ICT-CSS12 Q2 Mod3 SettingUpComputerServer
ICT-CSS12 Q2 Mod3 SettingUpComputerServer
ICT-CSS12 Q2 Mod3 SettingUpComputerServer
Quarter 2, Module 3
2. One of the main disadvantage of using server/client systems is the cost such
as:
Maintenance cost
Training cost
Hardware cost
Software cost
a. True
b. False
4. The printer services role provides essential services for managing files and
the way they are made available and replicated on the network.
a. True
b. False
5. This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer.
a. Domain Controller
b. Remote Access
c. Web Services
d. File Services
a. True
b. False
10. The Server is the process which provides requested services for the Client.
a. True
b. False
LESSON 1: Understanding the "Server" and
"Client"
Introduction
To understand this, this module will run you through how computer networks are
connected in sharing information and resources through servers and clients.
Since you've just learned about networks in the previous module, the
computer server will be an example of a network that you will be working with
in the workplace.
This lesson will run you through the client/server network model. You will be able to
enumerate the various functions of the client/server model and as well as discuss
their different topologies.
TOPIC 1: Client/Server
Client - any process that requests specific services from the Server.
Advantages
Performance and reduced workload
Workstation independence
System interoperability
Scalability
Data integrity
Data accessibility
System administration (Centralized management)
Integrated services
Sharing resources among diverse platforms
Masked physical data access
Location independence of data processing
Reduced operating cost
Reduced hardware cost
Communication costs are reduced
Disadvantages
Maintenance cost
Training cost
Hardware cost
Software cost
Complexity
ACTIVITY 1.1. EXPLAIN THE IMPORTANCE OF CLIENT SERVER SET UP. WRITE YOUR
ANSWER IN A SHORT BOND PAPER.
LESSON 2: Creating User Folder
Introduction
In this lesson, you will learn how to create a user folder with Network Operating
System, or NOS, features.
Basically, a user folder is the storage of files stored by the user to the
computer server.
To install the ADDS, the administrator should open command prompt (Ctrl + R
then cmd), and type dcpromo to install ADDS, DNS, and create a forest and
domain.
Features of ADDS
1. Security - The data is stored securely. Each of the objects in the Active Directory
has an ACL or Access Control List which consists of the resources that one may
access and along with access privileges given to each resource.
4. Extensibility - Having ADDS is extensible. Meaning that new object types can be
added to a directory. An attribute can be added, for example to the user object.
Once a user is created, a user folder is also automatically created upon the log-in of
the user to the client computer.
This topic will teach you how to create a user folder with network operating system
(NOS) features.
You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10) connected through a
network cable.
1. On the server computer create a shared folder on drive C: or drive D:
2. On server manager, select Features, Group Policy Management, Forest,
Domains, (Domain name), Right click on Policy, Edit
3. Chooser User Configuration, Choose Policies
4. Choose Windows Setting
5. Choose Folder Redirection
6. Choose your directory to be redirect, press right click on your mouse and select
properties
7. Target Setting: Choose Basic
8. Under Root Path, type the share name of your folder
9. Click OK
10. Log-in to the client computer to automatically create User folder
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Adding Roles
Follow the step-by-step procedures on how to add roles in the ADDS .
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
ACTIVITY 2.1
A. WRITE THE PROCEDURE IN SITTING UP STATIC IP ADDRESS.
B. WRITE THE PROCEDURE IN CONFIGURING THE ACTIVE DIRECTORY DOMAIN
SERVICES
C. WRITE STEP-BY-STEP PROCEDURES ON HOW TO ADD ROLES IN THE ADDS.
D. WRITE THE PROCEDURE IN CREATING AN ORGANIZATIONAL UNIT & USER
LESSON 3: Configure User Access
Introduction
In the workplace, computers are not used by an individual for personal use.
Computers are usually accessed by more than one person. System administrators
are able to log on locally if these accounts are in the domain.
Each user in the network has a unique user account which contains the
contact details of the users as well as what his/her rights and restrictions in
accessing resources/folders, etc.
