Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Tcp Ip Nt Server - 5,193 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times - true or false? False What is the correct syntax to start a program such as Network Monitor with a low priority start /low nation A local group is located in each computers account database Why would you run Win 16 apps in a separate NTVDMS? To allow a Win 16 app to interoperate with other apps in a separate memory space Will you be able to run Win 16 apps which rely on shared memory to exchange data No If you have multiple Mac subnets attached to multiple Nics and only one subnet can see the server, what is wrong? You need to enable routing in the AppleTalk Protocol config dialog box What files are required for a boot disk on a machine with SCSI drives with their bios enabled NTLDR NTDETECT. COMBOOT.

INI When do you need the NTBOOTDD. SYS file? If your SCSI controller does not have its BIOS enabled? When will the BOOTSECT. DOS file be required? When you need to boot into another OS on your system, such as MS-DOS or Win 95 What is the proper syntax for sending a print job to a TCP/IP printer on a Unix host?

Lpr -S [IP address of Unix Host] -P [Printer Name] [filename] Both S and P are capitalized What is the Directory Replication Service Interval? Interval at which the export computer checks for changes to the replicated directories Do Shares use forward slash or backslash in the pathname? Backslash, same as DOS commands Do Internet names use forward slash or backslash in the path? Forward slash - (as per Unix) What is the first step you should take when one disk in a mirror set fails Break the mirror What is the name of the application which examines memory dump files, extracts info and writes the info to a text log? Dump exam What can you do if you suspect a bottleneck because too many Win 95 clients are trying to access the same policy file?

Use Policy Editor to enable load balancing on the Win 95 clients What two files are required in the Winnt. exe command line in order to setup multiple machines, including applications without physically being at the client computer? UNATTEND. txt and the file name of the. UDF If you have Administrator Services loaded on a Win 95 client can you manage the DHCP Server on your PDC? No - the DHCP service can only be managed locally Which method of licensing is the default when you install a new copy of NT Server 4?

What is the other method? Per Server - other is Per Seat What types of networks is the default licensing option good for Small networks or internet attached machines Why would you switch from the default licensing option? As you add servers, each client would need a separate license for each server they attach to. Per Seat licensing allows the client to connect to as many Servers as necessary? Are Sparc Ultra RISC machines supported by NT Server 4. 0 No Are PA RISC machines supported by NT Server 4. 0 No What does the OSLOADER.

EXE program do? On a RISC machine it replaces the functions of NTLDR, NTDETECT. COM and BOOTSECT. DOS on a PC What do you use to configure IIS? Internet Service Manager Program What TCP/IP protocols are supported by IIS FTP, HTTP and Gopher Is there any user data on the ERD No Which versions or types of Netware servers require that you specify a Default Tree and Context?

Those not using Bindery Emulation - Netware 4. x Which versions or types of Netware servers require that you specify a Preferred Server? Netware 3. x or those using Bindery Emulation What is an NDS tree? Netware equivalent of a Domain What is the default frame type used by NT Server 4. 0 802. 2 Which versions of Netware use 802. 3 frames pre 3. 12 (1 + 2 = 3 " 802. " 3 ") 3. 12 actually uses 802. 2 frame types - industry standard What is the role of a Member Server (stand alone server) database server, communications, resource server etc - do not authenticate users Where do you add display adapter drivers In the Display applet in Control Panel Where do you change the Mouse Pointer Icons? In the Mouse applet in Control Panel What partition are the WinNT files on?

Boot Partition What partition are the boot files on? System Partition How do you convert a FAT partition to an NTFS partition? If it is empty - reformat using Disk Administrator If it has files on it use the CONVERT. exe program from a DOS prompt.

Is Migration Tool for Netware part of GSNW Yes How do you add an NT machine to the domain Add it in Server Manager, then boot it into network What does cacl's. exe do? Command line application to set permissions on a remote share. How do you configure an alert in Performance Monitor to send a message? Check "Send Network Message" and add the correct name to the "Net Name" field. What all can you automatically configure for clients when you are running the DHCP service NetBios Name resolution DNS Server Wins Server IP address What steps are necessary to renew an account which has expired Set a new expiry date in the future (you can also select "newer expires" Where is the best place for a paging file On a partition other than the boot partition - unless you have no choice (eg.

