Sei sulla pagina 1di 38

MCSE

• Microsoft Certified Systems Engineer (MCSE)


• Microsoft Certified Systems Engineer (or MCSE) [3] was the best-
known and premiere Microsoft certification for Windows Server
2003. It qualifies an individual as being able to analyze the
business requirements for information systems solutions, and
design and implement the infrastructure required. Certification is
available for the Windows Server 2003 technology, and was
previously offered in Windows Server 2000 and Windows NT 4.0.
• For the MCSE 2003, candidates must pass six core design exams
(Four networking exams, one client operating system and one
design exam) and one elective exam, for a total of seven exams.
For the MCSE 2000, a candidate needed to pass five Core Exams
(Four operating system exams, one design exam) and two
electives. Most of these exams have been retired. For the MCSE NT
4.0 (retired), a candidate needed to pass four Core Exams
(Networking Essentials, Windows NT Workstation, Windows NT
Server and Windows NT Server in the Enterprise) and two
electives. These exams have been retired.
• The topic of these exams include network security,
computer networking infrastructure, Active Directory,
System Administrator
• A system administrator's responsibilities might include:
• Analyzing system logs and identifying potential issues with
computer systems.
• Introducing and integrating new technologies into existing
data center environments.
• Performing routine audits of systems and software.
• Performing backups.
• Applying operating system updates, patches, and configuration
changes.
• Installing and configuring new hardware and software.
• Adding, removing, or updating user account information, resetting
passwords, etc.
• Answering technical queries.
• Responsibility for security.
• Responsibility for documenting the configuration of the system.
• Troubleshooting any reported problems.
Lecture 2- Introduction
• A system administrator, systems administrator, or sysadmin, is a person employed to maintain and
operate a computer system and/or network. System administrators may be members of an
information technology department.
• Business assurance is the main purpose of system administrator
• Two types of approaches
– Reactive (
– Proactive (Mentally prepared)
Two types of tools
• Diagnostic Tools
6. System Information (msinfo32)
7. Event Viewer (Eventvwr)
8. Performance Monitor (perfmon)
• Troubleshooting tools
Topic 13 Difference between Workgroup & Domain
Workgroup Domain
1) Local Users & Groups. 1) Global Users & Groups.
2) User have not assign network right. 2) User has right to network.
3) No Centralized authentication. 3) Centralized authentication.
4) Share level Permission. 4) Access level Permission.
5) Desktop level Security. 5) Full Security.
6) Local Profile of users. 6) Roaming Profile.

Lecture 2
Diagnostic

1-System information
tools

• System Information collects and displays your system configuration


information. Support technicians require specific information about your
computer so they can resolve your system problem. You can use System
Information to quickly find the data they need.

To convert a volume to NTFS from the command prompt


Open Command Prompt. Click Start, point to All Programs, point to Accessories, and then click
Command Prompt.
In the command prompt window, type: convert drive_letter: /fs:ntfs 
For example, typing convert D: /fs:ntfs would format drive D: with the ntfs format. You can convert FAT or FAT32
volumes to NTFS with this command.
Important  Once you convert a drive or partition to NTFS, you cannot simply convert it back to FAT or FAT32.
You will need to reformat the drive or partition which will erase all data, including programs and personal files,
Notes
To open System Information, click Start, and then click Run. In the
Open box, type msinfo32.exe.

Lecture 2
2-Event Viewer
• Event Viewer maintains logs about
program, security, and system
events on your computer. You can
use Event Viewer to view and
manage the event logs, gather
information about hardware and
software problems, and monitor
Windows security events.
Notes
To open Event Viewer, click Start, click Control Panel, double-click
Administrative Tools, and then double-click Event Viewer.
OR Clikc run and then write eventvwr in test box
Lecture 2
3- Performance Monitor
• You can use Performance to collect
performance data automatically from local
or remote computers. You can define start
and stop times for automatic log
generation, manage multiple logging
sessions from a single console window,
and set an alert on a computer, allowing a
message to be sent or a log to be started
when your criteria is met.
Notes
Open run command and the write perfmon dialogue box
Lecture 2
Installation
There are two typos of Installation
• Attendant
• Un- attendant

CMD Commands: ping , ipconfig /all, hostname,(This command


shows local host name in the network.) , Net view,

Lecture 3
Remote Installation services
Pre-Requists for RIS
Domain Name Server
Active Directory Services
DHCP
Installation of DHCP and DNS
– Goto start – settings – control panel – add remove programs -
add remove windows components – networking services – then
choose DNS and DHCP

• Installation of ADS (Active Directory Services)


