Back Up Next

Chapter 4 *

Configuring Windows NT 4.0 *

Certification Objectives *
Configuring Network Protocols *
NWLink IPX/SPX-Compatible *
TCP/IP *
NT TCP/IP Services *
Dynamic Host Configuration Protocol (DHCP) *
Exercise 4-1: Creating a DHCP scope *
Exercise 4-2: Configure DHCP Options *
From The Classroom *
Configuring NT to Avoid Problems *
Windows Internet Naming Service (WINS) *
Internet Information Server (IIS) *
Exercise 4-3: Configuring the WWW Service on IIS *
Configuring Peripheral Devices *
Control Panel *
Changing Display Adapter Settings *
Exercise 4-4: Changing the Display Adapter *
Removing NT Components *
Exercise 4-5: Removing a Windows NT application *
Splitting the Paging File *
Exercise 4-6: Splitting the Paging File across Multiple Physical Disks *
Adding Tape Backup Drives *
Exercise 4-7: Adding a Tape Device *
Adding SCSI Adapters and CD-ROM Drives *
Exercise 4-8: Adding a SCSI Adapter *
Adding Modems *
Exercise 4-9: Adding a Modem to Windows NT *
Adding Uninterruptible Power Supplies (UPS's) *
NT 4.0 Disk Administrator *
Exercise 4-10: Launching Disk Administrator *
System and Boot Partitions *
Exercise 4-11: Changing the active partition *
Primary and Extended Partitions *
Exercise 4-12: Deleting a partition *
Exercise 4-13: Creating an extended partition with logical drives *
Exercise 4-14: Formatting a partition *
Volume Sets *
Exercise 4-15: Creating a Volume Set *
Exercise 4-16: Extending a volume set *
Stripe Sets Without Parity *
Exercise 4-17: Creating a stripe set *
Drive Letter Assignment *
Exercise 4-18 Assigning drive letters *
Fault Tolerance (RAID) *
Mirroring *
Exercise 4-19: Creating a mirror set *
Exercise 4-20: Repairing a damaged mirror set *
Duplexing *
Striping with Parity *
Exercise 4-21: Creating a stripe set with parity *
Exercise 4-22: Repairing a damaged stripe set with parity *
NT Clients *
Using the Network Client Administrator *
Make Network Installation Startup Disk *
Make Network Client Installation Disk Set *
Copy Client-based Network Administration Tools *
View Remoteboot Client Information *
NT Browser Types *
Domain Master Browser *
Master Browser *
Backup Browser *
Potential Browser *
Non-browser *
Browser Elections *
NT System Registry *
Exercise 4-23: Editing the Registry *
Exercise 4-24: Finding occurrences of a word in the registry *
Hardware Profiles *
User Profiles *
Devices *
Registry Hierarchy *
Data Types *
Answers to Chapter 4 Self Test *

Chapter 4

Configuring Windows NT 4.0

Certification Objectives

Configuring Network Protocols
Configuring Peripheral Devices
NT 4.0 Disk Administrator
NT Browser Types
NT System Registry

In order to pass the exam you’ll need to know how to configure various components within NT. This chapter will discuss configuring network protocols and various peripheral devices to include tape backup devices, SCSI adapters, and display adapters. It will teach you how to use Disk Administrator to manage your hard disk partitions—including how to set up software RAID levels 0, 1, and 5. You’ll also need to know the various clients that are available for NT. Finally, you'll learn about the NT system registry and how it is organized.

Configuring Network Protocols

For the exam you’ll need to know which protocols can be configured. TCP/IP must be configured and NWLink can be configured if needed. NetBEUI doesn’t need configuration.

NWLink IPX/SPX-Compatible

NWLink does not require any configuration. By default it uses Auto Detect to detect the frame type. However, if a Novell network uses more than one frame type, you may need to specify which frame type to use. To specify the frame type, open Network Properties and choose the Protocols tab. Double-click the NWLink IPX/SPX Compatible Transport. In the next dialog box, open the drop-down menu for frame type. There will be four frame types to choose from: 802.2, 802.3, II, and SNAP. NetWare version 2.2 and 3.1 use Ethernet type 802.3 as the standard frame type. NetWare version 4.0 and above uses 802.2.

TCP/IP

TCP/IP requires configuration, unless you have a DHCP server assigning TCP/IP information. (Dynamic Host Configuration Protocol—DHCP—is explained later in this chapter.) First you’ll need to open the network properties and choose the Protocols tab. Then double-click the TCP/IP protocol. If your server is multihomed (in other words, if it has more than one network connection), you’ll need to select the adapter where you want to configure on the IP Address tab; otherwise, the appropriate adapter is already selected. You’ll need to specify an IP address, subnet mask, and default gateway. A default gateway may not be necessary if your computer doesn’t need to communicate outside its local subnet. However, since TCP/IP is usually used in a routed environment, a default gateway is usually necessary. Figure 4-1 shows the IP Address tab filled out properly. If your network has more than one gateway, you can use the Advanced button to configure the additional gateway.

Figure 1: IP Address tab

If you plan to connect your server to the Internet, you’ll need to configure the DNS (Domain Name System) tab. Under Host Name fill in your computer’s host name (be sure to follow proper Internet naming conventions). In the Domain field you’ll enter your Internet domain name. This is not the same thing as an NT domain. The Internet domain name should look something like this: microsoft.com or your.companyname.net. Click the Add button under the DNS Service Search Order to add DNS servers. Finally, click the Add button for the Domain Suffix Search Order. Add any domain suffixes you want to add. Using a domain suffix can slow your system down when trying to connect to network resources. It appends the suffixes to the end of every failed connection. So if you mistakenly type WWW.mcirosoft.com, NT will try to connect to WWW.mcirsoft.com—then it will add your domain suffixes to the end of the search and try to connect to those sites. It will time out only after all suffixes have failed. Figure 4-2 shows a properly configured DNS tab.

Figure 2: DNS tab

If you use WINS for name resolution on your network, you’ll need to configure the WINS Address tab. As with the IP Address, you’ll need to select the proper adapter if you have a multihomed machine. Enter at least a Primary WINS Server IP address. If you have two WINS servers on your network, you should fill in the Secondary WINS Server text box. On this tab you can Enable DNS for Windows Resolution. If you check this box, a DNS server will be used to resolve your Windows network names. Since DNS (unlike WINS) is not dynamic, it will be too difficult to manage a large Windows network using only DNS. If you only have a couple of Windows-based computers on your network, there are some advantages to using DNS for Windows Resolution. First, you won’t have to install a WINS server, which uses resources on the server where it is installed. Second, you can enable LMHOSTS Lookup. To use an LMHOSTS file, make sure the Enable LMHOSTS Lookup check box is marked, then click Import LMHOSTS. Choose the LMHOSTS file you want to import and click Open. Finally, you can set a Scope ID. All computers must have the same scope ID to communicate on a TCP/IP network. If you change the Scope ID of your server, all computers on your network must be changed to have the same scope ID. Figure 4-3 shows a fully configured WINS Address tab.

Figure 3: WINS Address tab

The DHCP Relay tab is used to forward DHCP request through a router. If your router isn’t able to forward DHCP requests, you can use this service to broadcast the request to other subnets. This service only supports clients on the local physical subnet. Simply click the Add button and enter the IP address of the DHCP server. If the Add button isn’t an available option, you first must install the DHCP Relay Agent. The DHCP Relay tab is shown in Figure 4-4.

