Home About Me Guest Book Games Tips Al-Islam/Pakistan
SERIAL
NO. |
DESCRIPTION |
1 |
Type
of OS
|
2 |
Feature of OS |
3 |
Architecture of OS |
4 |
Windows NT environment |
5 |
Installation and Configuration of WinNT |
6 |
Managing file system |
7 |
Managing Partition |
8 |
Managing Fault Tolerance |
9 |
WinNT network services |
10 |
WinNT protocols |
11 |
Using WinNT (multi vender) |
12 |
Intro: administering WinNT |
13 |
User & group management |
14 |
Securing network resources, NTFS
permission |
15 |
Administering network printer |
16 |
Intro: to UNIX & LINUIX |
17 |
Core architecture & features |
18 |
File system & management |
19 |
Commands (User level) |
20 |
Commands (User level) |
21 |
Administration of User A/C |
22 |
Administration of Backup |
23 |
Administration of printing |
OPERATING
SYSTEM:
Operating system is software, which is used to manage all the internal
and external work of the computer as well as the communication between user and
machine.
There are two types of Operating System.
1) Single User Operating
System 2) Multi
User Operating System
Single User
Operating System:
In
single user operating system one user works on one task at the time. For
example DOS is a single user operating system.
Multi User
Operating System:
In
multi user operating system different users works in an operating system. For
example Windows & Windows NT is a multi user operating system.
Operating System
Stability:
Reliability:
Windows NT supports application in separate memory address spaces. When applications are running in separate memory address spaces, malfunctioning applications will not affect other application or the operating system.
Control
Programming:
Control program maintain the operating system efficiency. The central
program of operating system is “Kernel”. Window NT executive runs on kernel,
which is the mode of Window NT. Kernel protects the services of operating
system.
Operating
Systems Compatibilities:
If we works on an operating system and we called another operating
system, this method is called the Operating System Compatibilities.
Context
Switching:
If we work on more then one tasks, that is called the Context
Switching. This commands is ALT+TAB.
Virtual Storage
Memory:
Virtual Storage Place is the temporary memory, which is created by
operating system as per requirements. It created on the hard disk.
Real Time Processing:
The Real Time Processing is the concept in which another person can
check you that what are you doing at another system.
**WINDOWS NT
ENVIRONMENT**
Windows NT is a multipurpose network operating system that can act as both a client and a server in a network environment. Windows NT environment supports the Apple talk system, Netware and including Unix operating system.
Global User & Local User:
The
global user is always created on server & access on any network machine,
but local user is that who is access on that machine where it is created.
There are two types of Administrators.
1) Workstation Administrator:
Windows NT Workstation is optimized for use
as a high performance; secure network client and corporate desktop Operating
System. Windows NT Workstation can be used alone as a desktop Operating System,
networked in a peer-to-peer workgroup environment, or used as a workstation in
a Windows NT Server domain environment.
2) Server Administrator:
DOMAIN:
A domain is a logical grouping of computers
and users. In a domain, all computers have access to a central directory
database that stores security and user account information for the domain. One
or more Windows NT Server “Domain Controllers” manages the directory database.
There are two types of Domain.
1) Primary Domain Controller (PDC):
One computer in each domain, referred to as
the primary domain controller (PDC), is responsible for account maintenance.
The PDC is defined during installation. The PDC contains the master copy of the
directory database for the domain.
2) Backup Domain Controller (BDC):
The PDC periodically copies its directory
database to other computers running Windows NT Server in the domain. These
computers are designated during installation as backup domain controllers
(BDC’s). It is recommended to have at least one BDC in every domain, and it is
common to have more than one. If the PDC fails, a domain BDC can be promoted to
the role of PDC.
Workgroup & Workstation:
Before adding a machine in domain it is
simple a workgroup, but after adding its becomes the workstation.
SYSTEM LOGON PROCESS:
When we start the system of Window NT, three messages
(Ctrl+Alt+Del) are appearing on window screen. When we press these keys a new
window are appearing on screen, who are consists on User Name, password &
Domain. When we enter the password of machine, the system goes to Local
Security Authority (LSA). From (LSA) system go to System Account Manager (SAM) &
then go to Data Base. From Data Base system again return to LSA. When the
system checks that this password is correct he provide the key to logon into
the system.
**MANAGING FILE SYSTEMS**
During the installation
of Windows NT we also manage the file system as per our requirement on any
drive. This is very important for our network security & permission to any
user in a network environment.
There are two types of
file system that support Windows NT.
These file systems are
called as FAT (file allocation table) & NTFS (new technology file system).
File Allocation Table (FAT):
FAT is required for
Windows 95 & MS-DOS. There is no local security on FAT, but some advantages
in FAT file system, which are following.
* Supports Long File Systems.
* Maximum File/Partition Size: 4GB
* Provide the Attribute list of any file & folder &
easily hide or unhide to any file or folder.
New Technology File System (NTFS):
The NTFS file system is
most secure file system. If security is important in corporate environment, NTFS
is the preferred file system for Windows NT Server installation. NTFS allows
the administrator to set up permission that specify who can and cannot access
files or directories (folder) on the drive. In other words, selecting NTFS
allows the administrator to take full advantage of Windows NT’s security
features and the FAT file system does not.
The advantages of NTFS
file system are following.
