Network Management and
Administration
  Unit 3 - Troubleshooting of Networking
SYLLABUS
3.1 Designing network
    3.1.1 Accessing network needs- applications, users, network services, security and
    safety, growth and capacity planning
    3.1.2 Meeting network needs
3.2 Install and configure
    3.2.1 Preparing for installation
    3.2.2 Creating windows server boot disk
    3.2.3 Installing windows server
    3.3.4 Configuring server/client
3.3 Setting windows server
    3.3.1 Creating Domain controller
    3.3.2 Adding DHCP role and WINS roles
    3.3.3 Adding File server
    3.3.4 Adding Print server
    3.3.5 Adding Web server administration.
3.1 Designing Network
▪ Network design is not limited to the transport of data.
▪ It is a broad field that covers analysis, planning and implementation
  of user applications as well as network architecture, infrastructure
  and topology, data transport techniques, standards, services and
  protocols.
▪ One of the key features of a good design is that it is built to support
  both, the present and future needs.
Accessing Network Needs
▪ What networking infrastructure do you already have in place?
▪ How many computers and networked devices do you have?
▪ Develop the structure of the new internetwork.
▪ Determine the type of network that best fits a company's needs.
▪ Chooses the appropriate media and hardware to setup successful
  network.
▪ Does your office's design and layout impose physical constraints on
  your planning process? For example, is there available space in your
  floors, walls, or ceilings (often in the form of electrical conduits)
  where you can string your network cables?
Accessing Network Needs
▪ What networked applications do end users rely on most heavily, and
  how much bandwidth do these applications consume?
▪ Are you planning any changes to your technology infrastructure (such
  as additional employees or new applications) that might have an
  impact on your networking needs?
▪ How much money do you have budgeted for the installation and
  maintenance of your networks?
▪ Implement your design.
▪ Monitor your new internetwork. It is working like you expected?
Accessing Network Needs
Network Size and Scale
Applications
Users
Network Services
Security and Safety
Growth and Capacity planning
Network Size and Scale
▪ Scale is usually the first and most important determination in
  network planning as it will often determine or influence your other
  decisions.
▪ While there are other scales discussed in networking literature, most
  nonprofits and libraries only need to focus on the two or three
  network scales that impact small and mid-sized organizations (LANs,
  WANs, and CANs).
Local area network (or LAN)
▪ A local area network (or LAN) is designed and implemented at the
  scale of a single building or office.
▪ Its primary function is the interconnection of the computing
  resources within a single organization.
▪ In most cases, LANs use Ethernet over twisted-pair cabling or wireless
  technology.
Wide area network (or WAN)
▪ A wide area network (or WAN) connects a single office or branch
  LAN to its parent organization's network and all the millions of
  networks that together make up the Internet.
▪ Most authorities define WAN as a network that crosses one or more
  jurisdictional boundaries (metropolitan, regional, or national).
▪ Very few organizations have the resources to build and maintain their
  own WAN links, and it's usually more cost-effective to lease them
  from the local phone or cable company.
▪ WAN links depend on numerous technologies that vary considerably
  in terms of speed, cost, and bandwidth.
Campus area network (or CAN)
▪ A campus area network (or CAN) connects multiple LANs belonging
  to the same organization when they're in close geographic proximity.
▪ Since most nonprofits operate at the scale of a single office or main
  office with branches, CANs are only a consideration for the largest
  organizations.
▪ As with WANs, an organization can build its own CAN, but most opt to
  lease facilities from their local ISPs.
Applications
Decide on the applications requirement in the network based on
following factors:
  How many applications will be installed and accessed?
  Where they will be installed? On server or at client side?
  Who can access which application?
  Establish authentication and authorization procedures required for
  access permissions for applications in the network?
User
Users are one of the most important stack holder for any network.
▪ Decided how many users will be in the network?
▪ How many Roles and rights to manage?
