CCNA & MCITP Project
-
Upload
harpreet-singh -
Category
Documents
-
view
39 -
download
0
description
Transcript of CCNA & MCITP Project
-
7/18/2019 CCNA & MCITP Project
1/139
CHAPTER 1
INTRODUCTION
1.1 Introduction In todays rapidly changing IT marketplace, Microsoft Certificationsare
designed to play an important role in assisting the IT professional to utilize advancing
technologies, fine tuning troubleshooting skills and improving job satisfaction. This
certification from Microsoft confirms your demonstrated experience and knoledge in using
Microsoft products and solutions.
The MCITP!Microsoft "ertified IT #rofessional$ certification is the %big certification from
Microsoft designed to validate a professionals proven job role capabilities. &ith the MCITP
certification, an individual can be distinguished as an IT professional ith the comprehensive
set of Microsoft technologies ' skills necessary to perform a particular job role. The MCITP
certificationcan highlight your field of expertise since there are several concentrations ithin
this one certification.
1.2 Necessity
(ften, departmental shared computers on campus have only one or to user accounts) there is
alays one for everyday users, and there may be a second for an administrator. The everyday
users share the same passord and logon, and this can cause problems. *or example, any user
ho changes a setting !anything from the desktop allpaper, to broser settings, to saved
internet passords$ changes that setting for everyone else ho logs into that computer after
they do. It is also difficult to ensure that users ith different campus roles have differing levels
of access to programs, files, and settings.
If you maintain shared computers, using the a campus+ide service called as ctive -irectory
!also called the as -$ can save you a great deal of time by aiding in keeping softare up to
1
-
7/18/2019 CCNA & MCITP Project
2/139
date, keeping each users files and settings separate from other users files and settings, and
alloing users to log on using Identity key credentials that they already kno. It can also help
you to allo one group of people !for instance, faculty and staff$ to access certain programs
and files hile keeping those programs and files hidden from another group !for instance,
students$, depending on hat fits your departments needs. ll IT labs use something similar
to the ctive -irectory to ensure that users can log on using the same Identity key and
passord no matter here they go on campus
1.3 O!ecti"es
The Microsoft "ertified IT #rofessional) erver dministrator !M"IT#) erver dministrator$
credential is the leading certification for &indos erver /001, providing idely recognized,
objective validation of your ability to perform critical, current IT job roles by using Microsoft
technologies to their best advantage. It validates our ability to handle day+to+day management
of the server operating system, file structure, and directory services2 handle softare
distribution and updates2 monitor servers2 provide tier+/ troubleshooting
support2 support engineering and change+management projects2 build and configure servers2
implement auditing policy2 perform scheduled vulnerability+assessment scans2 and monitor
logs for firealls and intrusion+detection systems.
It focuses on a specific job role, alloing for in+depth validation of your skill set llos you to
earn more than one M"IT# certification, demonstrating your abilities across multiple roles
3uilds on a combination of Microsoft "ertified Technology pecialist !M"T$ prere4uisites,
helping you develop your technical resume ith each step in your M"IT# career path
1.# T$e%e
Theme of our training and project is &indos erver /001 5nterprise 5dition. &indos erver
/001 !sometimes abbreviated as 6&in/716$ is one of Microsoft &indos8 server line of
2
-
7/18/2019 CCNA & MCITP Project
3/139
operating systems. ome of the &indos erver /001 5nterprise 5dition features are active
directory, orkgroup and domain, user account, active directory groups, profiles, softare
installation via directory trusting, indo server backup, certificate services etc. My industrial
training is ill be on these features.
1.& Introduction to Co%'any
-ream &eavers !-&$ is a group of hard core professionals having expertise in 9ecruitments,
Training, 3usiness ystems, 9eal 5state and Travel ervices. t present -ream &eavers is
orking ith more than :00 ;ational and Multi+;ational "ompanies including Top 3anks,
Insurance "ompanies, Telecom "ompanies, IT ector, 9etail ector, 3#(s as ell as #harma
companies. &ith aggressive marketing and efficient operations the group has forayed in the top
ten positions in most of the above services in ;orth India. &ith < years of experience in client
servicing, the -ream &eavers group has no strategically positioned itself across various
industries in := states across ;orth and &est India.
Moreover presently -ream &eavers is into sales training, induction programs, soft skills and
behavioral training, selling skills and functional training. . The strong emphasis on human
resource development is hat motivates its >00 member orkforce to achieve highest standards
of 4uality and productivity.
In the recent past the company has extended its arms in the field of #roject'Industrial Trainings
in the name of -reamTech?abs including various professional courses for 3Tech, M", Mc.
", Mc. IT.. -95M&5@59 is one of the nations largest "(9#(9T5 and
"onsultancy providers backed by a team of professionals ho have successfully trained and
placed students. -95MT5"A?3 offers a ide spectrum of technical courses and
application courses designed to suit every skill level, as ell as the ability to consult directly
ith organizations to tailor made learning plans for any number of employees. Their products
3
-
7/18/2019 CCNA & MCITP Project
4/139
and services have a ide appeal and are applicable those in varied positions including netork
administrators, systems analysts, systems architects, test engineers, softare developers, help
desk staff, IT managers, senior executives, administrative assistants and business professionals.
-95MT5"A?3 ervice package includes product 4uality testing, training, consultation,
facilitation and hand holding for the 4uality initiatives.
-95MT5"A?3 has its corporate office in Balandhar!#unjab$ ith its branches in
mritsar and "handigarh and it provides services to over /0,000 professionals annually.
-95MT5"A?3 offers a full spectrum of vendor authorized technical, business skills,
project management and application courses designed to suit every skill level, as ell as ability
to consult directly ith organizations to tailor made learning plans for any number of
employees. -ream Tech ?abs also has tie ups ith a number of IT companies hich includes
the names of grade IT "ompanies for #lacements of students
-ream &eavers !-&$ is a group of hard core professionals having expertise in 9ecruitments,
5ducation, Training, 3usiness ystems, 9eal 5state and Travel ervices having its corporate
office in Curgaon and registered office in Balandhar. t present -ream &eavers is orking ith
more than :00 ;ational and Multi+;ational "ompanies including Top 3anks, Insurance
"ompanies, Telecom "ompanies, IT ector, 9etail ector, 3#(s as ell as #harma companies.
&ith aggressive marketing and efficient operations the group has forayed in the top ten
positions in most of the above services in ;orth India. &ith < years of experience in client
servicing, the -ream &eavers group has no strategically positioned itself across various
industries in := states across ;orth and &est India. Moreover presently -ream &eavers is into
sales training, induction programmes, soft skills and behavioral training, selling skills and
functional training. . The strong emphasis on human resource development is hat motivates
its >00 member orkforce to achieve highest standards of 4uality and productivity.
4
-
7/18/2019 CCNA & MCITP Project
5/139
In the recent past the company has extended its arms in the field of #roject'Industrial Trainings
in the name of -ream Tech ?abs including various professional courses for 3tech, M", Mc.
", Mc. IT..
1.( )eatures of Drea% Tec$ *as
In all e aim at building better professionals for tomorro and for this purpose, e provide
training through skilled trainers.
:.$ "andidates get learn both the soft skills as ell as the intervie skills under the same roof
hich is extremely beneficial in shaping their career.
/.$ Innovation in Technology Training and "onsulting.
>.$ "urriculums mapped ith Industry 9e4uirement.
D.$ tate+of+the Eart IT laboratories and communication set+up.
F.$ trategic ssociation ith Clobal Technology leaders.
=.$ #lacement assistance ith 9esourcing through "onsultancy ervices.
G.$ 9esume ending, 5xclusive Intervies.
1.$ "ourse "ertification, "onfirmation ?etters.
-ream Tech ?abs is highly modernized lab of ;orth India ith all modern amenities and the
infrastructure to increase Technical kills of students and give the Industrial approach for their
better future prospects.
&53IT5)
.dreamtechlabs.com
5
-
7/18/2019 CCNA & MCITP Project
6/139
ddress
"*!:/+:>$Tin Tour +3lock Market, 9anjit venue , mritsar.
#hone no H+F0:G:GD
5+mail infodreamtechlabs.com
CHAPTER II
INTRODUCTION TO NET+OR,
netork is a set of devices!often referred to as nodes$ connected by communication links.
node can be a computer, printer, or any other device capable of sending and'or receiving data
6
-
7/18/2019 CCNA & MCITP Project
7/139
generated by other nodes on the netork. The basic purpose of establishing a netork is to
share resources and making communication possible among devices
*igure /.: The basic netork
2.1Net-or Criteria
netork must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security. #erformance) #erformance can be measured in many
ays, including transmit time and response time. Transmit time is the amount of time re4uired
for a message to travel from one device to another. 9esponse time is the elapsed time beteen
an in4uiry and a response. The performance of a netork depends on a number of factors,
including the number of users, the type of transmission medium, the capabilities of the
connected hardare, and the efficiency of the softare. #erformance is often evaluated by to
netorking metrics) throughput and delay. &e often need more throughput and less delay.
Aoever, these to criteria are often contradictory. If e try to send more data to the netork,
e may increase throughput but e increase the delay because of traffic congestion the
netork.
