Network Operating Systems Examples

Slides:



Advertisements
Similar presentations
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Advertisements

COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Chapter Five Users, Groups, Profiles, and Policies.
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Homework 3.2 Clients Hub What’s wrong with this picture? Clients Using 100TX.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
Chapter 12 Reading assignment n From “Running Linux”, on reserve at PSU Main library (2-hour checkout) Chapter 1 (pages 1 through 41)Chapter 1 (pages 1.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Network Protocols and Standards (Part 1). Network Protocols Understanding the concepts of networking protocols is critical to being able to troubleshoot.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
1 Chapter Overview Network Operating Systems Network Clients Directory Services.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Internet Packet eXchange Protocol (IPX) Network Documentation
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9: Novell NetWare
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chapter Two Defining Network Objects. Chapter Objectives Describe how a workstation communicates with the network, and list the software components required.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Configuring the network server GOUP 3 ® WORKGROUP: Mr. YUSUF Mr. BULHAN Mr. ABSHIR Mr. OSMAN.
Chapter Two Clients and Servers: Who’s the Boss?.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Networking in Windows NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Course ILT Basic networking concepts Unit objectives Compare various types of networks Discuss types of servers Discuss LAN topologies Discuss planning.
Microsoft enterprise concepts. NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Lecture 6: Examples on Windows Operating Systems.
Lecture 4: Windows Operating Systems. Symmetric Multiprocessing Memory Operating System User Thread User Thread User Thread User Thread Operating System.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
© Copyright Nanda Ganesan1 CHAPTER NT Domains. © Copyright Nanda Ganesan2 Chapter Objectives Give an overall picture of the NT networking architecture.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
CHAPTER Network Operating System Concepts. Chapter Objectives Provide an overview of network operating systems and its functions Explain the concept of.
Networking Basics.
Introducing, Installing, and Upgrading Windows 7
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Introduction to Networks
A Network Operating System
Module 8: Networking Services
Introduction to Operating Systems
Lecture 4: Windows Operating Systems
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Chapter 3: Windows7 Part 4.
Comparison of LAN, MAN, WAN
Networks Software.
An Introduction to Computer Networking
Lesson 16-Windows NT Security Issues
Lecture 4 Communication Network Protocols
Network+ Guide to Networks, Fourth Edition
Course Name : Network Operating System Course Code: CNET 332 These slides are only meant for course delivery. For all your Exams refer to your text book.
Course Name : Network Operating System Course Code: CNET 332
Categories of Networks
IT Service Delivery And Support Week Three - OS
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Network Operating Systems Examples Instructor: Dr. Najla Al-Nabhan 2015

Peer-to-Peer: Client/server Windows for workgroups/95 (Cont.) Outline.. Peer-to-Peer: Windows for workgroups/95 (Cont.) Client/server Windows NT

Review.. Peer-to-Peer LANs In many offices and small businesses, there is a need for a simple peer-to-peer network. If security is not a concern and where 10 or fewer computers are located within a relatively small area, a peer-to-peer network might be the most economical option. In these networks, all workstations are equal and each can act as either a server or a client. In most cases, these networks will be sharing only files and printers. Most of the popular operating systems include the necessary software to configure a peer-to-peer network.

Windows for Workgroups Introduced between 1992-1994 Windows for Workgroups (Windows 3.11) functions much like its predecessor, but includes: a peer-to-peer NOS, an e-mail application, and an appointment-book application. It allows a group of computers connected through workgroups can share printers and disk files.

Windows for Workgroups: screenshots

Sharing files and printers using Windows for Workgroups Only items designated as shares can be seen by other members. All other files and printers are hidden from all users except the local computer. When you share a disk directory or printer from a workstation, you give the shared resource a name to which others can refer. For Details & Steps: (Enabling File Sharing and Printer Sharing) http://www.hawaii.edu/its/micro/pc/win31/fsps3112.html

Sharing files and printers using Windows for Workgroups

Sharing files and printers using Windows for Workgroups During the connection process, a drive letter is assigned to the shared directory and the redirector redirects the Line Printer Terminal (LPT port ) across the LAN to the correct printer. Windows for workgroups supports SMB sharing. LPT is used by IBM compatible computers as an identification for the parallel port such as LPT1, LPT2, or LPT3. This is commonly required when installing a printer on an IBM compatible computer. The majority of all computers utilize LPT1 and do not have an option for another LPT port unless additional ports are added to the computer

Server Message Block (SMB) SMB operates as an application-layer network protocol mainly used for providing shared access to: files,  printers,  serial ports, and various communications between nodes on a network. It also provides an authenticated inter-process communication mechanism. Most usage of SMB involves computers running Microsoft Windows, Therefore, it was known as "Microsoft Windows Network" before the subsequent introduction of Active Directory.

