0% found this document useful (0 votes)
18 views40 pages

Managing Network ch10

Uploaded by

niaou gatoula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views40 pages

Managing Network ch10

Uploaded by

niaou gatoula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Color profile: Generic CMYK printer profile

Composite Default screen


BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 312

10 Managing a Network

“So much of what we call


management consists in making
it difficult for people to work.”
—PETER DRUCKER

In this chapter, you will learn


how to:
■ Describe Windows network
B uilding a network can be likened to initiating a project. You try to efficiently
complete a project such that the initial and adjusted goals are met using limited
resources (and budget). This is true for the network you created, and it is now time
management tools for the next step—ensuring that your network’s users can continue to use the
■ Implement Windows and network. This means you need to manage the network. Management, in the
NetWare network management business sense, involves continuing to meet a set of refinable goals using a
company’s physical, intellectual, and human resources. Your goal now is to manage
your network, whether you continue in a technical direction or apply these basics in
a more managerial role.
In this chapter, you will learn more about managing your classroom network.
You will first learn about tools available on your Windows workstation computers,
and also about some available on your server. You will learn how users can help
manage their own computers by running utilities that check their disks or
defragment their storage, backing up their own files, and viewing their active tasks
using Task Manager. On your server, you will learn about using the Simple Network
Management Protocol (SNMP), Performance console, and Network Monitor. You
will also learn about the compression and quota-management tools available on
NTFS volumes. Then, you will learn to use Novell’s text-based commands and
NetWare Loadable Modules at the NetWare server console. Finally, you will
examine some of the features of specific NetWare utilities, such as MONITOR,
DSREPAIR, and NWCONFIG.

312

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 4:18:51 PM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 313

■ Describing Windows Network


Management Tools
Your network, like that of SinkRSwim Pools, is centered around the main
network operating system server you installed—the Windows 2000
Server—and the computer users access its resources through Windows XP
Professional workstations connected to the network. The SinkRSwim Pool
workers throughout the company have gradually become accustomed to
using their newfound network resources. What’s more, they have quickly
become dependent upon those networked resources to get their day-to-day
jobs done more effectively. Whenever the network is down, the SinkRSwim
network community complains loudly that they want their network back.
Ricky is only too glad to learn more about keeping the company’s network
healthy and being able to monitor it for signs that problems may be building
so he can head them off before the network fails—even for a moment.
You have seen throughout this course that there are many complicated
components associated with today’s corporate-sized network operating
systems and the advanced workstation computers where their networking
services are employed. If any piece at either end, or anywhere in between,
breaks down or stops communicating with the other pieces, whoever is
managing the network will be expected to know how to fix the problem, and
quickly. Therefore, the more you know about networks, the better you will
be able to perform network support.
Some things can be managed by the users at their own workstations, but
these things will only help support the network, not relieve anyone of the
responsibility for keeping the whole system working. Therefore, now that
your network is installed and operational, you should learn as much about
these components as possible so you can keep them working and know how
to get your system, itself, to help maintain your network.

Windows XP Professional Workstation Tools


The heart of most people’s work on a network is their workstations. In addi-
tion to this being where users perform their work, the remote access that
servers allow is fast becoming the most common way to manage a network,
from anywhere inside (and oftentimes outside) the company. It is essential,
therefore, for workstations to operate properly. The failure of a workstation
obviously has an adverse effect on that particular user’s network capability.
Should that workstation also house additional networked resources, such as
shares, other users’ capabilities may also be affected.
To make troubleshooting a little complicated, what initially may appear
to a user to be a networking failure quite frequently turns out to be a failure
somewhere on the user’s own workstation (in the workstation’s internal
hardware or something else locally installed) that requires a technician’s in-
tervention. As a networking specialist, you will probably not be making this
type of workstation repair, but you should keep in mind that users will often
blame the person maintaining the network first, and ultimately the network
itself. Additionally, it may be your responsibility to differentiate between
network troubles and a hardware problem that gets passed to the technician.

313
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:22 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 314

Many of the tools and techniques covered in the next sections


can be used through your users’ workstations. Although all the
tools discussed here are intended for server management, four
can also be used when troubleshooting local components.
Making sure your users know how to use some of these tools
will help you keep networked resources and the users themselves
online, but you will have to decide which of the tools you want
them using.
The four tools discussed here can be helpful if used on the
workstation by the users themselves. You should think about
teaching your users how to use all four so they can perform
some local machine management themselves. Three of the tools
are available through the disk drive itself, and the other can be
reached through the taskbar.

Tools for Use on Local Disks


Three very powerful management tools are available on all your
networked computers: the Error-Checking, Defragmentation,
and Backup utilities. These tools can be reached by your users
• The three disk drive tools available to users through the Properties dialog box by right-clicking on any hard
disk attached to their computers.

Error-Checking Tool The first tool listed on the Tools tab of a workstation’s
hard disk drive’s Properties window is the Error- Checking tool, which, as
its name implies, checks your drive for errors—it is also called the Check
Disk tool. Clicking the Check Now button starts this tool. Frequent use of
the Error-Checking tool lets users scan their hard disk drives and verify
whether any operating system or filing system errors have occurred. If such
errors exist, it gives them options for fixing those errors.

• The Check Now option

You can also run the Error-


Checking utility immediately After clicking the Check Now button, the Check Now window for the
through a DOS command by typ-
local disk appears, displaying the two option boxes that control which func-
ing chkdsk in the Run dialog
box (accessed through the Start tion is to be completed by the Error-Checking tool. Clicking OK at this point,
menu). This will run the tool but with the default settings (neither option selected), will simply scan the disk
not make any corrections. Typing and return any errors. No repair actions will be performed, and this scan is
chkdsk /f will run the tool and accomplished very quickly. However, the typical use of the Error-Checking
make corrections (the /f switch
tool involves clicking the first option box so that the Error-Checking tool
tells it to fix any problems it
finds), but it will only run upon automatically fixes any file system errors that are identified in the repair
restart if the disk drive being process. When the tool makes those repairs, the process takes a bit longer,
tested is currently being used. but it is still relatively fast.

314
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:23 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 315

Inside Information
How Often Is Enough?
Users will often ask how often
they should perform the mainte-
nance techniques you show them
or run tools similar to those dis-
cussed in this section. You
should temper your immediate
response—that they cannot be
run enough—with the realization
that users have varying levels of
both technical ability and com-
puter use. For both reasons, users
may not need to maintain their
systems as diligently as you
would consider normal.
Rather, your response to them
should be to tell them that the three
tools should be performed on a
monthly, weekly, daily, or hourly
The other option available in the Check Now window allows users to
basis depending on the numbers
scan for and attempt to recover bad sectors on the hard disk itself (or multiple and types of files they use and how
hard disks if so equipped). While this is normally a fast process, simply easily they can get along without
because finding errors is rare, this option can take a long time if errors are those files. A user working with a
located. If the tool does find errors and repairs them, you should then run lot of client financial records that
the Defragmentation tool to relocate the information that was moved from simply cannot be lost should use
the bad sectors so that it is stored contiguously. You should also give serious management tools more often than
thought to replacing the disk drive, or at least backing up the information someone working with relatively
on the drive to another location, and doing so more often. few files that are easily re-created.
The hard disk being inspected by the Error-Checking tool must not be in A better solution would be to
recommend the weekly use of these
use. If that hard disk’s system files or any of its stored files or applications
tools by your users. You, yourself,
are currently being used, the tool notifies the user that the system cannot be
may be performing them on a less
checked without restarting the computer. It also asks whether the user
frequent basis but you could in-
wants the system to be checked when the computer is next started. Upon struct your users to increase or de-
restart, the system’s files are checked before being put into use. Additionally, crease the frequency of these tests
when the Error-Checking tool is used on NTFS volumes, all actions taken by doing their own tests. You
during the repair process are tracked, any bad clusters are repaired automati- should tell them that a good way to
cally, and important information on all files is copied and stored on the disk. decide how often they should con-
duct their own use of these man-
agement tools should be based on
how difficult it would be to work
without the material contained on
their computer.

• You can schedule the disk to be checked the next time you restart your computer.

