configure_and_administer_server_hns_2nd_year_ext_and_reg_handout.doc

tamismart77 60 views 14 slides Sep 02, 2025
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

ict


Slide Content

What is Server?
A server
is a computer
 program or
device that provides a service to another
computer
program and its user, also known as the client.
A server is
a software or hardware device that accepts and responds to requests
made
over a network.
In
a data center, the physical computer that a server program runs on is also
frequently
referred to as a server. That machine
 may
be a
 dedicated
server
 or
it
may
be used for other purposes as well.
In
the
 client/server programming
model, a server programs a waits and fulfills
requests
from
 client programs,
which may be running
 in
the same or other
computers.

Types of servers
Servers
are
 often
categorized in terms of their purpose. A few examples of the
types
of servers available are
Web
server


 is
a computer program that serves requested
 HTML pages
or
files.
In this case, a Web
 browser acts
as the client.
 Application
server
 is
a
 program
in a computer in a
 distributed network that

provides
the business logic for an application program.
 Proxy
server
 is
software that acts as an intermediary between an
 endpoint

device,
such as a computer, and another server from which a user or client is
requesting
a service.
 Mail
server
 is
an application that receives incoming e-mails from local users
(people
within the same
 domain)
and remote senders and forwards outgoing
e-mails
for delivery.
 Virtual
server
 is
a
 program
running on a shared server that is configured in
such
a way that it seems to each user that they have complete control of a
server.
File
server


 is
a computer responsible for the central storage and
management
of
 data files
so that other computers on the same network can
access
them.
Policy
server


 is
a security component of a
 policy-based
network that
provides authorization services
and facilitates tracking and control of files.
 
Harambee U college By:-Ayele T Page 1 of 14

-
+INFORMATION
SHEET
UNIT OF
COMPETENCY
Configure and Administer Server
Learning
out comes
1.Confirm server specification
2.Verify server compatibility and inter-operability
3.Configure test server
Network Configuration
In general, all networks have certain components, functions, and features in common, these
include:
Servers—Computers that provide shared resources to network users.
Clients—Computers that access shared network resources provided by a server.
Media—the wires that make the physical connections.
Shared data—Files provided to clients by servers across the network.
Shared printers and other peripherals—Additional resources provided by servers.
Resources—any service or device, such as files, printers, or other items, made
available for use by members of the network.
Networks are classified into two principal groups based on how they share
information:
1.Server-based networks.
2.Peer-to-peer networks.
In selecting one of these network types, the following issues should be
considered
What is the size of the organization?
How much security does the organization require?
What software or hardware does the resource require?
How much administration does it need?
How much will it cost?
Will this resource meet the needs of the organization today and in the
future?
Will additional training be needed?
1. Server-Based Networks
In an environment with more than 10 users.
 Therefore, most networks have dedicated servers. A dedicated server is one that
functions only as a server and is not used as a client or workstation. Servers are
described as "dedicated" because they are not themselves clients, and because they
are optimized to service requests from network clients quickly and to ensure the
security of files and directories.
 Server-based networks have become the standard models for networking
Server-based networks divide processing tasks between clients and servers
Advantages include
Strong central security
Central file storage which allows all users to work from the same set of data
and provides easy backup of critical data
Ability of servers to pool available hardware and software, lowering overall costs
Ability to share expensive equipment
Optimized dedicated servers, which are faster than peers at sharing resources
on the network
Easy manageability of a large number of users
Disadvantages include
Harambee U college By:-Ayele T Page 2 of 14

