Core Competency 3
Core Competency 3
Core Competency 3
Servers
Lesson 29: Understanding the "Server"
and "Client"
1. Introduction
Networks, like humans, exist even within computer systems!
To understand this, this module will run you through how computer networks are connected in
sharing information and resources through servers and clients.
Since you've just learned about networks in the previous module, the computer server will
be an example of a network that you will be working with in the workplace.
This lesson will run you through the client/server network model. You will be able to enumerate
the various functions of the client/server model and as well as discuss their different
topologies.
2. Client/Server
Client/Server, according to the Management Information System, is the new technology that
yields solutions to many data management problems faced by modern organizations.
This is a model based on the distribution of functions between two types of independent and
autonomous processes: Server and Client.
Client - any process that requests specific services from the Server.
Basically, the two processes reside on two or more independent computers on a network. The
server gives services for more than one client.
The network is the medium in which the server and client connects.
4. Client/Server Topologies
A Client/Server Topology is the physical layout of the Client/Server network. It plots out how
the clients and serevrs are connected to each other.
Workstation independence
System interoperability
Scalability
Data integrity
Data accessibility
Integrated services
Disadvantages
Maintenance cost
Training cost
Hardware cost
Software cost
Complexity
To install the ADDS, the administrator should open command prompt (Ctrl + R then cmd), and
type dcpromo to install ADDS, DNS, and create a forest and domain.
Validates and gives access to all users and computers in a Windows domain type network;
3. Features of ADDS
These are the features of having the Active Directory Domain Services:
1. Security - The data is stored securely. Each of the objects in the Active Directory has an
ACL or Access Control List which consists of the resources that one may access and along with
access privileges given to each resource.
2. Query Capabilities - The ADDS creates a global catalog to give a mechanism to handle
queries. A client which has ADDS can query the catalog to request directory data.
3. Replication - To replicate a directory to all domain controllers means easy access, high
availability, and improved fault tolerance.
4. Extensibility - Having ADDS is extensible. Meaning that new object types can be added to
a directory. An attribute can be added, for example to the user object.
Once a user is created, a user folder is also automatically created upon the log-in of the user to
the client computer.
You can carefully follow the steps below if you have two computer units (one installed with
Windows Server OS and a Windows 7/8/10 ) connected through a network cable.
2. On server manager, select Features, Group Policy Management, Forest, Domains, (Domain
name), Right click on Policy, Edit
6. Choose your directory to be redirect, press right click on your mouse and select properties
9. Click OK
A computer is able to identify between one person to another through a security deviced called
the user account object
Each user in the network has a unique user account which contains the contact details of the
users as well as what his/her rights and restrictions in accessing resources/folders, etc.
Password Security
Each user account is protected by a password to provide authorization and access to the
system.
Permissions
These are access privileges granted to a user account (e.g. group memberships, user-specific
settings to access resources, etc.)
Identification
Having a user account means easily identifying the person to the computer system and
network.
User Rights
Having user rights is a high-level privilege given to users or groups to define their action on a
computer system.
Roaming
The administrator may define user accounts in a way that a user is able to log on to any
system which is a memer of a domain using a domain user account, a Remote Access Service
(RAS), or gateway.
Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and user
environment in general. They are specifically restricted through the use of mandatory profiles.
Auditing
The server can track access and use by domain user accounts.
You can carefully follow the steps below if you have two computer units (one installed with
Windows Server OS and a Windows 7/8/10 ) connected through a network cable.
1. To get to Active Directory Users and Computers, choose Start> All Programs >
Administrative Tools > Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization unit to
which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by retyping it.
9. Click the Next button when you’re finished marking your selections.
Some issues may be easily diagnosed and corrected however, take note that not all server
errors occur only during booting. It can also occur when it is running or even when the server is
shutting down.
2. Boot Process
The boot process has five major stages:
1. Pre-boot
2. Boot
3. Load
4. Initialization
5. Log-on
In each stage, there are steps that should be followed in loading and using files. In each of
these stages, observe how the process works, how the particular files are utilized, and what is
seen on screen.
3. Preboot
Pre-boot is basically the BIOS startup process.
By turning on or resetting the computer, you should perform the Power-On Self-Test or POST
routine discussed in the previous modules.
The BIOS shall execute the Initial Program Load where the boot devices are read and
prioritized.
The partition information is seen as well as the boot sector and the Windows Boot Manager.
You will also see the memory check, hardware, and boot device search.
Corrupt MBR
This is caused by many viruses in the Master Boot Record which corrupted it.
This happens when the hard drive is not recorgnized. This error can happen even if the device
is fine and the configuration is unchanged.
This may happen if the Fdisk utility is recently used and no partition is made from all the free
space available.
Corrupt or missing Ntldr file
This may happen when the Ntldr file is corrupted or deleted by a virus.
4. Boot
Windows Boot Manager reads the boot configuration data (BCD). But in the case of having
more than one boot partition, it prompts the user to choose a partition and its operating
system.
