computer network(150703) - wordpress.com introduction of network communication devices. 12 / /14 4...
TRANSCRIPT
VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY Gandhinagar
Department of Computer Enggineering
Computer Network(150703)
Name :
Enroll no.
:
Class
: 5th SEM C.E.
Year
: 2014-15
VENUS INTERNATIONAL COLLEGE OF TECHNOLOGY
Gandhinagar
CERTIFICATE
This is certify that
Mr./Ms. ________________________________ Roll No. ___________________ of B.E Third Year 5th Sem C.E. has satisfactory completed the course in Computer Network.
_______________________ ____________________ Signature of Faculty Signature of HOD
DATE OF SUBMISSION : 13 / 11 / 2014
Index
Sr. No. Description Page No.
Date Sign
1 Study of Network topology and IP addressing. 1 / /14
2
Study of different types of Network cables and
practically implement the cross-wired cable and
straight through cable using clamping tool. 8 / /14
3 Introduction of Network communication devices. 12 / /14 4 Configuration of Netmeeting Service. 16 / /14 5 Implementation of Star topology. 23 / /14 6 How to configure RDP, FTP, IIS and Telnet protocol. 26 / /14 7 Configuration between server and Client Relationship. 52 / /14 8 Study of Network Monitoring. 54 / /14 9 Study of basic networking commands. 56 / /14
10 Installation and configuration of DHCP server. 58 / /14 11 Installation and configuration of DNS. 74 / /14
Computer Network VICT CE 2014-15 1
Practical – 1
AIM : Study of Network topology and IP addressing.
DESCRIPTION:
A network topology refers to the physical arrangements, or the network‟s layout in which
all the devices are interconnected to communicate on the network. It defines manner in which cables are
arranged.
The network topology is classified into two main categories.
i. Physical Topology
ii. Logical Topology
Physical topology of a network refers to the configuration of cables, computers, and other peripherals.
Logical topologies are bound to the network protocol which directs the data transfer across a network.
Different types of topology used are:
MESH TOPOLOGY:
Mesh topology is a type of wireless network setup where each of the system and network
devices are interconnected with one another in a network for the data transmission.
Computer Network VICT CE 2014-15 2
Advantages of Mesh topology Disadvantages of Mesh topology
1) Data can be transmitted from different devices
simultaneously. This topology can withstand high
traffic.
1) There are high chances of redundancy in many
of the network connections.
2) Even if one of the components fails there is
always an alternative present. So data transfer
doesn‟t get affected.
2) Overall cost of this network is way too high as
compared to other network topologies.
3) Expansion and modification in topology can be
done without disrupting other nodes.
3) Set-up and maintenance of this topology is
very difficult. Even administration of the network
is tough.
STAR TOPOLOGY:
Star topology is one of the most common network setup where each system on a network
is connected to a central hub. The star topology uses an individual connection for each system to
prevent the network failure. Data is transmitted from the main system through the hub to all the
systems on the network.
Computer Network VICT CE 2014-15 3
Advantages of Star topology Disadvantages of Star topology
Easy to implement and extend even in large networks. It has limited cable length and number of stations.
Well suited for temporary networks. Maintenance costs may be higher in the long run.
The failure of a non-central node will not have major
effects on the functionality of the network.
Failure of the central node can disable the entire
network.
Security can be implemented in the hub/switch. Network failure is due to breakdown of hub.
BUS TOPOLOGY:
Bus topology is the cheapest, simplest and the most common method of networking systems where
multiple computers and network devices are connected in a single line using single cable.
Advantages of Bus topology Disadvantages of Bus topology
East to implement and extend. Difficult to administer or troubleshoot.
Well suited for temporary networks Limited cable length and number of stations
Cheapest topology to implement Maintenance costs may be higher in the long run
Failure of one station does not affect others Failure of one cable can disable the entire network.
Small networks do not require high speeds. Large networks fail to pass signals with low speed
Computer Network VICT CE 2014-15 4
RING TOPOLOGY:
In ring topology, all the systems are connected to one another forming a large circle in a closed loop, so
that each system is connected directly to other systems, one on either side of it. The data sent in the form
of packets around the ring until it reaches the final destination.
Advantages of Ring topology Disadvantages of Ring topology
Data travels I one direction at high speeds of
transmission of data.
Numerous connections to the other systems slow
down the network activity
When using a co axial cable to create a ring
network the service becomes much faster.
If one node fails, the rest of the network could also
fail.
Computer Network VICT CE 2014-15 5
IP ADDRESS
• An IP address is a unique global address for a network interface
• An IP address:
- is a 32 bit long identifier
- encodes a network number (network prefix) and a host number .
IPv4 subnetting :
In the early stages of development of the Internet Protocol network administrators
interpreted an IP address in two parts: network number portion and host number portion. The
highest order octet (most significant eight bits) in an address was designated as the network
number and the remaining bits were called the rest field or host identifier and were used for host
numbering within a network.
This early method soon proved inadequate as additional networks developed that were
independent of the existing networks already designated by a network number. In 1981, the
Internet addressing specification was revised with the introduction of classful network
architecture.
Classful network design allowed for a larger number of individual network assignments
and fine-grained subnet work design. The first three bits of the most significant octet of an IP
address were defined as the class of the address. Three classes (A, B, and C) were defined for
universal unicast addressing. Depending on the class derived, the network identification was
based on octet boundary segments of the entire address. Each class used successively additional
octets in the network identifier, thus reducing the possible number of hosts in the higher order
classes (B and C). The following table gives an overview of this now obsolete system.
Computer Network VICT CE 2014-15 6
Historical classful network architecture
Class Leading
bits
Size of
network
number bit
field
Size of
rest
bit
field
Number
of networks
Addresses
per network
Start
address End address
A 0 8 24 128 (27) 16,777,216 (2
24) 0.0.0.0 127.255.255.255
B 10 16 16 16,384 (214
) 65,536 (216
) 128.0.0.0 191.255.255.255
C 110 24 8 2,097,152 (221
) 256 (28) 192.0.0.0 223.255.255.255
IPv4 private addresses :
Early network design, when global end-to-end connectivity was envisioned for
communications with all Internet hosts, intended that IP addresses be uniquely assigned to a
particular computer or device. However, it was found that this was not always necessary as
private networks developed and public address space needed to be conserved.
Computers not connected to the Internet, such as factory machines that communicate
only with each other via TCP/IP, need not have globally unique IP addresses. Three ranges of
IPv4 addresses for private networks were reserved in RFC 1918. These addresses are not routed
on the Internet and thus their use need not be coordinated with an IP address registry.