• Start - run – dcpromo

• Installation of RIS
• Gotostart – settings – control panel – add remove programs - add
remove windows components – choose RIS from List (a RIS wizard

Lecture 4
System Properties Dialogue
Box
Driver Signage
Digital Signature (WHQL) Active Directory Services
use run-sigverif
Right click on My computer and then clikc Hardware and then
choose Driver signage
change the policy to block (by default warn) \// aplicable for
local computer only

For Group Policy (applicable for all the systems in DNS environment)
Start – Open Active Directory users {(start – run- dsa.msc) or start –
administrative tools – active directory users and computers }
Step 2: Open Domain Property Dialog Box (MCSE.com)
Step 3: Modify Default Domain Policy
Group policy – Computer Configuration – windows settings – security
setting – local policy – security option – devices: unsigned driver

Lecture 4
System Properties
Topic: Driver Signage
Windows hardware qualified lab (WHQL)
System Properties-Hardware-Driver Signage
Three actions
•Ignore

•warn

•block

Group Policy
To control whole environment in LAN
File Signature Verify Tool (run – Sigverif)

Lecture 4
System Properties
Environment Variable (variable : Source of Shortcut
•  Environment variables are a vital scheme for both querying and setting
vital information for serious software applications. They are one of the
techniques that when you master, you will be able to perform tasks that
are totally un-accomplishable using *ANY* other technique
• .
• Environment variables are strings that save information about the
entire environment in your system. These string values are dynamic
and they can affect the way your system will behave on. Environment
variables can be classified into two main types:
• System Variables: They affect the entire system whatever the current
user is. They are defined by Windows and saved in the registry. You
need to be an administrator to be able to modify them. You usually
need to restart your computer to make these changes effective.
• User Variables: They affect the current environment of the current
system user. They can be deleted, modified, and added by any system
user. They are used by Windows setup, by some programs, and by
users. Changes to these variables are saved to the registry and be
effective immediately.
Lecture 5
System Properties
You can add new environment variable, modify or delete an existing one using one
of the following ways.
• -Right click my computer, and then click Properties.
-Choose the Advanced tap in the System Properties dialog box.
-Click the Environment Variables button. The Environment dialog will appear as
shown in figure1.
-Select the variable you need to modify or delete, then click the suitable button.

• Example
• Local Environment Variables
• %USERNAME%: represents the current user name.
System Environment Variables
• %SYSTEMDRIVE%: represents the drive that contains the Windows root
directory.

Cmd:Net view Cmd: set


Run: %systemdrive% Run – sigverif / advanced / path (c:\
e.g) 

Run dsa.msc Run mmc


Lecture 5
User Profile
There are three types of User Profile
1. Local Profile
2. Roaming Profiles
3. Mandatory Profiles
The majority of the information stored on your Windows Profile is your personal desktop. Along with your
desktop, the other things your profile stores are your My Documents, Internet Explorer favorites,
your printer definitions, and user-defined drive mappings. If you are a MS-Outlook user your email,
address book, and calendar are also stored on your profile.
User profiles allow a user to keep their personalized settings so they do not have to reconfigure their
computer each time they log onto the computer. However, if you want users to have a pre-
configured desktop environment, you can assign a mandatory user profile. The procedure for
implementing this is described below.
• Local Profile
The local profile is not the default type of profile within the department, but rather is when the data
and config files are kept on the local machine. Any changes that are made to a local profile are kept
only on that machine. The local profile is stored in the Documents and Settings folder on your C:
drive.

Lecture 6
User Profile
Roaming Profile

A roaming profile is the default profile type within the department; it will follow you to any computer
that you work on. Every time you log on, your roaming profile is checked with Demeter, one of our
domain controllers. Any changed files are at synchronized at this point. Each person has his/her
own individual profile stored on Demeter in the profiles directory under his/her username. Logging
on to a computer accesses your profile and loads it to make it available to you. You are then able to
use that computer as it if were your personal computer even if it is not. At the end of your session
when you log off, your roaming profile is updated on Demeter with any changes you have made on
that computer though a few cache directories are excluded. You will be able to access your new
profile from any other computer you want to work on.

Mandatory Profile

• Click Start and click Control Panel.


• Double click the System
• Select the Advanced tab.
• Click the Settings button under User Profiles.
• Select the profile you want to use and click Copy To.
• Type in the path to the location of the shared folder you created before beginning these steps. Click
OK.
• Under Permitted to use, ensure that the appropriate users are listed.

