Practical File of Hos
-
Upload
simargrewal -
Category
Documents
-
view
236 -
download
0
Transcript of Practical File of Hos
59
HTTP
Hypertext Transfer (or Transport) Protocol, the data transfer protocol used on the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.
HTTPS
Hypertext Transfer Protocol: a protocol to transfer hypertext requests and information between servers and browsers. If you're going to run an online store or ecommerce Web site, you should be aware of HTTPS - or HyperText Transfer Protocol with Secure Sockets Layer. HTTPS is a protocol to transfer encrypted data over the Web.
There are two primary differences between an HTTPS and an HTTP connection work:
HTTPS connects on port 443, while HTTP is on port 80 HTTPS encrypts the data sent and received with SSL, while HTTP sends it all as
plain text.
FTP
Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
59
SFTP
SFTP is secure FTP. Secure File Transfer Protocol (SFTP) encrypts both commands and data. SFTP prevents passwords and sensitive information from being transmitted over the network, and is thus much less vulnerable to third-party interception. SFTP functionally similar to FTP with a different protocol(with is secure than traditional FTP software).
SSH
SSH, the term derived from Secure Shell, provides users with a secure, encrypted mechanism to for accessing systems that are supporting remote connections through the ssh services and do the various jobs from maintenance of Unix/Linux systems to the plain files transfers as it can be used as a secure replacement for FTP as well.
BOOTP
Short for Bootstrap Protocol, an Internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the workstation to boot without requiring a hard or floppy disk drive. The protocol is defined by RFC 951.
Routable Protocols
Data being sent from one LAN to another along any of several available paths is routed. The protocols that support multipath LAN-to-LAN communications are known as 'Routable Protocols'. Because routable protocols can be used to tie several LANs together and create new wide-area environments, they are becoming increasingly important. TCP/IP is the 'routable protocol'. Because Routable Protocols are relatively large protocols than the non-routable ones, they are slow in everything. They involve many types of error-checking and other functions, which increase the size of data-packets.
59
Routed Protocols
Routed protocols can be sent over a routed network. Today, with IP (think of TCP/IP) being the predominate protocol in use on the Internet and in most networks, we don't often think about routed versus unrouted protocols. That is because IP is a routed protocol. Meaning, IP is designed such that it can be routed over and through different networks. This is because the IP address is broken up into network and node (host) by the subnet mask. An example of a protocol that is not routed (unroutable) would be NetBIOS. It works great on a small local network (in your house) but wouldn't work well over a large network connected by dedicated network circuits or the Internet.
UNC
Short for Universal Naming Convention or Uniform Naming Convention, a PC format for specifying the location of resources on a local-area network (LAN). UNC uses the following format:
\\server-name\shared-resource-pathname
So, for example, to access the file test.txt in the directory examples on the shared server silo, you would write:
\\silo\examples\test.txt
You can also use UNC to identify shared peripheral devices, such as printers. The idea behind UNC is to provide a format so that each shared resource can be identified with a unique address.
UNC is supported by Windows and many network operating systems (NOS's).
RDP
Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server.
RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.
59
Noteworthy properties of RDP include encryption, smart card authentication, bandwidth reduction, resource sharing, the ability to use multiple displays and the ability to disconnect temporarily without logging off. RDP also allows redirection of functions such as audio and printing.
RDP can support up to 64,000 independent channels for data transmission. Data can be encrypted using 128-bit keys and the bandwidth reduction feature optimizes the data transfer rate in low-speed connections.
The protocol has presented some security issues, however. For instance, if an administrator opens a thin-client connection between computers, an attacker who is able to break into the RDP connection would have administrator privileges on both computers. It is generally recommended that RDP only be used when it is absolutely necessary and that both the administrator and end user run with the lowest level of privileges possible.
Client Server Model for Networking
The term "Client-Server model" has several uses but all are based around the same concept of using a client system to access a centralized server in order to use a service. When a network protocol is described as being 'client-server', we mean that the application runs as a service on a server, and a client version of the application is used to access the service. There are some very specific characteristics of a client server implementation:
The server provides services and data The server abstracts communication and information access, allowing clients
to make simplified requests for services and data.
The client handles all aspects of data presentation and the user's interface.
59
IP Address
Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address.
There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address system as well. Here's what these two address types mean:
IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is expressed by four numbers separated by dots. Each number is the decimal (base-10) representation for an eight-digit binary (base-2) number, also called an octet. For example: 216.27.61.137
IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is expressed by eight groups of hexadecimal (base-16) numbers separated by colons, as in 2001:cdba:0000:0000:0000:0000:3257:9652. Groups of numbers that contain all zeros are often omitted to save space, leaving a colon separator to mark the gap (as in 2001:cdba::3257:9652).
MAC Address
59
Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sub-layers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium. Consequently, each different type of network medium requires a different MAC layer.
On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.
How to Find a MAC Address
To display your MAC address on a Windows NT/2000/2003/XP/Visa computer:
Click START Go to ACCESSORIES
Select Command Prompt
Type: (no quotes) "ipconfig /all"
In the "ipconfig /all" results look for the adapter you want to find the MAC address of. The MAC address is the number located next to "Physical Address" in the list.
Subnet Masking
TCP/IP communication between computers is divided into packets with headers (electronic address labels) that identify the IP address of the computer a packet is coming from, and the IP address of the computer it is going to (the destination).