* NTFS provide a local
security to any file or folder, which is most required on a network
environment.
* NTFS is the only file
system on computers running Windows NT that allows permissions to be assigned
to individual files & folders.
* NTFS also provide the audit system for file or folder and make ownership to any user on a file/folder.
**MANAGING PARTITION**
Before a hard disk can be
formatted with a file system, the disk must first be partitioned. Partitions
are logical divisions of a hard disk. As per above discussion we also manage
that files system during the partition a drive. In Windows NT we used that method
by Disk Administrator. Disk Administrator is considerably easier to use than
FDISK.EXE. We can create or delete partition by Disk Administrator.
Disk Administrator:
Disk Administrator is in
the Administrative Tools folder. It displays the system’s disk resources
through a status bar and legend. In Disk Administrator we creates logical
drives into the system as per our requirement. This partition method we used
for security of our data and to improve our system performance. The boot
partition contains system files such as the WINNT folder and the SYSTEM32
folder. When the system partition is set to active the computer will boot from
that partition. We also create primary partition or extended partition by Disk
Administrator.
Primary and Extended Partitions:
Before we can access our
hard disks, they first must be partitioned. We can create either primary
partition or extended partitions. A primary partition is a part of a disk that
can be used by the system to start the computer. A primary partition cannot be
partitioned further. The Windows NT system partition must be a primary
partition. Each hard disk can have up to four primary partitions.
If we use an extended
partition on a disk, we can only have three primary partitions on that disk. An
extended partition is a method for extending the four-partition limit, and for
configuring a hard disk into more than four logical volumes.
Volume Sets:
Volume Sets can be
created to optimize disk space usage. A volume set is a collection of
free-space area combined into a single logical drive, but does not improve
performance.
Combining from 2 through
32 areas of unformatted free space on one creates volume sets or more physical
drives. For example, 100MB of free space can be combined with 50MB of free
space to create a 150MB partition volume set.
Steps of creating for
Volume Set:
Ø
Open Disk
Administrator.
Ø
Select the
areas of free space to create volume set.
Ø
Choose
partition from the menu bar.
Ø
Enter the
size of the volume set.
Ø
Click OK.
Ø
Choose
partition from the menu bar for change the comments.
Ø
Format the
volume set.
**MANAGING FAULT TOLERANCE**
Fault Tolerance is used
to improve the performance of the system and the performance of hard ware
equipment like input out put controller on the different hard disk. When
planning partitions especially for system or boot partition we should also
consider Fault Tolerance.
RAID (Redundant Array of inexpensive Disk)
Fault Tolerance:
Windows NT server provides
a software implementation of a fault tolerance technology known as Redundant
Array of Inexpensive Disk (RAID). RAID Fault Tolerance is applied on the
different no. Of disk arrange in the form of Array inside the system at
different levels, which are following.
Ø
Level 0: Strip Set Without Parity
Ø
Level 1: Disk Mirroring
Ø
Level 5: Strip Set With Parity
Stripe Sets:
A stripe set is similar
to a volume set. Both volume sets and stripe sets combine area of unformatted
free space into one large logical drive.
Stripe Set Without Parity:
Stripe set without parity
use for creates the different number of partition on the different number of
hard disk. In this, we are used the partition for the different works. It is
also manage with the help of RAID fault tolerance. They can combine 2 to 32
areas of free space as a single logical drive, however, the free space must on
different hard disks and each hard disk must contain the same amount of free
space that you want to use for the size of the stripe set.
Stripe Set With Parity:
Parity is a mathematical
method of verifying data integrity. Three to 32 disks are supported in a stripe
set with parity. If a single disk fails, data is not lost because the Windows
NT Server fault tolerance driver has spread the information across the
remaining disks. The data can be completely reconstructed.
Steps to create stripe set with parity:
Ø
Logon with
Administrator.
Ø
Open disk
administrator.
Ø
Select the
area on different disk.
Ø
Click the
partition menu.
Ø
Clicks
create and select with parity.
Ø
Enter the
size of strips and then OK.
Ø
Again open
and write comments.
Mirror Sets:
RAID level 1 is disk mirroring, in which two hard disks contain identical information. If one drive fails, the other drive can still be accessed. Mirror sets are can be expensive because disk space usage is only 50 percent. However, for peer-to-peer and modest server based LANs, a mirror set usually have a lower initial cost because it requires only two disks.
A mirror set is used to get the backup of the drives.
Steps to creating mirror set:
Ø
Open disk
administrator.
Ø
Select the
partition that you want to mirror. Press Ctrl and select free space on another
drive that is the same size or larger than the partition you want to mirror.
Ø
Click Fault Tolerance to
establish mirror.
Disk Duplexing:
However, a second controller can be installed in the computer so that each disk in the mirror set has its own controller. This arrangement, called Disk Duplexing, can protect the mirror set against both controller failure and disk failure.
Disk duplexing is exactly like mirroring except that it uses two disk controller cards, one card for each drive in the mirror.
**WINDOWS NT
NETWORK SERVICES**
The Network program in Control Panel is used to install
and configure Windows NT networking components, such as protocols, network
adapter card drivers, and to configure bindings.
Network Adapter:
Network adapter also called as LAN card or NIC (Network Interface Card) card. Network adapter card are the physical interface between the computer and the network cable. Network adapter card drivers are typically installed during setup. To configure network adapter card drivers, in Control Panel, double-click the Network icon, and then click the Adapters tab.
