System Admin Chapter 3
System Admin Chapter 3
Administration
Chapter Three
Bule Hora University
1
What is DHCP?
DHCP stands for Dynamic Host
Configuration Protocol.
IP address stands for Internet Protocol
address and is four sets of up to three
numbers, separated by dots (128.255.123.76, for
example). It works much like a phone number
for the Internet so that computers can
communicate with each other.
Before DHCP, you would have had to type in a
static IP address, 12 numbers that would be
your "address" on the Internet.
2
What is DHCP?
Configuring computers was more difficult
and distributing unique numbers was a
large organizational problem. DHCP
allows IP addresses to be
automatically assigned, instead of having
to manually type them in.
3
What is DHCP?
Is a protocol that allows client computers
to automatically receive an IP address
and TCP/IP settings from a Server
Reduces the amount of time you spend
configuring computers on your network
Is the default configuration for clients.
The ipconfig /all command will indicate
whether the configuration came from a
DHCP server computer.
4
What is DHCP?
When you deploy Dynamic Host Configuration
Protocol (DHCP) servers on your network, you
can automatically provide client computers
and other TCP/IP based network devices
with valid IP addresses.
5
What is DHCP?
Each computer on the network connects
to a central DHCP server which sending
the clients network configuration
including IP address, subnet mask,
gateway, and DNS servers.
7
How DHCP Works?
8
How DHCP Works?
9
How DHCP Works?
The DHCP server stores the configuration information
in a database, which includes:
Valid TCP/IP configuration parameters for all clients
on the network.
Valid IP addresses, maintained in a pool for
assignment to clients, as well as excluded addresses.
Reserved IP addresses associated with particular
DHCP clients. This allows consistent assignment of a
single IP address to a single DHCP client.
The lease duration, or the length of time for which the
IP address can be used before a lease renewal is
required.
10
How DHCP Works?
A DHCP-enabled client, upon accepting a
lease offer, receives:-
A valid IP address for the subnet to which
it is connecting.
11
Why use DHCP?
Without DHCP, IP addresses must be
configured manually for new computers
or computers that are moved from one
subnet to another, and manually reclaimed
for computers that are removed from the
network.
13
Why use DHCP?
14
Advantage of DHCP?
The main advantage of DHCP is:
1) its capability to automatically allocate IP
addresses to clients booting on the TCP/IP
network for the first time.
2) Using DHCP reduces the labor involved in
managing the network.
3) Because the DHCP server automatically
dispenses IP addresses and other configuration
information, the process of connecting a new
computer to the network is much simpler.
4) DHCP is very flexible and allows the network
administrator to set up the server one time to
serve many thousands of clients.
15
GROUP POLICY
MANAGEMENT
16
Group Policy Management
Group Policy is an extremely powerful
Microsoft technology which allows
network administrators in charge of an
Active Directory domain to impose
configuration options on computers and
users on that domain.
17
Group Policy Management
Group policies are used to restrict what
a user can and can’t do.
For example, they can be used to
remove the “run” command from a users
start menu, or to set a specific
background image.
18
Group Policy Management
Group policies can be applied to either a
particular computer, or a particular
user.
When applied to a computer, the
settings are applied to all users who log
onto that computer.
When applied to a user, the settings
apply to that particular user, no matter
which computer he/she logs on to.
19
Group Policy Management
Group policies are used for:
22
Group Policy Management
Configuring Policies
To configure a policy, right click on it
in Group Policy Management and
choose 'Edit'. The image below shows the
Group Policy editor, and a number of policy
areas you can edit.
23
Group Policy Management
24
Group Policy Management
The policy editor is split into two main parts
Computer Configuration and
User Configuration.
25
Group Policy Management
Computer policies apply to everyone
who logs on to a particular computer,
whereas User policies apply to users
whatever computer they log on to.
26
Group Policy Management
Computer Configuration: is a
configuration to give or deny access
for computer. it is to say that we install
some kind of software to one computer
and not install in another.
When we put rule to computers to or
not to do we call it computer
configuration.
27
Group Policy Management
Software Settings
Software Installation - define Windows
Installer packages to install on computers
Windows Settings
Scripts (Startup/Shutdown) - defines
scripts which will run when a computer starts
up or shuts down.
Security Settings - Account policies
(password length, lockout policy), registry
security, file system security and more
28
Group Policy Management
Administrative Templates - the bulk of
the computer related policy elements are
here. You can control network settings,
printer settings, system settings, as well as
settings for various built in Windows
components such as Internet Explorer, Task
Scheduler,Windows Update and many more.
Preferences - set environment variables,
create and remove files, shortcuts,
directories, ini files and registry entries
29
Group Policy Management
User Configuration: is a configuration
used to enforce any user to give or to
deny permition. We can give a permition
to one user for example to add and
remove program and hide or deny this
permition for other user user.
30
Group Policy Management
Software Settings
Software Installation - define Windows Installer
packages to make available to users
Windows Settings
Scripts (Logon/Logoff) - defines scripts which
will run when a user logs on or off.
