Lecture

  • Uploaded by: nicon2678
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Lecture as PDF for free.

More details

  • Words: 7,197
  • Pages: 38
MCSE • •





Microsoft Certified Systems Engineer (MCSE) Microsoft Certified Systems Engineer (or MCSE) [3] was the bestknown and premiere Microsoft certification for Windows Server 2003. It qualifies an individual as being able to analyze the business requirements for information systems solutions, and design and implement the infrastructure required. Certification is available for the Windows Server 2003 technology, and was previously offered in Windows Server 2000 and Windows NT 4.0. For the MCSE 2003, candidates must pass six core design exams (Four networking exams, one client operating system and one design exam) and one elective exam, for a total of seven exams. For the MCSE 2000, a candidate needed to pass five Core Exams (Four operating system exams, one design exam) and two electives. Most of these exams have been retired. For the MCSE NT 4.0 (retired), a candidate needed to pass four Core Exams (Networking Essentials, Windows NT Workstation, Windows NT Server and Windows NT Server in the Enterprise) and two electives. These exams have been retired. The topic of these exams include network security, computer networking infrastructure, Active Directory,

System Administrator • • • • • • • • • • • •

A system administrator's responsibilities might include: Analyzing system logs and identifying potential issues with computer systems. Introducing and integrating new technologies into existing data center environments. Performing routine audits of systems and software. Performing backups. Applying operating system updates, patches, and configuration changes. Installing and configuring new hardware and software. Adding, removing, or updating user account information, resetting passwords, etc. Answering technical queries. Responsibility for security. Responsibility for documenting the configuration of the system. Troubleshooting any reported problems.

Lecture 2- Introduction A system administrator, systems administrator, or sysadmin, is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology department. • Business assurance is the main purpose of system administrator • Two types of approaches – Reactive ( – Proactive (Mentally prepared) Two types of tools •



Diagnostic Tools

6. 7. 8.

System Information (msinfo32) Event Viewer (Eventvwr) Performance Monitor (perfmon)



Troubleshooting tools Topic 13 Difference between Workgroup & Domain Workgroup Domain 1) Local Users & Groups. 1) Global Users & Groups. 2) User have not assign network right. 2) User has right to network. 3) No Centralized authentication. 3) Centralized authentication. 4) Share level Permission. 4) Access level Permission. 5) Desktop level Security. 5) Full Security. 6) Local Profile of users. 6) Roaming Profile.

Lecture 2

Diagnostic tools

1-System information



System Information collects and displays your system configuration information. Support technicians require specific information about your computer so they can resolve your system problem. You can use System Information to quickly find the data they need.

To convert a volume to NTFS from the command prompt

Open Command Prompt. Click Start, point to All Programs, point to Accessories, and then click Command Prompt. In the command prompt window, type: convert drive_letter: /fs:ntfs  For example, typing convert D: /fs:ntfs would format drive D: with the ntfs format. You can convert FAT or FAT32 volumes to NTFS with this command. Important  Once you convert a drive or partition to NTFS, you cannot simply convert it back to FAT or FAT32. You will need to reformat the drive or partition which will erase all data, including programs and personal files,

Notes To open System Information, click Start, and then click Run. In the Open box, type msinfo32.exe.

Lecture 2

2-Event Viewer • Event Viewer maintains logs about program, security, and system events on your computer. You can use Event Viewer to view and manage the event logs, gather information about hardware and software problems, and monitor Windows security events.

Notes To open Event Viewer, click Start, click Control Panel, double-click Administrative Tools, and then double-click Event Viewer. OR Clikc run and then write eventvwr in test box

Lecture 2

3- Performance Monitor • You can use Performance to collect performance data automatically from local or remote computers. You can define start and stop times for automatic log generation, manage multiple logging sessions from a single console window, and set an alert on a computer, allowing a message to be sent or a log to be started when your criteria is met. Notes Open run command and the write

perfmon dialogue box Lecture 2

Installation There are two typos of Installation • Attendant • Un- attendant

CMD Commands: ping , ipconfig /all, hostname,(This command shows local host name in the network.) , Net view,

Lecture 3

Remote Installation services Pre-Requists for RIS Domain Name Server Active Directory Services DHCP Installation of DHCP and DNS – Goto start – settings – control panel – add remove programs add remove windows components – networking services – then choose DNS and DHCP • •