Network
Services:
Windows NT network services provide a computer running Windows NT with access to the network and its resources. Select and install Windows NT network services through the Services tab in the Network program in Control Panel.
Client Service For Netware:
Client service for Netware, included with Windows NT Workstation, enables computers running Windows NT Workstation to make direct connections to file and print resources at NetWare servers running NetWare. Logon script support is also included.
Gateway:
Gateway provides the links between two different technologies or topologies.
GSNW enables computers running Windows NT
Server, and using NWLink, to access files and printers on NetWare servers.
Computer Browser:
On the Desktop the “Network Neighborhood” icon is called as Computer Browser. Windows NT uses the Computer Browser service to display a list of currently available network resources. The Computer Browser service maintains a centralized list of available network resources, called the browse list. By assigning the browser role to specific computers, the Computer Browser service reduces the amount of network traffic required to build and maintain a list of all shared resources on the network.
Server Services:
To install the Server service on a computer running Windows NT Server, in Control Panel, double-click the Network icon. On the Services tab, click Add, and then click Microsoft DNS Server. To start the service, restart the computer. Its primary function is to configure DNS objects. This service is use for server in the network environment.
Workstation Services:
Workstation is optimized for use as a high performance; secure network client and corporate desktop Operating System. This service is use for Workstation in the network environment.
**WINDOWS NT
PROTOCOLS**
Net BIOS extended user interface (NetBEUI)
is a protocol developed for small departmental LANs with 20-200 computers. It
is therefore not suitable for WANs. Bet BEUI is a small, fast protocol.
Apple Talk:
Another flexibility available with Windows NT is the support it provides to Apple Macintosh computers. To support the Macintosh as a client on a Windows NT based network, the Apple Talk protocol is utilized. Apple Talk works behind the scenes to ensure that computers on your network can talk to each other.
DHCP:
DHCP is the abbreviation of “Dynamic Host Connection Protocol”. DHCP is used to assign TCP/IP configuration parameters on networked clients. The DHCP server administrator configures a scope, for which sets of valid IP addresses are assigned. Each time a DHCP client starts, it requests this TCP/IP configuration information from a DHCP server receives a request, it selects an IP address from a pool of addresses defined in its database, and then offers it to the DHCP client.
TCP/IP (Transport Control Protocol/Internet Protocol):
TCP/IP is a networking protocol that provides communication across interconnected networks. TCP/IP can be used to communicate with Windows NT systems and with non-Microsoft systems, such as UNIX. TCP/IP must be configured manually. To do this, in Control Panel, double-click the Network icon, click the Protocols tab, and then double-click TCP/IP Protocol, In the Microsoft TCP/IP Properties dialog box, enter the TCP/IP configuration parameters. For each network adapter card in the computer that uses TCP/IP, three parameters can be configured: IP Address, Subnet Mask, and Default Gateway. TCP/IP is the default protocol when Windows NT Server is first installed. TCP/IP is a combination of protocols.
NW Link IPX/SPX:
It is most commonly used in environments where clients running Microsoft operating systems are used to access resources on NetWare servers. NW Link allows computers running Windows NT to communicate with other network devices that are using IPX/SPX. NW Link does not require any configuration.
Network Bindings:
Network bindings are links that
enable communication between network adapter card drivers, protocols, and
services.
Many combinations of network bindings are
possible. Here is an explanation of the example shown in the slide:
All three protocols are bound
to the Workstation service, but only the routable protocols, NW Link and
TCP/IP, are bound to the Server service. It is possible to select which
protocols are bound to the network adapter cards. Network adapter card (0) is
bound to all three protocols, while network adapter card (1) is only bound to
the routable protocols. Administrators have full control over which components
are bound together.
When adding network software,
Windows NT automatically binds all dependent network components.
To configure network bindings, in
Control Panel, double-click the Network program, and then click the Binding tab. The Binding tab shows the bindings for the installed network
components.
**USER &
GROUP MANAGEMENT**
Windows NT security is based on the concept
of user accounts. A user account is the user’s unique credential that allows
the user to access resources.
Types Of User Accounts:
There are three types of user account; one is the type of accounts that we create, and two are built-in user accounts that are created automatically when Windows NT Server or Windows NT Workstation is installed.
Domain User Account:
A domain user account contains information that defines a user to the domain. With a domain user account, a user can log on to the domain and gain access to domain resources from any computer on the network. A domain user account is always created in User Manager for Domains. This accounts is always created in the master directory database on the primary domain controller (PDC).
Local User Account:
A local user account contains information that defines a user to the local computer with a local user account; a user can log on to and access local resources. Local user accounts should only be created within a workgroup, as shown in the following illustration.
Types of Groups:
Adding a user account to a group makes the user a member and gives the user all the rights and permissions granted to the group. Group membership provides an easy way to assign permissions and user rights to sets of users at one time.
Local And Global Groups:
There are two types of groups, local and global.
Local Groups:
Local groups are used to provide users with permission to access a network resource on the local computer. Local groups are also used to provide users with rights to perform system tasks, such as changing the system time on a computer, or backing up and restoring files.
