1 / 62

Lesson 10-Managing a Network

Lesson 10-Managing a Network. Overview. Understand Windows network management tools. Implement Windows and NetWare network management. Understand Windows Network Management Tools. Windows XP Professional Workstation tools. Windows 2000 Server tools.

preston
Download Presentation

Lesson 10-Managing a Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lesson 10-Managing a Network

  2. Overview • Understand Windows network management tools. • Implement Windows and NetWare network management.

  3. Understand Windows Network Management Tools • Windows XP Professional Workstation tools. • Windows 2000 Server tools.

  4. Windows XP Professional Workstation Tools The management tools used to troubleshoot problems on local disks are: • Error-Checking tool. • Defragmentation tool. • Backup tool.

  5. Windows XP Professional Workstation Tools Disk drive tools

  6. Error-Checking Tool • The Error-Checking tool, also called the Check Disk tool, checks the drives for operating system or filing system errors. • The utility can also be initiated through the DOS 'chkdsk' command. • It must be ensured that the disk to be inspected by the Error-Checking tool is not in use.

  7. Error-Checking Tool Check Disk message box

  8. Error-Checking Tool Check Disk options

  9. Error-Checking Tool The following tasks are performed by the Error-Checking tool on NTFS volumes: • All actions taken during the repair process are tracked. • Bad clusters are repaired automatically. • Important information on all files is copied and stored on the disk.

  10. Defragmentation Tool • The Defragmentation tool is used to store data in a contiguous manner. • The tool also joins empty disk space together, ensuring that new files are stored in a contiguous manner.

  11. Defragmentation Tool • Defragmentation results in quicker data access and faster system performance. • To ensure effective operation, the tool requires that 15 percent of the total space on the volume should be available as free space.

  12. Defragmentation Tool Disk Defragmenter window

  13. Backup Tool • The Backup tool helps users maintain their systems. • Users can perform backup operations only if they are working with their own files, or if they have the Read, Read and Execute, Modify, or Full Control permission on the files. • Users must have either the Write, Modify, or Full Control permission on the original files to overwrite them.

  14. Windows XP Professional Workstation Tools Task Manager tool: • The Task Manager helps users to gather information about their computer, and also start or stop most of their own applications. • This tool can be activated either by using the Ctrl-Alt-Delete key combination, or by typing 'taskmgr' in the Run window.

  15. Windows XP Professional Workstation Tools Widows Task Manager Window

  16. Windows XP Professional Workstation Tools Each tab on the Task Manager window performs the following functions: • Applications – This tab is used to view the applications that are currently running on the system. • Processes – This tab is used to view the processes that are currently running.

  17. Windows XP Professional Workstation Tools Each tab on the Task Manager window performs the following functions (continued): • Performance – This tab provides users with dynamic information on the CPU and the page file. • Networking – This tab is used to view activity to or from each of the computer’s network connections.

  18. Windows 2000 Server Tools • Simple Network Management Protocol (SNMP) service. • Performance console. • Network Monitor.

  19. Simple Network Management Protocol (SNMP) Service • The SNMP is an Internet-standard protocol that monitors the system and sends status updates to a central location called the network management station (NMS). • The NMS is also called the host or the SNMP manager.

  20. Simple Network Management Protocol (SNMP) Service • Objects on the network, such as servers, workstations, printers, hubs, switches, and routers, are called nodes. • A network node monitored by the SNMP and managed by the SNMP manager is referred to as an agent. • Agents, the SNMP service, and all its other components are configured through the Services and Applications section of the Computer Management console.

  21. Simple Network Management Protocol (SNMP) Service Agents perform the following functions: • They respond to queries about their status. • They also send an alarm message, called a trap message, when they are configured to look for specific events and report their occurrence.

  22. Simple Network Management Protocol (SNMP) Service • The SNMP manager creates and maintains a Management Information Base (MIB), which lists the information on each node. • The information collected can include things such as network performance, security breaches or similar alarm events, and network auditing.

  23. Performance Console • The Performance console is a utility program that allows users to collect data about the system's performance. • The utility is preinstalled on both Windows 2000 Server and Windows XP Professional. • The Performance console is accessed through the Administrative Tools.

  24. Performance Console The following two utilities are used to monitor and analyze the system’s health: • System Monitor. • Performance Logs and Alerts.

  25. System Monitor • The System Monitor allows a user to view either the current or the recorded system activities using Performance Logs and Alerts. • Graph, histogram, and report are the three different views available in the System Monitor.

  26. System Monitor • Graph view – In this view, the data for each item being tracked is plotted along two axes - time along the horizontal axis and amplitude along the vertical axis. • Histogram view – This view displays the data along the same axis using bars. • Report view – This view displays the data in a summary format.

