Windows previous versions documentation | Microsoft Docs.Windows Server R2 Essentials Installation Guide For Small Businesses – PDF Free Download

Share on facebook
Share on twitter
Share on linkedin

Looking for:

How to install Kaspersky Security x for Windows Server with predefined settings.

Click here to Download

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Reimagine your operations and unlock new opportunities. Prioritize investments and optimize costs. Get work done more safely and securely. How Google is helping healthcare meet extraordinary challenges.

Discovery and analysis tools for moving to the cloud. Compute, storage, and networking options to support any workload. Tools and partners for running Windows workloads.

Migration solutions for VMs, apps, databases, and more. Automatic cloud resource optimization and increased security. End-to-end migration program to simplify your path to the cloud. Ensure your business continuity needs are met. Change the way teams work with solutions designed for humans and built for impact. Collaboration and productivity tools for enterprises. Secure video meetings and modern collaboration for teams. Unified platform for IT admins to manage user devices and apps.

Enterprise search for employees to quickly find company information. Detect, investigate, and respond to online threats to help protect your business. Solution for analyzing petabytes of security telemetry.

Threat and fraud protection for your web applications and APIs. Solutions for each phase of the security and resilience life cycle. Solution to modernize your governance, risk, and compliance function with automation. Data warehouse to jumpstart your migration and unlock insights.

Services for building and modernizing your data lake. Run and write Spark where you need it, serverless and integrated.

Insights from ingesting, processing, and analyzing event streams. Solutions for modernizing your BI stack and creating rich data experiences. Put your data to work with Data Science on Google Cloud. Solutions for collecting, analyzing, and activating customer data. Solutions for building a more prosperous and sustainable business. Data from Google, public, and commercial providers to enrich your analytics and AI initiatives.

Accelerate startup and SMB growth with tailored solutions and programs. Get financial, business, and technical support to take your startup to the next level. Explore solutions for web hosting, app development, AI, and analytics. Build better SaaS products, scale efficiently, and grow your business. Command-line tools and libraries for Google Cloud. Managed environment for running containerized apps.

Data warehouse for business agility and insights. Content delivery network for delivering web and video. Streaming analytics for stream and batch processing. Monitoring, logging, and application performance suite. Fully managed environment for running containerized apps.

Platform for modernizing existing apps and building new ones. Unified platform for training, running, and managing ML models. Single interface for the entire Data Science workflow. Options for training deep learning and ML models cost-effectively. Custom machine learning model development, with minimal effort. Sentiment analysis and classification of unstructured text.

Speech recognition and transcription across languages. Language detection, translation, and glossary support. Video classification and recognition using machine learning.

Custom and pre-trained models to detect emotion, text, and more. Lifelike conversational AI with state-of-the-art virtual agents. API Management. Manage the full life cycle of APIs anywhere with visibility and control. API-first integration to connect existing data and applications. Solution to bridge existing care systems and apps on Google Cloud. No-code development platform to build and extend applications. Develop, deploy, secure, and manage APIs with a fully managed gateway.

Serverless application platform for apps and back ends. Server and virtual machine migration to Compute Engine. Compute instances for batch jobs and fault-tolerant workloads.

Reinforced virtual machines on Google Cloud. Dedicated hardware for compliance, licensing, and management. Infrastructure to run specialized workloads on Google Cloud. Usage recommendations for Google Cloud products and services. Fully managed, native VMware Cloud Foundation software stack. Registry for storing, managing, and securing Docker images. Container environment security for each stage of the life cycle. Solution for running build steps in a Docker container.

Containers with data science frameworks, libraries, and tools. Containerized apps with prebuilt deployment and unified billing. Package manager for build artifacts and dependencies. Components to create Kubernetes-native cloud-based software. IDE support to write, run, and debug Kubernetes applications. Platform for BI, data applications, and embedded analytics.

Messaging service for event ingestion and delivery. Service for running Apache Spark and Apache Hadoop clusters. Data integration for building and managing data pipelines. Workflow orchestration service built on Apache Airflow. Service to prepare data for analysis and machine learning. Intelligent data fabric for unifying data management across silos.

Metadata service for discovering, understanding, and managing data. Service for securely and efficiently exchanging data analytics assets. Fully managed, PostgreSQL-compatible database for demanding enterprise workloads. Cloud-native wide-column database for large scale, low-latency workloads. Cloud-native document database for building rich mobile, web, and IoT apps. In-memory database for managed Redis and Memcached.