Re/iai/ity
7
-
7/18/2019 CCNA & MCITP Project
8/139
In addition to accuracy of delivery, netork reliability is measured by the fre4uency of failure,
the time it takes a link to recover from a failure, and the netorks robustness and catastrophe.
ecurity
;etork ecurity issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from
breaches and data losses.
2.2 T0PE O) NET+OR,
2.2.1 *AN *oca/ Area Net-or
local area netork !?;$ is a group of computers and associated devices that share a
common communications line or ireless link. Typically, connected devices share the resources
of a single processor or server ithin a small geographic area !for example, ithin an office
building$. Jsually, the server has applications and data storage that are shared in common by
multiple computer users. local area netork may serve as fe as to or three users !for
example, in a home netork$ or as many as thousands of users !for example, in an *--I
netork$.
8
http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=6cIvQ6GhhWLjQM&tbnid=TbCuDgA9AHji-M:&ved=0CAUQjRw&url=http://computer-network-for-you.blogspot.com/&ei=pKZWU9iKI4WtiAfezoDIDg&psig=AFQjCNHEuZ65cq9eq12f_4ZIU3tQiA6fhQ&ust=1398273897376824http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=6cIvQ6GhhWLjQM&tbnid=TbCuDgA9AHji-M:&ved=0CAUQjRw&url=http://computer-network-for-you.blogspot.com/&ei=pKZWU9iKI4WtiAfezoDIDg&psig=AFQjCNHEuZ65cq9eq12f_4ZIU3tQiA6fhQ&ust=1398273897376824 -
7/18/2019 CCNA & MCITP Project
9/139
*igure /./ ?ocal area netork
2.2.2 MAN Metro'o/itan Area Net-or$
metropolitan area netork !M;$ is a computer netork in hich to or more computers or
communicating devices or netorks hich are geographically separated but in same
metropolitan city and are connected to each other are said to be connected on M;.
Metropolitan limits are determined by local municipal corporations2 the larger the city, the
bigger the M;, the smaller a metro city, smaller the M;. Metropolitan rea ;etork
!M;$ is a large computer netork that spans a metropolitan area or campus. Its geographic
scope falls beteen a &; and ?;. M;s provide Internet connectivity for ?;s in a
metropolitan region, and connect them to ider area netorks like the Internet.
*igure /.> !Metropolitan rea ;etork$
2.2.3 +AN +ide Area Net-or
9
-
7/18/2019 CCNA & MCITP Project
10/139
ide area netork !&;$ is a netork that covers a broad area !i.e., any
telecommunications netork that links across metropolitan, regional, or national boundaries$
using private or public netork transports. 3usiness and government entities utilize &;s to
relay data among employees, clients, buyers, and suppliers from various geographical
locations. In essence, this mode of telecommunication allos a business to effectively carry out
its daily function regardless of location. The Internet can be considered a &; as ell, and is
usedby businesses, governments, organizations, and individuals for almost any purpose
imaginable.
*igure /.D !&ide rea ;etork$
2.3 T0PE O) CONNECTION
2.3.1 Point4to4Point
netork is to or more devices connected through links. link is a communications pathay
that transfers data from one device to another. *or visualization purpose, it is simplest to
imagine any link as a line dran beteen to points. *or communication to occur, to devices
must be connected in some ay to the same link at the same time. There are to possible types
of connections) point+to+point and multipoint.
10
http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=l2dP8vqc_nbdfM&tbnid=w2q8bw8hNXtEXM:&ved=0CAUQjRw&url=http://www.computer-networking-success.com/computer-lan-network.html&ei=f6dWU4yNDYiGiQeb64DABA&psig=AFQjCNEk95lnsMKCoqABZ16yAC-x8m9Few&ust=1398274227892503 -
7/18/2019 CCNA & MCITP Project
11/139
*igure /.F #oint+to+ point connection
point+to+point connection provides a dedicated link beteen to devices. The entire capacity
of the link is reserved for transmission beteen those to devices. Most point+to+point
connections use an actual length of ire or cable to connect the to ends, but other options,
such as microave or satellite links, are also possible. &hen you are changing television
channels by infrared remote control, you are establishing a point+to+point connection beteen
remote control and the televisions control system.
2.3.2 Mu/ti'oint
multipoint connection is one in hich more than to specific devices share a single link. In a
multipoint environment, the capacity of the channel is shared, either spatially or temporarily. If
several devices can use the link simultaneously, it is a spatially shared connection. If users must
take turns, it is a timeshared connection.
11
http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=KuCgAuklSUkrjM&tbnid=_NtmWQyTTvvZ6M:&ved=0CAUQjRw&url=http://sharonalvandi.wordpress.com/2010/03/05/dialogues-on-sustainability/&ei=Zq5WU_-vPM3xiAel4oHQDQ&psig=AFQjCNEiXRqloSSw-FA6_IsI-DAUhNh_Ow&ust=1398275799801059 -
7/18/2019 CCNA & MCITP Project
12/139
*igure /.= Multipoint connection
2.# NET+OR, TOPO*O50
#hysical Topology
The term physical topology refers to the ay in hich a netork is laid out physically. To or
more devices connect to a link2 to or more links form a topology. The topology of a netork
is the geometric representation of the relationship of all the links and linking devices to one
another.
2.#.1. Point4to4'oint To'o/o6y
The simplest topology is a permanent link beteen to endpoints. itched point+to+point
topologies are the basic model of conventional telephony. The value of a permanent point+to+
point netork is the value of guaranteed, or nearly so, communications beteen the to
endpoints. The value of an on+demand point+to+point connection is proportional to the number
of potential pairs of subscribers, and has been expressed as Metcalfe8s ?a.
12
-
7/18/2019 CCNA & MCITP Project
13/139
2.#.2 7us To'o/o6y
*igure /.G bus topology
3us topology is multipoint connection. (ne long cable acts as a backbone to link all the
devices in a netork. ;odes are connected to the bus cable by drop lines and taps.
2.#.2.1Ad"anta6es of 7us To'o/o6y
K It is "heap, easy to handle and implement.
K 9e4uire less cable
K It is best suited for small netorks.
2.#.2.2Disad"anta6es of 7us To'o/o6y
K The cable length is limited. This limits the number of stations that can be connected.
K This netork topology can perform ell only for a limited number of nodes
2.#.3 tar To'o/o6y
13
http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=g8kuRmg25jwihM&tbnid=nOcimh8DX7n_xM:&ved=0CAUQjRw&url=http://www.bukisa.com/articles/363105_bus-topology-with-diagramadvantages-and-disadvantages&ei=b7BWU6L4C8SSiAeE-4GADQ&psig=AFQjCNGq_OYJiM85oYyFCMR9cQhZcUe-2g&ust=1398276445052922 -
7/18/2019 CCNA & MCITP Project
14/139
*igure /.1 star topology
The type of netork topology in hich each of the nodes of the netork is connected to a
central node ith a point+to+point link in a 8hub8 and 8spoke8 fashion, the central node being the
8hub8 and the nodes that are attached to the central node being the 8spokes8 !e.g., a collection of
point+to+point links from the peripheral nodes that converge at a central node$ E all data that is
transmitted beteen nodes in the netork is transmitted to this central node, hich is usually
some type of device that then retransmits the data to some or all of the other nodes in the
netork, although the central node may also be a simple common connection oint !such as a
8punch+don8 block$ ithout any active device to repeat the signals.
2.#.3.1Ad"anta6es of star to'o/o6y
Aigh speed
5asy to install, configure, maintain, easy to expand.
&e can increase the devices ithout any loss
;o collision
2.#.3.2 Disad"anta6es of star to'o/o6y
If hub fails then hole netork fails
14
http://www.google.co.in/url?sa=i&rct=j&q=&esrc=s&frm=1&source=images&cd=&cad=rja&uact=8&docid=JcWTNCxmnEYH0M&tbnid=xtTBzN3H-pchSM:&ved=0CAUQjRw&url=http://www.cs.umd.edu/class/fall2001/cmsc411/proj01/pub/five.html&ei=lLNWU9LtLYr8iQexoYGABQ&psig=AFQjCNFsaSbVlLF3fKdd3DODrGkfv3ohtw&ust=1398277342562580 -
7/18/2019 CCNA & MCITP Project
15/139
More cables are re4uired.
2.#.# Rin6 To'o/o6y
*igure /.< 9ing topology
The type of netork topology in hich each of the nodes of the netork is connected to to
other nodes in the netork and ith the first and last nodes being connected to each other,
forming a ring E all data that is transmitted beteen nodes in the netork travels from one node
to the next node in a circular manner and the data generally flos in a single direction only.
2.#.#.1Ad"anta6e of Rin6 To'o/o6y
@ery orderly netork here every device has access to the token and the opportunity to
transmit.
5asier to Mange than a 3us ;etork Cood "ommunication over long distances
Aandles high volume of traffic
2.#.#.2Disad"anta6es of Rin6 To'o/o6y
The failure of a single node of the netork can cause the entire netork to fail.
