The Name of the Class (Course)
The Name of the School (University)
The City and State
The emergence of Windows server 2012 has revolutionized the entire network environment, because it has made easy the process of installation of Operating Systems (OS), which was initially a very cumbersome task for computer users across the globe (Lavapie, 2012). It has simplified the process by eliminating activities, which used to be done before the actual installation of the OS, for example, configuration of CMS, formatting and partitioning of hard drives. Installation of an OS involved the use of DVDs and CDs, and there would occur certain problems leading to the crash of the entire computer network system. With the Windows Server 2012, these tasks have been made easier with few procedures to follow, and the process of controlling and monitoring a network has become even easier. TCP/IP plays a major role in facilitating communication over the internet, and hence has proved to be a major component of the internet. This report is going to present the process of planning, the installation, control, and the monitoring of a network, as well as the importance of TCP/IP in the network. In addition to this, it is also going to discuss the risks associated with making connection to the internet and other networks.
The Planning for Installation of Windows Server 2012
The process of installing Windows Server 2012 MMC to have two hosts in one server requires a process of effective planning and execution. This section is going to lay down what needs to be done before the actual installation of windows server. It is also going to provide information, which one can use in troubleshooting when one experiences problems while installing the OS (Microsoft, 2012b). Therefore, before installing the 2012 server, one needs to make an appropriate plan. Below are the basic standard requirements for windows server 2012 which if a computer lacks, the process of installation will fail. These requirements are normally based on the configurations of the system, the applications and the features that one wants to install. Firstly, the minimum processor required should be 1. 4 GHz 64-bit while the minimum Random Access Memory (RAM) required should be 512MB (Microsoft, 2012a). Secondly, the disk space required should be at a minimum of 32 GB on order to allow for effective partitioning process. This is because the system of Windows Server 2012 MMC will require enough space for the following reasons; installation of a network and for the purpose of hibernation and paging. Thirdly, in the plan, the one will be required to have a DVD drive, internet, keyboard, mouse, and a super VGA in case of a desktop computer (Microsoft, 2013). There should also be a digital and an updated kernel-mode driver that are designed for Windows Server 2012.
Preparation for Installation of Windows Server 2012
After the planning of the installation, the next step is the preparation for the installation of Windows Server 2012, here the IT expert involved in the process needs to; Disconnect Uninterruptible Power Supply (UPS) devices because, before running the setup, the windows server 2012 normally makes an attempt to identify any external devices that are connected to the computer, for example, USBs, and the connection of UPS will interfere with this process. Next, the specialist needs to back up the servers, which include information related to data and configurations that are useful for the functioning of the computer. In this process, one needs to include booting and system partitioning as well as the system state data, this may be information that makes available the network infrastructure, for example, the dynamic host configuration protocols servers. The IT specialist can do the above by creating a backup system of automated data recovery. Also, the specialist involved in the installation process needs to disable the antivirus protection software as it detects the new system as a virus and will slow down the process, hence interfering with the smooth process of installing windows server 2012 (Microsoft, 2014).
Installation of Window Server 2012
The above stages were meant to make ready all the requirements needed for the purpose of installing windows server 2012, therefore, since the specialist have all the necessary requirements, he will use the following procedure to install windows server 2012.
– The first step is to insert a DVD with Windows Server 2012 into the hard drive of the computer, and a booting message will appear on the screen as shown below; therefore, the specialist installing windows server 2012 will have to press enter in order to boot from the setup.
– The second step involves the loading of the necessary files from the DVD, as shown in the diagram below. Here, one has to wait for the loading process to complete.
– The third step involves the process of changing the set up files in order to meet the needs of the network system of the user, this is done after the setup files have been loaded. This process is illustrated in the diagram below.