Figure 4: DHCP Relay tab

The Routing tab has only one check box. If you have a multihomed computer and you want use static IP routing between the two NIC's, you need to check this box.

Figure 5: WINS Address tab

NT TCP/IP Services

NT ships with several TCP/IP services, allowing NT to host many common UNIX server-based services. DHCP, WINS, and IIS services included with Windows NT Server 4.0 are described in the following sections.

Dynamic Host Configuration Protocol (DHCP)

As mentioned earlier, DHCP is used to assign TCP/IP configuration parameters on networked clients. DHCP is similar to BootP, except it leases IP addresses instead of giving out a new address every time the computer boots. The DHCP server administrator configures a scope for which a set of valid IP addresses are assigned. Each physical subnet that uses DHCP must have an active scope for that subnet if it is using DHCP. The routers also must be configured to broadcast DHCP requests.

When configuring a scope you need to enter the following items:

A range of unique IP addresses (called a pool of IP addresses)
A valid subnet mask for each pool of IP addresses
Excluded IP addresses from the pool
Duration of the lease (default 3 days)

Exercise 4-1: Creating a DHCP scope

  1. Open DHCP Manager.
  2. Double-click the server you want to manage. Even if the server you want to manage is listed, you’ll need to highlight it and add it.
  3. Click Scope | Create.
  4. Enter the IP Address Pool Start Address and End Address.
  5. Enter the Subnet Mask of that IP Address Pool
  6. Exclude any addresses from the IP Address Pool by typing in the Exclusion Range then clicking Add. Repeat for each range that you want to exclude.
  7. Set your Lease Duration.
  8. Enter the Name of your scope.
  9. Enter a Comment if necessary.
  10. Click OK
  11. After clicking OK, you’ll be asked if you want to activate the scope. Answer Yes. In order for a scope to give out IP addresses, it must be activated.

Exam Watch: Be careful when setting the lease duration. You should set a lease duration that best meets your needs. If you have a lot of IP addresses but relatively few computers, you can set a long lease duration. Conversely, if you have only a few IP addresses and many computers you should set a short lease. If you have many IP addresses you may be tempted to choose Unlimited, that isn't recommended because DHCP not only assigns IP addresses, but also client configuration information. If you set the lease duration to Unlimited, your clients won’t ever update their configuration information if it changes, unless you manually update DHCP at the each client.

DHCP can also be used to set the configuration information for the clients. The following configuration information is commonly set for Windows-based networking clients:

Router (Default Gateway) is mandatory
WINS/NBNS Servers
WINS/NBT node type (must be set to 0x8 [h-node])
DNS Servers
Domain name

DHCP options can be set for Global or Scope. Global settings apply to all the scopes on the DHCP server and a Scope setting applies to the selected scope. Exercise 4-2 teaches you how to configure Global and Scope options for a DHCP Server.

Exercise 4-2: Configure DHCP Options

  1. Open DHCP Manager.
  2. Double-click the server you want to manage.
  3. Select the scope you want to configure.
  4. Click DHCP Options | Scope.
  5. Choose Router under Unused Options.
  6. Click Add.
  7. Highlight Router under Active Options.
  8. Click Value.
  9. Click Edit Array.
  10. Add the New IP Address for the Router. This will be the default gateway for that subnet.

From The Classroom

Configuring NT to Avoid Problems

The number one fallacy and misunderstanding among NT administrators surrounds something called NetBIOS—what it is and what to do with it. In NT, NetBIOS is extremely important (even critical, you might say). It must be present if you want NT to function on the network. The perceived fallacy is that NetBIOS is a transport protocol——that NetBIOS is NetBEUI or that NetBEUI is NetBIOS (or some kind of an enhanced version of it).

Let’s take these misconceptions one at a time. NetBIOS is not a transport protocol inside NT. NetBIOS, as it applies to NT is a set of 19 API calls at various levels in the NT networking model. We repeat, it is not an NT transport protocol. Unfortunately, some LAN network operating systems (NOS's) use a transport protocol called "NetBIOS." In fact, an early Microsoft/IBM NOS used a transport protocol called NetBIOS, but this is not it.

That brings us to the transport protocol called NetBEUI. Interestingly enough, the acronym NetBEUI stands for NetBIOS Enhanced User Interface. So that makes NetBIOS just a subset of NetBEUI, which a transport protocol. Which by inference (if A=B and B=C, then A=C) makes NetBIOS a transport protocol within NT, right? WRONG! Read on, MacDuff.

Microsoft ships three transport protocols with NT: NetBEUI, NWLINK and TCP/IP. When you install any of these protocols, each installs its appropriate NetBIOS layer automatically. Remember that NetBIOS is a set of API calls. This layer must be present with each protocol stack that you install. You do not want to disable this.

OK, next fallacy. The reasoning goes, "if we must have the NetBIOS layer and if NetBEUI is sort of NetBIOS (which it is not; read the previous paragraphs if you are unsure), then we must have NetBEUI protocol always installed. Right? WRONG! We cannot tell you how many certified technicians—who claim to be NT-literate—have told us this. We go to sites where clients are running both TCP/IP and NetBEUI protocols. When we ask why, we get the above explanation. To demonstrate the fallacy, we remove the NetBEUI protocol and ask the administrator to show us what doesn’t work after it is removed. We actually have an administrator at one client who still insists, two years later, that something is missing, but he just hasn’t found it yet!

Yes, you do need the NetBIOS layer. No, NetBIOS and NetBEUI are not the same thing, although the names are misleading. Yes, the NetBIOS layer is loaded for each transport protocol stack you load. You now know more than many MCSE's.

Windows Internet Naming Service (WINS)

WINS resolves computer names to IP addresses on a windows based network. WINS performs the same role as DNS, except it is dynamic. Whenever a client computer starts, it registers its name and IP address with the WINS Server. Then, when a client tries to locate another computer, it asks the WINS database to resolve the requested name to an IP address. WINS uses several configuration parameters to govern the WINS client behavior. Table 4-1 describes each configuration option. Table 4-2 describes each advanced configuration option.

Option Description
Renewal Interval Specifies how often a client registers its name. Default is six days.
Extinction Interval When it is marked it specifies the interval between an entry marked as released and extinct. Default is 6 days.
Extinction Timeout Specifies the interval between an entry marked extinct and when it is deleted (scavenged) from the database. Default is 6 days.
Verify Interval Specifies the interval in which the WINS server must verify that names owned by another WINS server are still active.

Table 4-1: WINS Configuration Options

Advanced Option Description
Logging Enabled Turns on logging of the J50.log files
Log Detailed Events Turns on verbose logging. Events are written to the system event log. This requires a lot of computer resources.
Replicate Only with Partners Only allows your WINS server to replicate with its configured push-and-pull partners. This prevents unauthorized/unwanted WINS servers from pushing or pulling to your database.
Backup on Termination Backs up the database whenever WINS stops, but not when the system is shut down.
Migrate On/Off Specifies that static unique and multihomed records in the database are treated as dynamic when they conflict with a registration or replica.
Starting Version Count Used to fix a corrupted database. Enter a higher version number than what appears for a version number on all replication partners. This only needs to be set if you have a corrupt database.
Database Backup Path Specifies a local directory where the WINS database is backed up. If a path is specified, WINS automatically backs up the database every 24 hours.