Today, when needed, such private networks typically connect to the Internet through
network address translation (NAT).
IANA-reserved private IPv4 network ranges
Start End No. of addresses
24-bit block (/8 prefix, 1 × A) 10.0.0.0 10.255.255.255 16777216
20-bit block (/12 prefix, 16 × B) 172.16.0.0 172.31.255.255 1048576
16-bit block (/16 prefix, 256 × C) 192.168.0.0 192.168.255.255 65536
Any user may use any of the reserved blocks. Typically, a network administrator will
divide a block into subnets; for example, many home routers automatically use a default address
range of 192.168.0.0 through 192.168.0.255 (192.168.0.0/24 block).
IPv6 addresses:
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted
the Internet Engineering Task Force (IETF) to explore new technologies to expand the
addressing capability in the Internet. The permanent solution was deemed to be a redesign of the
Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on
the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995.
Computer Network VICT CE 2014-15 7
The address size was increased from 32 to 128 bits or 16 octets. This, even with a
generous assignment of network blocks, is deemed sufficient for the foreseeable future.
Mathematically, the new address space provides the potential for a maximum of 2128
, or about
3.403×1038
addresses.
The primary intent of the new design is not to provide just a sufficient quantity of
addresses, but rather to allow an efficient aggregation of subnetwork routing prefixes at routing
nodes. As a result, routing table sizes are smaller, and the smallest possible individual allocation
is a subnet for 264
hosts, which is the square of the size of the entire IPv4 Internet. At these
levels, actual address utilization rates will be small on any IPv6 network segment.
The new design also provides the opportunity to separate the addressing infrastructure of
a network segment that is the local administration of the segment's available space, from the
addressing prefix used to route external traffic for a network. IPv6 has facilities that
automatically change the routing prefix of entire networks, should the global connectivity or the
routing policy change, without requiring internal redesign or manual renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific
purposes and, where appropriate, to be aggregated for efficient routing. With a large address
space, there is no need to have complex address conservation methods as used in CIDR.
Many modern desktop and enterprise server operating systems include native support for
the IPv6 protocol, but it is not yet widely deployed in other devices, such as home networking
routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.
Computer Network VICT CE 2014-15 8
Practical – 2
AIM : Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool.
DESCRIPTION:
A cable is a device which contains a number of signal conductors usually in the form of separate
wires. It is the medium through which information usually moves from one system to another through the
network. There are several types of cable which are commonly used with the local area network.
Twisted Pair :
Twisted pair cable is the most common type of network medium used in LANs. A
transmission media consists of color coded pairs of two shielded or unshielded insulated copper
wires which are arranged in a spiral pattern. The spiral pattern is an important aspect of twisted-
pair cables in order to minimize crosstalk or interference between adjoining wires. The advantage
of using twisted pair cables are:
It is lighter, thinner and more flexible.
Easy to install
It is inexpensive
There are two varieties of twisted pair cabling, they are:
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP):
Unshielded twisted pair (UTP) cabling consists of two unshielded wires twisted around each
other that contain no shielding. It is commonly used in the telephone wires and is common for computer
networking because of high flexibility of the cables. It is a plastic connector that looks like a large
telephone-style connector. The standard connector for unshielded twisted pair cabling is RJ-45 connector
Computer Network VICT CE 2014-15 9
Shielded Twisted Pair(STP):
Shielded Twisted-Pair cabling is usually used in several network types. STP cable usually
contains four pairs of twisted copper wires. It is different from UTP in that the twisted pairs are in
a shield with electrically grounded woven copper mesh separating them from the cable‟s outer
sheath. It is suitable for environments with electrical interference. The essence of the shielding is
to provide resistance to external Electromagnetic Interference (EMI) and to prevent crosstalk.
Fiber Optic Cable:
Fiber optic cable is the standard cable for connecting networks between buildings due to
its resistance to the effect of moisture and lightening. This technology is popular for LAN but it is
expensive and fragile too. The fiber optic cable is designed to carry laser light to a long distance
at a high speed rather than transmitting electronic signals. It carries the digital data signals in the
form of modulated pulses of light. This is relatively safe way to send the data because electrical
impulses are not carried over the fiber optic cable.
Computer Network VICT CE 2014-15 10
Advantages of using fiber optic cables are:
Greater bandwidth
Less susceptible to interference
Thinner and light in weight
Data transmission can be done digitally.
CRIMPER:
A crimper is a jawed device that looks like a pair of pliers. It has a set of dies in it that
enables you to squeeze the two halves of an RJ-45 connector together with the wires inside. The
wire is striped off a cable and is out in the bottom half of the connector at both the ends. The
other half of the connector on the top of the wires squeezes the handles of the crimper to lock the
two halves together. Crimping has two types of cables, they are:
Straight-through Cable
Cross over Cable
Straight-through Cable:
Straight-through cable is a Cat 5 cable which has similar wiring at both the ends. It is a
standard network cables that connects a computer to a network device like network hub, network
switch, and network routers. A straight-through cable has each internal twisted pair of wires
connected to the same pin number at each end. The twisted-pair wires must be twisted throughout
the entire length of the cable. If the colors in both ends are in the same order, it is a straight-
through cable. The straight-through cable is used to connect:
Host to switch or hub
Router to switch or hub
Computer Network VICT CE 2014-15 11
Cross over cable:
It is also a Cat 5 networking cable, which is generally used to connect two computers or
network devices directly to one another without using a network hub, network, router or network
switch. The crossover cable can be used to connect:
Switch to switch
Hub to hub
Host to host
Hub to switch
Router direct to host
Computer Network VICT CE 2014-15 12
Practical – 3
AIM: Introduction of Network communication devices.
DESCRIPTION:
The basic of networks require devices to provide connectivity and functionality. Understanding
how these networking devices operate and identifying the functions they perform are essential for users.
Hubs:
Hubs are generally called as multiport repeaters. Hubs allow multiple devices to be
attached simultaneously. The main function of hub is to provide the connection for transmit pins
to the receive pins between the two computers. The hubs with greater data processing capabilities
provide a service called store and forward.
Hubs are of many types with different features/specification, which provide the type of
functionality required to build a network. The three major types of hubs are:
Active hubs
– Active hubs usually have eight to twelve ports to connect to the network
computers.
Passive Hubs
– Passive hubs act as a connection point and do not amplify or regenerate
the signal; the signal passes through the hub. A passive hub simply
receives the signal on the input port and broadcasts it on the output port
without even repairing it.
