Windows NT 4.0 Server and Enterprise Exam Notes
70-67
70-68
Module 1 The Windows NT 4.0 Environment. *
Q. Identify the primary features of Windows 95 ? *
Q. Identify the primary features of Windows NT 4.0 Workstation? *
Q. Describe the major differences between Windows 95 and Windows NT 4.0 Workstation? *
Q. Identity the primary features if Windows NT Server ? *
Q. Describe the major differences between Windows NT Workstation and Windows NT Server? *
Q. Identify the differences between USER MODE and KERNAL MODE. *
Q. Define the Windows NT Executive component of the Windows NT architecture. *
Q. Identify the differences between the Windows NT memory model and MS-DOS memory model. *
Q. Identify the Advantages & Disadvantages of the DOMAIN Model? *
Q. Identify the Advantages & Disadvantages of the WORKGROUP Model? *
Q. Identify the logging onto a computer process? *
Q. Identify the logging onto a DOMAIN process? *
Q. Identify the creating a Computer account process ? *
Module 2 Installing Windows NT *
R. Identify the Minimum Hardware requirements for installing Windows NT Workstation and Windows NT server on Supported Platforms. *
Q. Identify the procedure for upgrading from Microsoft Windows 95 to Windows NT 4.0? *
Q. Identify a suitable partitioning scheme for a computer running Windows NT. *
Q. Select the appropriate file systems to use for a Windows NT Installation. *
Q. Identify the role of a computer running Windows NT server will play within its Workgroup or Domain? *
Q. Identify factors that affect domain structure. *
Q. Choose the correct licensing mode for a computer running Windows NT Server. *
Q. Create a distribution server for the Windows NT installation files. *
Q. Install Windows NT on an Intel x86 based computer from a server, by using WINNT.EXE. *
Q. Prepare a Unattended installation. *
Q. What are the Options for upgrading to Windows NT 4.0 *
Q. How do I upgrade from multiple servers *
Q. What are Initial Parameter Files? *
Q. Explain OEM Setup tools *
Q. How would you remove Windows NT? *
Module 3 Configuring the Windows NT Environment. *
Q. Describe the Purpose of the Windows NT Registry? *
Q. What are the Registry Subtree? *
Q. How do you configure Virtual Memory? *
Module 4- Managing System Polices *
Q. Describe User & Hardware profiles and System policies. *
Q. How do you implement ROAMING PROFILES. *
Q. How do you create MANDATORY USER PROFILES? *
Q. What can be controlled by the SYSTEM POLICY EDITOR? *
Q. What are the User-defined settings saved by User Profiles. *
Q. What are the USER and GROUP Policy options? *
Q. What parts of the Registry do they handle? *
Q. Define the functions & scope of system polices. *
Q. Describe how System Polices work? *
Q. Describe how a User and Computer policy is implemented when a user logs on to a domain. *
Q. Describe how a User and Computer Policy is implemented on Non Domain Controller. *
Q. Identify the features of System Policy Editor. *
Q. Describe how to use System Policy to Secure a computer. *
Identify Troubleshooting. *
Q. Downloading policies too slow. *
Q. Polices load for Windows 95 but not NT. *
Q. Wallpaper does not appear on all NT machines. *
Module 5- Managing File Systems *
Q. Describe the feature of the FAT file system. *
Q. Describe the feature of the NTFS file system. *
Q. Identify important considerations in NTFS implementation. *
Q. How do you Convert FAT to NTFS? *
Q. Compress and uncompress files and folders by using Windows NT Explorer or the compact command. *
Q. Describe the effects that copying and moving files has on the compression attributes of the files. *
Module 6- Managing Partitions *
Q. Explain the difference between PRIMARY & EXTENDED Partitions. *
Q. Explain the Benefits and disadvantages of a Volume Set? *
Q. What are the guidelines for Managing Volume Sets? *
Q. Explain the Benefits and disadvantages of a Stripe Set? *
Q. What are the guidelines for Managing Stripe Sets? *
Q. Describe hardware-related issues that affect Windows NT when adding additional hard disks. *
Module 7 - Managing Fault Tolerance *
Q. Identify relevant RAID levels and features. *
Q. Describe the disk mirroring function of RAID 1 *
Q. What is the name of the driver that makes sure 2 drives are mirrored? *
Q. Describe the disk striping function of RAID 5 *
Q. What do you have to do in DISK ADMINISTRTOR after making changes? *
Q. Compare the features of RAID1 with features of RAID 5. *
Q. Recover a member of a Stripe Set with parity failure. *
Q. Recover a member of a Mirror Set failure *
Q. Creating a fault Tolerance Boot Disk *
Q. Describe how Advanced RISC computing (ARC) paths identify partitions. *
Q. Which RAID levels are supported through NT SERVER software. *
Module 8 Supporting Applications *
Q. Identify the subsystems that support applications under Windows NT *
Q. Describe how Windows NT supports Win-32 based applications. *
Q. Describe the components of an NTVDM (NT Virtual Dos Machine) *
Q. Describe the components of the WOW (Windows on Windows) Environment *
Q. Identify the advantages and disadvantages or running Win16 applications in Multiple NTVDMs. *
Q. Explain the function and purpose of DCOM (Distributed Component Object Model) *
Q. Prioritize applications running under Windows NT *
Module 9 The Windows NT Networking Environment *
Q. Describe the Components that make up the Windows NT Network architecture *
Q. Define the function of Network Driver Interface Specification (NDIS) compatible network adapter card drivers. *
Q. Explain the function of NDIS 4.0. *
Q. Identify the protocols included in Windows NT. *
Q. Explain the function of the TDI (Transport Driver Interface)? *
Q. Identify the file system drivers included in Windows NT *
Q. Explain the function of Distributed Applications. *
Q. Explain the IPC (Interprocess Communications Mechanisms) mechanisms that enable client/server connections *
Q. Identify the Windows NT file and print sharing components supported by Windows NT. *
Q. Describe how a computer running Windows NT can access file and Print resources shared on a network. *
Module 10 Configuring Windows NT Protocols *
Q. What is TCP/IP? *
Q. What is the OSI Network Model? *
Q. What API can the Microsoft TCP/IP suite use to access the Transport Layer? *
Q. Define the purpose and function of Microsoft TCP/IP. *
Q. Identify the components of the Microsoft TCP/IP protocol suite. *
Q. What are the TCP/IP Diagnostic Utilities? *
R. Configure TCP/IP Manually *
Q. Test the TCP/IP configuration, and then validate the connections to other computers. *
Q. What is NWLink IPX/SPX Compatible Transport? *
Q. What is needed on a NT Server to talk to a NetWare server? *