If a choice is not made before the time clocks out, the default partition and operating system
will be loaded. If you are booting a Windows Server operating system, the Windows Boot
Loader (Winload.exe) is started.
This may happen when you manually edit Boot.ini or if you have made any changes to the disk
configuration.
If the error that appears is due to Ntdetect.com, the issue comes from the hardware .
By this time, the Windows Server 2008 “splash” screen comes up.
While this happens, the Windows Boot Loader loads the operating system kernel, the hardware
abstraction layer that provides the interface between the operating system and a particular set
of hardware, the Registry file, and the drivers for basic hardware devices, such as the monitor,
mouse, and keyboard.
Initialization
The OS kernel is initialized and takes over from the Windows Boot Loader, bringing up the
graphical display and filling the Registry with HKEY_LOCAL_ MACHINE\HARDWARE key, and
HKEY_LOCAL_MACHINE\SYSTEM\SELECT subkey (called the “Clone Control Set”) and loads the
remainder of the device drivers.
Logon
The Windows Server OS graphic user interface (GUI) comes up and the logon screen will
show.
After a successful logon, the necessary services are prompted, the Last Known Good control
set is written on the basis of the Clone Control Set, and the start-up programs are started.
1. If logon errors occurs, they are usually due to an incorrect username or password or to the
unavailability of a DNS server or a domain controller to authenticate the request (if the
computer is a part of a domain).
2. Errors can also occur if a service cannot be loaded. If a service fails to load, you will see a
message in the System Log of Event Viewer.
This lesson will briefly go through the different modules and add-ons that you may utilize for
the server.
2. Using Modules
The module is the package that contains Windows PowerShell commands. Examples of these
are ascmdlets, providers, functions, workflows, variables, and aliases.
You are able to write commands with these modules to organize commands and share with
others.
Those who will receive modules can add commands in the modules to their Windows
PowerShell sessions to use them like built-in commands.
3. List of Modules/Add-ons
The following are modules which support different functions and features in the
Windows Server OS.
4. Installing Modules/Add-ons
The following are the steps you should follow in installing modules/add-ons.
Procedure:
In the PowerShell window, type the following command and press ENTER:
In the PowerShell window, type the following command and press ENTER:
Get-Module –ListAvailable
In the PowerShell window, type the following command and press ENTER:
Get-Help Import-Module
In the PowerShell window, type the following command and press ENTER:
Import-Module ServerManager
These services need to be configured so that communication will flow easily within the
network.
You are expected to learn most of these network services and configure them.
There are seven basic network services that you need to be familiar with: remote access,
domain controller, web services, database services, proxy server, file services, and printer
services.
We will go through each of these through this lesson.
2. Remote Access
Remote access technology enables one to login to a system as an authorized user without
being physically present at the keyboard. This is common in corporate computer networks.
One of the most common form of remote access is the remote dekstop. This basically allows
a server computer can control with the actual desktop user interface of another computer.
To setup a remote desktop, both the host and target (controlling computer and remote
computer to be accessed) need to be installed certain software.
3. Domain Controller
This service is one of the most used on a Windows network. It enables one to realistiically
assess operational requirements and server performance for each computer.
It responds to security authentication requests and the like that need verification from the
host for many security and validation doors across the network.
4. Web Services
Having a web server enables hosting among websites and web-based applications. Both static
and dynamic content can be hosted on a Web server.
Several web applications that have many roles and functions can also be hosted using ASP.NET
and .NET Framework 3.0, among others.
5. Database Services
A database server is a computer program that offers database services to other computer
programs or computers, as seen in the client–server model.
The term may also refer to a computer dedicated to running such a program. Database
management systems frequently provide database server functionality.
6. Proxy Server
In computer networks, a proxy server is a server (a computer system or an application) that
acts as a middle-ground for requests from clients seeking resources from other servers.
A client connects to the proxy server, requesting some service, such as a file, connection, web
page, or other resource available from a different server and the proxy server evaluates the
request as a way to simplify and control its complexity.
7. File Services
The file services role provides essential services for managing files and the way they are
made available and replicated on the network.
Includes these role services and subservices: File Server, Distributed File System, DFS
Namespace, DFS Replication, File Server Resource Manager, Services for Network File System
(NFS), Windows Search Service, Windows Server 2003 File Services, File Replication Service
(FRS), and Indexing Service.
8. Print Services
For print servers, this resource type provides for high availability of network-attached print
devices. Printers connected directly to print servers cannot be included because there is no
way to fail over control to a different server.
If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in the
process of spooling are discarded and must be re-spooled or reprinted to the Print Spooler
resource.
You will be needing a computer installed with Windows Server 2008 R2 operating system to
perform the following procedures.
Steps/Procedure:
c. Note: Always validate the IP Address; set the IP range after the installation
• Select Roles, DHCP Server, (domain), right-click on IPv4 and select New Scope
• Select “Features”, Group Policy Management, Forest, Domains, (Domain name), right-click on
Policy, choose Edit
• Choose Policies
• Click OK