315
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:25 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 316

Defragmentation Tool You have


Cross Check already learned about defragment-
ing your hard disks in Chapter 7
Alternative Defrag Location
of this text. However, the conve-
Can you remember the discussion about the Disk Defragmenter? If not,
nience of having the Defragmen-
go back and read that section, entitled “Windows File Systems,” in
tation tool in the same location as
Chapter 7 again before answering the following questions:
the Error-Checking and Backup
1. For which of the two main Windows file systems is defragmenting tools makes it easy for your users.
your disks more important? When you explain how they can
help with their own workstation
2. The discussion in this chapter shows you how to access the
management, it is better to show
Defragmentation tool through your disk drive’s Properties dialog
them that the tool is easy to use and
box. What method was used to access the Disk Defragmenter in
easy to find as well. Clicking the
the discussion in Chapter 7?
Defragment Now button will start
the same Disk Defragmenter that
you studied in Chapter 7, and the procedures for its use are the same
when it is started from the Properties dialog box.
The Defragmentation tool uses the Disk Defragmenter window.
Along the top of the window are the menus and toolbars, which are
like those on Microsoft Management Console. The section shown
• The Defragmentation tool
here lists pertinent information about each of the computer’s vol-
umes. To select a drive to defragment, just click on it.
Immediately below the volume-identification section are two horizontal
bars where graphic depictions of your disk drive will be displayed. Click the
Analyze button to allow the tool to check the drive to see if the data stored
there is fragmented. The top bar will show the estimated disk usage before
defragmentation.

• The Disk Defragmenter window

316
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:28 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 317

Clicking the Defragment button also displays the “before defragmen-


tation” depiction, but it does so as a reference point, since the program also
begins to actually defragment your drive. The Estimated Disk Usage After
Defragmentation bar provides a dynamically updated representation of the
defrag process in action. You can actually watch your disk’s information be-
ing moved from location to location as pieces are joined back together.

• Your computer will let you know whether you have enough free space for efficient defrag performance.

When the defrag operation is complete, you will be notified and can use
the color codes in the fourth section (under the row of buttons below the two For effective operation, the
rows of graphical information) to determine the status of each identified Defragmentation tool requires
area on the disk. You also have the option of either reviewing the tool’s that 15 percent of the total space
available on your volume be
report to see a listing of files that could not be moved, or clicking the Close
available as free space that can
button to return to the Disk Defragmenter, where you can select another be used when moving files. How-
volume to defragment. ever, if you don’t have that much
free space, you can still conduct
the defrag operation if you don’t
mind spending a bit more time
completing the process.

Before After

• The Defragmentation tool displays “before” and “after” depictions of your data.

317
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 318

Remember, no matter how you


Try This! get to the utility, defragmentation is
Defragmenting Your C: Drive a matter of taking noncontiguous
or fragmented information and re-
Use the Defragmentation tool to defrag your hard disk. Try this:
loating its many pieces such that
1. Click the Start button, select My Computer, right-click your C: they are side by side (contiguous).
drive, and select Properties. Your drive’s Properties dialog box Reading from or writing to contigu-
will open. ous data is much faster than doing
either with noncontiguous infor-
2. Click the Tools tab, and click the Defragment Now button.
mation—storing or retrieving a
3. Click the Analyze button, and note whether the system suggests file’s information can be done in
that you conduct a defrag operation. one continuous action on contigu-
4. Click the Defragment button to initiate the defrag operation, and ous information. Otherwise, with
observe the two graphical depictions of your disk’s information. noncontiguous data, your com-
5. Click OK when the defragmentation is complete. puter has to read or write a section,
pick up the disk’s head, look for the
next segment, and then similarly
continue to read or write additional sections until the file is complete.
Furthermore, after defragmentation is complete, the likelihood of new
files being stored in noncontiguous space is lessened. This is because the
Defragmentation tool, in putting your files back together, also joins your
empty disk spaces together as well. Any new files written to your computer
can thus be located in the newly recombined contiguous empty space. Since
contiguous space is read and written to more efficiently, your computer can
be noticeably faster after a defragmentation operation has been completed.

Backup Tool In Chapters 1 and 9, you learned about the importance of


making backups. The Backup tool is another conveniently located manage-
ment tool that can help your users help you maintain their systems. In this
instance, as long as users have the proper permissions to access and use the
files they wish to maintain copies of, they can easily use the Backup tool to
keep their information backed up and accessible. While there are numerous
third-party backup utilities available that you can choose from, simply
clicking the Backup Now button in the disk drive’s Properties dialog box
initiates the Microsoft version of the Backup tool.
As long as users are working with their own files, or they have the Read,
Read and Execute, Modify, or Full Control permission to the files, they can
perform backup operations on the data. On the opposite end of the process,
however, if restoring the data is necessary, users must have either the Write,
Modify, or Full Control permission on the original files to overwrite them.
Since users have these permissions on their own data, teaching them to use
the Backup tool to keep an extra copy of their own data will help them
maintain their own working environment.
In practice, the Backup tool is woefully overlooked at the
local workstation. You can save yourself some headaches if you
get in the habit of using this tool and make sure your users
understand that it is available and how it works. Users all too
often rely on the administrator’s system-wide backups when
they need to restore copies of their lost files—no matter why
they were lost. Effective use of the Backup tool may let users
restore some of their own lost files.
• The Backup tool

318
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:33 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 319

If the workstations have excess storage space on their own local


drives or are equipped with external storage devices, such as
floppy disk drives, Zip drives, or read-write CD drives, you may
simply need to instruct users how to use the Backup tool. If users
periodically perform a backup operation and save an extra copy of
their own data somewhere on their local workstation, administra-
tors called upon to restore a missing file may use these individual-
ized backups to help a user quickly restore the occasional
misplaced file or accidentally erased directory when it happens.
Thus, restoring a single file from a small backup would likely be
much easier than searching for that same file from a company-
wide backup that an administrator would normally create.

Task Manager: A Tool on the Taskbar Itself


Many users know next to nothing about a very handy tool that is
available to them through their taskbar. The Task Manager pro-
vides them with a means to not only gather information about
their computer but also to start or stop most of their own applica-
tions. To access the Task Manager, right-click a blank space on • The Backup operation in progress
the taskbar and select Task Manager.
If you make the decision to let your users help manage their own
workstations, they should be taught about using the Task Manager tool
which operates in the Windows Task Manager window.

• The Task Manager

319
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:35 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 320

You can also open the Task


Try This!
Manager tool with what is affec- Using the Local Workstation’s Backup Tool
tionately called the Microsoft Use the local workstation’s Backup tool to back up a user’s information.
three-finger salute (CTRL+ALT+
Try this:
DELETE) and then clicking the
Task Manager button, or by typ-
ing taskmgr in the Open field
1. On your Windows XP Professional workstation, click the Start
in the Run window, reached button and select My Computer. Right-click your C: drive and
through the Start menu. select Properties to open your drive’s Properties dialog box.
2. Click the Tools tab and click the Backup Now button to start the
Backup or Restore Wizard.
3. Click Next to accept the default backup settings, click Next again
to accept the Back Up Files and Settings option, and click Next
again to accept the default My Documents and Settings option.
4. Click the Browse button to select where you want to save
your backup.
5. The default location for this save action is the floppy diskette.
Click the Save button if you intend to save to a floppy diskette
in the A: drive. Otherwise, click the Cancel button, click the
Desktop button in the left panel of the Save As window, and
click the Save button to designate the desktop as the place to
save your backup file.
Keep in mind that clicking the Browse button starts with
the default intent of sending a backup to the A: drive, and it
will probably take a lot of floppy diskettes to create even a
moderately sized backup of your C: drive. If a diskette is not
installed in that drive, the Backup tool will instruct you to
insert a diskette, and the save action continues trying to save
the data there. As indicated in Step 5, you must click the Cancel
button if you intend to save data to any other location besides
the A: drive.
6. Either accept the default “Backup” name for this backup or enter
another name of your choosing.
7. Click Next, confirm the displayed information, and click the
Finish button to initiate the backup operation.

When you open Task Manager, the tab that will be displayed is the
same tab that was in view the last time the tool was closed, and the same
settings will be in place too. On your Windows 2000 Server, there are
three tabs available in the Windows Task Manager window: Applica-
tions, Processes, and Performance. Your Windows XP workstations will
have a new Networking tab.

320
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:36 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 321

• Windows XP includes a new Networking tab in its Task Manager tool.