Installation of ADS (Active Directory Services) Start - run – dcpromo

• •

Installation of RIS Gotostart – settings – control panel – add remove programs - add remove windows components – choose RIS from List (a RIS wizard

Lecture 4

System Properties Dialogue Box Driver Signage Digital Signature (WHQL) Active Directory Services use run-sigverif Right click on My computer and then clikc Hardware and then choose Driver signage change the policy to block (by default warn) \// aplicable for local computer only For Group Policy (applicable for all the systems in DNS environment) Start – Open Active Directory users {(start – run- dsa.msc) or start – administrative tools – active directory users and computers } Step 2: Open Domain Property Dialog Box (MCSE.com) Step 3: Modify Default Domain Policy Group policy – Computer Configuration – windows settings – security setting – local policy – security option – devices: unsigned driver

Lecture 4

System Properties Topic: Driver Signage Windows hardware qualified lab (WHQL) System Properties-Hardware-Driver Signage Three actions •Ignore •warn •block Group Policy To control whole environment in LAN File Signature Verify Tool (run – Sigverif)

Lecture 4

System Properties Environment Variable (variable : Source of Shortcut •  Environment variables are a vital scheme for both querying and setting vital information for serious software applications. They are one of the techniques that when you master, you will be able to perform tasks that are totally un-accomplishable using *ANY* other technique • . • Environment variables are strings that save information about the entire environment in your system. These string values are dynamic and they can affect the way your system will behave on. Environment variables can be classified into two main types: • System Variables: They affect the entire system whatever the current user is. They are defined by Windows and saved in the registry. You need to be an administrator to be able to modify them. You usually need to restart your computer to make these changes effective. • User Variables: They affect the current environment of the current system user. They can be deleted, modified, and added by any system user. They are used by Windows setup, by some programs, and by users. Changes to these variables are saved to the registry and be effective immediately.

Lecture 5

System Properties You can add new environment variable, modify or delete an existing one using one of the following ways. • -Right click my computer, and then click Properties. -Choose the Advanced tap in the System Properties dialog box. -Click the Environment Variables button. The Environment dialog will appear as shown in figure1. -Select the variable you need to modify or delete, then click the suitable button. • • •



Example Local Environment Variables %USERNAME%: represents the current user name. System Environment Variables %SYSTEMDRIVE%: represents the drive that contains the Windows root directory.

Cmd:Net view Cmd: set Run: %systemdrive% Run – sigverif / advanced / path (c:\ e.g)  Run dsa.msc Run mmc •

Lecture 5

User Profile There are three types of User Profile 1. Local Profile 2. Roaming Profiles 3. Mandatory Profiles The majority of the information stored on your Windows Profile is your personal desktop. Along with your desktop, the other things your profile stores are your My Documents, Internet Explorer favorites, your printer definitions, and user-defined drive mappings. If you are a MS-Outlook user your email, address book, and calendar are also stored on your profile. User profiles allow a user to keep their personalized settings so they do not have to reconfigure their computer each time they log onto the computer. However, if you want users to have a preconfigured desktop environment, you can assign a mandatory user profile. The procedure for implementing this is described below. • Local Profile The local profile is not the default type of profile within the department, but rather is when the data and config files are kept on the local machine. Any changes that are made to a local profile are kept only on that machine. The local profile is stored in the Documents and Settings folder on your C: drive.

Lecture 6

User Profile Roaming Profile A roaming profile is the default profile type within the department; it will follow you to any computer that you work on. Every time you log on, your roaming profile is checked with Demeter, one of our domain controllers. Any changed files are at synchronized at this point. Each person has his/her own individual profile stored on Demeter in the profiles directory under his/her username. Logging on to a computer accesses your profile and loads it to make it available to you. You are then able to use that computer as it if were your personal computer even if it is not. At the end of your session when you log off, your roaming profile is updated on Demeter with any changes you have made on that computer though a few cache directories are excluded. You will be able to access your new profile from any other computer you want to work on. Mandatory Profile • • • • • • •

Click Start and click Control Panel. Double click the System Select the Advanced tab. Click the Settings button under User Profiles. Select the profile you want to use and click Copy To. Type in the path to the location of the shared folder you created before beginning these steps. Click OK. Under Permitted to use, ensure that the appropriate users are listed.

