Managing Network ch10
Managing Network ch10
10 Managing a Network
312
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 4:18:51 PM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 313
313
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:22 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 314
Error-Checking Tool The first tool listed on the Tools tab of a workstation’s
hard disk drive’s Properties window is the Error- Checking tool, which, as
its name implies, checks your drive for errors—it is also called the Check
Disk tool. Clicking the Check Now button starts this tool. Frequent use of
the Error-Checking tool lets users scan their hard disk drives and verify
whether any operating system or filing system errors have occurred. If such
errors exist, it gives them options for fixing those errors.
314
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:23 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 315
Inside Information
How Often Is Enough?
Users will often ask how often
they should perform the mainte-
nance techniques you show them
or run tools similar to those dis-
cussed in this section. You
should temper your immediate
response—that they cannot be
run enough—with the realization
that users have varying levels of
both technical ability and com-
puter use. For both reasons, users
may not need to maintain their
systems as diligently as you
would consider normal.
Rather, your response to them
should be to tell them that the three
tools should be performed on a
monthly, weekly, daily, or hourly
The other option available in the Check Now window allows users to
basis depending on the numbers
scan for and attempt to recover bad sectors on the hard disk itself (or multiple and types of files they use and how
hard disks if so equipped). While this is normally a fast process, simply easily they can get along without
because finding errors is rare, this option can take a long time if errors are those files. A user working with a
located. If the tool does find errors and repairs them, you should then run lot of client financial records that
the Defragmentation tool to relocate the information that was moved from simply cannot be lost should use
the bad sectors so that it is stored contiguously. You should also give serious management tools more often than
thought to replacing the disk drive, or at least backing up the information someone working with relatively
on the drive to another location, and doing so more often. few files that are easily re-created.
The hard disk being inspected by the Error-Checking tool must not be in A better solution would be to
recommend the weekly use of these
use. If that hard disk’s system files or any of its stored files or applications
tools by your users. You, yourself,
are currently being used, the tool notifies the user that the system cannot be
may be performing them on a less
checked without restarting the computer. It also asks whether the user
frequent basis but you could in-
wants the system to be checked when the computer is next started. Upon struct your users to increase or de-
restart, the system’s files are checked before being put into use. Additionally, crease the frequency of these tests
when the Error-Checking tool is used on NTFS volumes, all actions taken by doing their own tests. You
during the repair process are tracked, any bad clusters are repaired automati- should tell them that a good way to
cally, and important information on all files is copied and stored on the disk. decide how often they should con-
duct their own use of these man-
agement tools should be based on
how difficult it would be to work
without the material contained on
their computer.
• You can schedule the disk to be checked the next time you restart your computer.
315
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:25 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 316
316
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:28 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 317
• Your computer will let you know whether you have enough free space for efficient defrag performance.
When the defrag operation is complete, you will be notified and can use
the color codes in the fourth section (under the row of buttons below the two For effective operation, the
rows of graphical information) to determine the status of each identified Defragmentation tool requires
area on the disk. You also have the option of either reviewing the tool’s that 15 percent of the total space
available on your volume be
report to see a listing of files that could not be moved, or clicking the Close
available as free space that can
button to return to the Disk Defragmenter, where you can select another be used when moving files. How-
volume to defragment. ever, if you don’t have that much
free space, you can still conduct
the defrag operation if you don’t
mind spending a bit more time
completing the process.
Before After
• The Defragmentation tool displays “before” and “after” depictions of your data.
317
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 318
318
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:33 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 319
319
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:35 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 320
When you open Task Manager, the tab that will be displayed is the
same tab that was in view the last time the tool was closed, and the same
settings will be in place too. On your Windows 2000 Server, there are
three tabs available in the Windows Task Manager window: Applica-
tions, Processes, and Performance. Your Windows XP workstations will
have a new Networking tab.
320
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:36 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 321
• You can configure the Task Manager to show the information you want.
321
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:43 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 322
Step-by-Step 10.01
Touring the Task Manager Tool
Use the local workstation’s Task Manager tool to ■ An operational networked Windows XP
view information about your computer. workstation or Windows 2000 Server
To complete this exercise, you will need the
following item:
Step 1 At your Windows workstation or server desktop, right-click an empty space on the
taskbar and select Task Manager. If you are working on your server, notice that there are
only three tabs, which means you will not be able to view your networking information.
Step 2 Click the Applications tab to see the applications currently running on that computer.
Choose View and select Details, and notice that the status is given for each application.
Click the New Task button, notice that the Create New Task window that appears is
similar to the Run window accessed through your Start menu, and click the Cancel button
to return to the Applications tab.