The movement or changes made to netork nodes affects the performance of the entire
netork.Dua/4rin6
15
http://www.google.co.in/url?sa=i&source=images&cd=&cad=rja&uact=8&docid=Sz96oKNyQuzRAM&tbnid=3OAQJEkIHmyaoM&ved=0CAgQjRw&url=http://www.louiewong.com/archives/166&ei=hbRWU_WJDY2IiQeBsoAw&psig=AFQjCNEHwWAZlQiGUcVG0gXc6a7rK1vjBA&ust=1398277637274158 -
7/18/2019 CCNA & MCITP Project
16/139
The type of netork topology in hich each of the nodes of the netork is connected to to
other nodes in the netork, ith to connections to each of these nodes, and ith the first and
last nodes being connected to each other ith to connections, forming a double ring E the data
flos in opposite directions around the to rings, although, generally, only one of the rings
carries data during normal operation, and the to rings are independent unless there is a failure
or break in one of the rings, at hich time the to rings are joined !by the stations on either
side of the fault$ to enable the flo of data to continue using a segment of the second ring to
bypass the fault in the primary ring.
2.#.& Mes$ To'o/o6y
*igure /.:0 Mesh topology
The value of fully meshed netorks is proportional to the exponent of the number of
subscribers, assuming that communicating groups of any to endpoints, up to and including all
the endpoints, is approximated by 9eed8s ?a.
2.#.&.1 )u//y connected
16
-
7/18/2019 CCNA & MCITP Project
17/139
The type of netork topology in hich each of the nodes of the netork is connected to each of
the other nodes in the netork ith a point+to+point link E this makes it possible for data to be
simultaneously transmitted from any single node to all of the other nodes.
2.#.&.2Partia//y connected
The type of netork topology in hich some of the nodes of the netork are connected to more
than one other node in the netork ith a point+to+point link E this makes it possible to take
advantage of some of the redundancy that is provided by a physical fully connected mesh
topology ithout the expense and complexity re4uired for a connection beteen every node in
the netork.
2.#.( Tree To'o/o6y
*igure/.::Tree topology
The type of netork topology in hich a central 8root8 node !the top level of the hierarchy$ is
connected to one or more other nodes that are one level loer in the hierarchy !i.e., the second
level$ ith a point+to+point link beteen each of the second level nodes and the top level
central 8root8 node, hile each of the second level nodes that are connected to the top level
central 8root8 node ill also have one or more other nodes that are one level loer in the
hierarchy !i.e., the third level$ connected to it, also ith a point+to+point link, the top level
17
-
7/18/2019 CCNA & MCITP Project
18/139
central 8root8 node being the only node that has no other node above it in the hierarchy E the
hierarchy of the tree is symmetrical, each node in the netork having a specific fixed number,
f, of nodes connected to it at the next loer level in the hierarchy, the number, f, being referred
to as the 8branching factor8 of the hierarchical tree.
2.#.(.1 Ad"anta6es of a Tree To'o/o6y
K #oint+to+point iring for individual segments.
K upported by several hardare and softare vendors.
K ll the computers have access to the larger and their immediate netorks.
2.#.(.2 Disad"anta6es of a Tree To'o/o6y
K (verall length of each segment is limited by the type of cabling used.
K If the backbone line breaks, the entire segment goes don.
2.& NET+O,IN5 DE8ICE
;etork devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printers orfaxmachines. -evices used to
setup a ?ocal rea ;etork !?;$ are the most common type of netork devices used by the
public. ?; re4uires a hub, router, cabling or radio technology, netork cards, and if online
access is desired, a high+speed modem.
18
http://www.wisegeek.com/what-is-a-fax.htmhttp://www.wisegeek.com/what-is-a-fax.htmhttp://www.wisegeek.com/what-are-network-cards.htmhttp://www.wisegeek.com/what-are-network-cards.htmhttp://www.wisegeek.com/what-is-a-fax.htm -
7/18/2019 CCNA & MCITP Project
19/139
2.&.1 HU794
Aub is a central device installed in a netork. If it stops orking the netork ill stop running.
The orking of netorking hub is very simple. It has many points. The data is sent to every
point and it is forarded to the point here the hub finds the address of the destined computer.
Aubs offer an inexpensive option for transporting data beteen devices, but hubs don8t offer
any form of intelligence. Aubs can be active or passive.
n active hubstrengthens and regenerates the incoming signals before sending the data
on to its destination.
#assive hubsdo nothing ith the signal.
*igure /.:/ Aub
2.&.2 +ITCH94
The orking of a
netorking Aub is not
much different from a itch. The advancement in itches is that they have sitching table
in them hich makes a netork more secure and faster. The difference is beteen the
technology and techni4ue through hich data is sent. itch has the ability to store the M"
address of computers so the data ill only be sent to the re4uired point instead of sending it to
every point.
19
-
7/18/2019 CCNA & MCITP Project
20/139
*igure /.:> itch
2.(.3 ROUTER94
9outer is responsible for connecting to physical and logically different netorks. 9outers
are connected in a series in a &; or a ?; and they are called Aop in the series. The
orking of 9outer is very simple a 9outer in a ?; or a &; finds the I# address of the next
hop !next router$ and the data is sent toard and so on. -+?ink, T#+?ink, ?ink+ys, "isco and
ztec are some ell knon 9outer manufacturing companies. 9outers are of to 3asic types
-? routers and &i+*i routers. ;early every I#, banks, organizations, universities, 5nd+users
use 9outers to connect to internet or interconnect in to their virtual private netorks over the
internet.
*igure /.:D &ired router *igure /.:F&ireless router
2.&.# MODEM94
20
-
7/18/2019 CCNA & MCITP Project
21/139
modem is a device that makes it possible for computers to communicate over telephone lines.
The ord modem comes from Modulate and -emodulate. 3ecause standard telephone lines use
analog signals, and computers digital signals, a sending modem must modulate its digital
signals into analog signals. The computers modem on the receiving end must then demodulate
the analog signals into digital signals.
*igure /.:= Modem
2.&.& 7RID5E) a device that connects multiple netork segments along the data link layer. It
orks on (I layer /
*igure/.:G 3ridge
21
-
7/18/2019 CCNA & MCITP Project
22/139
2.&.( REPEATER) a device hich amplifies or regenerates digital signals received hile
sending them from one part of a netork into another. It orks on (I layer :.
*igure /.:1 9epeat
2.( OME H07RID NET+OR, DE8ICE9
2.(.1 MU*TI*A0ER +ITCH) sitch hich, in addition to sitching on (I layer /,
provides functionality at higher protocol layers.
*igure /.:< Multilayer sitch
2.(.2 PROTOCO* CON8ERTER) a hardare device that converts beteen to different
types of transmission, such as asynchronous and synchronous transmissions.
22
-
7/18/2019 CCNA & MCITP Project
23/139
*igure /./0 #rotocol converter
2.(.3 7RID5E ROUTER 7ROUTER9 a device that combines router and bridge
functionality and therefore orks on (I layers / and >.
*igure /./: 3ridge router
2.(.# PRO:0 ER8ER) computer netork service hich allos clients to make indirect
netork connections to other netork services.
23
-
7/18/2019 CCNA & MCITP Project
24/139
*igure /.//#roxy serve
2.(.& )IRE+A**) a piece of hardare or softare put on the netork to prevent some
communications forbidden by the netork policy.
*igure /./> *ireall
2.(.( NET+OR, ADDRE TRAN*ATOR NAT9netork service provided as hardare
or softare that converts internal to external netork addresses and vice versa.
(ther hardare for establishing netorks or dial+up connections)
Mu/ti'/e;er) a device that combines several electrical signals into a single signal.
Net-or interface contro//er) a piece of computer hardare alloing the attached computer
to communicate by netork.
24
-
7/18/2019 CCNA & MCITP Project
25/139
*ig /./D ;etork address translator
2.(.< +IR*E NET+OR, INTER)ACE CONTRO**ER) a piece of computer hardare
alloing the attached computer to communicate by ?;.
*ig /./F &ireless netork interface controller
2.(.= *AN TETER9 ?; tester is an electronic device used to verify the electrical connections in
a cable or other ired assembly. Cenerally a cable tester consists of)
K source of electric current,
volt meter,
K sitching matrix used to connect the current source and the volt meter to all of the contact points
in a cable.
cable tester is used to verify that all of the intended connections exist and that there are no
unintended connections in the cable being tested. &hen an intended connection is missing it is
said to be 6open6. &hen an unintended connection exists it is said to be a 6short6 !as in short
circuit$. If a connection 6goes to the rong place6 it is said to be 6misired 6 !the connection
25
http://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Volt_meterhttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Electric_currenthttp://en.wikipedia.org/wiki/Volt_meterhttp://en.wikipedia.org/wiki/Short_circuithttp://en.wikipedia.org/wiki/Short_circuit -
7/18/2019 CCNA & MCITP Project
26/139
has to faults) it is open to the correct contact and shorted to an incorrect contact$.Cenerally,
the testing is done in to phases. The first phase, called the opens test makes sure each of the
intended connections is good. The second phase, called the shorts test makes sure there are no
unintended connections.
There are to common ays to test a connection)
:. A continuity test. "urrent is passed don the connection. If there is current the connection is
assumed to be good. This type of test can be done ith a series combination of a battery !to provide
the current$ and a light bulb !that lights hen there is a current$.
/. Aresistance test. knon current is passed don the connection and the voltage that develops is
measured. *rom the voltage and current the resistance of the connection can be calculated and
compared to the expected value.
There are to common ays to test for a short)
1. A /o- "o/ta6e test. lo poer, lo voltage source is connected beteen to conductors
that should not be connected and the amount of current is measured. If there is no current
the conductors are assumed to be ell isolated.
