Shared Folder Permissions, Features of Server, DHCP Roles, Domain Controller and RODC Explained



       
Shared Folder Permissions, Features of  Server, DHCP Roles, Domain Controller and RODC Explained


      What are the shared permissions?
ANSWER
                In a network made up of an Administrator and users (clients), the share folder permission allows the granting of privileges/access to a folder/file by the network Administrator. In this case, any user to which permission is not given will be denied access to the folder. The following are different permissions given to a client:
o   FULL CONTROL: Allows are user to fully control a folder and even change permissions for other users. That is, full ownership of the folder is given to the client.
o   READ: Allows a user to only read the files, view the folders, sub-folders and permissions, but cannot edit or change the content of the folder.
o   WRITE: Allows the user to read attributes and even create sub-folders and files.
o   READ AND EXECUTE: Allows a user to read and run applications.
o   MODIFY: Users with this permission cannot read, modify or create new files and folders but can see the folders. List content applies to folders ONLY.
The share folder permissions no doubt makes the network authentic.


       What are the features of server?
ANSWER
They are:
o   NETWORK VIRTUALIZATION: Helps to “isolate network traffic” on a shared infrastructure. While preserving virtual network assignments, users can move their virtual machines.
o   LIVE MIGRATION: This feature allow users to move a running virtual machine from one physical machine to another.
o   POWERSHELL: This allows a command line based configuration of windows server 2008. Itis quicker than GUI- based configuration and so is preferable.
o   WINDOWS RECOVERY ENVIRONMENT:  This is a startup repair feature of windows server which diagnose and fixes and fixes blue screen.
o   IP ADDRESS MANAGEMENT: This is a combination of DNS and DHCP. It monitors network auditing and static & dynamic IP address allocation for easier management of IP addresses.
o   FRICTION FREE DEPLOYMENT: This combines the installation of roles and features in a scenario based deployment and allows the movement between a full server and server core in windows 2008.
o   NETWORK ACCESS PROTECTION (NAP): Ensures security as it works with DHCP to locate and isolate hosts that are virus infected.



                                                                                                                                                             What are DHCP roles

        Dynamic Host Configuration Protocol (DHCP) is a protocol used to dynamically/automatically assignIP addresses to hosts on a network. It makes the work easier and simpler as stress and the amount of time used in manually assigning IP addresses to hosts lessens. DHCP not only assign IP addresses but also sends automatic TCP/IP configurations settings to DHCP enabled clients on the network.
        When a client starts up TCP/IP operations, it requires for address information. DHCP server receives the request and replies by assigning IP address for a lease period and also sends required configurations (TCP/IP). Then the client acknowledges it. The address assigned to the client will not be reallocated during the lease period. Anytime the client require for address, the same address assigned to it will be returned. Before the lease expires, the client must request for a change of address from the DHCP sever. Before a server could distribute IP addresses, it must be configured as DHCP.
DHCP roles are as follows:
o   OPTION CLASS: This is a way by which option types provided to the clients is managed. It allows a specific option type to be provided to clients for configuration.
o   OPTION TYPES: These are client configuration parameters that a DHCP give to clients. It is configured for each scope.
o   LEASE: This is the length of time during which a client can use IP address assigned to it by DHCP. The length of time is specified by the DHCP.
o   SCOPE: It is the range of IP address for a network. E.g. 10.0.0.1- 10.0.0.20
o   RESERVATION: Here the DHCP creates a permanent address reserved for special purposes. When a network Administrator configures a DHCP server, the server stores information in a database which includes:
a)      Reserved IP address for consistent assignment of IP addresses to clients.
b)      Valid TCP/IP configurations parameters for all clients in a network.
c)       Valid IP addresses maintained in a pool to be assigned to clients.
The large network support, centralized network client configuration, IP address management, network booting etc., beautifies DHCP.


       Domain Controller and RODC.
ANSWER
a)      DOMAIN CONTROLLER (DC): Thisis a server that manages access to a set of network resources such as printers and applications for a group of users. It is responsible for responding to the user’s security requests, checking permissions, verifying permissions and logging in a user before he/she could have access to the resources. So, a user can have access to the resources only with the use of his/ her password and username authenticated.
Domain Controller(DC) is divided into two different types (as roles):
o   PRIMARY DOMAIN CONTROLLER(PDC):It manages the “master user database” for the domain.
o   BACKUP DOMAIN CONTROLLER (BDC): This stores/saves copies of database that are periodically sent to it by the Primary Domain Controller as a backup. It also helps in Load Balancing (LB), balancing workload if the network is too busy. If Primary Domain Controller (PDC) fails, Backup Domain Controller replaces it and manages master user database for domain.
The concept of domain not only allows users have access to resources on different servers, but also allows two or more domain to have access to each other. In this arrangement, if user logs in to the first domain, access to resources on the other domains to which the first domain is connected is automatically made.

b)      READ ONLY DOMAIN CONTROLLER (RODC): This is a newly added feature of windows 2008 active directory domain services. It is a Read Only copy of Domain Controller and also a domain controller in itself which is placed at branch locations. RODC maintains a copy of all objects in a particular domain and all attributes except password.
When RODC is installed at branch locations, it acts as a forwarder of authentication requests and sometimes authenticates the user directly if configured to do so. For RODC to authenticate the user directly, a “Password Replication Policy” will be configured to cache specific users that logs on to it. If a group of user is specified in Password Replication Policy, RODC caches the user’s login and password so that authentication will not be done by Domain Controller (DC) but by RODC. These cannot be possible if RODC is not manually configured.

Previous
Next Post »