Lecture 6
Hub: - A hub is a "unintelligent" broadcast device -- any packet entering any port is
broadcast out on every port. Hubs do not manage any of the traffic that comes
through their ports. Since every packet is constantly being sent out through every

Cabling
port, you end up with packet collisions, which greatly impede the smooth flow of
traffic on your LAN. Provides Shared bandwidth. It is physical layer device. Single
collision Domain. Multiport Repeater. No VLAN (Virtual LAN).

Switch:-A switch, on the other hand, isolates ports -- every received packet is
sent out only to the port on which the target may be found (one caveat - if the
proper port cannot be determined, then the switch will broadcast the packet to
•  Topic 3 Types of Cabling all ports). Essentially, a switch is a router, but one operating at the MAC level
rather than the IP level. Since the switch is intelligently sending packets only
•  Straight Cabling where they need to go, and not everywhere willy-nilly, the performance speed
• Cross Cabling of your network can be greatly increased. Provide Full bandwidth.Datalink layer
Device. Multiple Collision Domains. Forward & Filtering Decision. VLAN
• Roll-over Cabling available.

Topic 10 Difference between Hub & Switch


HUB SWITCH

• 1) Shared Bandwidth 1) Provide full Bandwidth.


• 2) Physical layer device 2) Datalink layer device.
• Straight
3) Single collision Domain Cross
3) Multiple Collision Domain. Roll Over
• 4) Multiport repeater.
Cabling Cabling
4) Forward & Filtering Decision. Cabling
• 5) No VLAN (Virtual Lan) 5) VLan.
Quota
Create a shared folder and assign appropriate security
Specify path in user prperties dialogue box
Specify UNC path \\pc1\home

Right click on drive then goto Quota select enable quota


Select enable quota management
Select Deny disk space to users according quota Limit
Choose Limit for users
Select Log event when a user exceed their quota limit
Select Log event when a user exceed their warning level

For new users


Right click on drive - quota – quota entry – new quota entry
add user and set limit
For existing users

For Existing user


Right click on drive - quota – quota entry – right click on user and
go to properties and then select limit
Import /Export Quota Entries in case of low disk space

May 27, Lecture 7


File Systems
FAT16 FAT32 NTFS
Windows 9.x Yes Yes No
Windows NT Yes No Yes
Windows 2k/2k3 Yes Yes Yes

• NTFS is more powerful than FAT or FAT32, and includes features required for hosting
Active Directory as well as other important security features. You can use features such as
Active Directory and domain-based security only by choosing NTFS as your file system.
• It is easy to convert partitions to NTFS. The Setup program makes conversion easy, whether
your partitions used FAT, FAT32, or the older version of NTFS. This kind of conversion keeps your
files intact (unlike formatting a partition). If you do not need to keep your files intact and you
have a FAT or FAT32 partition, it is recommended that you format the partition with NTFS rather
than convert from FAT or FAT32. Formatting a partition erases all data on the partition and
allows you to start with a clean drive. Whether a partition is formatted with NTFS or converted
using the convert command, NTFS is the better choice of file system. For more information
about Convert.exe, after completing Setup, click Start, click Run, type cmd, and then press
ENTER. In the command window, type help convert and then press ENTER.
• In order to maintain access control on files and folders and support limited accounts, you must
use NTFS. If you use FAT32, all users will have access to all files on your hard drive, regardless
of their account type (administrator, limited, or standard.)
• NTFS is the file system that works best with large disks. (The next best file system for large
disks is FAT32.)

