0% found this document useful (0 votes)
71 views

Css 2nd Quarter Quest

Uploaded by

Mahonri Lulab
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Css 2nd Quarter Quest

Uploaded by

Mahonri Lulab
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

1.

A configuration design for a communications network optimizes efficiency by arranging software and
hardware for efficient transmission of voice, audio, and data between points.
Network Configuration

Client/server
2. is essentially a relationship between processes running on separate
computers interconnected by a computer network. The server process is the provider
of services and the client process a consumer, so there is a clear separation of
function, in terms of hardware and software.

Server Hardware
3. A server computer, a combination of hardware and software, is a personal computer or workstation
that serves multiple clients simultaneously, typically having a faster processor, memory, and storage
space.

Server Software
4. A server computer, running a specific operating system like Windows Server, Linux, or Unix, allows
users to share resources, access the Internet, and specialize in tasks or provide redundancy in case of
server failure.

Client
5. A type of computer, running an operating system like Windows XP, Vista, or 7, is a personal computer
with its software, enabling direct communication with servers and information processing, distinguishing
it from dumb terminals in centralized computing systems.

Network Services
6. It manages networks, including LAN/ WLAN management, unified communications, consulting, and
implementation, using software and connectivity tools. They offer advantages like quality control,
performance, and issue management

Remote Access
7. A functional server computer and software set up to handle users accessing a network remotely. It
typically includes a firewall server for security and a router for forwarding requests. It may work with
modem pool managers or be part of a VPN.

Domain Controller
8. It is a server that handles security requests from other Windows Server domains, including logging in
and checking permissions. Originating in Windows NT, it manages access to user and server resources
with usernames and passwords.
Web Services
9.It integrates Web-based applications using XML, SOAP, WSDL, and UDDI open standards over an
Internet protocol backbone. They allow businesses to communicate data without intimate knowledge of
each other's IT systems, facilitating data exchange between organizations.

Database Services
10.These are cloud computing models that offer users access to databases without the need for
hardware setup, software installation, or performance configuration where service providers handle
administrative tasks and maintenance, allowing users to use the database.

Proxy Server
11.It is a computer that enables clients to make indirect network connections to other network services.
It provides resources either by connecting to the specified server or serving them from a cache.

Network Operating System (NOS)


12.It is an operating system supports workstations, database sharing, application sharing, and file/printer
access among multiple computers in a network. It is a software application that manages and controls
hardware and software for interconnected networks, enabling communication, resource sharing, and
data protection.

Peer to peer computer networks


13.networks are ideal for small businesses, but have disadvantages like distributed files, difficulty in data
backup, and centralized user databases, making management difficult. As the organization's network
grows, they must gradually upgrade their network to client server-based network.

A client server computer


14.network model is made-up of client computers and server computers.

• File Server:
15.File servers centrally store user documents and files, offering easy management and backup. Ideal for
fast hard-disks, multiple processors, and redundant power supplies, they run FTP or SMBP protocols.

• Print Server:
16.Print Server, which redirects print jobs from client computers to specific printers.

• Mail Server:
17.Mail Servers transmit emails using SMTP protocols, exchange emails between domains, and are
commonly used with software products like Microsoft Exchange Server, SENDMAIL, Postfix, and Apache
James.
• Application Server:
18.It runs common computer programs for network users, controlling business logic and enabling access
to various applications from a central server, such as SAP ERP, Microsoft Dynamics, Oracle ERP Cloud, and
Ramco ERP.

• Database Server:
19.Database servers enable network clients to access, modify, and delete an organization's data stored in
a common database, using systems like Oracle, Microsoft, PostgreSQL, IBM, MySQL, and MongoDB.

• Directory Servers:
20.Directory Servers are central management tools that ensure the security, authentication,
authorization, and accounting of network users and resources.

• Active Directory Domain Services (AD DS),


21. It is directory is a hierarchical structure that stores information about objects on the network. A
directory service, such as __, provides the methods for storing directory data and making this data
available to network users and administrators.
22. Can you configure a server to permit users only to connect via RemoteApp and block users from
connecting to the desktop?
• NO. This option is not supported.