2. A $i6$ "o/ta6e test. gain a voltage source is connected but this time the voltage is of
several hundred volts. The increased voltage ill make the test more likely to find
connections that are nearly shorted since the higher voltage ill cause the insulation of
nearly shorted ires to break don.
26
http://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Electrical_resistancehttp://en.wikipedia.org/wiki/Continuity_testhttp://en.wikipedia.org/wiki/Electrical_resistance -
7/18/2019 CCNA & MCITP Project
27/139
*igure /./= ?an tester
2.(.> CRIMPIN5 TOO*9 crimping tool is a tool designed to cri%'or connect a connector to the end of a cable. *or example,
netork cables and phone cables are created using a crimping tool to connect the 9B+DF and 9B+::
connectors to the end of the cable. In the picture to the right, is an example of hat a crimping tool
looks like. This example shos a tool capable of crimping both 9B+:: and 9B+DF connectors.
It is actually a multi+function tool that can be used for making crafts and jeelry or for fishing
to crimp the ires in a fishermans rod for example. &hats good about the crimping tool is that
it has a lot of practical usage and its also an uncomplicated tool to use There are actually
various crimping tools in the market and each is designed for a specific task so hen youre out
to buy a crimping tool, first determine for hat task you ant to use it for) is it for jeelry
making or making fish lures perhapsL (nce you kno, then the next step is to pick out the right
crimping tool size as each crimping job re4uires different sizes.
Its also important to choose the right type of sleeve for your crimping tool. "rimp sleeves also come in
different types. The three common crimp sleeve types are) round section, oval section and the double
barrel. The round section is made out of brass and is used for making knots hile the oval section
sleeve, hich is the more idely used type of sleeve is also available in brass as ell as copper alloys
and aluminum.
27
http://www.computerhope.com/jargon/r/rj45.htmhttp://www.computerhope.com/jargon/r/rj11.htmhttp://www.computerhope.com/jargon/r/rj45.htmhttp://www.computerhope.com/jargon/r/rj11.htm -
7/18/2019 CCNA & MCITP Project
28/139
*igure /./G "rimping tool
2.(.1? PUNCHIN5 TOO*9
punch is a hardmetalrod ith a shaped tip at one end and a blunt butt end at the other,
hich is usually struck by a hammer.Most oodorkers prefer to use aball+peen hammer for
using punches. #unches are used to drive objects, such as nails, or to form an impression of the
tip on a ork piece. -ecorative punches may also be used to create a pattern or even form an image.
*igure /./1 #unching tool
The orld of connectors has a much smaller orld of acronyms all its on. They consist of
such acronyms as 9B, M, T, T;", 3;", @.>/, -I;, -3, ; and more. (ne aspect that
might complicate the orld of connectors is that many of these connectors are also knon by
more than one name.
28
http://en.wikipedia.org/wiki/Hardnesshttp://en.wikipedia.org/wiki/Metalhttp://en.wikipedia.org/wiki/Hammerhttp://en.wikipedia.org/wiki/Ball-peen_hammerhttp://en.wikipedia.org/wiki/Nail_(fastener)http://en.wikipedia.org/wiki/Hardnesshttp://en.wikipedia.org/wiki/Metalhttp://en.wikipedia.org/wiki/Hammerhttp://en.wikipedia.org/wiki/Ball-peen_hammerhttp://en.wikipedia.org/wiki/Nail_(fastener) -
7/18/2019 CCNA & MCITP Project
29/139
Most of us kno that a connector is best knon for providing the physical link beteen to
components. ome example of the use of a connector might be a connector linking a cable and
a netork interface card or ;I" card, a connector linking a transceiver and a cable or even a
connector linking to cable segments.
&hen using an electrical cable, a connection is established hen the conducting ires are
Boined by ay of connectors in order to make and maintain continuous contact, alloing the
signal to simply move along the cable across the contact.
&hen using fibre+optic cable, it takes much more ork to manage and maintain good
connections due to the degree of fit beteen the to fibre cores. The fit determines the 4uality
of the connection beteen the fibre cores. To complicate matters, the diameters involved in this
fit are smaller than a human hair.
"onnections differ in various ays, hich help in determining here that type of connector can
be used. These features include)
K hape
K ize
K Cender
K "onnection mechanism
K *unction
In some cases, it is necessary to use a special adapter in order to use different types of
connector combinations. n example of this is hen using an ;+series connector and a 3;"
adapter in order to connect thick to thin coaxial cable.
nother difference beteen connectors is their sturdiness, the ease of attaching and detaching
the connector, and the amount of signal loss that may occur at the connection point.
29
-
7/18/2019 CCNA & MCITP Project
30/139
&hen determining the type of connector that is used, it is important to take into consideration
the components being used, and, as far as netorks, the type of cable and architecture being
used. n 5thernet netork that is using a coaxial cable ould use different connectors beteen
the cable and the ;I", as opposed to an I3M Token 9ing netork that is using a shielded
tisted+pair cable.
&hen about a half a dozen types of connectors available for electrical cable, there are also
about a dozen more types of connectors available for use hen using a fiber+optic cable.
2.
-
7/18/2019 CCNA & MCITP Project
31/139
*igure /./< 9B DF "onnector
2.+line
jack$, and 9B=: !for a D+line telephone jack$, all of hich utilize =+position modular
connectors.
n 9B:: jack typically utilizes / out of the = positions, so they can be ired ith a =#/"
modular jack !=+position, /+conductor$. Aoever, these types of jacks are very rare. Most
31
http://www.tech-faq.com/how-to-install-telephone-wiring.htmlhttp://www.tech-faq.com/utp.htmlhttp://www.tech-faq.com/how-to-install-telephone-wiring.htmlhttp://www.tech-faq.com/utp.html -
7/18/2019 CCNA & MCITP Project
32/139
often, an 9B:: jack is a =#D" jack !=+position, D+conductor$, ith to of the four ires running
to the junction box unused. The extra ires can be pressed into service for a variety of
applications including preventing a pulse+dial telephone from ringing the extension phone bells
!an %anti+tinkle circuit$, as a ground for selective ringers, poering an ?.5.-. ring+indicator
operating off of the ringer signal, etc.
*igure /.>0 9B :: "onnector.
2.
-
7/18/2019 CCNA & MCITP Project
33/139
netorks. 3;" connectors are made to match the characteristic impedanceof cable at either F0
ohms or GF ohms. It is usually applied for fre4uencies belo D CAz and voltages belo F00
@olts.O/Pimilar connectors using the bayonet connection principle exist, and a threaded
connector is also available. Jnited tates military standard MI?+#9*+>
-
7/18/2019 CCNA & MCITP Project
34/139
is more important in determining the limitations of transmission. *or unguided media, the
bandidth of the signal produced by the transmitting antenna is more important than the
medium in determining transmission characteristics. (ne key property of signals transmitted by
antenna is directionality. In general, signals at loer fre4uencies are omnidirectional2 that is,
the signal propagates in all directions from the antenna. t higher fre4uencies, it is possible to
focus the signal into a directional beam. In considering the design of data transmission systems,
key concerns are data rate and distance) the greater the data rate and distance the better.
number of design factors relating to the transmission medium and the signal determine the data
rate and distance)
7and-idt$9 ll other factors remaining constant, the greater the bandidth
of a signal, the higher the data rate that can be achieved.
Trans%ission i%'air%ents9 Impairments, such as attenuation, limit the distance.
*or guided media, tisted pair generally suffers more impairment than coaxial cable,
hich in turn suffers more than optical fiber.
Interference9 Interference from competing signals in overlapping fre4uency bands
can distort or ipe out a signal. Interference is of particular concern for unguided
media but is also a problem ith guided media. *or guided media, interference can be
caused by emanations from nearby cables. *or example, tisted pairs are often bundled
together and conduits often carry multiple cables. Interference can also be experienced
from unguided transmissions. #roper shielding of a guided medium can minimize this
problem.
Nu%er of recei"ers9 guided medium can be used to construct a point+topoint
link or a shared link ith multiple attachments. In the latter case, each attachment
34
-
7/18/2019 CCNA & MCITP Project
35/139
introduces some attenuation and distortion on the line, limiting distance and'or data
rate
2.= C*AI)ICATION O) TRANMIION MEDIA
*igure /.>/ "lassification of transmission media
2.= 5UIDED TRANMIION MEDIA
2.=.1T-isted Pair Ca/e
The most popular netork cabling is tisted pair. It is light eight, easy to install, inexpensive
and support many different types of netork. It also supports the speed of :00 mbps. Tisted
35
-
7/18/2019 CCNA & MCITP Project
36/139
pair cabling is made of pairs of solid or stranded copper tisted along each other. The tists are
done to reduce vulnerably to 5MI and cross talk. The number of pairs in the cable depends on
the type. The copper core is usually //+&C or /D+&CBas measured on the merican ire
gauge standard. There are to types of tisted pairs cabling
*igure /.>> Tisted pair cable
:. Jnshielded tisted pair !JT#$
/. hielded tisted pair !T#$
2.=.1.1 Uns$ie/ded t-isted 'air UTP
JT# is more common. It can be either voice grade or data grade depending on the condition.
JT# cable normally has an impedance of :00 ohm. JT# cost less than T# and easily available
due to its many use. There are five levels of data cabling.
Cate6ory 1
These are used in telephone lines and lo speed data cable.