Cloud-native relational database with unlimited scale and Serverless, minimal downtime migrations to Cloud SQL. Infrastructure to run specialized Oracle workloads on Google Cloud. NoSQL database for storing and syncing data in real time.

Serverless change data capture and replication service. Universal package manager for build artifacts and dependencies. Continuous integration and continuous delivery platform. Service for creating and managing Google Cloud resources. Command line tools and libraries for Google Cloud. Cron job scheduler for task automation and management.

Private Git repository to store, manage, and track code. Task management service for asynchronous task execution. Fully managed continuous delivery to Google Kubernetes Engine. Full cloud control from Windows PowerShell. Healthcare and Life Sciences. Solution for bridging existing care systems and apps on Google Cloud.

Tools for managing, processing, and transforming biomedical data. Real-time insights from unstructured medical text. Integration that provides a serverless development platform on GKE. Tool to move workloads and existing applications to GKE.

Service for executing builds on Google Cloud infrastructure. Traffic control pane and management for open service mesh. API management, development, and security platform. Fully managed solutions for the edge and data centers. Internet of Things. IoT device management, integration, and connection service. Automate policy and security for your deployments. Dashboard to view and export Google Cloud carbon emissions reports.

Programmatic interfaces for Google Cloud services. Web-based interface for managing and monitoring cloud apps. App to manage Google Cloud services from your mobile device. Interactive shell environment with a built-in command line. Kubernetes add-on for managing Google Cloud resources.

Tools for monitoring, controlling, and optimizing your costs. Tools for easily managing performance, security, and cost. Service catalog for admins managing internal enterprise solutions.

Open source tool to provision Google Cloud resources with declarative configuration files. Media and Gaming. Game server management service running on Google Kubernetes Engine.

Open source render manager for visual effects and animation. Convert video files and package them for optimized delivery. App migration to the cloud for low-cost refresh cycles. Data import service for scheduling and moving data into BigQuery. Reference templates for Deployment Manager and Terraform. Components for migrating VMs and physical servers to Compute Engine. Storage server for moving large volumes of data to Google Cloud. Data transfers from online and on-premises sources to Cloud Storage.

Migrate and run your VMware workloads natively on Google Cloud. Security policies and defense against web and DDoS attacks. Content delivery network for serving web and video content. Domain name system for reliable and low-latency name lookups. Service for distributing traffic across applications and regions. NAT service for giving private instances internet access. Connectivity options for VPN, peering, and enterprise needs. Connectivity management to help simplify and scale networks.

Network monitoring, verification, and optimization platform. Cloud network options based on performance, availability, and cost. Google Cloud audit, platform, and application logs management. Infrastructure and application health with rich metrics. Application error identification and analysis.

GKE app development and troubleshooting. Tracing system collecting latency data from applications. CPU and heap profiler for analyzing application performance. Real-time application state inspection and in-production debugging. Tools for easily optimizing performance, security, and cost. Permissions management system for Google Cloud resources. Windows Small Business Server has the following design restrictions: [27].

From Wikipedia, the free encyclopedia. Windows Server Essentials documentations. Microsoft — via Microsoft Docs. Windows Server Essentials portal. October 5, Retrieved July 11, Microsoft Technet.

Microsoft Corporation. Retrieved June 9, When you run the Winver tool you will see this reference. March 10, Retrieved August 30, Retrieved February 10, Windows Server Blog. November 13, Retrieved December 17, The Office Maven. September 7, Microsoft Windows Server Blog. All of this led to our decision to offer yet another version of on-premises server for small businesses — Windows Server Essentials. This edition will be released along with the other editions of Windows Server later this year.

Oracle Vm – Application-driven Virtualization Frequently Metasys Export Utility Help Guide – Johnson Controls table 2: metasys export utility system requirements supported operating systems windows10 pro and enterprise editions with creators update version or later bit windows8. Power Bi – Tutorials Point power bi 1 power bi is a data visualization and business intelligence tool that converts data from different data sources to interactive dashboards and bi reports.

Fujitsu Document Scanner ? Hardware Specifications – Lenel. You will be glad to know that right. Correct site preparation and evaluation is the key first step in assuring that. Mobile Printing for Business Made Easy If users know how to send an email or go to a Web address, they can print with EveryonePrint EveryonePrint is the perfect fit for any business of any size, where.

All rights reserved. Network Guidelines and Hardware Requirements To optimize performance in the IntraVet program we suggest that your network and computers follow the recommendations listed below. Doing so will help ensure. This guide details the critical points of installing the PTOS software from specific technology requirements to explicit hardware recommendations. Have Questions? ClickShare The one click wonder Collaboration made easy Improving meeting dynamics and reaching decisions faster are two of the main challenges in meeting rooms today.