Server Message Block (SMB) Features SMB can run on top of the Session (and lower) network layers in several ways: Directly over TCP, port 445; Over the NetBIOS API, which in turn can run on several transport layer protocol :On UDP ports 137, 138 & TCP ports 137, 139 (NetBIOS over TCP/IP); Over IPX/SPX protocol (Internetwork Packet Exchange/Sequenced Packet Exchange) IPX/SPX stands for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems.

Windows 95 and 98 Windows 95 and 98 operating systems include software necessary to create a peer-to-peer network and enable sharing of printers and files. Computers running Windows 95 or 98 will also work well as clients on Windows NT and NetWare LANs. You will have to install the respective client (requester) software. Note that users of Windows 95 and 98 cannot have the full benefit of Windows NT security features; those features require use of the NTFS file format, which is not compatible with Windows 95 or 98.

Windows NT Server Windows NT is a server operating system Windows NT Server was first introduced in the mid-90s and is capable of managing workgroups just like Windows for Workgroups/95. Windows NT Server has all of the advantages mentioned for the other Windows operating systems, plus, it contains several other features making it more robust.

Windows NT Server Features: It is a client/server NOS that uses routable protocols, making it a true Internetworking Operating System enabling network administrators to connect LANs to WANs. Windows NT Server also provides services for OS/2 and Novell NetWare clients It is able to run on various microprocessors such as Intel Pentium, DEC Alpha, RISC, MIPS, and PowerPC based systems.

Windows NT Server Features: The security on Windows NT allows a network administrator to not only provide passwords for resources but also to individuals or groups. This operating system does require the use of a more powerful server computer whose sole function is to act as administrator of the NOS program. Having a server where all access data is stored makes managing Windows NT Server Operating Systems efficient.

Security in Windows NT Server Windows NT Server has more than one level of security beyond access/no access. It offers the following security levels: no access. access that restricts the user to read only capabilities. access that allows read and write usage. access that allows you to change access permissions for network users. Each user who wishes to access services on the network must have a password and a user account set up within the domain.

Next lecture Complete NOS Examples. Quiz 2

Security in Windows NT Server: Security Domains A domain is a security model where the database of user accounts is stored on one or more computers known as domain controllers. Important for the centralize control of the network. The network administrator creates, deletes, and manages these accounts and passwords using the User Manager for Domains program that comes with Windows NT Server.

Security in Windows NT Server For security reasons, companies often have two servers capable of authenticating passwords: one that acts as the Primary Domain Controller (PDC) and the other as the Backup Domain Controller (BDC).

Security in Windows NT Server Primary Domain Controller (PDC): The PDC is a computer on the network that maintains a database of users and security policies for the domain. This database contains the names of users and the resources they may access. User access may be defined for individual files or for entire directories. Note that although the PDC is often a server computer, this is not necessary. Network services can be implemented on one computer and the PDC functions on another

Security in Windows NT Server BDC (Backup Domain model) : A BDC maintains a copy of the PDC database. This backup database prevents network disruption in the event of failure of the PDC. If a failure occurs, the backup domain controller can be easily switched to the PDC. With Windows NT Server networks can connect to other domains.

Security in Windows NT Server There are four basic domain models: Single Domain Model Master Domain Model Multiple Master Domain Model Multiple Trust Domain Model

Windows NT Domain Models Single Domain Model— In the single domain model, there is only one defined set of security and user accounts. This means that all management functions are centralized.

Windows NT Domain Models Master Domain Model— In this model, there is one master domain server that has the defined set of security and user account data of all other domain servers. However, each of these has only the specific security data for one domain. A user on one domain cannot get permissions not found on her/his domain server. This improves on the single domain model since it allows segmentation of networks, which increases security measures, yet still allows centralized management of network user accounts and accessibility.

Windows NT Domain Models Multiple Master Domain Model—The Multiple Master Domain Model has several master domain servers, each with their own specific domains. In this model, network management becomes somewhat decentralized and network administrators cannot maintain the entire network from one central domain server.

Windows NT Domain Models Multiple Trust Domain Model— This model is really a peer-to-peer relationship among domain servers, therefore it becomes decentralized and security is essentially the same as with Windows for Workgroups and Windows 95.