490 likes | 603 Views
Server Hardware and OS; Clients. CSC 363 18 February, 1999. Announcements. Group Projects---how’s it going?. Server Hardware-Speed is King. Processor Disk Memory NIC. Processors. Single-vs. dual/multi processors MgHz, Paging and other specs. Processors, cont. RISC vs. Wintel. Disk.
E N D
Server Hardware and OS; Clients CSC 363 18 February, 1999
Announcements • Group Projects---how’s it going?
Server Hardware-Speed is King • Processor • Disk • Memory • NIC
Processors • Single-vs. dual/multi processors • MgHz, Paging and other specs
Processors, cont. • RISC vs. Wintel
Disk • Seek time • Access time • RPMs • Partitioning
Disk Management • RAID Arrays • Striping • Mirroring • Backups
Memory • How much • What kind
NICs • When speed counts • Selecting
Problem: • You are planning a network for a medical practice that doesn’t have many client computers to support, but that stores very large graphical files, such as MRI and X-ray images, on their server. Which hardware component will require more than average capacity?
NOS • Common NOSs • Windows NT • Novell NetWare • OS/2--/Warp • UNIX • LANtastic! • Banyon-Vines
Server Software • User account management (profiles) • Security • Central Licensing • Data Protection • Multitasking and Multiprocessing.
User Profiles • NT stores the profile information for each user - Winnt\Profiles - including: • Network drive mappings • NT Domains/Printers • All icons on the desktop • Contents of all menus reachable from the Start button • names of recently opened files • Desktop color scheme and configuration
Types of Profiles • Local Profile • stored on client machine and used when logged onto that machine • Roaming Profile • stored on a server and downloaded to local machine when user logs on to server
NT System Security • NT is Object Oriented • Each user, group, file, etc. is an object • Each user, and group is assigned a uniqueSecurity Identifier (SID) 32 bit random character • All objects have a security descriptor containing:
NT System Security • SID of the owner of the object • Discretionary ACL controlled by owner • System ACL controlled by Administrator • Access Control List (ACL) is associated with each object, indicating what rights other objects have to this object
NT System Security • NT associates a security Access Token for each running process. • Token determines what access rights the process has. • Token contains • SID of the user executing the process • SIDs of all groups user belongs to • Possibly SIDs of other (more privileged) users is the process is designed for impersonation
Account Access Token • The NT key card • Contains important information about the user, SID (security ID - 32 bit unique #) • Username, encrypted password, group memberships, profile location, home directory, logon hours, etc. • Could be local or domain (they don’t cross)
Access to the Server • Domain • Collection of computers and related resources • At least 1 NT server • No geographical limits • First NT server is established as the PDC at install • Others will be either BDC or Server • PDC holds the database of resource information
Multitasking • Multi-CPU • Single-CPU • Time-Slicing=> • Pre-emptive Multitasking=> • Cooperative Multitasking=>
Client Characteristics • Drive designations/mapping • Requesters (Novell) • Redirector (Microsoft/IBM)
Peripherals • Print requests • Peripheral Ports
Installing NT Server • Hardware Compatability List (HCL) • Server Naming • NetBIOS Names • 15 characters max length • Planning naming conventions • Domain name for server-based network • Workgroup name for Win95 network
Domains in NT • Domain Controllers • Primary Domain Controllers (PDC) • Backup Domain Controllers (BDC)
Domains • Objects • Computers • Servers - running NT Server • Workstations - clients • Users - people with access rights in the domain • Groups - administrative collective of users • used to categorize and simplify the management of users • Can be local or global • Printers
Problem • You must install 200 computers in a new network for your new company headquarters. There will be 3 physical LANs there, reflecting the divisions of Acquisitions, Financing, and Operations. All LANs will be connected and each will have its own server and approximately 1/3 of the client computers. Each will have its own set of printers and you expect each will grow in (servers and clients) in the coming years. You also expect to add another LAN for Financing sometime in the near future. Implement a NetBIOS naming scheme for this network.
Domain Database • User account is basis of security • Rights are set using the User Manager tool (either local or for the Domain) • Can set a Policy which creates a “template” for all users created after it
NT Network Configuration • Server can only hold a single database • Server can only be PDC OR BDC • Database can be partitioned • Server can still only hold one partition 9
Configuring the NIC • Protocol Determination • TCP/IP • IPX • NetBEUI
TCP/IP Installation • IP Address: • Subnet masks: • Default Gateways • Auto vs. manual config:
Problem • You are installing the first server for your company. Which server role is most appropriate for this server?
Problem • You are installing a server for a small recycling business. After interviewing the customer, you determine that the network will most likely never grow beyond a single server; that Internet access is not required, and that the company does not want to pay for network administration once the network is installed. Which transport protocol is most appropriate?
Problem • You are designing a network for a computer software design group with many offices around the country. They tell you they would like to connect the servers in their various offices using the Internet. Which transport protocol is most appropriate?
Problem • When one of the users on your network prints to the central laser printer, nothing but strange characters appear. The printer works fine for everyone else. • What is wrong? • How can you fix it?
Sharing Output Devices • Print Drivers • Sharing Printers • Fax Modems
Messaging/E-Mail • Clients • Servers • Protocols • POP • SMTP • IMAP • MAPI • X.400/X.500
GroupWare • Calendaring • Scheduling • Messaging • Document and Application Sharing • Revision tracking
Shared Network Applications • Licensing advantages • Maintenance advantages
NIC connections cable mismatch cable poor connection duplicate IP address jumper settings IRQ and Port problems Troubleshooting Client Connections
Bus interrupts disconnection of a PC damage to cable faulty connection exceeded maximum segment length 10Base2 Problems
Set all devices to use the same frame type Set frame types manually Ethernet_802.2=>recommended by MS and Novell Ethernet_802.3 Ethernet_SNAP Ethernet_II Frame Types
Time-domain reflectometer=>indicates what and where cable problems have occurred Cable Testing
ResourcesFix Your Own LAN Other Problems