Table 4-2: WINS Advanced Configuration Options

Exam Watch: When using DHCP and WINS, your WINS renewal interval must be at least one-half the time of the DHCP lease. This ensures that the registered computer names have the proper IP addresses assigned to them.

Internet Information Server (IIS)

IIS provides FTP, Gopher, and Web services. When you install NT you are asked if you want to install IIS. You can also install IIS from the Network Control Panel Services tab. After installing IIS you configure it using Internet Service Manager (ISM). You can find ISM through the program group, Microsoft Internet Server (Common). Figure 4-6 shows the Internet Service Manager.

Figure 6: Internet Service Manager

After starting ISM you can have it search your network for other computers running IIS. If you have proper rights to these computers you can manage them from your computer using ISM. To configure a service, simply double-click the service you want to modify. Exercise 4-3 teaches you how to configure the World Wide Web Service.

Exercise 4-3: Configuring the WWW Service on IIS

  1. Open ISM.
  2. Double-click the WWW service.
  3. Under the Service tab you can change the following:
TCP Port: You should leave this at 80 since it is the standard port that Web browsers use; if you need to change it for security reasons, just enter a new port number.
Connection Timeout: The amount of time that the client can remain idle before the service kills the connection.
Maximum Connections: Change this number to set the maximum number of computers than can connect to your server through the WWW service at a single time. Anonymous Logon.
Password Authentication: You can choose Allow Anonymous, which doesn’t require a logon account; Basic (Clear Text), in which anyone with a sniffer program can intercept your passwords; and Windows NT Challenge/Response, a more secure way of authenticating users.
Comment: Use this space to describe your service on the network to other administrators.

Figure 7: WWW Service tab

  1. Click the Directories tab to configure the following:
Directory: Lets you specify the directories that the service has access to.
Enable Default Document: Allows you to use a default file name for the directory so the user doesn’t have to type in the entire URL.
Directory Browsing Allowed: Allows users to browse the directory via his Web browser.

Figure 8: WWW Directories tab

  1. Click the Logging tab to configure the following:
Enable logging: Lets you specify the type of log file, how often to start a new log, and the directory where the log files are stored.
Log to SQL/ODBC Database: Lets you log directly to a database by providing a proper User ID and password.

Figure 9: WWW Logging tab

  1. Click the Advanced tab to configure the following:
The first option, By default, all computers will be: Granted Access or Denied Access, allows you to specify how access is to be granted. By using the list box, you can allow only certain IP addresses access or you can deny only certain IP addresses access.
The second option, Limit Network Use by all Internet Services on this computer, lets you specify the amount of network use (in KB/Sec) that this service can use.

Figure 10: WWW Advanced tab

Configuring Peripheral Devices

Most peripheral devices can be configured with the Control Panel; however, some may require a vendor-specific setup program.

Control Panel

The Control Panel has many applets that control device drivers. Figure 4-11 shows what our Control Panel looks like. As you add programs to your system, your Control Panel may change in appearance because some programs add Control Panel applets. Some of the applets are user-specific and others are computer-specific. User-specific applets allow each user to set NT to operate the way they prefer. The computer-specific applets affect all users and can only be changed by an administrator. The Control Panel accomplishes this by interacting with the registry. The user-specific applets control HKEY_CURRENT_USER subtree and the computer-specific applets interact with the HKEY_LOCAL_MACHINE subtree. We’ll discuss the registry and subtrees in more detail later in this chapter. The following are user-specific applets: Display, Accessibility Options, Internet, Telephony, Console, Regional Settings, Keyboard, Mouse, Printers, Sounds, Dial-up Monitor, and certain parts of the System application.

Figure 11: Control Panel

Changing Display Adapter Settings

The following exercises step you through using these applications. Each exercise starts by assuming you have the Control Panel open on your desktop. The first, Exercise 4-4, teaches you how to change your display adapter, resolution, and color depth.

Exercise 4-4: Changing the Display Adapter

  1. In the Control Panel, double-click the Display icon.
  2. Choose the Settings tab.
  3. Click the Display Type button.
  4. Click the Change button.
  5. Select the appropriate driver from the list. If the driver you need isn’t listed, you’ll need to click Have Disk and type the path to the vendor-supplied driver.
  6. Click OK.
  7. When your computer has copied the drivers, you need to restart your system so the change can take affect.
  8. Open the Display applet and choose the Settings tab.
  9. Set the Desktop Area slider bar to the resolution you want to use. The resolution you can choose depends on your video card and your monitor.
  10. Choose the color depth you want to use in the drop-down menu under Color Palette. After choosing your color depth your resolution may change. This occurs because your video card can’t support that number of colors at the resolution you had picked.
  11. Click Test.
  12. Click OK to the message box telling you that NT is testing your new configuration.
  13. If everything goes well you should see a colorful pattern of boxes on your screen. After 5 seconds NT asks you if saw the test bitmap properly. Click Yes if you saw the pattern. If you didn’t see the pattern, go to step 15.
  14. Click OK to accept your new configuration and end the exercise.
  15. If you didn’t see anything click No. NT resets to your previous display configuration. Repeat steps 9-14.

Removing NT Components

You use the Add/Remove Programs applet to remove NT components. Exercise 4-5 shows you how to remove WordPad from your computer.

Exercise 4-5: Removing a Windows NT application

  1. Double-click Add/Remove Programs.
  2. Select the Windows NT Setup tab.
  3. Highlight Accessories.
  4. Click Details.
  5. Scroll down to WordPad and remove the check mark.
  6. Click OK.
  7. Click OK.

Splitting the Paging File

You can increase the performance of your machine by spreading your page file out across several disks, especially if you have more than one disk controller or a controller that performs concurrent I/O. To spread you page file across multiple disks follow the steps in Exercise 4-6.

Exercise 4-6: Splitting the Paging File across Multiple Physical Disks

  1. Double-click the System icon.
  2. Choose the Performance tab.
  3. Figure 12: System Performance tab

  4. Click the Change button.
  5. Figure 13: Modifying the page file drive

  6. Highlight the partition where you want to add a paging file.
  7. Enter the Initial Size and the Maximum Size.
  8. Click Set.

Adding Tape Backup Drives

NT supports tape back-up drives for disaster recovery purposes. Adding a tape device is simple. Follow Exercise 4-7 to add a tape device.

Exercise 4-7: Adding a Tape Device

  1. In Control Panel, double-click the Tape Devices icon
  2. Select the Drivers tab.

Figure 14: Adding a tape device driver

  1. Click the Add button.
  2. Select the appropriate driver from the list. If the driver you need isn’t listed, click Have Disk and type the path to the vendor-supplied driver.
  3. Click OK.

Adding SCSI Adapters and CD-ROM Drives

The SCSI Adapters Control Panel applet is used to install SCSI adapters, but it is also used to install IDE CD-ROM drivers. This may confuse you when you are adding an IDE CD-ROM device and need to find the proper Control Panel applet to execute. Just remember to use the SCSI Adapters applet for both SCSI and IDE devices.

