Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
After server authorization four domains for giving and registration of addresses of clients are created. "If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets?
One way to do this is to preconfigure each client with information about what group it belongs to. A DHCP feature designed for this is the user class option. To do this, the client software must allow the user class option to be preconfigured and the server software must support its use to control which pool a client's address is allocated from. (DHCP FAQ (http://www.dhcp-handbook.com/dhcp_faq.html#iaplh)
In order to create domain, wizard is used. In nets 188.8.131.52, 184.108.40.206, 220.127.116.11 elimination range is used only from one (last) address of range, because it's assigned to router's port as it was mentioned above. All other nodes, including printers may be set up on automatic receiving of address from DHCP server: "as Most routers incorporate a DHCP server to automatically configure all the computers on your LAN. (Les Freed PC Magazine Guide to Home Networking p.41)
In the wizard for defining lock-router for clients the following addresses are defined. For example, for the third floor router's address 18.104.22.168 is used, for the second floor- 22.214.171.124, etc. In domain settings for all domains we define WINS addresses and DNS which were assigned and chosen above. In order to shorten traffic in the net, "rent" period is chosen to be 10 days. This period may be changed then if the importance will appear. For the ground floor elimination range will be between 126.96.36.199-188.8.131.52. In the case of using new servers in future, last would have to be assigned additionally addresses from this range.
Because the server DHCP is installed in last subnet in its own segment it can serve only in its own segment, because while connected, client sends wide request for search of the DHCP server, which is not transmitted by router to other IP subnets. So first, three subnets do not have DHCP server in their segment. In order to organize automatic receiving of addresses in these segments Agent of retranslation has to be set up correctly in router. Agent has to administer three subnets: 184.108.40.206, 220.127.116.11, 208.32.16. 128. In properties of agent the following DHCP server address has to be defined: 18.104.22.168. Agent receives wide client's request for DHXCP search, Agent receives this message and readdresses it to server, further message exchange is executed with server by means of Agent.
Installation of DNS, WINS, IIS servers
As it was said above DNS server was set up with domain's controller and ELBRYN.COM. zone is integrated into Active Directory. Server is used for permitting internet names in IP addresses. It receives clients' requests on the interface 22.214.171.124. For effective use of server it's recommended to organize resending of non-recursive requests to DNS server of internet service provider. In order to keep actual client names in ELBRYN.COM zone dynamic update of nodes records of DNS with DHCP server has to be organized. So, when computer will be renamed, new record nodes will be created in ELBRYN.COM, zone automatically.
By default, the Domain Controllers (DCs) group has full control of all DNS zones and records. Because the DHCP Server service runs under the domain controller's computer account, it has full control of all DNS zones and records. Because of this, the DHCP Server service has the authority to update or delete any DNS record that is registered in a secure Active Directory-integrated zone (this includes records that were securely registered by other Windows 2000-based computers, including domain controllers).
To minimize the potential of name hijacking, Microsoft does not recommend that you install the DHCP Server service configured to perform DDNS update on a DC. Instead, install the DHCP Server service on a separate server, and not a domain controller." (from Installing Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) on a Domain Controller (http://support.microsoft.com/?kbid=255134)
In order the requests to be solved correctly by DNS server it's essential to install and set reverse zones, which correspond to subnets created earlier: 0.16.32.208.in-addr.arpa., 126.96.36.199.in-addr.arpa., 188.8.131.52.in-addr.arpa., 184.108.40.206.in-addr.arpa. So there are 4 zones of reverse viewing. They have to be created before the start of DHCP server's work and before client computers start working, if it's possible. In order to provide the work of WWW.andFTP servers, pseudo names are created (records of CNAME type:.".. CNAME: The Value field gives the canonical name for a particular host; it is used to define aliases...." (from Peterson, Larry L. Computer Networks: A Systems Approach)) in zone ELBRYN.COM. In order clients to be able to call them by the addresses www.elbryn.comand ftp.elbryn.com.
In order to check the settings and functioning of server, administrator can test it by entering its properties and clicking on test button. Also the work of the server can be checked by use of nslookup utility.
If the server is set up correctly, then resources can be called not by NetBIOS name but by DNS name of the computer. Lots of Windows 2000/XP applications use DNS names for working in domain, as Active Directory service is based on DNS service.
Server WINS doesn't require additional settings after installation, because there are no other servers in the net and their replication is unnecessary, that's why partners by replication are absent. Server is responsible for permitting NetBIOS names in IP addresses. Because all nets nodes are h-nodes (0x8) and they use WINS as default, so there have to be no nodes in the net that would use wide method of registration and permitting NetBIOS names. Such setting is provided by corresponding settings from DHCP server domain. Use of WINS allows organizing registration and permitting names in the net with several segments and decreases wide traffic in the net. It also eases the work of the master browser of network which is responsible for keeping the list of computers, domains and work groups. Master browser receives list of computers from the WINS server.
