID master Transfer Infrastructuremaster

Transfer PDC
Q Q Exit

Seizing of the roles Role is seized to additional Domain controller if DC suddenly down In DC Run CMD Type Ntdsutil Roles Connections Connect to Server (Give ADC) Quit Seize Domain Naming Master ..

DNS (Domain Name System)

Provides resolution of names to IP addresses and resolution of IP addresses to names

Resolver: It is a file which will contain the mapping information of the clients. Ex. System name and its IP address

There are 2 types of name resolvers: 1. WINS 2. DNS

WINS :(Windows Internet Naming Service)


It is a service of Microsoft used basically on windows network to resolve NetBIOS names to IP address and IPs to NetBIOS names. LMhosts: It is a static text file which contains NetBIOS to IP mapping information it was used instead of WINS. WINS follow NetBIOS names: operating systems like NT, 95, workstation, 98 rely on WINS. Because these OS follow NetBIOS names NetBIOS Names: Net bios names are the names assigned to network nodes. NetBIOS names are the names without extensions. They are called flat names. 2000 & 2003 also support WINS.

DNS Components:
The following are the Components of the DNS

1. DNS Name Space 2. DNS Zones

3. Types of DNS Name Servers


4. DNS Resource Records

DNS Name Space: The domain namespace is a hierarchical, tree-structured namespace, starting at an unnamed root used for all DNS operations.

.org
unicef.org msn.com

.com
microsoft.com.

.edu
mtu.edu msu.edu gov.au

.au
com.au

corp.microsoft.com.

corp.

microsoft.

com .

Subdomain

Second-Level Domain

Top-Level Domain

Root

DNS Zones
A Zone is a collection of host name to IP Address mappings for hosts. There are two types of zones: Forward Lookup Zone: It is used to resolve the host name to IP addresses Reverse Lookup Zone: It is used to resolve IP addresses back to host names.

DNS Zone Types: Forward and Reverse Lookup


Forward Lookup
IP address for Microsoft.com?
IP address = 192.168.1.50 DNS Server

Reverse Lookup
Name for 192.168.1.50?
Name = Microsoft.com DNS Server

Again these forward lookup zone and Reverse lookup zones are divided into following zones..
1. Primary Zone 2. Secondary Zone 3. Stub Zone

1. Primary Zone: A standard primary zone hosts a read/write copy of the DNS zone in which resource records are created and managed. Only one server can host and load the master copy of the zone, no additional primary servers for the zone are permitted, and only the server hosting the primary zone is allowed to accept dynamic updates and process zone changes.

2. Secondary Zone: A copy of the zone file may be stored on one or more servers to balance network load, provide fault tolerance, or avoid forcing queries across a slow, wide area network (WAN) link. A standard secondary zone is a read-only copy of the standard primary DNS zone. Performing a zone transfer, which is done by simply copying the zone file from the primary server to a secondary server, creates a secondary zone. The secondary zone database files are updated regularly from the primary zone database. 3. Stub Zone: A stub zone is a copy of a zone that contains only those resource records necessary to identify the authoritative DNS servers for that zone. A stub zone is a pointer to the DNS server that is authoritative for that zone, and it is used to maintain or improve DNS resolution efficiency.

DNS Server Types


DNS server types are determined by the type of zone or zones they host and by the functions they perform. 1. 2. 3. 4. Primary Name Server Secondary Name Server Master Name Server Caching only Name Server

1. Primary Name Server: Primary name servers contain one or more primary zones.

2. Secondary Name Server: The secondary name server hosts one or more secondary zone databases. Because a zone transfer is used to create a secondary zone, the primary name server and zone already must exist to create a secondary name server.

3. Master Name Server: A name server is a master name server when it is responsible for sending updated copies of the database to other name servers. A master name server can host either a primary or secondary copy of a zone database.

4. Caching Only Name Server: Caching-only servers do not host any zones and are not authoritative for a particular domain. Caching-only DNS servers start with an empty cache and add resource record entries as the server fulfills client requests. This information is then available from its cache when answering subsequent client queries.

DNS Records
Resource Records 1. SOA (Start of Authority Record): It contains following information Authoritative server: Contains the name of the primary DNS server authoritative for the zone. Serial Number: Shows how many times the zone is updated. When a zones secondary server contacts its master server to determine whether it needs to initiate a zone transfer, the zones secondary server compares its own serial number with that of the master. If the serial number of the master server is higher, the secondary server initiates a zone transfer.

Refresh: Shows how often the secondary server for the zone checks to see whether the zone data is changed.
Retry: After sending a zone transfer request, shows how long (in seconds) the zones secondary server waits before sending another request.