23. What allows businesses to define, manage, access and secure network resources including files,
printer, people and applications?
• Directory Services

24. What Windows Server 2008 feature is a special installation option that creates a minimal
environment for running only specific service or roles?
• Server Core

25. You set up a network where each computer acts as a client and server in which each user share
other's resources, including printers. What do you call this set up?
• Peer-to-peer networking

26. What may be the problem if the shared folder could not be accessed? What will you do to resolve
the problem?
• Computer does not belong to the network • Check the network address and the workgroup

27. Aside from installing anti-virus software, how can you protect your server from viruses?
• Install firewall • Install updates

28. What are you going to do to access a server located far from the client computer which you are
troubleshooting?
• Remotely access the server using Remote Desktop Connection

29. What may be the reason why you cannot access and connect to other computers remotely? How
would you resolve the problem?
• Computer has no password • Assign password to that computer

30.After installing an anti-virus to your network, you cannot connect to other computers, what could be
the possible cause of it?
• Anti-virus is blocking network access • Configure the anti-virus so as not to block the network access

31. After logging, you noticed that you cannot change the IP address of other users, what could be the
possible cause?
• Password or Account is not an Administrator Account
32. What policies are you going to suggest to secure your server?
• Use Anti-virus software • Prohibit downloading unless authorized by Administrator • Restrict
administrative access.

33. What would you suggest in order to come up with strong admin password?
• Apply Kebreros • Use password that contains combination of letters, numbers, upper and lower case
letters and special characters

34. As an Administrator and security precaution, what type of account will you use in performing
ordinary tasks?
• Power user account • Limit the use of Administrator Account

Provide Computer Information


35. Where would you look in Initial Configuration Tasks (ICT) screen to find a link that can be used to
change the computer name.

36. Where would you find "Enable automatic updating and feedback" and "Download and install
updates".
Update the Server

Customize the Server


37. Where would you find the following "Add roles, Add Features, Enable Remote Desktop, Configure
Windows Firewall"

Roles Summary
38. What option in Server Manager would you use to install Active Directory Domain Services on
Windows Server 2008 R2?

Add roles
39. What option in ICT/Customize This Server would you use to install Web Sever?

Add Features
40. What option in ICT/Customize This Server would you use to install .NET Framework 3.5.1 Features?

Security Information
41. To verify the data and time updates were installed on your Windows Server 2008 R2 system, what
option in Server Manager would you use.

Manage > Add Roles and Features


42. Which option in Server Manager would you use in Server Manager to access the Add Roles and
Features Wizard.

Manage > Create Server Group


43. Which option in Server Manager would you use in Server Manager to create a new server group.
B___44. Servers handle requests for other domains.
a. directly c. it is not possible
b. by contacting remote DNS server d. none of the above
D___45. DNS database contains
a. name server records c. hostname-to-address records
b. hostname aliases d. all of the above

trust relationship
46.Enables administration from a particular domain to grant access to their domain's resources to users
in other domains.

OU structure
47. Modeled after company's Organizational chart, departments and/or resource needs. security settings
of an OU is inherited by all child objects of the container.

Forest Root Domain


48. the first domain created with an AD forest.

Organizational Units (OUs)


49. A container that represents a logical grouping of resources that have similar security or
administrative guidelines.

delegation of control
50. Administration of an OU is tasked to a department supervisor or manager, thus allowing that person
to manage day-to-day resource access as well as more mundane tasks, such as resetting passwords.

Directory Services
What allows businesses to define, manage, access and secure the resources including files, printer,
people, and applications?

Server Core
What Windows Server 2008 is a special installation option that creates a minimal environment for
running only specific server or roles?

Site
What term Is used to define one or more IP subnets that are, connected by the fast links?

Client/Server type of network


Based on rules, what type of network would you suggest to your client who wants to network more than
300 computers?
Peer to peer network
What type of network would you recommend if your client has only few computer units?

Use an extender or repeater


What would you if the devices that you are going to network are far from each other?

Get a LAN tester and check the cable Swap a good or working cable in place with the suspected cable
What would you do if you suspect that the cause of the trouble in the network is the cable?

Wrong IP address —

maybe some computer don't belong to the workgroup = wrong subnet mask
After replacing a good cable, still the computers cannot connect to each other, what are the possible
causes if the network is using static IP addresses?

Ping each other —


Using net viewAfter configuring the network interface card, how will you going to test the connectivity of
your network?

Crossover cable
What type of cable will you use to connect two computers?

Workgroup name should be the same, IP addresses should have the same network address and host
address should be different; for subnet mask, computers in the same network or subnet should be the
same.
In order for computers to network, what are the things you are going to set or configure?

Create a folder using windows explorer. Right click the folder and click Sharing and Security
What should you do if you want to transfer file/files into another computer? How do you share a folder
name TESDA in DRIVEC?

What are the Container Objects that are found in Server 2008?
Forests Domain Trees Domains Organizational Units (OUs)

Forests
The largest container object with AD. Defines the fundamental security boundary with AD - a user can
access resources across an entire AD forest using a single logon/ password combination.

Directory Services
What allows businesses to define, manage, access and secure the resources including files, printer,
people, and applications?