Server IIS is installed only on one server of the net: "Before installing IIS, the system must be configured securely and all extra components that could cause unauthorized access must be removed. (from Seth Fogie, Cyrus Peikari Securing Information Internet Serve. http://www.informit.com/articles/article.asp?p=29310&seqNum=2)
In order to provide secure work of server in Internet, the default site is stopped and new site is created which works on port 80. All necessary documents and pages are hosted in the site folder on the hand with scenarios according to tasks. Then access of anonymous user is set permitted to folders of general use. Access of anonymous user is set denied to the folders of restricted use and NTFS permissions are set. On FTP sever all necessary documents and programs are hosted for general use with public access to data. As an additional security access to some virtual catalogs is set only for a definite range of addresses. it's made in the properties of those virtual catalogs on the bookmark: security in the program Internet services dispatcher.
For the work with file servers and internet services there was chosen a net 100 BASE-TX, realized on commutators HP J4817A procurve switch 2324, cascaded by gigabyte connection channels. It allows realization of fast addressing to the resources and allows providing of a high speed of commutation. Network uses Intel router.
For net's nodes there were chosen real names in the range 0-255 which is not effective and expensive solution according to the following reasons: Windows services need increased security and this solutions requires installation of Firewall on every computer or on the router, it also requires considerable means for the rent of internet addresses and there is no opportunity to "spy" use of internet resources and statistics. There exist an alternative variant which supposes the use of private addresses 192.168.x.x for nodes and real addresses on router. Also it's important to organize publication of WWW, FTP services on router.
The use of Active Directory allows increasing the security of work in the net; it also allows to increase efficiency of resource management by means of centralized management and group policies. For every section or group of computers it's important to create group policy and organize administration of users and computers: settings of working environment, software settings, restriction of access to network, restrictions of IpSec:.".. performance that many have come to expect from NT Windows 2000 Professional offers these new and enhanced features: Internet protocol Security (IPSec) Windows file protection in the event that an application overwrites a a protocol standard for system file. encrypting IP packets.." (Donald, Lisa MCSE 2000 JumpStart: Computer Network Basics p.102)
The use of DHCP server allowed to automatize IP address processes and parameters of TCP/IP protocol to net's nodes and register the use of these addresses. After changing configuration of servers and routers it would be enough just to reset parameters of the following domain.
The use of WINS allowed decreasing client traffic, allows providing the work of nodes in different…[continue]
"Network Structure And Functions Of" (2005, February 20) Retrieved December 4, 2016, from http://www.paperdue.com/essay/network-structure-and-functions-of-62250
"Network Structure And Functions Of" 20 February 2005. Web.4 December. 2016. <http://www.paperdue.com/essay/network-structure-and-functions-of-62250>
"Network Structure And Functions Of", 20 February 2005, Accessed.4 December. 2016, http://www.paperdue.com/essay/network-structure-and-functions-of-62250
NETWORK FORMATION AND NETWORK STRUCTURE OF NETWORKED INCUBATORS BASED ON THE CASE STUDY (attached additional material). You address 2 issues basing discussion answers type questions points identified issue. Incubator firms. Networks are organizations governed by relationships. On a human scale, networks are "a form of organised economic activity that involve a set of individuals & organisations ('nodes') linked together by formal and informal relationships including contractual obligations, membership of trade associations,
Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees
In general, the intelligence community operates as a community of shared practice, where all of the members of the network share common functions and areas of expertise, and where the effective pooling of resources could yield to more effective as well as more efficient results (Goldsmith & Kettl 2009). Determining the most effective governance structure for the intelligence community necessitates taking this community structure into account (Goldsmith & Kettl
Function Outsourcing IT Function Outsourcing The advancements in the field of information technology have paved way for digitization of operations and automation of functions. In the recent decade it has become a need which is the source of cost reduction, efficient operation and competitive advantage as well. This is the reason; almost every organization is seriously considering the option of introducing IT in its operations. Since information technology is the combination of
Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will
Network Design The process of gathering technical requirements for a network design project may differ from one organization to another, but the requirements themselves can be described using many of the concepts discussed in the lecture this week (i.e. Scalability, Availability, Network performance, Security, Manageability, and Affordability). Analyzing technical requirements for the customer is important in helping one best fulfill the customer's expectations. The various objectives that need to be fulfilled involve
Network Management and System Administration The aim of the paper is to establish the difference between a system administrator and a network administrator. The paper is thus divided into three sections. The first section deals with the basic definition and responsibilities of a system administrator; the second does the same for a network administrator and the third compares their responsibilities to clearly identify the differences between the two. System Administrator The maintenance of