0% found this document useful (0 votes)
5K views

Tvl-Ict-Css: Quarter 2 - Module 5-8: Setting Up Computer Servers

Uploaded by

Rina Dimayuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views

Tvl-Ict-Css: Quarter 2 - Module 5-8: Setting Up Computer Servers

Uploaded by

Rina Dimayuga
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

12

10 SENIOR HIGH SCHOOL

TVL-ICT-CSS
Quarter 2 – Module 5-8:
SETTING UP COMPUTER SERVERS
(Configure Network Services)
TVL ICT: Computer Systems Servicing – Grade 12
Alternative Delivery Mode
Quarter 2 – Module 5-8: CONFIGURE NETWORK SERVICES
First Edition, 2020

Republic Act 8293, section 176 states that: No copyright shall subsist in any
work of the Government of the Philippines. However, prior approval of the government
agency or office wherein the work is created shall be necessary for exploitation of such
work for profit. Such agency or office may, among other things, impose as a condition
the payment of royalties.

Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names,
trademarks, etc.) included in this module are owned by their respective copyright
holders. Every effort has been exerted to locate and seek permission to use these
materials from their respective copyright owners. The publisher and authors do not
represent nor claim ownership over them.

Published by the Department of Education


Secretary: Leonor Magtolis Briones
Undersecretary: Diosdado M. San Antonio

Development Team of the Module


Writer: Rudy A. Tagud Jr.
Editors: Louelyn M. Lajot
Reviewers: Louelyn M. Lajot
Typesetter: Louelyn M. Lajot
Layout Artist:
Management Team: Senen Priscillo P. Paulin, CESO V Rosela R. Abiera
Marcelo K. Palispis, Ed.D. Maricel S. Rasid
Joelyn M. Arcilla, Ed. D. Elmar L. Cabrera
Nilita L. Ragay, Ed. D.
Antonio B. Baguio, Jr., Ed. D.

Printed in the Philippines by ________________________

Department of Education –Region VII Schools Division of Negros Oriental

Office Address: Kagawasan, Ave., Daro, Dumaguete City, Negros Oriental


Tele #: (035) 225 2376 / 541 1117
E-mail Address: negros.oriental@deped.gov.ph
12

TVL-ICT-CSS
Quarter 2 – Module 5-8:
SETTING UP COMPUTER
SERVERS (SUCS)
(CONFIGURE NETWORK SERVICES)
What I Need to Know

This module was designed and written with you in mind. It is here to help you
to master Setting up computer servers. The scope of this module permits it to be
used in many different learning situations. The language used recognizes the diverse
vocabulary level of students. The lessons are arranged to follow the standard
sequence of the course. But the order in which you read them can be changed to
correspond with the textbook you are now using.

The module contains lesson in Set up user access.

After going through this module, you are expected to:


1. Install and update required modules/add-ons on NOS installation
procedures.
2. Check normal server function in accordance with manufacturer’s
instructions.
3. Confirm network services based on user/system requirements.

What I Know

Let us determine how much you already know about setting up computer
servers. Take this test.

Direction: Read each item carefully and write your answers in your notebook. Write
TRUE if the statement is correct and FALSE if otherwise.

___________ 1. Folder Redirection allows you as an administrator to point a number


of special folders, such as Documents, Music and Downloads, to
locations of your choice.
___________ 2. An organization Unit is a container that holds AD Object like User
Accounts, Computer Accounts, and Groups.
___________ 3. Forest is comprised of all the domains in your enterprise.
___________ 4. It resides in OU’s which allow you to install hardware to all machines
in OU at once.
___________ 5. OU’s keep your object un-organized and are used to control what
users and computers can and can’t do.

Note: If you get 100% correct in this pre- assessment, skip the lesson but if not
and only get 50% to 99% correct, then proceed with the lesson

1
CONFIGURE NETWORK SERVICES

What’s In

The previous lesson discussed about the network operating system and the
procedures on setting up peer to peer network. Can you still remember them? If so,
please take time to mentally recall some of the previous topics by answering the
following questions:

• What does network operating system (NOS) mean?


• What are the steps in configuring the IP address using Windows 7?

What’s New

Multiple Choice. Select the letter of the correct answer and write in your notebook.

1. Servers handle requests for other domains.


a. directly c. it is not possible
b. by contacting remote DNS server d. none of the above
2. Strong passwords are strings of at least eight characters of upper and lower case
letters and numbers.
a. True b. False
3. DNS database contains
a. name server records c. hostname-to-address records
b. hostname aliases d. all of the above
4. A domain controller (DC) is a server that handles all the security request from
other computers and servers within the Windows Server domain.
a. True b. False
5. After obtaining the IP address, to prevent the IP conflict the client may use
a. Internet Relay Chat c. Address Resolution Protocol
b. Broader Gateway Protocol d. None of the above
6. A DNS client is called?
a. DNS updater c. DNS handler
b. DNS resolver d. None of the mentioned

2
What is It

CONFIGURE NETWORK SERVICES

A network configuration is the overall design of some type of communications


network. As part of this configuration, both software and hardware are arranged in
a manner that allows for optimum efficiency with the process of transmitting voice,
audio, and data between two or more points. A network configuration may be local
and somewhat contained or involve a collection of locations or nodes that are found
across the country, or even across the world.