Many of the Task Man-


ager’s menu options for con-
figuring settings change
depending on which of the
tabs you have open at the
time. Some of the tabs have
elaborate settings, and you
may want to go through the
menu bar options and con-
figure your Task Manager to
best suit your needs.

• You can configure the Task Manager to show the information you want.

321
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:43 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 322

Step-by-Step 10.01
Touring the Task Manager Tool
Use the local workstation’s Task Manager tool to ■ An operational networked Windows XP
view information about your computer. workstation or Windows 2000 Server
To complete this exercise, you will need the
following item:

Step 1 At your Windows workstation or server desktop, right-click an empty space on the
taskbar and select Task Manager. If you are working on your server, notice that there are
only three tabs, which means you will not be able to view your networking information.

Step 2 Click the Applications tab to see the applications currently running on that computer.
Choose View and select Details, and notice that the status is given for each application.
Click the New Task button, notice that the Create New Task window that appears is
similar to the Run window accessed through your Start menu, and click the Cancel button
to return to the Applications tab.

Step 3 Click the Processes tab to see the processes currently running. Choose View and select
Select Columns to view additional columns that are available, and then click the Cancel
button to return to the Processes tab. Right-click a process and notice that you have the
option to stop either the process itself (End Process) or the process and all other associated
processes as well (End Process Tree). Note, though, that the system will not let you end
a process that is critical to the system’s continued operation.

Caution: You should not make any alterations to the Set Priority option available when
right-clicking a process. Doing so may affect your computer’s proper operation. You should also
make sure to point out to your users that they should not make any such changes either.

Step 4 Click the Performance tab and note the graphs that provide dynamic information on your
CPU and your page file (a temporary work space in memory). Click View and select
Show Kernel Times to add another line (red) to the CPU Usage History graph depicting how
much of the CPU usage was needed by the heart of the operating system—the kernel.

Step 5 If you are working on your Windows XP workstation, you can click the Networking tab
to view activity to or from each of your own computer’s network connections. Choose
View, select Network Adapter History, and add either the Bytes Sent or Bytes Received
lines to the default Bytes Total displayed in the graphs. The information listed at the
bottom of the screen includes the link speed and the link state (or operational status) for
each connection.

Step 6 Close the Task Manager to return to your desktop.

322
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Thursday, February 13, 2003 10:31:43 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 323

Windows 2000 Server Tools


Each of the tools discussed in the previous section is also available on your
Windows 2000 Server, and you should use all of them as you monitor and
manage the health of your server and workstations. However, there are
other tools available at the server that will help you even more than the general
tools found on the workstations. Three of these tools are the Simple Network
Management Protocol (SNMP) service, the Performance console, and
Network Monitor.

Simple Network Management Protocol (SNMP) Service


The Simple Network Management Protocol (SNMP) is an Internet-standard
protocol (one that is widely accepted for use on the Internet) that facilitates
monitoring the system and sending status updates to a central location
called the network management system (NMS), which is also called the host
or the SNMP manager. The SNMP service can be started or stopped through
the Windows Components Wizard.

• Start or stop the SNMP service through your Windows Components Wizard.

The objects on your network, such as servers, workstations, printers,


hubs, switches, and routers, are called nodes. These nodes can be monitored
by SNMP and can send status updates to the SNMP manager. Once a network
node is monitored by SNMP and managed by the SNMP manager, that
node is referred to as an agent. Agents, the SNMP service itself, and all its
other components are configured through the Services and Applications
section of your Computer Management console. Agents normally just respond
to queries about their status, but they can also send an alarm message, called
a trap message, when they are configured to look for specific events (like
login failures or other unauthorized access) and report their occurrence.

323
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:44 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 324

• SNMP is configured through the Services and Applications section of the Computer Management console.

The SNMP manager uses installed network management software (soft-


ware not included with Windows but purchased from separate vendors) as
it performs the monitoring and management duties it has been configured
for. It creates and maintains a Management Information Base (MIB) that lists
the information on each node that should be monitored at the agent and

• Your SNMP status is reported in the Event Viewer.

324
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:47 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 325

reported back to the manager. You


must configure at least one NMS if Try This!
you intend to use the information Installing and Configuring SNMP
that can be collected by SNMP on
You want to install and configure SNMP on your network. A large
your system. The information
network will have special monitoring software that works with SNMP
collected can include things such
and uses the information collected. This exercise won’t make you an
as network performance, secu-
expert at using SNMP or give you extensive analysis, but it will get the
rity breaches or similar alarmed
service running and show you some of the configuration steps that are
events, and network auditing.
required for proper setup. Try this:
Although you don’t get the
true benefit of having SNMP con- 1. On your Windows 2000 Server, click the Start button and select
figured on your network without Settings | Control Panel. Double-click Add/Remove Programs
having the third-party network and select Add/Remove Windows Components. Highlight the
management software installed, Management and Monitoring Tools option and click the Details
larger networks will typically em- button. Note that checking the Management and Monitoring
ploy this service, and you should Tools option box configures all tools, whereas clicking the Details
know how to configure it. You can button allows you to select each tool separately.
verify that the service was updated
2. Select Simple Network Management Protocol, click OK, click
properly by reviewing the mes-
Next, and click the Finish button to implement your changes.
sages in your Event Viewer. You
Restart the computer as necessary after configuring SNMP.
can get to the Event Viewer
through Administrative Tools in 3. Click the Start button and select Control Panel. Double-click
your Control Panel. Administrative Tools, double-click Computer Management,
expand Services and Applications in the left pane, and click
Performance Console on Services.
Both Windows 2000 Server and 4. In the right pane, scroll to and right-click on SNMP Service, and
Windows XP Professional provide select Properties.
you with the Performance console,
5. On the General tab, ensure the service is Started (and if not, click
a utility program that lets you col-
the Start button). On the Agent tab, enter the contact person and
lect data about your system’s per-
his or her physical location.
formance. Performance console
comes preinstalled on both of 6. Click the Traps tab, and in the Community Name field type
your network’s Windows operat- SchoolSNMPService. Click the Add to List button, and click the
ing systems and is accessed Add button in the Trap Destinations section. Add the IP addresses
through Administrative Tools by for all your networked computers as trap destinations.
selecting the Performance option. 7. Click the Security tab, and then click the Add button in the
The Performance console actually Accepted community names section. Type SchoolSNMPService
provides you with two useful util- in the Community name field, leave the default Read Only
ities that will help you monitor permission set, click OK, and click OK again to implement your
and analyze your system’s health: changes. Close all windows to return to your desktop.
System Monitor and Performance
Logs and Alerts.

• Performance console opened showing its two utilities

325
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:48 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 326

System Monitor The System Monitor portion of your Performance console


Inside Information utility allows you to view either current system activities or those you re-
corded using Performance Logs and Alerts (discussed in the next section).
Configuring
Administrative Tools There are three different views available in System Monitor: graph, histo-
on Your Start Menu gram, and report. Although the default System Monitor view displays data on
You will be using Administrative three specific items in the graph view, you can select the items you want dis-
Tools quite a bit. Accessing it played from a large list and can easily change to either of the other two views.
through the Control Panel is one
way to get there, but you can con-
■ Graph view The graph view plots the data for each item you
figure it so that you have access are tracking along two axes: time along the horizontal axis and
right on your Start menu. amplitude along the vertical axis. Different colors can be selected for
To do this on your Windows each item being tracked, and the line width and style can also be
2000 Server, click the Start but- changed. Items whose amplitude would create large numbers can be
ton and select Settings | Taskbar displayed by using different scales. Even the scale displayed on the
and Start Menu Properties, click axes can be changed, have text added, or a background added.
the Advanced tab, and ensure the
Display Administrative Tools
option is selected.
On your Windows XP Profes-
sional workstations, click the
Start button, right-click on the
blank space to the left of your Log
Off button and select Properties.
Click the Start Menu tab, click
the active Customize button, click
the Advanced tab, and scroll to
System Administrative Tools and
select the option showing where
you want Administrative Tools
access (on the All Programs menu,
on the All Programs menu and
the Start menu, or not displayed).
The remainder of the text as-
sumes you can access Admin-
isrative Tools through your
Start button.