Every IP address is divided into a network ID portion and a client ID portion. On the internet, routers look at the 3 binary digits on the left of the destination IP address to determine an IP address's "class." (An IP address is 32 binary digits.) The router then uses the class to determine how many binary digits make up the network portion of the IP address: 8 for class A's, 16 for class B's, and 24 for class C's. It uses a database in the router (called the routing table) to decide where to send it next.
59
Once a packet is passed by an Internet router to its destination network, it is either on the LAN segment of the destination computer, or the LAN has been subdivided by the LAN administrators. If its on the destination computer's LAN segment, the destination computer uses it and it goes no further. If a network administrator has divided the LAN, and the destination computer is not on the current LAN segment, the corporate routers (not Internet routers) must now determine how to forward the packet to the correct LAN segment. These corporate routers are what sub-divide the LAN.
The "network" portion of the IP address doesn't help the corporate router, because every IP address in the subdivided LAN has the same network ID. This is what the subnet mask is for. Here's a key point: A subnet mask is used both when a LAN is subdivided, and when it is not subdivided (a single LAN segment).
If the LAN is not subdivided, the subnet mask shows that the LAN is a single segment. For example, with a class C IP address, the first 3 octets (w.x.y in the w.x.y.z format, or the left-most 24 binary digits) are the network ID portion, and a subnet mask of 255.255.255.0 would be used to indicate that there was only one undivided LAN segment. In this case, the client ID portion of the IP address (the z in the w.x.y.z format) is not divided, and all 8 binary digits are used to identify a specific computer on the LAN segment. (In binary, a mask of 255.255.255.0 is 11111111.11111111.11111111.00000000.)
When a LAN is subdivided, the client ID portion of the IP address is split! The part on the left is used to identify the corporate LAN segment, and the part on the right is used to identify a specific computer on that LAN segment. With a class C IP address, and a subnet mask of 255.255.255.192, the 192 tells the corporate routers that of the eight binary digits making up the client ID in a class C IP address, the 2 on the left are to identify the LAN segment, and the remaining 6 identify the specific computer on that LAN segment. (In binary, a mask of 255.255.255.192 is 11111111.11111111.11111111.11000000, and the digits in red show which digits of the client ID portion are masked, and therefore used to identify a corporate subnet.)
Gateway
A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside
59
network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.
In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.
Bridge
A bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments.
Bridges operate at the data link layer (Layer 2) of the OSI model. Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet bridge, for example, inspects each incoming Ethernet frame - including the source and destination MAC addresses, and sometimes the frame size - in making individual forwarding decisions.
Bridges serve a similar function as switches, that also operate at Layer 2. Traditional bridges, though, support one network boundary, whereas switches usually offer four or more hardware ports. Switches are sometimes called "multi-port bridges" for this reason.
RouterA router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called routing, which is somewhat like switching, but a router is different from a switch. The latter is simply a device to connect machines to form a LAN.Routers are physical devices that join multiple wired or wireless networks together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks (as gateways do), and that the router operates at the network layer of the OSI model.
59
Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being the most common OSI network layer protocol. An IP router such as a DSL or cable modem broadband router joins the home's local area network (LAN) to the wide-area network (WAN) of the Internet.
Ethernet
Ethernet is a protocol that controls the way data is transmitted over a local area network (LAN). It uses wires (meaning it is not a wireless technology).
The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. If you want to see what a coaxial cable is like, look at the thick cable that links your TV antenna to your TV set.
Ethernet is by far the most popular LAN protocol used today. It is so popular that if you buy a network card to install on your machine, you will get an Ethernet card, unless you ask for something different, if of course that different protocol is available.
Ethernet has evolved over the years. Today, you can get cheap Ethernet LAN cards with speeds up to 100 Mbps; while the fastest Ethernet reaches Gbps (1 Gbps = 1000 Mbps) in speed.
Internal Modem vs. External Modem
There are 2 basic physical types of modems: Internal & External modems. External modems sit next to the computer and connect to the serial port using a straight-through serial cable.
59
An internal modems is a plug-in circuit board that sits inside the computer. It incorporates the serial port on-board. They are less expensive than external modems because they do not require a case, power supply and serial cable. They appear to the communication programs as if they were an external modem for all practical purposes.
Radio and Microwave Signal"Radio" or "Radio Waves" are energy expended in the form of electro
magnetic radiation. More specifically the term "Radio" refers to a specific frequency pattern of that radiation. This is how Radio broadcasting works. "Microwaves" are a said to be all radio frequency between 300Mhz and 30 Ghz. Thus microwave is a specific class of "Radio Wave". For more in depth explanations research the theroys of Heinrich Hertz.
59
NTFS
Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating systems such as DOS.
For large applications, NTFS supports spanning volumes, which means files and directories can be spread out across several physical disks.
FAT
A table that the operating system uses to locate files on a disk. Due to fragmentation, a file may be divided into many sections that are scattered around the disk. The FAT keeps track of all these pieces.
In DOS systems, FATs are stored just after the boot sector.
The FAT system for older versions of Windows 95 is called FAT16, and the one for new versions of Windows 95 and Windows 98 is called FAT32.
Extended File System
The extended file system, or ext, was implemented in April 1992 as the first file system created specifically for the Linux kernel. It has metadata structure inspired by the traditional Unix File System (UFS) and was designed by Rémy Card to overcome certain limitations of the Minix file system.[1] It was the first implementation that used the virtual file system (VFS), for which support was added in the Linux kernel in version 0.96c, and it could handle file systems up to 2 gigabytes (GB) in size.