Intelligent hubs
– Intelligent hubs are also called as smart hubs which are of particular
importance to large organization. An intelligent hub is typically a
stackable and includes remote management capabilities It also provide
feature, which help in improving the performance of network.
Computer Network VICT CE 2014-15 13
Switch:
A switch is a device that looks much like a hub and is considerably more expensive than
hub. Switches provide more advantage than hubs which has a common connectivity and also
helps in exchanging the network resources easily. Switches allow different nodes of a network to
communicate directly with one another in a smooth and efficient manner. Switches on receiving
the data packets transfers only to the intended recipients preventing the wastage of the network
bandwidth and optimizing efficiency.
Asynchronous Transfer Mode (ATM) Switch:
ATM is a high performance, cell oriented technology that utilizes fixed-length
information unit known as „Cell‟ for high speed transmission, and support voice, video and
data applications. ATM allows customers to replace their separate voice and data networks
with a single network to handle, data and other multimedia content such as video.
LAN Switches:
Switches that provide a separate connection for each node in a company‟s internal
network are known as LAN switches. Essentially, a LAN switch creates a series of instant
networks that contain only two devices communicating with each other at that particular
moment. LAN switches are designed to switch data frames at high speed.
WAN Switches:
A WAN switch is a multiport internetworking device used in carrier networks. Typically
these devices switch traffic such as Frame Relay, X.25 and operate at the data link layer of
the OSI Reference Model.
Computer Network VICT CE 2014-15 14
Figure below shows two routers at remote ends of a WAN that are connected by WAN switch
Bridges:
A bridge is a physical unit with two ports which connects the network segments together
and filters the amount of traffic on each network. Bridges can only be connected to similar
network segments because they require the physical address of the device to send the data frames
(frames are bundles of data packets that contain the physical address of the sender). The physical
address is the function of the data link layer that uses various protocols. There are several types of
bridges classified into categories to best suit the networking requirements.
Types of bridges
Transparent bridge
Translational bridge
Source-route bridge
Computer Network VICT CE 2014-15 15
Routers
A router is a device that connects two network interfaces together, forming an Internetwork
which operates at the network layer of the OSI reference model.
Routers send the data packets through the network to their final destination. It will pass the
information only if the network address is known. This ability to control the data passing through the
router reduces the amount of traffic between networks. A major function of a router is that it localizes the
network broadcasts sent to every device on the network. It also filters the broadcast traffic to reduce the
network failure between the connected devices. The main functions of the routers are:
Segment large number of data into smaller segments
Acts as a safety barrier between segments
Gateway
Gateways are task-specific that performs protocol conversion between different types of networks
or applications. The main feature of gateway is that it performs the function of translating the data from
one format to the other. It acts as server on the network. Gateways usually perform the task very slow and
are expensive. The data is processed by decapsulating the incoming data and encapsulating the outgoing
data through the networks protocol stack and for the other network to allow transmission respectively.
Network Interface Card (NIC)
Network Interface Card is the device, which enables a workstation to connect to the
network and communicate with other computers.
A network adapter is also called a network interface card or NIC.
An adapter is a physical device which allows one piece of hardware to be adapted to
another type of hardware..
The main function of NIC is to allow a computer to connect to a LAN and transmit data
at the speed of the type of network, which is usually greater than 4 Mbps and can attain 1
Gbps (Gigabit Ethernet network).
Computer Network VICT CE 2014-15 16
Practical – 4
AIM: Configuration of Netmeeting Service.
DESCRIPTION:
Microsoft NetMeeting is a nice inbuilt feature of XP. It‟s allowing you to share files and
desktop. You could also use it for chat, video conferencing. You have to configure Net Meeting
before you could use it.
To configure NetMeeting:
Click Start and select Run: In Run box, type conf.exe and click OK In the NetMeeting window, click Next Fill in your name, email address, and location info, then click Next Click off "Log on to directory server when NetMeeting starts", then click Next Select the network connection you are using, then click Next (On campus, select Local Area
Network) Select "Put a shortcut to NetMeeting on my desktop", and click Next. In Audio Tuning Wizard window, click Next. In Audio Tuning Wizard window, adjust the speaker or headphone volume and click Next. When finished adjusting settings, click Finish.
NetMeeting setup is now complete. An icon will be displayed on the desktop. (During startup, if
Windows XP Firewall attempts to block NetMeeting, click Unblock.
The NetMeeting main window
Computer Network VICT CE 2014-15 17
Finding Your IP Address
Connections in NetMeeting are done through IP addresses. You need to know your IP Address.
To find out your IP Address:
Click on Start button, select Run Type command and click OK In the window that appears, type ipconfig and press the Enter key Your IP Address will be displayed in the window (eg. 192.168.1.5) (Write down your IP Address) To close the window, type Exit and press the Enter key.
Alternatively, in the NetMeeting main window, click Help, then select "About Windows
NetMeeting". Your IP Address will be displayed in the window.
Starting NetMeeting
You can connect individually or to a group.
To start NetMeeting:
Click the NetMeeting shortcut icon on your desktop
The NetMeeting main window will appear.
Placing a Call
Click the Place Call button. Enter the IP Address of the remote computer.
Computer Network VICT CE 2014-15 18
Receiving a call
When another person is calling you NetMeeting will display the following screen:
Click Accept to begin the call.
Hosting and Joining Meetings
To host a meeting:
In the Call menu, select Host Meeting. In Meeting Name, type the meeting name or leave it set to Personal Conference. To monitor who joins the meeting, click the "Only you can accept incoming calls" check box. To restrict participants from inviting other people, click the "Only you can place outgoing calls"
check box. and Click OK
Using Chat
With chat you can communicate with an individual or a group by text messaging. These
conversations can be saved as a rich text file for later reference. Options such as "Whisper" mode
allow private messages between the host and an individual during a group session. To open a
chat session:
Computer Network VICT CE 2014-15 19
Click the Chat button.
Using Whiteboard
With Whiteboard you can review, create and update graphic information. This option allows you
to load saved Whiteboard pages into a conference by dragging and dropping the saved pages into
the Whiteboard window. To open Whiteboard:
Click the Whiteboard button.
Computer Network VICT CE 2014-15 20
Sharing Programs
Shared Programs allows meeting participants to view and work on files together even if they do
not have the program. Only one participant at a time can be in control of the shared program.
To share a program:
Click the Share Program button. Select the program you wish to share. Choose who you want to share the program with. Click Share.
You can also share your computer desktop in order to share your entire computer with
participants. To stop sharing, click Unshare in the Sharing dialog box.
Computer Network VICT CE 2014-15 21
Remote Desktop Sharing
Remote Desktop Sharing allows you to access a computer from another computer at another
location. To use Remote Desktop Sharing, you activate it and then close NetMeeting.