– The fourth step is the actual installation of the Windows Server 2012, whereby the user will simply click on the button “ Install Now” indicated on the screen as shown in the illustration below:
– The user will have to wait for the process below to start and finish up
– After the above process is complete, the next procedure presents four options to the user, from whereby he will have to select Windows Server 2012 Data Center Evaluation with Graphical User Interface as shown in the diagram below;
– The next step is the acceptance of the terms and conditions as presented by the company that manufactures Window Server 2012. In the event of accepting the terms and conditions, the user will be asked the partition he wants to install the Windows Server 2012. After selecting the partition, the startup will start running the set up as shown in the illustration below; the above process will take time to complete, and this will lead to the finals stage of installing Windows Server 2012. After their completion, the user may choose to install an administrator password, which is optional. The screen of a computer with a fully installed Windows Server 2012 will have the appearance below;
– and the windows server manager will appear as shown below;
Creation of two Host in one Server
After the installation of the Windows Server 2012, it is supposed to serve two hosts, but using one server, this can be made possible through the process of server virtualization (Rouse, 2010). Server virtualization is a process that will enable the creation of a simulation; therefore, the user will be able to make partitions on a hard disk, whereby each partition will appear as if it is an independent even though they are all in one disk. As a user, I will make use of special software referred to as Hypervisor or Virtual machine manager in order to create two virtual environments from this single server (Rouse, 2009). Virtual machine manager enables several hosts operating system to share only one single physical server, where all each host makes use of its processor, storage and other resources singly. Through Virtual machine manager, resources are allocated to other operating systems referred to as virtual machines or guests in order to prevent any form of interference from each other (Microsoft, 2014b). Equally, I will use Hypervisor (Hyper-V), whereby I will use the following procedure as described by Armstrong (2008);
– Load the Hyper-V Manager.
– Click Snapshot, or from the Action Menu, select Snapshot.
– Type a name for the snapshot and click save.
– The Hyper-V manager displays a list of snapshots in the Snapshots pane as shown below;
– Click apply from the Action Menu.
– Respond Apply to the prompt. You may choose to save the current snapshot or not.
Network Monitoring and Management
In order to ensure proper functionality of this network, I install and make use of network monitoring tools, for example, diagnostic tools which will be used to test the effectiveness of network connectivity and ensure that all devices are active (Morimoto, Noel, Droubi, Mistryand Amaris, 2008). I will also make use of monitoring tools, which are supposed to run on the background with the aim of collecting events, and initiate their own tasks using diagnostic tools (Microsoft TechNet, 2003). This will ensure effective operations of the network (Rouse, 2012). I will also install performance tools in order to monitor the interface of each router and ensure that they are functioning well. I will also use network intrusion detection systems, for example, Prelude, Nessus, and SNORT in order to help monitor and detect problems that may arise within the network (Indiana University, 2014). Successful process of monitoring will help in proper management of the network, and this will help the administrator of the network to ensure the security of the network, reliability and effective performance of the network (Microsoft, 2014b).
Implication of connecting to other Networks and the internet
There are several vulnerabilities associated with configuring a computer using Windows Server 2012 to a network and particularly the internet, this is majorly because of the security issues associated with the internet and other networks as discussed below. Firstly, there are insertion attacks, an attack that involves the deployment of other, but non-authorized devices without the going giving the due considerations to security issues. Secondly, connecting to other networks, for example a LAN connection may encourage the interception of the traffic of the network by an attacker who is within the range of this particular network, hence interfering with the functionality of this network. Thirdly, connection to other networks as well as the internet normally leads to Jamming, a situation where the network jams leading to denial of services due to attacks or because there is an illegitimate traffic, which overwhelms the frequencies of the given network. Here, an attacker from outside the network, and one who has tools and equipment that is able to flood the frequencies of the networks, hence corrupting the signals and eventually leading to the jamming of the network. Another implication of connecting to other networks is the client to client attacks within this particular network connection, because clients in that particular network communicates with each other by bypassing the access points, hence posing a security threat because they may attack each other in the process. According to Yang, Pan, and Shen (2010), another major implication of connecting to the internet is spoofing and hijacking. Because there will be a number of users, there are a several ill intended users who will try to gain access to this LAN and access the company’s sensitive data and information. They will do this by using the personal details of valid users, and as a result, this will result to hijacking and spoofing. Eavesdropping is also another security implication of connecting to another network, whereby, there are possible attacks on the database of the involved organization by an external intruder (Choi, Robles, Hong, Tai-Hoon Kim, 2008).
Evaluation on how TCP/IP Internet Protocol Suite contributes to network addressing
TCP/IP is an acronym for Transmission Control Protocol/Internet protocol, which is a standard open protocol for communication suit useful for communication over the internet, and it has several applications that enable users to transfer files and log into computers in remote locations (Rouse, 2014). All applications that are used over a network rely on TCP/IP in order to function properly and without TCP/IP; there would be no communication or the use of any application that is related to the internet. Equally, TCP/IP also refers to a set of data communication mechanisms that are put together in a software, and that enables users to access the internet and other private networks. These mechanisms are what are referred to as protocols, and they are designed to carry out specific actions, and are in two categories: TCP focuses on the handling and processing data from applications, while IP accommodates the transmission and receives application data across a network (Rouse, 2014). TCP/IP allows devices as well as different types of computers in a given network to communicate and share with each other in various ways, for example, by exchanging of emails. Among the five leading functions of TCP/IP are as discussed below:
– It is a global address system that is unique and that allows users to identify machines that are connected over a given network; therefore, it enables the creation of billions of unique addresses for users worldwide.