Step 3 Click the Processes tab to see the processes currently running. Choose View and select
Select Columns to view additional columns that are available, and then click the Cancel
button to return to the Processes tab. Right-click a process and notice that you have the
option to stop either the process itself (End Process) or the process and all other associated
processes as well (End Process Tree). Note, though, that the system will not let you end
a process that is critical to the system’s continued operation.
Caution: You should not make any alterations to the Set Priority option available when
right-clicking a process. Doing so may affect your computer’s proper operation. You should also
make sure to point out to your users that they should not make any such changes either.
Step 4 Click the Performance tab and note the graphs that provide dynamic information on your
CPU and your page file (a temporary work space in memory). Click View and select
Show Kernel Times to add another line (red) to the CPU Usage History graph depicting how
much of the CPU usage was needed by the heart of the operating system—the kernel.
Step 5 If you are working on your Windows XP workstation, you can click the Networking tab
to view activity to or from each of your own computer’s network connections. Choose
View, select Network Adapter History, and add either the Bytes Sent or Bytes Received
lines to the default Bytes Total displayed in the graphs. The information listed at the
bottom of the screen includes the link speed and the link state (or operational status) for
each connection.
322
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Thursday, February 13, 2003 10:31:43 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 323
• Start or stop the SNMP service through your Windows Components Wizard.
323
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:44 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 324
• SNMP is configured through the Services and Applications section of the Computer Management console.
324
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:47 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 325
325
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:48 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 326
• Performance console showing an example of the System Monitor’s data in graph format
■ Histogram view The histogram view displays the data for each
item being tracked along the same two axes, time and amplitude,
but does so with bars showing totals for different items. All the
changes that can be made to the graph view can similarly be made
to the histogram view. The type of data being viewed can also
switch between current, minimum, average, or maximum values.
■ Report view The report view displays the data for each item
being tracked in summary format only. Many of the same changes
available in displaying the other views are available in the report
view, such as different backgrounds, additional items tracked, and
the four types of data to display. The graphical changes, however,
are obviously not available in this view.
326
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:51 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 327
• Performance console showing an example of the System Monitor’s data in histogram format
• Performance console showing an example of the System Monitor’s data in report format
Performance Logs and Alerts The Performance Logs and Alerts portion of
the Performance console allows you to configure and record the sampled
data that is displayed in the System Monitor. You can select the items you
want sampled, schedule a time for the sample to be made, and save the in-
formation as a log in the default storage location, the Perflogs folder on your
C: drive, or change it to another location, as you can see in the following il-
lustration. You can create Performance logs manually when you want one
or they can be done automatically at a preset time. Alerts can be configured
to send their information when a predetermined condition occurs, such as
low drive space or high processor use.
327
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:55 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 328
Step-by-Step 10.02
Recording and Viewing a Performance Log
You want to use a System Monitor performance log To complete this exercise, you will need the
to capture information on the three default items following item:
displayed in Performance Logs and Alerts. Then you
■ A Windows XP Professional workstation
want to view the log and check its information.
computer
Step 1 On a Windows XP workstation, click the Start button and select Administrative Tools |
Performance.
Step 2 In the Performance window’s left pane, expand Performance Logs and Alerts, and select
Counter Logs to display the default System Overview log. In the right pane, right-click
the System Overview log and select Properties. View the information on the General,
Log Files, and Schedule tabs of the Properties dialog box. Pay particular attention to (and
write down) the current log filename shown on the General tab.
328
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:17:57 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 329
Step 3 Close the Properties dialog box and select the System Overview log. Select Action | Start
to start the System Overview log. This begins recording the information that you viewed
in Step 2.
Step 4 After approximately two or three minutes, select Action | Stop to stop recording, and
your system will automatically save the log file with the name and in the location that
you viewed in Step 2. In the Performance window’s left pane, click on System Monitor.
Step 5 At the top of the right pane, pause your mouse pointer over each of the buttons to view
its function. Click the second button from the left to clear the display, and then click the
View Graph button, and click the View Log Data button. On the Source tab of the System
Monitor Properties dialog box, choose the Log Files option and click the Add button.
Browse to the location you wrote down in Step 2, and double-click your log file in the
Perflog folder.
Step 6 Click the Apply button. Notice that your System Monitor now displays the data stored in
the log file in the Perflog folder.
329
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:00 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 330
Step 7 Use the different tabs of your System Monitor Properties dialog box to change the ap-
pearance of the information in your log as you review the data you recorded. Click OK
after returning to the graph view. Select one of the recorded items for emphasis by click-
ing on the item in the bottom section of the graph view (such as the yellow line in the pre-
vious illustration) and clicking the Highlight button. As you can see here, the selected
item is highlighted in black.
Step 8 Close all windows when you are finished checking your data.