▪ How to create and implement group and establish policies?
Network Services
Services the network is to provide based on the company need.
 File Sharing
 Mail Server
 Fax Service
 Directory Service
 Disk Storage
 Print Sharing
 Web Hosting and Deployment
 Database Sharing
Security and Safety
▪ Security is often the primary reason for choosing a server-based
  approach to networking.
▪ In a server-base environment, on administrator who sets the policy
  and applies it to every user on the network can manage security.
▪ A server-based Network can share individual files within a directory
  without making the directory itself available to everyone on the
  network.
Growth and Capacity Planning
▪ As the network grows a server-based network can be divided
  according to organizational needs.
For example, one server might be designated for the accounting
department and another server designated for the sales department.
Meeting Network Needs
❑ Once all requirements of network are accessed we need to decided
  on some of the important factors.
  Choosing Network Type
  Choosing Network Structure
  Choosing Network Media
  Installing Network Media
  Choosing Servers
Choosing Network Type
❖ The type of network you choose to implement will depends on
  factors such as the:
  Size of the organization
  Level of security required
  Type of business
  Level of administrative support available
  Amount of network traffic
  Needs of the network users
  Network Budget
Choosing Network Structure
❖ Choosing Network Structure required to decide on:
 Weather to use wired or wireless network?
 Type of media to use to establish the network?
 Which network topologies to use?
 Network standards to use?
❑ When choosing a network technology, consider the location of your
  computers and the desired speed of your network.
❑ You should consider two aspects of the network; the physical layout,
  including the location of each piece of hardware and how its relates to the
  others, and the physical and logical topology of the proposed network.
Choosing Network Media
▪ The choice of which media to select should not be taken lightly.
▪ The cost of installation can be quite high, especially if your have to do it
  twice.
▪ The media you choose will usually be related to the geographic
  requirements of the site.
For example: if several of the workstations are located in a manufacturing
environment in which a large amount of electrical noise is generated,
fiber-optic cable might be required because it is unaffected by electrical
signal.
On other hand, in a small office, simple twisted paid cable will usually be
appropriate.
Installing Network Media
▪ Installing network media requires special skills and is best left to a
  professional cable installer if the topology is complex.
▪ With a simple topology, however, the necessary skills are well within
  our reach.
▪ The simplest way to layout a network in our small-office environment
  is to use a physical star.
Choosing Servers
▪ The choice of right type of servers is based on the needs of services
  the network is built for.
  For example, if the requirement of the network is to store and shared
  files and directories among the users then file server should be used.
  If users need to print documents frequently like checkout counters at
  any mall or market then print server should be installed.
  Similarly database server should be used for network applications like
  banking and stocks requiring fast and secure installed database
  management software
3.2 INSTALLING AND CONFIGURING WINDOWS SERVER
❑ Preparing for installation
Before you start a clean installation of windows server 2012 R2, you
should perform the following steps.
 ▪ Review the system requirement (Microsoft’s site)
 ▪ Survey the Hardware prior to performing the installation
 ▪ Review pre-installation documentation (properly configured)
 ▪ Obtain the products
 ▪ Perform pre-installation tasks
 ▪ Backup the system prior to upgrade.
Microsoft recommend that your also perform the following
actions before installing windows server 2012 R2
3.2.1 PRE-INSTALLATION TASK
 Disconnect uninterruptible power supply (UPS) devices
 Back up data
 Disable antivirus software
 Run the windows memory Diagnostic tools
 Test RAM.
 Provide mass storage drivers if needed
 Note that windows firewall is on by default
Disconnect UPS devices.
▪ Disconnect UPS devices.
▪ If you have an uninterruptible power supply (UPS) connected to your
  server, disconnect the serial cable before you run Setup.
▪ Setup automatically attempts to detect devices that are connected to
  serial ports, and UPS equipment can cause problems with the
  detection process.