The following is the list of default local groups:
Ø Administrator
Ø Users
Ø Guests
Ø Backup Operators
Ø Account Operators (Domain Controller Only)
Ø Print Operators (Domain Controller Only)
Ø Server Operators (Domain Controller Only)
Ø Power Users (Non-Domain Controllers)
Ø Replicators
Global Groups:
Global groups can contain only user accounts from the domain where the global group is created.
Although global groups can be assigned permission to resources, use global groups only for grouping domain user accounts. By default, all domain user accounts are added to the Domain Users group.
The following is a list of the default global groups:
The default global groups are:
Ø Domain Administrator
Ø Domain Users
Ø Domain Guests.
USER
MANAGER:
Within the Administrative tools program group there is an icon entitled User Manager for Domain, which an administrator uses to control the various features of a user account. In User Manager a list of Usernames at the top and groups at the bottom, within the username area there are three columns. The first is the username itself, the second is the full name of the user, and the third column is a brief description of the user. If there is more than one domain in an organization, the description field helps administrator maintain and troubleshoot the user database.
User Profiles:
In Windows NT, a user’s computing environment is determined primarily by the user profile. Windows NT security requires a user profile for each account that has access to the system. The user profile contains all user-definable settings for the work environment of a computer running Windows NT, including display, regional, mouse, and sounds settings, and network and printer connections.
Roaming User Profiles:
Unlike a default user profile, roaming user profiles provide users with the same working environment, no matter which Windows NT-based computer a user logs on to. Roaming user profiles are stored centrally on a network server rather than on the user’s local computer.
This is a user profile that a user can change. If we use roaming personal user profiles, each user should be assigned his or her owned profile.
Mandatory User Profiles:
This is a pre-configured user profile that users cannot change. One mandatory profile can be assigned to many users. We use this type of profile to assign common settings for all users who require identical desktop configurations.
** SECURING
NETWORK RESOURCES, SHARE & NTFS PERMISSION **
Windows NT enables we to designate disk resources that you want to share with others. For example, when a folder is shared, authorized users can make connections to the folder from their own computers. When a folder is shared, all users by default can connect to the shared folder and gain access to the folder’s content.
We can assign share permissions to user and group accounts to control what users can do with the content of a shared folder. A shared folder appears in Windows NT Explorer and My Computer as an icon of a hand holding the shared folder and is often referred too simply as a share.
Share Permissions:
To control how users access a shared folder, we can assign share permissions to users, groups, or both. The following illustration shows the share permissions, from most restrictive at the bottom to least restrictive at the top.
The following table describes the four share permissions.
Full Control: Modify file permissions.
Take ownership of files on NTFS volumes.
Perform all tasks permitted by the change and read permissions.
Change: Create folder and add files.
Change data in files.
Delete folders and files.
Read Only: Display folder name and file names.
Run program files.
Access other folders within that folder.
No Access: Establish only a connection to the shared folder. Access to the folder is denied and the contents do not appear. This is the most restrictive permission, and is useful for high security.
Assigning
Share Permissions:
After we assign a share name, the next step is to specify which users can access the shared folder by assigning permissions to selected users or groups. By default, when a folder is shared, the everyone group is assigned the Full Control permission from everyone and assigned permissions to specific user and group accounts.
NTFS Permissions:
NTFS permissions are permissions that are only available on a volume that has been formatted with the Windows NT file system (NTFS). NTFS permissions provide a greater degree of security because they can be assigned to folders and to individual files.
NTFS permissions are assigned to user and group accounts in the same way that share permissions are assigned-a user can be assigned NTFS permissions directly or as a member of one or more groups. For example, if a user has read permission to a folder and Write permission to a file in that folder, then the user will be able to write to the file, but will be unable to create a new files in the folder.
Assigning NTFS Permissions:
When a volume is formatted with NTFS, the permission Full Control is automatically assigned to the everyone group.
We modify permissions by right-clicking the folder or file in Windows NT explorer, clicking Properties, clicking the Security tab, and then clicking Permissions.
The following table describes the Permissions dialog box.
Replace Permissions on Subdirectories: If selected, changes existing permissions for all folders within the selected folders. This option does not change permissions on existing files in the folder. This check box is cleared by-default.
Replace Permission on Existing Files: If selected, changes existing permissions for all files within the selected folder only. It does not change file permissions for folders within the same folder.
Name: Display the folder or file permissions assigned to a group or user for the resources.
Type of Access: Display the folder or file permissions for the selected group or user in the Name box and allows you to change the permission assigned to the selection.
Auditing Files
and Folder:
To gain access to the Directory Auditing dialog box, in Windows NT Explorer, right-click the folder or
File, click Properties, click the Security
tab, and then click Auditing.
The following table explains the options for auditing folders.
Replace Auditing on Subdirectories: Having auditing changes apply to all folders within the folder.
Replace Auditing on Existing Files: Apply auditing changes to the folder only. This check box is selected by default.
The following table describes the events that we can audit for both folders and files:
Read: when a user opens a file; views its attributes, permissions, or owner; or copies the file.
Write: when a user changes a file’s content or attributes; views its permissions or owner; or copies the files.
Execute: when a user views a file’s attributes, permissions, or owner; or starts a program.
Delete: Deleted folder or files. Tracks copying of files.
Change Permissions: change to folder or file permissions.
Take Ownership: change to folder or file ownership.