330
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:05 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 331
Network Monitor
Network Monitor is another utility
Try This!
available on your Windows 2000 Installing Network Monitor
Server that is similar to the Per- You want to install and configure Network Monitor on your network.
formance console but is intended Try this:
to provide you with information 1. On your Windows 2000 Server, click the Start button and select
about the health of your network. Settings | Control Panel. Double-click Add/Remove Programs.
Earlier in this chapter you learned
2. Select Add/Remove Windows Components to start the Windows
how to show your users a similar
Components Wizard.
function on their Windows XP
Professional workstations—on the 3. Select Management and Monitoring Tools and click the Details
Networking tab of their Task button to see the tools available.
Manager. However, the Network 4. Select the Network Monitor Tools option, click OK, click Next,
Monitor utility on your server is and then click the Finish button to implement your changes. Note
much more powerful and pro- that your computer may have to be restarted after configuring
vides you with considerably more Network Monitor Tools.
information about your local net-
work than you can obtain using Windows XP’s limited version. Network
Monitor is not installed automatically on your server. You must install it like
you installed SNMP—through the Windows Components Wizard.
When in use, the Network Monitor utility actually records a copy of the
data flowing between the computers on your network and your server. Like a
tape recording of a telephone conversation, this monitoring utility does not
disturb the conversation but merely records a copy of it. Also, like the tape of
that conversation, the recorded network session can be copied, reviewed, sent
for analysis, or otherwise broken down and listened to. Thus, having Network
Monitor running on a network can pose a serious security concern. Someone
with the right equipment could interpret much of what goes on over your net-
work. If the network information is not otherwise encoded or protected, it can
be understood from the data recorded using Network Monitor.
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:08 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 332
After installing Network Monitor on your server, you are asked which
You can obtain more infor- network you want monitored. As powerful as Network Monitor is, it is limited
mation about SMS through to monitoring a single network as mentioned previously, and it can only
the Microsoft SMS web site at monitor traffic flowing to or from your local machine—your server. This is
http://www.microsoft.com/
for security reasons. Even more powerful network monitoring is available
smserver/default.asp.
with Microsoft’s Systems Management Server (SMS) or applications from
other third-party vendors if you need additional capturing capability.
Network Monitor will detect and alert you to any additional instances of
Network Monitor running on your network. This ensures that nobody else
is capturing traffic using Network Monitor as it comes from your server.
To use Network Monitor, you simply click the toolbar’s Start Capture
button. When you feel you have captured enough data to perform your
analysis, you just click the Stop Capture button on the toolbar. If you want to
pause your capturing for a short time, there is a Pause/Continue Capture
button on the toolbar. After stopping your capture, you can then click the
toolbar’s Display Capture button to see the results. If you want to stop an
ongoing capture and immediately view its contents, there is even a Stop and
View Capture button that you can use.
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:09 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 333
While this course is not intended to make you an analysis expert, able to
decode captured network messages, it is good practice to know how to use
the tool and understand the way it works. The data is extremely over-
whelming to someone viewing real network traffic for the first time without
serious additional training, and it may still be overwhelming to long-time
networking specialists. When you make your first captures, remember that
they record extremely high levels of data. Each frame recorded can be
further broken down into all of its individual elements, and each character
can be decoded to some level. Don’t waste a lot of storage by unnecessarily
recording more than you need to get a feeling for what is being monitored.
Windows Networks
When your network is operational and you are using many of the features
discussed earlier in this chapter, it will become evident that the amount of
storage space needed by your users seems to be ever-increasing. Microsoft
makes two additional features available that will help you on the Windows
portion of the network. The first, compression, helps reduce the amount of
space needed for the data stored on your network. The second, quotas, lets you
limit the amount of network storage space your users are authorized to use.
Compressing Data
Because you created your server and all your workstations using NTFS, you
can use the Windows advanced storage feature that helps extend your net-
work’s existing storage capacity—compression. Compressing data reduces
the size of a file so that it takes up less storage space. If you have a lot of data
stored on your network, and you implement compression, you can store more
in the same amount of space, making your network that much more valuable to
the users without spending any money on additional storage space.
Compression is not quite as simple as it sounds—there are some
trade-offs. For example, when copying a file to a compressed volume, NTFS
reserves space for that file to be uncompressed, so if there is enough space for
the compressed file but not enough to uncompress the file, the copy action
will be disallowed. Furthermore, there is a slight decrease in performance due
to the requirement to decompress a file before use.
333
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:09 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 334
• File-level compression
334
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:12 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 335
Compression Rules There is a general rule (with one exception) that helps ex-
plain compression attributes: A file, whether copied or moved, will inherit the
compression attribute of the new folder it is being copied or moved into. The
one exception is that a “move” within the same volume (partition) will not in-
herit the new folder’s compression attribute. The reason for this exception is
that the file is not actually being moved from the point of view of the operating
system—only a pointer is moved, “pointing” to the original location.