Lecture 6

Cabling • • • •

 Topic 3 Types of Cabling  Straight Cabling Cross Cabling Roll-over Cabling

Hub: - A hub is a "unintelligent" broadcast device -- any packet entering any port is broadcast out on every port. Hubs do not manage any of the traffic that comes through their ports. Since every packet is constantly being sent out through every port, you end up with packet collisions, which greatly impede the smooth flow of traffic on your LAN. Provides Shared bandwidth. It is physical layer device. Single collision Domain. Multiport Repeater. No VLAN (Virtual LAN). Switch:-A switch, on the other hand, isolates ports -- every received packet is sent out only to the port on which the target may be found (one caveat - if the proper port cannot be determined, then the switch will broadcast the packet to all ports). Essentially, a switch is a router, but one operating at the MAC level rather than the IP level. Since the switch is intelligently sending packets only where they need to go, and not everywhere willy-nilly, the performance speed of your network can be greatly increased. Provide Full bandwidth.Datalink layer Device. Multiple Collision Domains. Forward & Filtering Decision. VLAN available.

Topic 10 Difference between Hub & Switch HUB

• • • • •

1) 2) 3) 4) 5)

Shared Bandwidth Physical layer device Single collision Domain Multiport repeater. No VLAN (Virtual Lan)

Straight Cabling

SWITCH

1) 2) 3) 4) 5)

Provide full Bandwidth. Datalink layer device. Multiple Collision Domain. Forward & Filtering Decision. VLan.

Cross Cabling

Roll Over Cabling

Quota Create a shared folder and assign appropriate security Specify path in user prperties dialogue box Specify UNC path \\pc1\home Right click on drive then goto Quota select enable quota Select enable quota management Select Deny disk space to users according quota Limit Choose Limit for users Select Log event when a user exceed their quota limit Select Log event when a user exceed their warning level For new users Right click on drive - quota – quota entry – new quota entry add user and set limit For existing users For Existing user Right click on drive - quota – quota entry – right click on user and go to properties and then select limit Import /Export Quota Entries in case of low disk space

May 27,

Lecture 7

File Systems Windows 9.x Windows NT Windows 2k/2k3 •







FAT16 Yes Yes Yes

FAT32 Yes No No Yes Yes Yes

NTFS

NTFS is more powerful than FAT or FAT32, and includes features required for hosting Active Directory as well as other important security features. You can use features such as Active Directory and domain-based security only by choosing NTFS as your file system. It is easy to convert partitions to NTFS. The Setup program makes conversion easy, whether your partitions used FAT, FAT32, or the older version of NTFS. This kind of conversion keeps your files intact (unlike formatting a partition). If you do not need to keep your files intact and you have a FAT or FAT32 partition, it is recommended that you format the partition with NTFS rather than convert from FAT or FAT32. Formatting a partition erases all data on the partition and allows you to start with a clean drive. Whether a partition is formatted with NTFS or converted using the convert command, NTFS is the better choice of file system. For more information about Convert.exe, after completing Setup, click Start, click Run, type cmd, and then press ENTER. In the command window, type help convert and then press ENTER. In order to maintain access control on files and folders and support limited accounts, you must use NTFS. If you use FAT32, all users will have access to all files on your hard drive, regardless of their account type (administrator, limited, or standard.) NTFS is the file system that works best with large disks. (The next best file system for large disks is FAT32.)

May 27,

Lecture 7

File Systems •





File Allocation Table (FAT) A file system used by MS-DOS and other Windows-based operating systems to organize and manage files. The file allocation table (FAT) is a data structure that Windows creates when you format a volume by using the FAT or FAT32 file systems. Windows stores information about each file in the FAT so that it can retrieve the file later. FAT32 A derivative of the file allocation table (FAT) file system. FAT32 supports smaller cluster sizes and larger volumes than FAT, which results in more efficient space allocation on FAT32 volumes. NTFS File System An advanced file system that provides performance, security, reliability, and advanced features that are not found in any version of FAT. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In Windows 2000 and Windows XP, NTFS also provides advanced features such as file and folder permissions, encryption, disk quotas, and compression.