To set up Remote Desktop Sharing:
Under Tools on the menu bar, select Remote Desktop Sharing. In the Remote Desktop Sharing Wizard, click Next. In the Remote Desktop Sharing Wizard, click Yes, enable password-protected screen saver. Click Finish.
To activate Remote Desktop Sharing on the computer:
Note the computer's IP Address . Under Call on the menu bar, select Exit.
To connect to the computer from a second location:
Click the Call button in NetMeeting. In "To", type in the computer's IP Address. Type in your password.
The remote desktop will appear on the second computer.
To end Remote Desktop Sharing:
On the computer being accessed, click Start. Select either Log Off or Turn Off.
Transferring Files
Files can also be transferred in the background while a NetMeeting conference is going on or can
be sent either to an individual or a group.
To transfer a file:
Click the Transfer Files button. Click the Add File button. Select the desired files. Choose the people you wish to send the file to (if you wish to send the file to everyone in the
meeting, click All). Click Send All button to transfer the files.
Computer Network VICT CE 2014-15 22
Configuring Settings
To configure NetMeeting's video and audio options:
* Under the Tools menu, select Options.
The Options dialog box will appear.
For video settings:
* Select the Video Tab
To configure audio options:
* Select the Audio tab
Getting help
For help using Windows NetMeeting, select Help Topics under Help on the menu bar.
Computer Network VICT CE 2014-15 23
Practical – 5
AIM: Implementation of Star topology.
DESCRIPTION:
Star networks are one of the most common computer network topologies. In its simplest
form, a star network consists of one central switch, hub or computer, which acts as a conduit to
transmit messages. This consists of a central node, to which all other nodes are connected; this
central node provides a common connection point for all nodes through a hub. In star topology,
every node (computer workstation or any other peripheral) is connected to a central node called a
hub or switch. The switch is the server and the peripherals are the clients. Thus, the hub and leaf
nodes, and the transmission lines between them, form a graph with the topology of a star. If the
central node is passive, the originating node must be able to tolerate the reception of an echo of
its own transmission, delayed by the two-way transmission time (i.e. to and from the central
node) plus any delay generated in the central node. An active star network has an active central
node that usually has the means to prevent echo-related problems.
The star topology reduces the damage caused by line failure by connecting all of the systems to a
central node. When applied to a bus-based network, this central hub rebroadcasts all
transmissions received from any peripheral node to all peripheral nodes on the network,
sometimes including the originating node. All peripheral nodes may thus communicate with all
others by transmitting to, and receiving from, the central node only. The failure of a transmission
line linking any peripheral node to the central node will result in the isolation of that peripheral
node from all others, but the rest of the systems will be unaffected.
Computer Network VICT CE 2014-15 24
It is also designed with each node (file servers, workstations, and peripherals) connected directly
to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing to its
destination. The hub, switch, or concentrator manages and controls all functions of the network.
It also acts as a repeater for the data flow. This configuration is common with twisted pair cable.
However, it can also be used with coaxial cable or optical fibre cable.
Advantages
Better performance: Star topology prevents the passing of data packets through an excessive number of nodes. At most, 3 devices and 2 links are involved in any communication between any two devices. Although this topology places a huge overhead on the central hub, with adequate capacity, the hub very high utilization by one device without affecting others.
Isolation of devices: Each device is inherently isolated by the link that connects it to the hub. This makes the isolation of individual devices straightforward and amounts to disconnecting each device from the others. This isolation also prevents any non-centralized failure from affecting the network.
Benefits from centralization: As the central hub is the bottleneck, increasing its capacity, or connecting additional devices to it, increases the size of the network very easily. Centralization also allows the inspection of traffic through the network. This facilitates analysis of the traffic and detection of suspicious behavior.
Easy to detect faults and to remove parts. No disruptions to the network when connecting or removing devices. Installation and configuration is easy since every one device only requires a link and one
input/output port to connect it to any other device(s).
Computer Network VICT CE 2014-15 25
Disadvantages
Reliance on central device: star topology relies on the central device (the switch, hub or computer) and if this device fails the whole network will fail in turn.
Higher costs: the need for a central device increases costs compared to the bus and ring topologies. The star topology also requires more cable when using Ethernet cables than ring and bus topologies.
Limited capacity for nodes: as this type of network needs all connections to go through a central device the amount of nodes in a network is limited by this factor whereas bus and ring topologies are not limited in such a way.
Computer Network VICT CE 2014-15 26
Practical – 6
AIM: How to configure RDP, FTP, IIS and Telnet protocol.
DESCRIPTION:
RDP(Remote Desktop):
If you have never used Remote Desktop, it is a really great way to connect to another PC
(office, home, etc.) remotely and get work done that you otherwise could not get done unless you
were physically at the machine. I routinely use remote desktop to connect to servers at our office,
connect to user‟s computers to provide tech support and to connect to my personal computer at
home to access files.
In order to use Remote Desktop, there are a couple of things you need to understand. First
off, remote desktop only works with Windows XP and Windows 2003. What I mean by this is
that you can only connect INTO a Window XP or 2003 machine. You can use a Windows 98,
ME, or 2000 to connect INTO a Windows XP or 2003 machine, but you cannot connect INTO a
98, ME or 2000 machine remotely. If you want to be able to connect to a Windows 2000 or
earlier machine, you‟ll have to buy commercial software.
Since this post is over 7 years old, the above statement is out-dated. You can also connect
into a Windows Vista, Windows 7 or Windows 8 machine. Also, since Microsoft has recently
ended support for Windows XP, this tutorial will becomes less useful as time passes.
Secondly, you need to make sure that you are logged in as a computer administrator on the
machine in order to set it up for remote access. If you brought a computer from a store or got it
straight from the manufacturer, the first user name you create is always an Administrator
account.
An easy way to check whether or not you are an Administrator is to go to Start, Control Panel
and then click on User Accounts. You‟ll see your user name and it should have
“Administrators” or “Computer Administrator” written next to it.
Computer Network VICT CE 2014-15 27
Thirdly, the administrator account on your machine must have a password. If you do not have to
type in a password in order to access Windows when you start up your computer, then you do
not have a password set up and Remote Desktop will not work. Remote desktop does not allow
you to connect to a computer with a user account that does not have a password.
When you go to User Accounts and click on the Administrator account, you will see an option to
create a password for the account. Go ahead and do that before moving on.
Next, if the computer you are connecting to is running Windows XP SP3, then you need to open
the firewall to allow remote desktop connections. To do this, go to Start, Control Panel,
Windows Firewall and click on the Exceptions tab.