Never put it on a stripe set with parity) What protocols can RAS be configured to use for dial out or dial in TCP/IP, Netbeui, NWLink What protocols can be used with RAS allodial TCP/IP and Netbeui HOME | WIN 2000 | NT 4. 0 | INFO | LINKS | BOARDS | CAREERS | BOOKS | COMPTIA | CONTACT You can't very well use NT until you get it installed, right? In order to install NT, your machine must meet the following requirements: CD-ROM unless this will be a network installation There are a couple of different options for setup. If you are upgrading from an earlier version of NT, then you will use WINNT 32. EXE. If you are upgrading from DOS or Win 95 then you will use WINNT. EXE.

At this point installation will begin and should be pretty self explanatory until you get to the upgrade or fresh install option. If you are upgrading your server from a previous version, then you will probably want to select upgrade as it will preserve your user accts and all directory and share info. This will save you the huge pain in the ass of setting all of this up all over again. Fresh install should be self-explanatory. The next step of note is selecting the partition that NT will install onto. This option will allow you to delete partitions as well, but don't be a dumbass and delete any vital ones.

Next you will be asked how you would like this partition to be formatted. Your options wil be something like: Convert an HPFS/HPFS 386 partition to NTFS (This is for a LAN Manager upgrade only) The differences between the file systems will be discussed later, so read on! Next, setup will run a version of CHKDSK and then you will be prompted to select a directory to install the NT files into. The recommended directory is WINNT. After all of this you will reboot and the more "windows style" set up will begin. The next step of note is to designate whether the machine will be a PDC, BDC or Server.

It is important to select this correctly the first time as you can't go back and change it later. The first NT Server that you install will be a PDC. Microsoft recommends 1 BDC for every 2000 users. More than this can cause unnecessary network traffic. Now who has time to sit with the NT machine for 45 minutes to an hour. That kind of time cuts into cocktail time, which is why Micro$oft provided options for unattended installations.

With a little configuring beforehand, NT will do the whole installation for you and you can take off for drinks with your friends. In order for this to work, you need a "script" known as an answer file that provides instructions to the setup program. This script can be handwritten in a text editor such as notepad or use the utility supplied with NT called Setup Manager. Listed below are the various command switches that can be used during installation. /B Bypasses the creation of startup disks /S Source path. Choose location of a source file - multiple locations will speed up installation. /F Speed up install by not verifying files /U Denotes unattended setup mode and points to an answer file location.

Must use with /s to specify source file location. /T Destination. Specifies installation location of temp files used during installation. /C Bypasses checking for free space when creating boot disks. Can speed up install. /OX Creates the setup disks from CD-ROM or network location. Replaces damaged boot disks. /I Specify an inf file.

Default file is DOSNET. INF. Another installation option is to install over the network which requires that you find a way to point the computer to an I 386 directory somewhere on your network. Here is how it is done. First, you will need to have a shared I 386 directory. Next, you need to make a boot disk from DOS or Win 95 / 98.

Then go to an NT Server and go to Network Client Administrator, which is located in the Administrative Tools section of your start menu. From here you can create a network startup disk. A UPS is designed to protect your servers from power surges and spikes, voltage variations and power outages. Any one of these things can damage data, cause network problems or even destroy your server. NT Server is designed to receive information from the UPS via its serial port and act on it. Here are the messages that it can receive: POWER FAILED: This signal goes from the UPS to the server.

This alerts the server that power has failed and it is now running on battery power. BATTERY LOW: Some UPS will inform the server that it the UPS is running low on battery power. REMOTE UPS SHUTDOWN: If NT detects that it is getting a crappy electrical signal from the UPS it will send a message to it to shutdown and charge itself. While in this state the UPS will continue to forward power to NT, but will not provide any of it's other services. Once the UPS is installed, it can be configured in the UPS control panel. Workstations that have the messenger service installed will receive broadcast messages when the power fails or when it comes back up.

This gives workers a chance to save what they are working and gracefully shutdown. When using NT it is a good idea to use NTFS partitions, at least on the partitions that contain your data. One of the advantages of the FAT file system is the system that DOS uses. On an NTFS partition, you can't boot from a DOS boot disk - this is one of the security features of NTFS.

Additionally, a floppy disk cannot be formatted as NTFS. For this reason it might not be a bad idea to have a small partition formatted FAT so that you can boot into DOS for recovery purposes. FAT partitions can be de fragmented while NTFS cannot. An NTFS partition cannot be converted to FAT without erasing the disk and reformatting. Files moved from a FAT partition to an NTFS partition will retain their filenames and attributes. NTFS partitions provide the following features: Supports upper and lower case letters in names.