Taking
Ownership of Folders and Files:
By default, the user who creates a folder or file is the owner. In some situations, it may be necessary for an administrator to remove control from a user by taking ownership of the folder or file. The user who creates a folder or file is the owner of that folder or file. As the owner of a folder or file, a user can share the folder and assign the Take Ownership permission (0) to other users and groups.
How to Take Ownership:
By default, users who are members of the Administrators group always have the ability to take ownership of a folder or file.
The following checklist provides how to take ownership of a file:
v
Log on as
Administrator.
v
On the Security tab of the folder Properties, click Ownership (to determine the current owner).
v
In the Owner dialog box, click Take Ownership.
**ADMINISTERING
NETWORK PRINTER**
Windows NT offers several advanced printing
features. For example, as an administrator, we can remotely administer Windows
NT print servers. Another advanced feature is the fact that you do not have to
install a printer driver on a Windows NT client computer to enable it to use a
Windows NT print server.
Printer:
A printer is a software interface between the operating system and the print device. A print server is the computer that runs the printer software, and that receives and processes documents from clients.
To add and Share a Printer:
Ø
Log on as
Administrator.
Ø
Click the Start button, point to Settings, and then click Printers. The printer window appears.
Ø
Double-click
the Add Printer icon.
Ø
Click Next to adds a printer on Server.
Ø
Under Available ports, select the LPT1 check box, and then click Next.
Ø
Under Manufacturers, click EPSON.
Ø
Under Printers, click EPSON-400LQ, and then click Next.
Ø
To accept
the default settings, click Next.
Ø
Click Shared.
Ø
When asked
if we want to print a test page, click No
for not printing a test page, and then click Finish.
The printer driver folder name is I386.
Spooling:
A process on a server in which print documents are stored on a disk until a printing device is ready to process them or spooling is the concept used the printer make a queue for the printing job.
** INTRODUCTION
TO ADMINISTERING WINNT **
Windows NT Server is optimized for use as a file, print, and application server that can handle tasks for organizations ranging from small workgroups to enterprise networks.
Administrator Responsibilities:
It is provide to create a checklist of network administration duties for which an administrator is responsible. These include:
Creating And Managing User Accounts.
Security.
Updating Existing Software And Implementing New Software.
Archiving.
Preventing Data Loss.
Monitoring And Regulating Server Storage Space.
Data Backup.
Protecting The Network Against Viruses.
Troubleshooting.
Adding New Computer To The Network.
Windows NT Administrator Tools:
Both Windows NT Server and Windows NT Workstation include administrative tools. The Windows NT Workstation administrator tools are only used to administer the local computer. The Windows NT Server Administrator Tools are used to administer any computer in the domain.
The following illustration shows the administrative tools that are installed on a computer running Windows NT Workstation.
Backup.
Disk Administrator.
Event Viewer.
Performance Monitor.
Remote Access Admin.
User Manager.
Windows NT Diagnostics.
The following illustration shows the administrative tools that are installed on a computer running Windows NT Server.
Administrative Wizards.
Backup.
Disk Administrator.
Event Viewer.
License Manager.
Migration Tool for Netware.
Network Client Administrator.
Performance Monitor.
Remote Access Admin.
Server Manager.
System Policy Editor.
User Manager for Domains.
Windows NT Diagnostics.
The following table describes the administrative tools that will be used throughout in Server and Workstation.
Administrative Wizards:
The administrative wizards are Windows NT Server tools that guide you through tasks, such as creating user accounts, creating and modifying group accounts, setting permissions on files and folders, and setting up network printers.
User Manager for Domain:
User Manager for Domains is a Windows NT Server tool that enables you to establish, delete, or disable domain user accounts. We can also set security policies and add user accounts to groups.
User Manager:
User Manager is a Windows NT Workstation tool that enables you to establish, delete, or disable local user and group accounts.
Server Manager:
Server Manager is a Windows NT Server tool that enables you to view and manage computers and domains.
Event Viewer:
Event viewer notifies you and puts the event in a log. It provides information about errors, warnings, and the success or failure of a task, such as a user logon attempt.
Windows NT Diagnostics:
Windows NT Diagnostics displays and prints system configuration information, such as data about memory, drives, and installed services.
Backup:
Backup is a tool used to back up information to your local tape drive. Backing up your computer protects your data from accidental loss and media failures.
Disk Administrator:
Disk Administrator is in the
Administrative Tools folder. It displays the system’s disk resources through a
status bar and legend. We also create primary partition or extended partition
by Disk Administrator.
Performance
Monitor:
We can use Performance Monitor to look at resource use for specific components and program processes. With Performance Monitor, we can use charts and reports to gauge our computer's efficiency, identify and troubleshoot possible problems.
Remote Access Admin:
Remote Access Admin is use to administer RAS servers and set permissions for RAS users. On a Windows NT Workstation computer, a RAS server supports only one dial-up connection. On a Windows NT Server computer, a RAS server supports 256 dial-up connections.
**USING WINNT (MULTI
VENDER)**
Windows NT is a multipurpose network operating system that can act as both a client and a server in a network environment. The steps in which we are created a network environment in an organization are the following. A proper network cable and two or more system with LAN Card are required to create a network environment.
Steps for Creating/Maintain a Network:
Ø Click the Control Panel from settings, and then click the network icon in control Panel (on each machine separately).
