Windows NT 4.0 Server Enterprise Notes

 

Chapters 1, 7, 10, & 13 Only

 

 

Chapter 1 – Planning a Domain Model in the Enterprise Environment. *

Trust Relationships *

Chapter 7 – NT Domain Management *

Chapter 10 – Macintosh Connectivity *

Chapter 13 – Internetwork Routing *

Identifying Bottlenecks with Performance Monitor. *

Chapter 1 – Planning a Domain Model in the Enterprise Environment.

 

The Workgroup Model

 

Also know as Peer-to-Peer in a decentralised networking model meaning all account information is held locally on each machine.

 

Ok may do for small Networks.

 

The Client Server Model

 

The client-server is a centralised model. The user accounts are held on the server and via the logon can access resources on that server.

 

The problem arises when there are more that one server, accounts will need to be created on each server to access resources.

 

The Domain Model

 

In a Domain model all the accounts information is stored on one NT server called the PDC. When you logon you actually logon to a DOMAIN rather than a server. Depending on your rights you can access any resources in that domain regardless on what server they reside on.

 

Trust Relationships

 

A trust allows users in one Domain to access a Resource in another Domain without having a user account in each domain.

 

The Users Domain is TRUSTED

The Resource Domain is TRUSTING

User (SALES DOMAIN) Resource (ACCOUNTS DOMAIN)

 

TRUSTED TRUSTEE

 

  1. How do you implement Trusts?
  1. Use USER MANAGER FOR DOMAINS.
  1. What are the 4 NT Domain Models?

A.

 

  1. The Single Domain Model
  1. The Single Master Domain Model

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  1. The Multiple Master Domain Model

 

 

 

 

 

 

 

  1. The Complete Trust Model

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chapter 7 – NT Domain Management

 

  1. What is the Server manager used for?

A.

 

  1. What rights do you need to manage computer?
  1. You need to be a member of the following

 

 

 

  1. What Properties can be viewed with Server Manager?

A.

 

Users

Displays all users and the resources that each user is currently connected to on the specified computer.

Shares

List of all resources that are shared on the computer. HIDDEN SHARES END WITH A $

In Use

Lists all ACTIVE open resources of the specified computer

Replication

Specify Export and Import computers

Alerts

Specify which user/computer should be contacted in the event that an alert is generated. USUALLY IT ONLY GOES TO THE COMPUTER THAT GENERATED THE ALERT.

 

 

  1. How does the PDC and the BDC SAM Synchronise?
  1. PDC sends a message to the BDC’s that a change has taken place. The BDC’s send a request for SAM changes to be sent.

 

 

  1. If you wanted to control SAM database synchronisation to BDC’s over slow WAN link, what would you configure?

A.

Chapter 10 – Macintosh Connectivity

 

  1. What are the Benefits of "Services for Macintosh"?
  1. Allows Macintoshes to participate in an NT environment when you install Appletalk Filing Protocol (AFP) onto the NT Server.

 

 

 

File Sharing

The ability to share file structures between PC users and Mac users. NT provides a means of storing data not translating data. I.e. A Mac user with "Microsoft WORD" saves a file on the server and a user with a PC using Microsoft WORD is able to read it. The MS WORD application is doing the translation.

Print Sharing

  1. Mac users can send PostScript print jobs to Non-PostScript printer
  2. PC Users can send PostScript print jobs to PostScript printers attached to Mac clients.
  3. Allows Spooling

Appletalk routing

Create an Appletalk internet by connecting Appletalk physical network through NT Server, This way, NT Server would act as an Appletalk router

 

  1. What are the System requirements for Services for Macintosh?

A.

 

NT Server RequirementsMacintosh Requirements

Support Appleshare (Similar to NetBEUI)

Must be running System 6.0.7 or later

 

Networking Requirements

Macs support

  • Localtalk – comes with all Macs at no extra coast, like NetBEUI
  • Ethertalk (Ethernet)
  • Tokentalk (Token Ring)
  • FDDItalk (FDDI)

 

Localtalk is too slow (speeds of 230.4Kbps compared with Ethernet at 10Mbps)

 

High end Macs will have Ethertalk installed which is then OK. But if not there are some options

  1. Install Ethertalk on all Macs (very costly)
  2. Use a stand-alone router that has Localtalk port and an Ethernet port
  3. Add a Localtalk card to your NT server to make it a router

 

 

  1. Explain Forks?
  1. There are 2 types of forks associated with a Mac data file.

 

 

  1. What Utilities are modified by "Services for Macintosh" SFM?
  1. You will get the "MacFile" option in the Menu Bar for the following utilities.

 

 

  1. What are the NTFS Prerequisites for File Sharing with SFM?
  1. NTFS Partition.

 

  1. Explain File Name Translation
  1. Mac filenames can be 32 chars in length, which cannot be accessible from DOS and Win16 clients
  1. Explain Macintosh-Accessible Volumes
  1. Allows NT file services for Mac clients. It is space on the NT server to store Mac files and folders.

 

Q. How do you create a MAV?

A. Use File Manager and Server Manager to create MAC volumes.

 

Q. What are the rules for creating MAV’s

A. No Nesting of volumes on the same partition.

 

Q. What are the properties of MAV’s

A.

This volume is Read only

Read and not edit even if you have more access rights.

Guests can use this volume

Guests are allowed to access volume, guest account has to be enabled.

Password

Accessing the volume the users must enter a password

User Limit

Can be used to control licenses to application.

Permissions

Mac users will be governed by the most limited security imposed through

  • NTFS Security
  • Macintosh permissions

Mac security is assigned to the Owner (the creator), primary group (unique to Macs) or to the EVERYONE Group.

 

The permissions are :

  • See files – (Read)
  • See directories – (Read)
  • Make Changes – (Write and Delete)

Associations

Mac file associations may not be the same as for PC Associations. You can associate MS-DOS extensions with Mac extensions. E.g. .DOC with Word 6.0

 

 

  1. What are the MacFile properties?

A.

Users

Shows Which Mac users are connected and what resources they are using.

Volumes

Shows which users are currently accessing the volumes

Files

Provides specific information on the files that are being currently accessed.

Which files users have open, what type of access to that file.

Attributes

Allows you to control the sessions of Macintosh

 

 

 

 

  1. What does "Allow Workstations to Save Password" mean?
  1. Allows Mac’s to save the NT password so it is not prompted for on logon. (NOT RECOMMENDED)

 

  1. What does "Require Microsoft Authentication" mean?
  1. Logon using Clear Text or MS Authentication (Encrypted)

 

 

Chapter 13 – Internetwork Routing

 

  1. What is a MultiProtocol Router (MPR)?
  1. In order to connect multiple networks, MPR can dynamically route traffic between Subnets over IPX and TCP/IP.

 

  1. Explain IP Routing and Default Gateway
  1. The Subnet mask determines if the machine that you are trying to connect to is on the same network segment.

 

  1. Explain RIP (Routing information Protocol) Protocol for Dynamic IP/IPX Routing?
  1. Used to dynamically distribute routes among servers and routers to build up route tables.

 

Comes if 2 forms

 

 

  1. How can you Tell RIP is working?
  1. Use ROUTE PRINT command, and look for listings in the Metric column that are larger than 2. This indicates the local router has exchanged routing information with other RIP-enabled routers.

 

 

  1. Explain the DHCP Relay Agent?

A. DHCP Clients can reach DHCP Servers on remote networks.

 

  1. How do you install the DHCP relay agent.?
  1. Network properties, TCP/IP properties. DHCP Relay.

 

The IP address of at least one DHCP Server is needed.

 

  1. If you have a combination of dynamic NT routers using RIP and a Static NT routers, what will you have to do so all routers can see all network routes?
  1. manually Add the static routes to the dynamic routers and manually add the routes from the dynamic routers to the static routers.

 

 

 

Identifying Bottlenecks with Performance Monitor.

 

Four main Area that cause bottlenecks

 

 

Memory

 

 

OBJECT

COUNTER

DESCRIPTION

Memory

Available Bytes

Virtual memory available for system use

< 4MB indicates a need for more RAM

Memory

Pages/sec

Number of pages being written between physical memory and paging file.

This number should be below 20.

Memory

Committed Bytes

Memory that is allocated and currently being used by applications.

Should be less that the physical memory installed on your computer.

 

CPU

OBJECT

COUNTER

DESCRIPTION

System

%Processor Time

If consistently at or above 80%, consider upgrading the processor.

System

Processor Queue Length

Consistent processor length > 2, the processor causing a problem.

 

Disk Access

 

OBJECT

COUNTER

DESCRIPTION

Physical Disk

%Disk Time

If Over 90% then disk is the bottleneck

Physical Disk

Current Disk Queue length

If Over 2 then disk is the bottleneck

Logical Disk

Avg. Disk sec/Transfer

 

 

Network Access

OBJECT

COUNTER

DESCRIPTION

Network Segment

%Network Utilisation

Should below 40% in Ethernet

Should below 80% in Token Ring