nos -final

50
 KOT02/0000802 IDM-HND-ICT S/S_2 nd sem- Supporting NOS &OS Page 1 of 50 Task 01 1.1 Current Computer details of the Lank a staffing co-operation Headquarters  28 windows 2000 server computers  1 Certification server  2 file servers  25 windows 2000 terminal edition o OWA (Outlook web access) -OWA1 o 2 domain controller (DC1, DC2) o 3 Microsoft Exchange server 5.5 o 4 UNIX servers (oracle database) o 1 remote server (RAS1) Before upgrading the we have to look through several things in this organization. 1) What are hardware requirements?  We have to check the hardware what are the present configurations of the hardware then only we can upgrade present systems to new versions.  If there is hardware do not support to the new version we have to upgrade to new hardware requirement. Then only the new versions of windows will perform well to the new version window. 2) What are the application currently running on the system is it ok with the new version? Do we want to buy the new versions?

Transcript of nos -final

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 1/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 1 of 50 

Task 01

1.1

Current Computer details of the Lanka staffing co-operation

Headquarters

  28 windows 2000 server computers

  1 Certification server

  2 file servers

  25 windows 2000 terminal edition

o  OWA (Outlook web access) -OWA1

o  2 domain controller (DC1, DC2)

o  3 Microsoft Exchange server 5.5

o  4 UNIX servers (oracle database)

o  1 remote server (RAS1)

Before upgrading the we have to look through several things in this organization.

1)  What are hardware requirements?

  We have to check the hardware what are the present configurations of the hardware then

only we can upgrade present systems to new versions.

  If there is hardware do not support to the new version we have to upgrade to new

hardware requirement.

Then only the new versions of windows will perform well to the new version window.

2) What are the application currently running on the system is it ok with the new version?

Do we want to buy the new versions?

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 2/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 2 of 50 

  We have to check on the application they are currently running. If we change the operating

system some times some application could be error in new window platform. There for we

have to check the software is they working in the new operating system.

If there is not working we have to buy the new software to the computer. We have to look 

how much money we have to spend to the software.

3)  Users & IT administrators’ knowledge about new systems to be upgraded. 

  Then we have to interview the employees that they are all ready experience with the old

operating system. For that we have identify the user whether they could operate with the new

operating system.

  If they couldn’t operate with the new operating system we have to give the proper 

training to the user. Then only the user can do their work quickly and properly like the old

operating system.

The reason why the company decided to upgrade Windows 2000 server to windows 2003

server

  In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so

Win2003 server ismore secure than win 2000 server.

  In 2000 we cannot rename domain whereas in 2003 we can rename Domain.

  In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) where as in

2003 supports up to 64 processors and max of 512GB RAM.

  2000 Supports IIS 5.0 and 2003 Supports IIS6.0

  2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 3/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 3 of 50 

  2000 has Server and Advance Server editions where as 2003 has Standard, Enterprise,

Datacenter and Web server Editions.

  2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server 

operating systems (Windows Server 2003 X64 Std and Enterprise Edition)

  2000 has basic concept of DFS (Distributed File systems) with defined roots whereas 2003

has Enhanced DFS support with multiple roots.

  In 2000 there is complexality in administering Complex networks whereas 2003 is easy

administration in all & Complex networks.

  In 2000 we can create 1 million users and in 2003 we can create 1 billion users.

  2003 has telnet sessions available.

  2000 supports IPV4 whereas 2003 supports IPV4 and IPV6.

1.2 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 4/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 4 of 50 

Now the company is using for client computers Window 2000 Professional the hardware

requirement of it.

Hardware requirements for Windows Window 2000 Professional

133 MHz or more Pentium microprocessor (or equivalent). Windows 2000 Professional supports

up to two processors on a single computer.

  64 megabytes (MB) of RAM recommended minimum. 32 MB of RAM is the minimum

supported. 4 gigabytes (GB) of RAM is the maximum.

  A 2 GB hard disk that has 650 MB of free space. If you are installing over a network, more

free hard disk space is required.

 VGA or higher-resolution monitor.

  Keyboard.

  Mouse or compatible pointing device (optional).