Server Core
What Windows Server 2008 is a special installation option that creates a minimal environment for
running only specific server or roles?

BIOS
What do you call the computer software which you configure before installing the OS?

Buy an internal video card having higher memory capacity?


What would you advise to a client who wants to improve the computer's built-in video card?

Torx Screwdriver
What type of screw driver will you use for small screws usually found in Compaq and Apple computers?

Select 6 to 12 questions0 of 12 selected


Active Directory Domain Services (AD DS)
Windows Server 2008 service that provides a centralized authenication service for Microsoft Networks.

Active Directory Lightweight Directory Services (AD LDS)


Role that provides devlopers the ability to store data for directory-enabled applications without incurring
the overhead of extending the Active Directory schema to support their applications.

Domain Controller (DC)


A server that stores the Active Directory database and authenicates users with the network during logon.

Replication
The process of keeping each domain controller in synch with changes that have been made elsewhere on
the network.

Outbound replication
Occurs when a domain controller transmits replication information to other domain controllers on the
network.

Inbound replication
occurs when a domain controller receives updates to the Active Directory database from other domain
controllers on the network.

Major Benefits of AD Services


Centralized resource and security admin Single logon for access to global resources Fault tolerance and
redundancy Simplified resource location

Functional Levels
Designed to offer support for AD domain controllers running various supported operating systems by
limiting functionality to specific software versions. As legacy DCs are decommissioned, administrators
can modify the functional levels to expose new functionality within AD.

Server 2008 AD on DC - what tools are added to Adminstrative Tools folder?


AD Users and Computers AD Domains and Trusts AD Sites and Services ADSI Edit
Fault Tolerant
The ability torespond geacefully to a software or hardware failure. Specifically, the network continues
providing authenication services after the failure of a DC.

Read-Only Domain Controller (RODC)


Introduced in Windows Server 2008, a DC that contains a copy of the ntds.dit file that cannot be
modified and that does not replicate its changes to other DCs within AD.

Loose Consistency
Individual DCs in an AD database may contain slightly different information, because it can take
anywhere from a few seconds to several hours for changes to replicate throughout a given environment.

Publish
An option that allows users to access network resources by searching the Active Directory database for
the desired resource.

Container Object
An object that is used to organize other objects.

Leaf object
An object that does not contain other objects and usually refers to a resource such as a printer, folder,
user, or group.

What are the Container Objects that are found in Server 2008?
Forests Domain Trees Domains Organizational Units (OUs)

Forests
The largest container object with AD. Defines the fundamental security boundary with AD - a user can
access resources across an entire AD forest using a single logon/ password combination.

Partitions/Naming Contexts (NCs)


AD divided into these portions in order to improve the efficiency in accessing AD.

Minimum number of NCs on a DC. They are called?


three. Schema NC Configuration NC Domain NC

Schema Naming Context


contains the rules and definitions that are used for creating and modifying object classes and attributes
with AD.

Configuration Naming Context


contains information regarding the physical topology of the network, as well as other configuration data
that must be replicated throughout the forest.

Domain Naming Context


consists of user, computer, and other resource information for a particular AD Domain.
Domain Naming Context is replicated --
to each DC within a single domain.

Domain Tree
In AD, a logical grouping of network resources and devices that can contain one or more domains
configured in a parent-child relationship.

Forest -- Domain Tree --- Domains structure


Each AD forest can contain one or more Domain trees. Each Domain tree can contain one or more
domains.

Domain
A grouping of objects in AD that can be managed together. A domain can function as a security boundary
for access to resources, such as computers, printers, servers, applications, and file systems.

Global catalog replication


Does not replicate to all DCs, it only replicates to DCs configured to hold the global catalog.

Forest Root Domain


the first domain created with an AD forest.

Organizational Units (OUs)


A container that represents a logical grouping of resources that have similar security or administrative
guidelines.

OU structure
Modeled after company's Organizational chart, departments and/or resource needs. security settings of
an OU is inherited by all child objects of the container.

delegation of control
Administration of an OU is tasked to a department supervisor or manager, thus allowing that person to
manage day-to-day resource access as well as more mundane tasks, such as resetting passwords.

Name the objects that can be contained in an OU.


Users, Groups, Contacts Printers,Shared folders Computers, OUs, InetOrgPerson

What is the Fourth Partition type, first introduced in Windows Server 2003?
Application Partition. Provides fine control in which administrators can direct where information is
replicated to a domain or forest.

object
An element in AD that refers to a resource.

Attributes
Characteristics associated with an object class in AD that make the object class unique within the
database.
Where are the attributes defined?
In the Schema, but the same attribute can be associated with more than one object class.

