ICT-CSS12 Q2 Mod3 SettingUpComputerServer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 129

Computer Systems Servicing

Quarter 2, Module 3

Unit 1: Setting Up Computer Servers

Department of Education ● Republic of the


Philippines
COMPUTER SYSTEMS SERVICING NC 2

Setting Up Computer Servers

Pre Test: Write your answer in a short bond paper


1. A server that runs ADDS is a client controller.
a. True
b. False

2. One of the main disadvantage of using server/client systems is the cost such
as:
 Maintenance cost
 Training cost
 Hardware cost
 Software cost
a. True
b. False

3. The following are client/server topologies EXCEPT FOR


a. Single client, single server
b. Multiple clients, no server
c. Multiple clients, single server
d. Multiple clients, multiple servers

4. The printer services role provides essential services for managing files and
the way they are made available and replicated on the network.
a. True
b. False
5. This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer.
a. Domain Controller
b. Remote Access
c. Web Services
d. File Services

6. The _______________ is the package that contains Windows PowerShell


commands.
a. Commands
b. Modules
c. Actions
d. Configuration

7. The boot process has four major stages:


1. Pre-boot
2. Boot
3. Load
4. Initialization

a. True
b. False

8. Client/Server, according to the Management Information System, is the new


technology that yields solutions to many data management problems faced by
modern organizations.
a. True
b. False

9. It is the storage of files stored by the user to the computer server.


a. User folder
b. ADDS
c. Memory
d. Random Access Memory

10. The Server is the process which provides requested services for the Client.
a. True
b. False
LESSON 1: Understanding the "Server" and
"Client"

Introduction

Networks, like humans, exist even within computer systems!

To understand this, this module will run you through how computer networks are
connected in sharing information and resources through servers and clients.

Since you've just learned about networks in the previous module, the
computer server will be an example of a network that you will be working with
in the workplace.

This lesson will run you through the client/server network model. You will be able to
enumerate the various functions of the client/server model and as well as discuss
their different topologies.

TOPIC 1: Client/Server

Client/Server, according to the Management Information System, is the new


technology that yields solutions to many data management problems faced by
modern organizations.

This is a model based on the distribution of functions between two types of


independent and autonomous processes: Server and Client.

In simple method definitions,

Client - any process that requests specific services from the Server.

Server - a process which provides requested services for the Client.


Basically, the two processes reside on two or more independent
computers on a network. The server gives services for more than one
client. 

The network is the medium in which the server and client connects.

TOPIC 2: Client/Server Functions


TOPIC 3: Client/Server Topologies

A Client/Server Topology is the physical layout of the Client/Server network. It plots


out how the clients and servers are connected to each other.

The following are the most common designs and strategies:

1. Single client, single server

One client is directly connected to one server in this setup.

2. Multiple clients, single server

Several clients are directly connected to one server.

3. Multiple clients, multiple servers

Several clients are connected to several servers.


TOPIC 4: Advantages and Disadvantages

Advantages
Performance and reduced workload
Workstation independence
System interoperability
Scalability
Data integrity
Data accessibility
System administration (Centralized management)
Integrated services
Sharing resources among diverse platforms
Masked physical data access
Location independence of data processing
Reduced operating cost
Reduced hardware cost
Communication costs are reduced

Disadvantages

Maintenance cost
Training cost
Hardware cost
Software cost
Complexity

ACTIVITY 1.1. EXPLAIN THE IMPORTANCE OF CLIENT SERVER SET UP. WRITE YOUR
ANSWER IN A SHORT BOND PAPER.
LESSON 2: Creating User Folder
Introduction

In this lesson, you will learn how to create a user folder with Network Operating
System, or NOS, features.

Basically, a user folder is the storage of files stored by the user to the
computer server.

TOPIC 1: Active Directory Domain Services

Before creating a user folder, the administrator of the server


should first  install the Active Directory Domain Services (ADDS) and create a
user account.

To install the ADDS, the administrator should open command prompt (Ctrl + R
then cmd), and type dcpromo to install ADDS, DNS, and create a forest and
domain.

A server that runs ADDS is a domain controller.

The domain controller basically:


 Validates and gives access to all users and computers in a Windows domain
type network;
 Appoints and creates security protocols for all computers; and
 Installs and adds software.

Features of ADDS

These are the features of having the Active Directory Domain Services:

1. Security - The data is stored securely. Each of the objects in the Active Directory
has an ACL or Access Control List which consists of the resources that one may
access and along with access privileges given to each resource.