• Performance console showing an example of the System Monitor’s data in graph format

■ Histogram view The histogram view displays the data for each
item being tracked along the same two axes, time and amplitude,
but does so with bars showing totals for different items. All the
changes that can be made to the graph view can similarly be made
to the histogram view. The type of data being viewed can also
switch between current, minimum, average, or maximum values.
■ Report view The report view displays the data for each item
being tracked in summary format only. Many of the same changes
available in displaying the other views are available in the report
view, such as different backgrounds, additional items tracked, and
the four types of data to display. The graphical changes, however,
are obviously not available in this view.

326
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:51 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 327

• Performance console showing an example of the System Monitor’s data in histogram format

• Performance console showing an example of the System Monitor’s data in report format

Performance Logs and Alerts The Performance Logs and Alerts portion of
the Performance console allows you to configure and record the sampled
data that is displayed in the System Monitor. You can select the items you
want sampled, schedule a time for the sample to be made, and save the in-
formation as a log in the default storage location, the Perflogs folder on your
C: drive, or change it to another location, as you can see in the following il-
lustration. You can create Performance logs manually when you want one
or they can be done automatically at a preset time. Alerts can be configured
to send their information when a predetermined condition occurs, such as
low drive space or high processor use.

327
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:55 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 328

• You can open a Performance Log in the Perflogs folder.

Step-by-Step 10.02
Recording and Viewing a Performance Log
You want to use a System Monitor performance log To complete this exercise, you will need the
to capture information on the three default items following item:
displayed in Performance Logs and Alerts. Then you
■ A Windows XP Professional workstation
want to view the log and check its information.
computer

Step 1 On a Windows XP workstation, click the Start button and select Administrative Tools |
Performance.

Step 2 In the Performance window’s left pane, expand Performance Logs and Alerts, and select
Counter Logs to display the default System Overview log. In the right pane, right-click
the System Overview log and select Properties. View the information on the General,
Log Files, and Schedule tabs of the Properties dialog box. Pay particular attention to (and
write down) the current log filename shown on the General tab.

328
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:57 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 329

Step 3 Close the Properties dialog box and select the System Overview log. Select Action | Start
to start the System Overview log. This begins recording the information that you viewed
in Step 2.

Step 4 After approximately two or three minutes, select Action | Stop to stop recording, and
your system will automatically save the log file with the name and in the location that
you viewed in Step 2. In the Performance window’s left pane, click on System Monitor.

Step 5 At the top of the right pane, pause your mouse pointer over each of the buttons to view
its function. Click the second button from the left to clear the display, and then click the
View Graph button, and click the View Log Data button. On the Source tab of the System
Monitor Properties dialog box, choose the Log Files option and click the Add button.
Browse to the location you wrote down in Step 2, and double-click your log file in the
Perflog folder.

Step 6 Click the Apply button. Notice that your System Monitor now displays the data stored in
the log file in the Perflog folder.

329
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:00 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 330

Step 7 Use the different tabs of your System Monitor Properties dialog box to change the ap-
pearance of the information in your log as you review the data you recorded. Click OK
after returning to the graph view. Select one of the recorded items for emphasis by click-
ing on the item in the bottom section of the graph view (such as the yellow line in the pre-
vious illustration) and clicking the Highlight button. As you can see here, the selected
item is highlighted in black.

Step 8 Close all windows when you are finished checking your data.

330
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:05 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 331

Network Monitor
Network Monitor is another utility
Try This!
available on your Windows 2000 Installing Network Monitor
Server that is similar to the Per- You want to install and configure Network Monitor on your network.
formance console but is intended Try this:
to provide you with information 1. On your Windows 2000 Server, click the Start button and select
about the health of your network. Settings | Control Panel. Double-click Add/Remove Programs.
Earlier in this chapter you learned
2. Select Add/Remove Windows Components to start the Windows
how to show your users a similar
Components Wizard.
function on their Windows XP
Professional workstations—on the 3. Select Management and Monitoring Tools and click the Details
Networking tab of their Task button to see the tools available.
Manager. However, the Network 4. Select the Network Monitor Tools option, click OK, click Next,
Monitor utility on your server is and then click the Finish button to implement your changes. Note
much more powerful and pro- that your computer may have to be restarted after configuring
vides you with considerably more Network Monitor Tools.
information about your local net-
work than you can obtain using Windows XP’s limited version. Network
Monitor is not installed automatically on your server. You must install it like
you installed SNMP—through the Windows Components Wizard.
When in use, the Network Monitor utility actually records a copy of the
data flowing between the computers on your network and your server. Like a
tape recording of a telephone conversation, this monitoring utility does not
disturb the conversation but merely records a copy of it. Also, like the tape of
that conversation, the recorded network session can be copied, reviewed, sent
for analysis, or otherwise broken down and listened to. Thus, having Network
Monitor running on a network can pose a serious security concern. Someone
with the right equipment could interpret much of what goes on over your net-
work. If the network information is not otherwise encoded or protected, it can
be understood from the data recorded using Network Monitor.

• The Microsoft Network Monitor utility.


331
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:08 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 332

After installing Network Monitor on your server, you are asked which
You can obtain more infor- network you want monitored. As powerful as Network Monitor is, it is limited
mation about SMS through to monitoring a single network as mentioned previously, and it can only
the Microsoft SMS web site at monitor traffic flowing to or from your local machine—your server. This is
http://www.microsoft.com/
for security reasons. Even more powerful network monitoring is available
smserver/default.asp.
with Microsoft’s Systems Management Server (SMS) or applications from
other third-party vendors if you need additional capturing capability.

• Tell Network Monitor which network to monitor.

Network Monitor will detect and alert you to any additional instances of
Network Monitor running on your network. This ensures that nobody else
is capturing traffic using Network Monitor as it comes from your server.
To use Network Monitor, you simply click the toolbar’s Start Capture
button. When you feel you have captured enough data to perform your
analysis, you just click the Stop Capture button on the toolbar. If you want to
pause your capturing for a short time, there is a Pause/Continue Capture
button on the toolbar. After stopping your capture, you can then click the
toolbar’s Display Capture button to see the results. If you want to stop an
ongoing capture and immediately view its contents, there is even a Stop and
View Capture button that you can use.

• Significant amounts of data are recorded when using Network Monitor.


332
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:09 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 333

While this course is not intended to make you an analysis expert, able to
decode captured network messages, it is good practice to know how to use
the tool and understand the way it works. The data is extremely over-
whelming to someone viewing real network traffic for the first time without
serious additional training, and it may still be overwhelming to long-time
networking specialists. When you make your first captures, remember that
they record extremely high levels of data. Each frame recorded can be
further broken down into all of its individual elements, and each character
can be decoded to some level. Don’t waste a lot of storage by unnecessarily
recording more than you need to get a feeling for what is being monitored.

■ Implementing Windows and


NetWare Network Management
How you manage your network, and how the network’s users employ the
resources entrusted to them determines the overall value of the network. If
you don’t properly maintain the network, the effort required to create it in
the first place goes to waste.
Studying the network components discussed in the previous section
will help you ensure your network’s success. Regardless of the size of your
network, many of the administrative responsibilities will involve managing
networking functions. A healthy network’s use will tend to increase rapidly,
and the better your networking management skills, the better you will be
able to maintain your network.

Windows Networks
When your network is operational and you are using many of the features
discussed earlier in this chapter, it will become evident that the amount of
storage space needed by your users seems to be ever-increasing. Microsoft
makes two additional features available that will help you on the Windows
portion of the network. The first, compression, helps reduce the amount of
space needed for the data stored on your network. The second, quotas, lets you
limit the amount of network storage space your users are authorized to use.

Compressing Data
Because you created your server and all your workstations using NTFS, you
can use the Windows advanced storage feature that helps extend your net-
work’s existing storage capacity—compression. Compressing data reduces
the size of a file so that it takes up less storage space. If you have a lot of data
stored on your network, and you implement compression, you can store more
in the same amount of space, making your network that much more valuable to
the users without spending any money on additional storage space.
Compression is not quite as simple as it sounds—there are some
trade-offs. For example, when copying a file to a compressed volume, NTFS
reserves space for that file to be uncompressed, so if there is enough space for
the compressed file but not enough to uncompress the file, the copy action
will be disallowed. Furthermore, there is a slight decrease in performance due
to the requirement to decompress a file before use.

333
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:09 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 334

• This volume is an excellent candidate for implementing compression.