Q. Describe the features of the NWLink IPX/SPX compatible transport. *
Module 11 Windows NT Network Services. *
Q. Installing Network Services, What are they? *
Q. Explain the function of DHCP? *
Q. Describe the differences between manual IP address configuration and automatic configuration by using DHCP. *
Q. How does Microsoft TCP/IP minimise problems resulting from duplication. *
Q. List the requirements for using DHCP *
Q. Explain how DHCP assigns an IP address? *
Q. Creating and configuring a SCOPE. *
Q. Identify other DHCP options. *
Q. Explain the function of WINS (Windows Internet Name Service) *
Q. Explain how NetBIOS name registration Works. *
Q. What is a LMHOSTS File? *
Q. WINS as an Alternative to LMHOSTS files? *
Q. How can the DHCP and WINS server be used in companion? *
Q. Explain the WINS Server database? *
Q. List the requirements for using WINS *
Q. Describe the purpose of the DNS Server service? *
Q. Explain the advantages of integrating WINS and DNS *
Q. Identify the roles a computer running Windows NT can perform in the browser process. *
Q. Explain How the Windows NT browser services locates available servers on the network. *
Q. Describe how the browser election process ensures continuos browser service. *
Q. How is browsing done within an Enterprise Network? *
Q. How are Browser failures handled? *
Module 12- Remote Access Service *
Q. Describe RAS and Dial-Up networking? *
Q. Explain WAN support in RAS *
Q. Explain PPTP? *
Q. What are the Advantages of PPTP? *
Q. Identify the remote access protocols of RAS *
Q. What is PPP Multilink Protocol. *
Q. Explain the function of the NetBIOS gateway and routers *
Q. Explain the security features of RAS *
Q. Describe the functions of TAPI *
Q. Identify TAPI settings. *
Q. Installing and configuring RAS *
Q. Configuring a RAS Server *
Q. Configuring Protocols on the Server *
Q. Configuring a RAS Server to Use NetBEUI. *
Q. Configuring a RAS Server to use TCP/IP *
Q. Configuring a RAS Server to use IPX *
Q. Install Dial-Up networking *
Q. Configuring Phonebook Entries *
Q. Use Dial-Up Networking to log on to a Windows NT domain. *
Q. User profiles with Dial-Up networking. *
Q. Explain the AutoDial feature? *
Q. Troubleshooting RAS *
Module 13 Internetworking and Intranetworking *
Q. Explain the functions of IIS (Internet Information Server) and PWS (Peer Web Services)? *
Q. Describe the features of IIS and PWS? *
Q. Explain how to secure Internet and Intranet Sites? *
Q. How do configure Virtual Directories and Virtual Servers. *
Q. How do you Create a Virtual Server? *
Guidelines for securing an Internet/Intranet site. *
Module 14 Interoperability with Novell NetWare *
Q. Explain the function of CSNW (Client Services For NetWare) *
Q. Explain the function of GSNW (Gateway Services for NetWare) *
Q. When would you use GSNW? *
Q. What are the benefits of using GSNW? *
Q. How do you install GSNW? *
Q. How do you enable the Gateway *
Q. Explain the function of FPNW (File and Print Services for NetWare)? *
Q. What is the connection with FPNW and Migration tool for NetWare? *
Q. Explain the function of DSMN (Directory Service Manager for NetWare) *
Q. Describe the Migration Tool for NetWare? *
Q. What Items can be Migrated *
Q. What Items can not be Migrated *
Q. What are the configuration User options for Migration *
Q. By default which files and directories are not migrated *
Q. What are the options for logging errors. *
Module 15 Implementing Network Clients *
Q. Describe a CAL (Client Access License)? *
Q. What are the Types of Client Connections? *
Q. Describe the Per Server and Per Seat licensing modes? *
Q. Describe License Replication? *
Q. Describe the role of License Manager? *
Client S/W Included with Windows NT Server *
Q. Explain how Microsoft Network Client 3.0 for MS-DOS and Windows supports network clients running MS-DOS. *
Q. Identify the protocols included with the LAN Manager 2.2c Client *
Q. Describe how to use Network Client Administrator to install and update network clients *
Q. What configurations are needed for a Network Startup disk *
Q. Identify the benefits provided by Services for Macintosh *
Q. Identify the requirements for running Services for Macintosh in a Windows NT Server environment. *
Q. Installing Services for Macintosh *
Module 16 Implementing Directory Replication *
Q. Describe the purpose of Directory Replication? *
Q. Identify the directory replication components? *
Q. Outline the Directory replication process? *
Module 17 The Windows NT Boot Process *
Q. Identify the files that are necessary to boot Windows NT? *
Q. Identify common Windows NT boot process errors. *
Q. Explain the function of the BOOT.INI *
Q. Creating a Windows NT boot disk *
Q. Creating an Emergency Repair disk. *
Q. How do you use the Repair disk? *
Q. What can be repaired with the Repair disk? *
Q. You receive a call from a user who tells you that he forgot the Administrators password and used the Emergency Repair disk to restore it. Now no one else can log on to the system. *
Module 18 Troubleshooting Resources. *
Q. What are the four main areas of NT Troubleshooting? *
Q. Identify and use the diagnostic tools available with Windows NT. *
Q. Describe the contents and options of Event Viewer? *
Q. Use log files to analyse system information. *
Q. Interpret events using Event Details. *
Q. View system information through Windows NT Diagnostics *
Q. Describe the use of Performance Monitor to troubleshoot performance related problems *
Identifying Bottlenecks with Performance Monitor. *
Memory *
CPU *
Disk Access *
Network Access *
Q. How do you find memory Bottlenecks? *
Q. What are Views available through Performance Monitor? *
Q. How can you Optimise NT Server? *
Q. Explain Task Manager? *
Q. Describe the use of Network Monitor to troubleshoot network-related problems *
Q. What can Network Monitor Capture with the version supplied with NT4? *
Q. What does promiscuous mode mean you slapper? *
Q. How do you capture data using NM? *
Q. What are the 4 main sections that are on view? *
Q. What is the default path where the Data is stored? *
Q. How does Network Monitor use passwords? *
Q. How can you Check if someone else is Also using Network Monitor? *
Q. What information does the NM detection process give? *
Q. Use System recovery to capture information generated by Stop errors. *
Q. What is the Repair process for restoring missing/corrupt boot files? *
Q. What do you do if you have PPP problems (RAS)? *
Q. What File and resource Access problems might you encounter *
Q. How do you backup the Registry? *
Q. What does Advanced Resolution Include? *
Q. What are the additional resources for troubleshooting? *
Module 1 The Windows NT 4.0 Environment.