Allows permissions to be set on files and directories File and directory names up to 254 characters in length. Ability to access sequential access files over. 5 mb faster. Faster access to all random access files. Long file name conversion to the 8 + 3 convention. Support for Appletalk and the ability to share Mac Volumes. Disk space is used more efficiently.

In order to understand how RAID works it is first best to understand the following concepts regarding hard disk configurations. PARTITIONS -- A partition is a portion of a physical hard disk. A partition can be primary or extended PRIMARY PARTITION -- This is a bootable partition. One primary partition can be made active. EXTENDED PARTITION -- An extended partition is made from the free space on a hard disk and can be broken down into smaller logical drives.

There can only be one of these per hard disk. LOGICAL DRIVE -- These are a primary partition or portions of an extended partition that are assigned a drive letter. VOLUME SET -- This is a disk or part of a disk that is combined with space from the same or another disk to create one larger volume. This volume can be formatted and assigned a drive letter like a logical drive, but can span more than one hard disk. A volume set can be extended without starting over, however to make it smaller, the set must be deleted and re-created.

DISK ADMINISTRATOR -- This utility is found in the administrative tools section of NT 4. This is the tool that controls the configuration of the hard disks on an NT 4 system. You can create partitions, volume sets, logical drives, format disks, etc. -- RAID LEVEL 0 - DISK STRIPING WITHOUT PARITY -- Disk striping will distribute data across 2 - 32 hard disks. This provides the fastest read / write performance as the system can access the data from more than one place.

This level of RAID does not provide any redundancy. This means that if one of the disks fails you lose all of the data and have to delete the stripe set and start over once the bad disk is replaced. System and boot partitions cannot be included in a stripe set. Disk mirroring writes exact copies of data to more than one disk. Each disk or partition of a disk will contain the exact same data.

If one hard disk fails, the data still exists on the other disk. This level of RAID also increases disk read performance as it can pull the data off of both disks. Disk mirroring on NT Server also uses disk duplex ing whereby each disk has it's own disk controller. This provides redundancy in the case of a controller failure.

To recover from a failure, the new drive must be installed and then in Disk Administrator break the mirror and re-establish it. -- RAID LEVEL 5 - DISK STRIPING WITH PARITY -- Very similar to RAID level 0, however, parity information is written to each of the 3 - 32 disks in the array. If one of the disks fails, the data can be reconstructed by installing a working hard disk and using Disk Adminstrator. The parity information will be used to reconstruct the data that was lost when that drunk employee peed in your computer case. If more than one disk fails then you are screwed and will spend your weekend fixing this censored .

RAID 5 offers increased disk read speeds, but slower write speeds because it has to write the parity info. System and boot PARTITIONS cannot be included in a stripe set. To recover from a failure, you must select the regenerate option in Disk Administrator. Ok... Now we " re getting into the meat!

Maybe you have been sitting around with a bunch of computer geek wannabes who are throwing the word registry around in every sentence so that they sound smart and wondered what the hell they are talking about. After this you will be able to do that too. The registry is a big-ass hierarchical database that stores all of NT's settings. It can be accessed by running recent 32. exe or regedit which has a few new features. Below are the 5 subtrees and the information that each controls.

he local machine This subtree contains most of the information that you will use. It holds information about hardware, systems and programs running on the machine. he classes root Stores file associations such as which application should be used to open files based on the extension. It also contains the OLE registration database and also provides redundancy as all of its info is found in the he local machine subtree. he users Holds 2 user profiles. One is a default used for settings when nobody is logged in and the other is for a user that is already known to the system.

he current user This subtree contains the user profile for whoever is currently logged in to the server. he current config Contains information about the hardware configuration that was used during boot. Each subtree contains "keys" and within most of the keys are "subkey's." Once you browse deep enough you will get to the final subkey. When this is opened, the first line you see will be the "value entry." The value entry will contain 3 parts called name, data type (5 types) and value. Most of the registry (the static items) are contained in hive files which are located in 2 places. Machine hive files are located in WINNTSYSTEM 32 CONFIG and user files are located in WINNTPROFILES.

The registry editors will allow you to remotely edit the registry of another computer. The registry can be backed up and restored in the event that mistakes are made. One of the most important tools in NT is the "User Manager for Domains" on the PDC. On non-PDC servers and workstations, it is called "User Manager." The difference is that User Manager creates and maintains accounts that are only applicable for that machine, while User Manager for Domains creates domain accounts that can be used on any machine that participates in the domain. When user accounts are added or edited, changes are made to a SAM file. User Manager for Domains changes the SAM file on the PDC while User Manager changes the SAM file that is local to the machine that it exists on.