The company wants to upgrade the windows 2000 Professional to Windows Xp for that they

have to upgrade the hardware to following requirements.

The Minimum Hardware requirements for the Windows Xp

  Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)

  At least 64 megabytes (MB) of RAM (128 MB is recommended)

  At least 1.5 gigabytes (GB) of available space on the hard disk 

  CD-ROM or DVD-ROM drive

  Keyboard and a Microsoft Mouse or some other compatible pointing device

  Video adapter and monitor with Super VGA (800 x 600)or higher resolution

 Sound card

  Speakers or headphones

Windows XP benefits 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 5/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 5 of 50 

  Windows XP is somewhat faster than Windows 2000, assuming you have a fast processor

and tons of memory (although it will run fine with a 300Mhz Pentium II and 128MB of 

RAM).

  The new Windows XP interface is more cheerful and colorful than earlier versions, although

the less-cartoony "Classic" interface can still be used if desired.

  Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD

writer support, the Internet Connection Firewall, and Remote Desktop Connection.

  Windows XP has better support for games and comes with more games than Windows 2000.

  Windows XP is the latest OS - if you don't upgrade now, you'll probably end up migrating to

XP eventually anyway, and we mere mortals can only take so many OS upgrades.

  Manufacturers of existing hardware and software products are more likely to add Windows

XP compatibility now than Windows 2000 compatibility.

For server computers the company is having windows 2000 server

The hardware requirement for windows 2000 server

In windows 2000 server there are 3 type server operating systems.

  Windows 2000 Server - Supports up to four processors and up to 4GB of RAM. It is used for

web, application, print and file servers.

  Windows 2000 Advanced Server - Supports up to eight processors and up to 8GB of RAM. It

is used in an enterprise network and very useful as an SQL server.

  Windows 2000 Datacenter Server - Supports up to 32 processors and up to 64GB of RAM. It

is used in an enterprise network to support extremely large databases and real time

processing.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 6/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 6 of 50 

  The company wants to upgrade the windows 2000 server to window 2003 server

  For that the company has to full fill the following requirements.

Hardware requirement for windows 2003 server

Detail table windows 2003 server

System Microprocessor RAM HD Requirements

Windows 2000 Server Pentium 133128Mb (256Mb

Recommended)

1 GB free (2 G

recommended)

Windows 2000 AdvancedServer

Pentium 133 256Mb 1 GB free (2 Grecommended)

Windows 2000

Datacenter ServerPentium 133 256Mb

1 GB free (2 G

recommended)

Windows

Server 2003

Edition

Number of 

Processors Processor Speed RAM

Available

Disk Space

(for Setup) Monitor

Web 1 – 2 133 megahertz

(MHz) minimum;

550 MHzrecommended

128 megabytes

(MB) minimum;

256 MBrecommended;

2 GB maximum

1.5

gigabytes

(GB)

Video Graphics

Adapter (VGA) or

higher; Super VGA(SVGA) (800 × 600) or

higher recommended

Standard 1 – 4 133 MHz

minimum;

550 MHz

recommended

128 MB minimum;

256 MB

recommended;

4 GB maximum

1.5 GB VGA or higher; SVGA

(800 × 600) or higher

recommended

Enterprise 1 – 8 133 MHz

minimum;

550 MHz

recommended

128 MB minimum;

256 MB

recommended;

32 GB maximum

1.5 GB VGA or higher; SVGA

(800 × 600) or higher

recommended

Datacenter 8–32 400 MHz

minimum

512 MB minimum;

64 GB maximum

1.5 GB VGA or higher; SVGA

(800 × 600) or

higher recommended

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 7/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 7 of 50 

There is an important difference between windows 2000 and windows 2003. When installing

terminal services for windows 2000 u r prompted to select application server functions or

administrative functions sets can be installed sequent on one server but it performs only one

function at one time. But in 2003 still distinguishes between application and administrative

services but installation and management are now consolidated.

In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so

Win2003 server is more secure than win 2000 server.

The Main Difference between Win 2000 Server and Win 2003 Server are:-

1) Windows 2003 server is more secure than Windows 2000 sever.

2) In win 2000 sever IIS version is 5.0, In win 2003 server IIS version is 6.0 so it contain some

advanced features.