Schema
Master database that contains definitions of all objecta in the AD. It contains two components: object
classes and attributes.

Name the Object classes automatically created when AD is installed.


Users, Groups Computers, DCs Printers

Common Attributes of all Object Classes


Unique Name Globally Unique ID (GUID)128bitHexidecimal# Require Object Attributes Optional Object
Attributes

Access Control Lists (ACLs)


Implemented by the administrator and used by the directory to keep track of which users and groups
have permission to access specific objects and to what degree they can use or modify them.

Site
one or more IP subnets connect by fast links. Usually means all computers that are connect via a single
LAN.

Knowledge Consistency Checker (KCC)


An internal AD process that automatically creates and maintains the replication topology.

KCC operates under which snap-in?


The AD Sites and Services Snap-in located in the Administrator Tools folder on the DC or Administrative
Workstation with Administrative Tools installed.

Lightweight Directory Access Protocol (LDAP)


Industry standard that enables data exchange between directory services and applications.

What defines the naming of all objects in the AD database?


LDAP standard and therfore, provides a directory that can be integrated with other directory services,
such as Novell eDirectory, and AD-aware applications, such as MS Exchange.

Distinguished Name (DN)


Used by LDAP to refer to an object. The DN references an object in the AD directory structure using its
entire hierarchical path, starting with the object itself and including all parent objects up to the root of
the domain.

LDAP naming attributes defined


Cn=common name Ou=Organizational unit name Dc=Domain components, one for each part of the DNS
name.

JSmith of the sales department of lucernepublishing.com - what is the DN?


cn=JSmith, ou=sales, dc=lucernepublishing, dc=com
User Principal Names (UPNs)
In Windows 2008, follows the format of username@lucernepublishing.com. Provides consistency
between user log on name and user's email name.

Domain Name System (DNS)


The name resolution mechanism computers use for all Internet communications and for private
networks that use the AD domain services included with MS Windows Server 2008 and earlier server
versions.

What provides the translation of the host name to its IP Address?


DNS

What is a foundational requirement for AD?


DNS, the DC role cannot be installed onto a server unless that server can locate an appropriate DNS
server on the same machine or somewhere on the network.

Locator Service
AD DNS provides direction for network clients that need to know which server performs what function.

SRV Records
The locator records within DNS that allow clients to locatw an AD domain controller or global catalog.

The ability to resolve SRV records allows clients to do what?


Authenticate into the AD.

What does dynamic updates permit the DNS clients to do?


To automatically register and update their information in the DNS database.

Forest and Domain Functional Levels


Designed to offer support for AD DCs running various supported operating systems. As you
decommission legacy controllers, you can modify these functional levels to expose new functionality
within AD.

Rolling Upgrades
Upgrade strategy based on functional levels that allows enterprises to migrate their AD DCs gradually,
based on the need and desire for the new functionality.

How are changes to functional level performed?


An adminstrator makes the change manually. Note that once the change has taken place, it is not
reversible. you will have to perform a domain- or forest-wide restore of the AD database to return yoyr
network to the previous fun tional level.

What are the three domain functional levels supported in Windows Server 2008?
Windows 2000 Native Windows Server 2003 Windows Server 2008

What is allowed in Windows 2000 Native domain functional level?


backward compatibility with MS Windows 2000 allows Windows 2000, Windows Server 2003, and
Windows Server 2008 DCs.
What is allowed in Windows Server 2003 domain functional level?
Windiws Server 2003 and 2008 DCs only allowed.

What is allowed in Windows Server 2008 domain functional level?


No backward compatiability. Only Windows Server 2008 DCs supported.

Windows 2000 Native Domain Functional Level features


Install from Media Application Directory Partitions Drag-and-drop User Interface Universal groups

Windows Server 2003 Domain Functional Level features


All listed in Windows 2000 Native Replicated lastLogonTimestamp attribute User password on
inetOrgPerson Domain rename

Windows Server 2008 Domain Functional Level features


All listed in Windows Server 2003 Improved SYSVOL replication Improved encryption 4 authentication
methods Improved auditing of users logons Multiple password policies per domain. RODCs

Name the three forest functional levels


Windows 2000 Windows Server 2003 Windows Server 2008

What is the default forest functionality enabled when Windows Server 2008 DC is introduced into the
network?
Windows 2000

Windows 2000 Forest Functional features


Install from Media Universal Group Caching Application Directory Partitions Enchanced User Interface.