Ø Add the adapter of that company which we installed internally into the system. (The adapter driver name is 3COM or new 3 COM).
Ø If the message is appeared to shutdown the system click Yes.
Ø After the installation of LAN Card, add TCP/IP & NetBEUI Protocol from network icon.
Ø Add the services of Server, Workstation and Computer Browser service.
Ø Click the TCP/IP protocol from network icon in Control Panel and click Properties.
Ø Write down the IP address and subnet mask address and then bind these protocols.
Ø If the message is appeared to shutdown the system, click yes to restart.
Ø Click network icon from Control Panel and click the identification tab to add the machine into the Domain.
Ø Write down the machine name and write down the Domain name in identification tab.
Ø If the message is appeared to shutdown the system, click yes to restart.
Ø If the above operation is complete go to the Server and click the start button, go to program and then go to Server Manager in administrator tool.
Ø Click the add system to add the machine in server.
Ø Give the computer name and then click add.
Ø If the message is appeared to shutdown the system, click yes to restart.
Ø The message is appeared for Welcome to the Windows NT Server.
**INTRODUCTION TO UNIX
**
Unix is an operating system “a master control” that operates the computer on user behalf. Unix is a general-purpose operating system. Unix system includes both the operating system and an associated command. They have simple but powerful command language and a device independent file system.
The Unix system is very successful at the time. Unix can be found in universities, government, laboratories, commercial organization and many other areas of industry. The software, which supports the Unix, called as Telnet. The minimum 386 machine, 4MB Ram and 55 to 60MB hard disk space required for Unix. The administrator name in Unix called as Root and Root belong the other group.
Unix Controlling:
There are three different groups co-ordinates together and control the Unix.
Unix Developers:
· AT & T
· University of California
· IBM
· Open Software foundation
Unix Setters:
· Unix International
· ANSI (American National Standard Institute)
· IEEE (Institute of Electrical & Electronics Egg.)
· ISO (International Standard Organization)
· NIST (National Institute of Standard & Technology)
Unix Users:
· Uniform
· Userix
Unix Terminals:
The Unix terminal name is host terminal or consol terminal.
Dump Terminal:
Those terminals consider are the dump terminals, which there is no use of their own processor.
Intelligent Terminals:
Those terminals consider as the intelligent terminal, which there is use of own processor.
Dial in Terminals:
In these terminal the telephone line are involves.
Terminal Emulation:
The terminal emulation the concept in which is used two different operating system the help of terminal emulation on the one system at the same time. A software, which is provided this facility, is called the terminal emulation software. Vt100 is used in terminal emulation.
**CORE ARCHITECTURE
& FEATURES OF UNIX**
Unix created in 1960 from Bell Labs. The following of the some salient features of Unix is operating system for which it is famous in the market. In Unix each and every information called in file type therefore if we want to get any information about any file we open a concerning file.
Multi Tasking:
In multi tasking more then one program executes at a time. Unix can print a document edit another and sort a list of files at the same time. Multi tasking means more then one task performs at a same time.
Multi Users:
A multi user operating system permits several users to use the same computing jobs. Several terminals are connected to a single powerful computer (Server) and each user of the terminal can run program, access file and print a document at the same time.
Communication Facilities:
Unix supports two major type of communication.
1) Communication between different terminals connected to the same computer.
2) Communication between user of the one computer at a specific location to the user of another type and size of the computer located elsewhere.
Strong Security:
The several levels of security exist in Unix. It level is system security. This ensures that just any body can start running Unix on our system. A started ‘login’ procedure has been incorporated before Unix even starts running on the system. 2nd level is incorporated into Unix, when it comes to accessing files. The owner of a file to each of his files can assign three permission namely “Read, Write and Execute”. All these permissions can be individually conceded or denied to all other users of the system. 3rd level of security allows users to except data files on the disk, so that even if someone does manage to access them, he can’t make much sense of it.
Time Sharing:
Time-sharing is way-allowing user to run program on different terminals at the same time.
Tree Structure:
In Unix the structure is hererical structure that is define in the following table.
. Boot.
. Unix
. Unix Old
. Dos
. Bin (all necessary file or required files)
. Etc (file which are used as per requirement)
. Lib (all the manual help files)
. Install (software install concerning files)
. Dev (all the device concerning files)
. U (user account folder in new version)
. User (user account folder in old version)
. Tamp (all the temporary files created in this folder)
. Lost & found (concerning with send the message from server backup)
. West Basket (like recycle bin to every terminal)
**FILE SYSTEM AND
MANAGEMENT**
There are two type of ordinary file.
1) Text file (in text type) 2) Binary File (in binary type)
Directory File:
Directory file are those file who just like a directory.
Special File:
The entire device file consider as a special file.
Different Type of File:
S (system file) __ (ordinary file) D (directory file) M (memory file)
B (block device file) C (character device file) L (link file)
Shell:
Shell is the command place of the Unix that is use to put the command at the shell prompt to get their result.
Born Shell:
Stephen R.Bourne creates it in bell laboratory in 1970. It indicate by $ sign.
Korn Shell:
David Korn working in Bell lab developed Korn Shell. Later there were some amendment on its.
(1) History Mechanism (2) Job Controlling (3) Allaying
History Mechanism:
Same as dos key keeps previous command in the buffer memory.