2. NS (Name Server) Record:


The name server (NS) resource record identifies a DNS server that is authoritative for a zone.

3. A (Host Address Record):


The host address (A) resource record maps a FQDN to an IP address. 4. PTR (Pointer Record): The PTR resource record performs the reverse function of the A resource record by mapping an IP address to an FQDN. 5. CNAME (Canonical Name Record): The canonical name (CNAME) resource record creates an alias for a specified FQDN.

6. MX (Mail Exchanger Record):


The mail exchanger (MX) resource record specifies a server that is willing to act as a mail server for a DNS name. The mail server identified by an MX record is a host that either processes or forwards mail for a DNS domain name.

7. SRV (Service Locator Record):

Service locator (SRV) resource records enable you to specify the location of servers that provide a specific network service over a specific protocol and in a specific domain.

Other Records:

Msdcs:
Default site: Tcp: Udp:

Contains the Dcs information


Contains site name (server side) provides global catalog, Kerberos and LDAP information (client side) provides Kerberos information

Domain DNS zone Forest DNS zones both Provides DNS information in entire forest.

Active DirectoryIntegrated Zones


Storing zones in Active Directory is a Microsoft proprietary method of managing, securing, and replicating DNS zone information. An Active Directoryintegrated zone is a DNS zone contained within Active Directory. Advantages: 1. Fault Tolerance 2. Security 3. Efficient Replication

Root Hints:
The DNS Server service must be configured with the root hints to resolve queries for names that it is not having the information in its cache or it is not authoritative. Root hints contain the names and IP addresses of the DNS servers authoritative for the root zone.

Default Root hints presented in a dns server properties dialogue box.

Forwarder
A forwarder is a DNS server on a network used to forward DNS queries for external DNS names to DNS servers outside of that network. Two different types of forwarders 1. Standard forwarding: a DNS server on a network is designated as a forwarder by having the other DNS servers in the network forward the queries they cannot resolve locally to that DNS server. 2. Conditional forwarding: Conditional forwarding enables a DNS server to forward queries to other DNS servers based on the DNS domain names in the queries.

How DNS Works


Am Root inQuery: server1.microsoft.com. IsIterative cache? name Hints: I authoritative? b.root-servers.net No [128.9.0.107] To: Root [198.41.0.10] 10.1.1.1 j.root-servers.net Servers 10.1.1.1 Is name Am I authoritative? k.root-servers.net [193.0.14.129] I dont know. Ask: in cache? l.root-servers.net [198.32.64.12] Delegation: a.gtld-servers.net [192.5.6.30]No m.root-servers.net [202.12.27.33] Cache response g-gtld-servers.net [192.42.93.30] = .com. i.root-servers.net [192.36.148.17] Root Server

c.gtld-servers.net a.gtld-servers.net [192.26.92.30] [192.5.6.30] e.root-servers.net [192.203.230.10] i.gtld-servers.net g-gtld-servers.net [192.36.144.133] [192.42.93.30] d.root-servers.net [128.8.10.90] b.gtld-servers.net c.gtld-servers.net [203.181.106.5] [192.26.92.30] Is Am I authoritative? a.root-servers.net I dont know. Ask: name in cache? [198.41.0.4] d.gtld-servers.net i.gtld-servers.net [192.31.80.30] [192.36.144.133] h.root-servers.net [128.63.2.53] Delegation: dns2.cp.msft.net l.gtld-servers.net[207.46.138.21] No [203.181.106.5] [192.41.162.30] b.gtld-servers.net c.root-servers.net [192.33.4.12] server1.microsoft.com=192.168.7.99 dns1.cp.msft.net f.gtld-servers.net[207.46.138.20] [192.35.51.30] [192.31.80.30] microsoft.com. = d.gtld-servers.net g.root-servers.net [192.112.36.4] server1.microsoft.com=192.168.7.99 dns1.tk.msft.net [207.46.232.37] j.gtld-servers.net l.gtld-servers.net [210.132.100.101] [192.41.162.30] f.root-servers.net [192.5.5.241] [207.46.232.38] Recursivedns2.tk.msft.net Query: server1.microsoft.com. [207.46.138.21] k.gtld-servers.netdns2.cp.msft.net [213.177.194.5] [192.35.51.30] f.gtld-servers.net dns3.uk.msft.net [213.199.144.151] e.gtld-servers.netdns1.cp.msft.net [192.12.94.30] [207.46.138.20] j.gtld-servers.net Am Is dns4.uk.msft.net [213.199.144.152]name in cache? dns1.tk.msft.net I authoritative? [207.46.232.37] Recursive Query: server1.microsoft.com. [202.153.114.101][210.132.100.101] m.gtld-servers.netk.gtld-servers.net [213.177.194.5] dns3.jp.msft.net [207.46.72.123] dns2.tk.msft.net [207.46.232.38] Yes No e.gtld-servers.net [192.12.94.30] dns4.jp.msft.net dns3.uk.msft.net [213.199.144.151] Cache response [207.46.72.124] m.gtld-servers.net [202.153.114.101] dns1.dc.msft.net [207.68.128.151] dns4.uk.msft.net [213.199.144.152] dns2.dc.msft.net [207.68.128.152] dns3.jp.msft.net Preferred DNS Server: 10.1.1.1 [207.46.72.123] dns1.sj.msft.net [207.46.97.11] dns4.jp.msft.net [207.46.72.124] dns1.dc.msft.net [207.68.128.151] dns2.dc.msft.net [207.68.128.152] http/tcp session- 192.168.7.99 dns1.sj.msft.net [207.46.97.11]