All network configuration approaches require the presence of various forms of


hardware and software. The hardware serves as the frame for the network, effectively
creating the basis for the overall structure. Software applications that are compatible
with one another and with the hardware are uploaded and installed, an action that
initiates activity on the network, allowing for the efficient storage and retrieval of all
types of data.

Functions of Server

The term client/server was coined in the 1980s to describe a distributed


computing model in which client applications request services from server processes.
Client/server is essentially a relationship between processes running on separate
computers interconnected by a computer network. The server process is the provider
of services and the client process a consumer, so there is a clear separation of
function, in terms of hardware and software.

Server Hardware

A server computer on a client/server network can be considered both


hardware and software. In terms of hardware, a dedicated server computer is
typically a personal computer or workstation. However, a server may be required to
service dozens or even hundreds of clients at the same time, so it typically has a
faster processor, more memory, and more storage space than a client computer.

Server Software

A server computer runs a special operating system, such as Microsoft


Windows Server, Linux, or Unix, that is designed specifically to facilitate the sharing
of its resources. Depending on the exact operational function, a server can allow
users to share files and printers over a network and provide access to the Internet.
If resources are on more than one server, individual servers can specialize in one
task -- or provide redundancy or duplication of function – in the event of server
failure.

3
Client

A client computer is typically a regular personal computer running an


operating system such as Windows XP, Windows Vista, or Windows 7. The operating
system includes the client software, such as electronic mail and Internet browsing
software, which allows the client computer to access and interact with the resources
shared by the server. A client computer only communicates directly with servers, not
other clients. It is, however, capable of information processing, a fact that
distinguishes it from the dumb terminal used in centralized, mainframe computing
systems.

Network Services

Network Services/Managed Network Services are the services of management


of networks by IT service providers for their clients. The scope of network services
extends from LAN/ WLAN management, unified communications to Network
Consulting Services and Network implementation services. The term network
services are used to describe a wide range of software and connectivity tools that are
managed by a central group and distributed to the networked computers. A
networked computer environment occurs when multiple computers are connected to
each other or a central server. The computers can access shared files and utilities
from a central location. There are several advantages to this type of environment,
ranging from increased quality control to performance and issue management. There
are four types of network services: user management, email, printing, and system
administration. In a networked environment, the desktops are known as client
computers or workstations. The servers are typically stored in a special temperature-
controlled room that is often physically located in a different building or space than
the workstation users. Access is provided through network cables that are used to
transmit data packages within the network. These cables also provide access to the
Internet, typically after being routed through a central server or network switch.

Remote Access

A remote access server is the computer and associated software that is set up
to handle users seeking access to network remotely. Sometimes called a
communication server, a remote access server usually includes or is associated with
a firewall server to ensure security and a router that can forward the remote access
request to another part of the corporate network. A remote access server may include
or work with a modem pool manager so that a small group of modems can be shared
among many intermittently present remote access users. A remote access server may
also be used as part of a virtual private network (VPN).

Domain Controller

A domain controller (DC) is a server that handles all the security requests from
other computers and servers within the Windows Server domain. Security requests
include requests to log in to another server and checking permissions for various
functions that need to be performed (e.g., accessing a file folder on a server or
modifying a file within a folder). The domain controller originated in Windows NT and
managed the access to various resources granted to users and other servers with a
username and password.

4
Web Services

The term Web services describes a standardized way of integrating Web-based


applications using the XML, SOAP, WSDL and UDDI open standards over an Internet
protocol backbone. XML is used to tag the data, SOAP is used to transfer the data,
WSDL is used for describing the services available and UDDI is used for listing what
services are available. Used primarily as a means for businesses to communicate
with each other and with clients, Web services allow organizations to communicate
data without intimate knowledge of each other’s IT systems behind the firewall.

Database Services

Database Services are cloud computing service model that provides users with
some form of access to a database without the need for setting up physical hardware,
installing software or configuring for performance. All the administrative tasks and
maintenance are taken care of by the service provider so that all the user or
application owner needs to do is use the database. Of course, if the customer opts
for more control over the database, this option is available and may vary depending
on the provider.

Proxy Server

A proxy server is a computer that offers a computer network service to allow


clients to make indirect network connections to other network services. A client
connects to the proxy server, then requests a connection, file, or other resource
available on a different server. The proxy provides the resource either by connecting
to the specified server or by serving it from a cache. In some cases, the proxy may
alter the client’s request or the server’s response for various purposes.