EXFATExFAT is the Extended File Allocation Table file system and is part of Windows CE 6.0 and Windows Vista SP1/Windows Server 2008 and beyond (i.e., included in Windows 7). ExFAT is designed to be used when NTFS is not suitable or there's too much overhead (e.g., on removable devices). ExFAT supports drives much
59
larger than 4GB, the previous limit, and actually supports drives up to 16 exbibytes theoretically (I've not seen thumb drives that large yet). ExFAT is the default file system for removable devices as shown below.
TCP/IP
Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.
IPX/SPX
59
Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. (SPX): Short for Sequenced Packet Exchange, a transport layer protocol (layer 4 of the OSI Model) used in Novell Netware networks. The SPX layer sits on top of the IPX layer (layer 3) and provides connection-oriented services between two nodes on the network. SPX is used primarily by client/server applications.
OSIOSI stands for open system interconnection is a standard description or
"reference model" for how messages should be transmitted between any two points in a telecommunication network.
59
7) Application Layer : The application layer provider different services to the application. Example of services provided by this layer are file transfer, electronic messaging e-mail, virtual terminal access and network management.
6) Presentation Layer : The Presentation layer is responsible for protocol conversion, date encryption/decryption, Expanding graphics command and the date compression. This layer makes the communications between two host possible.
5) Session Layer : This layer is responsible for establishing the process-to-process communication between the host in the network. This layer is responsible for establishing and ending the sessions across the network. The interactive login is an example of services provided by this layer in which the connective are re-connected in care of any interruption.
4) Transport Layer : This layer is responsible for end-to-end delivers of messages between the networked hosts. It first divides the streams of data into chunks or packets before transmission and then the receiving computer re-assembles the packets. It also guarantee error free data delivery without loss or duplications.
3) Network Layer : This layer is responsible for translating the logical network address and names into their physical address ( MAC address). This layer is also responsible for addressing, determining routes for sending and managing network problems such as packet switching, data congestion and routines.
2) Data Link Layer : Data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to other computer via physical layer. Data link layer is used by hubs and switches for their operation.
1) Physical Layer : Physical Layer is responsible for transmitting row bit stream over the physical cable. The physical layer defines the hardware items such as cables, cards, voltages etc.
SQL
59
SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve data from a database. Some common relational database management systems that use SQL are: Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most of them also have their own additional proprietary extensions that are usually only used on their system. However, the standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to accomplish almost everything that one needs to do with a database. This tutorial will provide you with the instruction on the basics of each of these commands as well as allow you to put them to practice using the SQL Interpreter.
SpoofingA technique used to gain unauthorized access to computers, whereby the
intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
Email spoofing is when the sender changes the name in an outgoing email so that it looks like the email came from somewhere or someone else. This practice is often used by spammers to stop people finding out who they are. It also means that when the spam mail is rejected by the addressee's mail server, the bounce back message goes to whoever was specified in the outgoing mail rather than to the spammer themselves.
LAN and WAN
LAN - Local Area Network
A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and
59
occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.
In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.
WAN - Wide Area Network
As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.
A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.
ADSL ModemShort for asymmetric digital subscriber line, ADSL is a type of DSL
broadband communications technology used for connecting to the Internet. ADSL allows more data to be sent over existing copper telephone lines (POTS), when compared to traditional modem lines. A special filter, called a microfilter, is installed on a subscriber's telephone line to allow both ADSL and regular voice (telephone) services to be used at the same time. ADSL requires a special ADSL modem and subscribers must be in close geographical locations to the provider's central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate).
59
Boot Partition and System Partition The boot partition is a disk partition that contains the boot sector and files
such as NTLDR that are needed for booting Windows XP and earlier. (Windows Vista and Windows Server 2008 use a newer boot loader called bootmgr that replaces NTLDR and is configured using BCDEdit.exe).
The system partition is the disk partition that contains the Windows operating system files and its support files, but not any files responsible for booting.
Write any 10 technical differences between Windows Vista and Windows 7.
1. Peripherals are integrated in a smoother manner:
Now, every time you plug in a plug and play device, you will be having a different experience each time. Because this time, Windows 7 has turned its peripheral detection and support, more device central rather than shooting just an auto-run option as it used to do in Windows 7 and windows Vista. This will be more helpful, when you will be using different kind of peripheral devices. By far, almost all kinds of devices will be supported with the necessary drivers. And as if its not enough, Windows 7 will help you find the website of your peripheral device's manufacturer, and allow you do more than what you could have done with the auto-run interface only. Just for an example, say you plug in a camera, Windows 7 might take you to that manufacturer's website, where you might be having an option of uploading your photos to an online album. Best thing is, you won't be running out of drivers for your peripheral devices, as Windows 7 has been included an ocean of such drivers, and if by chance the driver is not existent there, Windows 7 will find it over the net for you.
2. Very much improved UAC:
59
The only problem, that was always discussed in most of the forums, and many questions which remained unanswered, and so many users who left the with an unsatisfied soul; will all be changed. Finally, we will be getting rid of annoying overprotective dialogue box that used to appear almost all the time, even when you changed the cursor speed or installed a software; as Windows 7 has shed overprotective dialogue boxes but still maintaining the quality protection against malicious attacks. Windows 7 will only display messages when major settings are changed.
3. Brand new taskbar:
What do you have at your bottom right corner of the screen? a set of icons which keeps popping up balloons one after another, giving an illusion of fancy lighting in a wedding? Well, don't worry anymore; as in Windows 7 Microsoft has made sure that you have the complete authority to change the settings required and allow or disallow only the required icons and also change the settings for notifications that might appear on screen and probably annoy you. Even the small little triangle that used to expand into the taskbar revealing all programs that are running; is gotten rid of. Now at the same place, if you move your cursor, you'll be getting a list of processes that are running.