This memory id protected, applications cannot directly access the memory of the Kernel mode services. The System may crash if it did!!!
A.
Q. Identify the differences between the Windows NT memory model and MS-DOS memory model.
A. NT model uses demand paging (pagefile.sys). The memory architecture for Windows NT is a demand-paged, virtual memory system. It is based on a flat, linear 32-bit address space, which allows each process in Windows NT to have access to up to 4 GB of memory
Q. Identify the Advantages & Disadvantages of the DOMAIN Model?
A. Centralised account and security information Requires at least one PDC
Q. Identify the Advantages & Disadvantages of the WORKGROUP Model?
A.
|
Advantages |
Disadvantages |
|
Does not require PDC |
No centralised account management |
|
Simple design and implementation |
Inefficient for networks that have many computers |
|
Convenient for a small network close together and on the same Subnet. |
Limited centralised administration control. |
A.
A.
A.
Module 2 Installing Windows NT
A.
|
NT Workstation 4.0 |
NT Server 4.0 |
|
486/33 |
486/33 |
|
12MB RAM |
16MB RAM |
|
110 MB |
125 MB |
A. UPGRADING is not possible for Windows 95.
A. System Partition Files needed to start the computer NTLDR etc
Boot Partition All system files.
Q. Select the appropriate file systems to use for a Windows NT Installation.
A.
|
FAT |
NTFS |
|
For Dual booting to MS-DOS |
NT only operating System. |
|
|
Primary Domain Controller |
|
|
Backup domain Controller |
|
|
Member Server |
|
A.
A.
|
Per Server |
Per Seat |
|
No of connections to the server |
Each client has a license |
A. Winnt.exe (with no arguments) does the following, creates 3 setup disks, copies the installation files to a directory on the c:\ called $WIN_NT$.~LS.
/x Does not create the setup floppies
/ox Creates only the disks. Can be used for CDROM installation or for REPAIR
/b floppyless installation.
Q. Prepare a Unattended installation.
A. The use of Answer files (UNATTEND.TXT) and UDFs (Uniqueness database files).
WINNT /U:answer_filename /UDF:ID[,database_filename]
Q. How do I upgrade from multiple servers
A. This is the use of SYSDIFF utility
Module 3 Configuring the Windows NT Environment.
Q. Describe the Purpose of the Windows NT Registry?
A. The registry is a unified database in which Windows NT stores all Hardware and Software configuration information for the local computer.
Q. What are the Registry Subtree?
A.
|
HKEY_LOCAL_MACHINE |
Configuration data about the local machine The User profiles and Policies merges data into these keys. |
|
HKEY_USERS |
Contains system default settings |
|
HKEY_CURRENT_USER |
Details about the current logged on user The User profiles and Policies merges data into these keys. |
|
HKEY_CLASSES_ROOT |
Contains software configuration data |
|
HKEY_CURRENT_CONFIG |
Contain data about the active hardware profile. |
Module 4- Managing System Polices
Q. Describe User & Hardware profiles and System policies.
A.
Q. How do you create MANDATORY USER PROFILES?
A. These are like "READ ONLY" profiles and cannot be changed. Change the extension of NTUSER.DAT to NTUSER.MAN
Q. What can be controlled by the SYSTEM POLICY EDITOR?
A.
A.
|
Window NT Explorer |
Mapped drives, types of files displayed |
|
Control Panel |
Screen appearance, mouse, keyboard |
|
Printer Settings |
Network Printer connections |
|
Taskbar |
|
|
Accessories |
Clock, Calculator and Notepad |
|
Window NT-based Applications |
application settings |
A.
|
Control Panel |
display settings, hiding screen saver and Appearance tabs |
|
Desktop |
Wallpaper and colour scheme |
|
Shell |
Hide Network Neighbourhood, |
|
System |
Disable registry editing tools, and run allowed windows programs |
|
Windows NT Shell |
|
|
Windows NT SYSTEM |
Q. What parts of the Registry do they handle?
HKEY_LOCAL_MACHINE configuration of the computer
A.
By default when a user logs on the computer looks for a policy file, NTCONFIG.POL, in the shared directory called NETLOGN. This file usually is stored here so that the replication process can replicate to all domain controllers.
NOTE : For a Windows 95 machine, the policy would be called CONFIG.POL and a Windows 95 template would be needed to create this file, you can still use the POLICY EDITOR from a Windows NT machine.
Q. Describe how a User and Computer Policy is implemented on Non Domain Controller.
A. The NTCONFIG.POL can be moved to any location on the machine. But the COMPUTER policy needs to be told where to look.
Change from "Automatic Remote Update" to "Manual Remote Update" and specify the path for NTCONFIG.POL. This is done via the Policy Editor
Q. Downloading policies too slow.
Q. Polices load for Windows 95 but not NT.
Q. Wallpaper does not appear on all NT machines.
NOTE The Administrators can implement System Polices
Module 5- Managing File Systems
Q. Describe the feature of the FAT file system.
Q. Identify important considerations in NTFS implementation.
Q. How do you Convert FAT to NTFS?
A. Use the CONVERT.EXE drive: /fs:ntfs command. You may be prompted to wait till the machine is rebooted. No data is lost or destroyed and is a one way process.
Q. Compress and uncompress files and folders by using Windows NT Explorer or the compact command.
A. There are 2 ways to do this
Compressed files can be seen in a different colour in Explorer.