Exercise 4-8: Adding a SCSI Adapter

  1. Open the SCSI Adapters Control Panel applet.
  2. Choose the Drivers tab.

Figure 15: Adding a SCSI adapter driver

  1. Click the Add button.
  2. Select the appropriate driver from the list. If the driver you need isn’t listed, click Have Disk and type the path to the vendor-supplied driver.
  3. Click OK.

Adding Modems

You use the Modems Control Panel applet to add and remove modems. Exercise 4-9 teaches you how to add a modem.

Exercise 4-9: Adding a Modem to Windows NT

  1. Open the Modems Control Panel applet.

Figure 16: Adding a modem

  1. Click Add.
  2. Click Next, if you want NT to detect your modem. If you want to choose from the list or add a modem that’s not listed, click the following option: Don’t detect my modem; I will select it from a list check box.
  3. After selecting the appropriate modem click Next, or click the Have Disk button if you’re installing a modem that’s not listed
  4. Choose the port the modem will use.
  5. Click Next.
  6. Click Finish.

Adding Uninterruptible Power Supplies (UPS's)

An UPS is an important part of fault tolerance. If you have an UPS you can use NT’s UPS Control Panel applet to configure it. Before you can configure it you’ll need to connect a serial cable connected to your computer and the UPS. By configuring the UPS you can have NT automatically shut down when power is lost, execute a command, and notify all connected users. Figure 4-18 is the UPS Control Panel applet screen.

Figure 17: UPS Control Panel Applet

The first step in configuring an UPS is to click the check box next to the option: Uninterruptible Power Supply is installed on. Choose the port it’s connected to in the drop-down box. Configuring the rest of the UPS depends on the type of UPS you have and how the manufacturer has designed it. In the UPS Configuration group box , you can choose whether a negative or positive signal is sent during an active state. In other words, the signal you choose is the type that's normally sent; it changes when a power failure occurs. You’ll need to use the Owner’s Manual that comes with your UPS to obtain the correct values.

You can have NT run a command file when a power failure occurs. Just click next to the Execute Command File check box and type the name of the file you want to execute when the power fails. The command file must execute completely within 30 seconds, or NT terminates the command. Therefore, your command file shouldn’t contain any dialog boxes because they require user intervention and would probably take more than 30 seconds to complete. The command file must be placed in your %systemroot%\System32 folder and be an executable file type (.exe, .com, .cmd, .bat).

The UPS Service group box enables you to set the duration of power outage that triggers a message to connected users, as well as the time interval that should pass before subsequent warning messages are issued.

The UPS Characteristics group box enables you to set the battery run time (Expected Battery Life) and the recharge rate (Battery recharge time per minute of run time). If you set the Expected Battery Life too long and your UPS doesn’t support a Low battery signal, your UPS may not shut down in time. Be careful when setting your expected battery life.

NT 4.0 Disk Administrator

If you’re familiar with MS-DOS, you have probably used FDISK.EXE in the past to partition your hard disk. Rather than FDISK.EXE, NT uses a program called Disk Administrator to create and manage partitions. Disk Administrator is considerably easier to use than FDISK.EXE. Exercise 4-10 helps you start Disk Administrator for the first time. After starting Disk Administrator, you can create and delete partitions; you can also manage stripe sets, volume sets, stripes sets with parity, and mirror sets.

Figure 18: Disk Administrator

Exercise 4-10: Launching Disk Administrator

  1. Log on using an account that has administrator privileges.
  2. Click Start | Programs | Administrative Tools (Common) | Disk Administrator.
  3. You will see the following message:

No signature found on Disk 0. Writing a signature is a safe operation and will not affect your ability to access this disk from other operating systems, such as DOS.

If you choose not to write a signature, the disk will be inaccessible to the Windows NT Disk Administrator program.

Do you want to write a signature on Disk 0 so that the Disk Administrator can access the drive?

  1. Click Yes to write a 32-bit signature that uniquely identifies the disk written to the primary partition. This is done so that even if you change the disk controller or identification, NT will still recognize the disk.

System and Boot Partitions

NT uses two special partitions called the system and boot partitions for its start-up procedure. The definition of these partitions may sound backwards, but it is correct. The system partition contains the boot files such NTLDR and BOOT.INI. The boot partition contains system files such as the WINNT folder and the SYSTEM32 folder. The system partition can be set to active. When the system partition is set to active your computer will boot from that partition. If you have more than one system partition you can change the active partition—thereby changing which partition you boot from. Exercise 4-11 shows how to change the active partition of your system.

Exercise 4-11: Changing the active partition

  1. Open Disk Administrator.
  2. Right-click the partition you want to make active (it must be a primary partition).
  3. Select Mark Active.
  4. Choose Partition | Commit changes now from the menu bar.

Primary and Extended Partitions

Before you can access your hard disks, they first must be partitioned. You can create either primary partitions or extended partitions. A primary partition can be used as a system partition (set to active). Each hard disk can have up to four primary partitions. If you use an extended partition on a disk, you can only have three primary partitions on that disk The key is you are only allowed to have a total of four partitions (not including logical drives) on a disk. A logical drive is a method of subdividing an extended partition. Unlike a primary partition, an extended partition can be divided into many logical drives. This enables you to have many more than four drive letters per disk.

Figure 4-19 shows a computer configured with two hard disk drives (Disk 0 and Disk 1) and one CD-ROM. Disk 0 has one primary partition (C:) and one extended partition that contains three logical drives (E: to G:). Disk 1 has one primary partition (D:), one extended partition with four logical drives (I: to L:), an Unknown partition (it’s a partition that runs the Linux operating system, a version of UNIX that you don’t need to know for the test), and 502 MB area of free space. You’ll notice that drive C: has an * above it, which means it’s marked as active (the system partition).

Figure 19: Primary and Extended Partitions

Exercises 4-12 through 4-14 show how to manage and configure partitions using Disk Administrator.

Exercise 4-12: Deleting a partition

  1. Open Disk Administrator.
  2. To select the partition you want to delete, right-click it and select delete.
  3. Click Yes when asked if you are sure you want to delete the partition.
  4. Choose Partition | Commit changes now from the menu bar. Commit changes now actually makes your changes take place. After step 3 you could have recovered the partition simply by exiting Disk Administrator and not saving the changes when prompted.

Exercise 4-13: Creating an extended partition with logical drives

  1. Open Disk Administrator.
  2. Right-click an area of Free Space.
  3. Choose Create Extended.
  4. Enter the size of the partition.
  5. Click OK.
  6. Choose Partition | Commit changes now from the menu bar.
  7. Right-click the same area of Free Space.
  8. Choose Create.
  9. Enter the size of the logical drive.
  10. Click OK.
  11. Repeat steps 6-10 to create more logical drives.
  12. Choose Partition | Commit changes now from the menu bar.

Exercise 4-14: Formatting a partition

  1. Open Disk Administrator.
  2. Right-click a partition.
  3. Choose Format.
  4. In the Format dialog box, select a file system.
  5. Enter a Volume label if you want to name your partition.
  6. Check Quick Format if you don’t want to scan for bad sectors while formatting (this is much quicker).
  7. If you chose NTFS as the file system, you can enable compression on the entire drive.
  8. Click Start.
  9. Click OK when you see the warning message that all data on the disk will be erased.