Barco s ClickShare collaboration. System Requirements 1. All Rights Reserved. This documentation is an unpublished work. Hardware Requirements This guide details the critical points of installing the IntraVet software from specific technology requirements to explicit hardware recommendations. I will not provide support. Is Windows XP Pro outdated? Microsoft periodically. Company and product. Dell Wyse Cloud Connect Secure productivity from work, home, and on the go.

For personal access to all of your. Datasheet Fujitsu Cloud Infrastructure Management Software V1 Efficient infrastructure utilization, private cloud creation support, and reduced administration.

Cloud Foundation for Iaas Fujitsu supports. Laser Printer Series Windows Vista Installation Guide Before you can use the printer, you must set up the hardware and install the driver. The student information. Now, you will be. Before operating the scanner, please. This manual describes the preparation required for use of the ScanSnap. Follow the preparation.

Now, you will be happy that at this. You are recommended. BMC Track-It! Cover sheet How do you create a backup of the OS systems during operation? Google Cloud Print Guide Version A ENG Definitions of notes We use the following note style throughout this user s guide: Notes tell you how you should respond to a situation that may arise or give tips.

The information contained herein is subject to change without notice. Reproduction, adaptation, or translation without prior written.

 
 

 

Performing an in-place upgrade of Windows Server | Compute Engine Documentation | Google Cloud – Navigation menu

 

Microsoft Windows bit Apple macOS Hard Disk. When using Print Archiving off by default , a minimum of GB of free disk space is recommended. Port Requirements. Use this guide to determine how you should configure your firewall.

Mobility Print Server Requirements Optional. At least 3GB of free space recommended. Client Requirements. Printer Requirements. Mobility Print works with the vast majority of printers. The key requirement is that the printer has a print driver for the server host operating system e.

Print Release Station Requirements Optional. Web Print Sandbox Requirements Optional. At least 3GB of free space. Web Browsers. Job Ticketing Requirements. It offers a wide range of the new and updated features of the larger Standard Edition, while scaling others down to offer an affordable, easy-to-use solution perfect for a first server.

The focus of Windows Server, version lies squarely on Server Core, containers, and microservices in an effort to reduce image sizes when hosting services or migrating existing code bases. The shift from previous versions of Windows Server allows systems administrators and developers to deploy containerized images that have been reduced dramatically and further optimized, while providing modernized security to protect virtual machines VMs , encrypt network transmissions using software-defined networking , and provide enhanced storage and disaster recovery protection through failover and replication features.

Consolidation of servers through virtualization will increase ROI on newly purchased hardware, while lowering the overall resources used by decommissioning previous physical servers.

Windows Containers will allow for multiple applications to be hosted from the server with finite resources, essentially allowing corporations to do more with less. If your enterprise is hosting its own private cloud, or transitioning to a public or a hybrid cloud setup, the additional security included with Active Directory Federated Services along with Nano Server technologies will keep unauthorized access to a minimum while permitting authorized users to access necessary applications, data, and intranet sites.

Windows Server, version primarily affects systems and server administrators, especially those tasked with managing virtualized infrastructures. The move to add Linux support and management of Linux servers, including container support will also affect Linux admins that run mixed networks in a hybrid format for both Linux and Windows.

To a lesser degree, users will be affected given the move to virtualization and containerization of web-based software applications, legacy applications, and how the technology allows for faster deployment and better performance—even on existing hardware.

As subsequent improvements were made, additional TPs were released for public download; TP4 was made available on November 19, General availability to all Microsoft software partners rolled out on October 12, with build number Additional fixes were made available to correct minor issues reported during the Technical Preview period, including Start Menu and Login screen adjustments to correct corruptions.

Also, Windows Store apps have been removed, by default, resulting in a cleaner installation. Since the codebase is common, Windows Server inherits most of the technical , security , management and administrative features new to Windows Vista such as the rewritten networking stack native IPv6 , native wireless, speed and security improvements ; improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as BitLocker and address space layout randomization ASLR ; the improved Windows Firewall with secure default configuration;.

NET Framework 3. Processors and memory devices are modeled as Plug and Play devices to allow hot-plugging of these devices. Windows Server includes a variation of installation called Server Core. Server Core is a significantly scaled-back installation where no Windows Explorer shell is installed. It also lacks Internet Explorer , and many other non-essential features. All configuration and maintenance is done entirely through command-line interface windows, or by connecting to the machine remotely using Microsoft Management Console MMC.