2. Query Capabilities - The ADDS creates a global catalog to give a mechanism to


handle queries. A client which has ADDS can query the catalog to request directory
data.

3. Replication - To replicate a directory to all domain controllers means easy


access, high availability, and improved fault tolerance.

4. Extensibility - Having ADDS is extensible. Meaning that new object types can be
added to a directory. An attribute can be added, for example to the user object.

Once a user is created, a user folder is also automatically created upon the log-in of
the user to the client computer.

TOPIC 2: Creating a User Folder

This topic will teach you how to create a user folder with network operating system
(NOS) features.

You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10) connected through a
network cable.
1. On the server computer create a shared folder on drive C: or drive D:
2. On server manager, select Features, Group Policy Management, Forest,
Domains, (Domain name), Right click on Policy, Edit
3. Chooser User Configuration, Choose Policies
4. Choose Windows Setting
5. Choose Folder Redirection
6. Choose your directory to be redirect, press right click on your mouse and select
properties
7. Target Setting: Choose Basic
8. Under Root Path, type the share name of your folder
9. Click OK
10. Log-in to the client computer to automatically create User folder

Set Static IP Address


Follow the step-by-step procedures on how to set a static IP address. This is a
crucial step when configuring the server as this is required for the server computer
itself.

 Click the left and right buttons to navigate.

1.
2.
3.
4.
5.

6.
7.

8.
9.
10.

11.
12.
13.
14.
15.
16.

Configuring the Active Directory Domain Services


Follow the step-by-step procedures on how to configure the ADDS. This is important
since this is where all the information on resources are centered on.
1.

2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Adding Roles
Follow the step-by-step procedures on how to add roles in the ADDS . 

1.

2.
3.

4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.

Creating an Organizational Unit & User


Follow the step-by-step procedures on how to create an organizational unit and a
user. 
1.

2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.

ACTIVITY 2.1
A. WRITE THE PROCEDURE IN SITTING UP STATIC IP ADDRESS.
B. WRITE THE PROCEDURE IN CONFIGURING THE ACTIVE DIRECTORY DOMAIN
SERVICES
C. WRITE STEP-BY-STEP PROCEDURES ON HOW TO ADD ROLES IN THE ADDS. 
D. WRITE THE PROCEDURE IN CREATING AN ORGANIZATIONAL UNIT & USER
LESSON 3: Configure User Access
Introduction

In the workplace, computers are not used by an individual for personal use.
Computers are usually accessed by more than one person. System administrators
are able to log on locally if these accounts are in the domain. 

A computer is able to identify between one person to another through a


security device called the user account object

Each user in the network has a unique user account which contains the
contact details of the users as well as what his/her rights and restrictions in
accessing resources/folders, etc.

TOPIC 1: Features of a User Account

The following are the features of a domain-based user account in Windows


Server 2008 r2 (which we will be using throughout this module).

Password Security

Each user account is protected by a password to provide authorization and access to


the system.

Permissions

These are access privileges granted to a user account (e.g. group memberships,
user-specific settings to access resources, etc.)
Identification

Having a user account means easily identifying the person to the computer system
and network.

User Rights

Having user rights is a high-level privilege given to users or groups to define their
action on a computer system.

Roaming

The administrator may define user accounts in a way that a user is able to log on to
any system which is a memer of a domain using a domain user account, a Remote
Access Service (RAS), or gateway.

Environment Layout
Profiles are user-specific and able to store information about the layout, desktop, and
user environment in general. They are specifically restricted through the use of
mandatory profiles.

Auditing
The server can track access and use by domain user accounts.

TOPIC 2: Configuring User Access

This topic will teach you how to configure user access level based on NOS
features and established network policies and end-user requirements.

You can carefully follow the steps below if you have two computer units (one
installed with Windows Server OS and a Windows 7/8/10) connected through a
network cable.

1. To get to Active Directory Users and Computers, choose Start> All Programs >
Administrative Tools > Active Directory Users and Computers.
2. In the console tree, click the folder that corresponds to the domain or organization
unit to which you want to assign this new account.
3. In the details pane, right click the group and then choose Properties.
4. On the Members tab, Click Add.
5. Fill in the following information.
6. Click the Next button to continue setting up this new user account object.
7. Type the password for this account and confirm that password to the system by
retyping it.
8. Configure the password setting using the options described.
9. Click the Next button when you’re finished marking your selections.
10. Click the Finish button if everything is correct. 