Cate6ory 2
These cables can support up to D mbps implementation.
36
-
7/18/2019 CCNA & MCITP Project
37/139
Cate6ory 3
These cable supports up to := mbps and are mostly used in :0 mbps.
Cate6ory #
These are used for large distance and high speed. It can support /0mps.
Cate6ory &
This is the highest rating for JT# cable and can support up to :00mps.
JT# cables consist of / or D pairs of tisted cable. "able ith / pair use 9B+:: connector and D
pair cable use 9B+DF connector.
2.=.1.1.1 C$aracteristics of UTP:. lo cost
/. easy to install
>. Aigh speed capacityD. Aigh attenuation
F. 5ffective to 5MI
=. :00 meter limit
2.=.1.1.2 Ad"anta6es of UTP
:. 5asy installation
/. "apable of high speed for ?;
>. ?o cost
2.=.1.1.3 Disad"anta6es of UTP
:. hort distance due to attenuation
2.=.1.2 $ie/ded T-isted Pair TP
T# is heavier and more difficult to manufacture, but it can greatly improve the signaling rate
in a given transmission scheme Tisting provides cancellation of magnetically induced fields
and currents on a pair of conductors. Magnetic fields arise around other heavy current+carrying
37
-
7/18/2019 CCNA & MCITP Project
38/139
conductors and around large electric motors. @arious grades of copper cables are available, ith
Crade F being the best and most expensive. Crade F copper, appropriate for use in :00+Mbps
applications, has more tists per inch than loer grades. More tists per inch means more
linear feet of copper ire used to make up a cable run, and more copper means more money.
hielding provides a means to reflect or absorb electric fields that are present around cables.
hielding comes in a variety of forms from copper braiding or copper meshes to aluminized.
Mylar tape rapped around each conductor and again around the tisted pair. 3M has defined
category for T# cable.
Ty'e 1
T# features to pairs of //+&C
Ty'e 2
This type include type : ith D telephone pairs
Ty'e (
This type feature to pairs of standard shielded /=+&C
Ty'e .#.2 RADIO TRANMIION
In radio transmission a radiating antenna is used to convert a time+varying electric current into
an electromagnetic ave or field, hich freely propagates through a non+conducting medium
such as air or space. In a broadcast radio channel, a directional antenna radiates a transmitted
signal over a ide service area. In a point+to+point radio channel, a directional transmitting
antenna is used to focus the ave into a narro beam, hich is directed toard a single
receiver site. In either case the transmitted electromagnetic ave is picked up by a remote
receiving antenna and reconverted to an electric current.
46
-
7/18/2019 CCNA & MCITP Project
47/139
*igure /.>< 9adio transmission
Radio +a"e
Radio -a"e 'ro'a6ation is not constrained by any physical conductor or aveguide. This
makes radio ideal for mobile communications, satellite and deep+space communications,
broadcast communications, and other applications in hich the laying of physical connections
may be impossible or very costly. (n the other hand, unlike guided channels such as ire or
optical fiber , the medium through hich radio aves propagate is highly variable, being
subject to diurnal, annual, and solar changes in the ionosphere, variations in the density of
ater droplets in the troposphere, varying moisture gradients, and diverse sources of reflection
and diffraction.
2.=.#.3 MICRO+A8E
Microave transmission is line of sight transmission. The transmit station must be in visible
contact ith the receive station. This sets a limit on the distance beteen stations depending on
the local geography. Typically the line of sight due to the 5arths curvature is only F0 km to the
horizonS 9epeater stations must be placed so the data signal can hop, skip and jump across the
country. Microaves operate at high operating fre4uencies of > to :0 CAz. This allos them to
carry large 4uantities of data due to their large bandidth.
2.=.#.3.1 Ad"anta6es of %icro-a"e
:. They re4uire no right of ay ac4uisition beteen toers.
/. They can carry high 4uantities of information due to their high operating fre4uencies.
>. ?o cost land purchase) each toer occupies only a small area.
47
-
7/18/2019 CCNA & MCITP Project
48/139
D. Aigh fre4uency'short avelength signals re4uire small antennae.
2.=.#.3.2 Disad"anta6es of %icro-a"e
:. ttenuation by solid objects) birds, rain, sno and fog.
/. 9eflected from flat surfaces like ater and metal.
>. -iffracted !split$ around solid objects.
D. 9eflected by atmosphere, thus causing beam to be projected aay from receiver.
2.>.#.# ATE**ITE
atellites are transponders !units that receive on one fre4uency and retransmit on another$ that
are set in geostationary orbits directly over the e4uator. These geostationary orbits are >=,000
km from the 5arths surface. t this point, the gravitational pull of the 5arth and the centrifugal
force of 5arths rotation are balanced and cancel each other out. "entrifugal force is the
rotational force placed on the satellite that ants to fling it out into space.
The uplink is the transmitter of data to the satellite. The donlink is the receiver of data.
Jplinks and donlinks are also called 5arth stations because they are located on the 5arth. The
footprint is the shadoN that the satellite can transmit to, the shado being the area that can
receive the satellites transmitted signal.
48
-
7/18/2019 CCNA & MCITP Project
49/139
*igure/.D0 satellite transmission
C$a'ter 3
PH0ICA* MODE* UED IN NET+OR,IN5
3.1C*IENT ER8ER MODE*
The c/ientser"er %ode/ is an approach to computer netork programming developed at
Qerox #9"during the :
-
7/18/2019 CCNA & MCITP Project
50/139
The model assigns one of to roles to the computersin a netork) "lientor server. serveris
a computer system that selectively shares its resources2 a client is a computer or computer
programthat initiates contact ith a server in order to make use of a resource. -ata, "#Js,
printers, and data storage devicesare some examples of resources.
This sharing of computer resources is called time-sharing, because it allos multiple people to
use a computer !in this case, the server$ at the same time. 3ecause a computer does a limited
amount of ork at any moment, a time+sharing system must 4uickly prioritize its tasks to
accommodate the clients.
"lients and servers exchange messages in a re4uest+response messaging pattern) The client
sends a re4uest, and the server returns a response. To communicate, the computers must have a
common language, and they must follo rules so that both the client and the server kno hat
to expect. The language and rules of communication are defined in a communications protocol.
ll client+server protocols operate in theapplication layer.
&hether a computer is a client, a server, or both, it can serve multiple functions. *or example, a
single computer can run eb serverand file serversoftareat the same time to serve different
data to clients making different kinds of re4uests. "lient softare can also communicate ith
server softare on the same computer.O:P "ommunication beteen servers, such as to
synchronize data, is sometimes called inter+server or inter+servercommunication.
50
https://en.wikipedia.org/wiki/Computerhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Client_(computing)https://en.wikipedia.org/wiki/Server_(computing)https://en.wikipedia.org/wiki/Resource_(computer_science)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Data_(computing)https://en.wikipedia.org/wiki/CPUhttps://en.wikipedia.org/wiki/Printer_(computing)https://en.wikipedia.org/wiki/Data_storage_devicehttps://en.wikipedia.org/wiki/Time-sharinghttps://en.wikipedia.org/wiki/Computer_multitaskinghttps://en.wikipedia.org/wiki/Request-responsehttps://en.wikipedia.org/wiki/Messaging_patternhttps://en.wikipedia.org/wiki/Communications_protocolhttps://en.wikipedia.org/wiki/Application_layerhttps://en.wikipedia.org/wiki/Web_serverhttps://en.wikipedia.org/wiki/File_serverhttps://en.wikipedia.org/wiki/Softwarehttps://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1https://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1https://en.wikipedia.org/wiki/Computerhttps://en.wikipedia.org/wiki/Computer_networkhttps://en.wikipedia.org/wiki/Client_(computing)https://en.wikipedia.org/wiki/Server_(computing)https://en.wikipedia.org/wiki/Resource_(computer_science)https://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Computer_programhttps://en.wikipedia.org/wiki/Data_(computing)https://en.wikipedia.org/wiki/CPUhttps://en.wikipedia.org/wiki/Printer_(computing)https://en.wikipedia.org/wiki/Data_storage_devicehttps://en.wikipedia.org/wiki/Time-sharinghttps://en.wikipedia.org/wiki/Computer_multitaskinghttps://en.wikipedia.org/wiki/Request-responsehttps://en.wikipedia.org/wiki/Messaging_patternhttps://en.wikipedia.org/wiki/Communications_protocolhttps://en.wikipedia.org/wiki/Application_layerhttps://en.wikipedia.org/wiki/Web_serverhttps://en.wikipedia.org/wiki/File_serverhttps://en.wikipedia.org/wiki/Softwarehttps://en.wikipedia.org/wiki/Client%E2%80%93server_model#cite_note-1 -
7/18/2019 CCNA & MCITP Project
51/139
*igure>.: erver+client model
3.1.1Ad"anta6es of C/ient er"er Net-ors
:. Centra/iation9Jnlike #/#, here there is no central administration, here in this
architecture there is a centralized control. ervers help in administering the hole set+up.
ccess rights and resource allocation is done by ervers.
/. Pro'er Mana6e%ent9ll the files are stored at the same place. In this ay, management
of files becomes easy. lso it becomes easier to find files.
>. 7ac4u' and Reco"ery 'ossi/e9 s all the data is stored on server its easy to make a
back+up of it. lso, in case of some break+don if data is lost, it can be recovered easily
and efficiently. &hile in peer computing e have to take back+up at every orkstation.