Compression Levels Compression can either be initiated at the volume


level, which compresses everything on the disk drive, or at the file level. At
the file level, you can select individual files you want compressed, while
leaving everything else uncompressed. Compression at the file level is im-
plemented using the object’s Properties dialog box. At the bottom of the
General tab, you simply click the Advanced button and in the bottom section
of the Advanced Attributes dialog box select the Compress Contents to Save
Disk Space option.

• File-level compression
334
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:12 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 335

At the volume level, this is reversed, and everything is compressed with


the exception that you can selectively uncompress individual files. When
compressing volumes, you again use the object’s Properties dialog box, and
at the bottom left of the General tab, select the Compress Drive to Save Disk
Space option.

Compression on NTFS Volumes Only Windows 2000 and Windows XP


When deciding whether to
Professional only support compression on NTFS volumes. Whether you set
use compression or encryption,
compression to be employed at the file and folder level or at the entire vol- which is the other option in the
ume level, each file on the volume has its own compressed or uncompressed Advanced Attributes dialog box,
condition attribute (which, when applied, results in a file’s compression you should be aware that they
state). Applications using compressed files check the compression state and are exclusive of one another at
simply uncompress any applicable files prior to using them. All DOS- and whatever level they are incor-
porated (file/folder or volume).
Windows-based applications can thus use compressed files. When an appli- Selecting one means you can’t
cation is done with a previously compressed file, or you initiate a save ac- select the other at the same level.
tion, NTFS compresses the file once again.

Compression Rules There is a general rule (with one exception) that helps ex-
plain compression attributes: A file, whether copied or moved, will inherit the
compression attribute of the new folder it is being copied or moved into. The
one exception is that a “move” within the same volume (partition) will not in-
herit the new folder’s compression attribute. The reason for this exception is
that the file is not actually being moved from the point of view of the operating
system—only a pointer is moved, “pointing” to the original location.
An example will help explain. If you move a file from one location on an
NTFS volume to another location on the same volume, the file retains its
original compression state in its new location. If you copy that file from the
same NTFS volume just discussed to the same new location, though, the
new file acquires the compression state of the new location while the old file
still remains in the original location with the same compression state.
The rule changes when using FAT partitions. When you copy or move a
file from an NTFS volume to a FAT partition, the file is uncompressed first
and then copied so that it matches the normally uncompressed level of the
FAT partition.
When you implement compression at the directory (folder or above)
level, you are given the option of leaving the object’s contents in their pres-
ent compression state (whether compressed or uncompressed) or imposing
compression on all its contents. Additionally, once that directory-level ob-
ject is marked as being in the compressed state, all objects subsequently
added are immediately compressed.

Setting Quotas
A second Windows advanced storage feature that you can use on your
NTFS computers allows you to share what storage you have with as many
users as possible—this involves the use of quotas. Providing users a specific
quota, or an assigned limit on the amount of network storage space they can
use, helps ensure an equitable distribution when such networked resources
are limited. The use of quotas is implemented through the Properties dialog
box on each disk drive formatted with NTFS. Microsoft’s quotas feature is
not available on FAT partitions.

335
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:13 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 336

• Notice that the quota tab is available on the NTFS volume, but not the FAT volume.

Equal Access But No Limits Typically, when networks are first created,
storage space appears unlimited and users are granted storage privileges on
a first-come-first-served basis. That is, everyone has equal access to the stor-
Inside Information age, but there are no limits. What frequently happens is that some users
quickly take up all the space, and those users with little (or no) space on the
Installed Applications disks complain that such a system is not fair. If all was fair, and everyone on
and Quotas
your network was to have equal availability for storing their files, then your
If quota management has been
network’s total storage capacity would have to be calculated and divided
implemented on a volume where
you need to install an application, such that all users get an equal share. Keeping track of such an equitable
doing so while logged on as a storage solution at the network level would be burdensome.
non-administrative user will con-
Equal Access with Limits All is not fair, and everyone on your network
sume some (or possibly all) of
does not really need an equal amount of the total storage you have available.
your allotted quota for that vol-
ume. However, quota manage-
Nor should network management be unnecessarily burdensome. Rather,
ment on your network’s volumes Microsoft’s implementation of disk quotas lets you assign users limited
does not apply to your adminis- storage on specified volumes anywhere on your network. The limits you
trative users. Their storage is un- place can be general, so that all users with access to a particular volume have
limited. Therefore, log in as your the same amount, or they can be specific, so that some users have a higher
administrative user whenever storage limit. Thus, storage is divided at the NTFS volume level.
you install applications on your
workstations to avoid exceeding Setting Limits You set limits on disk space use by implementing quotas on
quota limits. your NTFS volumes. After imposing the quotas, you have the choice of either
enforcing their use or simply monitoring users for compliance. In addition to

336
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:15 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 337

setting a limit on storage, you can give users a warning whenever they go be-
yond another, lesser, amount that you can also set. This warns users that they Quota use on compressed vol-
are running out of space and might encourage them to delete some files that umes is calculated based on the
they don’t need to keep but haven’t yet needed to delete. uncompressed size of all stored
files, regardless of file type. Al-
You have the option of configuring quota management to halt further stor-
though it may look like space re-
age attempts when the quota is reached, or you can then have it simply send a mains available, users could still
notice to a predetermined recipient that the quota has been exceeded (usually be prevented from saving more
an administrator or manager) who could then take the appropriate action— files on those volumes.
either increasing storage facilities or requesting compliance with the quota.
Another option you have when setting enforced limits is to reconfigure
specific users separately. Some users may really need additional storage
space, and you can increase the limits for those users on a case-by-case basis.

Step-by-Step 10.03
Implementing Quota Management
Your network storage capacity has been left open for To complete this exercise, you will need the
users to store as much as they want on any of the following:
storage devices. You decide to start monitoring
■ A Windows XP Professional workstation
potential misuse of this privilege by implementing
computer formatted using NTFS
quota management, and you want to practice on one
of your network’s NTFS volumes.

Step 1 Log in to a Windows XP workstation as the administrative user, click the Start button
and select Administrative Tools | Computer Management. Expand the Storage item in
the left pane and select Disk Management. In the lower section of the right pane,
right-click the icon of the disk that houses the volume where you will be implementing
quotas, and select Properties.

337
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:18 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 338

Step 2 In the Properties dialog box, click the Volumes tab and notice that you have access to all
the volumes on your selected disk. In the Volumes section, scroll to and select the vol-
ume where you want quotas implemented, then click the Properties button.
Note: Accessing the entire disk drive’s Properties dialog box gives you an alternative route to the
Properties dialog boxes of all the volumes on that disk drive. If you are only configuring one volume,
you can go directly to that volume’s Properties dialog box through the My Computer window.

Step 3 In the resulting Properties dialog box, click the Quota tab, and check the Enable Quota
Management check box. Select the Limit Disk Space To option and set both the limit and
the warning levels. Select both logging options, and click the Apply button.

Note: If it is the first time quota management has been implemented on the volume, click the OK
button on the Disk Quota window to enable the quota system.

Step 4 Click the Quota Entries button and observe the storage allocations currently set on the disk.
In the Quota Entries window, notice that there are no imposed limits on any of the users. No
limits are imposed unless you deny users additional space for exceeding their limit.

Step 5 Close all windows and dialog boxes to return to your desktop.

338
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:21 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 339

NetWare Networks
When it comes to managing your network components, you should consider
the NetWare portion entirely on its own. This is true even though, as you
have seen throughout this course, the majority of what you have done so far
with your NetWare server has been accomplished from your Windows XP
Professional workstation’s desktop (and possibly from your Windows 2000
Server’s desktop). Your NetWare 6 server offers its own, extremely detailed
and oftentimes complex network management components. This course is
not intended to prepare you to the point where you are an expert with these
tools. Rather, the introductory nature of this course is intended to provide
you with an understanding of some of the basic tools available and show you
some that are comparable to those you learned about for managing the Win-
dows portion of your network.

Using the Server Console


On large networks using most of NetWare’s server capabilities, server manage-
ment involves extensive communication between the administrator and the
server’s network operating system. This communication primarily takes the
form of text-based commands and NetWare Loadable Modules (NLMs), and
the majority of these are still entered or loaded by administrators using the
server console. The ConsoleOne and Internet-based administration techniques,
such as iManage, used in the Novell portions of this text are gaining more and
more acceptance, but, for now, entering text-based commands at your
NetWare server’s console is still the most widely used management technique.