Files that are open cannot be compressed.
A.
E.g. We have 2 disks 0 & 1 , 0 has 100MB free and 1 has 50MB free (All unformatted), these can be combined to make a logical disk of 150MB and call it say the next free logical letter (F:). This is a volume set.
This increases disk space available but does not increase performance.
VSs are created by combining from 2 to 32 areas of unformatted free space on one or more physical drives.
When 1 member of the set is filled up, the data is then written on the next member of the volume set and so on.
There is no FAULT TOLERENCE.!
The Stripe set will be 150MB 50 from Disk 0, 1,and 2.
A.
A.
Removable media can only have 1 partition which must be the primary. It cannot be part of a Volume Set or Stripe Set. To change the disk Windows NT has to be shut down and restarted.
Module 7 - Managing Fault Tolerance
DISK DUPLEXING is the same but using 2 DISK CONTOLLERS, in case one goes down.
Q. What is the name of the driver that makes sure 2 drives are mirrored?
A. FTDISK.SYS
DISK USAGE IS 25%. (IF USING 4 DISKS)
BOOT and SYSTEM partitions cannot be part of the Stripe set with Parity
A. "Commit Changes now"
Q. Compare the features of RAID1 with features of RAID 5.
A.
|
Mirror Sets (RAID 1) |
Striping W/P (RAID 5) |
|
Supports FAT and NTFS |
Supports FAT and NTFS |
|
Can Mirror BOOT & SYSTEM partition |
Cannot Stripe BOOT & SYSTEM partition |
|
Requires 2 Hard disks |
Requires minimum of 3 Hard disks |
|
50% Utilisation |
Lower cost per MB |
|
Good READ/WRITE performance |
Excellent READ performance Moderate WRITE performance |
|
Uses Less system memory |
Require more system memory for parity calculation |
|
Supports as many as 32 hard disks |
A mirror can also be broken to reclaim disk space.
Q. Creating a fault Tolerance Boot Disk
A. Format a floppy within Windows NT
Copy the following files
e.g. Multi(0)disk(0)rdisk(1)partition(2)
rdisk(0) rdisk(1)
Partition (1) C: D: Partition(1)
Partition(2) F: G: Partition(2)
Server
Multi/Scsi - SCSI indicates scsi controller on which SCSI BIOS is not enabled.
Disk(y) - scsi bus number. For multi, this value is always 0.
Rdisk(z) - Ordinal number of the disk (ignored for scsi controllers)
Partition(a) - Ordinal number of the partition (ALWAYS STARTS @ 1)
A.
Module 8 Supporting Applications
Environment Subsystem This is an intermediary that translates instructions from the application (this application may be designed for another operating system, say OS/2 & POSIX) into a form that the Executive Services can understand.
The Win32 Subsystem Supports MS-DOS and Windows 3.1x application before passed to the Executive services
Executive Services Resides in the Kernel mode. No application or subsystem can directly access the Executive services. If an application/subsystem hangs then it does not also hang a kernel mode component. It is protected.
Reliability Each apps runs in its own 2GB address space. Therefore it cannot corrupt the space of another Win32 application.
OLE/ActiveX Allows objects to communicate with each other. Linking and embedding
ActiveX is geared more towards the internet.
OpenGL Software interface for producing 2 dimensional & 3 dimensional graphics.
DirectX Low level APIs designed for high performance application such as games.
MS-DOS Virtual device Drivers. - MS-DOS applications run in the User mode and cannot access the hardware directly. Therefore they use (Virtual device Drivers) VDD, these are transparent to the application
Advantages
Reliability - Failed Win16 will not affect others
Interoperability - They can interoperate with other Win16 applications
Preemptive multitasking - keeps all the applications going even if one is busy.
Multiprocessing - On multiple processor machine they can take advantage of the multiple processors. Otherwise if they are sharing the NTVDM it looks like 1 application to the system.
Disadvantages
Additional memory usage.
Lack of interoperability Only if they do not follow the OLE & DDE specifications.
Start /realtime application_executable
Start /high "
Start /normal "
Start /low "
Module 9 The Windows NT Networking Environment
A.
Q. Explain the function of NDIS 4.0.
A.
TDI is a boundary layer that provides an interface between the File system drivers
Server Service (server)
To communicate to the transport protocols (TCP/IP etc)
Redirectors Servers
-----------------TDI-------------------
TCP/IP NWLink NetBEUI . . . . . .
Redirectors If the I/O request is for a network resource, A REDIRECTOR accepts it and send it to the appropriate network Resource.
Servers The server service supplies the connections requested by client-side redirectors and provides these redirectors with access to the requested resource. If the Server service is not running, shared folders and printer are no longer accessible.
Each NT machine has redirectors and Servers.
Named pipes - .e.g. the WINLOGON Process
Mailshots e.g. The Browser service
Windows Sockets (WinSOCK)
RPCs
Network dynamic data exchange (NetDDE) e.g. Chat
Distributed Component Object Model (DCOM) LEWIS
A.
A.
Module 10 Configuring Windows NT Protocols
Application user interface to network services such as file transfer.
Presentation Syntax or representation of data to be transferred between 2 application-layer protocols
Session used to synchronies data
Transport Provide Reliable message delivery services
Network Routes packets across the Internetwork
Data Link Info to route the packets to the correct host
Physical Physical connection to the Network
People Dont Need To See Paula Abdul.
|
OSI Model |
TCP/IP Core Transport protocols |
|
Transport |
TCP UDP (connection-orientated service) (Connectionless service) |
|
Network |
ICMP ARP (provide Error Message) IP (Maps IP address to MAC Addresses) |
TCP connection-orientated, reliable service (Like making a Telephone call)
UDP Connectionless Datagram service and provides no inbuilt reliability.
The choice for programmers to choose depend on reliability and speed. TCP is reliable (for Domain Logins) but UDP is faster (for Domain broadcasts)
IP Used to route packets across the Internetwork. IP works by determining the source and destination network addresses. If your packet requires reliable services, IP should be used in conjunction with TCP.
NOTE : A common analogy for TCP and IP is that TCP provides connection-orientated services like a telephone connection and IP provides connectionless service like the Post office.