Run the windows memory Diagnostic tools
▪ Windows Memory Diagnostics Tool is a program that you can use to
  run various tests on the physical memory installed on your computer.
▪ When memory in a computer starts to fail, your computer can act in
  unpredictable ways such as rebooting on its own, freezing, and
  crashing programs.
▪ This utility performs a series of tests on the physical memory and lists
  any errors that are found.
▪ In this way you can determine if the problems you are encountering
  when using your computer may be related to the RAM going bad or
  some other problem.
3.2.1 CONFIGURE BIOS
1. Reboot the system.
2. While booting, go into BIOS configuration screen by hitting F1, F2,
   Del or Esc.
3. Select BOOT.
4. Make sure USB/DVD drive as primary boot device and exit.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
1. Microsoft’s official tool
1.   Click the Windows START button, and click WINDOWS USB/DVD DOWNLOAD
     TOOL in the ALL PROGRAMS list to open the Windows USB/DVD Download
     Tool.
2.   In the SOURCE FILE box, type the name and path of your Windows ISO file, or
     click BROWSE and select the file from the OPEN dialog box. Click NEXT.
3.   Select USB DEVICE to create a copy on a USB flash drive or select DVD disk to
     create a copy on a DVD disk.
4.   If you are copying the file to a USB flash drive, select your USB device in the
     drop-down list and click BEGIN COPYING. If you are copying the file up to a
     DVD, click BEGIN BURNING.
5.   When your Windows ISO file is copied to your drive, install Windows by moving
     to the root folder of your DVD or USB drive, and then doubleclick Setup.exe.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
  2. Command prompt
 1. Insert a USB flash drive into a running computer.
 2. Open a Command Prompt window as an administrator.
 3. Type diskpart.
 4. In the new command line window that opens, to determine the USB flash
      drive number or drive letter, at the command prompt, type list disk, and
      then click ENTER. The list diskcommand displays all the disks on the
      computer. Note the drive number or drive letter of the USB flash drive.
 5. At the command prompt, type select disk , where X is the drive number or
      drive letter of the USB flash drive, and then click ENTER.
 6. Type clean, and the click ENTER. This command deletes all data from the
      USB flash drive.
 7. To create a new primary partition on the USB flash drive, type create part
      pri, and then click ENTER.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
 8. To select the partition that you just created, type select part 1, and then click
 ENTER.
 9. To format the partition, type format fs=ntfs OR fs=fat32 (if it supprts FAT32
 format)quick, and then click ENTER.
 10. Type active, and then click ENTER.
 11. Type exit, and then click ENTER.
 12. When you finish preparing your custom image, save it to the root of the
 USB flash drive.
3.2.2 CREATING WINDOWS SERVER BOOT DISK
3. Third party software
   1. Download Rufus.
   2. Open Rufus.exe.
   3. When the software launches on the screen, plug in your USB
       flash drive.
   4. Find the option “Create a bootable USB drive”.
   5. From the menu that follows, select an ISO image.
   6. Click next and select the os which you want to make disk/USB
   7. Then click start,it will make bootable disk/USB.
3.2.3 INSTALLING WINDOWS SERVER
3.3.4 CONFIGURING SERVER/CLIENT
 • Steps to changing server name
1. Open server manager
2. Click on configure local server
3. Click on default computer name
4. Click change in system properties window
5. Give new computer name
6. Click ok and restart the computer
7. After restart you can see the server name changed
3.3.4 CONFIGURING SERVER/CLIENT
 • Steps to assign static IP address to server
1. At lower corner of your screen, right click on computer icon and
     select ‘open network and sharing center’.
2. Click ‘change adapter settings’.
3. Find Ethernet adapter, right click and select properties.
4. Double click on ‘internet protocol version 4(TCP/IP 4)
5. Select “use the following IP addresses” radio button.
6. Fill in the IP address ,subnet mask, default gateway and preferred
     DNS server.