Entering Text-Based Commands at the Console The NetWare operating


system includes numerous commands that operators use when they inter-
face with the file server’s hardware and software. The commands are part of
the operating system, just as DOS commands are part of the disk operating
system (DOS) or Microsoft’s utilities that are built into Windows. You must
be just as careful when using NetWare commands as when working with
DOS commands or Windows utilities. They will act immediately upon
whatever part of the server you specify, and they will do whatever you ask
of them. Some are stand-alone commands, in that they are used without any
command arguments (parts of the command that usually tell the system
what to execute the command upon). Other commands, such as the LOAD
command, will not work unless the arguments are there.
If your syntax (the format of the command) is incorrect, the command
may not be understood at all, or it may be misunderstood and performed by
the software, returning either an error or the wrong result. On the other hand,
if your syntax is correct but your command is for the wrong function, you
could affect your server’s health. Furthermore, in actual operation, many
commands are interpreted by the system even if they are omitted. The com-
mand NAME.NLM could be executed at the console by typing LOAD
NAME.NLM or by simply typing NAME. In the second instance, the system
assumes you want it to LOAD an NLM and interprets your command appro-
priately. Therefore, typing NAME at the console would be an example of
properly using a NetWare text-based command.
The results of using the commands are pretty easy to predict if they are
used properly. The NAME command simply returns the server’s name. Mis-
spell it as NAM, however, and the system looks for a file named NAM to load.

339
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:21 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 340

Similarly, entering the TIME command at the server console returns the
Inside Information system time, and entering MEMORY returns the server’s total memory; on the
other hand, entering the misspelled TIM looks for a file named TIM to load.
Help Available
There are hundreds of commands
Not all commands are that easily interpreted, however, and depending on
available for you to use. You can how bad your misspelling is, the system could end up doing something en-
type HELP at the console to list tirely different from what you intended.
many of the more common com-
mands. There are so many com-
mands listed there that you will
have to press another key (other
than the ESC key, which termi-
nates the HELP command) to see
the rest of the list. You can get
additional assistance for any com-
mand in that list by typing the
desired command immediately af-
ter the HELP command. For ex-
ample, the command HELP DOWN • Three NetWare text-based commands entered at the server console, and their results
would return help for the DOWN
command and give you an exam-
ple of its proper use. Table 10.1 lists some commonly used commands.

Using NetWare Loadable Modules Unlike console commands, NetWare


Loadable Modules (NLMs) are commands stored in locations outside the
operating system. NLMs add functionality to the operating system’s core
capabilities, and an operator must load the NLMs into the server’s memory
to use them. Performing a LOAD action tells the server to read the particular
module into its memory from the default SYS:SYSTEM location (unless

Table 10.1 Common NetWare Text Commands


Command Description
LOAD <NLM> Reads the applicable NLM into the server’s
RAM
UNLOAD <NLM> Removes the applicable NLM from the
server’s RAM
DOWN Closes all open files/volumes and shuts
down the server
SECURE CONSOLE Removes DOS from the server; also allows
loading NLMs only from SYS:SYSTEM
MODULES Displays currently loaded NLMs
CONFIG Displays server’s network interface card
information
DISPLAY NETWORKS Displays all networks to which the server
has access
DISPLAY SERVERS Displays all servers on which the server
has information
SET TIME Allows changing of the current system
date and time
SEND Allows transmitting message to currently
logged on users

340
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:22 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 341

• The SEND command entered at the server console and its resulting message at the users’ workstations

another path is specified), and to then execute (or run) the module. The
added functionality then remains in the server, provided the server contin-
ues to run, or until the operator decides to UNLOAD the NLM.
At the console prompt, type CDROM.NLM to prepare the server to op-
erate the CD drive. The NLM must be loaded before running the MOUNT
command when working with CDs. The MOUNT command makes a volume
available for users, and it is run only once after the server is started. The
MOUNT command then stays in memory until the DISMOUNT command is
run (making the volume unavailable) or you DOWN the server. The NLM can
be added to the startup commands so that it loads automatically whenever
the server is started.
Although many of the common NLMs have a .NLM extension following
the command’s name, there are other extensions available such as .DSK and
.LAN as shown in Table 10.2. Table 10.3 lists some commonly used NLM
modules.

Using the MONITOR NLM


MONITOR is an important NLM that you will likely use very often. If you
are responsible for the overall health of your network, you will probably
spend a great deal of your time reviewing the MONITOR.NLM’s statistics.
The server’s performance and operating statistics, as well as information
about the connections made to the server, can be accessed by using
MONITOR at your server console.

Table 10.2 NLM Types


NLM Types Description
.DSK Provides direct control of server drives (located in the
DOS partition)
.LAN Provides control drivers for network interface cards
.NLM Adds general purpose capabilities to the server

341
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:23 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 342

Table 10.3 Common NLMs


Common NLMs Description
MONITOR.NLM Provides general performance information on the
server
NWCONFIG.NLM Provides the main functions used for server
configuration
CDROM.NLM Adds CD support to the server
DSREPAIR.NLM Allows repairs to NDS
VREPAIR.NLM Allows repairs to specified volumes
REMOTE.NLM Allows server operation (with password) at
workstation
3C509.LAN An example of a control driver (3Com network card)

Running MONITOR Typing LOAD MONITOR (or just MONITOR) at the


console prompt and pressing the ENTER key will give you a screen containing
several pieces of information about your server, as shown in Figure 10.1.
If nothing else is entered through the console for approximately ten sec-
onds after loading MONITOR.NLM, the General Information part of the
screen opens further, as shown in Figure 10.2, and additional information is
displayed. This additional information is also available in the initial screen if
you press the TAB key. The TAB key also toggles you back and forth between
the expanded window and the reduced initial screen.

Quick Snapshot Sometimes a quick snapshot of a network’s traffic flow


while the network is in actual operation will tell you if a problem exists. For
example, if the total number of cache buffers (available working memory) in
the General Information window falls below half of the original cache buff-
ers, this indicates that the server is running low on memory, and you should
either increase memory or decrease the demands on the amount of memory
you have. Either add RAM or UNLOAD NLMs.

• Figure 10.1 The initial results of running the LOAD MONITOR command at your
server console

342
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:25 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 343

Inside Information
MONITOR
Information
If the expanded General Informa-
tion window covers the Available
Options window, press the TAB
key and observe the scroll bar at
the left side of the options window
to see where the additional infor-
mation is. Use the keyboard’s up
or down arrow to reveal this addi-
tional information. Selecting any
of the listed Available Options
will display an information win-
dow with the applicable item’s
• Figure 10.2 After ten seconds of inactivity, the General Information section expands. information. These options can
provide a significant amount of
information about the server’s op-
This course is not intended to give you a complete understanding of eration. Tracking pertinent pieces
each of the preceding items. The goal at this introductory level is to show of this data can alert you to a po-
you where to go should you need to locate such information in times of cri- tential problem.
sis. Keeping track of the information here also lets you record trends that
can help you spot potential problems as they develop.

Using the DSREPAIR NLM


Hopefully, you will not need to re-
pair your NDS tree. If you must Cross Check
repair it, though, you should
have some idea of where to go to DSREPAIR Information
initiate the repairs. Running the Need to know more about DSREPAIR? Go back to Chapter 4 and read
DSREPAIR NLM will help you. the “Installing and Configuring Novell NetWare 6” section and per-
You used DSREPAIR after you form the Try This! exercise at the end of that section to run DSREPAIR at
built your server, so you should your server once again. Then answer these questions:
know a little about the NLM. 1. How long did your DSREPAIR take? ____________
Occasionally running DSREPAIR 2. How many repairs did DSREPAIR make? ____________
will help remove small network
problems before they progress 3. Highlight each of the DSREPAIR screen options and copy the
any further. information provided by the system at the bottom of the screen.
Copies of NDS are located on a. Single object repair: ___________________________________
other servers in various locations b. Unattended full repair: _________________________________
around the network, and this
c. Time synchronization: _________________________________
makes the timing of updates criti-
cal. If you are wondering whether d. Report synchronization status: ___________________________
errors in timing, and the fact that e. View repair log file: ___________________________________
NDS is spread over several loca-
f. Advanced options menu: ______________________________
tions can cause NDS to become dis-
jointed at times, it can. That is when
DSREPAIR really comes in handy.