ACTIVITY 3.1. HOW TO CONFIGURE USER ACCESS? WRITE YOUR ANSWER


IN A SHORT BOND PAPER
UNIT TEST 1. WRITE YOUR ANSWER IN A SHORT BOND PAPER

1. One of the main disadvantage of using server/client systems is the cost such
as:
 Maintenance cost
 Training cost
 Hardware cost
 Software cost

a. True
b. False

2. The Server is the process which provides requested services for the Client.
a. True
b. False

3. Before creating a user folder, the administrator of the server should first install
the Active Directory Domain Services (ADDS) and create a user account.
a. True
b. False

4. The network is the medium in which the server and client connects.
a. True
b. False

5. The following are the functions of the server EXCEPT FOR


a. Checks authorization
b. Managing the user interface
c. Performs query / update processing and transmits responses to client
d. Ensures that integrity constraints are not violated

6. A server that runs ADDS is a client controller.


a. True
b. False

7. It is the storage of files stored by the user to the computer server.


a. ADDS
b. Memory
c. User folder
d. Random Access Memory

8. It is any process that requests specific services from the Server.


a. Server
b. Client
c. Boss
d. Network

9. Client/Server, according to the Management Information System, is the new


technology that yields solutions to many data management problems faced by
modern organizations.
a. True
b. False

10. The following are client/server topologies EXCEPT FOR


a. Multiple clients, single server
b. Multiple clients, no server
c. Multiple clients, multiple servers
d. Single client, single server
COMPUTER SYSTEMS SERVICING NC 2
Setting Up Computer Servers
Unit 2

LESSON 1: Checking Normal Functions


Introduction
In this lesson, you will be able to identify various boot processes. This is
important because a startup failure might occur. To successfully boot the
server operating system is the first step in handling the server.

Some issues may be easily diagnosed and corrected however, take note that not all
server errors occur only during booting. It can also occur when it is running or even
when the server is shutting down.

TOPIC 1: Boot Process


The boot process has five major stages: 

1. Pre-boot
2. Boot
3. Load
4. Initialization
5. Log-on

In each stage, there are steps that should be followed in loading and using files. In
each of these stages, observe how the process works, how the particular files are
utilized, and what is seen on screen.

1. Preboot
Pre-boot is basically the BIOS startup process. 

By turning on or resetting the computer, you should perform the Power-On Self-


Test or POST routine discussed in the previous modules.

The BIOS shall execute the Initial Program Load where the boot devices are read
and prioritized.

The partition information is seen as well as the boot sector and the Windows Boot
Manager. You will also see the memory check, hardware, and boot device search.

The following are common causes of error during this stage:

Corrupt MBR
This is caused by many viruses in the Master Boot Record which corrupted it.

Improperly configured hardware

This happens when the hard drive is not recognized. This error can happen even if
the device is fine and the configuration is unchanged.

No partition is marked as active

This may happen if the Fdisk utility is recently used and no partition is made from all
the free space available.

Corrupt or missing Ntldr file

This may happen when the Ntldr file is corrupted or deleted by a virus.

2. Boot
Windows Boot Manager reads the boot configuration data (BCD). But in the case of
having more than one boot partition, it prompts the user to choose a partition and its
operating system.
The following are common causes of error during this stage:
Missing or corrupt files
 If Ntldr, Boot.ini, Bootsect.dos, Ntdetect.com, or Ntoskrnl.exe is corrupt or
missing either by a virus or by some malicious intent, the boot sequence will
not succeed. An error message will indicate which file is missing or corrupt.
Improperly configured Boot.ini file
 This may happen when you manually edit Boot.ini or if you have made any
changes to the disk configuration.
Unrecognizable improperly configured hardware
 If the error that appears is due to Ntdetect.com, the issue comes from the
hardware.

3. Load, Initialization, and Logon


Load

By this time, the Windows Server 2008 “splash” screen comes up.

While this happens, the Windows Boot Loader loads the operating system kernel,
the hardware abstraction layer that provides the interface between the operating
system and a particular set of hardware, the Registry file, and the drivers for basic
hardware devices, such as the monitor, mouse, and keyboard.
Initialization

The OS kernel is initialized and takes over from the Windows Boot Loader, bringing
up the graphical display and filling the Registry with HKEY_LOCAL_
MACHINE\HARDWARE key, and HKEY_LOCAL_MACHINE\SYSTEM\SELECT sub
key (called the “Clone Control Set”) and loads the remainder of the device drivers.