3) In Win 2003 Server we can apply more Group policies.

4) In Win 2003 Server Active Directory also contain more features.

5) There are 4 types of Editions available in Win 2003 server

1.Windows 2003 server standard Edition.

2. Windows 2003 server Enterprise Edition.

3. Windows 2003 server Web Edition.

4. Windows 2003 server Datacenter Edition.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 8/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 8 of 50 

1.3

Outlook web access 

Outlook Web Access (OWA) allows any client with a

compatible browser to access Exchange Server folders.

The "premium" version of OWA in Exchange 2003 looks and acts much like the Outlook 2003

desktop client, although it does not offer support for the Journal folder. The "basic" version looks

more like previous versions. You may want to try both and see which is faster for the conditions

your users are likely to encounter. Microsoft Exchange Server Introduction to Exchange

Server 2003 has a good chart comparing the feature sets.

For Exchange 2000, you create applications using web forms. No conversion tool is available to

turn Outlook forms into Exchange 2000 OWA forms.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 9/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 9 of 50 

Task 2

2.1

To: - Manager of the lanka staffing corporation 

From: - M.WimalRaj Desktop Administrator of the lanka staffing corporation.

To implement Disaster recovery mechanisms.

  What is disaster?

  How can the disaster affect the company?

  What is disaster recovery?

  What is disaster recovery plan?

  Benefits of disaster recovery plan?

What is disaster?

Disaster is a sudden, calamitous event bringing great damage, loss, and destruction and

devastation to life and property. The damage caused by disasters is immeasurable and varies with

the geographical location.

E.g:- Earthquake, flood, land slide, heavy rain, thunder storm, Wind .Tsunami and etc.

How can the disaster affect the company business?

  Currently the company is running with IT department and many computer in this

company.

  Due to the sudden disaster like Earthquake, flood, land slide, heavy rain, thunder storm,

Wind. Tsunami and etc the computer can affected by the disaster.

  If the server are down for a one day the company business will lost many amount of 

money. Because the company’s all business runs under the IT department. 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 10/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 10 of 50 

What is disaster recovery?

  A disaster recovery is a response to a declared disaster or a regional disaster. It is the

restoration or recovery of an entire Agent computer.

  A disaster recovery plan describes how an organization is to deal with potential disasters.

  It define if the disaster happened how the organization going to solve the problem from

the disaster.

  The company has to keep proper backup, proper power plan, proper storages and etc.

  This include under disaster recovery.

What is disaster recovery plan?

  A disaster recovery plan sometimes referred to as a business continuity plan or business

process contingency plan describes how an organization is to deal with potential

disasters.

  Just as a disaster is an event that makes the continuation of normal functions impossible,

a disaster recovery plan consists of the precautions taken so that the effects of a disaster

will be minimized and the organization will be able to either maintain or quickly resume

mission critical functions.

  Typically, disaster recovery planning involves an analysis of business processes and

continuity needs; it may also include a significant focus on disaster prevention.

Benefits of disaster recovery plan 

  Reduces the need for decision making when disaster happens

  Gives you confidence that your business can continue after a disaster

  Guarantees the availability of stand-by systems

  Provides you with a back-up of information and documents if the original is destroyed

  Reduces the risk of human disaster

  Makes you aware of those things that can be insured against disaster

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 11/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 11 of 50 

2.2

For the budget of the recovery plan we have analysis several things in the organization .The

things that we have to look from this company.

  Identify Risks

  Agree on business requirement

  Create a Capabilities Assessment

  Estimate the Costs

  Define Leadership and Staffing

  Determine Your Recovery Site

  Review Telecommunication and Connectivity Alternatives

  Test the Plan

  Document Changes

  Communicate

1)  Identify Risks: -Identify scenarios where a recovery is required. Then create a list of 

business requirements necessary during these potential interruptions.

2)  Agree on Business Requirements: - Define which business processes are critical to the

continued operation of your organization. Identify the required applications and business data

needed to support these processes.

3)  Create a Capabilities Assessment: -List gaps between the business requirements and

potential solutions.