Computer Network VICT CE 2014-15 28
Make sure that the Remote Desktop check box is checked. The last thing that needs to be done
in order for Remote Desktop to work correctly is to tell Windows that we want to allow users to
connect remotely. So far we‟ve just fulfilled the requirements, but now we have to actually allow
remote desktop connections to this computer.
Go to Start, Control Panel, and click on System. Click on the Remote tab and make sure that
the “Allows users to connect remotely to this computer” box is checked. Don‟t worry about
clicking the Select Remote Users button because Administrators have access by default. If you
want to give an non-administrator account remote desktop access, then click that button and add
the user.
Computer Network VICT CE 2014-15 29
And that‟s it! Your computer is now setup for remote desktop! First try connecting to the XP
machine from another computer on your home network. In order to connect, go to the other
computer and click on Start, All programs, Accessories, Communications, and Remote Desktop
Connection. If you want to connect to the XP machine from Windows Vista, Windows 7 or
Windows 8, just click on Start and perform a search for remote desktop connection. On
Windows 8, go to the Start Screen and start typing to perform a search.
In the dialog box, you can type in the IP address or the name of the computer. The best way to
connect is to type in the IP address of the computer. In order to get the IP address of the
computer you want to connect to, go to the computer and click on Start, Run and type in CMD.
Computer Network VICT CE 2014-15 30
In the black command window, type in the word “ipconfig” without the quotes as shown below
and press Enter.
You‟ll see your IP address listed along with some other info, but you don‟t need to worry about
that. Write down that IP address (192.x.x.x or something similar) and type that number exactly
into the remote desktop text box on the other computer (the computer you are connecting from).
Click Connect and you should get a login screen pop up, which means you have successfully
connected to the other computer. You can now enter the Computer Administrator user name and
password.
If you get an error saying that computer cannot accept new connections, etc. that means
something was not configured correctly. Remember you need to give the administrator account a
password, open the port in the firewall, and check the allow remote connections check box in the
System properties. All three items need to be performed on computer you want to connect TO.
Once you are able to connect from within the same network, now you can try to connect from
outside. So if you want to connect to your home computer from the office, you can do that, but
you‟ll have to do a few extra things.
Computer Network VICT CE 2014-15 31
First, you have to get your public IP Address (not the 192.168.x.x number) and you can
do this by going to the computer you want to connect into and navigating to the web site
http://www.whatismyip.com/ and this will give you your public IP address. This is the address
that can be used from anywhere in the world to connect to your specific location and is unique.
Unfortunately, on most home connections, this public IP address changes often and without
notice. Basically to solve that problem, you have to use dynamic DNS.
The second thing you have to do is open the port in your router (unless you‟re connecting
your cable modem directly into your computer) and forward that port to the computer you want
to connect to. Here‟s how you would do this on a Netgear router (as I have that) and the
procedure is pretty much the same for other routers, except that it might be called something
else. Most manufacturers‟ web sites have an article on how to configure their particular router for
port forwarding since it‟s very common.
You‟ll need to log into your router by typing it‟s IP address into the browser address bar.
You can figure out the IP address of your router by going to any computer on your network (that
you want to connect into) and opening the command prompt like we did above and typing
ipconfig again. In addition to the IP Address field, you‟ll also see Default Gateway, this is your
router. From the above screenshot, you can see mine is 192.168.244.2.
Type that address into your browser address bar as follows and press Enter:
You‟ll most likely be prompted for a user name and password. Usually, you can find this in the
documentation or on the under side of the router itself. For my Netgear router, the username as
“admin” (lowercase) and the password was “password”.
Once you‟re in, you should see an option called “Port Forwarding/Port Triggering” or something
very similar. I know Netopia calls these Pinholes and on Linksys it might be called a Service or
Applications.
Computer Network VICT CE 2014-15 32
Once you‟re on the Port Forwarding page, you might see different layouts/options. The basic
parts will be giving the forward a name like “Remote Desktop”, choosing the external port and
the internal port, the protocol and picking the IP address for the device the data is supposed to be
forward to.
For remote desktop, you‟ll always want to choose TCP for Protocol. Be default, remote desktop
uses port 3389, so type that into both the internal and export port boxes. Lastly, the internal IP
address should be the IP address of the XP machine. On some setups, you‟ll be asked for a
starting port, ending port and triggering port. Just put 3389 for any port boxes.
Click Apply and you‟re done! You should now be able to use your public IP address (type this
into the Computer text box in the Remote Desktop Connection dialog) to connect through your
router to your computer!
Computer Network VICT CE 2014-15 33
FTP(File Transfer Protocol):
Steps
1. First, you should start by retrieving your Windows XP CD.
2. Next, click the Start button and go to the Control Panel.
Computer Network VICT CE 2014-15 34
3. After that, select "Add/Remove Windows Components."
4.Select "Internet Information Services" under "Windows Components."
Computer Network VICT CE 2014-15 35
5. Click "details" and select the "File Transfer Protocol (FTP)" service. (Remember that this
will also automatically select "Common Files" and "Internet Information Services Snap-In.")
6. Click OK and follow the instructions for the install Wizard (or you can just push next if
you don't feel like reading). Be prepared with your Windows XP CD, because it might prompt
you for it if you haven't already installed it. Once it is done, you might have to restart your
computer after this.
Computer Network VICT CE 2014-15 36
7. After that, all you need to do is just paste the files you want to be public into
"C:\INETPUB\FTPROOT." Note that by default, these files are read-only and public. Public
meaning that anyone who knows the IP address may download copies from it.
8. There's more to go! Now, you need to configure your router's firewall to let FTP traffic
through. This can be done through your router's administration menu. Note that this will vary
depending on your router.
9. After letting your router firewall let FTP connections in, you will have to configure your
regular firewall to let FTP connections in through a certain port.
10. Finally, after done with everything, you may access your FTP site through your
browser. All you need to do is type ftp://xxx.xxx.xxx.xxx/ in the URL where "xxx.xxx.xxx.xxx"
is the WAN address of your computer.
Computer Network VICT CE 2014-15 37
IIS(Internet Information Services):
Steps
1. Install IIS 5.1. This is a Windows Add-on available in Windows XP Pro or Windows XP
Media Center editions of Windows XP.
Open Control Panel from the Start Menu.
Click on Add or Remove Programs
Computer Network VICT CE 2014-15 38
Click on Add/Remove Windows Components
Select Internet Information Services from the Windows Component Wizard
Computer Network VICT CE 2014-15 39
Select Next. The Wizard may prompt you for your XP Installation Disc.