Notepad and some Control Panel applets, such as Regional Settings, are available. Server Core can also be used to create a cluster with high availability using failover clustering or network load balancing. Windows Server offers high availability to services and applications through Failover Clustering. Most server features and roles can be kept running with little to no downtime. In Windows Server , the way clusters are qualified changed significantly with the introduction of the cluster validation wizard.

With the cluster validation wizard, an administrator can run a set of focused tests on a collection of servers that are intended to use as nodes in a cluster. This cluster validation process tests the underlying hardware and software directly, and individually, to obtain an accurate assessment of how well failover clustering can be supported on a given configuration.

Hyper-V is hypervisor -based virtualization software, forming a core part of Microsoft’s virtualization strategy. It virtualizes servers on an operating system’s kernel layer. It can be thought of as partitioning a single physical server into multiple small computational partitions.

Hyper-V includes the ability to act as a Xen virtualization hypervisor host allowing Xen-enabled guest operating systems to run virtualized. Also, a standalone variant of Hyper-V exists; this variant supports only x architecture.

It provides resource management and can be used to control the amount of resources a process or a user can use based on business priorities. Process Matching Criteria , which is defined by the name, type or owner of the process, enforces restrictions on the resource usage by a process that matches the criteria.

CPU time, bandwidth that it can use, number of processors it can be run on, and allocated to a process can be restricted. Restrictions can be set to be imposed only on certain dates as well. Server Manager is a new roles-based management tool for Windows Server Server Manager is an improvement of the Configure my server dialog that launches by default on Windows Server machines.

However, rather than serve only as a starting point to configuring new roles, Server Manager gathers together all of the operations users would want to conduct on the server, such as, getting a remote deployment method set up, adding more server roles etc. Support for the RTM version of Windows Server ended on July 12, , [3] [4] and users will not be able to receive further security updates for the operating system.

As a component of Windows Vista, Windows Server will continue to be supported with security updates, lasting until January 14, , the same respective end-of-life dates of Windows 7. Microsoft planned to end support for Windows Server on January 12, However, in order to give customers more time to migrate to newer Windows versions, particularly in developing or emerging markets, Microsoft decided to extend support until January 14, Windows Server can be upgraded to Windows Server R2 on bit systems only.

Most editions of Windows Server are available in x and IA variants. As such, it is not optimized for use as a file server or media server. Windows Server is the last bit Windows server operating system.

The Microsoft Imagine program, known as DreamSpark at the time, used to provide verified students with the bit variant of Windows Server Standard Edition, but the version has since then been removed. However, they still provide the R2 release. Windows Server Foundation Released on May 21, Windows Server shares most of its updates with Windows Vista due to being based on that operating system’s codebase.

A workaround was found that allowed the installation of updates for Windows Server on Windows Vista, [40] adding three years of security updates to that operating system Support for Windows Vista ended on April 11, , [41] while support for Windows Server ended on January 14, Due to the operating system being based on the same codebase as Windows Vista and being released on the same day as the initial release of Windows Vista Service Pack 1 , the RTM release of Windows Server already includes the updates and fixes of Service Pack 1.

Service Pack 2 was initially announced on October 24, [42] and released on May 26, For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.

Copy llJ t a ri www. Not all content that is available in standard print versions of this book may appear or be packaged in all book formats. For more information about Wiley products, visit us at www. All other trademarks are the property of their respective owners. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching. Sybex was founded in More than 30 years later, we’re still committed to producing consistently exceptional books.

With each of our titles, we’re working hard to set a new standard for the industry. From the paper we print on, to the authors we work with, our goal is to bring you the best books available.

I hope you see all that reflected in these pages. I’d be very interested to hear your comments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sy bex book by sending me an email at nedde wiley. Customer feedback is critical to our efforts at Sy bex. She is living proof there are angels among us. Acknowledgments I want to thank the entire editing and production staff that has helped to make this book as good as it can possibly be.

That includes Kelly Talbot, my development editor, who gave me great advice beyond simply grammar and style. I took full advantage of all his years of experience as an editor. I also would like to thank the technical editor, Leslie Herron, who saved me from myself a number of times.

It is so comforting to know that someone with deep technical knowledge is looking over your shoulder. A special thanks goes to Jeff Kellum for recommending me for this book and to Agatha Kim, the acquisition editor, for selecting me for this book and helping to guide me through the entire process.