May 27, Lecture 7


File Systems
• File Allocation Table (FAT)
A file system used by MS-DOS and other Windows-based operating
systems to organize and manage files. The file allocation table
(FAT) is a data structure that Windows creates when you format a
volume by using the FAT or FAT32 file systems. Windows stores
information about each file in the FAT so that it can retrieve the file
later.
• FAT32
A derivative of the file allocation table (FAT) file system. FAT32
supports smaller cluster sizes and larger volumes than FAT, which
results in more efficient space allocation on FAT32 volumes.
• NTFS File System
An advanced file system that provides performance, security,
reliability, and advanced features that are not found in any version
of FAT. For example, NTFS guarantees volume consistency by using
standard transaction logging and recovery techniques. If a system
fails, NTFS uses its log file and checkpoint information to restore
the consistency of the file system. In Windows 2000 and Windows
XP, NTFS also provides advanced features such as file and folder
permissions, encryption, disk quotas, and compression.
Encryption
• Encrypting File System (EFS) provides the core file encryption technology used to
store encrypted files on NTFS file system volumes. Once you encrypt a file or folder,
you work with the encrypted file or folder just as you do with any other files and
folders.
• Encryption is transparent to the user that encrypted the file. This means that you do
not have to manually decrypt the encrypted file before you can use it. You can open
and change the file as you normally do.
• A feature in this version of Windows that enables users to encrypt files and folders on
an NTFS volume disk to keep them safe from access by intruders.
• public key encryption
• A method of encryption that uses two encryption keys that are mathematically
related. One key is called the private key and is kept confidential. The other is called
the public key and is freely given out to all potential correspondents. In a typical
scenario, a sender uses the receiver's public key to encrypt a message. Only the
receiver has the related private key to decrypt the message. The complexity of the
relationship between the public key and the private key means that, provided the
keys are long enough, it is computationally infeasible to determine one from the
other. Public key encryption is also called asymmetric encryption.
• private key
• The secret half of a cryptographic key pair that is used with a public key algorithm.
Private keys are typically used to decrypt a symmetric session key, digitally sign
data, or decrypt data that has been encrypted with the corresponding public key.
• symmetric encryption
• An encryption algorithm that requires the same secret key to be used for both
Type: nslookup /help in command prompt to check server
May 29, Lecture 8
Encryption
To encrypt a file or folder
• Open Windows Explorer.
• Right-click the file or folder that you want to encrypt, and then click Properties.
• On the General tab, click Advanced.
• Select the Encrypt contents to secure data check box.

• When you work with encrypted files and folders, keep in mind the following
information:
• Only files and folders on NTFS volumes can be encrypted. Because WebDAV works
with NTFS, NTFS is required when encrypting files over WebDAV.
• Files or folders that are compressed cannot also be encrypted. If the user marks a file
or folder for encryption, that file or folder will be uncompressed.
• Encrypted files can become decrypted if you copy or move the file to a volume that is
not an NTFS volume.
• Moving unencrypted files into an encrypted folder will automatically encrypt those
files in the new folder. However, the reverse operation will not automatically decrypt
files. Files must be explicitly decrypted.
• Files marked with the System attribute cannot be encrypted, nor can files in the
systemroot directory.
• Encrypting a folder or file does not protect against deletion or listing files or
directories. Anyone with the appropriate permissions can delete or list encrypted

May 29, Lecture 8


Encryption - Using Cipher Command
Displays or alters the encryption of folders and files on NTFS volumes. Used without
parameters, cipher displays the encryption state of the current folder and any files it
contains.
Syntax
cipher [{/e|/d}] [/s:dir] [/a] [/i] [/f] [/q] [/h] [/k] [/u[/n]] [PathName [...]] |
[/r:PathNameWithoutExtension] | [/w:PathName]
Parameters
• /e Encrypts the specified folders. Folders are marked so that files that are added to the folder later
are encrypted too.
• /d Decrypts the specified folders. Folders are marked so that files that are added to the folder later
are encrypted too.
• /s: dir Performs the selected operation in the specified folder and all subfolders.
• /a Performs the operation for files and directories.
• /i Continues performing the specified operation even after errors occur. By default, cipher stops
when it encounters an error.
• /f Forces the encryption or decryption of all specified objects. By default, cipher skips files that
have been encrypted or decrypted already.
• /q Reports only the most essential information.
• /h Displays files with hidden or system attributes. By default, these files are not encrypted or
decrypted. /k Creates a new file encryption key for the user running cipher. If you use this option,
cipher ignores all of the other options.
• /u Updates the user's file encryption key or recovery agent's key to the current ones in all of the
encrypted files on local drives (that is, if the keys have been changed). This option only works with
/n.
• /n Prevents keys from being updated. Use this option to find all of the encrypted files on the local

May 29, Lecture 8


Data Compression
File compression overview
• Compressing files, folders, and programs decreases their size and reduces the amount of space they use on your
drives or removable storage devices. Drive compression decreases the amount of space used by all of the files
and folders stored on that drive.
• Windows supports two types of compression: NTFS compression and compression using the Compressed (zipped)
Folders feature.
NTFS compression versus Compressed (zipped) Folders
• NTFS compression
• If you do not have an NTFS drive, this option is not available. To determine whether your drive is formatted with
NTFS, open My Computer, right-click a drive, and then click Properties. The file system is indicated on the
General tab.
• You can compress individual files and folders using NTFS compression, as well as entire NTFS drives.
• You can compress a folder without compressing its contents.
• You can work with NTFS-compressed files without decompressing them.
• You can display NTFS-compressed file and folder names in a different color to make them easier to identify.
• You may notice a decrease in performance when working with NTFS-compressed files. When you open a
compressed file, Windows automatically decompresses it for you, and when you close the file, Windows
compresses it again. This process may decrease your computer’s performance.
• NTFS-compressed files and folders only remain compressed while they are stored on an NTFS drive.
• You cannot encrypt an NTFS-compressed file.
• NTFS file encryption is not available on Windows XP Home Edition.
• Compressed (zipped) Folders
• Files and folders that are compressed using the Compressed (zipped) Folders feature remain compressed on both
FAT and NTFS drives.
• You can run some programs directly from these compressed folders without decompressing them. You can also
open files directly from compressed folders.
• Zipped compressed files and folders can be moved to any drive or folder on your computer, the Internet, or your
network, and they are compatible with other file compression programs.
• Folders compressed using this feature are identified by a zipper icon.
• You can protect files in a zipped compressed folder with a password.