An example will help explain. If you move a file from one location on an
NTFS volume to another location on the same volume, the file retains its
original compression state in its new location. If you copy that file from the
same NTFS volume just discussed to the same new location, though, the
new file acquires the compression state of the new location while the old file
still remains in the original location with the same compression state.
The rule changes when using FAT partitions. When you copy or move a
file from an NTFS volume to a FAT partition, the file is uncompressed first
and then copied so that it matches the normally uncompressed level of the
FAT partition.
When you implement compression at the directory (folder or above)
level, you are given the option of leaving the object’s contents in their pres-
ent compression state (whether compressed or uncompressed) or imposing
compression on all its contents. Additionally, once that directory-level ob-
ject is marked as being in the compressed state, all objects subsequently
added are immediately compressed.
Setting Quotas
A second Windows advanced storage feature that you can use on your
NTFS computers allows you to share what storage you have with as many
users as possible—this involves the use of quotas. Providing users a specific
quota, or an assigned limit on the amount of network storage space they can
use, helps ensure an equitable distribution when such networked resources
are limited. The use of quotas is implemented through the Properties dialog
box on each disk drive formatted with NTFS. Microsoft’s quotas feature is
not available on FAT partitions.
335
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:13 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 336
• Notice that the quota tab is available on the NTFS volume, but not the FAT volume.
Equal Access But No Limits Typically, when networks are first created,
storage space appears unlimited and users are granted storage privileges on
a first-come-first-served basis. That is, everyone has equal access to the stor-
Inside Information age, but there are no limits. What frequently happens is that some users
quickly take up all the space, and those users with little (or no) space on the
Installed Applications disks complain that such a system is not fair. If all was fair, and everyone on
and Quotas
your network was to have equal availability for storing their files, then your
If quota management has been
network’s total storage capacity would have to be calculated and divided
implemented on a volume where
you need to install an application, such that all users get an equal share. Keeping track of such an equitable
doing so while logged on as a storage solution at the network level would be burdensome.
non-administrative user will con-
Equal Access with Limits All is not fair, and everyone on your network
sume some (or possibly all) of
does not really need an equal amount of the total storage you have available.
your allotted quota for that vol-
ume. However, quota manage-
Nor should network management be unnecessarily burdensome. Rather,
ment on your network’s volumes Microsoft’s implementation of disk quotas lets you assign users limited
does not apply to your adminis- storage on specified volumes anywhere on your network. The limits you
trative users. Their storage is un- place can be general, so that all users with access to a particular volume have
limited. Therefore, log in as your the same amount, or they can be specific, so that some users have a higher
administrative user whenever storage limit. Thus, storage is divided at the NTFS volume level.
you install applications on your
workstations to avoid exceeding Setting Limits You set limits on disk space use by implementing quotas on
quota limits. your NTFS volumes. After imposing the quotas, you have the choice of either
enforcing their use or simply monitoring users for compliance. In addition to
336
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:15 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 337
setting a limit on storage, you can give users a warning whenever they go be-
yond another, lesser, amount that you can also set. This warns users that they Quota use on compressed vol-
are running out of space and might encourage them to delete some files that umes is calculated based on the
they don’t need to keep but haven’t yet needed to delete. uncompressed size of all stored
files, regardless of file type. Al-
You have the option of configuring quota management to halt further stor-
though it may look like space re-
age attempts when the quota is reached, or you can then have it simply send a mains available, users could still
notice to a predetermined recipient that the quota has been exceeded (usually be prevented from saving more
an administrator or manager) who could then take the appropriate action— files on those volumes.
either increasing storage facilities or requesting compliance with the quota.
Another option you have when setting enforced limits is to reconfigure
specific users separately. Some users may really need additional storage
space, and you can increase the limits for those users on a case-by-case basis.
Step-by-Step 10.03
Implementing Quota Management
Your network storage capacity has been left open for To complete this exercise, you will need the
users to store as much as they want on any of the following:
storage devices. You decide to start monitoring
■ A Windows XP Professional workstation
potential misuse of this privilege by implementing
computer formatted using NTFS
quota management, and you want to practice on one
of your network’s NTFS volumes.
Step 1 Log in to a Windows XP workstation as the administrative user, click the Start button
and select Administrative Tools | Computer Management. Expand the Storage item in
the left pane and select Disk Management. In the lower section of the right pane,
right-click the icon of the disk that houses the volume where you will be implementing
quotas, and select Properties.
337
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:18 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 338
Step 2 In the Properties dialog box, click the Volumes tab and notice that you have access to all
the volumes on your selected disk. In the Volumes section, scroll to and select the vol-
ume where you want quotas implemented, then click the Properties button.