4) Estimate the Costs: -Prepare cost estimates. Define an acceptable length for unplanned

downtime and prepare a budget to complete the desired solution.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 12/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 12 of 50 

5) Define Leadership and Staffing: -Identify your executive leadership and the key employees

who will lead the recovery efforts.

6) Determine Your Recovery Site: - Select a recovery site in an alternate geographic region.

7) Review Telecommunication and Connectivity Alternatives: - Define a solution to include

primary and alternate connectivity options to your recovery site.

8) Test the Plan: - Test your recovery scenarios. Include a restore of applications and current

production data to test your backup processes.

9) Document Changes: -Periodically review your plan and document changes in your business

requirements and their solutions.

10) Communicate: - Provide thorough and consistent communications to your employees.

Educate your staff on the roles they play in a disaster situation and define the methods you will

use to contact key corporate personnel. Include an inbound communication strategy in the event

that key members of your team are unable to participate due to their own personal issues.

Some thing has to be define 

  You have to keep a separate place for the servers and the other most secured computer.

  Have to keep a backup site for the server data’s. 

  Have to check the server components are available as for the sudden need

  Do the company is suitable for the disaster recovery plan

  What are the things that have to secure well.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 13/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 13 of 50 

Task 03 

3.1

Proxy Server

In computer networks, a proxy server is a server (a computer system or an application program)

which services the requests of its clients by forwarding requests to other servers.

Function of the Proxy server

  Forwarding the clients request to the correct server.

  Internet proxy server is also associated with a firewall server that is used to protect the

network of the enterprise from any intrusions from the outside.

  The Internet proxy server receives requests from web pages or any other Internet services

from the user.

  In case the page cannot be found in the cache, then the Internet proxy server must act as a

client as thus use its own IP address to request the web page from other servers that are found on

the Internet.

DNS Server

A DNS server is any computer registered to join the Domain Name System. A DNS server runs

special-purpose networking software, features a public IP address and contains a database of 

network names and addresses for other Internet hosts.

DNS servers communicate with each other using private network protocols. The DHS server

contains 13 root domains. E.g:- .com, org, lk, uk 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 14/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 14 of 50 

Role of the DNS server

  Interacting With Other Servers:- 

The DNS resolution process often requires that multiple servers be involved. Servers mustthus maintain not just name information, but information about the existence of other servers.

Depending on the type of DNS request, servers may themselves become clients and generate

requests to other servers. 

  Zone Management and Transfers:- 

The server must provide a way for DNS information within the zone to be managed. A

facility also exists to allow a zone transfer to be performed between the master (primary)

server for a zone and slave (secondary) servers.

  Performance Enhancement Functions:- 

Due to the large number of requests servers handle, they employ numerous techniques to

reduce the time required to respond to queries. The most important of these is caching of 

name information. A variation of regular caching called negative caching may also be used to

improve performance, and load balancing is a feature that can be used to improve efficiency

of busy devices registered within the DNS system.

  Administration: - 

Various other administrative details are required of name servers, such as storing

information about the different types of  contacts (humans) who are responsible for certain

tasks related to management of a domain or zone. 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 15/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 15 of 50 

DHCP Server

This protocol is used to assign IP addresses to hosts or workstations on the network. Usually a

DHCP server on the network performs this function. Basically it "leases" out address for specific

times to the various hosts. If a host does not use a given address for some period of time, that IP

address can then be assigned to another machine by the DHCP server. When assignments are

made or changed, the DHCP server must update the information in the DNS server.  

Function of the DHCP server

  Centrally manages IP address allocation.

  Helps prevent address conflicts.

  Reduces administrative effort.

  Helps conserve IP address.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 16/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 16 of 50 

3.2

Attended Installation

This is a normal installing method that we use.

Advantages of this attended installation

  Low number of installations to perform (why create an installation file when you can run

through a single installation “by-hand”) 

  Need to individualize each installation at the time of installation (new users with unknown

information)

  Ease of running an attended installation

Steps for the attended installation

The first step of performing an attended installation is finding a way to enter the setup program.