When a new acct is created it is assigned a unique Security Identifier (SID). Using user groups is a way to greatly simplify account administration, especially on larger networks. If you place a group of users into a group, you only have to change permissions for the group and it applies to all of the users in the group. There are 2 kinds of groups, global and local. Local groups are "local" to the NT machine. For fun let's say that your company just hired some rod named "Rod." He will be the adminstrator for the network so he will need administrative rights on all 1000 NT workstation and server computers.

He would have to be given administrative rights on all 1000 computers if we were using local groups, which is a whole lot of work and overtime for Rod. That is why NT also has global groups which can only be created on a domain controller. Once this is done, Rod will be seen as the administrator for the whole domain. NT comes with a set of pre-installed local groups listed in the tables below: Administrators Most powerful group so that they can manage the configuration of the domain. Server Operators Have necessary rights to manage domain servers.

Account Operators This group has rights to manage user accounts. Print Operators Responsible for managing printers. Backup Operators Have rights to control backup and restoration functions Users Have minimal rights on the NT servers, but do have some rights on their local workstations. Guests Very limited abilities. No rights on NT server. Replicator Supports directory replication functions.

Administrators log on locally Take ownership of files Access computers from network Create and manage user accts Create and manage global groups Manage auditing and the security log Shutdown or remotely shutdown the system Assign user rights lock system Bypass server lock Format server hard disk Change the time Backup files and directories Keep a local profile Create and remove shares Create common groups Server Operators Log on locally Lock server and bypass lock Change time Format hard drive Shutdown or remotely shutdown the system Backup files and directories Keep a local profile Restore files and directories Create and remove shares Create common groups Account Operators Log on locally Create and manage user accounts, local and global groups Shutdown the system Keep a local profile Print Operators Log on locally Keep a local profile Shutdown the system Create and remove printer shares Backup Operators Log on locally Keep a local profile Shutdown the system Backup files and directories Restore files and directories Users Create and manage local groups (only if user has permissions to log on locally at server or has access to user manager for domains. And now for the global groups. There are 3 global groups which can only be created on a domain controller. Domain Admins By default this group can administer the servers (also from trusted domains) and any NT Workstation logged into the domain. Domain Users By default, this group is a member of the Users local groups for for the domain and NT Workstations in the domain. Domain Guests If given permissions by the domain admin, this group permits guest accounts to access resources across domains.

In order to understand system policies, you need to understand the difference between rights and permissions. Rights give a user or group the ability to perform a certain task, such as the ability to create user accounts. Permissions give access to specific objects like files and directories. Rights are determined by the administrator, whereas permissions are determined by the owner of the object being accessed.

Generally rights carry more weight than permissions. NT allows new groups and users to be created with a customized set of rights. NT allows auditing to be enabled which allows security information to be stored in a security log. The table below should sum it up. File and object access Tracks jobs sent to printers and access to files or directories. Logon and logoff Keeps track of logging on and off activity as well as connections to servers.

Process tracking Tracks the running and quitting of programs. Restart, shutdown and system Self-explanatory Security policy changes Audits any changes made to user rights, trust relationships and the auditing process itself. Use of user rights Displays when a particular right is used. User and group management Notes any alterations of user accounts or groups.

A user profile is a bunch of configuration settings that comprise a users desktop. There are several different ways that these can be configured and each is listed below. LOCAL PROFILE - Each user creates and maintains there own profile. PRECONFIGURED LOCAL PROFILES - Users have local profiles that are partially or entirely preconfigured by the admin. PRECONFIGURED DEFAULT USER PROFILE - Users have local profiles, but admin uses a "template" for new users.

This can be modified by user. ROAMING PROFILES - A path is created to the users profile and is maintained on the server. Users can alter this profile. PRECONFIGURED ROAMING PROFILE - A path is added to users account info and a preconfigured version is stored on the server. NETWORK DEFAULT USER PROFILE - A default user profile that is stored in the net logon shared directory. Users will be able to change this profile.

MANDATORY PROFILE - A path is made to the users profile and a preconfigured profile is copied to that path. The user may not modify this profile. The %systemroot%/profiles directory contains profiles for every user that has ever logged in to the NT box. Each user's profile contains the following folders: Application data, desktop, favorites, personal, sendto and start menu. Any setting that is not a part of the desktop settings is stored in the NTUSER.