After achieving his MCSE, he became a network administrator in the Atlanta office of a global manufacturer of electric motors. In , Troy started delivering corporate training for New Horizons in Atlanta.

In , Troy started his own training company while continuing with New Horizons on a contract basis and also teaching at various colleges and technical schools in the Atlanta area. His work includes Microsoft, but he is the principal Cisco writer. This guide provides resources and helpful hints for career changers considering this field. Troy began contributing to and providing technical edits for Sybex books in He also created and edited textbooks for Penn Foster on Apple computers, basic troubleshooting, and mobile devices.

Prior to his career in IT, Troy was a professional musician. From to , he recorded and performed with many of his own bands and as a backup musician for acts including Vassar Clements and Delbert McClinton. He worked for a number of years as a session musician and songwriter in Nashville as well. Troy lives with his wife, Heike, and a house full of dogs, cats, birds, and fish in Atlanta, Georgia.

Introduction This book is designed to fill a gap that has existed for some time in technical books and instructional materials covering networking in general and Cisco technology in particular. As a trainer, I have struggled to find materials that strike a middle ground between basic networking texts and books that jump immediately into certification-level topics that many readers and students are not prepared to digest. There will always be a market for books designed to present and review certification-level topics to those who are already familiar with the knowledge required to understand those topics.

In today’s economic times, however, there is a whole new breed of students who are either taking classes or operating in a self-study capacity but do not have this prerequisite knowledge and may not even realize this as they attempt to tackle certification-level classes and books. I have seen these students in my classes over the years.

They are no less intelligent or motivated than the students who have more background and experience. But at the pace at which these books and classes must move to cover all the material, they soon find themselves struggling. Some even give up entirely. This book covers all of the basic knowledge required for you to really understand routing and switching. It provides the required amount of time for you to digest the fundamentals before moving on to actually setting up and configuring the routers and switches and seeing them operate.

It does not attempt to cover every bell and whistle that these devices offer, nor does it cover every topic that is on a Cisco CCENT exam. What it does do is provide all of the basic network knowledge from a Cisco perspective.

That is the goal of this book and was our guiding principle throughout its creation. Who Should Read This Book This book is designed for anyone wishing to gain a basic understanding of how networks operate and how Cisco devices in particular fulfill their roles in the process.

Chapter 2, “The OSI Model,” explains the purpose of reference models, introduces the layers of the OSI model, and describes how the layers relate to the encapsulation process.

Chapter 4, “Protocols,” describes the function of protocols in networking and surveys various protocols that operate at each layer of the TCPIIP model. Chapter 5, “Physical and Logical Topologies,” defines the meaning of a topology in networking and describes the main physical and logical topologies.

Chapter 6, “Numbering Systems,” explains the main numbering systems of importance in networking, the binary and hexadecimal systems, and how they are converted to and from the decimal system. Chapter 9, “Media,” begins with a brief description of media types, explains cable behaviors and characteristics, and ends with a survey of the types of cables and their proper use.

Chapter 10, “Network Devices,” describes the functions of the various devices found in a network and explains design principles guiding their placement. Chapter 11, “LAN Operations,” explains both the routing and the switching process and describes how they fit together in end-to-end communication.

Chapter 12, “Managing the Cisco lOS,” introduces the components of the Cisco operating system , describes the boot process of a router or switch, and describes how to navigate the command-line interface. Chapter 13, “Configuring Routers,” explains how to get a router operational, including cabling the router, logging into the lOS, securing the router, and configuring its interfaces.

Chapter 14, “Configuring Switches,” explains how to get a switch operational, including cabling the switch, logging into the lOS, securing the switch, configuring its switchports, and creating and managing VLANs. Chapter 16, “Configuring Dynamic Routing,” introduces how dynamic routing functions, explains the types of routing protocols, and describes how to configure an example of each. The answers to the Review Questions can be found in the book’s Appendix.

Please vtstt the book’s companion website www. You can reach me by writing to mcmillantroy hotmail. Sybex strives to keep you supplied with the latest tools and information you need for your work. Please check their website at www. It’s impossible to escape them in the modem world in which we live and work. We use them at work, at home, and even in between, in places like our cars, the park, and the coffee shop.

We have come to take them for granted in the same way we treat electricity and hot water. Cisco routers and switches play a critical role in networks’ successful operation.

This opening chapter lays the foundation required to understand all the details that make networks function. As incredible as it may seem now, for a number of years, when computers first came into use, very few computers were networked. They operated as little islands of information with no connection to one another. This process is now sometimes jokingly referred to as the sneakernet. Modem networks can include many components.