ARP Maps IP address to the Media Access Control (MAC) address.
ICMP Used to detect errors in IP transmission. If IP encounters a problem then ICMP is used to provide some sort of error message (like the PING utility)
A.
Q. Define the purpose and function of Microsoft TCP/IP.
A.
Q. Identify the components of the Microsoft TCP/IP protocol suite.
A.
Simple Network management protocol (SNMP)
Windows Sockets (WinSOCK) 2 way interface, uses IP addresses
NetBIOS over TCP/IP (NetBT) Applications that use NetBIOS names
User Datagram protocol (UDP) a connectionless protocol used for Datagram, i.e. postoffice
Internet Protocol (IP) used to route packets across a internetwork.
Address Resolution Protocol (ARP) maps IP addresses to MAC addresses of a NIC
A.
A.
|
IP Address |
A logical 32-bit address used to identify a TCP/IP host. Each address has two parts: a network ID & a host ID. The network ID identifies all hosts on the physical network. The Host ID identifies a host on the network. .i.e. 131.107.2.200 Network ID 131.107 Host ID 2.200 |
|
Subnet Mask |
A Subnet is a network in a multiple network environment that uses IP addresses derived from a single network ID. Subnets allow an organization to divide a large network into multiple physical networks, and to connect them with routers. A Subnet mask blocks out part of the IP address, so that TCP/IP can distinguish the network ID from the host ID. When TCP/IP hosts try to communicate, the Subnet mask determines whether the destination host is on a local or remote network. To communicate on a network, computers must have the same Subnet mask.
|
|
Default Gateway |
For communication with a host on another network, an IP address should be configured for the default gateway. TCP/IP sends packets for remote networks to default gateway if no other route is configured. |
A, ONLY NWLink IPX/SPX Compatible Transport protocol. (If other resource services are required then install CSNW, GSNW or FPNW)
Q. Describe the features of the NWLink IPX/SPX compatible transport.
A.
|
Windows Sockets (WinSOCK) |
Supports existing NetWare Applications written to comply with the NetWare IPX.SPX Sockets interface.
|
|
NetBIOS over IPX |
Implemented as NWLink NetBIOS, supports communication between a NetWare client running NetBIOS, and a computer running Windows NT and NWLink NetBIOS. |
Frame types It is necessary to configure NWLink with the same frame type as the one used by the NetWare Servers.
Network Numbers An IPX number must be assigned for each frame type configured on each network card adapter
i.e. Harwell 00000444
Internal Network Number NT uses an internal number to uniquely identify the computer on the network for internal routing
The Frame Type and Internal Network Number are the only things that need to be configured on a NT Server.
Routing Information Protocol - By using RIP over IPX, a computer running Windows NT Server can act as an IPX router. A RIP router is a computer or other type of hardware that broadcasts routing information, such as network addresses. As a router becomes aware of any change in the internetwork layout for example, a router that is offline it broadcasts the information to neighboring routers.
Module 11 Windows NT Network Services.
A.
Manual too much administration
Entering incorrect Subnet mask/gateway
Admin overhead, computers moving form Subnet to Subnet.
Automatic DHCP
Client gets valid IP address
Configuration info is correct for all clients.
Q. List the requirements for using DHCP
A.
Server
Client
Requests - Initialises a limited TCP/IP, enough to get an IP address
Offers - All DHCP servers send an offer to the client
Selection - Selects form the 1st offer it receives
Acknowledgement - The DHCP responds to the message all other DHCP servers withdraw their offers
DHCP can be used to set other options for clients.
List of IP addresses for name servers for the client 006 DNS Servers
List of IP addresses for NetBIOS name servers 044 WINS/NBNS Servers
|
Global Options |
Apply to all DHCP Scopes. Used when all clients need the same information. |
|
Scope Options |
Apply only to specified Scopes, different scope for each Subnet. |
|
Client Options |
Apply to a specific client |
NOTE: If the amount of traffic generated by the lease process is a problem, consider using longer lease periods so clients will not have to renew as frequently.
If you have a limited number of IP addresses, you might consider making your lease period shorter so that unused IP addresses can be returned to the DHCP pool.
When the machine is shut done then the name is released.
As you can see, NetBIOS can generate quite a bit of broadcast traffic. With the protocol NetBEUI, you are loaded down by all the broadcasts. When using NetBIOS over TCP/IP, however. WINS will help to greatly reduce the amount of broadcast traffic.
Here, the WINS client will send a message directly to the WINS server on boot up and shut down. When clients need to contact a server they also contact the WINS server first.
WINS also facilitates communication between Subnets. NetBIOS broadcasts dont cross IP routers. We have to find another way for clients to find server without broadcasts. (i.e. LMHOSTS files or WINS Server)
A.
All clients can use a LMHOSTS file, which is a text file listing matching IP addresses with NetBIOS names.
Problems: Each client needs to have a LMHOSTS file
The LMHOSTS file needs to be updated regularly
Q. WINS as an Alternative to LMHOSTS files?
A. Managing LMHOSTS file is a overwhelming task. Each WINS client is configured with the exact IP address of its WINS server so it doesnt depend on NetBIOS broadcast crossing routers.
Q. How can the DHCP and WINS server be used in companion?
A.
Q. Explain the WINS Server database?
A.
[00h] Workstation (Client) Service
[03h] Messenger Service
[20h] Server Service
A.
Server
For example. If Microsoft internet explorer opens www.widgets.universal.com, a DNS server can resolve this friendly name to the correct IP address on the Internet.
NOTE: when testing names in DNS and assigned IP addresses Pinging will not work as long as that test IP address does not belong to a machine and is not active.
DNS is static. This can cause problems when the DHCP server may be assigning different addresses to a client, up to to hundreds per day. This new IP addresses then needs to be changed manually on DNS. One hell of a job.
WINS keeps a track dynamically of all IP address to NetBIOS names and NetBIOS names can be used as part of a HOST name. If you are connecting to a HOSTNAME, then NetBIOS cant resolve FQDN, it passes it over to the DNS Server, the DNS server then can also use the WINS server to find the IP address of the Server.
e.g. connect to www.server6.dev.persiankitty.com
DNS can find the domain dev.persiankitty.com, and WINS can find server6.