Expensive dedicated hardware server computer
Expensive network operating system software and client licenses
A dedicated network administrator
2. Peer-to-Peer Networks
In a peer-to-peer network, there are
no dedicated servers.
All the computers are equal and
therefore are known as peers.
 Each computer functions as both a
client and a server, and there is no
administrator responsible for the
entire network.
The user at each computer
determines what data on that
computer is shared on the network
Peer-to-peer networks are relatively
simple
Where a Peer-to-Peer Network Is Appropriate
Peer-to-peer networks are good choices for environments where :
Where are 10 users or fewer?
Users share resources, such as files and printers, but no specialized servers exist.
Security is not an issue.
The organization and the network will experience only limited growth within the
foreseeable
Advantages of peer networks include
No extra investment in server hardware or software
Easy setup
Little network administration required
Ability of users to control resource sharing
No reliance on other computers for their operation
Lower cost for small networks
Disadvantages of peer networks
Additional load on computers because of resource sharing
Inability of peers to handle as many network connections as servers
Lack of central organization, which can make data hard to find
No central point of storage for file archiving
Requirement that users administer their own computers
Weak and intrusive security
 Lack o f central management, which makes large peer networks difficult to work
with future.
Terminal Server Specifications
Component Recommended
Operating System
Windows 2003/2008 Server with
Terminal Services Client Access Licenses*** (2003 Small Business
Server does not allow use of Terminal Services in Application Mode)
Remote Access (for
support)
Remote Desktop connection directly into server strongly
recommended. 
Support uses WinVNC via ports 5500, 5900 and 5901
Anti Virus SoftwareSymantec Antivirus
Harambee U college By:-Ayele T Page 3 of 14

SQL Server
SQL Server 2005 (Workgroup Edition or higher) Highly
recommended for 15+ NexTech Licenses or Nex EMR.   Required for
DB > 2 GB or > 2GB RAM usage.
SQL Server 2008 not supported
Note: For offices with more than 15 users using TS we recommend
the SQL server be separate from the Terminal Server
MS Office MS Office 2007/2010 (32-bit version)*
Computer/processor2 GHz + Dual or Quad Core
Memory (RAM)* 8 GB + 128 MB per workstation
Hard Disk
500 GB+
*Note that digital imaging greatly increases your hard drive needs
Internet (Required)DSL or faster with static IP address
CDROM Required
Power Supply UPS
External Backup
Daily backup to approved removable media of entire server. 
NexTech Makes a copy of data, documents, templates, images and
custom reports on the server and  a workstation. Client is
responsible for external backup.
*Due to memory usage issues, NexTech recommends not running Exchange server
on the same computer that the NexTech SQL Server will be running on.
 Terminal Client Stations Specifications
The Terminal Client Stations Specifications describes the recommended specifications that ensures
compatibility of client with the server
 Component Recommended
Operating System
Any Operating system that supports Remote Desktop to
a Windows Server (note NexTech is not responsible for
setting up remote desktop, just the NexTech program
once you are remoted in)
Tablet PCs
Hybrid Tablet with attached keyboard, least 1024x768
resolution. Use over Terminal Services may impede use
of Tablet PC writing ability.
Computer/processor 350 Mhz+ Pentinum
Memory (RAM) 128 MB +
Hard Disk 1 GB+ 
Display 1024 x 768 + resolution, 24 bit color
 Peripherals and Other Optional Hardware
 Printers
Dot matrix printers & most Ink Jet printers will NOT work
for Insurance HCFA forms. Laser-Jet Printers are
recommended
Bar Code Scanners NexTech Supports Serial Emulation USB bar code scanners.
Tested models include Metrologic MK9520-72A38, MK9520-
Harambee U college By:-Ayele T Page 4 of 14

32A38, and MK9535-39B5M38   (wireless). Note: Keyboard
wedge scanners are not supported. Bar Code scanners are
not supported on 64 bit Operating systems.
Document / Image
Scanners
NexTech is compatible with TWAIN and WIA camera/printer
drivers (TWAIN drivers are not remote Desktop Compatible.
All remote peripheral setup is the responsibility of users IT
personnel).
Voice Dictation
Dragon Naturally Speaking Medical Edition required for voice
dictation.
Magnetic Strip
Readers/Cash
Drawers/Reciept
Printers
Cash Drawers, MSR readers and Receipt Printers must have
OPOS Drivers-
(If  using 64 bit OS, make sure hardware is 64 bit
compatible) NexTech is not responsible for installation of
OPOS drivers)tested models – MSR - ID Tech Mini Mag Model
Number IDMB-355133B (64-bit compatible)  Cash Drawer –
APG T237A-BL616 Reciept Printer – Citizen CTS2000
Hardware specifications are subject to change without notice.
***In order to properly run Terminal Services you are required by Microsoft to
purchase CAL’s(Client Access Licensing) for both Terminal Services and basic
Windows 2000/2003 server connectivity.   The number of CAL’s needed varies
depending on the number of terminals/ workstations on your local network.
(Questions regarding CALs, please refer to Microsoft’s web page or contact your local
computer consultant.)
****64-bit version of MS Office 2010 is not supported.
Introduction to Active Directory
Computer Roles
DOMAIN DNS CONTROLLER
Harambee U college By:-Ayele T Page 5 of 14