Volume Sets

Volume sets combine 2 to 32 areas of free space on one or multiple hard disks. Use volume sets to combine different sized areas of free space as a single volume (drive letter) from any type of hard disk (IDE, SCSI, or ESDI). Volume sets don’t provide any fault tolerance or performance gains. They are simply used to combine multiple areas of free space as one logical drive. You can also extend your volume set if you format it using NTFS. If your volume set is formatted with the FAT file system, you’ll need to convert it to NTFS if you want to extend it. Extending a volume set allows you to format more areas of free space into an existing volume set without destroying the data. Although you can increase the size of a volume set, you can never decrease it. Exercise 4-15 teaches you how to create a volume set and Exercise 4-16 shows you how to increase the size of your volume set.

Exercise 4-15: Creating a Volume Set

  1. Open Disk Administrator.
  2. Select the areas of free space you want to include. You’ll need to hold down the Ctrl key to select multiple areas of free space.
  3. Choose Partition | Create Volume Set from the menu bar.
  4. Enter the size of the volume set.
  5. Click OK
  6. Choose Partition | Commit changes now from the menu bar.
  7. Format the volume set.

Exercise 4-16: Extending a volume set

  1. Make sure the volume set is formatted with NTFS.
  2. Open Disk Administrator.
  3. Select the volume set and the area of free space you want to add.
  4. Choose Partition | Create Volume Set from the menu bar.
  5. Enter the size of the new volume set.
  6. Click OK.
  7. Choose Partition | Commit changes now from the menu bar.

Stripe Sets Without Parity

Stripe sets without parity are like volume sets except they provide performance gains. They can combine 2 to 32 areas of free space as a single logical drive; however, the free space must be on different hard disks and each hard disk must contain the same amount of free space. If you have two disks—Disk 1 one with 100 MB free and Disk 2 with 200 MB free—you can use 100 MB free space from each disk, and ignore the remaining 100 MB available on Disk 2.

The data is written to a stripe set in 64 KB blocks, going disk by disk. If you use multiple controllers or if your controller supports concurrent I/O, you can see significant speed improvements because you can access your data by reading from more than one drive at a time.However, stripe sets without parity have a disadvantage: when a hard disk fails, all your data is lost. Since each disk contains a portion of the data, you lose all the data if any one disk fails. Exercise 4-17 teaches you how to create a stripe set without parity. This exercise requires you to have at least two hard disks with an equal area of available free space.

Exercise 4-17: Creating a stripe set

  1. Open Disk Administrator.
  2. Select at least two areas of free space, each on a different hard disk.
  3. Click Partition | Create Stripe Set
  4. Enter the size of the stripe set you want to create.
  5. Click OK.
  6. Choose Partition | Commit changes now from the menu bar.
  7. Format the stripe set using the file system of your choice.

Drive Letter Assignment

Assigning drive letters is easy in NT. You use Disk Administrator to assign or change drive letters. Be very careful when changing drive letters on drives that are already in use. Although the drive letter changes, the registry settings for programs that are set up on that drive are not updated and users may lose access to files. Exercise 4-18 shows how to change the drive letter for your CD-ROM drive.

Exercise 4-18 Assigning drive letters

  1. Open Disk Administrator.
  2. Right-click the CD-ROM drive partition.
  3. Choose Assign Drive Letter.
  4. Change the current drive letter to an unused letter (obviously, you can’t assign a letter that is already in use).
  5. Answer Yes when asked if you want to continue.
  6. Click OK.
  7. Close Disk Administrator

Fault Tolerance (RAID)

If you’ve worked with computers for very long, you probably already know that they break. In fact the hard disk is one of the most commonly broken components in a computer. In order to increase your computer's uptime (the amount of time it is online) you should consider using RAID (Redundant Array of Inexpensive Disks). NT Supports software RAID levels 0, l, and 5, in which the operating system controls how the data is written to the physical drive. Hardware redundancy is more expensive, but it provides better performance. Windows NT HCL contains a list of hard disks supported for software RAID. RAID level 0 is a stripe set without parity, which was just discussed. This is the only level of RAID that doesn’t provide fault tolerance, because it doesn't include a parity bit that can be used to reconstruct the data set.

Mirroring

Raid level 1 is disk mirroring, in which two hard disks contain identical information. If one drive fails, the other drive can still be accessed; since it contains identical information, no data is lost. Software RAID 1 can be used on the system and boot partition, whereas software RAID 5 can’t be used on these partitions. Exercise 4-19 shows you how to create a mirror set and Exercise 4-20 shows how to repair a damaged mirror set using Disk Administrator.

Exercise 4-19: Creating a mirror set

  1. Open Disk Administrator.
  2. Select an area of free space on each of two separate hard disks.
  3. Click Fault Tolerance | Establish Mirror.

Exercise 4-20: Repairing a damaged mirror set

  1. Open Disk Administrator.
  2. Select the mirror set that is damaged.
  3. Click Fault Tolerance | Break Mirror.
  4. Replace or repair the damaged disk.
  5. Recreate the mirror set as outlined in Exercise 4-19.

Duplexing

Disk duplexing is exactly like mirroring except that it uses two disk controller cards. This provides redundancy in case one of the controllers fails. Duplexing eliminates the single point of failure that comes with using a single controller card.

Striping with Parity

RAID 5, also called a stripe set with parity, uses 3 to 32 drives with the same size partition. It manages the data just like a stripe set, except it writes a parity bit across all the disks. Table 4-3 shows the order in which data is written to a stripe set with parity. RAID 5 uses this parity bit to reconstruct the data on a disk if that disk fails. If more than one disk fails, there isn’t enough information to reconstruct the missing data; therefore, you shouldn’t rely on RAID 5 alone—you’ll also need to perform regular backups. The more disks you include in a stripe set with parity, the more economical it is. The amount of space lost to parity is 1/n (where n is the number of disks in the set). Unlike mirroring, software RAID 5 can't be used on the system or boot partitions. Exercise 4-21 shows you how to create a stripe set with parity and Exercise 4-22 shows how to repair a stripe set with parity.

  Disk0 Disk1 Disk2 Disk3
Stripe1 Parity 1 1 2 3
Stripe2 4 Parity 2 5 6
Stripe3 7 8 Parity 3 9
Stripe4 10 11 12 Parity 4

Table 4-3: Stripe Set with Parity

Exercise 4-21: Creating a stripe set with parity

  1. Open Disk Administrator.
  2. Choose at least three areas of free space on separate disk drives (you can’t choose more than 32 areas of free space).
  3. Click Fault Tolerance | Create Stripe Set with Parity.
  4. Enter the size of the stripe set with parity you want to create.
  5. Click OK.

Exercise 4-22: Repairing a damaged stripe set with parity

  1. Replace the damaged disk.
  2. Open Disk Administrator.
  3. Select the stripe set with parity by clicking on it.
  4. Select an area of free space on the newly added hard disk (it must have an area of free space as large as the other disks in the stripe set).
  5. Click Fault Tolerance | Regenerate.
  6. Close Disk Administrator and restart NT.

NT Clients

One reason NT has been so successful is because of its support for many different clients. NT can communicate with MS-DOS with Network Client 3.0, Windows 95, Windows 3.11 for Workgroups, NT Workstation, OS/2, LAN Manager, Macintosh, NetWare, and UNIX clients.