For this to happen, in the DNS server it must be set to use WINS resolution.
|
WINS |
DNS |
|
Resolves NetBIOS names to IP addresses |
Resolves Internet addresses (Host Names) to IP Addresses |
|
Only Translates the NetBIOS name to the IP address |
Can do reverse lookup, translating the IP address to a Host name |
|
Dynamic database automatic update |
Static Database manually updated |
|
Keeps all names in a FLAT name space and only shares them with configured replication partners |
Keeps the names in hierarchical structures called "fully qualified domain name" that registered and recognised throughout the Internet |
|
Used for name resolution for clients using Microsoft operating systems. |
Used for clients running Microsoft operating Systems and clients and hosts that are not running Microsoft operating systems, such as UNIX-based computers and mainframes using TCP/IP |
|
Each client can only register the name once but may have the 16th character different to describe their function on the network. |
Lets the administrator create different aliases for the same host. |
|
Facilitates domain related functions like browsing and logging on to domain. |
A.
|
Domain Master browser |
Collects and maintains the master list of available network computers, and names of other domains and workgroups that can share network resources. When a computer logs onto the network it sends a "announcement packet" to the DMB. It distributes the list to the Master browser of each Subnet in the Windows NT domain. There is only one domain master browser in a Windows NT domain, and its the primary domain controller (PDC) |
|
Master browsers |
Collects and maintains the master list of available network servers in its workgroup or Subnet. It receive information from the Domain master browser It distributes the list to the backup browsers. |
|
Backup browser |
Receives list from the Master browser and distributes the list to clients on request. Its main job is to offload work from the Master Browser. ALL BDCs are backup browsers. For every 32 computers in a domain, a BB is required. Otherwise Potential browsers will become backup browsers. |
|
Potential Browser |
Not a browser but can be one upon the request of the master browser. It depends on the number of computers on the network. |
|
Non-browser |
Configured to be a browser |
A.
When a browser receives an election packet, the criteria is examined with the receiving browsers. If the receiving browsers criteria is higher then it issues its own election packet, and enters an "election-in-progress" state. This continues until a master browser is elected based on the highest ranking criteria. Which is
A.
For the computer to be dropped off the list it has to MISS 3 ACCOUNCEMENT PERIODS. Browser periods occur every 12 minutes so it could take 36 minutes to drop off + say 15 minutes to update the backup browsers.
If the backup browser fails then an election is forced immediately.
Module 12- Remote Access Service
PPTP is a protocol that allows access to the RAS Server via the Internet.
The RAS server must also be connected to the Internet.
A.
RAS supports 2 kinds of protocols.
Remote Access SLIP, PPP.
Limitations
A.
Basically if you have 2 modems in the computer they can be combined to speed up the transmission rates.
E.g.
Client has 2 modems both at 28.8 KBPS, this can establish a link at the speed of 57.6 KBPS.
It does this by translating the NetBEUI packets into IPX or TCP/IP formats that can be understood by remote servers.
In addition, a RAS server can be an IPX router and a SAP agent for DIAL-UP Networking clients. SAP is similar to the Windows NT Browser service.
A.
Q. Installing and configuring RAS
A.
|
Dial out protocols |
Select the protocols to use when dialling out to a remote access server. If you do not select a protocol in the Dial Out Protocols box, you will be unable to select that protocol later when you configure a phone book entry for dialling out. If no ports are configured for dial out, the Dial out Protocols box appears dimmed. |
|
Server settings |
Protocols the RAS server will use for servicing remote clients |
|
Encryption Settings |
|
|
Enable Multilink |
For the use of combining multiple modems |
Q. Configuring a RAS Server to use TCP/IP
A.
|
Allow remote TCP/IP clients to access: |
|
|
Use DHCP to assign remote TCP/IP client address |
Let DHCP assign the IP address |
|
Use static Address Pool |
Begin & End, and Exclusion range |
|
Allow remote clients to request a predetermined IP address |
At the client end the IP address will be entered. |
A.
|
Allow remote IPX clients to access: |
|
|
Allocate network numbers automatically |
An IPX network number not currently in use is determined by the RAS server and assigned to the RAS client. |
|
Allocate network numbers
. |
Ranges of IPX network numbers can be given to a RAS server for assignment to clients. Allocated IPX address pools are useful if you want to identify RAS clients on the network by number. Provide the beginning network number in the From box. RAS automatically determines the number of available ports and calculates the end number |
|
Assign same network number to all IPX clients
|
Select this check box to assign the same network number to all IPX clients. This will reduce the size of RIP announcements on the network. If this box is selected, only one network number is added to your routing table for all active RAS clients. If this box is not selected, a network number is added to your routing table for each active RAS client. |
|
Allow remote clients to request IPX node number
|
Select this check box to allow the remote client to request its own IPX node number rather than use the node number provided by the RAS server. Allowing remote clients to specify their own node number is a potential security threat to your network. Choosing their own node number allows a client to impersonate a previously connected client and access network resources accessed by the other client. |
|
TAB |
USE THIS TAB |
|
Basic |
Configure the name for the phone book entry The phone number Specify and configure the device (i.e. Dial-Up networking Serial Cable between 2 PCs)
Use another port if busy here is where you configure the client to use Multilink and multiple modems. |
|
Server |
Dial-Up server type PPP, SLIP or other RAS protocol Network protocols, TCP/IP, IPX, NetBEUI
Data compression |
|
Script |
To specify a terminal windows or script file if manual intervention is needed before or after dialling to establish a remote access session. |
|
Security |
To select level of authentication, this will match the level set on the RAS server |
|
X.25 |
- |
|
TAB |
USE THIS TAB TO |
|
Dialling |
Number of redial attempts Seconds between redial Idle seconds before hanging up. |
|
Call-back |
Configure the server to disconnect and to call the client back following authentication. This reduces telephone charges and increases security. Depends also what is set in the Remote Access Admin. |
|
Appearance |
Preview phone numbers etc. |
|
Phonebook |
Specify which phone book to use.
|
For e.g. if the server containing a server-based profile is unavailable, any customisation of the desktop that is stored in that profile will not occur. However, if there is a locally cached user profile, these customisations occur.
Configure Windows NT to use the locally-cached user profile through the USER PROFILES tab, which is accessible through the SYSTEM program in Control Panel.
