Download presentation
Presentation is loading. Please wait.
1
Server Hardware and OS; Clients CSC 363 18 February, 1999
2
Announcements Group Projects---how’s it going?
3
Server Hardware-Speed is King Processor Disk Memory NIC
4
Processors Single-vs. dual/multi processors MgHz, Paging and other specs
5
Processors, cont. RISC vs. Wintel
6
Disk Seek time Access time RPMs Partitioning
7
Disk Management RAID Arrays Striping Mirroring Backups
8
Memory How much What kind
9
NICs When speed counts Selecting
10
Problem: You are planning a network for a medical practice that doesn’t have many client computers to support, but that stores very large graphical files, such as MRI and X-ray images, on their server. Which hardware component will require more than average capacity?
11
NOS Common NOSs –Windows NT –Novell NetWare –OS/2--/Warp –UNIX –LANtastic! –Banyon-Vines
12
Server Software User account management (profiles) Security Central Licensing Data Protection Multitasking and Multiprocessing.
13
User Profiles NT stores the profile information for each user - Winnt\Profiles - including: –Network drive mappings –NT Domains/Printers –All icons on the desktop –Contents of all menus reachable from the Start button –names of recently opened files –Desktop color scheme and configuration
14
Types of Profiles Local Profile –stored on client machine and used when logged onto that machine Roaming Profile –stored on a server and downloaded to local machine when user logs on to server
15
Security Model
16
NT System Security NT is Object Oriented –Each user, group, file, etc. is an object –Each user, and group is assigned a unique Security Identifier (SID) 32 bit random character –All objects have a security descriptor containing:
17
NT System Security –SID of the owner of the object –Discretionary ACL controlled by owner –System ACL controlled by Administrator Access Control List (ACL) is associated with each object, indicating what rights other objects have to this object
18
NT System Security NT associates a security Access Token for each running process. –Token determines what access rights the process has. –Token contains SID of the user executing the process SIDs of all groups user belongs to Possibly SIDs of other (more privileged) users is the process is designed for impersonation
19
Account Access Token The NT key card Contains important information about the user, SID (security ID - 32 bit unique #) –Username, encrypted password, group memberships, profile location, home directory, logon hours, etc. Could be local or domain (they don’t cross)
20
Access to the Server Domain –Collection of computers and related resources –At least 1 NT server –No geographical limits –First NT server is established as the PDC at install –Others will be either BDC or Server –PDC holds the database of resource information
22
Central Licensing
23
Multitasking Multi-CPU Single-CPU –Time-Slicing=> Pre-emptive Multitasking=> Cooperative Multitasking=>
24
Client Characteristics Drive designations/mapping Requesters (Novell) Redirector (Microsoft/IBM)
25
Peripherals Print requests Peripheral Ports
26
Installing NT Server Hardware Compatability List (HCL) Server Naming –NetBIOS Names 15 characters max length Planning naming conventions Domain name for server-based network Workgroup name for Win95 network
28
Domains in NT Domain Controllers Primary Domain Controllers (PDC) Backup Domain Controllers (BDC)
29
Domains Objects –Computers Servers - running NT Server Workstations - clients –Users - people with access rights in the domain –Groups - administrative collective of users used to categorize and simplify the management of users Can be local or global –Printers
30
Problem You must install 200 computers in a new network for your new company headquarters. There will be 3 physical LANs there, reflecting the divisions of Acquisitions, Financing, and Operations. All LANs will be connected and each will have its own server and approximately 1/3 of the client computers. Each will have its own set of printers and you expect each will grow in (servers and clients) in the coming years. You also expect to add another LAN for Financing sometime in the near future. Implement a NetBIOS naming scheme for this network.
31
Domain Database User account is basis of security Rights are set using the User Manager tool (either local or for the Domain) Can set a Policy which creates a “template” for all users created after it
32
NT Network Configuration Server can only hold a single database Server can only be PDC OR BDC Database can be partitioned –Server can still only hold one partition 9
33
Configuring the NIC Protocol Determination –TCP/IP –IPX –NetBEUI
34
TCP/IP Installation IP Address: Subnet masks: Default Gateways Auto vs. manual config:
35
Problem You are installing the first server for your company. Which server role is most appropriate for this server?
36
Problem You are installing a server for a small recycling business. After interviewing the customer, you determine that the network will most likely never grow beyond a single server; that Internet access is not required, and that the company does not want to pay for network administration once the network is installed. Which transport protocol is most appropriate?
37
Problem You are designing a network for a computer software design group with many offices around the country. They tell you they would like to connect the servers in their various offices using the Internet. Which transport protocol is most appropriate?
38
Problem When one of the users on your network prints to the central laser printer, nothing but strange characters appear. The printer works fine for everyone else. What is wrong? How can you fix it?
39
Sharing Output Devices Print Drivers Sharing Printers Fax Modems
40
Messaging/E-Mail Clients Servers Protocols –POP –SMTP –IMAP –MAPI –X.400/X.500
41
GroupWare Calendaring Scheduling Messaging Document and Application Sharing Revision tracking
42
Shared Network Applications Licensing advantages Maintenance advantages
43
Client OpSys
44
Configuring Clients--examples
45
Troubleshooting Client Connections NIC connections –cable mismatch –cable poor connection –duplicate IP address –jumper settings –IRQ and Port problems
46
10Base2 Problems Bus interrupts –disconnection of a PC –damage to cable –faulty connection –exceeded maximum segment length
47
Frame Types Set all devices to use the same frame type Set frame types manually –Ethernet_802.2=>recommended by MS and Novell –Ethernet_802.3 –Ethernet_SNAP –Ethernet_II
48
Cable Testing Time-domain reflectometer=>indicates what and where cable problems have occurred
49
Other Problems Resources Fix Your Own LAN
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.