343
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:26 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 344

Unattended Full Repair You should recall that selecting the Unattended
Inside Information Full Repair option in DSREPAIR and pressing ENTER immediately initiates
the repair action. Depending on the size of your network, this could take
NDS Replicas
In larger networks with multiple
some time to complete. On a small network, such as yours, the process
file servers, NDS stores duplicate should take only a few seconds to complete.
pieces of the Directory, called When the repair action is completed, a window is displayed informing
replicas, on many of the servers you that “All automatic repair operations have been completed.” It also tells
around the network. Replicas pro- you the number of errors and the total amount of repair time the operation
vide fault tolerance and backup required. It is not uncommon for DSREPAIR to uncover numerous insignifi-
capability. The servers communi- cant errors, so occasionally running DSREPAIR will help keep your net-
cate with each other, sharing up- work operating properly. You may need to run it several times when
dates to the Directory as needed. removing errors. Provided you have the network idle time available to you,
Whether these updates are passed rerun the process until zero errors are found by DSREPAIR.
on to the next recipient is deter-
mined by the time stamp placed Advanced Options Menu Selecting the Advanced Options Menu and
on them by the servers. If the re- pressing ENTER provides the following additional DSREPAIR options:
cipient server has data with a
newer time stamp, that update is ■ Log File and Login Configuration Configures options for the
determined to be unnecessary and DSREPAIR log file. Logging in to the Directory Services tree is
is therefore ignored. The time- required by some operations.
stamp system depends entirely on ■ Repair Local DS Database Repairs the Directory Services database
all servers knowing exactly what
files stored on this server.
time it is, and this is accom-
plished through a centralized ■ Servers Known to This Database Shows the names of the servers
time-allocation system. For suc- that have performed the following operations to this server’s
cessful replica operation, one database: time synchronization, network addresses, and server
main server is responsible for pro- information.
viding accurate time to all the
■ Replica and Partition Operations Provides functions to repair
other servers working together.
replicas, replica rings, and server objects. This option also dynamically
displays each server’s last synchronization time.
■ Check Volume Objects and Trustees Checks all mounted volumes
for valid volume objects and valid trustees on the volumes.
You should try to activate
■ Check External References Checks for illegal external references.
any repair process, such as
DSREPAIR, during the network’s ■ Security Equivalence Synchronization Allows users to synchronize
idle times. Otherwise, users will security equivalence attributes throughout the tree.
be disrupted because the Direc-
tory is locked during the entire ■ Global Schema Operations Provides functions to update the schema
procedure. Additionally, any in the tree.
repairs made during the repair
■ View Repair Log File Allows you to edit the log file, which is
process will most likely create
incorrect time stamps that occurr optionally created when repair operations are performed.
while your system is offline and ■ Create a Database Dump File Copies the Directory Services database
you should allow your system
files to disk in compressed format, to be used for offline repairs and
time to synchronize after repairs
are completed. diagnostics. This is not to be used as a backup method.
■ Return to Main Menu Exits this menu and returns to the main list.

You will probably be interested in running only the Repair Local DS Da-
tabase and the Check Volume Objects and Trustees options. The first will
behave in the same way as the unattended option that you ran earlier, and
the second will require that your fully distinguished administrator user
name and password be used for authorization. It is useful to use both of
these options on an occasional basis. They should not return major errors
unless there is a significant problem.

344
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:27 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 345

Step-by-Step 10.04
Using NWCONFIG
You should become familiar with another frequently ■ An operational NetWare 6 server
used NLM—the NWCONFIG NLM. This is the ■ Your administrative user information (if not
NLM that you will use to accomplish most of the already logged in to the server)
configuration options needed on your NetWare server.
To complete this exercise, you will need the
following items:

Step 1 From your NetWare 6 server’s GUI desktop, press CTRL+ESC to go to the Current Screens
window. Enter the selection number for the System Console.

Step 2 Type NWCONFIG at the server console, and press ENTER to view the options available.

Note: Most of the options listed are self-explanatory. Several options have additional features
when selected, but three, Legacy Disk Options, NSS Disk Options, and License Options, tell you
that they no longer work through NWCONFIG when you select them and press ENTER.

Step 3 Select Driver Options, press ENTER, and press ENTER again to view the disk drivers cur-
rently loaded on your server. You could press ENTER yet again to either search for addi-
tional drivers or load new drivers on your server. Press the ESC key twice to return to the
initial NWCONFIG screen.

Step 4 Select Directory Options, press ENTER, and notice the important actions available to you
here, such as installing or removing Directory Services, creating Directory backups, or
extending the schema.

345
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:28 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 346

Step 5 Select Directory Backup and Restore Options, press ENTER, and press ENTER again to se-
lect the Save Local NDS Information Before Hardware Upgrade option. Read the notice
that comes up on your computer screen.

Note: If you do ever have to use this backup technique, you will be required to use your fully quali-
fied administrative user name (CN=Admin.O=LAB) and password.

Step 6 Click Cancel so you do not actually implement the backup action. You could damage
your copy of NDS in the process. Press the ESC key twice to return to the initial
NWCONFIG screen.

Step 7 Look through the remaining options without implementing any changes (use the same
general procedures as in Steps 3 through 6). From the initial NWCONFIG screen, press the
ESC key again when you are finished, and select Yes and press ENTER to exit NWCONFIG.

346
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 347

Chapter 10 Review
■ Chapter Summary
After reading this chapter and completing the Step- ■ SNMP is an Internet-standard protocol that
by-Step tutorials and Try This! exercises, you should facilitates monitoring the system and sending
understand the following facts about network status updates to a central location.
management: ■ SNMP nodes send messages when queried by the
manager, but they can also send alarm messages
Describe Windows Network Management Tools on their own when properly configured.
■ Access to the server through your workstation is ■ Performance console lets you collect data about
becoming the most common way to manage your your system’s performance.
network.
■ System Monitor is a part of the Performance console
■ No matter what the problem is with a user’s that lets you view current or recorded information
computer, they usually blame the network about your system.
technicians first and then the network itself.
■ The different views in System Monitor are graph,
■ Management tools, such as the Error-Checking, histogram, and report.
Defragmentation, and Backup utilities, are
available on Windows workstations. ■ The Performance Logs and Alerts section of the
Performance console records its data in the Perflogs
■ The Error-Checking tool is also called the Check folder on your hard disk drive.
Disk tool, and it can be initiated with a DOS
command by typing chkdsk in the RUN dialog box. ■ Network Monitor provides you with information
regarding your network’s health.
■ The defragmentation window includes graphic
depictions of your current and projected disk ■ Network Monitor actually records the data flowing
fragmentation. between the computers on your network and
your server.
■ The Defragmentation tool requires 15 percent of the
total disk space available on the disk to be empty in Implement Windows and
order to run properly, but it will run with less. NetWare Network Management
■ The Backup tool can be used to keep users’ ■ Improperly maintaining networks wastes the effort
information accessible because users can restore required to create them.
some of their own files if they keep their own
backups.
■ A healthy network’s use will tend to increase rapidly.
■ Compression reduces the size of files so they take
■ To initiate a backup, users must be working with
up less storage space.
their own files or they must have the Read, Read
and Execute, Modify, or Full Control permission ■ Having smaller files that contain the same data
to the files. means that you can store more valuable information
on your network without increasing storage space.
■ To restore from a backup, users must have the
Write, Modify, or Full Control permission to the ■ Compression can only be implemented on NTFS
backed up files. volumes.
■ The Task Manager is started by right-clicking the ■ Compression can be implemented at the volume
taskbar or using CTRL+ALT+DELETE and selecting level with everything on that volume being stored
Task Manager. in the compressed state, or at the file level where
only specific files are compressed.
■ Windows XP Professional adds a Networking tab
to the Applications, Processes, and Performance ■ Compression and encryption are mutually
tabs found on the Windows 2000 Server’s Task exclusive.
Manager window.