IIS 5.1 will now be installed
2. Once it has completely installed you will have to open it (this may be tricky because it
doesn't include any shortcuts on the desktop or in the start menu).
First go to the Control Panel again and click "Performance and Maintenance" and then
navigate to "Administrative Tools". (For Service Pack 3, click directly on
"Administrative Tools")
Now you should see "Internet Information Services"; open the program up (You may
create a shortcut on the desktop so it is easier to find).
Computer Network VICT CE 2014-15 40
3. If it opens then congratulations, you have successfully installed it. Now to set it up
properly read on...
4. In the left panel select "Websites".
Computer Network VICT CE 2014-15 41
5. Here you will see if it is running or not, the local IP Address it is configured on, and the
current port it is using (Port 80 is default, however you may need to change this because
most ISPs [Internet Service Provider] block that port).
6. Now right click on "Default Web site" and click properties, then go to the "Web site"
tab. Change the IP Address to what your local IP Address is if it is not already set (to find out
what your local address is click "start", then "run", then type in "cmd", then type in "ipconfig".
Now look at the address beside "IP Address" and that is what it should be in IIS).
Computer Network VICT CE 2014-15 42
7. Now decide what port you want to use (anything above 1024 should be fine). You can
leave it at port 80 but only if your ISP doesn't block it. If you do decide to change the port then
note than whenever you navigate to your website then your syntax must be
"domain.com:portnumber".
8. After you have decided on the port you need to open the port in your router. To do this
type in you gateway in a browser and follow the steps there.
9. Next go to the "Home Directory" tab, and select a local path.
10. Now go to the "Documents" tab. Here you can set a default document to redirect to if no
document is typed into the URL. To add a new document to the list click "Add" and then type in
the name (you do not need the path but the file must be in the home directory that you previously
chose).
Computer Network VICT CE 2014-15 43
11. Next close the properties window and right click on "Default Web Site" again. This time
rollover "New" and then click "Virtual Directory" (you don't have to do this but it is a good
practice). Select a logical name for your virtual directory such as "root" or something similar as
to avoid confusion.
12. Now expand "Default Web Site" and you should see the name of your virtual directory.
Expand the directory and you should see all of the files in there that are in your "Home
Directory". Relax, you are almost done.
Computer Network VICT CE 2014-15 44
13. Once again, right click on "Default Web Site", this time rollover "All Tasks" and click
on "Permissions Wizard"
Click next.
Select "Select new security settings from template".
Computer Network VICT CE 2014-15 45
Click next.
Select "Public Site". Now just keep clicking next until it is finished.
Computer Network VICT CE 2014-15 46
14. Now test to see if your site works.
Open up your favorite browser and type into the Location Bar: http://
localIPaddress:port/virtualdirectory/ or type in : http://
computername:port/virtualdirectory/ (if you did not change the port from port 80 then
type in: http:// computername/virtualdirectory/)
15. To access your site from another location that is not on your network then type: http://
externalIPaddress:port/virtualdirectory/ (once again if you did not change the port from port 80
then type: http:// externalIPaddress/virtualdirectory/)
16.To find out your external IP Address then go to http://whatismyip.com or
http://ipaddressfinder.info
Computer Network VICT CE 2014-15 47
TELNET Protocol: Telnet is a command line tool that is designed for administering remote servers through the Command Prompt. Unlike Windows XP and Vista, Windows 7 does not come with the Telnet client installed automatically. You will need to enable it before you can start using it. See Step 1 below to learn how to do both.
Part 1 of 2: Installing Telnet
1. Open the Control Panel. By default, Telnet is not installed with Windows 7. It will need to be
manually activated in order for you to use it. You can do so through the Control Panel, which can
be accessed from the Start menu.
Computer Network VICT CE 2014-15 48
2. Open "Programs and Features" or "Programs". The option available to you will depend on
whether your Control Panel is in Icon or Category view, but they both take you to the same
place.
3. Click the "Turn Windows features on or off" link. You may be asked for the Administrator
password.
Computer Network VICT CE 2014-15 49
4. Find the "Telnet Client" entry. In the list of available features, you will see an entry labeled
Telnet Client. You may have to scroll down to find it. Check the box next to Telnet Client, and
click OK.
o You may have to wait a minute or two for the client to be installed after selecting it.
5. Install Telnet through the command prompt. If you'd rather do everything through the
Command Prompt, you can install Telnet with a quick command. First, open the Command
Prompt by typing cmd into the Run box. At the command line, type pkgmgr
/iu:"TelnetClient" and press ↵ Enter . After a moment, you will be returned to the
command prompt.[1]
o Restart the command prompt to begin using Telnet.
Computer Network VICT CE 2014-15 50
Part 2 of 2: Using Telnet
1. Open the Command Prompt. Telnet runs through the Command Prompt. You can access the
command prompt by pressing Win and typing cmd into the Run field.
2. Start the Telnet client. Type telnet and press ↵ Enter to start Microsoft Telnet. The
Command Prompt will disappear, and you will be taken to the Telnet command line, displayed
as Microsoft Telnet>.
Computer Network VICT CE 2014-15 51
3. Connect to a Telnet server. At the Telnet command line, type open serveraddress
[port] . You have successfully connected to the server when you receive either a welcome
message or are prompted for your username and password.
o For example, to watch ASCII Star Wars, type open towel.blinkenlights.nl
and press ↵ Enter .
o You can also start a connection directly from the Command Prompt by typing telnet serveraddress [port] .
4. Close your Telnet session.Once you are finished administering your Telnet server, you should
close your connection before closing the window. To do so, open the Telnet command line by
pressing ^ Ctrl + ] . Type quit and press ↵ Enter to close the connection.
Computer Network VICT CE 2014-15 52
Practical – 7
AIM: Configuration between server and Client Relationship.
DESCRIPTION:
Set up the update server and clients for locally-published updates
The following steps must be performed in order to initialize a trust relationship between the
update server and its clients.
To set up the update server for locally-published content
1. Call SetSigningCertificate to install a self-signed certificate. This method has three
overloads. The method SetSigningCertificate creates and installs the certificate, while
SetSigningCertificate and SetSigningCertificate install an existing certificate.
2. Call Save to add this information to the configuration.
3. Export the public key for the certificate into a .cer file: o Click Start, then Run, and type mmc.
o In the MMC console, click File, click Add/Remove Snap-in, and then select Add.
o Add the Certificates snap-in, and set it to manage certificates for the local computer account.
o Navigate to the WSUS node in the snap-in, and then find the certificate you added in step 1.
o Right-click the certificate and select All Tasks, then Export. For security reasons, you should export only the public key, not the private key.