Some of the most basic components are computers, routers, and switches. Figure shows some Cisco routers and switches. Routers are used in a network to transfer information between computers that are not on the same network.

Routers are capable of doing this by maintaining a table of all networks and the routes directions used to locate those networks. Switches come in two varieties. Layer 2 svvitches simply connect computers or devices that are in the same network. Layer 3 switches can do that but are capable of acting as routers as well. Two models of routers are depicted in Figure , with a switch in the middle of the stack.

Routers and switches are covered in depth in Chapter 10, “Network Devices. Defining the Benefits of Networks There are many benefits to networks, one of which was touched on in the introduction to this section: using a network makes sharing resources possible without putting on your sneakers and leaving your seat.

If it can be put on a hard drive, it can be shared. Additional benefits are included in the following list Resource Sharing Resource sharing is less earthshaking at home, but in the workplace it was a key element that drove the adoption of PCs.

Other computer types such as mainframe computers and dumb terminals were already in use, but were seen as specialized pieces of equipment to be used only by guys in lab coats and some other geeky types. There were other reasons for the PC revolution, but resource sharing helped to increase productivity. As an example, 10 coworkers could access a file on the network at the same time, which eliminated the time and effort spent burning, labeling, transporting, and storing 10 floppies.

The term resource is used extensively when discussing networking and simply refers to anything that a user on one computer may want to access on a different computer. Examples include files , folders, printers, and scanners. Reduced Cost and Easier Installation of Software Another advantage for business that didn’t become apparent as quickly as resource sharing was a reduced cost of software.

Many software products are sold to organizations on a network basis. For example, instead of buying 25 retail versions of word processing software, a single copy can be purchased for the network and then a number of seat licenses can be added to the bundle.

The result is a significant savings to the company. This capability relieves IT staff from having to physically visit each machine with CD in hand to perform the installation. Shared resources can be secured with restrictions on who can access them and what exact access each individual possesses. So you can share a file on your computer but share it with only two of your coworkers, and not all of them. Moreover, you could allow one coworker to only read the document while the other could be allowed to edit or even delete the document.

This type of control was difficult when files were shared on floppies. After the floppy left your hand, it was out of your control.

Computer networks can enforce security controls among the computers and users. Improved Communications It’s hard to even imagine today ‘s workplace without email, instant messaging, video chatting, and conferencing, but 25 years ago, these tools did not exist. In today’s world, almost no communication can wait for regular postal mail this service that we once depended on is now often called snail mail.

Even more impressive is that distance is no obstacle. You can chat online with someone in India or China as easily as with a fellow worker sitting in the next cubical!

Now think of all the paper that is being saved that used to be consumed by companies sending regular mail to one another. Email systems can be configured to maintain a copy of every email sent, and documents that used to exist in multiple physical copies now reside as a single digital copy on a server and probably also on a backup tape. Meetings that used to require plane trips and hotel stays can now be held online with all participants able to see one another, share documents, view slides or documents from the presenter, and even hold votes and surveys.

The only consideration is time zones! More Workplace Flexibility Users are no longer physically tied to the same computer. If resources are stored on servers, as they are in most organizations, a computer problem no longer renders a user unable to work.

In a domain-based network more on that later in this chapter in the section “Understanding Client-Server Networks” , the user can move to any other computer that is a member of the domain, access his files on the server, and continue to work while his computer is repaired or replaced.

Building on this idea, workers are increasingly telecommuting as they can use the Internet to connect to the work network and operate as if physically present in the office. Telecommuting means working from another physical location, usually from home.

It saves gas, time, and in many cases results in more productivity on the part of the worker. Reduced Cost of Peripherals When users can share printers, scanners, and fax machines, usually fewer devices are needed. This reduces costs for the organization. Sharing these devices also offloads the responsibility for managing and maintaining these shared devices. Peripherals are any devices that operate in conjunction with the computer yet reside outside the computer’s box.

Examples include the display, mouse, keyboard, printer, camera, speakers, and scanners. Centralized Administration Although not possible in a peer-to-peer network, in a domain-based network, all computer administration is centralized. Domain controllers do more than provide security. They also serve as the directory of the resources available on the network. This is why these services are called directory services. Peer-to-peer networks, domain-based networks, and LANs are explained throughout the rest of this chapter.

Directory Assistance, Please! Directory services, such as Active Directory by Microsoft, help users to locate files, folders, and other resources in the network. Identifying the Requirements for a Network A network cannot be called a network if it does not meet certain requirements. The coverage of the last two bullet points is somewhat brief as transmission mediums are discussed in Chapter 9, “Cabling,” and protocols communications agreements are covered in detail in Chapter 4, “Protocols.