June 03, Lecture 8


Data Compression
• NTFS compression
• If you do not have an NTFS drive, this option is not available. To determine whether your drive is formatted with
NTFS, open My Computer, right-click a drive, and then click Properties. The file system is indicated on the
General tab.
• You can compress individual files and folders using NTFS compression, as well as entire NTFS drives.
• You can compress a folder without compressing its contents.
• You can work with NTFS-compressed files without decompressing them.
• You can display NTFS-compressed file and folder names in a different color to make them easier to identify.
• You may notice a decrease in performance when working with NTFS-compressed files. When you open a
compressed file, Windows automatically decompresses it for you, and when you close the file, Windows
compresses it again. This process may decrease your computer’s performance.
• NTFS-compressed files and folders only remain compressed while they are stored on an NTFS drive.
• You cannot encrypt an NTFS-compressed file.
• NTFS file encryption is not available on Windows XP Home Edition.

• Compressed (zipped) Folders


• Files and folders that are compressed using the Compressed (zipped) Folders feature remain compressed on both
FAT and NTFS drives.
• You can run some programs directly from these compressed folders without decompressing them. You can also
open files directly from compressed folders.
• Zipped compressed files and folders can be moved to any drive or folder on your computer, the Internet, or your
network, and they are compatible with other file compression programs.
• Folders compressed using this feature are identified by a zipper icon.
• You can protect files in a zipped compressed folder with a password.
• Compressing folders using Compressed (zipped) Folders will not decrease your computer's performance.
• To compress individual files using Compressed (zipped) Folders, create a compressed folder and then move or
copy the files to that folder.

• By

June 03, Lecture 8


Compression - Using compact command
• Compact
• Displays and alters the compression of files or directories on NTFS partitions. Used
without parameters, compact displays the compression state of the current
directory.
• Syntax
• compact [{/c | /u}] [/s[:Dir]] [/a] [/i] [/f] [/q] [FileName[...]]

• Parameters
• /c Compresses the specified directory or file.
• /u Uncompresses the specified directory or file. /s[:Dir] Specifies that the requested
action (compress or uncompress) be applied to all subdirectories of the specified
directory, or of the current directory if none is specified.
/a Displays hidden or system files.
• /i Ignores errors.
• /f Forces compression or uncompression of the specified directory or file. This is used
in the case of a file that was partly compressed when the operation was interrupted
by a system crash. To force the file to be compressed in its entirety, use the
• /c and
• /f parameters and specify the partially compressed file.
• /q Reports only the most essential information. FileName Specifies the file or
directory. You can use multiple file names and wildcard characters (* and ?).
• /? Displays help at the command prompt.

June 03, Lecture 8


Disk Management
• Disk Management is a system utility for managing hard disks and the volumes, or partitions, that they
contain. With Disk Management, you can initialize disks, create volumes, format volumes with the FAT, FAT32
, or NTFS file systems, and create fault-tolerant disk systems. Disk Management enables you to perform most
disk-related tasks without restarting the system or interrupting users; most configuration changes take effect
immediately.

• Basic and dynamic disk storage.


• Basic disks contain basic volumes, such as primary partitions and logical drives in extended partitions. Use
basic disks on portable computers or when you plan to install multiple operating systems in different
partitions on the same disk. For more information, see Basic disks and volumes.
• Dynamic disks contain dynamic volumes that offer more features than basic disks, such as the ability to
create fault-tolerant volumes on the Microsoft® Windows® 2000 Server family or Microsoft® Windows®
Server 2003 family of operating systems. You can extend dynamic volumes (except system or boot volumes),
mirror dynamic volumes, and add new dynamic disks without restarting the computer. For more information,
see Dynamic disks and volumes.