4. Configure your WSUS server to trust this certificate by installing the public key for this
certificate in your trusted publisher store. o In the Certificates snap-in, select Trusted Root Certification Authorities, then right-click
Certificates, select All Tasks, then Import, and import the certificate you just exported.
o Select Trusted Publishers, then right-click Certificates, select All Tasks, then Import, and import the certificate.
Computer Network VICT CE 2014-15 53
To set up update clients to trust locally-published content
1. You can configure a WSUS client to use signed content using the Group Policy Object
Editor. There are two Group Policy settings you need to create.
2. To configure a WSUS client policy for clients to trust content signed by a trusted-
publisher using the local Group Policy Object Editor, complete the following steps. o Click Start, then Run, then type gpedit.msc.
o Select Computer Configuration, then Administrative Templates, then Windows Update.
o Enable Allow signed content from intranet Microsoft Update service location.
o To verify that the policy has been set, In the registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate, and verify that AcceptTrustedPublisherCerts is set to 1.
3. To configure a WSUS client policy to trust the specific signing certificate you installed
on the server, click Add/Remove Snap-in, and then select Add.
4. Add the Certificates snap-in, and set it to manage certificates for the local computer
account.
5. In the Certificates snap-in, select Trusted Root Certification Authorities, then right-
click Certificates, select All Tasks, then Import, and import the certificate.
6. Select Trusted Publishers, then right-click Certificates, select All Tasks, then Import,
and import the certificate.
Computer Network VICT CE 2014-15 54
Practical – 8 AIM: Study of Network Monitoring.
DESCRIPTION:
Network monitoring is the use of a system that constantly monitors a
computer network for slow or failing components and that notifies the network
administrator (via email, SMS or other alarms) in case of outages. It is part of network
management.
While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices.
For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page. For email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3.
Commonly measured metrics are response time, availability and uptime, although both consistency and reliability metrics are starting to gain popularity. The widespread addition of WAN optimization devices is having an adverse effect on most network monitoring tools -- especially when it comes to measuring accurate end-to-end response time because they limit round trip visibility.
Status request failures - such as when a connection cannot be established, it times-out, or the document or message cannot be retrieved - usually produce an action from the monitoring system. These actions vary -- an alarm may be sent (via SMS, email, etc.) to the resident sysadmin, automatic failover systems may be activated to remove the troubled server from duty until it can be repaired, etc.
Network tomography
Network tomography is an important area of network measurement, which deals with
monitoring the health of various links in a network using end-to-end probes sent by agents located at
vantage points in the network/Internet.
Route analytics
Route analytics is another important area of network measurement. It includes the
methods, systems, algorithms and tools to monitor the routing posture of networks. Incorrect routing or
routing issues cause undesirable performance degradation or downtime.
Computer Network VICT CE 2014-15 55
Various types of protocols
Website monitoring service can check HTTP pages, HTTPS, SNMP, FTP, SMTP, POP3, IMAP,
DNS, SSH, TELNET, SSL, TCP, ICMP, SIP, UDP, Media Streaming and a range of other ports with a variety
of check intervals ranging from every four hours to every one minute. Typically, most network
monitoring services test your server anywhere between once-per-hour to once-per-minute.
Internet server monitoring
Monitoring an internet server means that the server owner always knows if one or all of
his services go down. Server monitoring may be internal, i.e. web server software checks its
status and notifies the owner if some services go down, and external, i.e. some web server
monitoring companies check the services status with a certain frequency. Server monitoring can
encompass a check of system metrics, such as CPU usage, memory usage, network performance
and disk space. It can also include application monitoring, such as checking the processes of
programs such as Apache, MySQL, Nginx, Postgres and others.
External monitoring is more reliable, as it keeps on working when the server completely
goes down. Good server monitoring tools also have performance benchmarking, alerting
capabilities and the ability to link certain thresholds with automated server jobs such as
provisioning more memory or performing a backup.
Servers around the globe
Network monitoring services usually have a number of servers around the globe - for
example in America, Europe, Asia, Australia and other locations. By having multiple servers in
different geographic locations, a monitoring service can determine if a Web server is available
across different networks worldwide. The more the locations used, the more complete is the
picture on network availability.
Web server monitoring process
When monitoring a web server for potential problems, an external web monitoring
service checks a number of parameters. First of all, it monitors for a proper HTTP return code. By
HTTP specifications RFC 2616, any web server returns several HTTP codes. Analysis of the
HTTP codes is the fastest way to determine the current status of the monitored web server. Third-
party application performance monitoring tools provide additional web server monitoring,
alerting and reporting capabilities.
Computer Network VICT CE 2014-15 56
Practical – 9 AIM: Study of basic networking commands.
DESCRIPTION:
These are most useful commands in my list while working on Linux server , this enables you to quickly troubleshoot connection issues e.g. whether other system is connected or not , whether other host is responding or not and while working for FIX connectivity for advanced trading system this tools saves quite a lot of time .
finding host/domain name and IP address - hostname
test network connection – ping
getting network configuration – ifconfig
Network connections, routing tables, interface statistics – netstat
query DNS lookup name – nslookup
communicate with other hostname – telnet
outing steps that packets take to get to network host – traceroute
view user information – finger
checking status of destination host - telnet
Hostname hostname with no options displays the machines host name hostname –d displays the domain name the machine belongs to hostname –f displays the fully qualified host and domain name hostname –i displays the IP address for the current machine
ping It sends packets of information to the user-defined source. If the packets are received, the destination device sends packets back. Ping can be used for two purposes 1. To ensure that a network connection can be established. 2. Timing information as to the speed of the connection. If you do ping www.yahoo.com it will display its IP address. Use ctrl+C to stop the test.
ifconfig View network configuration, it displays the current network adapter configuration. It is handy to determine if you are getting transmit (TX) or receive (RX) errors.
netstat Most useful and very versatile for finding connection to and from the host. You can find out all the multicast groups (network) subscribed by this host by issuing "netstat -g"
Computer Network VICT CE 2014-15 57
netstat -nap | grep port will display process id of application which is using that port netstat -a or netstat –all will display all connections including TCP and UDP netstat --tcp or netstat –t will display only TCP connection netstat --udp or netstat –u will display only UDP connection netstat -g will display all multicast network subscribed by this host.
nslookup If you know the IP address it will display hostname. To find all the IP addresses for a given domain name, the command nslookup is used. You must have a connection to the internet for this utility to be useful. E.g. nslookup blogger.com
traceroute A handy utility to view the number of hops and response time to get to a remote system or web site is traceroute. Again you need an internet connection to make use of this tool.
finger View user information, displays a user’s login name, real name, terminal name and write status. this is pretty old unix command and rarely used now days.
telnet Connects destination host via telnet protocol, if telnet connection establish on any port means connectivity between two hosts is working fine. telnet hostname port will telnet hostname with the port specified. Normally it is used to see whether host is alive and network connection is fine or not.