Windows Server 2003 Forest Functional features


All listed in Windows 2000 Improved replication of group objects Improved ISTG functionality Conversion
to inetOrgPerson objects Schema deactivations to attributes & classes Dynamic Auxillary class objects
Domain renaming Cross-forest trusts All new domains at Windows Server 2003 domain functional level

Windows Server 2008 forest functional features


All listed in Windows Server 2003 All new domains at Windows Server 2008 domain functional level

Guidelines to raise the forest functional level


Log on as member -Enterprise Admins Group Connect to DC with Schema Master Role. Check that all
DCs are running an OS supported by the targeted forest functional level Raising the forest functional
level irreversible.

describe the trust relationships in an AD forest


when a child domain is created it automatically receives a two-way transitive trust with its parent
domain and when a new domain tree is created, the root domain in the new tree automatically receives
a two-way trust with the root domain.

shortcut trust
A manually created no transitive trust that allows child domains in separate trees to communicate more
efficiently by eliminating the tree-walking of a trust path.

tree-walking
the trust path up a domain tree through the child domains and parent domains to the root domain and
then down the other parent domain to the desired child domain"

external trust
A one-way, nontransitive trust that is established with a Windows NT domain or a Windows 2000
domain in a separate forest.

cross-forest trust
Transitive Trust type (one-way or two-way) that allows resources to be shared between AD forests.

elect 6 to 12 questions0 of 12 selected


What should you do if you want to transfer file/fies into another computer. How would you share a
folder named TESDA in Drive C?
• Create folder using Windows Explorer • Right click folder • Click Sharing and Security

Name the two kinds of Linux boot loader


• GRUB • LILO

What is the term used for software which is not part of the OS?
• Third party software/installer

What do you call a bootable disk that contains a full usable OS?
• Live CD/DVD

Why there are different executable programs running in task Manager when you start a Remote App
from a full desktop?
• Remote App and full desktop use different shells and logon mechanisms • Full desktop uses
EXPLORER.EXE whereas Remote App uses RDINIT.EXE (equivalent of USERINIT.EXE used on full desktop
sessions) • EXPLORER.EXE and RDINIT.EXE both launch RDPSHELL.EXE and updates the client-side taskbar
and handles logoff logic

Do you still need to lock down the server when you use RemoteApp programs?
• Absolutely YES • RemoteApp are for display convenience and not for security feature • Users can get to
the file system and run any executable they have access so there's a need to lock down the server •
AppLocker (or Software Restriction Policies), NTFS Permissions and Group Policy can be used to lock
down servers

Can you configure a server to permit users only to connect via RemoteApp and block users from
connecting to the desktop?
• NO. This option is not supported.

What contains the rules and definitions that are used for creating and modifying object classes and
attributes within the Active Desktop?
• Schema
What allows businesses to define, manage, access and secure network resources including files, printer,
people and applications?
• Directory Services

What Windows Server 2008 feature is a special installation option that creates a minimal environment
for running only specific service or roles?
• Server Core

What is the minimum amount of storage space required for the Active Directory installation files?
• 200MB

You set up a network where each computer acts as a client and server in which each user share other's
resources, including printers. What do you call this set up?
• Peer-to-peer networking

What special identity group contains all authenticated users and domain guest?
• Everyone

What account name refers to each user's login name?


• SAM Account

What do you call the group that you cannot manually modify or view its membership?
• Special Identity Group

What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the
schema, if necessary?
• LDIFDE

What may be the problem if the shared folder could not be accessed? What will you do to resolve the
problem?
• Computer does not belong to the network • Check the network address and the workgroup

Aside from installing anti-virus software, how can you protect your server from viruses?
• Install firewall • Install updates

If one of the users forgot his/her password, how are you going to change the password? Enumerate the
steps in resetting a password using GUI
• Reset the password • Log in as administrator • Click start and right click Manage • Click Local Users and
groups • Double click Users folder • Select and right click the username • Select Set password

What are you going to do to access a server located far from the client computer which you are
troubleshooting?
• Remotely access the server using Remote Desktop Connection

What may be the reason why you cannot access and connect to other computers remotely? How would
you resolve the problem?
• Computer has no password • Assign password to that computer
After installing an anti-virus to your network, you cannot connect to other computers, what could be the
possible cause of it?
• Anti-virus is blocking network access • Configure the anti-virus so as not to block the network access

After logging, you noticed that you cannot change the IP address of other users, what cold be the
possible cause?
• Password or Account is not an Administrator Account

What policies are you going to suggest to secure your server?


• Use Anti-virus software • Prohibit downloading unless authorized by Administrator • Restrict
administrative access.