D. U' 6radation and ca/ai/ityin C/ient4ser"er set4u'9"hanges can be made easily by
just upgrading the server. lso ne resources and systems can be added by making
necessary changes in server.
F. Accessii/ity9*rom various platforms in the netork, server can be accessed remotely. s
ne information is uploaded in database, each orkstation need not have its on storage
capacities increased !as may be the case in peer+to+peer systems$. ll the changes are made
only in central computer on hich server database exists.
51
http://www.ianswer4u.com/2011/12/earned-value-management-analysis.htmlhttp://www.ianswer4u.com/2011/10/characteristics-of-good-software.htmlhttp://www.ianswer4u.com/2011/12/earned-value-management-analysis.htmlhttp://www.ianswer4u.com/2011/10/characteristics-of-good-software.html -
7/18/2019 CCNA & MCITP Project
52/139
=. ecurity99ules defining security and access rights can be defined at the time of set+up of
server.
G. ervers can play different roles for different clients.
3.1.2Disad"anta6es of C/ient er"er Net-or
:. "ongestion in ;etork) Too many re4uests from the clients may lead to congestion, hich
rarely takes place in #/# netork. (verload can lead to breaking+don of servers. In peer+
to+peer, the total bandidth of the netork increases as the number of peers increase.
/. "lient+erver architecture is not as robust as a #/# and if the server fails, the hole netork
goes don. lso, if you are donloading a file from server and it gets abandoned due to
some error, donload stops altogether. Aoever, if there ould have been peers, they
ould have provided the broken parts of file.
>. "ost) It is very expensive to install and manage this type of computing.
D. ou need professional IT people to maintain the servers and other technical details of
netork.
3.2 PEER TO PEER MODE* peer+to+peer !abbreviated to #/#$ computer netork is one in hich each computer in the
netork can act as a client or server for the other computers in the netork, alloing shared
access to various resources such as files,peripherals, and sensors ithout the need for a central
server. #/# netorks can be set up ithin the home, a business, or over the Internet. 5ach
netork type re4uires all computers in the netork to use the same or a compatible program to
connect to each other and access files and other resources found on the other computer. #/#
netorks can be used for sharing content such as audio, video, data, or anything in digital
format.
#/# is a distributed application architecture that partitions tasks or orkloads among peers.
#eers are e4ually privileged participants in the application. 5ach computer in the netork is
referred to as a node. The oner of each computer on a #/# netork ould set aside a portion
52
http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Node_(networking)http://en.wikipedia.org/wiki/Peripheralhttp://en.wikipedia.org/wiki/Node_(networking) -
7/18/2019 CCNA & MCITP Project
53/139
of its resourcesRsuch as processing poer, disk storage, or netork bandidthRto be made
directly available to other netork participants, ithout the need for central coordination by
servers or stable hosts.O:P#eers are both suppliers and consumers of resources, in contrast to the
traditional clientEserver model here only the server supply !send$, and clients consume
!receive$ data. 5merging collaborative #/# systems are going beyond the era of peers doing
similar things hile sharing resources, and are looking for diverse peers that can bring in
uni4ue resources and capabilities to a virtual community thereby empoering it to engage in
greater tasks beyond those that can be accomplished by individual peers, yet that are beneficial
to all the peers.
The first #/# distributed system platform as #ipes #latform by #eer ?ogic. (ne of #eer
?ogics first licensees as Texas Instrumentsin :
-
7/18/2019 CCNA & MCITP Project
54/139
*igure >./ peer to peer model
3.2.1Ad"anta6es of Peer4to4'eer net-orin6
:. It is easy to install and so is the configuration of computers on this netork,/. ll the resources and contents are shared by all the peers, unlike server+client architecture
here erver shares all the contents and resources.
>. #/# is more reliable as central dependency is eliminated. *ailure of one peer doesnt affect
the functioning of other peers. In case of "lient Eerver netork, if server goes don hole
netork gets affected.
D. There is no need for full+time ystem dministrator. 5very user is the administrator of his
machine. Jser can control their shared resources
F. The over+all cost of building and maintaining this type of netork is comparatively very
less.
3.2.2Disad"anta6es dra-acs of Peer to 'eer arc$itecture
54
-
7/18/2019 CCNA & MCITP Project
55/139
:. In this netork, the hole system is decentralized thus it is difficult to administer. That is one
person cannot determine the hole accessibility setting of hole netork.
/. ecurity in this system is very less viruses, spyares, Trojans2 etc. malares can easily transmit
over this #+/+# architecture.
>. -ata recovery or backup is very difficult. 5ach computer should have its on back+up system
D. ?ot of movies, music and other copyrighted files are transferred using this type of file
transfer. #/# is the technology used in torrents.
Table >.: -ifference beteen #eer to #eer and "lient erver ;etork
Peer4to4Peer Net-ors C/ienter"er Net-ors
K 5asy to set up More difficult to set up
K ?ess expensive to install More expensive to install
K "an be implemented on a ide range of
operating systems
variety of operating systems can be
supported on the client computers, but the
server needs to run an operating system that
supports netorking
K More time consuming to maintain the
softare being used !as computers must
be managed individually$
?ess time consuming to maintain the softare
being used !as most of the maintenance is
managed from the server$
K @ery lo levels of security supported or
none at all. These can be very
cumbersome to set up, depending on the
operating system being used
Aigh levels of security are supported, all of
hich are controlled from the server. uch
measures prevent the deletion of essential
system files or the changing of settings
K Ideal for netorks ith less than :0
computers
;o limit to the number of computers that can
be supported by the netork
K -oes not re4uire a server 9e4uires a server running a server operating
55
-
7/18/2019 CCNA & MCITP Project
56/139
system
K -emands a moderate level of skill to
administer the netork
-emands that the netork administrator has a
high level of IT skills ith a good orking
knoledge of a server operating system
3.3 COMPUTER NET+OR, ARCHITECTURTE
The term netorking model, or netorking architecture, refers to an organized set of
documents. Individually, these documents describe one small function re4uired for a netork.
These documents may define a protocol, hich is a set of logical rules that devices must follo
to communicate. (ther documents may define some physical re4uirements for netorking, for
example, it may define the voltage and current levels used on a particular cable. "ollectively,
the documents referenced in a netorking model define all the details of ho to create a
complete orking netork. To create a orking netork, the devices in that netork need to
follo the details referenced by a particular netorking model. &hen multiple computers and
other netorking devices implement these protocols, physical specifications, and rules, and the
devices are then connected correctly, the computers can successfully communicate.
3.# OIMODE*
The (pen ystems Interconnection model !(I$ is a conceptual model that characterizes and
standardizes the internal functions of a communication system by partitioning it into abstraction
layers. The model is a product of the (pen ystems Interconnection project at the International
(rganization for tandardization !I($, maintained by the identification I('I5" GD
-
7/18/2019 CCNA & MCITP Project
57/139
calls the next loer layer to send and receive packets that make up the contents of that path.
To instances at one layer are connected by a horizontal connection on that layer.
*igure >.> (I model
Table >./ ?ayers of (I model
57
-
7/18/2019 CCNA & MCITP Project
58/139
3.#.1. DECRIPITION O) OI *A0ER
58
(I Model
-ata unit ?ayer *unction
Aost
layers
-ata
G. pplication ;etork process to application
=.presentation
-ata representation, encryption and decryption,
convert machine dependent data to machine
independent data
F.ession
Interhost communication, managing sessions
beteen applications
egments D.Transport
9eliable delivery of packets beteen points on a
netork.
Media
layers
#acket'datagram >. ;etork
ddressing, routing and !not necessarily reliable$
delivery of datagrams beteen points on a netork.
3ot'*reame /.-ata link reliable direct point+to+point data connection.
3it :. physical
!not necessarily reliable$ direct point+to+point
data connection.
-
7/18/2019 CCNA & MCITP Project
59/139
ccording to recommendation Q./00, there are seven layers, labeled : to G, ith layer : at the
bottom.
*ayer 19 P$ysica/ /ayer
The physical layer has the folloing major functions)
It defines the electrical and physical specifications of the data connection. It defines the
relationship beteen a device and a physical transmission medium !e.g., a copper or
fiber optical cable$. This includes the layout of pins, voltages, line impedance, cable
specifications, signal timing, hubs, repeaters, netork adapters, host bus adapters !A3
used in storage area netorks$ and more.
It defines the protocol to establish and terminate a connection beteen to directly
connected nodes over a communications medium. It may define the protocol for flo
control.
It defines a protocol for the provision of a !not necessarily reliable$ connection beteen
to directly connected nodes, and the Modulation or conversion beteen the
representation of digital data in user e4uipment and the corresponding signals
transmitted over the physical communications channel. This channel can involve
physical cabling !such as copper and optical fiber$ or a ireless radio link.
The physical layer of #arallel "I operates in this layer, as do the physical layers of
5thernet and other local+area netorks, such as token ring, *--I, ITJ+T C.hn, and
I555 10/.::, as ell as personal area netorks such as 3luetooth and I555 10/.:F.D.
*ayer 29 Data /in /ayer
The data link layer provides a reliable link beteen to directly connected nodes, by
detecting and possibly correcting errors that may occur in the physical layer.