Encryption •



• • •

• •

• •

Encrypting File System (EFS) provides the core file encryption technology used to store encrypted files on NTFS file system volumes. Once you encrypt a file or folder, you work with the encrypted file or folder just as you do with any other files and folders. Encryption is transparent to the user that encrypted the file. This means that you do not have to manually decrypt the encrypted file before you can use it. You can open and change the file as you normally do. A feature in this version of Windows that enables users to encrypt files and folders on an NTFS volume disk to keep them safe from access by intruders. public key encryption A method of encryption that uses two encryption keys that are mathematically related. One key is called the private key and is kept confidential. The other is called the public key and is freely given out to all potential correspondents. In a typical scenario, a sender uses the receiver's public key to encrypt a message. Only the receiver has the related private key to decrypt the message. The complexity of the relationship between the public key and the private key means that, provided the keys are long enough, it is computationally infeasible to determine one from the other. Public key encryption is also called asymmetric encryption. private key The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key. symmetric encryption An encryption algorithm that requires the same secret key to be used for both

Type: nslookup /help in command prompt to check server May 29,

Lecture 8

Encryption To • • • • • • • • •

• •

encrypt a file or folder Open Windows Explorer. Right-click the file or folder that you want to encrypt, and then click Properties. On the General tab, click Advanced. Select the Encrypt contents to secure data check box. When you work with encrypted files and folders, keep in mind the following information: Only files and folders on NTFS volumes can be encrypted. Because WebDAV works with NTFS, NTFS is required when encrypting files over WebDAV. Files or folders that are compressed cannot also be encrypted. If the user marks a file or folder for encryption, that file or folder will be uncompressed. Encrypted files can become decrypted if you copy or move the file to a volume that is not an NTFS volume. Moving unencrypted files into an encrypted folder will automatically encrypt those files in the new folder. However, the reverse operation will not automatically decrypt files. Files must be explicitly decrypted. Files marked with the System attribute cannot be encrypted, nor can files in the systemroot directory. Encrypting a folder or file does not protect against deletion or listing files or directories. Anyone with the appropriate permissions can delete or list encrypted

May 29,

Lecture 8

Encryption -

Using Cipher Command

Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Syntax cipher [{/e|/d}] [/s:dir] [/a] [/i] [/f] [/q] [/h] [/k] [/u[/n]] [PathName [...]] | [/r:PathNameWithoutExtension] | [/w:PathName] Parameters • • • • • • • •





/e Encrypts the specified folders. Folders are marked so that files that are added to the folder later are encrypted too. /d Decrypts the specified folders. Folders are marked so that files that are added to the folder later are encrypted too. /s: dir Performs the selected operation in the specified folder and all subfolders. /a Performs the operation for files and directories. /i Continues performing the specified operation even after errors occur. By default, cipher stops when it encounters an error. /f Forces the encryption or decryption of all specified objects. By default, cipher skips files that have been encrypted or decrypted already. /q Reports only the most essential information. /h Displays files with hidden or system attributes. By default, these files are not encrypted or decrypted. /k Creates a new file encryption key for the user running cipher. If you use this option, cipher ignores all of the other options. /u Updates the user's file encryption key or recovery agent's key to the current ones in all of the encrypted files on local drives (that is, if the keys have been changed). This option only works with /n. /n Prevents keys from being updated. Use this option to find all of the encrypted files on the local

May 29,

Lecture 8

Data Compression File compression overview • Compressing files, folders, and programs decreases their size and reduces the amount of space they use on your drives or removable storage devices. Drive compression decreases the amount of space used by all of the files and folders stored on that drive. • Windows supports two types of compression: NTFS compression and compression using the Compressed (zipped) Folders feature. NTFS compression versus Compressed (zipped) Folders • NTFS compression • If you do not have an NTFS drive, this option is not available. To determine whether your drive is formatted with NTFS, open My Computer, right-click a drive, and then click Properties. The file system is indicated on the General tab. • You can compress individual files and folders using NTFS compression, as well as entire NTFS drives. • You can compress a folder without compressing its contents. • You can work with NTFS-compressed files without decompressing them. • You can display NTFS-compressed file and folder names in a different color to make them easier to identify. • You may notice a decrease in performance when working with NTFS-compressed files. When you open a compressed file, Windows automatically decompresses it for you, and when you close the file, Windows compresses it again. This process may decrease your computer’s performance. • NTFS-compressed files and folders only remain compressed while they are stored on an NTFS drive. • You cannot encrypt an NTFS-compressed file. • NTFS file encryption is not available on Windows XP Home Edition. • Compressed (zipped) Folders • Files and folders that are compressed using the Compressed (zipped) Folders feature remain compressed on both FAT and NTFS drives. • You can run some programs directly from these compressed folders without decompressing them. You can also open files directly from compressed folders. • Zipped compressed files and folders can be moved to any drive or folder on your computer, the Internet, or your network, and they are compatible with other file compression programs. • Folders compressed using this feature are identified by a zipper icon. • You can protect files in a zipped compressed folder with a password.