Not all clients operate in the same way with NT. Table 4-4 shows the network protocols supported by the clients. Table 4-5 shows the supported TCP/IP protocol-related services.

Client

NetBEUI

IPX/SPX
Compatible

TCP/IP

DLC

MS-DOS Network Client 3.0

X

X

X

X

Windows 95

X

X

X

 
Windows 3.11

X

X

X

 
LAN Manager 2.2c for MS-DOS

X

 

X

X

LAN Manager 2.2c for OS/2

X

 

X

 
Windows NT Workstation

X

X

X

X

NetWare 3.11  

X

   

Table 4-4: Supported Network Client Protocols

Client

DHCP

WINS

DNS

MS-DOS Network Client 3.0

X

   
Windows 95

X

X

X

Windows 3.11

X

X

X

LAN Manager 2.2c for MS-DOS

X

   
Windows NT Workstation

X

X

X

Table 4-5: TCP/IP Related Protocol Services

Using the Network Client Administrator

The Network Client Administrator tool gives administrators the ability to customize the way they install networking clients. You can make a network installation startup disk or an entire installation disk set, copy client-based network administrative tools, and view Remoteboot client information. The Network Client Administrator tool is located in the Administrative Tools program group.

Figure 20: Network Client Administrator

Make Network Installation Startup Disk

This option allows you to create a bootable floppy disk that will connect to an NT Server and download the files necessary for installing the selected operating system. Windows NT Workstation, Windows 95, and Microsoft Network Client 3.0 for MS-DOS are all supported.

Make Network Client Installation Disk Set

This option makes a complete installation disk set for the selected network operating system. You can make installation disks for Microsoft Network Client 3.0 for MS-DOS, LAN Manager 2.2c for MS-DOS Client, LAN Manager 2.2c OS/2 client, and Windows 95.

Copy Client-based Network Administration Tools

This option makes the NT administration tools available via the network. The list of tools you can execute depends on which operating system you are running.

The Windows NT Workstation tools are as follows:

Server Manager
DHCP Manager
WINS Manager
User Manager for Domains
Remoteboot Manager
Services for Macintosh
System Policy Editor
RAS Administrator

The tools for Windows 95 are as follows:

Server Manager
Event Viewer
User Manager for Domains
User Manager extensions for NetWare Services
NTFS File permissions tab
Print Security tab

View Remoteboot Client Information

Allows an administrator to view the remoteboot information provided by an NT Server running the Remoteboot service. Remoteboot service boots MS-DOS and Windows-based computers via the network.

NT Browser Types

NT uses a computer browser service to locate other computers on the network. Each protocol you have installed takes up resources in the computer browser service because each one must have its own browse list. There are four types of browsers: domain master browser, master browser, potential browser, and non-browser.

Domain Master Browser

The domain master browser is responsible for maintaining a list of master browsers on all subnets. It combines each subnet’s master browser’s list into one list for the entire domain. This list is forwarded back to the master browser on each subnet. By default, the PDC serves as the domain master browser.

Master Browser

Each subnet for the domain or each workgroup has a computer, known as the master browser, responsible for maintaining the browse list. Every time a computer starts, it registers itself with the master browser. The master browser records all registered computers in a list and forwards it to the domain master browser.

Backup Browser

The backup browser helps the master browser by giving its browse list to clients who request it. The master browser gives its browse list to a backup browser so the backup browser can give the list to local clients. Whenever a master browser goes offline, a backup browser becomes the master browser.

Potential Browser

A potential browser is a computer that isn’t acting as a browser, but can do so if requested.

Non-browser

No matter what, this computer can’t serve as a browser.

Browser Elections

Browser elections occur whenever a client or backup browser can’t find a master browser. The browser election tries to find the most robust computer to be the master browser. A computer initiates an election by sending an election datagram out to the network. When a browser receives an election datagram, it examines the election criteria set on that datagram. If the browser has better election criteria it sends out its own election datagram. This continues until no more election datagrams are broadcast. When a browser can't send an election datagram because it doesn't have better criteria, it attempts to find the new master browser. Some of the criteria used to determine the master browser are:

Operating system NT Server scores higher than Workstation; Workstation gets a higher score than Windows 95; and Windows 95 higher than 3.11.
Version NT Server 4.0 scores higher than NT Server 3.51; and NT Server 3.51 higher than 3.5.
Current Browser Role Backup browser gets a higher score than a potential browser.

You can use the MaintainServerList parameter in the registry to tell your server whether it should always try to become the master browser, never become the master browser, or be a potential browser. Edit the registry key:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Service\Browser\Parameters

MaintainServerList (set to Yes, No, or Auto)

Setting the MaintainServerList parameter to Yes forces your server to always try to become the master browser. The value No causes the computer to never become the master browser, and Auto sets it to be a potential browser.

NT System Registry

First, a warning: Editing the registry can severely damage your NT configuration. It’s not like an .INI file where you can go back and correct your mistakes. If you damage your registry by editing the wrong key by mistake, you may have to reload NT. Before editing your registry, you should run the RDISK utility to make sure you have a current Emergency Repair Disk.

The registry contains all your system and program configuration parameters. It is a very powerful database that controls your computer. The registry is a much better way to maintain configuration information about your computer than .INI files were. First of all, .INI files were flat and couldn't contain subcategories within sections, whereas the registry can. Also .INI files couldn't apply security as the registry can. The registry offers a centralized place for configuration information, whereas .INI files were far from centralized—remember WIN.INI and SYSTEM.INI? Finally, the registry is very flexible. .INI files could only hold ASCII text, but the registry can hold binary values, hexadecimal values, and even executable code.

However, the registry does have its critics. It’s very hard to navigate and understand. It’s very easy to get lost in the plethora of directories and subdirectories. The registry is also a very deadly tool because one mistake can wipe out your entire system.

You should try to avoid editing the registry with regedt32.exe. You can save yourself a lot of trouble by using the proper tools designed for editing the registry. The Control Panel is a common tool used for editing the registry. When you change values using a Control Panel applet you are usually changing registry values. You can also use the administrative tools that come with NT to edit the registry: User Manager, Event Viewer, and Server Manager. If you must edit the registry, Exercise 4-23 and Exercise 4-24 teach you how to get started.

Exercise 4-23: Editing the Registry

  1. Click Start | Run.
  2. Type REGEDT32.
  3. Click OK.
  4. Choose the registry subtree you want to edit by clicking on its title bar (choose HKEY_LOCAL_MACHINE).
  5. Expand the branches of the registry to get to the key you want to edit. Let’s edit the key that configures the browser service. Go to the following key:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Service\Browser\Parameters
  6. Double-click MaintainServerList in the right-side pane.
  7. Change the value listed from Auto to Yes (if it is already set to Yes change it to Auto).
  8. Click OK.

Exercise 4-24: Finding occurrences of a word in the registry

  1. Start the registry editor.
  2. Select the HKEY_CURRENT_USER subtree.
  3. Click the highest directory (HKEY_CURRENT_USER).
  4. Click View | Find Key.
  5. Type winlogon in the Find What text box.
  6. Click Find Next.