Folder Redirection - redirect Windows special
folders (such as My Documents, Downloads and
My Music) to administrator specified locations,
usually on the network.
Internet Explorer Maintenance - configure
Internet Explorer options.
31
Group Policy Management
Administrative Templates - the bulk of
the user related policy elements are here.
You can control network settings, printer
settings, system settings, as well as settings
for various built in Windows components
such as Internet Explorer, Task Scheduler,
Windows Update and many more.
Preferences - set control panel settings, as
well as create and remove files, shortcuts,
directories, ini files and registry entries
32
Group Policy Management
Policies are stored in the Active
Directory.
computer policies are evaluated and
applied when a computer starts up.
User policies are applied when a user
logs on.
33
How to Install the Group Policy Management
34
35
3.The Add Features and Roles Wizard
will open.
Leave the “Installation Type” with its default
values: “Role-based or Feature-based
installation.”
36
.
4 Select a server from your server pool. Find the server running
Windows where you want to install the GPMC. Click “Next.”
37
4. Skip Server Roles and Go to “Features.” In the “Features” section,
you should find the “Group Policy Management” tool. Go ahead, tick the
box, click “Next,” and click on “Install.”
38
5. The installation process should take a few
minutes to complete.
39
Windows Deployment
Service
40
Window Deployment Service
Windows Deployment Services role in
Windows Server 2012 is the updated and
redesigned version of Remote
Installation Services (RIS).
43
Window Deployment Service
In order for WDS to work,
You must have a network card and an active
network connection.
Your computer must be connected to and
registered with the campus network and
using the campus DHCP servers.
AD DS (Active Directory Domain Services) A
Windows Deployment Services server must be
either a member of an AD DS (Active
Directory Domain Services) domain or a
domain controller for an AD DS domain.
44
Window Deployment Service
45
Window Deployment Service
DNS You must have a working DNS
Server on the network before you can
run Windows Deployment Services.
NTFS volume the server running
Windows Deployment Services requires
an NTFS File system volume for the
image store.
Credentials to install the role, you must
be a member of the Local
Administrators group on the server.
46
Domain Name System
(DNS)
47
Host Names vs. IP addresses
Host names
◦ Mnemonic name appreciated by humans
◦ Variable length, full alphabet of characters
◦ Provide little (if any) information about location
◦ Examples: www.google.com and www.bhu.edu.et
IP addresses
◦ Numerical address appreciated by routers
◦ Fixed length, binary number
◦ Hierarchical, related to host location
◦ Examples: 64.236.16.20 and 212.58.224.131
48
Human Involvement
If you want to…
◦ Call someone, you need to ask for their phone
number
You can’t just dial “X”
◦ Mail someone, you need to get their address first
What about the Internet?
◦ If you need to reach Google, you need their IP
◦ Does anyone know Google’s IP?
Problem:
◦ People can’t remember IP addresses
◦ Need human readable names that map to IPs
49
Internet Names and Addresses
Addresses, e.g. 129.10.117.100
◦ Computer usable labels for machines
◦ Conform to structure of the network
Names, e.g. www.bhu.edu.et
◦ Human usable labels for machines
◦ Conform to organizational structure
How do you map from one to the other?
◦ Domain Name System (DNS)
50
NEED FOR DNS
52
Towards DNS
Host Names vs. IP addresses
53
Domain Name System
The “Domain Name System”
◦ Created in 1983 by Paul Mockapetris (RFCs
1034 and 1035), modified, updated, and
enhanced by a myriad of subsequent RFCs
What Internet users use to reference
anything by name on the Internet
The mechanism by which Internet
software translates names to addresses
and vice versa
55
Why DNS?
It is easier to remember a host name than it is
to remember an IP address.
An name has more meaning to a user than a 4
byte number.
Applications such as FTP, HTTP, email, etc., all
require the user to input a destination.
The user generally enters a host name.
The application takes the host name supplied by
the user and forwards it to DNS for translation
to an IP address.
56
How does it work?
DNS works by exchanging messages
between client and server machines.
A client application will pass the
destination host name to the DNS
process (in Unix referred to as the
gethostbyname() routine) to get the IP
address.
The application then sits and waits for the
response to return.
57
Domain Name System
A lookup mechanism for translating objects into
other objects
Users generally prefer names to numbers
Computers prefer numbers to names
DNS provides the mapping between the two
◦ I have “x”, give me “y”
DNS is NOT a directory service
◦ No way to search the database
No easy way to add this functionality
62
TLD and Authoritative Servers
Top-level domain (TLD) servers:
◦ responsible for com, org, net, edu, etc, and all top-level
country domains uk, fr, ca, jp.
◦ Network Solutions maintains servers for com TLD
◦ Educause for edu TLD
Authoritative DNS servers:
◦ organization’s DNS servers, providing authoritative
hostname to IP mappings for organization’s servers (e.g.,
Web, mail).
◦ can be maintained by organization or service provider
63
Basic Domain Name Resolution
Mapping a name to an address or an address to a
name is called name-address resolution.