Logon

The Windows Server OS graphic user interface (GUI) comes up and the logon
screen will show. 

After a successful logon, the necessary services are prompted, the Last Known
Good control set is written on the basis of the Clone Control Set, and the start-up
programs are started.

Possible errors during logon stage.

1. If logon errors occur, they are usually due to an incorrect username or password
or to the unavailability of a DNS server or a domain controller to authenticate the
request (if the computer is a part of a domain).

2. Errors can also occur if a service cannot be loaded. If a service fails to load, you
will see a message in the System Log of Event Viewer.

ACTIVITY 1.1. EXPLAIN THE BOOT PROCESS? WRITE YOUR ANSWER IN A


SHORT BOND PAPER.
LESSON 2: Installing Modules and Add-ons

Introduction

One must be able to load modules and add-ons so that you can access their
functions. Modules will contain other modules. But however, modules are
independent and can be used without the other depending on the needs of the
server.

This lesson will briefly go through the different modules and add-ons that you may
utilize for the server.

TOPIC 1: Using Modules

The module is the package that contains Windows PowerShell commands.


Examples of these are ascmdlets, providers, functions, workflows, variables, and
aliases.
You are able to write commands with these modules to organize commands
and share with others.
Those who will receive modules can add commands in the modules to their
Windows PowerShell sessions to use them like built-in commands.

List of Modules/Add-ons
The following are modules which support different functions and features in the
Windows Server OS.
1. Active Directory module
2. Active Directory Rights Management Services module
3. Active Directory Rights Management Services Administration module
4. Application ID Policy Management module
5. Best Practice Analyzer module
6. Background Intelligent Transfer Service (BITS)
7. Failover Clusters module
8. Group Policy module
9. Network Load Balancing Clusters module
10. Remote Desktop Services module
11. Server Manager module
12. Server Migration module
13. Internet Information Services (IIS) module

TOPIC 2: Installing Modules/Add-ons


The following are the steps you should follow in installing modules/add-ons.

Procedure:

Step 1: Find all “Module” commands

In the PowerShell window, type the following command and press ENTER:

Get-Command –Noun Module

Step 2: List all modules that are available

In the PowerShell window, type the following command and press ENTER:

Get-Module –ListAvailable
Step 3: Load the ServerManager module into the current session

In the PowerShell window, type the following command and press ENTER:

Get-Help Import-Module

In the PowerShell window, type the following command and press ENTER:

Import-Module Server Manager

ACTIVITY 2.1. WHAT ARE THE DIFFERENT MODULES AND ADD-ONS THAT
YOU MAY UTILIZE FOR THE SERVER.
LESSON 3: Performing Network Services
Introduction

When you are managing a NOS or Network Operating System, you should know
there are different network services that are available.
These services need to be configured so that communication will flow easily
within the network.
You are expected to learn most of these network services and configure them.
There are seven basic network services that you need to be familiar with: remote
access, domain controller, web services, database services, proxy server, file
services, and printer services.
We will go through each of these through this lesson.

TOPIC 1: Remote Access

Remote access technology enables one to login to a system as an authorized user


without being physically present at the keyboard. This
is common in corporate computer networks.

One of the most common form of remote access is the remote desktop. This
basically allows a server computer can control with the actual desktop user
interface of another computer.

To setup a remote desktop, both the host and target (controlling computer and
remote computer to be accessed) need to be installed certain software.
TOPIC 2: Domain Controller

This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer. 

It responds to security authentication requests and the like that need


verification from the host for many security and validation doors across the
network.

TOPIC 3: Web Services

Having a web server enables hosting among websites and web-based applications.
Both static and dynamic content can be hosted on a Web server.
Several web applications that have many roles and functions can also be
hosted using ASP.NET and .NET Framework 3.0, among others.

TOPIC 4: Database Services

A database server is a computer program that offers database services to other


computer programs or computers, as seen in the client–server model. 

The term may also refer to a computer dedicated to running such a program.
Database management systems frequently provide database server functionality.
TOPIC 5: Proxy Server

In computer networks, a proxy server is a server (a computer system or an


application) that acts as a middle-ground for requests from clients seeking resources
from other servers.
A client connects to the proxy server, requesting some service, such as a file,
connection, web page, or other resource available from a different server and the
proxy server evaluates the request as a way to simplify and control its complexity.
Proxies were created to add structure and encapsulation to distributed systems.