What would you suggest in order to come up with strong admin password?
• Apply Kebreros • Use password that contains combination of letters, numbers, upper and lower case
letters and special characters

As an Administrator and security precaution, what type of account will you use in performing ordinary
tasks?
• Power user account • Limit the use of Administrator Account

Select 6 to 12 questions0 of 12 selected


What windows edition is available in Windows Server 2008, but not in Windows Server 2008 R2
Small Business Server

What windows edition is available in Windows Server 2008 R2, but not in Windows Server 2008.
Foundation

Provide Computer Information


Where would you look in Initial Configuration Tasks (ICT) screen to find a link that can be used to change
the computer name.

Where would you find "Enable automatic updating and feedback" and "Download and install updates".
Update the Server

Customize the Server


Where would you find the following "Add roles, Add Features, Enable Remote Desktop, Configure
Windows Firewall"

Roles Summary
What option in Server Manager would you use to install Active Directory Domain Services on Windows
Server 2008 R2?

Add roles
What option in ICT/Customize This Server would you use to install Web Sever?

Add Features
What option in ICT/Customize This Server would you use to install .NET Framework 3.5.1 Features?
Security Information
To verify the data and time updates were installed on your Windows Server 2008 R2 system, what option
in Server Manager would you use.

Manage > Add Roles and Features


Which option in Server Manager would you use in Server Manager to access the Add Roles and Features
Wizard.

Manage > Create Server Group


Which option in Server Manager would you use in Server Manager to create a new server group.

Get-Help Get-Service at the Powershell Prompt


What should you do to use the Get-Service cmdlet to generate a list of all services installed on the
system but are unsure of the syntax.

Windows Server 2012 R2 system need to launch Start Manager and need to first switch to Start screen.
How would you?
Hover mouse over lower-left corner of screen and click Start title or Press Windows logo key on
keyboard.

Hover mouse over lower-right or upper-right corner of the screen.


How do you display Charms panel in Windows Server 2012 R2 system?

Settings Charm icon


Which Charm panel icon would you click on to Update and Restart.

Settings Charm icon


Which Charm panel icon would you click on to access Control Panel.

Right click Task Bar and click Properties


What Control Panel option would you use to configure the WS2012R2 system to boot to Start screen by
default.

CONFIGURE NETWORK SERVICES


A network configuration is the overall design of some type of communications
network. As part of this configuration, both software and hardware are arranged in
a manner that allows for optimum efficiency with the process of transmitting voice,
audio, and data between two or more points. A network configuration may be local
and somewhat contained or involve a collection of locations or nodes that are found
across the country, or even across the world.
All network configuration approaches require the presence of various forms of
hardware and software. The hardware serves as the frame for the network, effectively
creating the basis for the overall structure. Software applications that are compatible
with one another and with the hardware are uploaded and installed, an action that
initiates activity on the network, allowing for the efficient storage and retrieval of all
types of data.
Functions of Server
The term client/server was coined in the 1980s to describe a distributed
computing model in which client applications request services from server processes.
Client/server is essentially a relationship between processes running on separate
computers interconnected by a computer network. The server process is the provider
of services and the client process a consumer, so there is a clear separation of
function, in terms of hardware and software.
Server Hardware
A server computer on a client/server network can be considered both
hardware and software. In terms of hardware, a dedicated server computer is
typically a personal computer or workstation. However, a server may be required to
service dozens or even hundreds of clients at the same time, so it typically has a
faster processor, more memory, and more storage space than a client computer.
Server Software
A server computer runs a special operating system, such as Microsoft
Windows Server, Linux, or Unix, that is designed specifically to facilitate the sharing
of its resources. Depending on the exact operational function, a server can allow
users to share files and printers over a network and provide access to the Internet.
If resources are on more than one server, individual servers can specialize in one
task -- or provide redundancy or duplication of function – in the event of server
failure.
What is It
4
Client
A client computer is typically a regular personal computer running an
operating system such as Windows XP, Windows Vista, or Windows 7. The operating
system includes the client software, such as electronic mail and Internet browsing
software, which allows the client computer to access and interact with the resources
shared by the server. A client computer only communicates directly with servers, not
other clients. It is, however, capable of information processing, a fact that
distinguishes it from the dumb terminal used in centralized, mainframe computing
systems.
Network Services
Network Services/Managed Network Services are the services of management
of networks by IT service providers for their clients. The scope of network services
extends from LAN/ WLAN management, unified communications to Network
Consulting Services and Network implementation services. The term network
services are used to describe a wide range of software and connectivity tools that are
managed by a central group and distributed to the networked computers. A
networked computer environment occurs when multiple computers are connected to
each other or a central server. The computers can access shared files and utilities
from a central location. There are several advantages to this type of environment,
ranging from increased quality control to performance and issue management. There
are four types of network services: user management, email, printing, and system
administration. In a networked environment, the desktops are known as client
computers or workstations. The servers are typically stored in a special temperaturecontrolled room that
is often physically located in a different building or space than
the workstation users. Access is provided through network cables that are used to
transmit data packages within the network. These cables also provide access to the
Internet, typically after being routed through a central server or network switch.
Remote Access
A remote access server is the computer and associated software that is set up
to handle users seeking access to network remotely. Sometimes called a
communication server, a remote access server usually includes or is associated with
a firewall server to ensure security and a router that can forward the remote access
request to another part of the corporate network. A remote access server may include
or work with a modem pool manager so that a small group of modems can be shared
among many intermittently present remote access users. A remote access server may
also be used as part of a virtual private network (VPN).
Domain Controller
A domain controller (DC) is a server that handles all the security requests from
other computers and servers within the Windows Server domain. Security requests
include requests to log in to another server and checking permissions for various
functions that need to be performed (e.g., accessing a file folder on a server or
modifying a file within a folder). The domain controller originated in Windows NT and
managed the access to various resources granted to users and other servers with a
username and password.
5
Web Services
The term Web services describes a standardized way of integrating Web-based
applications using the XML, SOAP, WSDL and UDDI open standards over an Internet
protocol backbone. XML is used to tag the data, SOAP is used to transfer the data,
WSDL is used for describing the services available and UDDI is used for listing what
services are available. Used primarily as a means for businesses to communicate
with each other and with clients, Web services allow organizations to communicate
data without intimate knowledge of each other’s IT systems behind the firewall.
Database Services
Database Services are cloud computing service model that provides users with
some form of access to a database without the need for setting up physical hardware,
installing software or configuring for performance. All the administrative tasks and
maintenance are taken care of by the service provider so that all the user or
application owner needs to do is use the database. Of course, if the customer opts
for more control over the database, this option is available and may vary depending
on the provider.
Proxy Server
A proxy server is a computer that offers a computer network service to allow
clients to make indirect network connections to other network services. A client
connects to the proxy server, then requests a connection, file, or other resource
available on a different server. The proxy provides the resource either by connecting
to the specified server or by serving it from a cache. In some cases, the proxy may
alter the client’s request or the server’s response for various purposes.

