Você está na página 1de 7

Assignment-2

Subject- Network
Operating System

Submitted by – Submitted to

Name—Bidya Bhushan Singh


Sapna Mam

Section—2805

Roll-43

Reg.no.--10807530
LOVELY PROFESSIONAL UNIVERSITY

HOME WORK: #2

INT406: Network operating system

School: LSE Department:


CSE/IT

Name of the faculty member: Sapna attri

S
ection: B2805

Max. Marks: 05
DOS: 25-02-11

Part A

1) Study in detail how active directory helps out in managing the users, groups
and implementation of Group policies and also how this Active directory
makes the life of a network administrator easier.

Ans—Active Directory-:

1. It will provide fully integrated security in the form of user logon's and
authentication.

2. It makes easy in administration in the form of group policies and


permissions.

3. It makes easy to identify the resources.

4. It will provide scalability, flexibility and extensibility.

5. It is tightly integrated with DNS services for all its operations, which will
provide better in identifications and migrations.

6. It services will provide Automatic replication of information between the


domain controllers.

7. It supports integration of the other directory services also.


8. It supports multiple authentication protocols.

9. Pre-Windows Compatible Access: This group if for backwards compatibility


with Windows NT 4.0. Members of this group have read access on all user
and group accounts within the domain.

10.Print Operators: Members are permitted to administer all domain printers.

11.Remote Desktop Users: Members have the right to remotely logon to


domain controllers.

12.Replicator: This group is used by the file replication service to support


directory replication.

13.Server Operators: Members of this group have the right to administer


servers within the domain. They can perform tasks such as backup and
restore data, log on locally, stop and start network services, format hard
drives, and shut down the system.

14.Users: Members of this group have limited ability within a domain.

2) What is role of registry files in Windows server 2003?


Ans-:
Registry is a central repository for unique user and machine configuration
data. In basic terms, it is a big database that holds all of the Windows 2003
configuration information – settings relative to user accounts, machine
hardware and applications. Everything from user preferences (such as the
background colour, screensaver, etc), to encrypted local account passwords
are in there.

The registry was brought about to replace the old .INI files (that stored configuration settings in
editable txt files). INI fileswere good because they were short and easy to edit. They did however
have some restrictions such as size limitations and no support for multiple users. In came the
registry to rid us of these restrictions and make it easier to recover settings after a crash, control
access to and track system changes. The Registry is fault tolerant, in that, if you are installing an
application that is writing a new bunch of keys to the registry and there is a power failure,
everything remains intact and you can start a fresh when the system is back up and running
again.

3) Explain hkey_local_computer.
Ans-: Also known to have the common abbreviation HKLM, the
HKEY_LOCAL_MACHINE subtree contains information about the hardware
currently installed, and the settings for systems running on the machine.
These are normally static for all users until a change is made.
HKEY LOCAL MACHINE (HKEY_LOCAL_MACHINE, HKLM) is one of the seven top
level entries in the Windows Registry.
It contains settings that are general to all users on the computer.

Part B

4) How can we create various users in A.D.?


Ans-: To create a new user, follow these steps:

a. Click Start, point to Administrative Tools, and then click Active DirectoryUsers and
Computers to start the Active Directory Users and Computers console.
b. Click the domain name that you created, and then expand the contents.
c. Right-click Users, point to New, and then click User.
d. Type the first name, last name, and user logon name of the new user, and then click Next.
e. Type a new password, confirm the password, and then click to select one of the following
check boxes

e. 

must change password at next logon (recommended for most users)

o User cannot change password


o Password never expires
o Account is disabled

Click Next.

Review the information that you provided, and if everything is correct, click Finish.

 After you create the new user, give this user account membership in a group that permits that
user to perform administrative tasks. Because this is a laboratory environment that you are in
control of, you can give this user account full administrative access by making it a member of the
Schema, Enterprise, and Domain administrators groups. To add the account to the Schema,
Enterprise, and Domain administrators groups, follow these steps:

On the Active Directory Users and Computers console, right-click the new account that you
created, and then click Properties.

a. Click the Member Of tab, and then click Add.


b. In the Select Groups dialog box, specify a group, and then click OK to add the groups
that you want to the list.
c. Repeat the selection process for each group in which the user needs account membership.
d. Click OK to finish.

 The final step in this process is to add a member server to the domain. This process also
applies to workstations. To add a computer to the domain, follow these steps:

a. Log on to the computer that you want to add to the domain.


b. Right-click My Computer, and then click Properties.
c. Click the Computer Name tab, and then click Change.
d. In the Computer Name Changes dialog box, click Domain under Member Of, and then
type the domain name. Click OK.
e. When you are prompted, type the user name and password of the account that you
previously created, and then click OK.