TOPIC 6: File Services

The file services role provides essential services for managing files and the way
they are made available and replicated on the network.
A number of server roles require some type of file service.
Includes these role services and subservices: File Server, Distributed File System,
DFS Namespace, DFS Replication, File Server Resource Manager, Services for
Network File System (NFS), Windows Search Service, Windows Server 2003 File
Services, File Replication Service (FRS), and Indexing Service.

TOPIC 7: Print Services


For print servers, this resource type provides for high availability of network-
attached print devices. Printers connected directly to print servers cannot be
included because there is no way to fail over control to a different server. 

If a print server fails, all jobs that are currently spooling are restarted. Jobs that are in
the process of spooling are discarded and must be re-spooled or reprinted to the
Print Spooler resource.

TOPIC 8: Performing basic network service configuration

You will be needing a computer installed with Windows Server 2008 R2 operating
system to perform the following procedures.

Steps/Procedure:

Task 1: Install DHCP and File Services


• In Server Manager, select Role; then select Add Role in the right pane

• Follow the series of steps provided in the wizard


a. Tick “DHCP Server” and “Files Services”
b. Read the installation guide and follow the steps carefully
c. Note: Always validate the IP Address; set the IP range after the installation

Task 2: Make a Group Policy Management

• Go to “Features”, Group Policy Management, Forest, Domain


• Right click on Domains and choose Create a GPO in this domain
• Write a GPO name and click OK
• Unchecked Link Enabled
• On Security Filtering, click Add and Insert Everyone
• Close the Server Manager to refresh

Task 3: Create DHCP (IP Scope)

• Select Roles, DHCP Server, (domain), right-click on IPv4 and select New Scope
• Write a new scope name
• Set your IP Address range
• Skip on IP add Exclusions
• Set Lease Duration
• Choose YES for Configure DHCP Options
• Skip on the next procedures
• Activate the scope now
Task 4: Create Folder Redirection

• Select “Features”, Group Policy Management, Forest, Domains, (Domain name),


right-click on Policy, choose Edit
• Choose User Configuration
• Choose Policies
• Choose Window Settings
• Choose Folder Redirection
• Choose your directory to be directed, right-click and select Properties
• Target Settings: Choose Basic
• Under Root Path, type the share name of your folder
• Click OK

Folder Sharing
Follow the step-by-step procedures on how to configure folder sharing where
folders across a network are shared to all connected devices. 

1.
2.
3.

4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.

Folder Redirection
Follow the step-by-step procedures on how to redirect folders across a network. 
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.

Remote Desktop Configuration


Follow the step-by-step procedures on how to configure a remote desktop.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

ACTIVITY 3.1.WRITE THE STEP-BY-STEP PROCEDURES ON HOW TO


CONFIGURE FOLDER SHARING WHERE FOLDERS ACROSS A
NETWORK ARE SHARED TO ALL CONNECTED DEVICES. WRITE YOUR
ANSWER IN A SHORT BOND PAPER.
UNIT TEST 2: WRITE YOUR ANSWER IN A SHORT BOND PAPER
Post test
1. A server that runs ADDS is a client controller.
a. True
b. False

2. It is the storage of files stored by the user to the computer server.


a. ADDS
b. Memory
c. Random Access Memory
d. User folder

3. The printer services role provides essential services for managing files and
the way they are made available and replicated on the network.
a. True
b. False

4. Client/Server, according to the Management Information System, is the new


technology that yields solutions to many data management problems faced by
modern organizations.
a. True
b. False

5. The _______________ is the package that contains Windows PowerShell


commands.
a. Modules
b. Configuration
c. Commands
d. Actions

6. The Server is the process which provides requested services for the Client.
a. True
b. False

7. One of the main disadvantage of using server/client systems is the cost such
as:

 Maintenance cost
 Training cost
 Hardware cost
 Software cost

a. True
b. False

8. The boot process has four major stages:


 Pre-boot
 Boot
 Load
 Initialization

a. True
b. False

9. The following are client/server topologies EXCEPT FOR


a. Single client, single server
b. Multiple clients, single server
c. Multiple clients, multiple servers
d. Multiple clients, no server

10. This service is one of the most used on a Windows network. It enables one to
realistically assess operational requirements and server performance for each
computer.
a. File Services
b. Web Services
c. Domain Controller
d. Remote Access

You might also like