There are several ways of doing so, including

  Starting from an Existing Windows OS: If you have 98 or 2000 installed on your PC, it is

likely that you can perform an upgrade installation directly from the operating system. Readmore on upgrade installations in the next guide

  Starting from a Floppy Boot Disk Set: If the PC that you wish to install XP on does not

feature a CD-ROM drive (or you cannot boot from CD for whatever reason), use the six-disk 

set provided by Microsoft online to start installation

  Starting from a CD-ROM: The simplest option – Stick the CD in the drive before boot and

watch Windows do its wonders!

  Once you have entered what many people call the “low-level” setup, you will see a bluescreen with instructions for installation. This is actually a condensed copy of Windows that

has been stored in your memory in order to allow you to install the real Windows XP. Run

through the setup with these step

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 17/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 17 of 50 

1.  Agree to Licensing Agreement

2.  Partition Drives: Make sure that the partition that you have selected to install Windows on is

indeed free or free to destroy and also has enough space to support a Windows installation

3.  Format the Drives: You will be given the choice between NTFS, NTFS (Quick), and possibly

FAT to format the drives. The difference between NTFS and the quick format is that the

quick format does not scan the volume for bad sectors. Generally, it is better to perform a full

format, but on a known good drive, a quick format should do.

4.  Allow setup to copy installation files and restart

5.  Take boot disks/CD out of drive

After these steps, you should be in what is the next level of setup, with a fully-functional,

Windows-like GUI. This level of setup is where the bulk of install configuration occurs. Once

you have reached this stage, you will watch setup install some components and then you will be

prompted with your first set of dialogue boxes:

1.  Regional and Language Options: Make sure that you choose the relevant language and

regional options on the computer you are installing Windows XP

2.  Name, Licensing Information: Obvious, but enter relevant names!

3.  Computer Naming: Note that to communicate with legacy (NT) networks, your computer

name should be eight or fewer alphanumeric characters

4.  Modem Information: Installation requires you to enter at least an area code in the US

5.  Date and Time Settings: The time should already be correct, but be sure to select your correct

time zone

6.  Network Setup: We will cover Windows XP networking at a later time, but here are some

basic points.

  Typical v. Custom Settings: Windows will try to auto-detect appropriate network 

configuration in the Typical Settings mode. If you choose Typical, you will not be asked to

install or implement protocols

  Protocols: If you choose a custom setup, you will need to select the protocols to install. Some

typically installed protocols include: TCP/IP, File and Print Sharing,

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 18/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 18 of 50 

7.  Workgroup or Domain: You must choose to either join a workgroup or a domain. A domain

must already exist in order to join it, and a workgroup is an informal association of Windows-

networked computers

8.  Setup now will install start menu items, register components, remove temporary files, and

reboot.

Upon your first installation of Windows XP, you will be prompted for different user information.

Note that the first “user name” you configure will become a password-less, administrative user

by default. You should change this later.

Unattended installation

Unattended installation is an automated installing technology. Normally this type of installation

is used in large organization. Answer file is a main component of the unattended installation.

The answer file contains how the setup will install and how the system configured.

Type of the unattended installation

1)  Network installation

2)  Sys prep installation

3)  RIS installation

1)  Network installation

Step of the network installations

  Create answer file

  Create uniqueness database file

  Place files in distribution share

  Boot target computer/ boot disk 

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 19/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 19 of 50 

Advantages of network installation

  Reduction of the administrative expenditure for the first installations.

  Phone books can be configured centrally.

  Management of shared record notes in a team for data sources witch provided no accordingly

sized note field.

2)  Sys prep installation

The System Preparation (Sys prep) tool prepares an installation of Windows for duplication,

auditing, and customer delivery.

Requirement for sys prep installation

All computers should in same configuration.

Third party imaging disk required.

Advantage of sys prep installation

  Removes system-specific data from Windows. Sys prep can remove all system-specific

information from an installed Windows image, including the computer security identifier

(SID). The Windows installation can then be captured and installed throughout an

organization.

  Configures Windows to boot to Audit mode. Audit mode enables you to install third-

party applications and device drivers, as well as to test the functionality of the computer.

  Configures Windows to boot to Windows Welcome. Configures a Windows

installation to boot to Windows Welcome the next time the computer starts. In general,

you configure a system to boot to Windows Welcome immediately before delivering the

computer to a customer.