There are two possible scenarios when AutoDial attempts to make a connection:
A.
|
Event viewer |
If Dial-Up client fails to connect RAS server fails to start etc |
|
Problems with PPP connections |
User has problems authenticating over PPP, a PPP.LOG is created to provide debugging information. |
|
Authentication problems. |
If having authentication problems then try with the lowest authentication options and increase each time to see where it fails.
i.e. clear text, then logon encryption and the Microsoft encryption. |
|
Dial-Up Networking Monitor |
In system tray, shows connection detail, time. Data transferred, number of errors etc. |
|
Multilink and Call-back. |
If call-back is used and Multilink is also used, The RAS server can hold only 1 call-back number. Therefore the functionality of Multilink is lost.
If the link between the client and RAS server is made by using ISDN with two channels that have the same telephone number then Multilink will work with call-back. |
|
AutoDial Occurs During Logon |
Any persistent connections within Windows Explorer, AutoDial will try and make connections. Avoid this by removing persistent connections and shortcuts. |
Module 13 Internetworking and Intranetworking
HTTP - create and navigate Web hypertext documents and applications
The Gopher service used to create links to other computers or services, made obsolete by HTTP.
FTP transfer files between 2 computers on a TCP/IP network.
A.
|
File Publication |
Publish existing file form Windows NT |
|
Network Management |
Monitor and record network activity and provide clients access to valuable network resources such as HTML pages, shared files and printers. |
|
Security |
Configure clients for secure access |
|
Support for common internet Standards |
Enable development of WEB pages using languages as CGI and PERL |
|
Microsoft Internet Explorer |
A way of gaining access to the Web. |
|
Scalability |
Multiple platforms |
|
Support for Microsoft BackOffice applications, such as SQL & SNA Sever |
Many internet servers, access is anonymous; the client requests does not contain a user name and password. If anonymous connections to the WWW, Gopher and FTP services are allowed, Windows NT uses the user name and password configured for the service to make an anonymous connection..
(Basically NT will use the NT User/Password to connect to IIS but then use Anonymous Connections to the Internet Sites)
The internet guest account is created during installation.
IUSR_computername i.e. IUSR_PDC
Require a User Name and password
Can be configured to require a username and password. There are 2 types of authentication
Basic authentication does not encrypt transmissions between client and server, so names and password are sent in clear text. Not very secure and can be sniffed.
Windows NT Challenge/Response automatically encrypts user names and passwords. Internet Explorer version 2.0 and later supports this password authentication scheme. (HIGHEST LEVEL)
Note: At least one option must be selected.
A.
A.
Guidelines for securing an Internet/Intranet site.
Module 14 Interoperability with Novell NetWare
CSNW supports the following
GSNW can be used to create non-dedicated gateways to NetWare resources.
A.
A.
Q. Explain the function of FPNW (File and Print Services for NetWare)?
A.
It allows a Windows NT Server to function as a NetWare 3.12 compatible file and printer server.
A.
If FPNW is installed on the NT Server then the Login Scripts can also be migrated.
DSMN is an add-on and is not included on the NT CD-ROM.
A.
A.
A.
A.
NOTE: If you migrate files to a FAT partition instead of an NTFS partition, your NetWare file permissions will not migrate.
The destination of the Source NetWare files and directories can be specified.
CSNW Workstation
GSNW Server
FPNW Server
Module 15 Implementing Network Clients
Purchasing Windows NT WKS, 95 etc does not constitute a legal license. A CAL is also required.
A.
A.
|
Per Server |
Per Seat |
|
CALs are assigned to a specific Server. The number of CALs determine the number of connections.
Used for
|
A CAL is purchased for each client. Can access resources on any computer running windows NT Server on the network. Used for
|
NOTE:
There is a ONE TIME conversion for PER SERVER to PER SEAT. If PER SEAT is chosen during installation then NT Server needs to be re-installed to get to PER SERVER.
Another tool for tracking licensing data and replicating the license data to a centralized database.
Client S/W Included with Windows NT Server
A computer that is used to access computers running Windows NT must have client software installed and configured.
A redirector allows a client to be used to log on to a network and access services and resources.
Q. Identify the protocols included with the LAN Manager 2.2c Client
A. Supports
|
LAN Manager 2.2c for DOS |
LAN Manager 2.2c for OS/2 |
|
NetBEUI |
NetBEUI |
|
TCP/IP Supports DHCP but not DNS/WINS. |
TCP/IP DOES not support DNS/WINS |
|
DLC |
OS/2 1.x |
|
NetWare Connectivity |
OS/2 2.x |
|
RemoteBoot Service |
A.
|
Make Network Installation Startup Disk |
Create an MS-DOS network installation disk that can be used to automatically install the following clients. The files are copied to the server and shared.
|
|
Make Installation Disk Set |
Create disk set for installing the following clients manually
|
|
Copy Client-based Network admin Tools |
Copy and install Domain admin tools to a Windows 95 or NT Workstation computer |
|
View RemoteBoot Client Information |
NT service that allows NT to start computers running MS-DOS, Windows 3.x and Windows 95 over the network. Control Panel For diskless workstations |
A.
A.
A.
|
NT Server |
Macintosh Clients |
|
|
A.
After Services for Macintosh is installed, a MacFile menu is added to Server Manager and File Manager (Winfile). Use the MacFile menu to create Macintosh-accessible volumes.
To make folders stored on a Macintosh-accessible volume also available to Windows and MS-DOS based network clients, it is necessary to share the folder from which the volume was created.
NOTE:
Mac computers have a maximum partition size of 2GB. If Mac clients access a computer running Windows NT Server with an NTFS partition of more than 2GB, the users may get a message, indicating that there are 0 (zero) bytes available.
The following ate installed automatically with Services for Macintosh
Module 16 Implementing Directory Replication
Q. Describe the purpose of Directory Replication?
A.
Windows NT feature to copy commonly used information to computers in a domain, or to multiple domains. i.e. Logon Scripts and System Policy files.
Q. Identify the directory replication components?
A.