DAT file. This file can be altered by editing the registry in the HKEY CURRENT USER subtree. Most changes that you would want to make can also be done in the control panels. Sharing is a bitch in NT so strap yourself down and I will try to explain as best I can. There are 3 ways to create a share: 3) NET SHARE command at a DOS prompt Lets talk about sharing a directory. First of all, NT comes with default shares if the server service is running.

All root directories of partitions, Net logon and CDROM drives have default shares. These shares can only be access by admins. For others to access these resources, a new share must be made by a member of the Administrators or Server Operators groups. A single file cannot be shared under NT, it must be a directory. Share names can be up to 12 characters long, but it is recommended to keep them under 8 as DOS redirector's can't handle anything longer. Spaces are allowed, but if the share name has a space in it you will have to enclose the name in quotations in order to access it.

If you wish to hide a share so that it does not show up on the browse list, all you have to do is add a $ sign at the end of it (eg. isuzu$). If a share is hidden then you can only access it from a DOS prompt or via the map network drive option in explorer. When a share is created, you have the option of specifying permissions (see below) for the share and the maximum number of users that can access it at one time. The NT Resource kit contains a program called "Server Manager" that can be installed on an NT Workstation or Win 9 x computer and will allow you to create shares remotely so you don't have to get off of your lazy ass and walk over to the server. When you create a share, you have the ability to assign permissions to it so that crazy Joe with the wandering eye doesn't get in and start erasing files.

There are 3 of sets share-level permissions: When assigning permissions to a share, the users and or group / s that are given access to a share is defined by the "access control list" or ACL. For example, lets say that you have a company called Smack City... You can assign a certain level of permission to the Processing group such as read only and full control to the refining group. Or you can specify by user or both groups and users. It is very flexible and can also be very complicated. Here are the different types of share-level permission.

No access Can't get in or access at all Read View files and subdirectories. Execute applications. No changes can be made. Change Includes read permissions and the ability to add, delete or change files or subdirectories Full Control Includes change permissions and the ability to change permissions (NTFS only) and take ownership (NTFS only) If you are a member of multiple groups and different permissions are assigned to each group, your permissions will be for whichever group gives you the greater permissions unless one of your groups is given no access.

No access would override any other permissions for any other group of which you are a member. Lets say you have an NT workstation with 3 users that share it. NT will allow you to create shares that permissions can be assigned to the other users of the same workstation to prevent or limit their ability to access the other users' files or directories. This type of security occurs at the local file system. File and directory permissions apply to NTFS permissions only.

The following permissions can be applied to directories: The following permissions can be applied to files: No access Directory: Can't view or change directory or directory permissions. File: Can't view or change file or file permissions. Read Directory: Users can view files and their attributes inside directories. User can browse through directory. File: Users can open or execute the file and view the file's attributes and and permissions. Add Directory: Can add files to a directory but can't access files put into that directory.

File: N/A Add and read Directory: Users can open / execute and add files in the directory. Can't change or delete files File: When a directory is Add and read, the files in that directory are read only. Add and read cannot be applied directly to files. List Directory: User can view files and view file and directory permissions. Can open / execute files.

File: N/A Change Directory: Able to make new files and directories, change or delete files, open / execute files. Can't change permissions. File: View, change and delete files. Can't change permissions. Full Control Directory: All of the permissions included with change and the ability to change permissions and take ownership of files. File: Same as change permissions, but can also change permissions and take ownership of files.

Special access Directory and file: Create custom permissions using NT's 6 basic permissions which are read, write, execute, take ownership, change permissions and delete. In order to access data over the network, you must have share-level and file and directory-level permissions. Share-level and file and directory-level permissions can be used in conjunction with each other. NOTE: New files will take on the permissions of the directory that they are created in by default. Files have owners who have administrative rights to a particular object. This permission is not stored in an ACL file and is typically given to the creator of that object.

NT includes this feature so that users can administer their own machines and supply resources for their own stuff. An admin would be dirty pissed if he / she had to make every little change for a user because they didn't have permission to. So, when a user creates an new file, for example, they are the owner of that file and can do whatever the hell they want with it. Now let's say that you are the admin at a company and you want to find out why Billy the slacker is getting no work done. You access his hard drive and you find a folder called "nudie pics" and you try to open it and get denied. You can then take ownership of the file and then add yourself to the ACL as you have administrative permission to do so.

You then kick Billy's ass out and say to yourself, "Ahhh, its good to be the king!" This section will discuss network printing and the like. This section hits close to home as I used to do tech-support for a printer manufacturer. I would like to first make a pl...


Free research essays on topics related to: files, hard disk, nt server, tcp ip, file

Research essay sample on Tcp Ip Nt Server

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com