  Resets Windows Product Activation. Sys prep can reset Windows Product Activation

up to three times

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 20/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 20 of 50 

3)  RIS installation

RIS installation is a method of cleanly installing an operating system and applications over a

network with minimal administrator or technician interaction. RIS uses Pre-Boot Execution

Environment (PXE) technology to enable client computers without an operating system to start

up from a PXE-enabled network adapter and connect remotely to a RIS server, which installs a

supported operating system.

Requirement for the RIS installation

  DNS

 DHCP

  Active directory

  Non system partition

  Hot fix Q308508 for XP RIS setup

  Patch Q313069 for XP Rip Prep

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 21/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 21 of 50 

3.3

Terminal Server

 Terminal Server is the server component of Terminal services. It handles the job of authenticating clients, as well as making the applications available remotely.

  It is also entrusted with the job of restricting the clients according to the level of access they

have.

  The Terminal Server respects the configured software restriction policies, so as to restrict the

availability of certain software to only a certain group of users.

  The remote session information is stored in specialized directories, called Session Directory

which is stored at the server. Session directories are used to store state information about a

session, and can be used to resume interrupted sessions.

  The terminal server also has to manage these directories. Terminal Servers can be used in a

cluster as well.

Terminal services

  Terminal Services provides the ability to host multiple, simultaneous client sessions on

Microsoft Windows Server 2003.

  Terminal Server is capable of directly hosting compatible multi-user client desktops running

on a variety of Windows-based and non Windows-based hardware. Standard Windows-based

applications do not need modification to run on the Terminal Server, and all standard

Windows Server 2003-based management infrastructure and technologies can be used to

manage the client desktops. 

Terminal service works

  Terminal Service Architecture

  Terminal Service Physical Structure

  Terminal Services Processes and Interactions

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 22/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 22 of 50 

  Terminal Service Architecture

Terminal Services consists of four components: the Windows Server 2003 multi-user kernel, the

Remote Desktop client, the Terminal Services Licensing service, and Session Directory Services.

This system allows terminal servers to obtain and manage terminal server client access license

(TS CAL) tokens for devices and users connecting to a terminal server.

Figure 3.3.1

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 23/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 23 of 50 

Terminal Service Architecture components

Component Description

CSRSS.exe The Client-Server Runtime Subsystem is the process and thread manager for

all logon sessions.

RdpDD.sys Captures the Windows user interface and translates it into a form that isreadily converted by RDPWD into the RDP protocol

RdpWD.sys Unwraps the multi-channel data and then transfers it to the appropriatesession.

SMSS.exe Session Manager creates and manages all sessions.

Termsrv.exe Manages client connections and initiates creation and shutdown of 

connection contexts.

Termdd.sys The RDP protocol, which listens for RDP client connections on a TCP port.

Tdtcp.sys Packages the RDP protocol onto the underlying network protocol, TCP/IP.

Wlnotify.dll Runs in the session’s Win Logon process to create processes in the user

session.

Win32k.sys Manages the Windows GUI environment by taking the mouse and keyboard

inputs and sending them to the appropriate application.

WinLogon.exe This system service handles user logons and logoffs and processes the

special Windows key combination Ctrl-Alt-Delete. Win Logon is

responsible for starting the Windows shell (which is usually WindowsExplorer).

Terminal Services Physical Structure

  Terminal Services provides remote access to a Windows desktop through “thin client”

software, allowing the client computer to serve as a terminal emulator.

  It provides an effective and reliable way to distribute Windows-based programs, providing a

single point of installation with multiple users having access to the Windows Server 2003

operating system desktop, where they can run programs, save files, and use network 

resources as if they were sitting at that computer.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 24/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 24 of 50 

Figure 3.3.2

Terminal Service Physical Structure components 

Component Description

Terminal Server Hosts applications for client computers.

Terminal Server

Licensing Service

Issues TS Device CAL token to a requesting terminal server.

Session Directory Maintains a list of the user names associated with the session IDs

connected to the servers in a load balanced Terminal Server cluster.

Remote Desktop

Connection

Client software that allows a connection to one remote computer.