4. Super fast performance:
Probably this is the major improvement upon Vista, which will heighten the sales of Windows 7. Microsoft had promised that it would deliver an Operating System that would be much faster than Vista. And yes it did, when the beta version of 7 was released and was tested. Windows 7 has very few startups process, and hence unspoken of, loads very fast. And in fact there are very few processes that run in the background and eat up memory cycles. But, anyways, performance of final release is yet to be tested. But till then, 7 have been rocking.
5. Multi-touch in Win 7
59
With touch technology becoming the latest trend after Apple’s revolutionary multi-touch iPhone, Windows 7 has multi-touch for all the supported hardware. HP Touchsmart series is one of them.
6. Aero Peek
Aero Peek allows Win 7 users to instantly make all the opened windows transparent. So let say, you want to see the weather on Windows 7 sidebar Gadget, this will be very useful.
7. New Taskbar
Windows 7 desktop will look different now because of the new taskbar. You can now reorder the opened Window buttons. It has Jump Lists feature which will allow you to access common programs very easily. And you can see the full screen preview before switching to a window.
As you can see above, Quick Launch bar and taskbar are merged together in Windows 7.
8. Games
Along with old Windows Vista games, Win 7 will have online version of Checkers, Spades and Backgammon. If you remember, recently there was a new robot game Tinker on Vista. This was a part of Vista Ultimate.
9. Media Center
59
Win 7 comes with enhanced Media Center experience. It will have Internet TV which will telecast MSN channels by default and will have a desktop sidebar gadget for the same too.
10. Net Book Edition
Netbooks are the light weight portable laptops used for browsing, email etc. It seems that by this year end we’ll see Netbooks by every major Brand like HP, Dell, Sony etc. Windows 7, apart from Ultimate Edition and Business edition will also have Netbook Edition. Though, of course it’ll be a stripped down version.
11. Performance and User Friendliness
Windows 7 will tremendously reduce the time to install an app. Also, now Windows will be less annoying with very less UAC prompt. For developers also, Win7 will reduce the time taken for developing Windows app.
Write the comparison between Win NT Server and Windows 2003 Server?
Feature area Features that were added since Windows NT 4.0 and are updated in this release
Features that are new to the Windows Server 2003 family
Server reliability Improved memory management
Robust system architecture
Diagnostic tools
Safe Mode start
Recovery Console
Windows File Protection
Enhanced Backup
Automated System Recovery (ASR)
Compatibility Mode
59
utility
Server availability Server clusters
Network Load Balancing clusters
Fewer server restarts
Plug and Play
Start from mirrored volumes
User State Migration Tool
Emergency Management Services
Server scalability Hardware scalability
I2O support
Symmetric multiprocessing enhancements
Network Load Balancing
Server clusters
Enterprise Memory Architecture
Internet Information Services (IIS) 6.0
Server manageability IntelliMirror
Windows Management Instrumentation (WMI)
Remote Desktop for Administration
Remotely administered server support
59
Remote Installation Services (RIS)
Manage Your Server
User State Migration Tool
Emergency Management Services
Resultant Set of Policy (RSOP)
Authorization Manager
Performance and tuning features
Winsock Direct
I2O support
CPU throttling for Web applications or sites
Process Accounting for Web applications or sites
Predictable, end-to-end Quality of Service (QoS)
Network Load Balancing
New performance tools
Disk Defragmenter
Event Tracing enhancements
Performance Options
New command-line utilities for System Monitor
59
Authentication and smart card support
Full support for the Kerberos V5 protocol
Public key infrastructure (PKI), Certificate Services, and smart cards
Virtual private networking
Flexible, secure authentication and authorization
Internet Authentication Service (IAS)
Routing and Remote Access
Stored User Names and Passwords
Smart card access through Terminal Server
Additional security features
Encrypting File System (EFS)
Internet Protocol Security (IPSec)
TCP/UDP port ownership
Software restriction policies
Remote management Microsoft Management Console (MMC)
Scripting with Windows Script Host
Remote Installation
Remote Desktop for Administration
Remote assistance
Web Interface for Remote Administration (Windows Server
59
Services (RIS) 2003, Web Edition only)
Maintenance and product updates
Windows Update Does not apply
Internationalization features
Multilingual support
Multiregional support
New Phonetic Input Method Editor (IME) for Traditional Chinese
Active Directory Simplified user and network-resource management
Flexible, secure authentication and authorization
Directory consolidation
Directory-enabled applications and infrastructure
Scalability without complexity
Use of Internet standards
A powerful development environment
Replication and
For a list of the Active Directory features that are new in this release, see New features for Active Directory.
59
trust monitoring
Message Queuing distribution lists
Disk and file management features
Disk Management
Disk quota support
Distributed File System
Distributed Link Tracking
Distributed Authoring and Versioning (DAV)
High-performance content indexing
Encrypting File System (EFS)
Removable Storage and Remote Storage
Remote document sharing
Command-line support for disk management
GUID partition table (GPT). Available on all versions of Windows Server 2003 with Service Pack 1 (SP1) and on all versions of Windows Server 2003, x64 Edition.