TLD Server

microsoft.com DNS Servers

192.168.7.99

http://server1.microsoft.com

Types of Queries
There are two different type of queries 1. Recursive Query 2. Iterative Query

1. Recursive Query: A query made from a client to a DNS server in which the server assumes the full workload. DNS server returns

either a complete answer or negative. Issued by: Client computers and DNS servers configured to use forwarder(s)
2. Iterative Query: Receiving server may return an answer, a negative response, or a referral to other DNS server(s). Typically issued by DNS servers not configured to use forwarders for resolution of queries.

Installation of DNS
Requirements 1. DC or Member server or Standalone server 2. Static IP Address 3. 2003 OS CD Installation Steps 1. Select Start Settings Control Panel. 2. In the Control Panel dialog box, double-click Add/Remove Programs. 3. In the Add/Remove Programs dialog box, click Add/Remove Windows Components. 4. In the Windows Components Wizard dialog box, highlight Networking Services, and click Details. 5. In the Networking Services dialog box, select the check box next to Domain Naming System protocol (DNS), and click OK. 6. In the Windows Components Wizard dialog box, click Next. 7. Completing the Windows Components Wizard screen, click Finish.

Creating a Forward Lookup Zone


Steps 1. Select Start Programs Administrative Tools DNS. 2. In the DNS dialog box, click the + next to the DNS servers name in the left pane. 3. In the left pane, highlight the Forward Lookup Zones folder. Right click New Zone.

4. The Zone Type screen appears, as shown in Figure. Accept the default option of Primary Zone and Remove the check mark form "Store the zone in Active Directory", click Next. [check mark is for active directory integrated zone]

5. In the Zone Name screen, type in the name of the zone you are creating. This name is usually the FQDN of the DNS domain that the zone will contain, such as MICROSOFT.COM Click Next.

6. The Zone File screen appears. In this screen, you can either create a new zone file for the new zone, or configure the new zone to use an existing file. Click Next. 7. In Dynamic Update Select "do not allow dynamic update", click Next.

8. The Completing the New Zone Wizard screen appears. Click Finish.

Creating Host Record Steps 1. Select Start Programs Administrative Tools DNS. 2. Right Click the zone and select New Host

3. In the host name dialog box enter the Host name for which you are configuring the record 4. In the IP address dialog box enter the corresponding IP address of the host 5. Click Add Host.

Creating Alias Record


Steps 1. 2. 3. 4. Right Click the zone and select New Alias Enter the name in the Alias Name dialog box Enter the FQDN of the target server for this alias Click OK.

Creating Reverse Lookup Zone Steps 1. Select Start Programs Administrative Tools DNS. 2. In the DNS dialog box, click the + next to the DNS servers name in the left pane. 3. In the left pane, highlight the Reverse Lookup Zones folder. Select Action. New Zone. 4. The Zone Type screen appears, as shown in Figure Accept the default option of primary and click Next.

5. In the next screen, type the network ID of your network on which you domain is working.

6. The Zone File screen appears. In this screen, you can either create a new zone file for the new zone, or configure the new zone to use an existing file. Click Next.

7. In the dynamic update, Select do not allow Dynamic Update. click Next

8. The Completing the New Zone Wizard screen appears. Click Finish.

Creating a Pointer record in Reverse Lookup Zone


Steps 1. Right Click the Reverse lookup zone and select New Pointer. 2. In the host IP number dialog box enter the Host ID for which you are configuring the record 3. In the Host name dialog box enter the corresponding FQDN of the host name. 4. Click Ok. The pointer record gets created.

Client Side
1. 2. 3. 4. Logon to Client System as an administrator. Select Start Settings Network Connections. Right click on your LAN card , Go to Properties. In the connections Properties dialog box, Select again properties and highlight Internet Protocol (TCP/IP) and click Properties. 5. In the Internet Protocol (TCP/IP) Properties dialog box, specify the preferred DNS server as the DNS servers address on which you have configured 6. In the connections Properties dialog box, click OK.