A message that welcomes you to the domain is generated.


f. Click OK to return to the Computer Name tab, and then click OK to finish.
g. Restart the computer if you are prompted to do so.

5) How are various errors handled during the booting up of the system?
Ans-: Various types of errors are-:

a)Memory errors

b) Drive Errors

c) SCSI Errors

Memory Errors

In the old days, memory components had an extra chip called a “parity chip,” and
part of the BIOS test was a parity test. Memory components no longer include parity
checking, because it’s not really necessary any more—memory manufacturing has
advanced to the point where it’s highly unusual to see failure.

However, after we add memory to a machine, it’s common to see a memory error
message during the next boot. The message may use terms such as “mismatched
memory information,” which means the amount of memory recorded in CMOS
doesn’t match the amount of memory found during bootup.Resolve this problem by
restarting the computer and entering the BIOS setup program.It’s been my
experience that doing this jump-starts the solution, because the correct memory
count automatically appears in the BIOS setup screen. Just exit the BIOS setup
program. The error message we saw is actually a confirmation that the system sees
the memory we installed, but it didn’t match the total recorded in CMOS. Entering
the setup program caused the system to check the memory count and adjust it,
matching the physical memory total.

Drive Errors

If we see a hard drive error during POST, we have a serious problem. Of course, we
don’t panic, because we back up every night, right? Actually, I’ve found that at least
half the time the problem is the controller, not the drive, and replacing the
controller lets the drive boot normally, with all data intact. If an embedded
controller dies, we don’t have to buy a new motherboard, because we can buy a
controller card. Check the documentation for the motherboard to see the tasks
required to make the BIOS see the card instead of looking for the embedded chip. If
the problem is indeed the drive, we have more work to do than merely replacing a
controller. In addition to replacing the hardware, we have to reinstall the operating
system and applications, and restore the last backup. Sometimes it’s a bit difficult
to tell whether the hard drive problem is a hardware problem or an operating
system problem, because the point at which the BIOS turns the boot process over to
the hard drive is also the point at which the operating system is beginning its own
boot process. If the operating system boot files can’t be opened,the problem could
be a corrupt file (an operating system problem), or a missing file (which could be a
hardware problem if the drive is corrupt). To identify the source of the problem, use
a bootable floppy to see whether we can access the hard drive.

SCSI Errors

To gain all the advantages of SCSI, we have to put up with some of the annoyances
(although it’s my opinion that the scales definitely tip in favor of using SCSI,
especially on servers). SCSI carries some additional overhead, including the use of
independent BIOS programs, which means we have to worry about additional BIOS
settings. In this section I’ll discuss some of the SCSI boot problems I’ve encountered
over the years.One common problem is improper termination when an
administrator adds additional SCSI devices to a machine. Also, remember that every
device in a SCSI chain has to have its own unique SCSI address. If we add a second
SCSI controller, avoid conflicts by checking the IRQ, I/O, and DMAsettings. Many
SCSI controllers send a message to the screen at the end of the BIOS boot,using
text that indicates that the BIOS has been installed successfully. It’s important to
realize that the message refers to the controller, not to the attached devices. If the
system hangs after the SCSI BIOS loads, it means the controller is fine, but the drive
isn’t. Don’t panic, especially if we’ve just installed the drive, because the drive may
be fine.
5) SMTP is based on which model? explain.

Ans-: The SMTP design is based on the following model of communication:

It is based on Application layer.

as the result of a user mail request, the sender SMTP establishes a two-way transmission
channel to a receiver- SMTP. The receiver-SMTP may be either the ultimate destination or an
intermediate. SMTP commands are generated by the sender- SMTP and sent to the receiver-
SMTP. SMTP replies are sent from the receiver- SMTP to the sender- SMTP in response to the
commands.

Once the transmission channel is established, the SMTP -sender sends a MAIL command
indicating the sender of the mail. If the SMTP -receiver can accept mail it responds with an OK
reply. The SMTP -sender then sends a RCPT command identifying a recipient of the mail. If the
SMTP -receiver can accept mail for that recipient it responds with an OK reply; if not, it
responds with a reply rejecting that recipient (but not the whole mail transaction). The SMTP
-sender and SMTP -receiver may negotiate several recipients. When the recipients have been
negotiated the SMTP -sender sends the mail data, terminating with a special sequence. If the
SMTP -receiver successfully processes the mail data it responds with an OK reply. The dialog is
purposely lock-step, one-at-a-time.

Você também pode gostar