1. Basic disks and volumes


• A basic disk is a physical disk that contains primary partitions, extended partitions, or logical drives.
Partitions and logical drives on basic disks are known as basic volumes. You can only create basic volumes
on basic disks.
• The number of partitions you can create on a basic disk depends on the disk's partition style:
• On master boot record (MBR) disks, you can create up to four primary partitions per disk, or you can create
up to three primary partitions and one extended partition. Within the extended partition, you can create
unlimited logical drives.
• On GUID partition table (GPT) disks, you can create up to 128 primary partitions. Because GPT disks do not
limit you to four partitions, you do not need to create extended partitions or logical drives.

You can add more space to existing primary partitions and logical drives by extending them into adjacent, contiguous unallocated

05-06- Lecture 8
Disk Management- basic disk
Basic Disks – partition – primary partition – extended – Logical partitions

primary partition
• A type of partition that you can create on basic disks. A primary partition is a portion of a physical disk that
functions as though it were a physically separate disk. On basic master boot record (MBR) disks, you can
create up to four primary partitions on a basic disk, or three primary partitions and an extended partition
with multiple logical drives. On basic GUID partition table (GPT) disks, you can create up to 128 primary
partitions. Also known as a volume.

Extended partition
• A type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are
useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do
not format an extended partition with a file system and then assign a drive letter to it. Instead, you create
one or more logical drives within the extended partition. After you create a logical drive, you format it and
assign it a drive letter. An MBR disk can have up to four primary partitions or three primary partitions, one
extended partition, and multiple logical drives.

Logical drive
• A volume that you create within an extended partition on a basic master boot record (MBR) disk. Logical
drives are similar to primary partitions, except that you are limited to four primary partitions per disk,
whereas you can create an unlimited number of logical drives per disk. A logical drive can be formatted and
assigned a drive letter.

05-06- Lecture 8
Disk Management- basic disk
• To open Computer Management, click Start, click Control Panel, double-click Administrative Tools, and then
double-click Computer Management.

• To create a partition or logical drive


• Right-click an unallocated region of a basic disk, and then click New Partition, or right-click free space in an
extended partition, and then click New Logical Drive.
• In the New Partition wizard, click Next, click Primary partition, Extended partition, or Logical drive, and then
follow the instructions on your screen.
To format a basic volume
• Right-click the partition, logical drive, or basic volume you want to format (or reformat), and then click Format.
• Select the options you want, and then click OK.

• You can create primary partitions, extended partitions, and logical drives only on basic disks. You should create
basic volumes instead of dynamic volumes if this computer also runs MS-DOS, Windows 95, Windows 98,
Windows Millennium Edition, Windows NT 4.0, or Windows XP Home Edition.
• On a master boot record (MBR) disk, you can create up to four primary partitions, or three primary partitions, one
extended partition, and unlimited logical drives.
• On a GUID partition table (GPT) disk, you can create up to 128 primary partitions.

Note: You cannot format system, boot, OEM, or unknown partitions. File compression
is supported only on NTFSvolumes with cluster sizes 4 KB and smaller.

June 05, Lecture 8


Disk Management- Dynamic Disk
Dynamic volume: Dynamic disks refer to volumes. Using dynamic disks we can implement and extend volumes and implement raid. Dynamic disk
can be
attached or detached on the file. Volume is made up of free space club or merged fro more than one H.D. volumes avoid using of
multiple drive letters or drives.
Dynamic disks provide features that basic disks do not, such as the ability to create volumes that span multiple disks (spanned
and striped volumes), and the
ability to create fault tolerant volumes (mirrored and RAID-5 volumes). All volumes on dynamic disks are known as dynamic
volumes.

Converting dynamic disks to basic disks. After you convert a basic disk into a dynamic disk, you cannot change the dynamic
volumes back to partitions. Instead,
you must move or back up your data, delete all dynamic volumes on the disk andONLY FOR
then convert the disk. For more information,
Installing the Windows Server 2003 family of operating systems. WIN XP
2K3
SERVER
There are five types of volumes 2K Server
11. Simple Volume Required minimum one Dynamic Disk &
12. Spanned Volume Required HD min: 2 Max 32 2K3
15. Stripped Volume Required HD min: 2 Max 32
16. Mirrored Volume Required HD Only two dynamic disk
17. RAID-5 Volume Required HD min: 3 Max 32

There are five types of dynamic volumes: simple, spanned, striped, mirrored, and RAID-5. Mirrored and RAID-5 volumes are
fault tolerant and are available only
on computers running Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, or the Windows
Server 2003 family of
operating systems. You can, however, use a computer running Windows XP Professional to remotely create mirrored and RAID-5
volumes on these
operating systems.