Remote DesktopsMMC Snap-in

Client software used by administrators to connect to multipleremote computers simultaneously.

Remote Desktop Web

Connection

ActiveX RDP Web browser client.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 25/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 25 of 50 

Terminal Services Processes and Interactions

  Terminal Services transmits only the user interface of the program to the client, with the

client computer connecting through the network, sending keystroke and mouse-movement

information over the Remote Desktop Protocol to the Terminal Server.

  It then sends the client screen information in the form of simple (and bandwidth-friendly)

GDI events, backed with bitmap information if required to properly display the desktop state.

  Each user logs on and sees only their individual session, which is managed transparently by

the server operating system and is independent of any other client session.

  The Terminal Server provides virtual Windows session management, so users can essentially

treat that session as their own personal computer.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 26/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 26 of 50 

Task 4

4.1

Monitoring band width utilization

This means to monitor you have the connected link between two or more locations.

For example we can say, we have two organizations in different places. Head office is located in

Colombo, Sub branch is located in Kandy.

We are connected the two organizations with leased line.

What could be the threats of for the connection between these two organizations?

1)  Natural disasters

  Earth quick 

  Thunder storm

  Heavy rain due to that flood

  Landslide

 Wind

  Tsunami and etc.

2)  Thief attack 

3)  Other threats

Due to these kinds of threats the connection between the two organizations can be disconnected.

Leased connectionColombo-Head office  Kandy-Sub branch

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 27/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 27 of 50 

For that purpose we have to check the link status every time. There are way to check the link 

status .

1)  Manual way

2)  Automatic way

Manual way

We are going to check the connection from Colombo head office.

The IP address of the organizations

Lets say we want to check is there is connection between kandy sub branch.

Go to run and type cmd and press ok.

Figure 4.1.1

Leased connectionColombo-Head office 

Kandy-Sub branch 

209.85.231.109 209.85.231.104

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 28/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 28 of 50 

In cmd type “ping 192.168.1.245 and you can check the connection. (Figure 4.1.2)

Figure 4.1.2

This is a manual method to check the connection between the organizations. You can’t check the  

connection every time to time .

Because of this problem there are software to check these problems .

Automatic way/ software method

There are many types of softwares to monitor the network connection. In software method you

can easily identify the problems easily. You can run reports and identify the problems.

I have selected the software called CommTraffic to check to link status between the two

organizations.

This is software you can check in link status in connection.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 29/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 29 of 50 

Details about this software

  CommTraffic is a network utility for collecting, processing, and displaying traffic and

network utilization statistics for both LAN and dial-up computer network connections.

  When monitoring a LAN segment, CommTraffic shows traffic and network utilization

statistics for each computer in the segment.

  CommTraffic has a highly customizable, intuitive interface that displays statistics in

graphical and numeric form. The program's main window can be customized to display

incoming, outgoing, and summary traffic statistics in a variety of styles.

  The program allows you to set time and traffic limits to reflect the rates set by your ISP.

  Once the limit is approached, the program will alert you by playing a sound and

displaying a message.

  CommTraffic allows you to generate an array of reports that reflect the network traffic

volume and Internet connection expenses.

  The program supports virtually any rate plan your ISP might use, such as those based on

connection time, traffic volume, time of the day, and other measures.

  This ensures that you are always aware of your Internet connection expenses.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 30/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 30 of 50 

This is the starting page of the CommTraffic software. In this page you can see the incoming

and outgoing data’s of the links available. ( Figure 4.1.3)

Figure 4.1.3

In this page you can see the local host available of the link. ( Figure 4.1.4)

Figure 4.1.4

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 31/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 31 of 50 

In this page you can see the remote host available on the network. (Figure 4.1.5)

Figure 4.1.5

In this page you can see the protocols of the network. (Figure 4.1.6)

Figure 4.1.6

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 32/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 32 of 50 

The next page is local port available in the network. (Figure 4.1.7)

Figure 4.1.7

The next page is you can se the remote ports available. (Figure 4.1.8)

Figure 4.1.8

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 33/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 33 of 50 

If there are any errors in the network you can identify the errors in this column. (Figure 4.1.9)

Figure 4.1.9

In the alarm section for Example Is there in any lost of connection in the network or there any

thing crashed you can give set alert message to your phone or to your mail address. You have to

manual configured the settings.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 34/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 34 of 50 

In this page you set the change network, wizard, adapters, IP aliases, MAC aliases, port aliases

and etc settings. (Figure 4.1.10)

Figure 4.1.10

What are the advantages by using software to monitor bandwidth utilization and for link status

  You can identify the problem easily by the software.