A single computer doesn’t need a network to access the information on its own hard drive. A Resource That Can Be Shared You already know from our earlier discussion that resources are anything that needs to be shared.

This can include physical entities such as printers and scanners, or it can be files and folders located on another computer, as shown in Figure If it can be shared and moved from one computer to another, it can be considered a resource. The most common form is a cable, but wireless communications are becoming increasingly widespread because of certain advantages to this approach.

Both methods are shown in Figure Do I Need a Ouija Board? It can be bounded via a cable or boundless wireless. A Communications Agreement One of the main stumbling blocks present when computers were first being networked was a language problem. As you know, two people who need to converse cannot do so unless they speak a common language. Likewise, computers have to be speaking the same language in order to have a communications agreement. Networking languages are called protocols.

Protocols are discussed in Chapter 4. I can’t understand you? Workstation 2 I have some data for Workstation 2. I’m Workstation 2. Workstation 3 Before the standardization of network protocols, brought about by the explosion of the Internet and the introduction of reference models such as the OSI and the DoD models, computers from different vendors could not be networked together because they used proprietary and dissimilar network protocols.

Repeaters are devices designed to regenerate or strengthen transmission signals to avoid attenuation or weakening of the signal, which leads to data corruption. Hubs are junction boxes with no intelligence that are used to connect devices together on the same physical network.

Switches can act as hubs but provide vastly improved performance and offer additional functions not available in hubs. Routers, as discussed earlier, are used to connect networks and allow computers located on different networks to communicate.

Cisco routers and switches are intelligent because of the Cisco Internetwork Operating System lOS , which is included in and is used to manage the functions of these products. Standard The term proprietary, used often in the IT world, refers to any process or way of doing something that works only on a single vendor’s equipment. The opposite of this is a standard, which is any way of carrying out a function that the industry has agreed upon. An everyday example of a standard is the ubiquitous wall socket.

A standard was developed so that consumers could be assured that any electrical device would match this standard outlet type.

As the next few chapters unfold, you will gain new perspectives about these requirements as you learn more about the details of each. Now let’s look at some characteristics of various types of networks.

Classifying Networks by Function Networks can be classified according to a number of different characteristics. They can differ based on location, and they can differ in the security relationship that the computers have with another. These are not the only ways networks can differ, but they are commonly used distinctions.

In some treatments of this subject, the difference lies www. Because this text is designed to prepare you to manage Cisco routers and switches, a Cisco perspective is appropriate. Cisco defines a LAN as a high-speed data network covering a small geographical area. For the purposes of this discussion, a LAN is a single physical location, which could be a part of a building, an entire building, or a complex of buildings.

In the vast majority of cases, the network will use a networking technology called Ethernet. Other technologies do exist such as one called Token Ring , but Ethernet has become the de facto standard technology that is used for connecting LANs. In the networking world, there are two types: official and de facto.

An official standard is one that all parties agree to and is usually adopted by a body formed to create standards, such as the International Organization for Standardization ISO. A de facto standard, on the other hand, is one that becomes the standard simply by being the method that all parties gradually choose to use over a period of time, without a formal adoption process. Ethernet networks are typically built, owned, and managed by an organization.

It is impractical for the organization to connect offices in two cities with Ethernet cabling for many reasons that will be discussed later, one of which is a limit on cable length of about ft. In a LAN, all of the computers are connected with a high-speed connection.

High speed is a relative term, but in this case, it indicates at least 10 Mbps. In most cases today, the connection will be either Mbps or 1, Mbps.

Cables are discussed in Chapter 9. In the previous section, the impracticality of a company strung together by private Ethernet lines from one office to another was mentioned.

Above and beyond the cable length issue, there would be issues of where to place the cables and how to maintain them. The advantage to this approach is that your connection is dedicated, meaning there is no other traffic on it. WAN technologies do not use Ethernet. WAN technologies are beyond the scope of this book. For more information, simply search for WAN methods on the Internet. Another available option is to use the Internet. When this approach is taken, the company creates a logical connection called a virtual private network VPN between the offices by using the Internet as the physical medium.

It is called private because the information that crosses the Internet from one office to another is typically encrypted so that if it is intercepted, it cannot be read. The relationship between the two network types is illustrated in Figure The security relationships that exist among the computers on the network can define different architectures.