Job Controlling:
If we use Korn Shell we can stop a command, pause, delete a command.
Allaying:
To rename some things and can renaming commands.
C Shell:
Syntax: $CSH to move to the C Shell.
After this command the prompt change into % sign for indication of C-Shell. When there was more development in Unix, it was converted into C language. The Korn Shell was adopted as it is but brought some more changes.
I node:
I node is the abbreviation of index node. It stored the information for each and every file present in the system. This information file called by specific name “I node or Index node”. Each node contains all the information that Unix needs in order to work with any specific file. I node is control by Kernel.
The information of file is following:
1) Type of file
2) Size of the file
3) Time & date of creation
4) Honored of the file
5) Last time which is modified
6) Last time which is access
7) Last time the I node was modify
8) Numbers of the links
. Profile:
In which each and every information of the created users is present like user name, assigned rights, assign shell etc.
**COMMANDS (USER
LEVEL)**
PS: This command provides the process perform/shell presentation.
WHO AM I: This command is use for user identification.
PWD: To show the present working directory, if show not found us CD command.
DOT: for hidden a file (dot . abc).
LS –A: To view hidden files.
TTY: This command is used for check the terminal no.
U Name: To provide version of system.
U Name - A: To provide all the information about Unix.
DATE: To show the system date and time.
CAL: To use for calendar.
MESG: This command is used to accept or reject the different messages.
MESG – Y: To accept the messages of user levels.
MESG – N: To reject the messages of user levels.
WRITE: To
write same data into another terminal. To exit from this command we use Ctrl+D.
Syntax: (Write <terminal no>)
HELLO: To exit from write command.
WALL: First we move in specific directory we gone into ($ Cd/etc/wall).
Wall we use to send the message on every terminal.
CAT: To display all the contents to hidden or present file or to show the. Profile contents.
Syntax: Cat. profile | pg
REDICATOR: Redicator we use for write any file into the system.
Syntax: (Cat > abc) To save the file we used Ctl+D.
If we read the above file on the screen (abc) we write ($Cat ABC).
If we use ($Cat ln ABC) the result of this command show the file in lines.
Another command of Cat is ($Cat>/dev/terminal number).
CHMOD: This command is used to change the rights (rwx) to different groups.
Syntax: (chmod 7 or 3 or 1 abc)
BANNER: This command is use to show any message on the screen.
BANNER “Hello”: This command is use when we show the message on our terminal.
If we show the message on another terminal we use (Banner “hello”>/dev/terminal number).
W/WHO/WHO DO: This command gives the information about current login user.
WC: This command is use for word counting in a specific file.
Syntax: WC<file name>
WC – w space – c – s<file name> is showing the sentences, word etc.
LP: This command is use for line printer.
KILL: kill command is use for end any task when our system is hanging.
Syntax: kill – 9<terminal number>
LOCK: This command is use for lock the system for one minute.
If we want to lock the terminal for five minutes we use (lock-v-300).
GREP: This command is use to search any specified wording in a specified text file.
Syntax: grep “string” <file name>.
CHONAR: It is use to change the owners of any specific file.
Syntax: chonar<file name>.
HEAD: This command is use to display the first 10 lines of any specified file.
Syntax: head<file name>.
TAIL: This command is used to display the bottom 10 lines of any specified file.
Syntax: tail<file name>.
LAST: This is use to display the view of events same as Windows NT in event viewer.
KILL ALL: This command stops all the process.
SYSADMSH: This command is the abbreviation of “system administrator shell”. If we want to perform the administrator activities then we apply this command to activate administrator shell.
Syntax: sysadmsh.
KSH: To move on the Korn Shell. To exit from this command we use exit.
CSH: To move on C Shell. The C Shell symbol is %.
BC: This command is use for basic calculator.
MAIL: This command is use to send the message to any user.
Syntax: mail student.
MV: This is use to move the file from one place to another place with all links.
Syntax: mv<file 1><file2>.
CP: This is use for copy the first file into the second file.
Syntax: cp<file
1><file 2>.
MAN: This command is use to get the help from Unix.
Syntax: man<any command>.
COPY: To copy the file into other file.
Syntax: copy<file 1><file 2>.
MKDIR: This command is use to create a directory.
Syntax: mkdir<directory name>. To exit from directory we use CD <file name>.
If we want to view the contents of a directory we use PWD.
RMDIR: To remove the directory.
Syntax: RMDIR<directory name>.
RM: This command is use for delete any file.
Syntax: RM<file name>.
SU: This is the super user command to apply password.
MORE: This command is use for appearing the files lines by lines.
For example ($ Cat. profile | more). To exit from lengthy file we use delete key.
ENABLE or DISABLE: To disable or enable the any terminal.
Syntax: Enable<terminal number>.
Disable<terminal number>.
DOSDIR: To show the Dos base files in Unix.
Syntax: $Dos dir.
FIND: This command is use to find any specified or specific file.
Syntax: $find-v-f</file name>
**INTRODUCTION TO
LINUX **
Linux is the multi-user and multitasking operating system. It is an operating system the modified form of Unix with GUI concepts. Linux security system is very high from Windows NT and Unix. In Linux the different users can work at the same time. The function are pre-define routine in Linux.