  You can reduce the work of the administrator.

  No extra man power needs to use for the monitor the connection.

  The software checks the connection every time it makes the work easy.

  You can avoid the mistake by the users.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 35/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 35 of 50 

4.2

Memory usage

This means the how much the memory has been using for application. The memory is consumed

in the ram of the computer .you can check normally in Task manager of your computer.

It showed in figure 4.2.1.

Figure 4.2.1

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 36/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 36 of 50 

Disk utilization

A dashboard view that displays, in seconds, the performance of disk bytes and disk . in this you

can see the disk performance. 

Figure 4.2.3

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 37/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 37 of 50 

Network usage

In network usage you can see what is the network is used and for which network the memory is

consuming very high. You can see the usage by draft design by the computer. It’s shown in

figure 4.2.4

Figure 4.2.4

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 38/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 38 of 50 

Processor usage

This shows how the processor worked for different application. You can identify is the processor

is capable to work or not enough. According to the usage you can upgrade the processor. The

processor usage is shown in figure 4.2.5 and 4.2.6. 

Figure 4.2.5

This window show what are the application running and how much memory is consumed by a

processor.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 39/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 39 of 50 

You can identify Memory usage, Disk utilization, Network usage, Processor usage in software.

There are many soft wares to check these things. I have selected software called Resource

monitor. In this software we are going to look at the screen shots of Memory usage, Disk 

utilization, Network usage, Processor usage.

Memory usage

The memory usage of the computer showed in figure 4.2.6

Figure 4.2.6

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 40/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 40 of 50 

Disk utilization

The disk utilization is showed in figure 4.2.7

Figure 4.2.7

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 41/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 41 of 50 

Network usage 

The network usage is showed in figure 4.2.8

Figure 4.2.8

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 42/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 42 of 50 

Processor usage

The processor usage is showed in figure 4.2.9

Figure 4.2.10

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 43/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 43 of 50 

4.3

Event log

Event log means it contains the history of the records that happened in the computer. It contains

the hardware issues, software issues, security issues and etc.

To go to event log right click my computer Manage Event Viewer

Event logs have two types of logs

  Application log

  Security log

  System log

Figure 4.3.1

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 44/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 44 of 50 

Application log

The Application log contains events logged by applications or programs.

For example, a database program might record a file error in the application log. Programdevelopers decide which events to log.

Screen shot of the application log

Figure 4.3.2

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 45/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 45 of 50 

Security log

The Security log contains events such as valid and invalid logon attempts, as well as events

related to resource use, such as creating, opening, or deleting files or other objects.

Administrators can specify what events are recorded in the security log. For example, if you have

enabled logon auditing, attempts to log on to the system are recorded in the security log.

Screen shot of the security log

Figure 4.3.3

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 46/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 46 of 50 

System log

The System log contains events logged by Windows system components. For example, the

failure of a driver or other system component to load during startup is recorded in the system log.

The event types logged by system components are predetermined by Windows.

Figure 4.3.4

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 47/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 47 of 50 

If we want to save the application log the producer to save the application event log. First right

click on the application event log and select “Save All Event as” option you will get a dialog

box.

Figure 4.3.4

In this dialog box select the location to save the file and the file format to save.

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 48/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 48 of 50 

If you open the event log you can the details. It’s in text file format 

Figure 4.3.5

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 49/50

 

KOT02/0000802 IDM-HND-ICT S/S_2nd

sem- Supporting NOS &OS Page 49 of 50 

How to open a saved file?

Go to event viewer right click on the event viewer and select “Open saved Log” and select the

location and open the saved file.

Figure 4.3.5

8/3/2019 nos -final

http://slidepdf.com/reader/full/nos-final 50/50