  27. Performance Logs and Alerts • Performance Logs and Alerts allow a user to configure and record the sampled data displayed in the System Monitor. • The sampled data, by default is stored in the Perflogs folder. • Alerts can be configured to send information when a predetermined condition, such as low drive space or high processor use, occurs.

  28. Network Monitor • The Network Monitor utility provides users with information about the local network. • The utility records a copy of the data flowing between the computers on the network and the server. • The utility also detects and alerts the user of any additional instances of the Network Monitor running on the network to ensure that traffic is not captured from the server.

  29. Implement Windows and NetWare Network Management • Windows networks. • NetWare networks.

  30. Windows Networks • Data compression • Quotas

  31. Data Compression • Data compression reduces the size of a file, so that the file takes less storage space. • Compression at the volume level compresses everything on the disk drive. • At the file level, a user can select individual files to be compressed. • Compression and encryption cannot be implemented at the same time.

  32. Data Compression • Windows 2000 and Windows XP Professional support compression only on NTFS volumes. • Compression can be employed at the file and folder level or at the entire volume level. • Each file on a volume has its own compressed or uncompressed condition attributes.

  33. Data Compression • Applications using compressed files check the compression state and uncompress any applicable files prior to using them. • All DOS and Windows based applications support compressed files.

  34. Data Compression Compression rules: • A file, when copied or moved to a new folder, will inherit the compression attributes of the new folder to which it is being copied or moved. • A file, if moved within the same volume (partition), will not inherit the new folder’s compression attributes.

  35. Data Compression Compression rules (continued): • When a file is copied or moved from a NTFS volume to a FAT partition, the file is first uncompressed and then copied. • When compression is implemented at the directory level, the user is given the option of leaving the object’s contents in their present compression state or imposing compression on all its contents.

  36. Quotas • Users are granted storage privileges on a first-come-first-served basis when networks are created and the storage space is unlimited. • Every user has equal access to the storage, but there are no limits. • Microsoft's implementation of disk quotas limits storage space on specified volumes anywhere on a network.

  37. Quotas • Quotas are an advanced storage feature that is available only on NTFS volumes. • The quota on a compressed volume is calculated on the basis of the uncompressed size of all stored files, regardless of the type. • Quotas can be configured to halt storage attempts when the quota limit is reached.

  38. Quotas • Quotas ensure an equitable distribution of limited networked resources. • A notice can also be sent to a user who exceeds the quota limit. • Quotas can also be configured to provide additional storage space to a few users.

  39. Quotas Volumes tab

  40. Quotas Quota tab

  41. NetWare Networks • Using the server console. • Using the MONITOR NLM. • Using the DSREPAIR NLM. • Using NWCONFIG.

  42. Using the Server Console • Server management involves extensive communication between the administrator and the server’s network operating system. • This communication takes the form of text-based commands and NetWare Loadable Modules (NLMs).

  43. Using the Server Console • Using text-based commands. • Using NetWare Loadable Modules.

  44. COMMAND DESCRIPTION NAME Returns the name of the server. TIME Returns the system time. Memory Returns the server’s total memory. HELP This command provides a list of common commands. LOAD <NLM> Reads the applicable NLM into the server’s RAM UNLOAD <NLM> Removes the applicable NLM from the server’s RAM DOWN Closes all open files/volumes and shuts down the server SECURE CONSOLE Removes DOS from the server; also allows loading NLMs only from SYS:SYSTEM Using Text-Based Commands Common NetWare Text Commands

  45. COMMAND DESCRIPTION MODULES Displays currently loaded NLMs CONFIG Displays server’s network interface card information DISPLAY NETWORKS Displays all networks to which the server has access DISPLAY SERVERS Displays all servers on which the server has information SET TIME Allows changing of the current system date and time SEND Allows transmitting message to currently logged on users Using Text-Based Commands Common NetWare Text Commands

  46. Using NetWare Loadable Modules • NLMs are commands stored in locations outside the operating system. • NLMs add functionality to the operating system's core capabilities. • By default, the NLM is located in SYS:SYSTEM.

  47. Using NetWare Loadable Modules • An operator must load the NLMs into the server’s memory to use them. • The LOAD command is used to read a particular module into the server’s memory.

  48. Using NetWare Loadable Modules NLM types

  49. Using NetWare Loadable Modules Common NLMs

  50. Using the MONITOR NLM • The server’s performance, operating statistics, and information about the connections made to the server can be accessed using the MONITOR at the server console. • The LOAD MONITOR or MONITOR command can be used at the console prompt to display information about the server.

More Related