Hardware Profiles

Hardware profiles allow you to boot your computer using different configurations—most commonly laptops and docking stations. If the laptop is docked, it has one type of hardware configuration; when it isn’t docked, it has a different configuration. By using hardware profiles you can specify which configuration to use when your system boots. NT uses the registry key HKEY_CURRENT_CONFIG to maintain the information about the hardware profile you selected at startup. You can create or edit hardware profiles using the Hardware Profiles tab in the System applet of the Control Panel.

User Profiles

User profiles store configuration information for a specific user. Users can choose many of their own environment settings without changing the environment for other users. Different environment settings for user profiles are stored in different files and locations within NT. The file NTUSER.DAT contains most of the registry information for a user profile; however, much of the information is also stored in folders located in %winnt%\profiles folder. This folder contains information such as recently used files, shortcuts, startup programs, and desktop configuration.

There are two types of user profiles: roaming and local. Roaming profiles allows users to log on to any NT Workstation or Server and have the same user profile. To set a roaming profile you need to set a profile path in User Manager. Roaming profiles can be mandatory. A mandatory profile doesn’t allow the user to change his environment. To create a mandatory profile, you must specify a profile path in User Manager. Then copy a profile to the users profile directory using the Copy To button in the System applet. After the profile is copied, rename the file NTUSER.DAT to NTUSER.MAN. The .MAN extension makes the file read-only so that any changes the user makes to his environment won’t be saved when the user exits.

A local profile resides on the local machine. Any changes made to the profile are updated locally. The first time a user logs on, NT uses the local default user profile to create a profile for the new user, unless the user has a roaming profile. If a user has a roaming profile, it is downloaded to the local machine.

Devices

You can configure the startup value of the devices on your system by using the Devices applet in Control Panel. There are five types of device you can configure:

Boot Has a start value of 0 in the registry; devices assigned this value start as soon as the kernel is initialized. Examples: Tape and disk devices.
System Has a start value of 1; these devices start after the boot devices have finished starting and after the HKEY_LOCAL_MACHINE subtree is built. Examples: CD-ROM, serial mouse, and video drivers.
Automatic Has a start value of 2; these devices start just before the WINLOGON dialog box appears. Examples: Parallel and serial ports
Manual Has a start value of 3. These devices never start without an administrator to manually start the device.
Disabled Has a start value of 4. These devices can’t be started without first changing their startup type.

Registry Hierarchy

The registry is made up of a hierarchy that can be visualized as a tree. At the top of the hierarchy is the subtree. Each subtree appears in its own window when using REGEDT32. There are five subtrees:

HKEY_LOCAL_MACHINE
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_CURRENT_CONFIG

The next order in the hierarchy is the hive—a collection of registry keys which has a corresponding file saved on the hard disk. This gives the registry fault-tolerance. If the registry is corrupt, it can read the affected hive from a file on the hard disk.The registry keys appear as folders when using the registry-editing tool. A key is a category that can contain subkeys. At the bottom of the hierarchy are the values.

Data Types

There are five different types of data value that you can store in the registry.

REG_BINARY Indicates that the data is binary.
REG_DWORD Indicates that the data is stored in a word (four-byte number).
REG_SZ Indicates that the data is a string (text).
REG_MULTI_SZ Indicates the data is a multiple string (list).
REG_EXPAND_SZ Indicates the data is an expandable string (variable).

Certification Summary

This chapter had many exercises in it. In order to pass the exam you’ll need to know how to perform all these tasks, so if you skipped any of the exercises be sure to go back and complete them before taking the exam.

The chapter began with instructions to configure TCP/IP. You need to know that TCP/IP must be configured, and that you can use DHCP to automatically configure your clients. DHCP and WINS are two services that you’ll probably use on a Microsoft TCP/IP network. DHCP Server can automatically assign IP addresses and configuration information on your clients. WINS is used to resolve computer names to IP addresses dynamically.

The chapter contains many exercise that use Disk Administrator. One common element in all of the exercises was the fact that you had to commit your changes before applying new modifications to your partitions. NT forces you to do this, so that you can always undo your changes in case you make a mistake. The chapter also discussed RAID levels 0, 1, and 5. RAID level 0, a stripe set without parity, does not provide fault tolerance. RAID level 1, disk mirroring, uses two disk drives and keeps the exact same information on each disk. RAID level 1 can be used for boot and system partitions. RAID level 5, a stripe set with parity, can’t be used on system and boot partitions. It uses 3 to 32 disks to provide fault tolerance by writing a parity bit that is spread across all the disks in the set. This parity bit is used to reconstruct the data if one of the disks fails.

You'll need to know how various clients can connect to NT via which protocols. The Network Client Administrator is used to install network shares for client installations and NT Administrative Tools. It can also be used to view the Remoteboot client information for networks that boot clients from a server.

Finally, the chapter described discussed the registry and its subtrees. The registry can be visualized as a tree. Each window in the tree (called a subtree) has branches called keys. These branches eventually end with leaves, which are the actual data values.

Two-Minute Drill

NWLink does not require any configuration. By default it uses Auto Detect to detect the frame type.
If you use WINS for name resolution on your network, you’ll need to configure the WINS Address tab.
All computers must have the same scope ID to communicate on a TCP/IP network. If you change the Scope ID of a server, all computers on the network must be changed to have the same scope ID.
The DHCP Relay tab is used to forward DHCP request through a router.
If you have a multihomed computer and you want use static IP routing between the two NIC's, you need to check the box in the Routing tab.
DHCP is used to assign TCP/IP configuration parameters on networked clients.
DHCP is similar to BootP, except it leases IP addresses instead of giving out a new address every time the computer boots.
The DHCP server administrator configures a scope for which a set of valid IP addresses are assigned. Each physical subnet that uses DHCP must have an active scope for that subnet if it is using DHCP.
WINS resolves computer names to IP addresses on a Windows-based network. WINS performs the same role as DNS, except it is dynamic.
The computer-specific applets affect all users and can only be changed by an administrator.
You can increase the performance of your machine by spreading your page file out across several disks, especially if you have more than one disk controller or a controller that performs concurrent I/O.
The SCSI Adapters Control Panel applet is used to install SCSI adapters, but it is also used to install IDE CD-ROM drivers.
NT uses two special partitions called the system and boot partitions for its start-up procedure.
Volume sets combine 2 to 32 areas of free space on one or multiple hard disks. Use volume sets to combine different sized areas of free space as a single volume (drive letter) from any type of hard disk
A primary partition can be used as a system partition (set to active). Each hard disk can have up to four primary partitions.
If you use an extended partition on a disk, you can only have three primary partitions on that disk.
A logical drive is a method of subdividing an extended partition.
Disk duplexing is exactly like mirroring except that it uses two disk controller cards. This provides redundancy in case one of the controllers fails.
The domain master browser is responsible for maintaining a list of master browsers on all subnets.
Each subnet for the domain or each workgroup has a computer, known as the master browser, responsible for maintaining the browse list.
The backup browser helps the master browser by giving its browse list to clients who request it.
Whenever a master browser goes offline, a backup browser becomes the master browser.
The file NTUSER.DAT contains most of the registry information for a user profile.
There are two types of user profiles: roaming and local.
A hive is a collection of registry keys which has a corresponding file saved on the hard disk.