Shadow copies of shared folders
Internet and e-mail services and features
Active Server Pages (ASP)
Windows Media Services
Web Distributed Authoring and Versioning (WebDAV)
Microsoft .NET Framework components
Internet Information Services (IIS) 6.0
Universal Description,
59
Application recycling
Discovery, and Integration (UDDI) Services
E-mail services (POP3, SMTP)
Windows Management Instrumentation (WMI) Provider
Features for collaboration Windows Media Services
Predictable, end-to-end Quality of Service (QoS)
Asynchronous transfer mode (ATM)
Microsoft .NET Framework
Audio Acceleration on the remote access server
Application support Widest range of turnkey applications
Comprehensive Internet application services
Microsoft Active Accessibility
TAPI 3.1
Transaction
Compatibility Mode
Web gardens in Internet Information Services (IIS)
59
services
Message Queuing
Component Services
Job objects
Host data integration
Management and deployment
Change and configuration management with Group Policy
Directory consolidation in Active Directory
IntelliMirror
Remote Installation Services (RIS)
Windows Management Instrumentation (WMI)
Side-by-side component sharing
Add or Remove Programs
Windows Installer
Application
Remotely administered server support
Resultant Set of Policy (RSOP)
59
management
Terminal Server features Centralized deployment of programs
Remote access to applications
Single application access
Terminal Services Manager
Remote control
Audio redirection
Development support Visual Studio .NET
Multilingual technology
Automatic generation of link IDs
Background Intelligent Transfer Service (BITS)
Network protocols and technologies
Winsock Direct
DHCP with DNS and Active Directory
Internet Connection Sharing (ICS)
Network Address Translation (NAT)
Simple Object Access Protocol (SOAP)
Fibre Channel support
Automatic configuration for multiple networks
59
Virtual private networking
Routing and Remote Access
Asynchronous transfer mode (ATM)
Web Digital Authoring and Versioning (WebDAV) redirector
Internet Authentication Service (IAS) as RADIUS proxy
Wireless networking
IP version 6 (IPv6)
Write the steps to install Novel Netware along with diagram?
Minimum System Requirements
A server-class PC with a Pentium* II or AMD* K7 processor256 MB of RAM (512 MB if running NPS)A Super VGA display adapterA DOS partition of at least 200 MB and 200 MB available space2 GB of available disk space outside the DOS partition for volume SYS:One network boardA CD driveA USB, PS/2*, or serial mouse (recommended but not required)
Recommended System Requirements
A multiprocessor PC with a least two Pentium III 700 MHz or higher processors512 MB of RAMA Super VGA or higher resolution display adapterA DOS partition with 1 GB of available space
59
4 GB of available disk space outside the DOS partitionOne or more network boardsA bootable CD drive that supports the El Torito specificationA USB, PS/2, or serial mouse
Upgrade System Requirements
The server to be upgraded must be running one of the following:NetWare 5.1 with Support Pack 2 or laterNetWare 5 with Support Pack 6 or laterNetWare 4.2 with Support Pack 8 or laterNetWare 4.0 with Support Pack 8 or laterA server-class PC with a Pentium II or AMD K7 processor256 MB of RAMA Super VGA display adapterA DOS partition with 35 MB of available space2 GB of available disk space on volume SYS:One network boardA CD driveA USB, PS/2, or serial mouse (recommended but not required)
Software and Other Requirements
NetWare 6 Operating System CDNetWare 6 License/Cryptography disketteSupervisor right at the [Root] of the eDirectoryTM treeSupervisor right to the container where the server will be installedRead right to the Security container object for the eDirectory treeDOS and CD drivers (required if the computer does not boot from CD) You can make a bootablefloppy diskette using the MKFLOPPY.BAT program located in the INSTALL directory of theNetWare 6 Operating System CD.Client connection utilities (optional, for installing from a network):Novell? ClientTM for DOS and Windows* 3.1x (optional, for installing from a NetWare server runningIPXTM).
59
IP Server Connection Utility (optional, for installing from a NetWare server running IP only). Forinstructions, see PRODUCTS\SERVERINST\IPCONN.TXT on the Novell Client CD.IP address and domain names (required for connecting to the Internet):An IP addressAn IP address of a domain name serverThe name of your domainNetwork board and storage device properties, such as the interrupt and port address (required if notincluded in NetWare)
Prepare the Network
Run NetWare Deployment Manager (NWDEPLOY.EXE), located on the NetWare 6 Operating System CD.Complete all relevant tasks in the Prepare the Network section.
STEPS
(1)Choose ACCEPT LICENSE AGREEMENT and hit [ENTER] to continue.
(2) In this instance we want to create everything fresh with this NetWare 6 installation. Therefore, choose the option to CREATE A NEW BOOT PARTITION and hit [ENTER] to continue.
59
(3) The size of the boot partition can be modified if desired. I have heard it suggested that you have twice the disk space as you do RAM on your server. However, I have found that if you need to take a core dump of your server your disk space can be as little as half the amount of RAM on your system so long as you take the core dump without file cache. Select CONTINUE and hit [ENTER] to move on.
(4) Choose CONTINUE and hit [ENTER].
59
(5) After the new boot partition has been created, press any key to reboot the server.
(6) Now we are ready to start the installation. Hit [F10] to accept the license agreement.
(7) We want to modify this screen. EXPRESS is the type of install that comes up by default. We want to change this option to CUSTOM so we can select the basic web services to be installed. We will leave the other option at NEW SERVER. Choose CONTINUE and hit [ENTER].
59
(8) Accept the defaults, select CONTINUE, and hit [ENTER].
(9) Although it is not going to be covered in this training, it is important to note that if a language other than English is used, other products (such as NPS) will have a separate language configuration. For our purposes select CONTINUE and hit [ENTER].