Computer Network VICT CE 2014-15 58
Practical – 10 AIM: Installation and configuration of DHCP server.
DESCRIPTION:
Setup: Installing the DHCP role
- Start the Server Manager
- Click Add Roles and Features from the Manage Menu
Computer Network VICT CE 2014-15 59
-On Add Roles and Features wizard begins and click Next
- Select the Role-based or feature-based installation option and click Next
Computer Network VICT CE 2014-15 60
- If you have more than one server managed via the server manager console, then select the
desired server you‟d like to install DHCP on
- From the Roles lists, check the DHCP Server role, click Add Features on the popup windows
Computer Network VICT CE 2014-15 61
- Click Next
- Select additional features you desire or leave as default and click Next
Computer Network VICT CE 2014-15 62
- Keep in mind „Things to note‟ and click Next
- Confirm information on summary page and click Install
Computer Network VICT CE 2014-15 63
- After install is completed, click Close
Post Deployment
- Click on the warning icon and then click on „Complete DHCP Configuration‟
Computer Network VICT CE 2014-15 64
- On DHCP Post-Install wizard, click Next
- On Authorization, select a domain user account that has permissions to create objects in the Net
Services container in Active directory (For security lock-down) or simply use a domain admin
account and click Next
Computer Network VICT CE 2014-15 65
- Confirm on summary page that the security groups had been created and Authorizing DHCP
server role done. Close the screen
For the security groups to come into effect, we need to restart the DHCP Server service
- Click on Tools on Server Manager menu and click on Services
Computer Network VICT CE 2014-15 66
- Locate „DHCP Server‟ service, click on the Restart Service icon to restart the service
- Click on DHCP from Tools Menu on Server Manager screen
Computer Network VICT CE 2014-15 67
- In the the DHCP mmc console, right-click on the DHCP Server and than click on
“Add/Remove Bindings…“
- Ensure the static IP address of the server should appear here.
Note: If you have more than one static IP, the DHCP server will bind to the first static IP
address configured on the adapter
Computer Network VICT CE 2014-15 68
- Back to the DHCP mmc console, right-click on IPv4, and select New Scope
- Click Next on the welcome screen
Computer Network VICT CE 2014-15 69
- Enter the new Scope Name details
- Enter the Start and End IP address, the Subnet mask, leave the Length as default ‟24‟ and click
Next
Computer Network VICT CE 2014-15 70
- Enter your IP range in the exclusion list. You only need to do this if you have devices on the
network that require static IP address and also ensure that the excluded range falls with the Start
and End range earlier specified
- Enter desired lease duration for assigned IP‟s or leave as default
Computer Network VICT CE 2014-15 71
- Select Yes to configure the DHCP options for the new scope
- Enter the default gateway if any (Required in Live environment)
Computer Network VICT CE 2014-15 72
- The default Parent domain should be populated by default if the DHCP role is installed on a
domain-joined machine but not the case if installed on a workgroup machine. Add any other
DNS IP and click Next
- Specify your WINS Server if any
Computer Network VICT CE 2014-15 73
- Select Yes to activate the scope immediately or No if you choose to activate later
- On completion, click Finish
Computer Network VICT CE 2014-15 74
Practical – 11 AIM: Installation and configuration of DNS.
DESCRIPTION:
PART 1 - DNS SERVER INSTALLATION
To install a DNS server from the Control Panel, follow these steps:
From the Start menu, select Administrative Tools --> Server Manager.
Computer Network VICT CE 2014-15 75
Expand and click Roles from the left window. Choose Add Roles
Follow the wizard by selecting the DNS Server role (leave any previously checked items checked)
Computer Network VICT CE 2014-15 76
Click NEXT and then INSTALL to install DNS in Windows Server 2008
Computer Network VICT CE 2014-15 77
PART 2 - DNS SERVER CONFIGURATION
From the Start menu, select Administrative Tools --> DNS to open the DNS console.
Computer Network VICT CE 2014-15 78
Highlight your computer name and choose Configure a DNS Server to launch the Configure DNS Server Wizard.
Click NEXT and then select the first option, Create a Forward lookup zone
Computer Network VICT CE 2014-15 79
On the next screen, leave the default option selected, This Server maintains the zone, and click NEXT
Now you will need to enter the domain name that you want to create your first zone file for. We are using "example.com" in this tutorial:
Click NEXT, and NEXT again on the next two screens
Computer Network VICT CE 2014-15 80
On the Forwarders screen, select the option "No, it should not forward queries"
Click FINISH
Computer Network VICT CE 2014-15 81
PART 3 - MANAGING DNS RECORDS
There are many types of DNS records, this is a basic tutorial and will show you how to point your domain name to the IP address you assigned to your web site via an A record. You can also create other types of DNS records (MX, CNAME,etc) in a similar fashion.
In DNS Manager, expand your server name, then expand the 'Forward Lookup Zones' , right-click on your domain name and select Properties
Computer Network VICT CE 2014-15 82
Click on the Start of Authority (SOA) tab.
The SOA resource record is always the first record in a DNS zone. Set the Primary Server to your primary nameserver:
Next, click on the Name Servers tab.
Remove anything currently listed, and click Add and enter your nameservers (i.e. - ns1.yourdomain.com , ns2.yourdomain.com)
Computer Network VICT CE 2014-15 83
When done, click OK to close the window. You are now ready to set up your zone records.
Right-click on your domain name under Forward Lookup Zones, and select New Host (A or AAAA)...
Computer Network VICT CE 2014-15 84
Leave the Name field blank, and under IP Address, enter the IP address you configured for this web site in IIS, and click Add Host.
You will most likely also want to make a record for 'www', so repeat the above step but this time instead of leaving the Name field blank, enter www in that field:
Computer Network VICT CE 2014-15 85
PART 4 - DISABLE DNS RECURSION
The final step you'll want to perform is to disable DNS recursion. This will help secure your
server from a variety of DNS recursion attacks.
To disable recursion, right-click on your DNS server and go to 'Properties'.
Click the 'Advanced' tab.
Then check the box labeled "Disable recursion"
Congratulations! You have now set up DNS in Windows Server 2008 and have set up DNS records for your domain name.