FILE SERVE
PRINT SERVER
What Is a Directory Service?
Active Directory Objects
Objects
Attributes that represents a network resource
Object name: Computers
Attributes: computer 1, computer 2, computer 3, etc.
Object: Users
Attributes: First name, last name, logon name, etc.
Active Directory Schema
oDefines objects that can be stored in Active Directory (See schema
administration in Active Directory Users and Computers)
Harambee U college By:-Ayele T Page 6 of 14

Types of schema objects (metadata)
oSchema class objects - Template for creating new objects (e.g. computer,
Group, User, etc.)
oSchema attribute objects – Define or describes the schema class object with
which they are associated even though they may be used in many schema
classes
Active Directory Components
Domains
Organizational Units (OUs)
Trees
Forests
Active Directory Terms
Organizational Unit 1
Domains
Core unit of logical structures
Can Stores millions of objects
A security boundary
Access to objects is governed by access control lists (ACLs), which contain
permissions for each object (files, folders, shares, printers, etc.). Those
permissions control which users can gain access to an object and what type
of access they can gain.
Organizational Units (OUs)
Organizes objects within a domain into logical administrative groups
Nesting when an OU is added within another OU (like a subdirectory). This
creates a hierarchical structure
Trees
 A group or hierarchy of domains created by adding child domain to a
parent
Forests
A group or hierarchy of independent domain trees
Forest functional level provides a way to enable forest-wide Active Directory
features
Physical Structures
Sites
Domains controllers
Sites
Harambee U college By:-Ayele T Page 7 of 14

One or more connected IP subnets
Usually has the same performance boundaries
Contain only computer and connection objects
Domain Controllers
 Authenticates users and maintains domain security policy
 Stores a replica of the domain portion of Active Directory
Replication
 Ensures that changes in one domain controller are represented in all
other domain controllers in the domain
What Information is replicated?
oActive Directory is partitioned into four units:
Schema partition – describes objects and attributes that can be created in a
directory. This data is common to all domains in a forest and is replicated
Configuration partition – describes domain structure and replication layout.
This data is common to all domains in a forest and is replicated
Domain Partition – Describes all domain objects. This is domain specific and is
not replicated, but data is replicated to every domain controller in the domain
Application Directory partition – Stores dynamic application-specific data and
can contain any type of object except security type. Can be set for replication if
desired
oThe Domain Name System , or DNS, is used to resolve human-readable hostnames, such as
www.dyndns.com, into machine-readable IP addresses, such as 63.208.196.66. DNS also provides
other information about domain names, such as mail services.
oWhy is DNS important?
oDNS is like a phone book for the Internet. If you know a person's name, but don't know their
telephone number, you can simply look it up in a phone book. DNS provides this same service to
the Internet: When you visit http://www.dyndns.com in a browser, your computer uses DNS to
retrieve the website's IP address, 63.208.196.66. Without DNS, you would only be able to visit our
website (or any website) by visiting its IP address directly, such as http://63.208.196.66.
How does DNS work?
When you visit a domain such as
www.dyndns.com, your computer follows
a series of steps to turn the human-
readable web address into a machine-
readable IP address. This happens every
time you use a domain name, whether
you are viewing websites, sending email,
or listening to Internet radio stations.
Step 1: Request information
The process begins when you ask your
computer to resolve a hostname, such as
visiting http://www.dyndns.com. The first
place your computer looks is its local DNS cache, which stores information that your computer has
recently retrieved. If your computer doesn't already know the answer, it needs to perform a DNS query to
find out.
Step 2: Ask the recursive DNS servers
If the information is not stored locally, your computer queries (contacts) your ISP's recursive DNS servers.
These specialized computers perform the legwork of a DNS query on your behalf. Recursive servers have
their own caches, so the process usually ends here, and the information is returned to the user.
Step 3: Ask the root name servers
If the recursive servers don't have the answer, they query the root name servers. A name server is a
computer that answers questions about domain names, such as IP addresses. The thirteen root name
servers acting as a kind of telephone switchboard for DNS; they don't know the answer, but they can direct
our query to someone that knows where to find it.
Step 4: Ask the TLD name servers
The root name servers will look at the first part of our request, reading from right to left —
www.dyndns.com — and direct our query to the Top-Level Domain (TLD) name servers for .com. Each
Harambee U college By:-Ayele T Page 8 of 14