Where Linux
Came From:
Linux torvalds is created the Linux, which is the project of Minix. The purpose of Linux is the switch to different tasks or objects. In 1991 the Linux release in Internet and the first version of Linux is 0.01 and 0.02 is the second version of Linux.
The Linux Release
Companies:
1) Red Hat
2) Open Linux
3) Gaiters
4) Sues
Contents Of
Linux:
1) Each and every standard compiler is available in Linux.
2) The all-standard protocols are also available in Linux.
X-Window
System:
X-Window system are simple X is a standard graphical user interface for Linux machine and is the powerful environment which support the many application. $ Start X is use for to show the Linux with GUI.
**FILE SYSTEM OF
LINUX**
User Data File:
User data files are those types of files that are concerned the user.
System Data
File:
Those files that are created by the system are called System Data Files.
Directory File:
That files consider as directory.
Special File:
Special file is all device concerning files. For example Hdc, Hdd, Hde.
Executable
File:
Those file which are provide output after execute.
BASH:
To create the new users define commands in Born again shell. BASH features are same as Unix.
DTSH:
DTSH is the abbreviation of Desktop Shell. This directory activate when the Linux works on GUI mode.
TCSH:
The TCSH is just like C Shell and also built-in c compiler at the command prompt.
**INSTALLATION AND
CONFIGURATION OF WINDOWS NT**
Windows NT
is a multipurpose and multithreaded operating
system and provides a secure network environment.
The following is the minimum requirement for hardware configuration of the
system for Windows NT.
1)
Minimum 386-motherboard machine.
2)
Minimum 16 MB Ram for Workstation.
3)
Minimum 32 MB Ram for Server.
4)
Approximately 110 MB space for Workstation +
110 MB free space.
5)
Approximately 125 MB space for Server + 125 MB
free space
Before installing
of Windows NT, decide which file system to use. Windows NT supports the
following file system on hard disk.
Ø
FAT (File
Allocation Table)
Ø
NTFS (New
Technology File System)
We also manage
these file system during the installation of Windows NT because Windows NT
support both file system.
During the
pre-installation process we can use FDISK and FORMAT from a DOS boot disk to
partition and format the hard disk. For this exercise, we will need both a DOS
boot disk with FDISK and FORMAT as well as the installation CD and boot disks.
In the following
exercises, we will prepare our hard disk for Windows NT Server installation.
1)
We insert the Windows NT bootable disk. If we
use the DIR command in CD drive we
can see the different directory in CD drive. In these directory the I386 is use for Workstation and NT4 is use for Server installation.
2)
Now we use the command CD NT4 for Server installation.
3)
After above step we use CD I386 command. The I386
directory is available in both
Workstation and Server.
4)
Now we enter the command WINNT/B to start the boot installation. We use B command if we not use the floppy drive. If we use floppy drive to
boot the system then we not use the B command
with the WINNT command.
Now the system is
ready to start Windows NT setup and installation.
After these steps
the system will boot for installation of Windows NT and copying files from CD
to Hard disk. After a few minute the system will say that the system is
restarting. Now we removed the CD drive from CD Rom and click Yes to restart.
The different options
are following which is including in installation of Windows NT.
SETUP INITIALIZATION.
INSTALLED STANDARD.
FINISHING SOFTWARE.
These steps are
given below which are questionnaire during the installation.
**SETUP INITIALIZATION**
1) Question about Organization:
In this step, we
give the User Name and Company Name.
2) Question about Server Type:
In this step, we
give the information about Per Server
(limited) and Perceet Server (un limited).
If we select the Per Server option we define the connection. So we select the
Perceet Server.
3) Question about Server Information:
In this step, we
defined the following information about server.
Ø
PDC (Primary Domain Controller).
Ø
BDC (Backup Domain Controller).
Ø
Stand
Alone (If the server is more
than one in a network environment, we select the Stand Alone option).
4) To Create Emergency Disk:
If we do not create
an emergency disk, we escape this option.
5) To Confirmed the Contents:
In this option we
confirmed the contents.
**INSTALLED STANDARD**
1) Information about the Network:
In this way we
define the network type, which are following.
1) Wide Network 2) Remote
Access Network
In the network
option we select the Wide Network type.
2) Information about Internet Server:
In this step, we
define the Internet Server. For example, HTTP and FTP.
3) Question about Installation of Network
Adapter:
In this, we select
any network Adapter Card / LAN Card.
4) Question about Protocols:
In this step we select
all Protocol because any one protocol use in anywhere.
5) Question about Services:
In this step we
also select all the services.
6) Question about DHCP:
If we select the
TCP/IP the next question after Services will be DHCP. The DHCP configured
TCP/IP automatically.
7) Question about IP address of Server:
In this step we
define the IP address of Server.
8) Question about Password of Supervisor:
After the assigning
of IP address the next question is the password of supervisor, which we assign
our machine.
**FINISHING SOFTWARE**
1) Question about Services:
The first question
of Finishing Software Option is about Services.
2) Create Sub-directory:
This means that are
we create a sub-directory for SQL Server or ODBC (Open Database Connectivity).
If we installed the SQL server after the installation of Windows NT we select
this option as per our requirement.
3) Question about Time & Zone:
The next question
about Time and Zone of our system.
4) Question about the Display:
The last question
is concerned about system display.
**Now the installation setup is completed and
we can start Windows NT Server**