| |
Windows 2000 Core Components
Introduction to windows 2000 core
components
Key Topics
Administrative Tools
Administrative Tools Services
Component Services
Data Sources (ODBC)
Telnet Server Administrator
Performance
Computer Management
Event Viewer
Local Security Policy
System Registry
Windows 2000 Networking
TCPIP and DHCP
TCPIP and APIPA
Dial Up Networking (DUN)
Virtual Private Networks (VPN)
VPN Protocols
My Network Places
Windows 2000 Printing
|
-
Within this module
we will deal with the
practical aspects of the windows 2000 core such as the Administrative
tools and all it’s components, the networking tools and finally the
printing tool.
-
It is with these tools that the
uniqueness, power and interactivity of windows 2000 becomes apparent
compared to it’s predecessors
|
-
Computer
Management
-
Event Viewer
-
Local Security
Policy
-
System Registry
-
My Network Places
-
Windows Printing
|
-
Administrative
tools is the door way that is provided for manipulating windows 2000
specific features related to that computer hardware, user, software
etc.
-
The icons inside the
administrative tools
are:-
-
Computer Management
-
Event Viewer
-
Computer services
-
Data sources
-
Telnet
Services
-
Local Security
Policy
-
Services
-
Performance
-
It
has a graphical interface
designed
to administer COM
+
programs
and
use scripting to automate administrative tasks.
-
It can be used by program developers to visually configure programs
for routine tasks such as
transactions, security and interaction with COM
+ components.
-
Databases
which use Structured Query Languages (SQL
) can be communicated with by
programs
using
the Open Database connectivity (ODBC
) tool.
-
This tool is usually used by
programmers setting up applications
which incorporate a database
such as an e-commerce
application.
Telnet
Server
Administrator
-
Computer
management is one of the icons of administrative tools
and
is organized
into
three major sub-components which are:-
-
System tools
-
Storage
-
Services and Applications.
-
Each one of these subcomponents also has within it other menus related to
that component topic.
-
All the security settings
within the local system is setup in the local security policy which
includes password
policy, account lockout
policy, Audit policy
, IP
security policy etc.
-
If a computer is a member of a
domain then these local policy setting can be overridden by the domain
policies
.
-
The
Registry is a rational hierarchical database of all the system settings
including hardware configuration
settings,
user setting and software
settings.
-
The registry
cascading tree
structure that is organized
into main key topics and sub
key topic
branches.
-
Windows
2000
uses
its plug and play features to detect most hardware networking devices
including
modems
and
network
cards
-
You could install a non plug
and play device manually
in similar way to windows 9x
by using Add/remove hardware
or the Network and dial up connections
icon in the control panel.
-
Once the hardware devices
have been installed you can
configure the networking services
and protocols.
-
The
default protocol
of
windows 2000 is TCP
/IP
, which is installed automatically
whenever a networking device is installed on the computer.
-
Computer setup with the TCPIP
protocol
need to be assigned a unique
IP
address
by The Dynamic Host
Configuration Protocol (DHCP
) server before they can communicate on the network
or the Internet
.
-
You
can use dial up networking to generate a connection between your computer
and your Internet
Service
Provider ISP
or
another computer through a telephone line, DSL
line,
ISDN
line
etc and allow access to network
resources
both
locally and remotely.
-
DUN allows us to create a
session and monitor that session using the generated connections saved in
the DUN folder.
-
We
can use DUN to establish a VPN
for
our remote users contacting the office from home and allow them to access
the resources
of
the office network
through
the users ISP
and
the Internet
-
Point to Point Tunneling
Protocol (PPTP
) or Layer Two Tunneling Protocol (L2TP) can be used to generate the VPN
.
VPN
Protocols
-
PPTP
generates
a secure encapsulated connection using PPP
encryption
over a TCP
/IP
based
network
such
as the Internet
-
L2TP is an industry standard
protocol
designed to run over Frame
Relay, X25 and ATM specially modified by Microsoft to run over TCP
/IP
using the IPSec encryption
methods and implementing header compression and tunnel authentication
.
-
Windows
2000
provides
you with an improved printer installation
wizard,
which is both easy to use and quick.
-
There are two sorts of printers
installed on a windows 2000
system: a Local Printer and a Network Printer.
-
Local printers
installed on a computer can be
shared on a network
if a network has been setup.
-
High levels of security may be
set on the printer in secure operating systems such as Windows NT
and Windows 2000
.
-
Printer Properties can be used
to view and configure our printer hardware configuration
and security with the network
.
Questions
-
What are the components of the
administrative tools
? (Choose all that apply)
-
Computer Management
-
Data Sources
-
System Diagnostics
-
Registry Checker
-
Task bar
-
What are the components of the
administrative tools? (Choose all that apply)
-
Regedit
-
Rdisk
-
Telnet
services
-
Event viewer
-
performance
-
What system components can be
monitored using performance? (Choose all that apply)
-
The processor
-
The programs
-
The Memory
-
The network
-
The monitors
-
What are the different ways we
can improve the system security in windows 2000? (Choose all that apply)
-
Using local security policy
-
Using the regedit
-
Using Computer management
-
Using services
-
Using regedt32
-
What are the features of a VPN?
(Choose all that apply)
-
VPN
stands for Virtual private
network
-
We can use PPTP
protocol
-
We can use L2TP
-
PPTP
can be used over the
internet
-
L2TP can be used over the
internet
|
| |
|