DHCP (Dynamic Host Configuration Protocol)

There are two ways to assign IP addresses:


1.Static IP addressing 2.Dynamic IP addressing

Static IP addressing: Assigning IP address manually on a console machine is called Static IP addressing. Disadvantages: 1.It is time consuming 2.Possibility of mishap 3.Less secured 4.No centralized database for computer like, names, ip addresses and their MAC addresses can be maintained directly.

Dynamic IP addressing: Assigning IP addressing to the machines from a remote system is called dynamic IP addressing.
Ex: DHCP

DHCP
It gives IP Addresses Automatically to the Clients who is requesting for an IP Address It can assign the subnet mask, default gateway, domain name and DNS server IP also. Centralized IP Address Management DHCP prevents IP address Conflicts and helps conserve the use of client IP Address on the Network DHCP reduces the complexity and amount of administrative work by assigning TCP/IP configuration Client IP configuration is updated automatically

DHCP Terms and Definitions DHCP server A computer running the DHCP Server service that holds information about available IP addresses and related configuration information as defined by the DHCP administrator and responds to requests from DHCP clients. DHCP client A computer that gets its IP configuration information by using DHCP. Scope A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service. Lease The length of time for which a DHCP client can use a DHCP-assigned IP address configuration.

Reservation A specific IP address within a scope permanently set aside for leased use by a specific DHCP client. Exclusion/exclusion range One or more IP addresses within a DHCP scope that are not allocated by the DHCP Server service. Exclusions ensure that the specified IP addresses will not be offered to clients by the DHCP server as part of the general address pool. Superscope A configuration that allows a DHCP server to provide leases from more than one scope to clients on a single physical network segment. Automatic Private IP Addressing (APIPA) A TCP/IP feature in Windows XP and Windows Server 2003 that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 with a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for automatic addressing, the Automatic private IP address alternate configuration setting is selected, and a DHCP server is not available.

How DHCP Works


DHCP Processes

DHCP DISCOVER DHCP OFFER DHCP REQUEST

DHCP ACKNOWLEDGEMENT

DHCP Client

DHCP Server

DHCP Process
DHCP process can be classified into four stages: 1. DHCPDiscover Broadcast by a DHCP client when it first attempts to connect to the network. The DHCPDiscover message requests IP address information from a DHCP server 2. DHCPOffer Broadcast by each DHCP server that receives the client DHCPDiscover message and has an IP address configuration to offer to the client. 3. DHCPRequest Broadcast by a DHCP client after it selects a DHCPOffer. The DHCPRequest message contains the IP address from the DHCPOffer that it selected. 4. DHCPAck Broadcast by a DHCP Server after saving client name and MAC address, client IP address and also leased duration and acknowledges the client.

Other Messages
DHCPNack Broadcast by a DHCP server to a DHCP client denying the clients DHCPRequest message. This might occur if the requested address is incorrect because the client moved to a new subnet or because the DHCP clients lease has expired and cannot be renewed. DHCPDecline Broadcast by a DHCP client to a DHCP server, informing the server that the offered IP address is declined because it appears to be in use by another computer. DHCPRelease Sent by a DHCP client to a DHCP server, relinquishing an IP address and canceling the remaining lease. This is unicast to the server that provided the lease. DHCPInform Sent from a DHCP client to a DHCP server, asking only for additional local configuration parameters; the client already has a configured IP address.

Installation of DHCP
Requirements of DHCP 1. Standalone Computer (DC or Member Server) 2. Static IP address Installation Start Settings Control Panel Add Remove Programs Add Remove Windows Components Scroll down the list select Networking Services and click details and select DHCP and select ok and Next.

The Plug and Play (PnP) basic input/output system (BIOS) automatically identifies PnP devices and arbitrates their resource requests.

The tabs of the volume Properties dialog box are: General Lists the volume label, type, file system, used space, free space, and total disk capacity. It also allows you to run Disk Cleanup, and on NTFS volumes it allows you to compress the drive and choose to have the Indexing Service index the disk for fast file searching. Tools Allows you to check the partition or volume for errors, defragment it, and back it up. Hardware Shows you all drives on the computer and allows you to view the properties of each device, including the manufacturer, location, and status of the device. It also allows you to access the troubleshooter for the device. Sharing Allows you to share the drive, set permissions on the share, and determine the type of caching for the share. Security Allows you to set the NTFS permissions. This tab is available only if the partition or volume is formatted with the NTFS file system. Quota Allows you to enable and configure quota management. This tab is available only if the partition or volume is formatted with the NTFS file system.

You might also like