Portable computers and removable media


Dynamic disks are not supported on portable computers, removable disks, detachable disks that use Universal Serial Bus (USB)

June 5, Lecture 8
Disk Management- Dynamic Disk
Simple Volumes:

simple volumes are similar to partitions which can be created only one Hard disk which do not offer fall tolerance.
A dynamic volume made up of disk space from a single dynamic disk. A simple volume can consist of a single region on a disk or
multiple regions of the same disk
that are linked together. If the simple volume is not a system volume or boot volume, you can extend it within the same disk or
onto additional disks. If you
extend a simple volume across multiple disks, it becomes a spanned volume. You can create simple volumes only on dynamic
disks. Simple volumes are not fault
tolerant, but you can mirror them to create mirrored volumes on computers running the Windows 2000 Server or Windows
Server 2003 families of operating
systems.

You can create simple volumes on dynamic disks only.


You cannot extend volumes formatted using FAT or FAT32.
Simple volumes are not fault tolerant.
Simple volumes can only be accessed by Windows 2000, Windows XP Professional, and the Windows Server 2003 family of
operating systems.

Creating simple volumes:

Open disk management - Right click on the black bar - New – volume - Select simple volume - Alter the space – next
- Drive letter - File system
Check box perform quick format

Spanned Volume:

A volume can be created by selecting the free space from more than 1 Hdd
A dynamic volume consisting of disk space on more than one physical disk. You can increase the size of a spanned volume by
extending it onto additional

June 05, Lecture 8


Disk Management- Dynamic Disk
Stripped Volume:

A dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated
alternately and evenly (in stripes)
across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but
they do not provide fault
tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. You can create striped volumes
only on dynamic disks.
Striped volumes are not fault tolerant and cannot be extended or mirrored.
You need at least two dynamic disks to create a striped volume. You can create a striped volume onto a maximum of
32 disks.

Mirrored Volume OR RAID-1:

A fault-tolerant volume that duplicates data on two physical disks. A mirrored volume provides data redundancy by
using two identical volumes,
which are called mirrors, to duplicate the information contained on the volume. A mirror is always located on a
different disk. If one of the
physical disks fails, the data on the failed disk becomes unavailable, but the system continues to operate in the
mirror on the remaining disk. You
can create mirrored volumes only on dynamic disks on computers running the Windows 2000 Server or Windows
Server 2003 families of
operating systems. You cannot extend mirrored volumes.
You need two dynamic disks to create a mirrored volume.
Both copies (mirrors) of the mirrored volume share the same drive letter.

Implementation of mirror:
• Create a simple volume ex: 100mb
• Right click on S.V. and add mirror

June 08, Lecture 8


Disk Management- Dynamic Disk
RAID: (Redundancy Array Inexpensive Disks or Independent disks)

A fault-tolerant volume with data and parity striped intermittently across three or more physical disks. Parity is a calculated value
that is used to reconstruct
data after a failure. If a portion of a physical disk fails, Windows recreates the data that was on the failed portion from the
remaining data and parity. You can
create RAID-5 volumes only on dynamic disks on computers running the Windows 2000 Server or Windows Server 2003 families
of operating systems. You
cannot mirror or extend RAID-5 volumes. In Windows NT 4.0, a RAID-5 volume was known as a striped set with parity.

• RAID 5 Striping with parity


• Requires min 3Hdds max 32 Hdds.
• Offers highest fault tolerance
• Data is written evenly on to all member striped volumes and
• Parity information is also added.
• Parity bit: It is mathematical calculation added to every piece of data and used for
• regenerating the data when any HDD fails.
• Offers performance and availability
• I/O performance: Reading and writing both are fast.

• You can create RAID-5 volumes only on computers running Windows 2000 Server, Windows 2000 Advanced Server,
Windows 2000 Datacenter Server, or the Windows Server 2003 family of operating systems.
• You need at least three (but no more than 32) dynamic disks to create a RAID-5 volume.
• RAID-5 volumes provide fault tolerance at a cost of only one additional disk for the volume. For example, if you use three
10-GB disks to create a RAID-5 volume, the volume will have a 20-GB capacity. The remaining 10-GB is used for parity.
• RAID-5 volumes cannot be extended or mirrored.