June 03,

Lecture 8

Data Compression • •

• • • • •

• • • • • • • • • • •



NTFS compression If you do not have an NTFS drive, this option is not available. To determine whether your drive is formatted with NTFS, open My Computer, right-click a drive, and then click Properties. The file system is indicated on the General tab. You can compress individual files and folders using NTFS compression, as well as entire NTFS drives. You can compress a folder without compressing its contents. You can work with NTFS-compressed files without decompressing them. You can display NTFS-compressed file and folder names in a different color to make them easier to identify. You may notice a decrease in performance when working with NTFS-compressed files. When you open a compressed file, Windows automatically decompresses it for you, and when you close the file, Windows compresses it again. This process may decrease your computer’s performance. NTFS-compressed files and folders only remain compressed while they are stored on an NTFS drive. You cannot encrypt an NTFS-compressed file. NTFS file encryption is not available on Windows XP Home Edition. Compressed (zipped) Folders Files and folders that are compressed using the Compressed (zipped) Folders feature remain compressed on both FAT and NTFS drives. You can run some programs directly from these compressed folders without decompressing them. You can also open files directly from compressed folders. Zipped compressed files and folders can be moved to any drive or folder on your computer, the Internet, or your network, and they are compatible with other file compression programs. Folders compressed using this feature are identified by a zipper icon. You can protect files in a zipped compressed folder with a password. Compressing folders using Compressed (zipped) Folders will not decrease your computer's performance. To compress individual files using Compressed (zipped) Folders, create a compressed folder and then move or copy the files to that folder. By

June 03,

Lecture 8

Compression • •

• • • • •

• •

• • • •

Using compact command

Compact Displays and alters the compression of files or directories on NTFS partitions. Used without parameters, compact displays the compression state of the current directory. Syntax compact [{/c | /u}] [/s[:Dir]] [/a] [/i] [/f] [/q] [FileName[...]] Parameters /c Compresses the specified directory or file. /u Uncompresses the specified directory or file. /s[:Dir] Specifies that the requested action (compress or uncompress) be applied to all subdirectories of the specified directory, or of the current directory if none is specified. /a Displays hidden or system files. /i Ignores errors. /f Forces compression or uncompression of the specified directory or file. This is used in the case of a file that was partly compressed when the operation was interrupted by a system crash. To force the file to be compressed in its entirety, use the /c and /f parameters and specify the partially compressed file. /q Reports only the most essential information. FileName Specifies the file or directory. You can use multiple file names and wildcard characters (* and ?). /? Displays help at the command prompt.

June 03,

Lecture 8

Disk Management •

Disk Management is a system utility for managing hard disks and the volumes, or partitions, that they contain. With Disk Management, you can initialize disks, create volumes, format volumes with the FAT, FAT32 , or NTFS file systems, and create fault-tolerant disk systems. Disk Management enables you to perform most disk-related tasks without restarting the system or interrupting users; most configuration changes take effect immediately.

• •

Basic and dynamic disk storage. Basic disks contain basic volumes, such as primary partitions and logical drives in extended partitions. Use basic disks on portable computers or when you plan to install multiple operating systems in different partitions on the same disk. For more information, see Basic disks and volumes. Dynamic disks contain dynamic volumes that offer more features than basic disks, such as the ability to create fault-tolerant volumes on the Microsoft® Windows® 2000 Server family or Microsoft® Windows® Server 2003 family of operating systems. You can extend dynamic volumes (except system or boot volumes), mirror dynamic volumes, and add new dynamic disks without restarting the computer. For more information, see Dynamic disks and volumes.



1. •

• •



Basic disks and volumes A basic disk is a physical disk that contains primary partitions, extended partitions, or logical drives. Partitions and logical drives on basic disks are known as basic volumes. You can only create basic volumes on basic disks. The number of partitions you can create on a basic disk depends on the disk's partition style: On master boot record (MBR) disks, you can create up to four primary partitions per disk, or you can create up to three primary partitions and one extended partition. Within the extended partition, you can create unlimited logical drives. On GUID partition table (GPT) disks, you can create up to 128 primary partitions. Because GPT disks do not limit you to four partitions, you do not need to create extended partitions or logical drives.