(10) Accept the defaults, select CONTINUE, and hit [ENTER].
59
(11) Accept the defaults and hit [ENTER] to continue.
(12) Select the proper Network board and hit [ENTER] to continue.
(13) Create the desired size of the SYS volume and then hit [ENTER] to continue.
59
(14) Now enter in the name that you want for your server. The name of the server can either match the host name that you will be using or it can be different. For example, let's say that our server and host name are WEB and our domain is NOVELL.COM -- then our full DNS name would be WEB.NOVELL.COM and our server name would be WEB. The only advantage to this is that it makes it easier to remember which full DNS name belongs to which server. It is not required and will not be done with this install, but is mentioned as a common practice.
(15) Insert the license and select [NEXT] to continue.
59
(16) There are several services that can grow in size which may fill up your SYS volume. You may want to create another volume that will allow for this growth. Some of these services may include iFolder (file storage and log files), Apache (web site and log files), NES (web site and log files), NetStorage (file storage), etc. If you desire to create another volume, select the FREE SPACE section and select CREATE. Once the volume has been created, select [NEXT] to continue.
(17) I want you to pay close attention to the IP address that I am binding to my NIC. This will have significant impact later on during the install. Just remember that it ends with a 77.
59
(18) Remember in step 13 that we discussed the option of having the server name and the host name the same. Well to show the point that they don't have to be the same (and because my IP address is already registered with a DNS name that doesn't match the server), my server name will be NW6_TRAINING, my host name will be JHARMONTEST4, my domain will be PROVO.NOVELL.COM, and my full DNS name will be JHARMONTEST4.PROVO.NOVELL.COM.
(19) The most important thing to note here is that NetStorage can be adversely affected if time is not setup properly. I had a server that was two hours behind on
59
its time and a workstation that was unable to access NetStorage via IE (but could through Netscape) because the time on the server was behind the time on the workstation. This was the only time that I ever saw this issue, but I did want to mention it for reference sake.
(20) For this training we will select the option to create a NEW NDS TREE. Be aware that if you are installing NetWare 6 into an existing tree, certain things will need to be prepared before that happens. We already spoke about the issues with SSL, but there are also issues with SCHEMA. It is not the design of this training to go into these issues separately but rather to make you aware of potential downfalls during the install.
59
(21) Now we will need to put in the name of the tree and the top O as well as the admin's password.
(22) This next screen is just verifying your information. Select [NEXT] to continue.
59
(23) Select the license and click [NEXT] to continue.
(24) Here we are just asking where you want to install the license. For this training, accept the default and click [NEXT] to continue.
(25) The only services which are selected but can't be seen are iPrint and the NetWare Enterprise Web Server (NES). I want to stress selecting these products
59
because of the impact they can have on Web Infrastructure. Novell Advance Audit Services was left selected by mistake in this screen shot. Although it will have no affect on the products being installed, you don't need to select it for this training. Be sure the following products are selected then click [NEXT] to continue.- NetWare Enterprise Server- iPrint- NetWare FTP Server- NetWare Web Search- NetWare WebAccess- Novell iFolder Storage Services- Novell NetStorage
(26) Single IP Address VS. Multiple IP Address.
59
(26a) Single IP address option
(26b) Multiple IP address option
(27) This next screen just shows the components that will be installed. Click [NEXT] to continue.
59
(28) In this situation you will notice that we are creating a CA. The reason for this is because this is the first server into the tree. If the CA is properly installed then you won't have many of the issues that can occur with SSL. If the CA portion of the screen is grayed out then you already have a CA. If you already have one then make sure that it is functioning properly before you continue. For our training installation, this will be the only server in the tree so the CA should be fine.
(29) This section has caused much confusion. The warning on this screen explains that if you select this option it will create a security risk. Well, that is true to a point and we will discuss this in much more detail under the deployment section, but let's quickly discuss the advantages, disadvantages, and when we should and should not deploy this option. To do this we will look at an example of a product that uses LDAP for its communication.
59
(30) First thing to note is that this in NOT GroupWise WebAccess. NetWare WebAccess was built off of Novell Portal Services. It ships with a few basic gadgets that provide services such as file access, email, printing, address book, etc. To create the objects needed to configure and run this service, we will need to decide where the WebAccess container will reside. You cannot change the name of the container. It will remain WebAccess.
(31) When you choose the option of multiple IP address vs. single IP address, make sure you know which service (Apache or Enterprise) will be running the NetWare 6 home page. NetWare WebAccess will reference several files that are contained within that same location. If the default configuration is kept and the NetWare 6 home page information is hosted by NES, NetWare WebAccess will
59
require configuration after the installation is complete. The reason for this is that the NetWare WebAccess configuration will point to Apache by default.
(32) A very common issue is related to the screen shown above. What this is basically saying is that there are some template files that are required in order for NetWare WebAccess to be able to pull in the information from GroupWise WebAccess. If the files are not copied out to the proper location, or if they are not copied at all, then the users will receive the error that webaccess is unreachable.
(33) iFolder Server Options (33a) Let's start with the User Data location in this screen. This is where the files are going to be stored for each user's iFolder
59
account. If you leave this on the SYS volume, you have the potential of filling up your SYS volume.
(34) If I can stress anything here it would be rights. In order for you to create this object and to properly assign roles you will need to be installing the server with rights to the root of the tree.
59
(35) NetStorage is a new type of configuration. Most of its configuration is done in the registry. In order to be able to edit that information after that installation is complete you will need to put on SP1.