Note: Accessing the entire disk drive’s Properties dialog box gives you an alternative route to the
Properties dialog boxes of all the volumes on that disk drive. If you are only configuring one volume,
you can go directly to that volume’s Properties dialog box through the My Computer window.
Step 3 In the resulting Properties dialog box, click the Quota tab, and check the Enable Quota
Management check box. Select the Limit Disk Space To option and set both the limit and
the warning levels. Select both logging options, and click the Apply button.
Note: If it is the first time quota management has been implemented on the volume, click the OK
button on the Disk Quota window to enable the quota system.
Step 4 Click the Quota Entries button and observe the storage allocations currently set on the disk.
In the Quota Entries window, notice that there are no imposed limits on any of the users. No
limits are imposed unless you deny users additional space for exceeding their limit.
Step 5 Close all windows and dialog boxes to return to your desktop.
338
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:21 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 339
NetWare Networks
When it comes to managing your network components, you should consider
the NetWare portion entirely on its own. This is true even though, as you
have seen throughout this course, the majority of what you have done so far
with your NetWare server has been accomplished from your Windows XP
Professional workstation’s desktop (and possibly from your Windows 2000
Server’s desktop). Your NetWare 6 server offers its own, extremely detailed
and oftentimes complex network management components. This course is
not intended to prepare you to the point where you are an expert with these
tools. Rather, the introductory nature of this course is intended to provide
you with an understanding of some of the basic tools available and show you
some that are comparable to those you learned about for managing the Win-
dows portion of your network.
339
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:21 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 340
Similarly, entering the TIME command at the server console returns the
Inside Information system time, and entering MEMORY returns the server’s total memory; on the
other hand, entering the misspelled TIM looks for a file named TIM to load.
Help Available
There are hundreds of commands
Not all commands are that easily interpreted, however, and depending on
available for you to use. You can how bad your misspelling is, the system could end up doing something en-
type HELP at the console to list tirely different from what you intended.
many of the more common com-
mands. There are so many com-
mands listed there that you will
have to press another key (other
than the ESC key, which termi-
nates the HELP command) to see
the rest of the list. You can get
additional assistance for any com-
mand in that list by typing the
desired command immediately af-
ter the HELP command. For ex-
ample, the command HELP DOWN • Three NetWare text-based commands entered at the server console, and their results
would return help for the DOWN
command and give you an exam-
ple of its proper use. Table 10.1 lists some commonly used commands.
340
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:22 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 341
• The SEND command entered at the server console and its resulting message at the users’ workstations
another path is specified), and to then execute (or run) the module. The
added functionality then remains in the server, provided the server contin-
ues to run, or until the operator decides to UNLOAD the NLM.
At the console prompt, type CDROM.NLM to prepare the server to op-
erate the CD drive. The NLM must be loaded before running the MOUNT
command when working with CDs. The MOUNT command makes a volume
available for users, and it is run only once after the server is started. The
MOUNT command then stays in memory until the DISMOUNT command is
run (making the volume unavailable) or you DOWN the server. The NLM can
be added to the startup commands so that it loads automatically whenever
the server is started.
Although many of the common NLMs have a .NLM extension following
the command’s name, there are other extensions available such as .DSK and
.LAN as shown in Table 10.2. Table 10.3 lists some commonly used NLM
modules.
341
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:23 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 342
• Figure 10.1 The initial results of running the LOAD MONITOR command at your
server console
342
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:25 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 343
Inside Information
MONITOR
Information
If the expanded General Informa-
tion window covers the Available
Options window, press the TAB
key and observe the scroll bar at
the left side of the options window
to see where the additional infor-
mation is. Use the keyboard’s up
or down arrow to reveal this addi-
tional information. Selecting any
of the listed Available Options
will display an information win-
dow with the applicable item’s
• Figure 10.2 After ten seconds of inactivity, the General Information section expands. information. These options can
provide a significant amount of
information about the server’s op-
This course is not intended to give you a complete understanding of eration. Tracking pertinent pieces
each of the preceding items. The goal at this introductory level is to show of this data can alert you to a po-
you where to go should you need to locate such information in times of cri- tential problem.
sis. Keeping track of the information here also lets you record trends that
can help you spot potential problems as they develop.