What does Network Operating System (NOS) mean?


A network operating system is an operating system designed for the sole
purpose of supporting workstations, database sharing, application sharing and file
and printer access sharing among multiple computers in a network. Certain
standalone operating systems, such as Microsoft Windows NT and Digital’s
OpenVMS, come with multipurpose capabilities and can also act as network
operating systems. Some of the most well-known network operating systems include
Microsoft Windows Server 2003, Microsoft Windows Server 2008, Linux and Mac OS
X.
Features of Network Operating Systems
A network operating system is a software application that provides a platform
for both the functionality of an individual computer and for multiple computers
within an interconnected network. Basically, a network operating system controls
other software and computer hardware to run applications, share resources, protect
data and establish communication. Individual computers run client operating
systems, while network systems create the software infrastructure for wireless, local
and wide area networks to function.
Basic Operating Features
Network operating systems support the basic underlying operating features of
networks. These include support for processors and the various protocols that allow
computers to share data. Many network operating systems can detect hardware
within the system to allow for asset discovery within the network. Also, network
operating systems support the processing of other software applications that run on
both individual computers and within the network.
A network operating system (NOS) provides services to clients over a network. Both
the client/server and peer-to-peer networking models use network operating
systems, and as such, NOSes must be able to handle typical network duties
such as the following:
• Providing access to remote printers, managing which users are using
which printers when, managing how print jobs are queued, and
recognizing when devices aren't available to the network
• Enabling and managing access to files on remote systems, and determining
who can access what—and who can't
• Granting access to remote applications and resources, such as the
Internet, and making those resources seem like local resources to the user
(the network is ideally transparent to the user)
5
• Providing routing services, including support for major networking
protocols, so that the operating system knows what data to send where
• Monitoring the system and security, so as to provide proper security
against viruses, hackers, and data corruption.
• Providing basic network administration utilities (such as SNMP, or Simple
Network Management Protocol), enabling an administrator to perform
tasks involving managing network resources and users.
Peer to Peer Networks
A peer to peer network has no dedicated servers. In a peer to peer network, a
number of workstations (or clients) are connected together for sharing devices,
information or data. All the workstations (clients) are considered equal. Any one
computer can act as client or server at any instance. This network is ideal for small
networks where there is no need for dedicated servers, like home networks, small
business networks, or retail shops. The Microsoft term for peer to peer network is
“Workgroup”.
There is no limitation for the number of computers in a peer to peer network.
But peer to peer implementations are meant for small networks. Typically, a
Workgroup contain less than 10 workstations.
Commonly used Workstation Operating Systems are Microsoft Windows 10
Desktop, Red Hat Enterprise Linux Workstation, SUSE Linux Enterprise
Desktop, Ubuntu Desktop, LinuxMint, Fedora Workstation, elementary OS etc.
6
Client Server Networks
Peer to peer computer networks are good choice for small business
organizations. For example: a small pharmacy outlet, an automobile service center,
a small clinic etc.
The main disadvantages of peer to peer networks are listed below.
• Everything is kept distributed in different computers.
• User generated files are stored in individual computers. Data backup is
extremely difficult.
• Each computer has its own user database. There is no centralized user &
user privilege management. Users need to remember their user ids and
passwords in every computer. Managing network users is extremely
difficult.
As the organization's network grows, they must gradually upgrade their peerto-peer network to client
server-based network.
A client server computer network model is made-up of client computers and
server computers.