5
What’s More

6
What I Have Learned

I have learned that ____________________________________________

I have realized that _________________________________________

I will apply ________________________________________________

What I Can Do

(You may practice or do the guided activity below only if you have the complete
equipment and tools for the job. If you have limited resources or none at all, please
familiarize the steps and wait for the appropriate time to practice them in school with
your teacher.)

DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs


and removes Active Directory Domain Services and promotes domain controllers.

Beginning in Windows Server 2008, Active Directory Domain Services role had
to be installed prior to running DCPromo, but it still needed to run to make the server
a DC. Below are the steps:

1. Log into your Windows Server and start the Server manager

2. Navigate to the Server Roles tab and press on the “Add Roles” button.

7
3. The Add Roles Wizard is going to open up, click Next.

4. The Wizard will display a list of Roles. Choose the Active Directory Domain
Services Role.

5. The Active Directory Domain Services Role requires adding features to the server.
Click on “Add required features” on the appearing screen and then click on next.

8
6. On the following screen click on Install and wait for the installation to finish. When
the installation finishes click on Close.

7. At this point the Active Directory Domain Services are not configured yet.

9
8. If we click on Active Directory Domain Services button we get to the following
screen. Our next step will be configuring Active Directory Domain
Services using dcpromo.exe.

9. We are about to start the Active Directory Domain Services installation Wizard.

10
10. Navigate to the following screen. Choose the “Create a new domain in a new forest
option” and click on next button.

11. Type in your Domain name.

12. Choose the oldest operating system in your network. This option exists for
backwards compatibility of different features.

11
13. If your Domain Controller is a stand-alone server you don’t have to choose the
DNS server option. If otherwise, it’s recommended to leave it checked.

14. Specify the folders that will contain the Active Directory controller database, log
files. And SYSVOL and click on Next.

15. Choose a password for Restore mode Administrator account. (This is not the
Domain Administrator account, this is an additional account used for recovery)

16. When the wizard finishes configuring the settings reboot your server.

12
17. After rebooting when you first log on the server is not going to accept your
machine Administrator account.

18. In order to solve this issue you need to choose the “Switch User” button and login
with your Domain Administrator account which is basically the same user account
and password but now it belongs to a domain the domain name is needed. For
example: PPSP2010\Administrator.

13
Assessment

Direction: Identify what is being asked in the following statements. Write your
answers in your notebook.

_________1. A server computer on a client/server network that can be considered


both hardware and software.

_________2. A server computer that runs a special operating system, such as


Microsoft Windows Server, Linux, or Unix, that is designed specifically
to facilitate the sharing of its resources.

_________3. It is typically a regular personal computer running an operating system


such as Windows XP, Windows Vista, or Windows 7.

_________4. These are the services of management of networks by IT service providers


for their clients.

_________5. It is the computer and associated software that is set up to handle users
seeking access to network remotely.

_________6. It is a server that handles all the security requests from other computers
and servers within the Windows Server domain.

_________7. The standardized way of integrating Web-based applications using the


XML, SOAP, WSDL and UDDI open standards over an Internet protocol
backbone.

_________8. These are cloud computing service model that provides users with some
form of access to a database without the need for setting up physical
hardware, installing software or configuring for performance.

_________9. It is a computer that offers a computer network service to allow clients


to make indirect network connections to other network services.

_________10. It provides the resource either by connecting to the specified server or


by serving it from a cache.

Additional Activities

For the preparation of the next activity, read or watch a video about how to
configure user access levels.

14
15
What’s More
What I Know What’s New Assessment
1. True 1. B 1. Server Hardware
2. True 2. A
3. True 3. D 2. Server Software
4. False 4. A
5. False 5. C 3. Client
6. B
4. Network Services
5. Remote Access
6. Domain Controller
7. Web Services
8. Data Services
9. Proxy Server
10. Proxy
Answer Key
References

How P2P (Peer to Peer) File Sharing Works. (Accessed 12 November 2020)

https://www.makeuseof.com/tag/p2p-peer-peer-file-sharing-works/

Server 2008 R2: Configuring your server OS to client OS (look and feel) user
experience. (Accessed 12 November 2020)
https://support.ncomputing.com/portal/en/kb/articles/server-2008-r2-
configuring-your-server-os-to-client-os-look-and-feel-user-experience

3G E- Learning. (Accessed 12 November 2020)

https://www.3ge-learning.com/

Manzano, Reynald. 2016. Competency based learning material. Metro

Dumaguete College.
For inquiries or feedback, please write or call:

Department of Education – Schools Division of Negros Oriental


Kagawasan, Avenue, Daro, Dumaguete City, Negros Oriental

Tel #: (035) 225 2376 / 541 1117

You might also like