343
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:26 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 344
Unattended Full Repair You should recall that selecting the Unattended
Inside Information Full Repair option in DSREPAIR and pressing ENTER immediately initiates
the repair action. Depending on the size of your network, this could take
NDS Replicas
In larger networks with multiple
some time to complete. On a small network, such as yours, the process
file servers, NDS stores duplicate should take only a few seconds to complete.
pieces of the Directory, called When the repair action is completed, a window is displayed informing
replicas, on many of the servers you that “All automatic repair operations have been completed.” It also tells
around the network. Replicas pro- you the number of errors and the total amount of repair time the operation
vide fault tolerance and backup required. It is not uncommon for DSREPAIR to uncover numerous insignifi-
capability. The servers communi- cant errors, so occasionally running DSREPAIR will help keep your net-
cate with each other, sharing up- work operating properly. You may need to run it several times when
dates to the Directory as needed. removing errors. Provided you have the network idle time available to you,
Whether these updates are passed rerun the process until zero errors are found by DSREPAIR.
on to the next recipient is deter-
mined by the time stamp placed Advanced Options Menu Selecting the Advanced Options Menu and
on them by the servers. If the re- pressing ENTER provides the following additional DSREPAIR options:
cipient server has data with a
newer time stamp, that update is ■ Log File and Login Configuration Configures options for the
determined to be unnecessary and DSREPAIR log file. Logging in to the Directory Services tree is
is therefore ignored. The time- required by some operations.
stamp system depends entirely on ■ Repair Local DS Database Repairs the Directory Services database
all servers knowing exactly what
files stored on this server.
time it is, and this is accom-
plished through a centralized ■ Servers Known to This Database Shows the names of the servers
time-allocation system. For suc- that have performed the following operations to this server’s
cessful replica operation, one database: time synchronization, network addresses, and server
main server is responsible for pro- information.
viding accurate time to all the
■ Replica and Partition Operations Provides functions to repair
other servers working together.
replicas, replica rings, and server objects. This option also dynamically
displays each server’s last synchronization time.
■ Check Volume Objects and Trustees Checks all mounted volumes
for valid volume objects and valid trustees on the volumes.
You should try to activate
■ Check External References Checks for illegal external references.
any repair process, such as
DSREPAIR, during the network’s ■ Security Equivalence Synchronization Allows users to synchronize
idle times. Otherwise, users will security equivalence attributes throughout the tree.
be disrupted because the Direc-
tory is locked during the entire ■ Global Schema Operations Provides functions to update the schema
procedure. Additionally, any in the tree.
repairs made during the repair
■ View Repair Log File Allows you to edit the log file, which is
process will most likely create
incorrect time stamps that occurr optionally created when repair operations are performed.
while your system is offline and ■ Create a Database Dump File Copies the Directory Services database
you should allow your system
files to disk in compressed format, to be used for offline repairs and
time to synchronize after repairs
are completed. diagnostics. This is not to be used as a backup method.
■ Return to Main Menu Exits this menu and returns to the main list.
You will probably be interested in running only the Repair Local DS Da-
tabase and the Check Volume Objects and Trustees options. The first will
behave in the same way as the unattended option that you ran earlier, and
the second will require that your fully distinguished administrator user
name and password be used for authorization. It is useful to use both of
these options on an occasional basis. They should not return major errors
unless there is a significant problem.
344
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:27 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 345
Step-by-Step 10.04
Using NWCONFIG
You should become familiar with another frequently ■ An operational NetWare 6 server
used NLM—the NWCONFIG NLM. This is the ■ Your administrative user information (if not
NLM that you will use to accomplish most of the already logged in to the server)
configuration options needed on your NetWare server.
To complete this exercise, you will need the
following items:
Step 1 From your NetWare 6 server’s GUI desktop, press CTRL+ESC to go to the Current Screens
window. Enter the selection number for the System Console.
Step 2 Type NWCONFIG at the server console, and press ENTER to view the options available.
Note: Most of the options listed are self-explanatory. Several options have additional features
when selected, but three, Legacy Disk Options, NSS Disk Options, and License Options, tell you
that they no longer work through NWCONFIG when you select them and press ENTER.
Step 3 Select Driver Options, press ENTER, and press ENTER again to view the disk drivers cur-
rently loaded on your server. You could press ENTER yet again to either search for addi-
tional drivers or load new drivers on your server. Press the ESC key twice to return to the
initial NWCONFIG screen.
Step 4 Select Directory Options, press ENTER, and notice the important actions available to you
here, such as installing or removing Directory Services, creating Directory backups, or
extending the schema.
345
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:28 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 346
Step 5 Select Directory Backup and Restore Options, press ENTER, and press ENTER again to se-
lect the Save Local NDS Information Before Hardware Upgrade option. Read the notice
that comes up on your computer screen.
Note: If you do ever have to use this backup technique, you will be required to use your fully quali-
fied administrative user name (CN=Admin.O=LAB) and password.
Step 6 Click Cancel so you do not actually implement the backup action. You could damage
your copy of NDS in the process. Press the ESC key twice to return to the initial
NWCONFIG screen.