The Export computer (MASTER and NT Server Only)
The Import Computer(s). (NT Server and NT Workstations only)
Export & Import Directories. (must be in sub directories)
It is the sub directories under the following path that are replicated
C:\winnt\system32\repl\export
C:\winnt\system32\repl\import
NOTE : The actual process not well explained in notes !!
Module 17 The Windows NT Boot Process
A.
A.
|
File Missing |
Error Message |
|
Ntldr |
Boot: Couldnt find NTLDR Please Insert another disk |
|
Ntdtect.com |
NTDETECT V4.0 Checking Hardware NTDETECT failed |
|
Ntoskrnl.exe (It could also be that the BOOT.INI is missing because it tells us the active WINNT partition. If missing it goes to the possible incorrect default. |
Windows NT could not start because the following file is missing or corrupt: \winnt root\system32\ntoskrnl.exe Please re-install a copy of the above file. |
|
Bootsect.dos |
I/O Error accessing boot sector file Multi(0)disk(0)rdisk(0)partition(1)\\bootss |
[boot loader]
timeout - the number of seconds before it loads the default option
Default - The default option.
[operating systems]
list of operating systems in the form of ARC paths
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1)\WINNT
[operating systems]
multi(0)disk(0)rdisk(0)partition(1)\WINNT="Windows NT Server Version 4.00"
multi(0)disk(0)rdisk(0)partition(1)\WINNT="Windows NT Server Version 4.00 [VGA mode]" /basevideo /sos
C:\="Microsoft Windows"
/sos - list all files loading
/basevideo - VGA mode
/maxmem:12 - specified amount of memory for NT, used by developers
/noserialmice - When loading it sends a signal down COM1 and this could trip the UPS
/debug - enable debugging
/crashdebug
A.
Q. Creating an Emergency Repair disk.
A. Use the RDISK.EXE command and has two options
RDISK /s will backup the SAM and security files aswell.
The SETUP.LOG file is used to check the validity of the Windows NT files on the system.
A.
Module 18 Troubleshooting Resources.
A.
Q. Identify and use the diagnostic tools available with Windows NT.
A.
Types of events are
Q. Use log files to analyse system information.
NT records events in 3 types of log files :
Shows hardware and operating system information as stored in the registry.
Resources - System resources
Environment - Environment variables
Network - Network-related configuration information
Version - O/S info and version numbers
System - BIOS, HAL and CPU information
Display - Video adapter, driver and display settings
Drives - All available drives
Memory - physical and virtual memory, paging files, total memory and available memory.
Use PM for the following tasks
Identifying Bottlenecks with Performance Monitor.
Four main Area that cause bottlenecks
|
OBJECT |
COUNTER |
DESCRIPTION |
|
Memory |
Available Bytes |
Virtual memory available for system use
< 4MB indicates a need for more RAM |
|
Memory |
Pages/sec |
Number of pages being written between physical memory and paging file.
This number should be below 20. |
|
Memory |
Committed Bytes |
Memory that is allocated and currently being used by applications.
Should be less that the physical memory installed on your computer. |
|
Memory |
Page Faults/sec |
Sustained > 5% then a problem |
|
OBJECT |
COUNTER |
DESCRIPTION |
|
System |
%Processor Time |
If consistently at or above 80%, consider upgrading the processor. |
|
System |
Processor Queue Length |
Consistent processor length > 2, the processor causing a problem. |
|
OBJECT |
COUNTER |
DESCRIPTION |
|
Physical Disk |
%Disk Time |
If Over 90% then disk is the bottleneck |
|
Physical Disk |
Current Disk Queue length |
If Over 2 then disk is the bottleneck |
|
Logical Disk |
Avg. Disk sec/Transfer |
|
OBJECT |
COUNTER |
DESCRIPTION |
|
Network Segment |
%Network Utilisation |
Should below 40% in Ethernet Should below 80% in Token Ring |
RAM is the resource where most bottlenecks occur.
Data is stored on hard disk, and is called in when needed, this happens quite often if there is not enough RAM installed on the machine and hence bottlenecks.
The best indicator of memory bottlenecks is a high rate of HARD PAGE FAULTS. These occur when the application needs the data and it cannot be found in physical memory (RAM) and so need to access the hard disk (virtual memory).
Sustained hard page faults rates over 5% are a clear indicator of a memory bottle neck..
A.
|
Chart |
Default view and shows the system in Real time. 2 mode
The Settings of the chart can be saved. The Update period can also be changed in seconds |
|
Alert |
Create system alerts when counters reach and pass thresholds. Must specify
The Alerts will be entered in the Alert Screen but you can also set it to send an ALERT to a machine |
|
Log |
Used to save data to a file to be used as a "Baseline" |
|
Report |
Allows you to display real-time Performance Mon. statistics in a report format. |
A.
|
Minimise memory Used |
If you have under 10 users |
|
Balance |
If you have 10-64 users |
|
Maximise Throughput for File Sharing |
64+ users- Max memory is allocated to file-sharing applications. |
|
Maximise Throughout for Network Applications |
Servers supporting distributed applications that used memory caching for e.g. SQL Server |
|
Applications currently in use |
You End tasks and open new ones |
|
Processes that are currently running on your computer |
See all processes that are running and CPU usage, can also end processes here. |
|
General information regarding your computers performance |
General overview of the computers performance.
|
A.
A.
With this version of NM the NIC does not need to run in Promiscuous mode as it can only capture data to and from the NIC.
A.
The data will go into the computers memory
.
A.
A.
\SYSTEM32\NETMON\CAPTURES with the extension .CAP
A.
A.
Q. Use System recovery to capture information generated by Stop errors.
A. If there is a severe error (also called a stop error, fatal system error, or blue screen), it is possible to configure the system response using the Recovery options on the Start-up/Shutdown tab of the System program in Control Panel.
The Recovery box has the following options
The part of the pagefile that holds the memory dump is marked, so when the system is restarted that portion is copied to a file called memory.dmp by default.
A program called dumpexam.exe is then used by support engineers to debug the system.
Q. What is the Repair
process for restoring missing/corrupt
boot files?
A.
NOTE : THE ERD IS UNIQUE TO EACH COMPUTER.
\HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Rasman\PPP\Logging
The file will be stored in \winnt_root\System32\Ras\PPP.Log
A.
A.
Q. What are the additional resources for troubleshooting?
A.