59
-
7/18/2019 CCNA & MCITP Project
60/139
#oint+to+#oint #rotocol !###$ is an example of a data link layer in the T"#'I# protocol
stack.
The ITJ+T C.hn standard, hich provides high+speed local area netorking over
existing ires !poer lines, phone lines and coaxial cables$, includes a complete data
link layer hich provides both error correction and flo control by means of a selective
repeat liding &indo #rotocol.
*ayer 39 Net-or /ayer
The netork layer provides the functional and procedural means of transferring variable
length data se4uences !called datagrams$ from one node to another connected to the
same netork. netork is a medium to hich many nodes can be connected, on
hich every node has an address and hich permits nodes connected to it to transfer
messages to other nodes connected to it by merely providing the content of a message
and the address of the destination node and letting the netork find the ay to deliver
!6route6$ the message to the destination node. In addition to message routing, the
netork may !or may not$ implement message delivery by splitting the message into
several fragments, delivering each fragment by a separate route and reassembling the
fragments, report delivery errors, etc.
-atagram delivery at the netork layer is not guaranteed to be reliable.
number of layer+management protocols, a function defined in the Management
nnex, I( GD
-
7/18/2019 CCNA & MCITP Project
61/139
The transport layer provides the reliable sending of data packets beteen nodes !ith
addresses$ located on a netork, providing reliable data transfer services to the upper
layers.
n example of a transport layer protocol in the standard Internet protocol stack is T"#,
usually built on top of the I# protocol.
The transport layer controls the reliability of a given link through flo control,
segmentation'-5 segmentation, and error control. ome protocols are state+ and
connection +oriented.
This means that the transport layer can keep track of the segments and retransmit those
that fail. The transport layer also provides the acknoledgement of the successful data
transmission and sends the next data if no errors occurred. The transport layer creates
packets out of the message received from the application layer. #acketizing is a process
of dividing the long message into smaller messages.
(I defines five classes of connection+mode transport protocols ranging from class 0
!hich is also knon as T#0 and provides the least features$ to class D !T#D, designed
for less reliable netorks, similar to the Internet$. "lass 0 contains no error recovery,
and as designed for use on netork layers that provide error+free connections. "lass D
is closest to T"#, although T"# contains functions, such as the graceful close, hich
(I assigns to the session layer. lso, all (I T# connection+mode protocol classes
provide expedited data and preservation of record boundaries. -etailed characteristics
of T#0+D classes are shon in the folloing table.
*ayer &9 ession /ayer
The session layer controls the dialogues !connections$ beteen computers. It
establishes, manages and terminates the connections beteen the local and remote
61
-
7/18/2019 CCNA & MCITP Project
62/139
application. It provides for full+duplex, half+duplex, or simplex operation, and
establishes checkpointing, adjournment, termination, and restart procedures. The (I
model made this layer responsible for gracefulclose of sessions, hich is a property of
the Transmission "ontrol #rotocol, and also for session checkpointing and recovery,
hich is not usually used in the Internet #rotocol uite. The session layer is commonly
implemented explicitly in application environments that use remote procedure calls.
*ayer (9 Presentation /ayer
The presentation layer establishes context beteen application+layer entities, in hich
the application+layer entities may use different syntax and semantics if the presentation
service provides a mapping beteen them. If a mapping is available, presentation
service data units are encapsulated into session protocol data units, and passed don the
T"#'I# stack.
This layer provides independence from data representation !e.g., encryption$ by
translating beteen application and netork formats. The presentation layer transforms
data into the form that the application accepts. This layer formats and encrypts data to
be sent across a netork. It is sometimes called the syntax layer.
The original presentation structure used the 3asic 5ncoding 9ules of bstract yntax
;otation (ne !;.:$, ith capabilities such as converting an 53"-I"+coded text file
to an "II+coded file, or serialization of objects and other data structures from and to
QM?.
*ayer
-
7/18/2019 CCNA & MCITP Project
63/139
This layer interacts ith softare applications that implement a communicating
component. uch application programs fall outside the scope of the (I model.
pplication+layer functions typically include identifying communication partners,
determining resource availability, and synchronizing communication. &hen identifying
communication partners, the application layer determines the identity and availability of
communication partners for an application ith data to transmit.
3.2 T$e TCPIP Protoco/ Arc$itecture
T"#'I# defines a large collection of protocols that allo computers to communicate. T"#'I# defines
the details of each of these protocols inside documents called 9e4uests for "omments !9*"$. 3y
implementing the re4uired protocols defined in T"#'I# 9*"s, a computer can be relatively confident
that it can communicate ith other computers that also implement T"#'I#.
n easy comparison can be made beteen telephones and computers that use T"#'I#. ou go
to the store and buy a phone from one of a dozen different vendors. &hen you get home and
plug in the phone to the same cable in hich your old phone as connected, the ne phone
orks. The phone vendors kno the standards for phones in their country and build their
phones to match those standards. imilarly, a computer that implements the standard
netorking protocols defined by T"#'I# can communicate ith other computers that also use
the T"#'I# standards. ?ike other netorking architectures, T"#'I# classifies the various
protocols into different categories or layers. Table outlines the main categories in the T"#'I#
architectural model.
Table >.> example of (I layers
TCPIP Arc$itecture *ayer E;a%'/e Protoco/s
pplication ATT#, #(#>, MT#
63
-
7/18/2019 CCNA & MCITP Project
64/139
Transport T"#, J-#
Internet I#
;etork ccess 5thernet, *rame 9elay
3.#.2 T$e TCPIP A''/ication *ayer
T"#'I# application layer protocols provide services to the application softare running on a
computer. The application layer does not define the application itself, but rather it defines
services that applications needRsuch as the capability to transfer a file in the case of ATT#. In
short, the application layer provides an interface beteen softare running on a computer and
the netork itself. rguably, the most popular T"#'I# application today is the eb broser.
Many major softare vendors either have already changed or are changing their softare to
support access from a eb broser. nd thankfully, using a eb broser is easyRyou start a
eb broser on your computer and select a ebsite by typing in the name of the ebsite, and
the eb page appears.
3.2.2T$e TCPIP Trans'ort *ayer
The T"#'I# application layer includes a relatively large number of protocols, ith ATT# being
only one of those. The T"#'I# transport layer consists of to main protocol options) the
Transmission Control Protocol !T"#$ and the User Datagram Protocol !J-#$. The key
difference beteen T"# and J-# is that T"# provides a ide variety of services to
applications, hereas J-# does not. *or example, routers discard packets for many reasons,
including bit errors, congestion, and instances in hich no correct routes are knon. s you
have read already, most data+link protocols notice errors !a process called error detection$ but
then discard frames that have errors. T"# provides for retransmission !error recovery$ and help
to avoid congestion !flo control$, hereas J-# does not. s a result, many application
64
-
7/18/2019 CCNA & MCITP Project
65/139
protocols choose to use T"#. Aoever, do not let J-#s lack of services make you think that
J-# is orse than T"#. 3y providing fe services, J-# needs feer bytes in its header
compared to T"#, resulting in feer bytes of overhead in the netork. J-# softare does not
slo don data transfer in cases here T"# may purposefully slo don. lso, some
applications, notably today voice over I# !@oI#$ and video over I#, do not need error recovery,
so they use J-#. o, J-# also has an important place in T"#'I# netorks today.
3.2.3T$e TCPIP Internet *ayer
The internet layer of the T"#'I# netorking model, primarily defined by the Internet Protocol
!I#$, orks much like the postal service. I# defines addresses so that each host computer can
have a different I# address, just as the postal service defines addressing that allos uni4ue
addresses for each house, apartment, and business. imilarly, I# defines the process of routing
so that devices called routers can choose here to send packets of data so that they are
delivered to the correct destination. Bust as the postal service created the necessary
infrastructureto be able to deliver lettersRpost offices, sorting machines, trucks, planes, and
personnelRthe internet layer defines the details of ho a netork infrastructure should be
created so that the netork can deliver data to all computers in the netork. I# defines logical
addresses, calledIP addresses, hich allo each T"#'I#+speaking device !called I# hosts$ to
have an address ith hich to communicate. I# also defines routing, the process of ho a
router should forard, or route, packets of data.
3.#.#T$e TCPIP Net-or Access *ayer
The netork access layer defines the protocols and hardare re4uired to deliver data across
some physical netork. The term network access refers to the fact that this layer defines ho to
physically connect a host computer to the physical media over hich data can be transmitted.
65
-
7/18/2019 CCNA & MCITP Project
66/139
*or instance, 5thernet is one example protocol at the T"#'I# netork access layer. 5thernet
defines the re4uired cabling, addressing, and protocols used to create an 5thernet ?;.
?ikeise, the connectors, cables, voltage levels, and protocols used to deliver data across &;
links are defined in a variety of other protocols that also fall into the netork access layer.
CHAPTER #
TRAININ5 +OR,
INTRODUCTION TO +IND+O+ E8ER 2??=
#.1 +$y +indo-s er"er 2??= )oundation?
&indos erver /001 *oundation is designed to meet your needs better than traditional
Microsoft server+based solutions)
#.1.15enera/ 'ur'ose er"er
&indos *oundation erver provides you ith a dependable and affordable technology
foundation for running your business applications as ell as sharing information and resources.