Now we need to understand the terms "client computer" and "server computer".
What is a client computer? A computer which is seeking any resource from another
computer is a client computer. You can think a client as a computer in your network,
where a network user is performing some network activity. For Example:
Downloading a file from a File Server, Browsing Intranet/Internet etc. The network
user normally uses a client computer to perform his day to day work.
What is a server computer? If a computer has a resource which is served to another
computer, it is a server computer. The client establishes a connection to a server and
accesses the services installed on the server. A server is not meant for a network user
to browse in internet or to do spreadsheet data entry work. A server computer is
installed with appropriate Operating System and related software to serve the
network clients with one or more services.
In a client server network, high-end servers, installed with the Network
Operating System (Server Operating System) and the related software, serve the
clients continuously on a network, by providing them with specific services upon
request. A server computer is built and installed to run continuously 24/7 without
a break. An unexpected shutdown of a server computer can cause catastrophic
damage to a business.
Well known server Operating System Products are Microsoft Windows Server
2019,Unix (OracleSolaris, IBMAIX, HP UX, FreeBSD, NetBSD, OpenBSD, Xinuos
Open Server/SCO Unix, GNU/Linux (RedHat Enterprise Linux, Debian Linux, SUSE
Linux Enterprise Server, Ubuntu Server, CentOS Server, Fedora Server etc.
7
Building a client server-based network is costlier than building a peer-to-peer
network. Client server-based networks require dedicated servers. Server hardware is
costlier than normal desktop client computer hardware. Network Operating Systems
(Server Operating System) are also costlier than client Operating Systems (Desktop
Operating Systems).
Different Types of Servers Used in Client Server Based Networks
Listed below are the different types of servers used in client server-based networks.
• File Server: File servers are used to store the user documents and files centrally.
An ideal file server should have a large amount of memory and storage space, fast
hard-disks, multiple processors, fast network adapters, redundant power
supplies etc.
A File server runs FTP (File Transfer Protocol) in Windows, Linux or Unix
Networks, or SMBP (Server Message Block Protocol) in Windows Networks. Well
known FTP software products are Micrsoft IIS, FileZilla Server, vsftpd, Apache
FTP Server etc.
The main advantage of keeping network user files and electronic documents
centrally in a file server is that the network user files and documents can be
managed (backed up) easily. Think about managing network user files and
8
electronic documents kept distributed inside user workstations in a network
consists of thousands of computers! Nearly impossible.
• Print Server: Print Server, which redirects print jobs from client computers to
specific printers.
• Mail Server: Mail Servers are used to transmit emails using email protocols. Most
widely used email transmission protocol is SMTP (Simple Mail Transfer Protocol).
Mail Servers exchange emails between different domains.
Most widely used Mail Server software products are Microsoft Exchange
Server, SENDMAIL (now proofpoint), Postfix, Apache James etc.
• Application Server: Common computer applications or programs which are
required by different network users can be run in a central server, which enables
multiple network users to access common network applications from the network.
Typically, Application Servers run business logic. Means that, every business is
different and the Application Server is the Server Software which controls the
business process.
Some examples for Application Server Software are SAP ERP, Microsoft
Dynamics, Oracle ERP Cloud, Ramco ERP, infor ERP etc.
• Database Server: Database Server allows authorized network clients to create,
view, modify and/or delete an organization's data, stored in a common database.
Examples of Database Management Systems are Oracle Database
Products, Microsoft SQL Server 2019, PostgreSQL, IBM DB2 Database
Server, MySQL Database Server, Informix, MongoDB, MariaDB Server etc.
• Directory Servers: Directory Servers allows the central administration and
management of network users and network resources. Directory Servers provide
the basic functions of network security, Authentication, Authorization and
Accounting.

You might also like