Password Security
Permissions
These are access privileges granted to a user account (e.g. group memberships,
user-specific settings to access resources, etc.)
Identification
Having a user account means easily identifying the person to the computer system
and network.
User Rights
Having user rights is a high-level privilege given to users or groups to define their
action on a computer system.
Roaming
The administrator may define user accounts in a way that a user is able to log on to
any system which is a memer of a domain using a domain user account, a Remote
Access Service (RAS), or gateway.
Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and
user environment in general. They are specifically restricted through the use of
mandatory profiles.
Auditing
The server can track access and use by domain user accounts.
This topic will teach you how to configure user access level based on NOS
features and established network policies and end-user requirements.
You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10) connected through a
network cable.
1. To get to Active Directory Users and Computers, choose Start> All Programs >
Administrative Tools > Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization
unit to which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
4. On the Members tab, Click Add.
5. Fill in the following information.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by
retyping it.
8. Configure the password setting using the options described.
9. Click the Next button when you’re finished marking your selections.
10. Click the Finish button if everything is correct.
1. One of the main disadvantage of using server/client systems is the cost such
as:
Maintenance cost
Training cost
Hardware cost
Software cost
a. True
b. False
2. The Server is the process which provides requested services for the Client.
a. True
b. False
3. Before creating a user folder, the administrator of the server should first install
the Active Directory Domain Services (ADDS) and create a user account.
a. True
b. False
4. The network is the medium in which the server and client connects.
a. True
b. False
Some issues may be easily diagnosed and corrected however, take note that not all
server errors occur only during booting. It can also occur when it is running or even
when the server is shutting down.
1. Pre-boot
2. Boot
3. Load
4. Initialization
5. Log-on
In each stage, there are steps that should be followed in loading and using files. In
each of these stages, observe how the process works, how the particular files are
utilized, and what is seen on screen.
1. Preboot
Pre-boot is basically the BIOS startup process.
The BIOS shall execute the Initial Program Load where the boot devices are read
and prioritized.
The partition information is seen as well as the boot sector and the Windows Boot
Manager. You will also see the memory check, hardware, and boot device search.
Corrupt MBR
This is caused by many viruses in the Master Boot Record which corrupted it.
This happens when the hard drive is not recognized. This error can happen even if
the device is fine and the configuration is unchanged.
This may happen if the Fdisk utility is recently used and no partition is made from all
the free space available.
This may happen when the Ntldr file is corrupted or deleted by a virus.
2. Boot
Windows Boot Manager reads the boot configuration data (BCD). But in the case of
having more than one boot partition, it prompts the user to choose a partition and its
operating system.
The following are common causes of error during this stage:
Missing or corrupt files
If Ntldr, Boot.ini, Bootsect.dos, Ntdetect.com, or Ntoskrnl.exe is corrupt or
missing either by a virus or by some malicious intent, the boot sequence will
not succeed. An error message will indicate which file is missing or corrupt.
Improperly configured Boot.ini file
This may happen when you manually edit Boot.ini or if you have made any
changes to the disk configuration.
Unrecognizable improperly configured hardware
If the error that appears is due to Ntdetect.com, the issue comes from the
hardware.
By this time, the Windows Server 2008 “splash” screen comes up.
While this happens, the Windows Boot Loader loads the operating system kernel,
the hardware abstraction layer that provides the interface between the operating
system and a particular set of hardware, the Registry file, and the drivers for basic
hardware devices, such as the monitor, mouse, and keyboard.
Initialization
The OS kernel is initialized and takes over from the Windows Boot Loader, bringing
up the graphical display and filling the Registry with HKEY_LOCAL_
MACHINE\HARDWARE key, and HKEY_LOCAL_MACHINE\SYSTEM\SELECT sub
key (called the “Clone Control Set”) and loads the remainder of the device drivers.
Logon
The Windows Server OS graphic user interface (GUI) comes up and the logon
screen will show.
After a successful logon, the necessary services are prompted, the Last Known
Good control set is written on the basis of the Clone Control Set, and the start-up
programs are started.