TLD, such as .com, .org, and .us, have their own set of name servers, which act like a receptionist for each
TLD. These servers don't have the information we need, but they can refer us directly to the servers that do
have the information.
Step 5: Ask the authoritative DNS servers
The TLD name servers review the next part of our request — www.dyndns.com — and direct our query to
the name servers responsible for this specific domain. These authoritative name servers are responsible
for knowing all the information about a specific domain, which are stored in DNS records. There are many
types of records, which each contain a different kind of information. In this example, we want to know the
IP address for www.dyndns.com, so we ask the authoritative name server for the Address Record (A).
Check out DNSCog.com our ultimate DNS diagnostic report tool that inspects your domain name or
zone for common errors in name server configuration, mail servers, and DNSSEC configuration.
Step 6: Retrieve the record
The recursive server retrieves the A record for www.dyndns.com from the authoritative name servers, and
stores the record in its local cache. If anyone else requests the host record for www.dyndns.com, the
recursive servers will already have the answer, and will not need to go through the lookup process again.
All records have a time-to-live value, which is like an expiration date; after a while, the recursive server
will need to ask for a new copy of the record to make sure the information doesn't become out-of-date.
Step 7: Receive the answer
Armed with the answer, recursive server returns the A record back to your computer. Your computer
stores the record in its cache, reads the IP address from the record, then passes this information to your
browser. The browser then opens a connection to the webserver and receives the website.
This entire process, from start to finish, takes only milliseconds to complete.
Information Sheet 2 Configure & Administer Server
1.Server Machines
A server is used to hold resources and items that other computers would need:

A server is primarily a regular computer. For a small network, identify the computer that you will use as the
server. You can use an existing computer or purchase a new one.
If you plan to use one of your (existing) computers as the server, check its hardware and make sure it meets
the following requirements:
oA processor with 133-MHz or higher speed; 550-MHz recommended; up to eight processors
supported on one server
o128 MB of RAM minimum required; 256 MB or more recommended; 32 GB maximum
o1.25 to 2 GB of available hard disk space
oCD-ROM or DVD-ROM drive
oVGA or hardware that supports console redirection required; Super VGA supporting 800 x 600
or higher-resolution monitor recommended
If necessary, you can purchase additional items to meet these requirements.
2.Network Operating System (NOS)
Harambee U college By:-Ayele T Page 9 of 14

NOS is a piece of software that controls a network and its messages (e.g. packet) traffic and controls
access by multiple users to network resources such as files, and provides certain administrative
functions, including security.
NOS organize and coordinate how multiple users’ access and share resources on the network. Resource
includes programs, files, and devices such as printers. The network administrator uses the network OS
to add and remove users, computers and other devices to and from the network. A network
administrator is a person located at the server computer to control the network and the user of the client
computers.
A network OS typically resides on the server. Recall, server is a computer that controls access to the
hardware and software on the network and provides a centralized storage are for programs, data and
information.
Therefore NOS is an operating system that includes special functions for connecting computers and
devices into a local area network (LAN) or internetworking. Some popular NOSs windows systems
include NetWare, Windows NT Server, Windows 2000 Server, UNIX and Solaris.
Types of Network Operating System
Operating systems are generally one of the three types: client, server, or hybrid. Depending on the size
of your network, any combination of these operating systems may be appropriate.
1.Client Operating System
A client operating system uses resources such as printers or files. These operating systems have
network capability but generally don’t provide services to a network.
2.Server Operating System
Unlike a client operating system, the server operating system functions to provide resources instead of
uses them.
3.Hybrid Operating System
A hybrid operating system serves as both a client and a server in the network environment. The portion
of the operating system acting as a server can share resources. The portion running as a client can
access resources from the other services.
3. Introduction to Network Management
Management Overview
Introduction
As a network administrator, you will perform various tasks to keep the network up and running. These
include computers, users (the people who use the network), the peripherals (the other machines attached
either to the computers or directly to the network. To make this possible, both Microsoft Windows XP
Professional and Windows Server 2003 provide the various tools you will need. If you are managing a
peer-to-peer network, the former provides local and possibly small network tools to manage
workstations. For a client/server network, Microsoft Windows Server 2003 provides all the tools you
need to locally or remotely manage the servers or the clients.
3.1 Network Management with Win XP
Most of the tools used to locally manage a Microsoft Windows XP Professional or a peer-to-peer
network are listed in the Administrative Tools window. To open it, you can open Control Panel and
double-click Administrative Tools:
Harambee U college By:-Ayele T Page 10 of 14