3eing based on &indos erver /001, you can run not only core infrastructure, terminal
services and identity management solutions for your business E you can support you core ?(3
66
-
7/18/2019 CCNA & MCITP Project
67/139
applications built on the simplicity and technical capabilities that &indos erver /001
provides.
#.1.2 Pro"ides c$anne/ con"enience
3uying &indo erver *oundation could never be easier. &indos erver *oundation comes
pre+installed along ith your server hardare saving you the efforts of separately procuring
and installing the operating system on the server hardare. nd as &indos erver *oundation
is supported by an extensive netork of trusted Microsoft partners, you can rest assured that
your investment is reliable.
#.1.3 Mae your first ser"er in"est%ent
5nsuring your initial server investment is key to the success of your IT, &indos *oundation
provides an ideal first server supporting your single+server netork. &indos erver
*oundation can be also deployed in a variety of ays to meet your needs E providing
flexibility. 3est of all, &indos erver *oundation is full upgradable to higher versions for
hen your business gros E the &indos erver family gros ith you. ou can kno that
your investment in &indos *oundation server ill ensure you data and applications ill be
reliable, secure and provide room for you to gro as needed.
#.1.# Editions
&indos erver /001 tandard !I+>/ and x1=+=D$
&indos erver /001 5nterprise !I+>/ and x1=+=D$
&indos erver /001 -atacenter !I+>/ and x1=+=D$
67
-
7/18/2019 CCNA & MCITP Project
68/139
&indos A#" erver /001 !"odenamed 6ocrates6$ !replacing &indos "ompute
"luster erver /00>$
&indos &eb erver /001 !I+>/ and x1=+=D$
&indos torage erver /001 !"odenamed 6Magni6$ !I+>/ and x1=+=D$
&indos mall 3usiness erver /001 !"odenamed 6"ougar6$ !x1=+=D$ for small
businesses
&indos 5ssential 3usiness erver /001 !"odenamed 6"entro6$ !x1=+=D$ for medium+
sized businesses!-iscontinued$
&indos erver /001 for Itanium+based ystems
&indos erver /001 *oundation !"odenamed 6?ima6$ !x1=+=D$ (5M only
erver "ore is available in the &eb, tandard, 5nterprise and -atacenter editions. It is not
available in the Itanium edition. erver "ore is simply an alternate installation option supported
by some of the editions, and not a separate edition by itself. 5ach architecture has a separate
installation -@-. The >/+bit version of &indos erver /001 tandard 5dition is available to
verified students for free through Microsoft8s -ream park program.
#.1.& yste% reuire%ents9
ystem re4uirements for &indos erver /001 are as follos)
Minimum for &indos erver /0019ecommended for &indos erver /001 Minimum for
&indos erver /001 9/ 9ecommended for &indos erver /001 9/ #rocessor:CAz!I+
>/$ or :.D CAz !x1=+=D$ or Intel Itanium // CAz or faster:.D CAz !x1=+=D processor$ or Intel
Itanium // CAz or fasterMemoryF:/ M39M!may limit performance and some
features$/ C3 9M or higher
68
http://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Random_access_memoryhttp://en.wikipedia.org/wiki/Random_access_memoryhttp://en.wikipedia.org/wiki/Hertzhttp://en.wikipedia.org/wiki/Megabytehttp://en.wikipedia.org/wiki/Random_access_memory -
7/18/2019 CCNA & MCITP Project
69/139
Maximum !>/+bit systems$) D C3 9M !tandard$ or =D C3 9M !5nterprise,
-atacenter$
Maximum !=D+bit systems$) 1 C3 !*oundation$ or >/ C3 9M !tandard$ or / T3
9M !5nterprise, -atacenter and Itanium+3ased ystems$
F:/ M3 9M Maximum) 1 C3 !*oundation$ or >/ C3 !tandard$ or / T3 !5nterprise,
-atacenter, and Itanium+3ased ystems$@ideo adapter and monitor uper @C!100 U
=00$uper @C !100 U =00$ or higher resolution uper @C !100 U =00$uper @C !100 U
=00$ or higher resolution Aard drive disk free space
Minimum !;on+*oundation >/+bit systems$) /0 C3 or greater
Minimum !;on+*oundation =D+bit systems$) >/ C3 or greater
*oundation) :0 C3 or greater.
"omputers ith more than := C3 of 9M re4uire more disk space for paging,
hibernation, and dump files
D0 C3 or higher
>/ C3 or greater for editions other than *oundation
*oundation) :0 C3 or more
"omputers ith more than := C3 of 9M re4uire more disk space for paging,
hibernation, and dump files
>/ C3 or greater for editions other than *oundation
*oundation) :0 C3 or more
69
http://en.wikipedia.org/wiki/Super_VGAhttp://en.wikipedia.org/wiki/Super_VGA -
7/18/2019 CCNA & MCITP Project
70/139
"omputers ith more than := C3 of 9M re4uire more disk space for paging,
hibernation, and dump files
#.1.( 7ENE)IT)
5nterprise+class) + Improve performance and scale capacity more efficiently to run your
largest orkloads hile enabling robust recovery options to protect against outages.
imple and cost+effective)+ -eliver multi+tenant+aare storage and netorking multi+
tenancy capabilities for storage and netorking on lo+cost, industry+standard
hardare.
pplication focused) + &ith enhanced support for open frameorks, you can build,
deploy, and scale applications and ebsites ith more flexibility by unlocking
application portability beteen on+premises environments and public and service
provider clouds.
Jser+centric) + -eploy a virtual desktop infrastructure and loer storage costs
significantly using a broad range of storage options and @A- -5 duplication.
#.2 HO+ TO INTA** +INDO+ ER8ER 2??=
Installing &indos erver /001 is pretty straightforard and is very much like installing
&indos @ista, but I thought I8d list the necessary steps here for additional information. *or
those of you ho have never installed @ista before, the entire installation process is different
than it used to be in previous Microsoft operating systems, and notably much easier to perform.
Table D.:ystem re4uirements for &indos erver /001 are as follos)
70
-
7/18/2019 CCNA & MCITP Project
71/139
Mini%u% for
+indo-s er"er
2??=
Reco%%ended for
+indo-s er"er
2??=
Mini%u% for
+indo-s er"er
2??= R2
Reco%%end
ed for
+indo-s
er"er 2??=
R2
Processor : CAz !I+>/$ or
:.D CAz !x1=+=D$
or Intel Itanium /
/ CAz or faster
:.D CAz !x1=+=D
processor$ or Intel
Itanium /
Me%ory F:/ M3 9M
!may limit
performance and
some features$
/ C3 9M or
higher
Maximum !>/+
bit systems$)
D C3 9M
!tandard$ or
=D C3 9M
!5nterprise,
-atacenter$
Maximum !=D+
bit systems$)
1 C3
!*oundation$ or
>/ C3 9M
!tandard$ or
/ T3 9M
!5nterprise,
F:/ M3 9M Maximum) 1
C3
!*oundation$
or >/ C3
!tandard$ or
/ T3
!5nterprise,
-atacenter,
and Itanium+
3ased
ystems$
71
-
7/18/2019 CCNA & MCITP Project
72/139
-atacenter and
Itanium+3ased
ystems$
Hard
dri"e dis
free s'ace
Minimum
!;on+
*oundation >/+
bit systems$)
/0 C3 or
greater
Minimum
!;on+
*oundation =D+
bit systems$)
>/ C3 or
greater
*oundation) :0
C3 or greater.
"omputers
ith more than
:= C3 of 9M
D0 C3 or higher >/ C3 or greater
for editions other
than *oundation
*oundation) :0
C3 or more
"omputers ith
more than := C3
of 9M re4uire
more disk space
for paging,
hibernation, and
dump files
72
-
7/18/2019 CCNA & MCITP Project
73/139
re4uire more
disk space for
paging,
hibernation,
and dump files
#.2. PROCEDURE TO INTA** +INDO+ ER8ER 2??=
:. Insert the appropriate +indo-s er"er 2??= insta//ation %ediainto your -@- drive. If
you don8t have an installation -@- for &indos erver /001, you can donload one for
free from Microsoft8s &indos /001 erver Trial ebsite
73
-
7/18/2019 CCNA & MCITP Project
74/139
*igureD.: displaying indo loading file
/. 9eboot the computer The install indo izard appears as shon in figure
>. elect the language for installation /an6ua6e and other regional options, make your
selection and press Ne;t.
74
http://www.petri.co.il/images/core_inst_1.gif -
7/18/2019 CCNA & MCITP Project
75/139
V
*igure D./ displaying the install indo izard
D. ;ext, press Insta// No- to begin the installation process.
*igure D.> displaying the install indo page
75
http://www.petri.co.il/images/core_inst_3.gifhttp://www.petri.co.il/images/core_inst_2.gif -
7/18/2019 CCNA & MCITP Project
76/139
F. "lick the install no button to star the installation process of &indo erver /001.type the
product key for the activation page appears
*igure D.D displaying the type your product key for activation page
=.If you do not have the #roduct I- available right no, you can leave the box empty, and click
;ext. ou ill need to provide the #roduct I- later, after the server installation is over. #ress
;o.
*igure D.F displaying the type your product key for activation page
76
http://www.petri.co.il/images/core_inst_5.gifhttp://www.petri.co.il/images/core_inst_4.gif -
7/18/2019 CCNA & MCITP Project
77/139
=. 3ecause you did not provide the correct I-, the install