1. If logon errors occur, they are usually due to an incorrect username or password
or to the unavailability of a DNS server or a domain controller to authenticate the
request (if the computer is a part of a domain).
2. Errors can also occur if a service cannot be loaded. If a service fails to load, you
will see a message in the System Log of Event Viewer.
Introduction
One must be able to load modules and add-ons so that you can access their
functions. Modules will contain other modules. But however, modules are
independent and can be used without the other depending on the needs of the
server.
This lesson will briefly go through the different modules and add-ons that you may
utilize for the server.
List of Modules/Add-ons
The following are modules which support different functions and features in the
Windows Server OS.
1. Active Directory module
2. Active Directory Rights Management Services module
3. Active Directory Rights Management Services Administration module
4. Application ID Policy Management module
5. Best Practice Analyzer module
6. Background Intelligent Transfer Service (BITS)
7. Failover Clusters module
8. Group Policy module
9. Network Load Balancing Clusters module
10. Remote Desktop Services module
11. Server Manager module
12. Server Migration module
13. Internet Information Services (IIS) module
Procedure:
In the PowerShell window, type the following command and press ENTER:
In the PowerShell window, type the following command and press ENTER:
Get-Module –ListAvailable
Step 3: Load the ServerManager module into the current session
In the PowerShell window, type the following command and press ENTER:
Get-Help Import-Module
In the PowerShell window, type the following command and press ENTER:
ACTIVITY 2.1. WHAT ARE THE DIFFERENT MODULES AND ADD-ONS THAT
YOU MAY UTILIZE FOR THE SERVER.
LESSON 3: Performing Network Services
Introduction
When you are managing a NOS or Network Operating System, you should know
there are different network services that are available.
These services need to be configured so that communication will flow easily
within the network.
You are expected to learn most of these network services and configure them.
There are seven basic network services that you need to be familiar with: remote
access, domain controller, web services, database services, proxy server, file
services, and printer services.
We will go through each of these through this lesson.
One of the most common form of remote access is the remote desktop. This
basically allows a server computer can control with the actual desktop user
interface of another computer.
To setup a remote desktop, both the host and target (controlling computer and
remote computer to be accessed) need to be installed certain software.
TOPIC 2: Domain Controller
This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer.
Having a web server enables hosting among websites and web-based applications.
Both static and dynamic content can be hosted on a Web server.
Several web applications that have many roles and functions can also be
hosted using ASP.NET and .NET Framework 3.0, among others.
The term may also refer to a computer dedicated to running such a program.
Database management systems frequently provide database server functionality.
TOPIC 5: Proxy Server
The file services role provides essential services for managing files and the way
they are made available and replicated on the network.
A number of server roles require some type of file service.
Includes these role services and subservices: File Server, Distributed File System,
DFS Namespace, DFS Replication, File Server Resource Manager, Services for
Network File System (NFS), Windows Search Service, Windows Server 2003 File
Services, File Replication Service (FRS), and Indexing Service.
If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in
the process of spooling are discarded and must be re-spooled or reprinted to the
Print Spooler resource.
You will be needing a computer installed with Windows Server 2008 R2 operating
system to perform the following procedures.
Steps/Procedure:
• Select Roles, DHCP Server, (domain), right-click on IPv4 and select New Scope
• Write a new scope name
• Set your IP Address range
• Skip on IP add Exclusions
• Set Lease Duration
• Choose YES for Configure DHCP Options
• Skip on the next procedures
• Activate the scope now
Task 4: Create Folder Redirection
Folder Sharing
Follow the step-by-step procedures on how to configure folder sharing where
folders across a network are shared to all connected devices.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Folder Redirection
Follow the step-by-step procedures on how to redirect folders across a network.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
3. The printer services role provides essential services for managing files and
the way they are made available and replicated on the network.
a. True
b. False
6. The Server is the process which provides requested services for the Client.
a. True
b. False
7. One of the main disadvantage of using server/client systems is the cost such
as:
Maintenance cost
Training cost
Hardware cost
Software cost
a. True
b. False
a. True
b. False
10. This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer.
a. File Services
b. Web Services
c. Domain Controller
d. Remote Access