Step 7 Look through the remaining options without implementing any changes (use the same
general procedures as in Steps 3 through 6). From the initial NWCONFIG screen, press the
ESC key again when you are finished, and select Yes and press ENTER to exit NWCONFIG.
346
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 347
Chapter 10 Review
■ Chapter Summary
After reading this chapter and completing the Step- ■ SNMP is an Internet-standard protocol that
by-Step tutorials and Try This! exercises, you should facilitates monitoring the system and sending
understand the following facts about network status updates to a central location.
management: ■ SNMP nodes send messages when queried by the
manager, but they can also send alarm messages
Describe Windows Network Management Tools on their own when properly configured.
■ Access to the server through your workstation is ■ Performance console lets you collect data about
becoming the most common way to manage your your system’s performance.
network.
■ System Monitor is a part of the Performance console
■ No matter what the problem is with a user’s that lets you view current or recorded information
computer, they usually blame the network about your system.
technicians first and then the network itself.
■ The different views in System Monitor are graph,
■ Management tools, such as the Error-Checking, histogram, and report.
Defragmentation, and Backup utilities, are
available on Windows workstations. ■ The Performance Logs and Alerts section of the
Performance console records its data in the Perflogs
■ The Error-Checking tool is also called the Check folder on your hard disk drive.
Disk tool, and it can be initiated with a DOS
command by typing chkdsk in the RUN dialog box. ■ Network Monitor provides you with information
regarding your network’s health.
■ The defragmentation window includes graphic
depictions of your current and projected disk ■ Network Monitor actually records the data flowing
fragmentation. between the computers on your network and
your server.
■ The Defragmentation tool requires 15 percent of the
total disk space available on the disk to be empty in Implement Windows and
order to run properly, but it will run with less. NetWare Network Management
■ The Backup tool can be used to keep users’ ■ Improperly maintaining networks wastes the effort
information accessible because users can restore required to create them.
some of their own files if they keep their own
backups.
■ A healthy network’s use will tend to increase rapidly.
■ Compression reduces the size of files so they take
■ To initiate a backup, users must be working with
up less storage space.
their own files or they must have the Read, Read
and Execute, Modify, or Full Control permission ■ Having smaller files that contain the same data
to the files. means that you can store more valuable information
on your network without increasing storage space.
■ To restore from a backup, users must have the
Write, Modify, or Full Control permission to the ■ Compression can only be implemented on NTFS
backed up files. volumes.
■ The Task Manager is started by right-clicking the ■ Compression can be implemented at the volume
taskbar or using CTRL+ALT+DELETE and selecting level with everything on that volume being stored
Task Manager. in the compressed state, or at the file level where
only specific files are compressed.
■ Windows XP Professional adds a Networking tab
to the Applications, Processes, and Performance ■ Compression and encryption are mutually
tabs found on the Windows 2000 Server’s Task exclusive.
Manager window.
347
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 348
■ Applications using compressed files check the ■ NetWare 6 has extremely detailed, and sometimes
compression state and uncompress applicable files complex, network management components.
prior to use. ■ The NetWare server console’s text-based
■ Except for FAT partitions (which are always commands are still the most widely used
uncompressed), moving a compressed file from one management technique.
location on a volume to another location on the same ■ Some NetWare commands are stand-alone
volume has that file retain its original compression commands, and others require arguments.
state, whereas copying that file to another location on
the same volume has the file acquire the compression ■ There are hundreds of commands available for use
state of the receiving location. at the NetWare server console, and you can get
information about their use by using the HELP
■ When implementing compression, you have the command.
option of leaving an object’s contents as they are
or compressing them. ■ NLMs are commands stored in locations outside
the operating system.
■ Quota management assigns a limit on the amount of
space users can use for storage on specific volumes. ■ The NetWare MONITOR NLM is a tool for
gathering and monitoring information about
■ Quota management is available only on NTFS your network’s health.
volumes.
■ Periodically running DSREPAIR helps maintain
■ Quotas can be implemented as mandatory, in your system.
which case they are enforced, or as informational,
which means compliance is simply monitored. ■ NWCONFIG is another important utility used to
obtain and update information about your network.
■ Quota use on compressed volumes is calculated
based on the uncompressed size of the stored files.