Parity
• A calculated value that is used to reconstruct data after a failure. RAID-5 volumes stripe data and parity intermittently
across a set of disks. When a disk fails, some server operating systems use the parity information together with the data on

June 08, Lecture 8


Disk Management by Using DISKPART
DiskPart
DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using
scripts or direct input from a
command prompt. Before you can use DiskPart.exe commands, you must first list, and then select the object to give it focus.
When an object has focus, any
DiskPart.exe commands that you type will act on that object.
Basic Disk Function by Using Diskpart

June 08, Lecture 8


Disk Management by Using DISKPART
DiskPart
DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using
scripts or direct input from a
command prompt. Before you can use DiskPart.exe commands, you must first list, and then select the object to give it focus.
When an object has focus, any
DiskPart.exe commands that you type will act on that object.
Dynamic Disk Function by Using Diskpart

June 08, Lecture 8


Internet Explorer Properties

• Folder auditing
– to check security & EVETNS
– Monitoring of folders
R.C on properties – security – advanced

• Customization of internet explorer


Modify four things
– proxy settings
– Toolbar customization
– Custom toolbar buttons
– Security

Steps
Open active director – domain properties – modify default domain policy –
refresh group policy – verify
Run- dsa.msc
A: computer configuration – administrative- windows component –

June 10,
Program Compatibility
Wizard

June 10,
Boot Process OR Booting

In computing, booting (booting up) is a bootstrapping process that starts operating systems when the user
turns on a computer system. A boot sequence is the initial set of operations that the computer performs
when power is switched on. The bootloader typically loads the main operating system for the computer.

OS= drivers +devices


The process in which OS loaded from H.D into RAM
When system is off OS is in hard disk- when system is on OS is in RAM-ROM
Boot Files
Ntloader - mandatory – first loaded during when press on button, used to build the operating system menu
choices
Boot.ini - mandatory – ntloader load boot.ini
Ntdetect.com - mandatory – when you select OS and then enter it loaded, check all h/w like modem
etc. ntdetect create resource map.
Ntbootdd.sys - optional – incase of SCSI drive
Bootsect.dds - optional – incase os dual booting with DOS Based OS (95-98 + XP, 2000 etc)

Boot Sector (Where boot files placed)


BIOS transfer Boot sector to RAM from HD (The BIOS points to the boot device, and the Master Boot Record
(MBR) is loaded.
POST : post on self test ( check all h/w when os start)
BIOS : Read content of MBR
Boot Sector: active partition is loaded into memory – always in active partition

Boot process:

June 12,
Boot loader
• A computer's central processor can only execute program code found in Read-Only Memory (ROM) and
Random Access Memory (RAM). Modern operating systems and application program code and data are
stored on nonvolatile data storage devices, such as hard disc drives, CD, DVD, USB flash drive, and
floppy disk. When a computer is first powered on, it does not have an operating system in ROM or RAM. The
computer must initially execute a small program stored in ROM along with the bare minimum of data needed
to access the nonvolatile devices from which the operating system programs and data are loaded into RAM.
• The small program that starts this sequence of loading into RAM, is known as a bootstrap loader, bootstrap or
boot loader. This small boot loader program's only job is to load other data and programs which are then
executed from RAM. Often, multiple-stage boot loaders are used, during which several programs of
increasing complexity sequentially load one after the other in a process of chain loading.

Boot Disk
• A boot disk is a removable digital data storage medium from which a computer can load and run (boot) an
operating system or utility program. The computer must have a built-in program which will load and execute
a program from a boot disk meeting certain standards.
• Boot disks are used for:
– Operating system installation.
– Data recovery.
– Data purging.
– Hardware or software troubleshooting.
– Customizing an operating environment.
– Software demonstration.
– Administrative access in case of lost password is possible with an appropriate boot disk with some
operating systems.
Configuring the BOOT.INI File

If you are using an x86-based system, it is critical that the BOOT.INI file be configured properly.
This file is created during the Windows XP Professional installation and is stored in the system
root partition. The BOOT.INI file contains the information required by NTLDR to create and
display the boot startup menu.
The information that is contained in the BOOT.INI file includes:
• The path to the boot partition
• Descriptive text that should be displayed on the boot startup menu
• Optional parameters for managing computer startup
• Optional support for multiple boot configurations if other Microsoft operating systems
have been installed in separate partitions

The BOOT.INI file contains two main sections for configuration: the Boot Loader and Operating Systems. Options that
are configured in the Boot Loader section are applied to all Windows installations on the computer. Settings in the
Operating Systems section are applied only to the
specific Windows installation that is referenced within the Operating Systems section.
The following is an example of text that you might see in a BOOT.INI file.
[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(0)partition(1) \Windows
[operating systems]
multi(0)disk(0)rdisk(0)partition(1) \Windows=”Microsoft Windows XP
Professional” /fastdetect
In the following sections, you will learn about Boot Loader configuration options, ARC
naming conventions, BOOT.INI operating system parameters, options for editing the BOOT.INI

Potrebbero piacerti anche