As you install more software or libraries to your computer, the tools may increase in sophistication
and number. Here is an example:
To use a tool, you can double-click it.
3.2 Network Management with Windows Server 2003
Like Microsoft Windows XP Professional, Windows Server 2003 groups its administration routines
under an ensemble referred to as Administrative Tools. Unlike the former, the later provides various
ways of accessing the tools.
After you have just setup Microsoft Windows Server 2003 and installed Active Directory, the first
window that comes up provides some of the most regular tools you will need to administer the network:
Harambee U college By:-Ayele T Page 11 of 14

The middle section of this window provides only a limited list of tools, considered to be the most
regularly used. Alternatively, you can display the whole list of tools in a window. To do this, under
the Tools and Updates Section, you can click Administrative Tools:
To use a tool, you can double-click it.
Another technique you can access the tools consists of clicking Start -> Administrative Tools:
Another technique consists of click Start -> All Programs -> Administrative Tools
Harambee U college By:-Ayele T Page 12 of 14

You can also click Start -> Control Panel ->Administrative Tools.
With any of these previous techniques, to use a tool, simply click it from the menu.
3.3
The Microsoft Management Console
Introduction
If you have some experience with Windows Explorer of Microsoft Windows 9X and later, you may be
aware that, in that same window, you can open your folders, view your files, open Control Panel, or
even view a web page. In the same way, to make computer and network management easy, Microsoft
Windows XP and Windows Server 2003 provide a common window named Microsoft Management
Console or MMC. This makes it possible for all routine operations to be performed in a window that
primary looks the same regardless of the task being performed. You can perform all routines operations
without formally being aware that you are using the MMC.
3.4 Setting up a DHCP server in Windows 2003
"Dynamic Host Configuration Protocol (DHCP) is an IP standard designed to reduce the complexity of
administering IP address configurations." - Microsoft's definition. A DHCP server would be set up with the
appropriate settings for a given network. Such settings would include a set of fundamental parameters such as
the gateway, DNS, subnet masks, and a range of IP addresses. Using DHCP on a network means administrators
don't need to configure these settings individually for each client on the network. The DHCP would
automatically distribute them to the clients itself.
The DHCP server assigns a client an IP address taken from a predefined scope for a given amount of
time. If an IP address is required for longer than the lease has been set for, the client must request an
extension before the lease expires. If the client has not requested an extension on the lease time, the IP
address will be considered free and can be assigned to another client. If the user wishes to change IP
address then they can do so by typing "ipconfig /release", followed by "ipconfig /renew" in the
command prompt. This will remove the current IP address and request a new one. Reservations can be
defined on the DHCP server to allow certain clients to have their own IP address (this will be discussed
Harambee U college By:-Ayele T Page 13 of 14

a little later on). Addresses can be reserved for a MAC address or a host name so these clients will have
a fixed IP address that is configured automatically. Most Internet Service Providers use DHCP to assign
new IP addresses to client computers when a customer connects to the internet - this simplifies things at
user level.
The above diagram displays a simple structure consisting of a DHCP server and a number of client
computers on a network.
The DHCP Server itself contains an IP Address Database which holds all the IP addresses available for
distribution. If the client (a member of the network with a Windows 2000 Professional/XP operating
system, for example) has "obtain an IP address automatically" enabled in TCP/IP settings, then it is
able to receive an IP address from the DHCP server.
Harambee U college By:-Ayele T Page 14 of 14
Tags