– TCP/IP provides users with a mechanism, also known as a packet, and one that allows users to send and receive data from one computer to another that are in the network.
– TCP/IP enables the segmentation of application data into pieces that help in the communication process over the network, whereby the machine that is receiving a stream of packets is able to retrieve these segments and group the data back to its original form.
– TCP/IP performs the function of re-sequencing the related packets that it receives by putting them back into the correct sequence.
– TCP/IP is able to detect any data that is lost or damaged during transmission, whereby it makes sure that the data that is lost or damaged is transmitted again and that it is well received.
The emergence of Windows server 2012 has revolutionized the entire network environment because it has made easy the process of installation of Operating Systems. It has simplified the process by eliminating activities, which used to be done before the actual installation of the OS, for example, configuration of CMS, formatting and partitioning of hard drives. The process of installing Windows Server 2012 MMC to have two hosts in one server requires a process of effective planning and execution. Network monitoring and management is necessary for all networks because they enable the network to perform well and remain effective. There are several vulnerabilities associated with configuring a computer using Windows Server 2012 to a network and particularly the internet; this is majorly because of the security issues associated with the internet and other networks. TCP/IP also refers to a set of data communication mechanisms that are put together in a software, and that enables users to access the internet and other private networks, without which the internet cannot function.
Armstrong, B., 16 January 2008. Managing Snapshots with Hyper-V. [online]. Available At:
Choi, M., Robles, R., J., Hong, C., Kim, T. (2008). Wireless Network Security: Vulnerabilities,
Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering. 3(3), pp. 79-83.
Indiana University, 10 January 2014. Knowledge Base – In Microsoft Active Directory, What are Group Policies? [online]. Available at: < https://kb. iu. edu/data/ajgk. html> [Accessed 8 November 2014]
Lavapie, R., 2012. Step by Step Guide for Windows Deployment Services. Smashwoods Edition. [online]. Available at:
Microsoft, 26 April 2012a. Windows Server –Differences Between RODC and Writable Domain Controller. [online]. Available at: < http://technet. microsoft. com/en-us/library/cc771545%28v= ws. 10%29. aspx> [Accessed 8 November 2014]
Microsoft, 21 December 2012b. Windows Server – Understanding Domain and Forest Functional Levels. [online]. Available at:
Microsoft, 3 December 2013. Understanding Active Directory Domain Services (ADDS) Functional Levels. [online]. Available at:
Microsoft, 2014a. Windows Server –Windows Deployment Services Overview. [online]. Available at: < http://technet. microsoft. com/en-us/library/hh831764. aspx> [Accessed 8 November 2014]
Microsoft, 2014b. Windows Server 2012 – R2 – Server Virtualisation Technical Overview. [online]. Available at:
Microsoft TechNet, 2003. What is Remote Installation Services? [online]. Available at:
Morimoto, R., Noel, M., Droubi, O., Mistry, R., and Amaris, C. 2008. Windows Server 2008
Unleashed. Sams Publishing. [online]. Available at:
Rouse, M., June 2009a. Server Virtualisation – Essential Guide VMWordld 2013 Conference Coverage. TechTarget. [online]. Available at:
Rouse, M, December 2010b. Virtualisation – Essential Guide to SQL Server Virtualisation Best Practises. TechTarget. [online]. Available at:
Rouse, M, June 2014. TCIP/IP Definition. [Online] Available at:
Yang, X., Pan, T., & Shen, J. (2010). 3G Based Mobile Internet in China: Service Marketing Research. Journal of 3G Mobile E-Commerce Platform Based on Cloud Computing. 1(1), pp 198-200.
Microsoft, 2014c. Monitoring Active Directory. TechNet. [online]. Available at:
Palmer, M., 2011. MCITP Guide to Microsoft Server 2008, Server Administration. Boston: Course Technology Cengage Learning. [online]. Available at:
Tomsho, G., 2009. MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Boston: Course Technology Cengage Learning. [online]. Available at: