Post on 06-Apr-2018
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 1/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 1 of 50
Task 01
1.1
Current Computer details of the Lanka staffing co-operation
Headquarters
28 windows 2000 server computers
1 Certification server
2 file servers
25 windows 2000 terminal edition
o OWA (Outlook web access) -OWA1
o 2 domain controller (DC1, DC2)
o 3 Microsoft Exchange server 5.5
o 4 UNIX servers (oracle database)
o 1 remote server (RAS1)
Before upgrading the we have to look through several things in this organization.
1) What are hardware requirements?
We have to check the hardware what are the present configurations of the hardware then
only we can upgrade present systems to new versions.
If there is hardware do not support to the new version we have to upgrade to new
hardware requirement.
Then only the new versions of windows will perform well to the new version window.
2) What are the application currently running on the system is it ok with the new version?
Do we want to buy the new versions?
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 2/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 2 of 50
We have to check on the application they are currently running. If we change the operating
system some times some application could be error in new window platform. There for we
have to check the software is they working in the new operating system.
If there is not working we have to buy the new software to the computer. We have to look
how much money we have to spend to the software.
3) Users & IT administrators’ knowledge about new systems to be upgraded.
Then we have to interview the employees that they are all ready experience with the old
operating system. For that we have identify the user whether they could operate with the new
operating system.
If they couldn’t operate with the new operating system we have to give the proper
training to the user. Then only the user can do their work quickly and properly like the old
operating system.
The reason why the company decided to upgrade Windows 2000 server to windows 2003
server
In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so
Win2003 server ismore secure than win 2000 server.
In 2000 we cannot rename domain whereas in 2003 we can rename Domain.
In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) where as in
2003 supports up to 64 processors and max of 512GB RAM.
2000 Supports IIS 5.0 and 2003 Supports IIS6.0
2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 3/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 3 of 50
2000 has Server and Advance Server editions where as 2003 has Standard, Enterprise,
Datacenter and Web server Editions.
2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server
operating systems (Windows Server 2003 X64 Std and Enterprise Edition)
2000 has basic concept of DFS (Distributed File systems) with defined roots whereas 2003
has Enhanced DFS support with multiple roots.
In 2000 there is complexality in administering Complex networks whereas 2003 is easy
administration in all & Complex networks.
In 2000 we can create 1 million users and in 2003 we can create 1 billion users.
2003 has telnet sessions available.
2000 supports IPV4 whereas 2003 supports IPV4 and IPV6.
1.2
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 4/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 4 of 50
Now the company is using for client computers Window 2000 Professional the hardware
requirement of it.
Hardware requirements for Windows Window 2000 Professional
133 MHz or more Pentium microprocessor (or equivalent). Windows 2000 Professional supports
up to two processors on a single computer.
64 megabytes (MB) of RAM recommended minimum. 32 MB of RAM is the minimum
supported. 4 gigabytes (GB) of RAM is the maximum.
A 2 GB hard disk that has 650 MB of free space. If you are installing over a network, more
free hard disk space is required.
VGA or higher-resolution monitor.
Keyboard.
Mouse or compatible pointing device (optional).
The company wants to upgrade the windows 2000 Professional to Windows Xp for that they
have to upgrade the hardware to following requirements.
The Minimum Hardware requirements for the Windows Xp
Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended)
At least 64 megabytes (MB) of RAM (128 MB is recommended)
At least 1.5 gigabytes (GB) of available space on the hard disk
CD-ROM or DVD-ROM drive
Keyboard and a Microsoft Mouse or some other compatible pointing device
Video adapter and monitor with Super VGA (800 x 600)or higher resolution
Sound card
Speakers or headphones
Windows XP benefits
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 5/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 5 of 50
Windows XP is somewhat faster than Windows 2000, assuming you have a fast processor
and tons of memory (although it will run fine with a 300Mhz Pentium II and 128MB of
RAM).
The new Windows XP interface is more cheerful and colorful than earlier versions, although
the less-cartoony "Classic" interface can still be used if desired.
Windows XP has more bells and whistles, such as the Windows Movie Maker, built-in CD
writer support, the Internet Connection Firewall, and Remote Desktop Connection.
Windows XP has better support for games and comes with more games than Windows 2000.
Windows XP is the latest OS - if you don't upgrade now, you'll probably end up migrating to
XP eventually anyway, and we mere mortals can only take so many OS upgrades.
Manufacturers of existing hardware and software products are more likely to add Windows
XP compatibility now than Windows 2000 compatibility.
For server computers the company is having windows 2000 server
The hardware requirement for windows 2000 server
In windows 2000 server there are 3 type server operating systems.
Windows 2000 Server - Supports up to four processors and up to 4GB of RAM. It is used for
web, application, print and file servers.
Windows 2000 Advanced Server - Supports up to eight processors and up to 8GB of RAM. It
is used in an enterprise network and very useful as an SQL server.
Windows 2000 Datacenter Server - Supports up to 32 processors and up to 64GB of RAM. It
is used in an enterprise network to support extremely large databases and real time
processing.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 6/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 6 of 50
The company wants to upgrade the windows 2000 server to window 2003 server
For that the company has to full fill the following requirements.
Hardware requirement for windows 2003 server
Detail table windows 2003 server
System Microprocessor RAM HD Requirements
Windows 2000 Server Pentium 133128Mb (256Mb
Recommended)
1 GB free (2 G
recommended)
Windows 2000 AdvancedServer
Pentium 133 256Mb 1 GB free (2 Grecommended)
Windows 2000
Datacenter ServerPentium 133 256Mb
1 GB free (2 G
recommended)
Windows
Server 2003
Edition
Number of
Processors Processor Speed RAM
Available
Disk Space
(for Setup) Monitor
Web 1 – 2 133 megahertz
(MHz) minimum;
550 MHzrecommended
128 megabytes
(MB) minimum;
256 MBrecommended;
2 GB maximum
1.5
gigabytes
(GB)
Video Graphics
Adapter (VGA) or
higher; Super VGA(SVGA) (800 × 600) or
higher recommended
Standard 1 – 4 133 MHz
minimum;
550 MHz
recommended
128 MB minimum;
256 MB
recommended;
4 GB maximum
1.5 GB VGA or higher; SVGA
(800 × 600) or higher
recommended
Enterprise 1 – 8 133 MHz
minimum;
550 MHz
recommended
128 MB minimum;
256 MB
recommended;
32 GB maximum
1.5 GB VGA or higher; SVGA
(800 × 600) or higher
recommended
Datacenter 8–32 400 MHz
minimum
512 MB minimum;
64 GB maximum
1.5 GB VGA or higher; SVGA
(800 × 600) or
higher recommended
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 7/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 7 of 50
There is an important difference between windows 2000 and windows 2003. When installing
terminal services for windows 2000 u r prompted to select application server functions or
administrative functions sets can be installed sequent on one server but it performs only one
function at one time. But in 2003 still distinguishes between application and administrative
services but installation and management are now consolidated.
In Win 2000 server we can apply 620 group policies but in 2003 we can apply nearly 720 so
Win2003 server is more secure than win 2000 server.
The Main Difference between Win 2000 Server and Win 2003 Server are:-
1) Windows 2003 server is more secure than Windows 2000 sever.
2) In win 2000 sever IIS version is 5.0, In win 2003 server IIS version is 6.0 so it contain some
advanced features.
3) In Win 2003 Server we can apply more Group policies.
4) In Win 2003 Server Active Directory also contain more features.
5) There are 4 types of Editions available in Win 2003 server
1.Windows 2003 server standard Edition.
2. Windows 2003 server Enterprise Edition.
3. Windows 2003 server Web Edition.
4. Windows 2003 server Datacenter Edition.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 8/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 8 of 50
1.3
Outlook web access
Outlook Web Access (OWA) allows any client with a
compatible browser to access Exchange Server folders.
The "premium" version of OWA in Exchange 2003 looks and acts much like the Outlook 2003
desktop client, although it does not offer support for the Journal folder. The "basic" version looks
more like previous versions. You may want to try both and see which is faster for the conditions
your users are likely to encounter. Microsoft Exchange Server Introduction to Exchange
Server 2003 has a good chart comparing the feature sets.
For Exchange 2000, you create applications using web forms. No conversion tool is available to
turn Outlook forms into Exchange 2000 OWA forms.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 9/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 9 of 50
Task 2
2.1
To: - Manager of the lanka staffing corporation
From: - M.WimalRaj Desktop Administrator of the lanka staffing corporation.
To implement Disaster recovery mechanisms.
What is disaster?
How can the disaster affect the company?
What is disaster recovery?
What is disaster recovery plan?
Benefits of disaster recovery plan?
What is disaster?
Disaster is a sudden, calamitous event bringing great damage, loss, and destruction and
devastation to life and property. The damage caused by disasters is immeasurable and varies with
the geographical location.
E.g:- Earthquake, flood, land slide, heavy rain, thunder storm, Wind .Tsunami and etc.
How can the disaster affect the company business?
Currently the company is running with IT department and many computer in this
company.
Due to the sudden disaster like Earthquake, flood, land slide, heavy rain, thunder storm,
Wind. Tsunami and etc the computer can affected by the disaster.
If the server are down for a one day the company business will lost many amount of
money. Because the company’s all business runs under the IT department.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 10/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 10 of 50
What is disaster recovery?
A disaster recovery is a response to a declared disaster or a regional disaster. It is the
restoration or recovery of an entire Agent computer.
A disaster recovery plan describes how an organization is to deal with potential disasters.
It define if the disaster happened how the organization going to solve the problem from
the disaster.
The company has to keep proper backup, proper power plan, proper storages and etc.
This include under disaster recovery.
What is disaster recovery plan?
A disaster recovery plan sometimes referred to as a business continuity plan or business
process contingency plan describes how an organization is to deal with potential
disasters.
Just as a disaster is an event that makes the continuation of normal functions impossible,
a disaster recovery plan consists of the precautions taken so that the effects of a disaster
will be minimized and the organization will be able to either maintain or quickly resume
mission critical functions.
Typically, disaster recovery planning involves an analysis of business processes and
continuity needs; it may also include a significant focus on disaster prevention.
Benefits of disaster recovery plan
Reduces the need for decision making when disaster happens
Gives you confidence that your business can continue after a disaster
Guarantees the availability of stand-by systems
Provides you with a back-up of information and documents if the original is destroyed
Reduces the risk of human disaster
Makes you aware of those things that can be insured against disaster
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 11/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 11 of 50
2.2
For the budget of the recovery plan we have analysis several things in the organization .The
things that we have to look from this company.
Identify Risks
Agree on business requirement
Create a Capabilities Assessment
Estimate the Costs
Define Leadership and Staffing
Determine Your Recovery Site
Review Telecommunication and Connectivity Alternatives
Test the Plan
Document Changes
Communicate
1) Identify Risks: -Identify scenarios where a recovery is required. Then create a list of
business requirements necessary during these potential interruptions.
2) Agree on Business Requirements: - Define which business processes are critical to the
continued operation of your organization. Identify the required applications and business data
needed to support these processes.
3) Create a Capabilities Assessment: -List gaps between the business requirements and
potential solutions.
4) Estimate the Costs: -Prepare cost estimates. Define an acceptable length for unplanned
downtime and prepare a budget to complete the desired solution.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 12/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 12 of 50
5) Define Leadership and Staffing: -Identify your executive leadership and the key employees
who will lead the recovery efforts.
6) Determine Your Recovery Site: - Select a recovery site in an alternate geographic region.
7) Review Telecommunication and Connectivity Alternatives: - Define a solution to include
primary and alternate connectivity options to your recovery site.
8) Test the Plan: - Test your recovery scenarios. Include a restore of applications and current
production data to test your backup processes.
9) Document Changes: -Periodically review your plan and document changes in your business
requirements and their solutions.
10) Communicate: - Provide thorough and consistent communications to your employees.
Educate your staff on the roles they play in a disaster situation and define the methods you will
use to contact key corporate personnel. Include an inbound communication strategy in the event
that key members of your team are unable to participate due to their own personal issues.
Some thing has to be define
You have to keep a separate place for the servers and the other most secured computer.
Have to keep a backup site for the server data’s.
Have to check the server components are available as for the sudden need
Do the company is suitable for the disaster recovery plan
What are the things that have to secure well.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 13/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 13 of 50
Task 03
3.1
Proxy Server
In computer networks, a proxy server is a server (a computer system or an application program)
which services the requests of its clients by forwarding requests to other servers.
Function of the Proxy server
Forwarding the clients request to the correct server.
Internet proxy server is also associated with a firewall server that is used to protect the
network of the enterprise from any intrusions from the outside.
The Internet proxy server receives requests from web pages or any other Internet services
from the user.
In case the page cannot be found in the cache, then the Internet proxy server must act as a
client as thus use its own IP address to request the web page from other servers that are found on
the Internet.
DNS Server
A DNS server is any computer registered to join the Domain Name System. A DNS server runs
special-purpose networking software, features a public IP address and contains a database of
network names and addresses for other Internet hosts.
DNS servers communicate with each other using private network protocols. The DHS server
contains 13 root domains. E.g:- .com, org, lk, uk
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 14/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 14 of 50
Role of the DNS server
Interacting With Other Servers:-
The DNS resolution process often requires that multiple servers be involved. Servers mustthus maintain not just name information, but information about the existence of other servers.
Depending on the type of DNS request, servers may themselves become clients and generate
requests to other servers.
Zone Management and Transfers:-
The server must provide a way for DNS information within the zone to be managed. A
facility also exists to allow a zone transfer to be performed between the master (primary)
server for a zone and slave (secondary) servers.
Performance Enhancement Functions:-
Due to the large number of requests servers handle, they employ numerous techniques to
reduce the time required to respond to queries. The most important of these is caching of
name information. A variation of regular caching called negative caching may also be used to
improve performance, and load balancing is a feature that can be used to improve efficiency
of busy devices registered within the DNS system.
Administration: -
Various other administrative details are required of name servers, such as storing
information about the different types of contacts (humans) who are responsible for certain
tasks related to management of a domain or zone.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 15/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 15 of 50
DHCP Server
This protocol is used to assign IP addresses to hosts or workstations on the network. Usually a
DHCP server on the network performs this function. Basically it "leases" out address for specific
times to the various hosts. If a host does not use a given address for some period of time, that IP
address can then be assigned to another machine by the DHCP server. When assignments are
made or changed, the DHCP server must update the information in the DNS server.
Function of the DHCP server
Centrally manages IP address allocation.
Helps prevent address conflicts.
Reduces administrative effort.
Helps conserve IP address.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 16/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 16 of 50
3.2
Attended Installation
This is a normal installing method that we use.
Advantages of this attended installation
Low number of installations to perform (why create an installation file when you can run
through a single installation “by-hand”)
Need to individualize each installation at the time of installation (new users with unknown
information)
Ease of running an attended installation
Steps for the attended installation
The first step of performing an attended installation is finding a way to enter the setup program.
There are several ways of doing so, including
Starting from an Existing Windows OS: If you have 98 or 2000 installed on your PC, it is
likely that you can perform an upgrade installation directly from the operating system. Readmore on upgrade installations in the next guide
Starting from a Floppy Boot Disk Set: If the PC that you wish to install XP on does not
feature a CD-ROM drive (or you cannot boot from CD for whatever reason), use the six-disk
set provided by Microsoft online to start installation
Starting from a CD-ROM: The simplest option – Stick the CD in the drive before boot and
watch Windows do its wonders!
Once you have entered what many people call the “low-level” setup, you will see a bluescreen with instructions for installation. This is actually a condensed copy of Windows that
has been stored in your memory in order to allow you to install the real Windows XP. Run
through the setup with these step
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 17/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 17 of 50
1. Agree to Licensing Agreement
2. Partition Drives: Make sure that the partition that you have selected to install Windows on is
indeed free or free to destroy and also has enough space to support a Windows installation
3. Format the Drives: You will be given the choice between NTFS, NTFS (Quick), and possibly
FAT to format the drives. The difference between NTFS and the quick format is that the
quick format does not scan the volume for bad sectors. Generally, it is better to perform a full
format, but on a known good drive, a quick format should do.
4. Allow setup to copy installation files and restart
5. Take boot disks/CD out of drive
After these steps, you should be in what is the next level of setup, with a fully-functional,
Windows-like GUI. This level of setup is where the bulk of install configuration occurs. Once
you have reached this stage, you will watch setup install some components and then you will be
prompted with your first set of dialogue boxes:
1. Regional and Language Options: Make sure that you choose the relevant language and
regional options on the computer you are installing Windows XP
2. Name, Licensing Information: Obvious, but enter relevant names!
3. Computer Naming: Note that to communicate with legacy (NT) networks, your computer
name should be eight or fewer alphanumeric characters
4. Modem Information: Installation requires you to enter at least an area code in the US
5. Date and Time Settings: The time should already be correct, but be sure to select your correct
time zone
6. Network Setup: We will cover Windows XP networking at a later time, but here are some
basic points.
Typical v. Custom Settings: Windows will try to auto-detect appropriate network
configuration in the Typical Settings mode. If you choose Typical, you will not be asked to
install or implement protocols
Protocols: If you choose a custom setup, you will need to select the protocols to install. Some
typically installed protocols include: TCP/IP, File and Print Sharing,
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 18/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 18 of 50
7. Workgroup or Domain: You must choose to either join a workgroup or a domain. A domain
must already exist in order to join it, and a workgroup is an informal association of Windows-
networked computers
8. Setup now will install start menu items, register components, remove temporary files, and
reboot.
Upon your first installation of Windows XP, you will be prompted for different user information.
Note that the first “user name” you configure will become a password-less, administrative user
by default. You should change this later.
Unattended installation
Unattended installation is an automated installing technology. Normally this type of installation
is used in large organization. Answer file is a main component of the unattended installation.
The answer file contains how the setup will install and how the system configured.
Type of the unattended installation
1) Network installation
2) Sys prep installation
3) RIS installation
1) Network installation
Step of the network installations
Create answer file
Create uniqueness database file
Place files in distribution share
Boot target computer/ boot disk
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 19/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 19 of 50
Advantages of network installation
Reduction of the administrative expenditure for the first installations.
Phone books can be configured centrally.
Management of shared record notes in a team for data sources witch provided no accordingly
sized note field.
2) Sys prep installation
The System Preparation (Sys prep) tool prepares an installation of Windows for duplication,
auditing, and customer delivery.
Requirement for sys prep installation
All computers should in same configuration.
Third party imaging disk required.
Advantage of sys prep installation
Removes system-specific data from Windows. Sys prep can remove all system-specific
information from an installed Windows image, including the computer security identifier
(SID). The Windows installation can then be captured and installed throughout an
organization.
Configures Windows to boot to Audit mode. Audit mode enables you to install third-
party applications and device drivers, as well as to test the functionality of the computer.
Configures Windows to boot to Windows Welcome. Configures a Windows
installation to boot to Windows Welcome the next time the computer starts. In general,
you configure a system to boot to Windows Welcome immediately before delivering the
computer to a customer.
Resets Windows Product Activation. Sys prep can reset Windows Product Activation
up to three times
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 20/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 20 of 50
3) RIS installation
RIS installation is a method of cleanly installing an operating system and applications over a
network with minimal administrator or technician interaction. RIS uses Pre-Boot Execution
Environment (PXE) technology to enable client computers without an operating system to start
up from a PXE-enabled network adapter and connect remotely to a RIS server, which installs a
supported operating system.
Requirement for the RIS installation
DNS
DHCP
Active directory
Non system partition
Hot fix Q308508 for XP RIS setup
Patch Q313069 for XP Rip Prep
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 21/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 21 of 50
3.3
Terminal Server
Terminal Server is the server component of Terminal services. It handles the job of authenticating clients, as well as making the applications available remotely.
It is also entrusted with the job of restricting the clients according to the level of access they
have.
The Terminal Server respects the configured software restriction policies, so as to restrict the
availability of certain software to only a certain group of users.
The remote session information is stored in specialized directories, called Session Directory
which is stored at the server. Session directories are used to store state information about a
session, and can be used to resume interrupted sessions.
The terminal server also has to manage these directories. Terminal Servers can be used in a
cluster as well.
Terminal services
Terminal Services provides the ability to host multiple, simultaneous client sessions on
Microsoft Windows Server 2003.
Terminal Server is capable of directly hosting compatible multi-user client desktops running
on a variety of Windows-based and non Windows-based hardware. Standard Windows-based
applications do not need modification to run on the Terminal Server, and all standard
Windows Server 2003-based management infrastructure and technologies can be used to
manage the client desktops.
Terminal service works
Terminal Service Architecture
Terminal Service Physical Structure
Terminal Services Processes and Interactions
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 22/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 22 of 50
Terminal Service Architecture
Terminal Services consists of four components: the Windows Server 2003 multi-user kernel, the
Remote Desktop client, the Terminal Services Licensing service, and Session Directory Services.
This system allows terminal servers to obtain and manage terminal server client access license
(TS CAL) tokens for devices and users connecting to a terminal server.
Figure 3.3.1
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 23/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 23 of 50
Terminal Service Architecture components
Component Description
CSRSS.exe The Client-Server Runtime Subsystem is the process and thread manager for
all logon sessions.
RdpDD.sys Captures the Windows user interface and translates it into a form that isreadily converted by RDPWD into the RDP protocol
RdpWD.sys Unwraps the multi-channel data and then transfers it to the appropriatesession.
SMSS.exe Session Manager creates and manages all sessions.
Termsrv.exe Manages client connections and initiates creation and shutdown of
connection contexts.
Termdd.sys The RDP protocol, which listens for RDP client connections on a TCP port.
Tdtcp.sys Packages the RDP protocol onto the underlying network protocol, TCP/IP.
Wlnotify.dll Runs in the session’s Win Logon process to create processes in the user
session.
Win32k.sys Manages the Windows GUI environment by taking the mouse and keyboard
inputs and sending them to the appropriate application.
WinLogon.exe This system service handles user logons and logoffs and processes the
special Windows key combination Ctrl-Alt-Delete. Win Logon is
responsible for starting the Windows shell (which is usually WindowsExplorer).
Terminal Services Physical Structure
Terminal Services provides remote access to a Windows desktop through “thin client”
software, allowing the client computer to serve as a terminal emulator.
It provides an effective and reliable way to distribute Windows-based programs, providing a
single point of installation with multiple users having access to the Windows Server 2003
operating system desktop, where they can run programs, save files, and use network
resources as if they were sitting at that computer.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 24/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 24 of 50
Figure 3.3.2
Terminal Service Physical Structure components
Component Description
Terminal Server Hosts applications for client computers.
Terminal Server
Licensing Service
Issues TS Device CAL token to a requesting terminal server.
Session Directory Maintains a list of the user names associated with the session IDs
connected to the servers in a load balanced Terminal Server cluster.
Remote Desktop
Connection
Client software that allows a connection to one remote computer.
Remote DesktopsMMC Snap-in
Client software used by administrators to connect to multipleremote computers simultaneously.
Remote Desktop Web
Connection
ActiveX RDP Web browser client.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 25/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 25 of 50
Terminal Services Processes and Interactions
Terminal Services transmits only the user interface of the program to the client, with the
client computer connecting through the network, sending keystroke and mouse-movement
information over the Remote Desktop Protocol to the Terminal Server.
It then sends the client screen information in the form of simple (and bandwidth-friendly)
GDI events, backed with bitmap information if required to properly display the desktop state.
Each user logs on and sees only their individual session, which is managed transparently by
the server operating system and is independent of any other client session.
The Terminal Server provides virtual Windows session management, so users can essentially
treat that session as their own personal computer.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 26/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 26 of 50
Task 4
4.1
Monitoring band width utilization
This means to monitor you have the connected link between two or more locations.
For example we can say, we have two organizations in different places. Head office is located in
Colombo, Sub branch is located in Kandy.
We are connected the two organizations with leased line.
What could be the threats of for the connection between these two organizations?
1) Natural disasters
Earth quick
Thunder storm
Heavy rain due to that flood
Landslide
Wind
Tsunami and etc.
2) Thief attack
3) Other threats
Due to these kinds of threats the connection between the two organizations can be disconnected.
Leased connectionColombo-Head office Kandy-Sub branch
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 27/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 27 of 50
For that purpose we have to check the link status every time. There are way to check the link
status .
1) Manual way
2) Automatic way
Manual way
We are going to check the connection from Colombo head office.
The IP address of the organizations
Lets say we want to check is there is connection between kandy sub branch.
Go to run and type cmd and press ok.
Figure 4.1.1
Leased connectionColombo-Head office
Kandy-Sub branch
209.85.231.109 209.85.231.104
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 28/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 28 of 50
In cmd type “ping 192.168.1.245 and you can check the connection. (Figure 4.1.2)
Figure 4.1.2
This is a manual method to check the connection between the organizations. You can’t check the
connection every time to time .
Because of this problem there are software to check these problems .
Automatic way/ software method
There are many types of softwares to monitor the network connection. In software method you
can easily identify the problems easily. You can run reports and identify the problems.
I have selected the software called CommTraffic to check to link status between the two
organizations.
This is software you can check in link status in connection.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 29/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 29 of 50
Details about this software
CommTraffic is a network utility for collecting, processing, and displaying traffic and
network utilization statistics for both LAN and dial-up computer network connections.
When monitoring a LAN segment, CommTraffic shows traffic and network utilization
statistics for each computer in the segment.
CommTraffic has a highly customizable, intuitive interface that displays statistics in
graphical and numeric form. The program's main window can be customized to display
incoming, outgoing, and summary traffic statistics in a variety of styles.
The program allows you to set time and traffic limits to reflect the rates set by your ISP.
Once the limit is approached, the program will alert you by playing a sound and
displaying a message.
CommTraffic allows you to generate an array of reports that reflect the network traffic
volume and Internet connection expenses.
The program supports virtually any rate plan your ISP might use, such as those based on
connection time, traffic volume, time of the day, and other measures.
This ensures that you are always aware of your Internet connection expenses.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 30/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 30 of 50
This is the starting page of the CommTraffic software. In this page you can see the incoming
and outgoing data’s of the links available. ( Figure 4.1.3)
Figure 4.1.3
In this page you can see the local host available of the link. ( Figure 4.1.4)
Figure 4.1.4
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 31/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 31 of 50
In this page you can see the remote host available on the network. (Figure 4.1.5)
Figure 4.1.5
In this page you can see the protocols of the network. (Figure 4.1.6)
Figure 4.1.6
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 32/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 32 of 50
The next page is local port available in the network. (Figure 4.1.7)
Figure 4.1.7
The next page is you can se the remote ports available. (Figure 4.1.8)
Figure 4.1.8
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 33/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 33 of 50
If there are any errors in the network you can identify the errors in this column. (Figure 4.1.9)
Figure 4.1.9
In the alarm section for Example Is there in any lost of connection in the network or there any
thing crashed you can give set alert message to your phone or to your mail address. You have to
manual configured the settings.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 34/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 34 of 50
In this page you set the change network, wizard, adapters, IP aliases, MAC aliases, port aliases
and etc settings. (Figure 4.1.10)
Figure 4.1.10
What are the advantages by using software to monitor bandwidth utilization and for link status
You can identify the problem easily by the software.
You can reduce the work of the administrator.
No extra man power needs to use for the monitor the connection.
The software checks the connection every time it makes the work easy.
You can avoid the mistake by the users.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 35/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 35 of 50
4.2
Memory usage
This means the how much the memory has been using for application. The memory is consumed
in the ram of the computer .you can check normally in Task manager of your computer.
It showed in figure 4.2.1.
Figure 4.2.1
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 36/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 36 of 50
Disk utilization
A dashboard view that displays, in seconds, the performance of disk bytes and disk . in this you
can see the disk performance.
Figure 4.2.3
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 37/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 37 of 50
Network usage
In network usage you can see what is the network is used and for which network the memory is
consuming very high. You can see the usage by draft design by the computer. It’s shown in
figure 4.2.4
Figure 4.2.4
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 38/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 38 of 50
Processor usage
This shows how the processor worked for different application. You can identify is the processor
is capable to work or not enough. According to the usage you can upgrade the processor. The
processor usage is shown in figure 4.2.5 and 4.2.6.
Figure 4.2.5
This window show what are the application running and how much memory is consumed by a
processor.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 39/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 39 of 50
You can identify Memory usage, Disk utilization, Network usage, Processor usage in software.
There are many soft wares to check these things. I have selected software called Resource
monitor. In this software we are going to look at the screen shots of Memory usage, Disk
utilization, Network usage, Processor usage.
Memory usage
The memory usage of the computer showed in figure 4.2.6
Figure 4.2.6
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 40/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 40 of 50
Disk utilization
The disk utilization is showed in figure 4.2.7
Figure 4.2.7
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 41/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 41 of 50
Network usage
The network usage is showed in figure 4.2.8
Figure 4.2.8
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 42/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 42 of 50
Processor usage
The processor usage is showed in figure 4.2.9
Figure 4.2.10
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 43/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 43 of 50
4.3
Event log
Event log means it contains the history of the records that happened in the computer. It contains
the hardware issues, software issues, security issues and etc.
To go to event log right click my computer Manage Event Viewer
Event logs have two types of logs
Application log
Security log
System log
Figure 4.3.1
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 44/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 44 of 50
Application log
The Application log contains events logged by applications or programs.
For example, a database program might record a file error in the application log. Programdevelopers decide which events to log.
Screen shot of the application log
Figure 4.3.2
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 45/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 45 of 50
Security log
The Security log contains events such as valid and invalid logon attempts, as well as events
related to resource use, such as creating, opening, or deleting files or other objects.
Administrators can specify what events are recorded in the security log. For example, if you have
enabled logon auditing, attempts to log on to the system are recorded in the security log.
Screen shot of the security log
Figure 4.3.3
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 46/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 46 of 50
System log
The System log contains events logged by Windows system components. For example, the
failure of a driver or other system component to load during startup is recorded in the system log.
The event types logged by system components are predetermined by Windows.
Figure 4.3.4
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 47/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 47 of 50
If we want to save the application log the producer to save the application event log. First right
click on the application event log and select “Save All Event as” option you will get a dialog
box.
Figure 4.3.4
In this dialog box select the location to save the file and the file format to save.
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 48/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 48 of 50
If you open the event log you can the details. It’s in text file format
Figure 4.3.5
8/3/2019 nos -final
http://slidepdf.com/reader/full/nos-final 49/50
KOT02/0000802 IDM-HND-ICT S/S_2nd
sem- Supporting NOS &OS Page 49 of 50
How to open a saved file?
Go to event viewer right click on the event viewer and select “Open saved Log” and select the
location and open the saved file.
Figure 4.3.5