Escolar Documentos
Profissional Documentos
Cultura Documentos
Subject- Network
Operating System
Submitted by – Submitted to
—
Section—2805
Roll-43
Reg.no.--10807530
LOVELY PROFESSIONAL UNIVERSITY
HOME WORK: #2
S
ection: B2805
Max. Marks: 05
DOS: 25-02-11
Part A
1) Study in detail how active directory helps out in managing the users, groups
and implementation of Group policies and also how this Active directory
makes the life of a network administrator easier.
Ans—Active Directory-:
1. It will provide fully integrated security in the form of user logon's and
authentication.
5. It is tightly integrated with DNS services for all its operations, which will
provide better in identifications and migrations.
The registry was brought about to replace the old .INI files (that stored configuration settings in
editable txt files). INI fileswere good because they were short and easy to edit. They did however
have some restrictions such as size limitations and no support for multiple users. In came the
registry to rid us of these restrictions and make it easier to recover settings after a crash, control
access to and track system changes. The Registry is fault tolerant, in that, if you are installing an
application that is writing a new bunch of keys to the registry and there is a power failure,
everything remains intact and you can start a fresh when the system is back up and running
again.
3) Explain hkey_local_computer.
Ans-: Also known to have the common abbreviation HKLM, the
HKEY_LOCAL_MACHINE subtree contains information about the hardware
currently installed, and the settings for systems running on the machine.
These are normally static for all users until a change is made.
HKEY LOCAL MACHINE (HKEY_LOCAL_MACHINE, HKLM) is one of the seven top
level entries in the Windows Registry.
It contains settings that are general to all users on the computer.
Part B
a. Click Start, point to Administrative Tools, and then click Active DirectoryUsers and
Computers to start the Active Directory Users and Computers console.
b. Click the domain name that you created, and then expand the contents.
c. Right-click Users, point to New, and then click User.
d. Type the first name, last name, and user logon name of the new user, and then click Next.
e. Type a new password, confirm the password, and then click to select one of the following
check boxes
e.
Click Next.
Review the information that you provided, and if everything is correct, click Finish.
After you create the new user, give this user account membership in a group that permits that
user to perform administrative tasks. Because this is a laboratory environment that you are in
control of, you can give this user account full administrative access by making it a member of the
Schema, Enterprise, and Domain administrators groups. To add the account to the Schema,
Enterprise, and Domain administrators groups, follow these steps:
On the Active Directory Users and Computers console, right-click the new account that you
created, and then click Properties.
The final step in this process is to add a member server to the domain. This process also
applies to workstations. To add a computer to the domain, follow these steps:
5) How are various errors handled during the booting up of the system?
Ans-: Various types of errors are-:
a)Memory errors
b) Drive Errors
c) SCSI Errors
Memory Errors
In the old days, memory components had an extra chip called a “parity chip,” and
part of the BIOS test was a parity test. Memory components no longer include parity
checking, because it’s not really necessary any more—memory manufacturing has
advanced to the point where it’s highly unusual to see failure.
However, after we add memory to a machine, it’s common to see a memory error
message during the next boot. The message may use terms such as “mismatched
memory information,” which means the amount of memory recorded in CMOS
doesn’t match the amount of memory found during bootup.Resolve this problem by
restarting the computer and entering the BIOS setup program.It’s been my
experience that doing this jump-starts the solution, because the correct memory
count automatically appears in the BIOS setup screen. Just exit the BIOS setup
program. The error message we saw is actually a confirmation that the system sees
the memory we installed, but it didn’t match the total recorded in CMOS. Entering
the setup program caused the system to check the memory count and adjust it,
matching the physical memory total.
Drive Errors
If we see a hard drive error during POST, we have a serious problem. Of course, we
don’t panic, because we back up every night, right? Actually, I’ve found that at least
half the time the problem is the controller, not the drive, and replacing the
controller lets the drive boot normally, with all data intact. If an embedded
controller dies, we don’t have to buy a new motherboard, because we can buy a
controller card. Check the documentation for the motherboard to see the tasks
required to make the BIOS see the card instead of looking for the embedded chip. If
the problem is indeed the drive, we have more work to do than merely replacing a
controller. In addition to replacing the hardware, we have to reinstall the operating
system and applications, and restore the last backup. Sometimes it’s a bit difficult
to tell whether the hard drive problem is a hardware problem or an operating
system problem, because the point at which the BIOS turns the boot process over to
the hard drive is also the point at which the operating system is beginning its own
boot process. If the operating system boot files can’t be opened,the problem could
be a corrupt file (an operating system problem), or a missing file (which could be a
hardware problem if the drive is corrupt). To identify the source of the problem, use
a bootable floppy to see whether we can access the hard drive.
SCSI Errors
To gain all the advantages of SCSI, we have to put up with some of the annoyances
(although it’s my opinion that the scales definitely tip in favor of using SCSI,
especially on servers). SCSI carries some additional overhead, including the use of
independent BIOS programs, which means we have to worry about additional BIOS
settings. In this section I’ll discuss some of the SCSI boot problems I’ve encountered
over the years.One common problem is improper termination when an
administrator adds additional SCSI devices to a machine. Also, remember that every
device in a SCSI chain has to have its own unique SCSI address. If we add a second
SCSI controller, avoid conflicts by checking the IRQ, I/O, and DMAsettings. Many
SCSI controllers send a message to the screen at the end of the BIOS boot,using
text that indicates that the BIOS has been installed successfully. It’s important to
realize that the message refers to the controller, not to the attached devices. If the
system hangs after the SCSI BIOS loads, it means the controller is fine, but the drive
isn’t. Don’t panic, especially if we’ve just installed the drive, because the drive may
be fine.
5) SMTP is based on which model? explain.
as the result of a user mail request, the sender SMTP establishes a two-way transmission
channel to a receiver- SMTP. The receiver-SMTP may be either the ultimate destination or an
intermediate. SMTP commands are generated by the sender- SMTP and sent to the receiver-
SMTP. SMTP replies are sent from the receiver- SMTP to the sender- SMTP in response to the
commands.
Once the transmission channel is established, the SMTP -sender sends a MAIL command
indicating the sender of the mail. If the SMTP -receiver can accept mail it responds with an OK
reply. The SMTP -sender then sends a RCPT command identifying a recipient of the mail. If the
SMTP -receiver can accept mail for that recipient it responds with an OK reply; if not, it
responds with a reply rejecting that recipient (but not the whole mail transaction). The SMTP
-sender and SMTP -receiver may negotiate several recipients. When the recipients have been
negotiated the SMTP -sender sends the mail data, terminating with a special sequence. If the
SMTP -receiver successfully processes the mail data it responds with an OK reply. The dialog is
purposely lock-step, one-at-a-time.