You can add more space to existing primary partitions and logical drives by extending them into adjacent, contiguous unallocated

05-06-

Lecture 8

Disk Management- basic disk Basic Disks – partition – primary partition – extended – Logical partitions primary partition • A type of partition that you can create on basic disks. A primary partition is a portion of a physical disk that functions as though it were a physically separate disk. On basic master boot record (MBR) disks, you can create up to four primary partitions on a basic disk, or three primary partitions and an extended partition with multiple logical drives. On basic GUID partition table (GPT) disks, you can create up to 128 primary partitions. Also known as a volume. Extended partition • A type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do not format an extended partition with a file system and then assign a drive letter to it. Instead, you create one or more logical drives within the extended partition. After you create a logical drive, you format it and assign it a drive letter. An MBR disk can have up to four primary partitions or three primary partitions, one extended partition, and multiple logical drives. Logical drive • A volume that you create within an extended partition on a basic master boot record (MBR) disk. Logical drives are similar to primary partitions, except that you are limited to four primary partitions per disk, whereas you can create an unlimited number of logical drives per disk. A logical drive can be formatted and assigned a drive letter.

05-06-

Lecture 8

Disk Management- basic disk •

To open Computer Management, click Start, click Control Panel, double-click Administrative Tools, and then double-click Computer Management.

To create a partition or logical drive Right-click an unallocated region of a basic disk, and then click New Partition, or right-click free space in an extended partition, and then click New Logical Drive. • In the New Partition wizard, click Next, click Primary partition, Extended partition, or Logical drive, and then follow the instructions on your screen. To format a basic volume • Right-click the partition, logical drive, or basic volume you want to format (or reformat), and then click Format. • Select the options you want, and then click OK. • •



• •

You can create primary partitions, extended partitions, and logical drives only on basic disks. You should create basic volumes instead of dynamic volumes if this computer also runs MS-DOS, Windows 95, Windows 98, Windows Millennium Edition, Windows NT 4.0, or Windows XP Home Edition. On a master boot record (MBR) disk, you can create up to four primary partitions, or three primary partitions, one extended partition, and unlimited logical drives. On a GUID partition table (GPT) disk, you can create up to 128 primary partitions.

Note: You cannot format system, boot, OEM, or unknown partitions. File compression is supported only on NTFSvolumes with cluster sizes 4 KB and smaller.

June 05,

Lecture 8

Disk Management- Dynamic Disk Dynamic volume: Dynamic disks refer to volumes. Using dynamic disks we can implement and extend volumes and implement raid. Dynamic disk can be attached or detached on the file. Volume is made up of free space club or merged fro more than one H.D. volumes avoid using of multiple drive letters or drives. Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned and striped volumes), and the ability to create fault tolerant volumes (mirrored and RAID-5 volumes). All volumes on dynamic disks are known as dynamic volumes. Converting dynamic disks to basic disks. After you convert a basic disk into a dynamic disk, you cannot change the dynamic volumes back to partitions. Instead, FOR you must move or back up your data, delete all dynamic volumes on the disk andONLY then convert the disk. For more information, WIN XP Installing the Windows Server 2003 family of operating systems. There are five types of volumes 11. Simple Volume Required minimum one Dynamic Disk 12. Spanned Volume Required HD min: 2 Max 32 15. Stripped Volume Required HD min: 2 Max 32 16. Mirrored Volume Required HD Only two dynamic disk 17. RAID-5 Volume Required HD min: 3 Max 32

2K3 SERVER 2K Server & 2K3

There are five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. Mirrored and RAID-5 volumes are fault tolerant and are available only on computers running Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, or the Windows Server 2003 family of operating systems. You can, however, use a computer running Windows XP Professional to remotely create mirrored and RAID-5 volumes on these operating systems. Portable computers and removable media Dynamic disks are not supported on portable computers, removable disks, detachable disks that use Universal Serial Bus (USB)