Review Questions: Just read, or Click HERE to launch interactive Self Test

  1. You have 2 SCSI drives, each with a 2GB partition and its own disk controller. You want fault tolerance and you want to be able to continue to use one of the drives should the other fail. What type of fault tolerance should you use?
    1. Volume set
    2. Disk duplexing
    3. Stiped set with parity
    4. Raid Level 5
  2. You have an NT Server computer. You install the client Network Administration Tools on your Windows 95 computer. How can you remotely manage file and directory permissions?
    1. Server Manager
    2. Windows Explorer
    3. NET USE commands
    4. User Manager for Domains
  3. You have two network cards you want to configure with TCP/IP in the same server. How can you do this? (Choose all that apply)
    1. Use DHCP
    2. Manually assign IP addresses
    3. Use an LMHost file to point to the second card
  4. You have NetBEUI and TCP/IP installed on your server. Most of your clients have TCP/IP installed on their systems as the default protocol. You've noticed that clients with TCP/IP as the default protocol take longer to connect to your server. How can you fix the problem?
    1. Move TCP/IP higher in the binding order
    2. Remove NetBEUI from the server
    3. Install two network cards
    4. Upgrade to an ATM network
  5. Your users have a mandatory profile assigned. They are logging onto the system for the first time, but the server with the mandatory profile is offline. What will happen?
    1. They will be logged on using the default profile.
    2. They can’t log on because the mandatory profile is unavailable.
    3. NT uses a cached mandatory profile to log the user on.
    4. They can log on, but changes to the current profile won’t be saved.
  6. You are creating a stripe set with parity on four disk drives, each with 100 MB partition. What’s the largest size stripe set with parity you can create?
    1. 300 MB
    2. 400 MB
    3. 200 MB
  7. You are creating a stripe set with parity on four disk drives, each with 100 MB partition. What’s the largest amount of data that can be saved to the stripe set with parity?
    1. 300 MB
    2. 400 MB
    3. 200 MB
  8. You have four hard disks Drive 1 has 100 MB of free space, Drive 2 and Drive 3 each has 200 MB of free space, and Drive 4 has 500 MB of free space. What’s the largest size stripe set you can create?
    1. 500 MB
    2. 1 GB
    3. 600 MB
    4. 400 MB
  9. What service should you use to provide IP address configuration information to Windows clients?
    1. WINS
    2. LMHOSTS
    3. DHCP
    4. Simple TCP/IP Services
  10. What are the required parameters for a TCP/IP configured server in a routed environment? (Choose all that apply)
    1. IP address
    2. Subnet mask
    3. Default gateway
    4. DHCP Server
    5. WINS Server IP address
  11. How would you install Win95 over a network? (Choose all that apply)
    1. Share the Windows 95 installation files using the Network Client Administrator tool.
    2. Make an Installation startup disk with the Network Client Administrator tool.
    3. Install using a network startup disk.
    4. Install using the disk set.
  12. You have four physical disks, each with 250 MB of free space. You want to create a stripe set. What will be the largest stripe set you can create?
    1. 250
    2. 500
    3. 750
    4. 1000
  13. You are administering a Windows NT Server computer from a Windows 95 client computer. You install client-based Network Administrative Tools on the Windows 95 computer. You want to share a CD-ROM that is attached to the Windows NT Server computer. What must you use on the Windows 95 computer to do this?
    1. Server Manager
    2. Disk Adminstrator
    3. Explorer
    4. NET USE commands
  14. You configure a stripe set without parity on three physical disks. One of the disks fails. What can you do to recover data that was stored on the stripe set?
    1. Break the stripe set and recover the data by choosing Regenerate in Disk Administrator.
    2. Install a new hard disk to replace the failed disk and choose Regenerate from the Fault Tolerance menu in the Disk Administrator.
    3. Run the Command RECOVER /FS from a command prompt, then reboot your computer.
    4. Restore the lost data from a tape backup.
  15. Your network uses NWLink IPX/SPX Compatible transport protocol. Half of the client computers use 802.3, the other half use 802.2 frame type. You are adding a Windows NT Server computer to the network. This server has one network adapter. What must you do on the new server so it can communicate with all the clients?
    1. Install RIP for NWLink IPX/SPX Compatible protocol.
    2. Use Auto Frame Detection in NWLink IPX/SPX Compatible protocol.
    3. Configure NWLink IPX/SPX compatible protocol to use Manual Frame Type detection. Add the 802.3 and 802.2 frame type.
    4. Install the driver for the network adapter twice, once for each frame type. Configure each instance of the driver to support one of the required frame types.
  16. Your server has six disks, each with two partitions. On the first disk are the boot and system partitions. How can you optimize the pagefile?
    1. Place a pagefile on each disk except the first.
    2. Place the pagefile on any disk except the first.
    3. Place the pagefile on the first disk.
    4. Place the pagefile on the largest available partition.
  17. What is the startup value of a boot device in the registry?
    1. 0
    2. 1
    3. 2
    4. 3
    5. 4
  18. What is the file name of a mandatory profile?
    1. NTUSER.DAT
    2. NTUSER.PRO
    3. NTUSER.MAN
    4. NTUSER.POL
  19. You want to use WINS on your routed network as the only way for name resolution across the router. Your clients consist of 100 Windows 95 computers, 50 Windows NT Workstations 4.0, 3 NT Servers 4.0, and 5 LAN Manager 2.2c for MS-DOS clients. Will this work?
    1. Yes, because they are all Microsoft products.
    2. Yes, because WINS is an Internet standard as specified in RFC 302.
    3. No, because not all the clients can support WINS.

Answers to Chapter 4 Self Test

  1. B. Disk duplexing is just like mirroring, except it uses two controllers.
  2. B. When you install client-based Network Administrator Tools you get a Permissions tab on the Properties page using Explorer.
  3. B. On a multihomed computer you need to use fixed IP addresses. DHCP can only configure on card.
  4. A. You need to move TCP/IP higher in the binding order so the server will try to connect using TCP/IP first.
  5. B. In order for users to log on, they must have access to the mandatory profile.
  6. B. The largest stripe set you can create is 400 MB, although the maximum amount of data that can be stored is 300 MB.
  7. A. Same explanation as previous question.
  8. C. The largest stripe set is 600 MB. You might have chosen D because you wanted to use all the disks. However, if you only use the three disks that have more available free space, you can get a larger stripe set.
  9. C. DHCP assigns IP addresses and configuration information
  10. ABC. You need to have an IP Address, subnet mask, and default gateway to communicate in a routed environment using TCP/IP.
  11. ABC. You can make an installation share using the Network Client Administrator tool, then create an install startup disk. Finally you boot the computer at the client, using the install network startup disk.
  12. D. You can use the full 250 MB from each partition to create a 1000 MB stripe set.
  13. A. Server Manager is the only way to share folders remotely on a server.
  14. D. The only way to recover from a failed stripe set without parity is to use a previous saved backup.
  15. C. If your network uses more than one frame type, you must specify which frame types you want use. If your network has only one IPX/SPX frame type, you can use Auto Detect.
  16. A. By spreading the pagefile across all disks except the first (because it has the boot and system partitions which create a lot of I/O) you can increase the pagefile’s I/O time.
  17. A. The startup value 0 forces the device to start up as soon as the kernel is initialized.
  18. C. Using the .MAN extension makes the profile read-only so the user can’t change it.
  19. C. LAN Manager 2.2c doesn’t support WINS.