(36) This screen is just giving you one last chance to back up and change anything if needed. Click [NEXT] to continue.
(37) After the installation has completed, be sure that you remove any diskette and CD from the server and then click YES to restart the server.
59
Write the steps to create a user and group in Windows NT server?
You must have system administrator permissions on the server to create user and group accounts on a Windows NT Server. Before you can create SQL Server logins and database roles, you should create the appropriate Windows NT accounts for users and groups that will be working with the team solutions.
To make managing solution users easier, it is recommended you create Windows NT group accounts corresponding to the database roles in your team solution. It is easier to manage only the Windows NT group account rather than managing SQL Server logins and database role membership for many users.
Creating a New Windows NT User Account
Because SQL Server uses Windows NT user authentication, your SQL Server users must have valid Windows NT accounts. Before creating SQL Server logins, use the following steps to create Windows NT user accounts.
In addition, before you can add users to Windows NT groups, each user must have a valid Windows NT domain account.
To create a new user account
1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.
2. From the User menu, select New User.
3. Type appropriate information in the dialog box:
o In Username, type a user name.
o In Full Name, type the user's complete name.
o In Description, type a description of the user or the user account.
o In both Password and Confirm Password, type a password of up to 14 characters.
o Click to select or clear the check boxes for User Must Change Password at Next Logon, User Cannot Change Password, Password Never Expires, and Account Disabled.
59
4. To administer a Group, Profile, or Dialin associated with the New User box, click the button, and complete the dialog box that appears. Then click OK.
5. Click Add.
To add another user account, repeat steps 2 through 5.
Note The buttons available in the New User dialog box depend on whether you are administering domains or workstations.
The Groups, Profile, and Dialin buttons always appear.
The Hours, Logon From, and Account buttons appear only when you administer domains.
Creating a New Local Group Account
A local group name cannot be identical to any other group or user name on the domain or computer being administered. It can contain up to 256 uppercase or lowercase characters except for the backslash character (\).
You can add user accounts and global groups from this domain and from trusted domains.
To create a new local group
1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.
2. In the User Manager for Domains window, do one of the following:
o Select the user accounts you want as the initial members of the new group.
o Select any group to ensure no user accounts are initially selected.
3. From the User menu, click New Local Group.
4. In the Group Name field, type a name for the new group.
5. If necessary, click Show Full Names.
59
Note This can be a lengthy operation if the group is large.
6. In the Description field, type a description of the new group.
7. To add members, click Add, and then complete the Add Users and Groups dialog box.
8. To remove members from the new group, select one or more names in Members, and then click Remove.
Creating a New Global Group Account
The New Global Group option is unavailable when Low Speed Connection is selected or when you administer a computer running Windows NT Workstation or a Windows NT Server that is not a domain controller.
To create a new global group
1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.
2. In the User Manager for Domains window, do one of the following:
o Select the user accounts you want as the initial members of the new group.
o Select any group to ensure no user accounts are initially selected.
3. From the User menu, select New Global Group.
4. In the Group Name field, type a group name.
5. In the Description field, type a description for the group.
6. To add members, select one or more user accounts in Not Members, and then click Add.
7. To remove members from the new group, select one or more user accounts in Members, and then click Remove.
59
Installation steps of window NT 4.01. Insert your Windows NT 4.0 CD and Disk 1 of your 3
NT Workstation setup disks2. Once this is done boot up system.
The following "Hardware Configuration" will appear and Windows NT will detect your hardware configuration.
Soon you will be prompted to Insert NT setup disk 2, does this and hit enter.
Now the "Welcome to Setup" menu will appear, press "ENTER" to start Install.
You will be now prompted to search for mass storage devices (CD-Rom in most cases), press enter to continue or "S" if you have a SCSI device.
Now insert disk 3 of your Win NT Workstation setup.
Windows has found a CD-Rom. Press enter to continue. If you have SCSI devices you will have to hit "S" to specify.
Now the NT License agreement, Click on page down until you get to the bottom
Now the "Components" menu. The standard setting that NT now picks should be ok, make changes if needed else hit "ENTER" to continue.
Win NT has now detected your hard drive. This, if it has been setup before will have to be deleted if you are looking to install a Fresh operating system. Press "D" to delete the partition that is highlighted.
****MAKE SURE YOU HAVE BACKED UP BEFORE DELETING ANYTHING****
You are now given your last chance to not delete a partition. To continue Press "ENTER"
Actually there is another last chance, which appears in the next menu. Press "L" and the contents of that drive/partition are gone.
Now the partition menu appears, Press C to create a partition..
59
You will now be asked size of Hard drive, default is Max space on your hard drive.
As we are going to use FAT16 you will set up the drive to any size below 2048mb. Click enter when happy with size.
The partition is setup. We recommend that you leave any remaining space until later, when in windows, otherwise you can setup the remaining space by following the steps we just did for the main drive.
You will now be asked how you wish the drive to be formated, we recommend FAT for most users, for more security use NTFS.
Setup will now format your Hard drive partition
You will now be asked where you wish NT to be installed, unless doing a parallel install leave the default and hit "ENTER"
The next page will now appear, we advise that you let setup run the tests, hit "ENTER" to continue.
Be patient while it examines your system.
Setup will then copy files
Part of setup is now complete. You will now remove any floppy disks or CD's in the drives and hit "ENTER" to reboot your system
Hit enter to continue from the startup menu.