June 5,

Lecture 8

Disk Management- Dynamic Disk Simple Volumes: simple volumes are similar to partitions which can be created only one Hard disk which do not offer fall tolerance. A dynamic volume made up of disk space from a single dynamic disk. A simple volume can consist of a single region on a disk or multiple regions of the same disk that are linked together. If the simple volume is not a system volume or boot volume, you can extend it within the same disk or onto additional disks. If you extend a simple volume across multiple disks, it becomes a spanned volume. You can create simple volumes only on dynamic disks. Simple volumes are not fault tolerant, but you can mirror them to create mirrored volumes on computers running the Windows 2000 Server or Windows Server 2003 families of operating systems. You can create simple volumes on dynamic disks only. You cannot extend volumes formatted using FAT or FAT32. Simple volumes are not fault tolerant. Simple volumes can only be accessed by Windows 2000, Windows XP Professional, and the Windows Server 2003 family of operating systems. Creating simple volumes: Open disk management - Right click on the black bar - New – volume - Drive letter - File system Check box perform quick format

- Select simple volume

-

Alter the space – next

Spanned Volume: A volume can be created by selecting the free space from more than 1 Hdd A dynamic volume consisting of disk space on more than one physical disk. You can increase the size of a spanned volume by extending it onto additional

June 05,

Lecture 8

Disk Management- Dynamic Disk Stripped Volume: A dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. You can create striped volumes only on dynamic disks. Striped volumes are not fault tolerant and cannot be extended or mirrored. You need at least two dynamic disks to create a striped volume. You can create a striped volume onto a maximum of 32 disks. Mirrored Volume OR

RAID-1:

A fault-tolerant volume that duplicates data on two physical disks. A mirrored volume provides data redundancy by using two identical volumes, which are called mirrors, to duplicate the information contained on the volume. A mirror is always located on a different disk. If one of the physical disks fails, the data on the failed disk becomes unavailable, but the system continues to operate in the mirror on the remaining disk. You can create mirrored volumes only on dynamic disks on computers running the Windows 2000 Server or Windows Server 2003 families of operating systems. You cannot extend mirrored volumes. You need two dynamic disks to create a mirrored volume. Both copies (mirrors) of the mirrored volume share the same drive letter.

Implementation of mirror: • Create a simple volume ex: 100mb • Right click on S.V. and add mirror

June 08,

Lecture 8

Disk Management- Dynamic Disk RAID: (Redundancy Array Inexpensive Disks or Independent disks) A fault-tolerant volume with data and parity striped intermittently across three or more physical disks. Parity is a calculated value that is used to reconstruct data after a failure. If a portion of a physical disk fails, Windows recreates the data that was on the failed portion from the remaining data and parity. You can create RAID-5 volumes only on dynamic disks on computers running the Windows 2000 Server or Windows Server 2003 families of operating systems. You cannot mirror or extend RAID-5 volumes. In Windows NT 4.0, a RAID-5 volume was known as a striped set with parity. • • • • • • • • •

RAID 5 Striping with parity Requires min 3Hdds max 32 Hdds. Offers highest fault tolerance Data is written evenly on to all member striped volumes and Parity information is also added. Parity bit: It is mathematical calculation added to every piece of data and used for regenerating the data when any HDD fails. Offers performance and availability I/O performance: Reading and writing both are fast.



You can create RAID-5 volumes only on computers running Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, or the Windows Server 2003 family of operating systems. You need at least three (but no more than 32) dynamic disks to create a RAID-5 volume. RAID-5 volumes provide fault tolerance at a cost of only one additional disk for the volume. For example, if you use three 10-GB disks to create a RAID-5 volume, the volume will have a 20-GB capacity. The remaining 10-GB is used for parity. RAID-5 volumes cannot be extended or mirrored.

• • •

Parity • A calculated value that is used to reconstruct data after a failure. RAID-5 volumes stripe data and parity intermittently across a set of disks. When a disk fails, some server operating systems use the parity information together with the data on

June 08,

Lecture 8

Disk Management by Using DISKPART DiskPart DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using scripts or direct input from a command prompt. Before you can use DiskPart.exe commands, you must first list, and then select the object to give it focus. When an object has focus, any DiskPart.exe commands that you type will act on that object.

Basic Disk Function by Using Diskpart

June 08,

Lecture 8

Disk Management by Using DISKPART DiskPart DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using scripts or direct input from a command prompt. Before you can use DiskPart.exe commands, you must first list, and then select the object to give it focus. When an object has focus, any DiskPart.exe commands that you type will act on that object.