In this section, the difference between peer-to-peer and client-server architectures is explored. This type of network is often referred to as a workgroup. There are certain shortcomings to this paradigm. In a workgroup, a user can access resources on another computer only if that user has an account on the computer where the resource resides. Moreover, depending on how the sharing is set up, she may also have to identify herself and provide a password to access the resource.

The ramifications of this can be illustrated with an example. Suppose you have four computers in an office that are used by four different users.

If your goal is to allow all users to access resources located on all four computers, you would have to create an account for each person on all four computers. That means you would be creating 16 accounts in all 4 computers x 4 people. That’s a lot of work!

I guess it’s a form of job security! Figure illustrates this situation. Each computer is named after its user, and as you can see, all users must have an account on all computers. Also note each user can be given different levels of access. A user can have the same password on all computers, or a different password on each computer, with no effect on functionality because they are not related to each other in any way in a peer-to-peer network.

First, because of the nature of the communication process that occurs in a workgroup, traffic overwhelms the physical infrastructure, and the network gets very slow. This occurs because in order to locate each other, the computers must broadcast for one another.

A broadcast is akin to a person calling out in a crowded room, “Who is Joe? In Figure , workstation 10 is seeking to connect to a computer named Bannarama, so a broadcast is sent out to every computer.

Then Bannarama answers with its IP address. Moreover, unlike humans, the computers can remember who is vvho for only a minute or so, and then they must broadcast again. The second problem that occurs when more than 10 computers are present in a peer-to-peer network has to do with the design of client operating systems.

Most client operating systems meaning any operating system that is not a server operating system can host only 10 concurrent connections from other computers at a time. So if a popular file is located on a computer in a workgroup, and 10 computers are already connected, the 11th computer won’t be able to access the resource until a computer disconnects!

An IP address is a number in a specific format that is used to identify a computer. My address is Workgroups still have their place and their advantages. One is low cost when compared with a client-server network.

Obviously, no servers which cost more than client computers need to be purchased. Workgroups are also quite simple to set up when compared with client-server networks. Home networks are usually peer-to-peer, and many small office and home office SOHO networks function well as workgroups.

As discussed earlier, each user must have an account on every computer that he will use or access over the network. This brings up an issue that needs to be addressed before you encounter it. There are two explanations of a client-server network that are commonly used. Both are applicable, so let’s cover both. First, a client-server network can be explained in terms of resource access. When viewed from this perspective, it means that the shared data is centralized on a device called a file server.

What’s the Difference between a Client and a Server, Anyway? Which computer is the client and which is the server is simply a matter of perspective. If the computer is seeking to access a resource on another computer, it is acting as a client. If it possesses a resource that another computer accesses, it is acting as a server. Consequently, computers in a peer-to-peer network will be acting as either at various times, depending on whether they are accessing a resource or allowing access to a resource.

A file server is a computer that contains resources files that users in the network need. A server’s operating system is designed differently than one that will be used on client computers.

It is not bound by a limit to the number of connections. Hundreds of computers can connect. The advantage is that the security surrounding the resources can be centralized on that server. Using our example from Figure , if there was a file server in that network, we would not have to create an account for every user on all computers.

We would have to do that only one time, on the server where the resources are located. These networks are sometimes called domain-based networks. In this case, the server is a special type of server called a directory server or domain controller. A directory server or domain controller maintains the location of all resources in the network including the computers themselves and the locations of each. The computers in the network use this server to find things.

Instead of broadcasting to find resources, the computers check with the directory server, which results in a great reduction of traffic! The domain controller creates a group security association between the computers that are members of what is commonly called a domain or a realm in Unix. After a user is made a member of the domain, the user will have two types of user accounts: a local account on her computer, as she had in the peer-to-peer network, and a domain account.

The domain account will be created on the domain controller where it will be stored. This domain account will allow the user to log into the domain from any computer that is a member of the domain. This simplifies the account creation process in the same way illustrated in the explanation of using a file server. The accounts are created one time on the domain controller, and then the account will work on any computer in the domain.

The domain controller, rather than the individual computers, is responsible for validating the credentials of users. Whenever a user logs into the domain from a member computer, the login request is sent to the domain controller, which verifies the name and password and then sends the user an access token.

An access token is a file that lists the resources that the user is allowed to access in the network, regardless of where the resource is located. The benefit of this security paradigm is a feature called single sign-on. It doesn’t even matter which computer the resource is on! On other hand, there are disadvantages to implementing a client-server network.

 
 

Vamtam
Vamtam

Lorem ipsum dolor sit amet consectetur adipiscing elit dolor