34
Network Administration MAINTAIN AND ORGANIZE YOUR NETWORK

Network_Administration_PPT

Embed Size (px)

Citation preview

Network AdministrationMAINTAIN AND ORGANIZE YOUR NETWORK

Why is it important to learn

Network Administration

Network Administrator

An individual who is responsible for the maintenance of computer hardware and

software systems that make up a computer network including the maintenance and

monitoring of active data network or converged infrastructure and related network equipment.

So, what is their

JOB

Admin does,

Network address assignment

Management and implementation of routing protocols

User authentication

Management of VPN, Gateways or Mirror Servers.

In smaller organization,

maintenance of servers, desktop computers, printers, routers, switches, firewalls, phones, IP Phones

Some Service Provider are who bundles all

Network Administration Utilities

Service Providers are

What is

DHCP

So, DHCP is

The Dynamic Host Configuration Protocol (DHCP) is a standardized networking protocol used on Internet

Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses

and services.

Ways to Implement

Dynamic Allocation Reserve a range of IP for DHCP and each client computer on

LAN request IP from DHCP server.

Automatic Allocation DHCP automatically assigns the IP address to a requesting

client from the range defined by administrator.

Static Allocation DHCP allocates IP based on predefined mapping based

on their MAC address.

Active Directory

Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks and is included in most Windows Server operating systems as a set of processes and services. An AD domain

controller authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies

for all computers and installing or updating software.

Image: technet.microsft.com

Anatomy of ADC

ObjectsEvery single entity in a domain is considered as object. It can be printer, file server, projector, or a external computer.

Say, all those unit which are in network.

ForestAs a broad concept, if you treat whole organization as a single unit (say, contoso.com) is a forest.

In snapshot, Largest Triangle points to Forest.

DomainEvery single sub-division in forest is considered as domain. Say, a corporate house has three branches east.contoso.com, west.contoso.com and main.contuse.com. Then, all the three are domain which work independently under a single forest.

So, now we will explore

RODC

In Brief,

A read-only domain controller (RODC) is a server that hosts an Active Directory database's read-only partitions and responds to security authentication

requests.

RODC is,

An RODC is designed primarily to be deployed in a branch office environment. Branch offices typically have relatively few users, poor physical

security, relatively poor network bandwidth to a hub site, and little local IT knowledge.

Needs at least one writable domain controller running windows server 2008 or higher.

Tools which are essential for

Network Administration

Remote Desktop

To connect to a remote computer, that computer must be turned on, it must have a network connection, Remote Desktop must be enabled, you must have network access to the remote computer (this could be through the

Internet), and you must have permission to connect.

You must follow this,

Step1. My Computer’s Properties Step2. Remote Settings > Allow Step2. Open Remote Desktop Connection and Put IP

Simply, we can share our

PRINTER

Easy Steps, to follow

Control Panel > Device & Printers

Select Printer and open it’s Properties

In Sharing Tab, Check the ‘Share This Printer’.

Unsung Hero of Windows OS

GROUP POLICY

What is Group Policy

Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working environment of

user accounts and computer accounts.

Some facts,

Group Policies are a really powerful way to setup a corporate network with each of the computers locked down so users can’t mess them up with unwanted changes, and stop them from running unapproved software, among many other uses.

In the home environment, however, you probably won’t want to set password length restrictions or force yourself to change your password. And you probably won’t need to lock down your machines to only run specific approved executable.

Group Policy is categorized in, Common Configuration and User Configuration

You can run script on startup

Disable System Folders

Restrict Folder Access

Thank

YOU

Abhishek Singh | Abhishek Kr Ravi | Aman Kumar | Devasish Raj | Chandan Kumar | Suraj Kumar