Dynamic Disk Function by Using Diskpart

June 08,

Lecture 8

Internet Explorer Properties •

Folder auditing – to check security & EVETNS – Monitoring of folders R.C on properties – security – advanced



Customization of internet explorer Modify four things – – – –

proxy settings Toolbar customization Custom toolbar buttons Security

Steps Open active director – domain properties – modify default domain policy – refresh group policy – verify Run- dsa.msc

A:

June 10,

computer configuration – administrative- windows component –

Program Compatibility Wizard

June 10,

Boot Process OR Booting In computing, booting (booting up) is a bootstrapping process that starts operating systems when the user turns on a computer system. A boot sequence is the initial set of operations that the computer performs when power is switched on. The bootloader typically loads the main operating system for the computer. OS= drivers +devices The process in which OS loaded from H.D into RAM When system is off OS is in hard disk- when system is on OS is in RAM-ROM Boot Files Ntloader - mandatory – first loaded during when press on button, used to build the operating system menu choices Boot.ini - mandatory – ntloader load boot.ini Ntdetect.com - mandatory – when you select OS and then enter it loaded, check all h/w like modem etc. ntdetect create resource map. Ntbootdd.sys - optional – incase of SCSI drive Bootsect.dds optional – incase os dual booting with DOS Based OS (95-98 + XP, 2000 etc) Boot Sector (Where boot files placed) BIOS transfer Boot sector to RAM from HD (The BIOS points to the boot device, and the Master Boot Record (MBR) is loaded. POST : post on self test ( check all h/w when os start) BIOS : Read content of MBR Boot Sector: active partition is loaded into memory – always in active partition Boot process:

June 12,

Boot loader • A computer's central processor can only execute program code found in Read-Only Memory (ROM) and Random Access Memory (RAM). Modern operating systems and application program code and data are stored on nonvolatile data storage devices, such as hard disc drives, CD, DVD, USB flash drive, and floppy disk. When a computer is first powered on, it does not have an operating system in ROM or RAM. The computer must initially execute a small program stored in ROM along with the bare minimum of data needed to access the nonvolatile devices from which the operating system programs and data are loaded into RAM. • The small program that starts this sequence of loading into RAM, is known as a bootstrap loader, bootstrap or boot loader. This small boot loader program's only job is to load other data and programs which are then executed from RAM. Often, multiple-stage boot loaders are used, during which several programs of increasing complexity sequentially load one after the other in a process of chain loading. Boot Disk • A boot disk is a removable digital data storage medium from which a computer can load and run (boot) an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards. • Boot disks are used for: – Operating system installation. – Data recovery. – Data purging. – Hardware or software troubleshooting. – Customizing an operating environment. – Software demonstration. – Administrative access in case of lost password is possible with an appropriate boot disk with some operating systems.

Configuring the BOOT.INI File If you are using an x86-based system, it is critical that the BOOT.INI file be configured properly. This file is created during the Windows XP Professional installation and is stored in the system root partition. The BOOT.INI file contains the information required by NTLDR to create and display the boot startup menu. The information that is contained in the BOOT.INI file includes: • The path to the boot partition • Descriptive text that should be displayed on the boot startup menu • Optional parameters for managing computer startup • Optional support for multiple boot configurations if other Microsoft operating systems have been installed in separate partitions The BOOT.INI file contains two main sections for configuration: the Boot Loader and Operating Systems. Options that are configured in the Boot Loader section are applied to all Windows installations on the computer. Settings in the Operating Systems section are applied only to the specific Windows installation that is referenced within the Operating Systems section. The following is an example of text that you might see in a BOOT.INI file. [boot loader] timeout=30 default=multi(0)disk(0)rdisk(0)partition(1) \Windows [operating systems] multi(0)disk(0)rdisk(0)partition(1) \Windows=”Microsoft Windows XP Professional” /fastdetect In the following sections, you will learn about Boot Loader configuration options, ARC naming conventions, BOOT.INI operating system parameters, options for editing the BOOT.INI

Related Documents

Lecture
October 2019 41
Lecture
November 2019 30
Lecture
May 2020 29
Lecture
October 2019 41
Lecture
June 2020 29
Lecture
May 2020 21

More Documents from ""

Profile 2009(1)
May 2020 7
Lecture
May 2020 4