25.64
Recursive DNS Query
www.google.com
Where is www.google.com?
Root 65
Recursive vs. Iterative Queries
Recursive query root DNS server
66
DNS Caching
Performing all these queries takes time
◦ And all this before actual communication takes place
◦ E.g., 1-second latency before starting Web download
Caching can greatly reduce overhead
◦ The top-level servers very rarely change
◦ Popular sites (e.g., www.cnn.com) visited often
◦ Local DNS server often has the information cached
How DNS caching works
◦ DNS servers cache responses to queries
◦ Responses include a “time to live” (TTL) field
◦ Server deletes cached entry after TTL expires
67
DNS components
There are 3 components:
Name Space:
Specifications for a structured name space
and data associated with the names
Resolvers:
Client programs that extract information
from Name Servers.
Name Servers:
Server programs which hold information
about the structure and the names.
68
DNS Name Space
The name space is the structure of the DNS database
◦ An inverted tree with the root node at the top
Each node has a label
◦ The root node has a null label, written as “”
second-level node second-level node second-level node second-level node second-level node
25.70
DNS Name Space
Domain Names
A domain name is the sequence of labels from a node to the root,
separated by dots (“.”s), read left to right
◦ The name space has a maximum depth of 127 levels
◦ Domain names are limited to 255 characters in length
A node’s domain name identifies its position in the name space
""
dakota tornado
71
DNS Name Space
SubDomain Names
One domain is a subdomain of another if its
apex node is a descendant of the other’s apex
node
More simply, one domain is a subdomain of
another if its domain name ends in the other’s
domain name
◦ So sales.nominum.com is a subdomain of
nominum.com
com
◦ nominum.com is a subdomain of com
72
DNS Name Space
Delegation
Administrators can create subdomains to group hosts
◦ According to geography, organizational affiliation or any other
criterion
An administrator of a domain can delegate
responsibility for managing a subdomain to someone
else
◦ But this isn’t required
The parent domain retains links to the delegated
subdomain
◦ The parent domain “remembers” who it delegated the
subdomain to
73
DNS Name Space
Delegation Creates Zones
Each time an administrator delegates a
subdomain, a new unit of administration is
created
◦ The subdomain and its parent domain can now be
administered independently
◦ These units are called zones
◦ The boundary between zones is a point of delegation
in the name space
Delegation is good: it is the key to scalability
74
Dividing a Domain into Zones
Tree is divided into zones nominum.com
Each zone has an domain
administrator
Responsible for the
part of the heirarchy ""
nominum.com
zone
76
Hierarchy of name servers
Types of Name Servers
Two main types of servers
◦ Authoritative – maintains the data
Master – where the data is edited
Slave – where data is replicated to
◦ Caching – stores data obtained from an authoritative
server
◦ The most common name server implementation
(BIND) combines these two into a single process
Other types exist…
No special hardware necessary
Name Server Architecture
You can think of a name server as part:
◦ database server, answering queries about the
parts of the name space it knows about (i.e., is
authoritative for),
◦ cache, temporarily storing data it learns from
other name servers, and
◦ agent, helping resolvers and other name
servers find data that other name servers
know about
DNS Name Resolution
Name resolution is the process by which
resolvers and name servers cooperate to find
data in the name space
To find information anywhere in the name
space, a name server only needs the names and
IP addresses of the name servers for the root
zone (the “root name servers”)
◦ The root name servers know about the top-level
zones and can tell name servers whom to contact for
all TLDs
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The workstation annie asks its configured name
server, dakota, for www.nominum.com’s address
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The name server dakota asks a root name server, m, for
www.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The root server m refers dakota to the .com name servers
This type of response is called a “referral”
m.root-servers.net
dakota.west.sprockets.com Here’s a list of the
com name servers.
Ask one of them.
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The name server dakota asks a com name server, f,
for www.nominum.com’s address
What’s the IP address
of
www.nominum.com?
m.root-servers.net
dakota.west.sprockets.com
f.gtld-servers.net
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The com name server f refers dakota to the
nominum.com name servers
Here’s a list of the
nominum.com
name servers.
Ask one of them.
m.root-servers.net
dakota.west.sprockets.com
f.gtld-servers.net
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The name server dakota asks an nominum.com name
server, ns1.sanjose, for www.nominum.com’s address
What’s the IP address
of
www.nominum.com?
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The nominum.com name server ns1.sanjose
responds with www.nominum.com’s address
m.root-servers.net
dakota.west.sprockets.com
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
The Resolution Process
The name server dakota responds to annie with
www.nominum.com’s address
Here’s the IP
address for
www.nominum.com
m.root-servers.net
dakota.west.sprockets.com
ns1.sanjose.nominum.net
f.gtld-servers.net
annie.west.sprockets.com
ping www.google.com.
Copyright © 2001, Nominum,
Inc.
DNS MESSAGES
DNS has two types of messages:
query message and
Response message .
Both types have the same format. The query
message consists of a header and question records;
the response message consists of a header, question
records, answer records, authoritative records, and
additional records.
Query and response messages
The End!!!
93