7. Click ok.
3.3.4 CONFIGURING SERVER/CLIENT
 • Steps to Joining client machine to a domain.
1. Log on to your client machine.
2. Click on start, select properties of computer.
3. Click on change settings, system properties dialog box appears
4. Click on change computer name tab, it will show you ‘computer
     name/domain changes’
5. Give user friendly name to client machine and select domain :radio
     button ,give domain name in that.
6. Click ok and you will be asked for username and password. This detail is
     used to logon to your server domain controller.
7. After that restart the computer.
3.3 SETTING WINDOWS SERVER
▪ 3.3.1 creating domain controller
▪ 3.3.2 ADDING DHCP ROLE (dynamic host configuration protocol)
▪ 3.3.2 WHAT IS WINS?
 WINS is a Microsoft NetBIOS Name Server (NBNS).
 WINS provides a dynamic NetBIOS name to IP address database.
 It also interacts with the Browser Service, which assembles and
 provides the Network Neighborhood.
Defining WINS
• Windows Internet Name Service (WINS) is a legacy computer name
  registration and resolution service that maps computer NetBIOS names to
  IP addresses.
• A Windows computer name (e.g., Computer1), can be considered a host
  name and interact with DNS, and/or a NetBIOS name either working alone
  or with a WINS server.
• Most companies select to use DNS, but sometimes there is WINS-enabled
  devices and WINS servers on older devices.
• Whereas DNS can have hosts added statically or dynamically, WINS only
  works in a dynamic fashion.
• No configuration of a WINS server is necessary once it is installed, other
  than database replication.
Some applications and services still require WINS
that AD DirectSMB doesn’t support
▪ Exchange 2003 with certain Outlook features
▪ McAfee Enterprise ePolicy Orchestrator
▪ Symantec Endpoint Protection
▪ Symantec Backup Exec
▪ Computer Associates AV
▪ SQL
▪ Mapped Drives
▪ Printer sharing (not published in AD)
▪ and many more….
WINS and DNS
▪ WINS and DNS are both name resolution services for TCP/IP
  networks.
▪ While WINS resolves names in the NetBIOS namespace, DNS resolves
  names in the DNS domain namespace.
▪ WINS primarily supports clients that run older versions of Windows
  and applications that use NetBIOS. Windows 2000, Windows XP, and
  Windows Server 2003 use DNS names in addition to NetBIOS names.
▪ Environments that include some computers that use NetBIOS names
  and other computers that use domain names must include both WINS
  servers and DNS servers.
DNS domain name Vs NetBIOS domain name
▪ DNS domain name The DNS domain name consists of one or more
  subdomains separated by a dot (.) and is terminated by a top-level
  domain name. For example, in the DNS domain name
  corp.contoso.com, the subdomains are corp and contoso and the
  top-level domain name is com.
▪ NetBIOS domain name Typically, the NetBIOS domain name is the
  subdomain of the DNS domain name. For example, if the DNS domain
  name is contoso.com, the NetBIOS domain name is contoso. If the
  DNS domain name is corp.contoso.com, the NetBIOS domain name is
  corp.
3.3.2 INSTALL WINS Services
1. Open the previous MMC or create a new one.
2. Navigate to Server Manager > Features.
3. Click the Add Features link.
4. Check the WINS Server option as shown in Figure and click Next.
5. Click Install at the Confirmation window. No other configuration is necessary.
6. The installation should succeed. Click Close at the results screen.
7. At this point, if you click on the Features option, you should see several features
installed, including WINS server as shown in Figure
8. To have the WINS server take care of name resolution for Windows clients, go to
the IP Properties window of the client computer, then click the Advanced button
and click the WINS tab. From there, one or more WINS servers can be added.
3.3.3 File Server Role
• The file server role is the most commonly deployed role for
  computers running Server 2012.
• Almost every organization with Windows client OSs has at least one
  server functioning as a file server.