347
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 348

■ Applications using compressed files check the ■ NetWare 6 has extremely detailed, and sometimes
compression state and uncompress applicable files complex, network management components.
prior to use. ■ The NetWare server console’s text-based
■ Except for FAT partitions (which are always commands are still the most widely used
uncompressed), moving a compressed file from one management technique.
location on a volume to another location on the same ■ Some NetWare commands are stand-alone
volume has that file retain its original compression commands, and others require arguments.
state, whereas copying that file to another location on
the same volume has the file acquire the compression ■ There are hundreds of commands available for use
state of the receiving location. at the NetWare server console, and you can get
information about their use by using the HELP
■ When implementing compression, you have the command.
option of leaving an object’s contents as they are
or compressing them. ■ NLMs are commands stored in locations outside
the operating system.
■ Quota management assigns a limit on the amount of
space users can use for storage on specific volumes. ■ The NetWare MONITOR NLM is a tool for
gathering and monitoring information about
■ Quota management is available only on NTFS your network’s health.
volumes.
■ Periodically running DSREPAIR helps maintain
■ Quotas can be implemented as mandatory, in your system.
which case they are enforced, or as informational,
which means compliance is simply monitored. ■ NWCONFIG is another important utility used to
obtain and update information about your network.
■ Quota use on compressed volumes is calculated
based on the uncompressed size of the stored files.

■ Key Terms
agent (323) MIB (324) report view (326)
arguments (339) Network Monitor (331) SNMP (323)
cache buffers (342) NMS (323) SNMP manager (323)
compression (333) nodes (323) state (322)
graph view (326) page file (322) System Monitor (326)
histogram view (326) Performance console (325) Task Manager (319)
kernel (322) quota (335) trap message (323)
link state (322) replicas (344)

■ Key Term Quiz


Use the preceding vocabulary terms to complete the 3. An assigned limit on the amount of network
following sentences. Not all the terms will be used. storage a user can use is called a(n) ___________.

1. An alarm message sent by an SNMP agent is also 4. The name of the tool that includes a Networking
called a(n) ______________. tab in its Windows XP implementation is the
______________.
2. When running MONITOR on a NetWare 6
server, if the available memory, also called 5. By clicking the Performance tab on the tool that
______________, falls below half of its original can be entered using the Microsoft three-finger
amount, a remedy could be to add RAM or salute, you can view graphical screens showing
UNLOAD NLMs. dynamic information on your CPU and your
______________.

348
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 349

6. Once a network node is monitored by SNMP and 9. The ______________ utility records a copy of
managed by SNMP manager, it is referred to as the data flowing between other computers and
a(n) _____________________. your server.

7. The Internet-standard protocol that facilitates 10. The Windows advanced storage feature that
monitoring the system and communicating helps extend your network’s storage capacity by
status updates is called the ______________. reducing the size of files is called _____________.

8. The ____________ portion of your Performance


console utility provides you with optional
viewing configurations.

■ Multiple-Choice Quiz
1. Which of the following tools is not located on the b. The Management and Monitoring Tools
hard disk drive’s Properties dialog box? component
a. Backup c. A Details button
b. Error-Checking d. Selection boxes
c. Defragmentation 6. Which of the following is the default permission
d. Task Manager for SNMP service community names?

2. Which of the following can be initiated using the a. Full Control


RUN dialog box, accessed through the Start menu, b. Read Only
with the fix switch? c. Write
a. Backup d. Read/Write
b. Error-Checking 7. Which of the following views in System Monitor
c. Defragmentation allow(s) you to change the view’s background?
d. Task Manager a. graph
3. Which of the following makes use of an Analyze b. histogram
button? c. report
a. Backup d. All of the above
b. Error-Checking 8. Which of the following is listed in the Name
c. Defragmentation column for the default Counter Log used in
d. Task Manager the Performance Logs and Alerts section of the
Performance window?
4. All of the following are associated with SNMP
except: a. System Log

a. host b. System Overview

b. nodes c. System_Overview.blg

c. agents d. C:\System Log

d. players 9. Which of the following is a true statement


regarding Network Monitor?
5. Inside the Windows Components Wizard window,
you will see all of the following options or features a. It records all network traffic on your network.
except: b. Network traffic is only recorded when it is
a. The Add/Remove Programs option going to the local computer where Network
Monitor is configured.

349
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 350

c. Network traffic can only be recorded at the storage by an average of 50 percent. Which of the
local computer where Network Monitor is following is/are definitely true?
configured.
a. Both users have to have specific quotas set on
d. Network traffic is only recorded when it is
that volume.
going from the local computer where Network
Monitor is configured. b. Both users will still be over their quotas.

10. When you copy a compressed 10MB file to a c. They each can store at least another 225MB.
volume with 19MB of available space, which of d. Quota management is not being enforced.
the following will be true? 13. Which of the following deals with NetWare NLMs?
a. The copy action will be disallowed and the a. MODULES
file will remain compressed.
b. CONFIG
b. The copy action will be allowed and the file
c. DISPLAY
will be uncompressed.
d. All of the above
c. The copy action will be allowed and the file
will be compressed. 14. Which of the following is true when your
NetWare 6 server’s cache buffers fall below
d. The copy action will be disallowed and the
25 percent of the original cache buffers?
file will remain uncompressed.
a. You should decrease memory demand.
11. If you were to copy a compressed 10MB file from
one volume to another volume that is not using b. You should add RAM.
compression, which of the following would c. This is an acceptable condition.
be true?
d. None of the above.
a. The copy action will be disallowed and the
15. Which of the following is/are true about
file will remain compressed.
DSREPAIR:
b. The copy action will be allowed and the file
a. Running DSREPAIR locks the Directory
will be uncompressed.
during the entire procedure.
c. The copy action will be allowed and the file
b. You should run DSREPAIR when user impact
will remain compressed.
would be lessened.
d. The copy action will be disallowed and the
c. Repairs made will likely have an incorrect
file will be uncompressed.
time stamp.
12. Two users have 500MB quotas on a particular
d. All of the above.
volume where they each have 550MB of
information stored. The administrator then
implements compression that reduces all files in

■ Essay Quiz
1. How can this course help prepare you to become 4. When considering whether to use compression
a better network administrator? on your network servers, why is it important that
2. Why are network technicians blamed when you find out if encryption is being used?
network workstations malfunction? 5. What is the main difference between NetWare
3. Explain the benefits of having users involved in console commands and NLMs?
managing their own workstations.

350
Introduction to Networking

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 351

Lab Projects
Time to roll up your sleeves and apply what you’ve
learned. The following lab projects will enable you to
practice the concepts discussed in this chapter.

• Lab Project 10.1


The data in storage at the TEACH training center Then do the following:
has recently been compressed. Your network’s users
are confused about which files are compressed • 1 At your workstation computer, log in locally as
your administrative user.
and which are not. You decide to configure their
computers so that the compressed files show up as • 2 Click the Start button and select My Documents
| Tools | Folder Options.


a different color than those that are uncompressed.
You now want to configure their computers to 3 Click the View tab, and in the Advanced Settings
display this information. section, scroll to and select the Show Encrypted
You will need the following: or Compressed NTFS Files in Color option.
(Note that this only allows you to employ the
■ A networked lab computer with Windows XP system-provided “different” colors, not to choose
Professional your own colors.)
■ Administrative user login information
• 4 Click OK and close all windows to return to
the desktop.

• Lab Project 10.2


You implemented quota management on your Quota Limit option, and adjust the Limit Disk
TEACH volumes, but users are still storing as much Space To options as desired. Ensure that both
as they want on all of the storage devices because the logging options are selected, and click the
quotas are not being enforced. You decide to stop this Apply button.
misuse of storage by changing the quota management
such that it is enforced, and users are not allowed to
exceed their limit.
• 3 Click the Quota Entries button and observe the
storage allocations and limits imposed on users
with storage on the disk.


You will need the following materials:
A networked lab computer with Windows XP • 4 Right-click a listed user (not the administrator)
and select Properties. Notice the newly
Professional, formatted using NTFS imposed limits on the user.
■ Your administrative user’s information Note: If the user’s limits have not been updated to
reflect your changes, simply click the Do Not Limit
Then do the following: Disk Use option, and then click the Limit Disk

• 1 Log in to a Windows XP workstation


(where network storage is allowed) as the
• 5
Space To option again, and click the Apply button.
Close all windows and dialog boxes to return
administrative user. Click the Start button and to your desktop.
select My Computer. Right-click the volume
you wish to change, and select Properties.

• 2 Click the dialog box’s Quota tab and ensure the


Enable Quota Management option is selected.
Select the Deny Disk Space to Users Exceeding

351
Chapter 10: Managing a Network

P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM

You might also like