You will now be prompted for the NT CD again, please insert and when drive is ready click "OK"
NT will copy more files....
Then when the "Windows NT Setup" screen appears click "NEXT" to continue....
Now your setup options, for normal users select typical and for laptop users select portable, then click next
Now fill in your name and organization, click on next to continue...
Now enter your certificate of Authenticity, click enter to continue
59
Now your OEM number which is your CERTIFICATE of AUTHENTICITY which located on your Windows NT manual.
And now enter the name by which you wish the computer to be known, click on enter to continue...
And now the all important Admin password, enter it and then enter it again to confirm it, make sure you don't forget it or you'll not get into windows. Or you could leave it blank, then you will not need it for entering windows.
Click next to continue.
Windows NT will now prompt you to make Emergency Repair Disk. It is up to you if you wish to create these, make your selection and click next.
Leave the "NT Components" at default, click next to continue.
Now NT Network, click next to continue...
The "NT Network" menu shall appear, we recommend you select "do not connect" option and hit next, you are best setting up networks when NT is installed.
Now Click on finish to continue
Now select your time zone, click apply and close when finished.
Now your display adapter, don't install until you get into windows, so click on "OK" and then "OK" again.
NT will then continue to copy files and finally completed, click on "RESTART COMPUTER" to continue, remove any CD and floppy disks first.
After rebooting you will arrive at the login screen, press "CTRL" and "ALT" and "DELETE" to enter password section
Now enter your password and press "ENTER", if you didn't set one just press "ENTER"
At last the desktop.... NT Installed, you can now start configuring and installing drivers for personal use in the control panel
59
Draw neat and clean diagrams for all the levels of RAID?
RAID is a technology that is used to increase the performance and/or reliability of data storage. The abbreviation stands for Redundant Array of Inexpensive Disks. A RAID system consists of two or more disks working in parallel. These disks can be hard discs but there is a trend to also use the technology for solid state drives. There are different RAID levels, each optimized for a specific situation. These are not standardized by an industry group or standardisation committee. This explains why companies sometimes come up with their own unique numbers and implementations.
RAID level 0 – Striping
In a RAID 0 system data are split up in blocks that get written across all the drives in the array. By using multiple disks (at least 2) at the same time, this offers superior I/O performance. This performance can be enhanced further by using multiple controllers, ideally one controller per disk.
Advantages RAID 0 offers great performance, both in read and writes operations. There
is no overhead caused by parity controls. All storage capacity is used, there is no disk overhead.
59
The technology is easy to implement.
Disadvantages
RAID 0 is not fault-tolerant. If one disk fails, all data in the RAID 0 array are lost. It should not be used on mission-critical systems.
Ideal use
RAID 0 is ideal for non-critical storage of data that have to be read/written at a high speed, such as on a Photoshop image retouching station.
RAID level 1 – Mirroring
Data are stored twice by writing them to both the data disk (or set of data disks) and a mirror disk (or set of disks) . If a disk fails, the controller uses either the data drive or the mirror drive for data recovery and continues operation. You need at least 2 disks for a RAID 1 array.
RAID 1 systems are often combined with RAID 0 to improve performance. Such a system is sometimes referred to by the combined number: a RAID 10 system.
59
Advantages RAID 1 offers excellent read speed and a write-speed that is comparable to
that of a single disk. In case a disk fails, data do not have to be rebuild, they just have to be
copied to the replacement disk. RAID 1 is a very simple technology.
Disadvantages The main disadvantage is that the effective storage capacity is only half of
the total disk capacity because all data get written twice. Software RAID 1 solutions do not always allow a hot swap of a failed disk
(meaning it cannot be replaced while the server keeps running). Ideally a hardware controller is used.
Ideal use
RAID-1 is ideal for mission critical storage, for instance for accounting systems. It is also suitable for small servers in which only two disks will be used.
RAID level 3
On RAID 3 systems, data blocks are subdivided (striped) and written in parallel on two or more drives. An additional drive stores parity information. You need at least 3 disks for a RAID 3 array.
59
Since parity is used, a RAID 3 stripe set can withstand a single disk failure without losing data or access to data.
Advantages RAID-3 provides high throughput (both read and write) for large data
transfers. Disk failures do not significantly slow down throughput.
Disadvantages This technology is fairly complex and too resource intensive to be done in
software. Performance is slower for random, small I/O operations.
Ideal use
RAID 3 is not that common in prepress.
RAID level 5
RAID 5 is the most common secure RAID level. It is similar to RAID-3 except that data are transferred to disks by independent read and write operations (not in parallel). The data chunks that are written are also larger. Instead of a dedicated parity disk, parity information is spread across all the drives. You need at least 3 disks for a RAID 5 array.A RAID 5 array can withstand a single disk failure without losing data or access to data. Although RAID 5 can be achieved in software, a hardware controller is recommended. Often extra cache memory is used on these controllers to improve the write performance.
59
Advantages
Read data transactions are very fast while write data transaction are somewhat slower (due to the parity that has to be calculated).
Disadvantages Disk failures have an effect on throughput, although this is still acceptable. Like RAID 3, this is complex technology.
Ideal use
RAID 5 is a good all-round system that combines efficient storage with excellent security and decent performance. It is ideal for file and application servers.
RAID level 10 – Combining RAID 0 & RAID 1
RAID 10 combines the advantages (and disadvantages) of RAID 0 and RAID 1 in one single system. It provides security by mirroring all data on a secondary set of disks (disk 3 and 4 in the drawing below) while using striping across each set of disks to speed up data transfers.
59