• Server 2012 also supports storage spaces, a technology that allows
  you to create flexible and fault-tolerant virtual drives using multiple
  disks.
Deploying the File Server Role
▪ File Server — Provides basic access to shared folders. This role is installed
  by default on a computer running Server 2012.
▪ Data Deduplication — Reduces disk utilization by storing only a single copy
  of data on a volume.
▪ DFS (Distributed File System) Replication — Provides synchronization of
  files across branch offices.
▪ File Server Resource Manager — Allows you to create file screens, manage
  folder-level quotas, create file classifications, and generate storage reports.
▪ Storage Services — Provides storage-management functionality.
3.3.3 Print Server Role
▪ A Printer is one of the most important devices for an office network
  and being a system administrator you should be able to deploy it.
▪ A print server is a computer system which is directly connected to a
  local Printer.
▪ All the print request on the network send to the printer are routed
  through the print server.
▪ In modern printers (LAN printer) which are directly connected to the
  switch no specialized print server is required rather each machine on
  the network servers as a print server.
Print Server Role
▪ Print server is a server that manage one printer in a network or more
  with all its functions plus manage other print servers.
▪ A print server arrange the data that is supposed to go to different
  printers.
▪ The printers cannot handle the files which come so fast one after
  another so here the print server queues the files locally to be
  processed when the printer is ready to accept files.
3.3.5 Web Based Administration
❑ Through the web-based administration you can:
 ▪ Start and stop monitoring
 ▪ Add new users
 ▪ View and edit existing users
 ▪ Delete users
 ▪ Monitor the system status
  The Web administration interface is a web-based tool for configuring
  all, from adding data to changing service settings.
IOS Management Commands
▪ Cisco IOS (Internetwork Operating system) software provides access
  to several different command modes. Each command mode provides
  a different group of related commands.
▪ For security purposes, Cisco IOS software provides two levels of
  access to commands: user and privileged.
▪ The unprivileged user mode is called user EXEC mode.
▪ The privileged mode is called privileged EXEC mode and requires a
  password.
▪ The commands available in user EXEC mode are a subset of the
  commands available in privileged EXEC mode.
IOS Operating Modes
• User EXEC
• Privileged EXEC
• Global configuration
• Interface configuration
• ROM monitor
User EXEC
 ▪ User EXEC commands allow you to connect to remote devices,
   change terminal settings on a temporary basis, perform basic tests,
   and list system information.
 ▪ The EXEC commands available at the user level are a subset of those
   available at the privileged level.
 ▪ User EXEC commands allow you to connect to remote devices,
   change terminal settings on a temporary basic, perform basic tests,
   and list system information.
❑ Ex. Router>
Privileged EXEC
• Privileged EXEC commands set operating parameters.
• The privileged command set includes those commands contained in
  user EXEC mode, and also the configure command through which you
  can access the remaining command modes.
• Privileged EXEC mode also includes high-level testing commands,
  such as debug.
• Ex. Router#
Global configuration
• Global configuration commands apply to features that affect the
  system as a whole, rather than just one protocol or interface.
• Ex. Router(Config)#
ROM monitor
• ROM monitor commands are used to perform low-level diagnostics.
• You can also use the ROM monitor commands to recover from a
  system failure and stop the boot process in a specific operating
  environment.
• To enter ROM monitor mode, use the Break Key (Cntl-C) during the
  first 60 seconds of start-up.
• The router prompt is indicated by an angle bracket by itself or the
  term ROMMON followed by a number and an angel bracket: >
• Ex: bracket: >
Interface configuration
▪ Interface configuration commands modify the operation of an
  interface such as an Ethernet or serial port.
▪ Many features are enabled on a per-interface basis.
▪ Interface configuration commands always follow an interface global
  configuration command, which defines the interface type.
▪ Ex. Router(config-if)#
▪ For example, enter the interface int switch 9/1 command to
  configure the ATM interface.