■ Key Terms
agent (323) MIB (324) report view (326)
arguments (339) Network Monitor (331) SNMP (323)
cache buffers (342) NMS (323) SNMP manager (323)
compression (333) nodes (323) state (322)
graph view (326) page file (322) System Monitor (326)
histogram view (326) Performance console (325) Task Manager (319)
kernel (322) quota (335) trap message (323)
link state (322) replicas (344)
1. An alarm message sent by an SNMP agent is also 4. The name of the tool that includes a Networking
called a(n) ______________. tab in its Windows XP implementation is the
______________.
2. When running MONITOR on a NetWare 6
server, if the available memory, also called 5. By clicking the Performance tab on the tool that
______________, falls below half of its original can be entered using the Microsoft three-finger
amount, a remedy could be to add RAM or salute, you can view graphical screens showing
UNLOAD NLMs. dynamic information on your CPU and your
______________.
348
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:31 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 349
6. Once a network node is monitored by SNMP and 9. The ______________ utility records a copy of
managed by SNMP manager, it is referred to as the data flowing between other computers and
a(n) _____________________. your server.
7. The Internet-standard protocol that facilitates 10. The Windows advanced storage feature that
monitoring the system and communicating helps extend your network’s storage capacity by
status updates is called the ______________. reducing the size of files is called _____________.
■ Multiple-Choice Quiz
1. Which of the following tools is not located on the b. The Management and Monitoring Tools
hard disk drive’s Properties dialog box? component
a. Backup c. A Details button
b. Error-Checking d. Selection boxes
c. Defragmentation 6. Which of the following is the default permission
d. Task Manager for SNMP service community names?
b. nodes c. System_Overview.blg
349
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 350
c. Network traffic can only be recorded at the storage by an average of 50 percent. Which of the
local computer where Network Monitor is following is/are definitely true?
configured.
a. Both users have to have specific quotas set on
d. Network traffic is only recorded when it is
that volume.
going from the local computer where Network
Monitor is configured. b. Both users will still be over their quotas.
10. When you copy a compressed 10MB file to a c. They each can store at least another 225MB.
volume with 19MB of available space, which of d. Quota management is not being enforced.
the following will be true? 13. Which of the following deals with NetWare NLMs?
a. The copy action will be disallowed and the a. MODULES
file will remain compressed.
b. CONFIG
b. The copy action will be allowed and the file
c. DISPLAY
will be uncompressed.
d. All of the above
c. The copy action will be allowed and the file
will be compressed. 14. Which of the following is true when your
NetWare 6 server’s cache buffers fall below
d. The copy action will be disallowed and the
25 percent of the original cache buffers?
file will remain uncompressed.
a. You should decrease memory demand.
11. If you were to copy a compressed 10MB file from
one volume to another volume that is not using b. You should add RAM.
compression, which of the following would c. This is an acceptable condition.
be true?
d. None of the above.
a. The copy action will be disallowed and the
15. Which of the following is/are true about
file will remain compressed.
DSREPAIR:
b. The copy action will be allowed and the file
a. Running DSREPAIR locks the Directory
will be uncompressed.
during the entire procedure.
c. The copy action will be allowed and the file
b. You should run DSREPAIR when user impact
will remain compressed.
would be lessened.
d. The copy action will be disallowed and the
c. Repairs made will likely have an incorrect
file will be uncompressed.
time stamp.
12. Two users have 500MB quotas on a particular
d. All of the above.
volume where they each have 550MB of
information stored. The administrator then
implements compression that reduces all files in
■ Essay Quiz
1. How can this course help prepare you to become 4. When considering whether to use compression
a better network administrator? on your network servers, why is it important that
2. Why are network technicians blamed when you find out if encryption is being used?
network workstations malfunction? 5. What is the main difference between NetWare
3. Explain the benefits of having users involved in console commands and NLMs?
managing their own workstations.
350
Introduction to Networking
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM
Color profile: Generic CMYK printer profile
Composite Default screen
BaseTech / Introduction to Networking / McMahon / 222678-1 / Blind Folio 351
Lab Projects
Time to roll up your sleeves and apply what you’ve
learned. The following lab projects will enable you to
practice the concepts discussed in this chapter.
•
a different color than those that are uncompressed.
You now want to configure their computers to 3 Click the View tab, and in the Advanced Settings
display this information. section, scroll to and select the Show Encrypted
You will need the following: or Compressed NTFS Files in Color option.
(Note that this only allows you to employ the
■ A networked lab computer with Windows XP system-provided “different” colors, not to choose
Professional your own colors.)
■ Administrative user login information
• 4 Click OK and close all windows to return to
the desktop.
■
You will need the following materials:
A networked lab computer with Windows XP • 4 Right-click a listed user (not the administrator)
and select Properties. Notice the newly
Professional, formatted using NTFS imposed limits on the user.
■ Your administrative user’s information Note: If the user’s limits have not been updated to
reflect your changes, simply click the Do Not Limit
Then do the following: Disk Use option, and then click the Limit Disk
351
Chapter 10: Managing a Network
P:\010Comp\BaseTech\678-1\ch10.vp
Wednesday, February 12, 2003 9:18:32 AM