iSelfSchooling.com  Since 1999     References  |  Search more  | Oracle Syntax  | Free Online Oracle Training

    Home      .Services     Login       Start Learning     Certification      .                 .Share your BELIEF(s)...

 

. Online Accounting        .Copyright & User Agreement   |
    .Vision      .Biography     .Acknowledgement

.Contact Us      .Comments/Suggestions       Email2aFriend    |

 

Windows 2000 Core Components 

Introduction to windows 2000 core components 

Key Topics 

Administrative Tools 

Administrative Tools Services 

Component Services 

Data Sources (ODBC) 

Telnet Server Administrator 

Performance 

Computer Management 

Event Viewer 

Local Security Policy 

System Registry 

Windows 2000 Networking 

TCPIP and DHCP 

TCPIP and APIPA 

Dial Up Networking (DUN) 

Virtual Private Networks (VPN) 

VPN Protocols 

My Network Places 

Windows 2000 Printing 

Windows 2000  Core Components

Introduction to windows 2000 core components

  • Within this module  we will deal with the practical aspects of the windows 2000 core such as the Administrative tools and all it’s components, the networking tools and finally the printing tool.

  • It is with these tools that the uniqueness, power and interactivity of windows 2000 becomes apparent compared to it’s predecessors

Key Topics

  • Administrative Tools

  • Component Services

  • Data Sources

  • Telnet  Server Administrator

  • Performance

  • Computer Management

  • Event Viewer

  • Local Security  Policy

  • System Registry

  • My Network Places

  • Windows Printing

 

Administrative Tools

  • Administrative tools is the door way that is provided for manipulating windows 2000 specific features related to that computer hardware, user, software  etc.

  • The icons inside the administrative tools  are:-

    • Computer Management

    • Event Viewer

    • Computer services

    • Data sources

    • Telnet  Services

    • Local Security  Policy

    • Services

    • Performance

Administrative Tools Services

  • The service icon can be used to manage the services  on your system, start and stop services, and allow you to identify services easily by giving them your own names and description.

 

Component Services

  • It has a graphical interface  designed to administer COM  + programs  and use scripting to automate administrative tasks.

  • It can be used by program developers to visually configure programs  for routine tasks such as transactions, security and interaction with COM  + components.

Data Sources (ODBC )

  • Databases which use Structured Query Languages (SQL ) can be communicated with by programs  using the Open Database connectivity (ODBC ) tool.

  • This tool is usually used by programmers setting up applications  which incorporate a database such as an e-commerce  application.

 

Telnet  Server Administrator

  • This tool allows an administrator  to use the TCP /IP  telnet utility to change the environmental settings and user settings within the system.

Performance

  • Designed to collect real time data and presents the information  as a chart or report on the: -

    • Processor

    • Memory

    • Storage  drives

    • Network.

Computer Management

  • Computer management is one of the icons of administrative tools  and is organized  into three major sub-components which are:-

  • System tools

  • Storage

  • Services and Applications.

  • Each one of these subcomponents also has within it other menus related to that component topic.

Event Viewer

  • The event viewer  allows us to view previously logged information  regarding the system itself; the applications  currently installed within it and, security factors within the environment.

Local Security  Policy

  • All the security settings within the local system is setup in the local security policy which includes password  policy, account lockout policy, Audit policy , IP  security policy etc.

  • If a computer is a member of a domain then these local policy setting can be overridden by the domain policies .

System Registry

  • The Registry is a rational hierarchical database of all the system settings including hardware configuration  settings, user setting and software  settings.

  • The registry  cascading tree  structure that is organized  into main key topics and sub key topic  branches.

Windows 2000  Networking

  • Windows 2000  uses its plug and play features to detect most hardware networking devices  including modems  and network  cards

  • You could install a non plug and play device manually  in similar way to windows 9x  by using Add/remove hardware or the Network and dial up connections  icon in the control panel.

  • Once the hardware devices  have been installed you can configure the networking services  and protocols.

TCPIP and DHCP

  • The default protocol  of windows 2000 is TCP /IP , which is installed automatically whenever a networking device is installed on the computer.

  • Computer setup with the TCPIP protocol  need to be assigned a unique IP  address  by The Dynamic Host Configuration Protocol (DHCP ) server before they can communicate on the network  or the Internet .

TCPIP and APIPA

  • If a DHCP  server is not available on the network  windows 98 and windows 2000 use Automatic Private IP  Addressing (APIPA ) to assign themselves a random class B IP address  from the private network 169.254.0.0 with subnet mask 255.255.0.0 which enables the computer to communicate on the physical network but not the internet.

Dial Up Networking (DUN)

  • You can use dial up networking to generate a connection between your computer and your Internet  Service Provider ISP  or another computer through a telephone line, DSL  line, ISDN  line etc and allow access to network  resources  both locally and remotely.

  • DUN allows us to create a session and monitor that session using the generated connections saved in the DUN folder.

Virtual Private Networks (VPN )

  • We can use DUN to establish a VPN  for our remote users contacting the office from home and allow them to access the resources  of the office network  through the users ISP  and the Internet

  • Point to Point Tunneling Protocol (PPTP ) or Layer Two Tunneling Protocol (L2TP) can be used to generate the VPN .

VPN Protocols

  • PPTP  generates a secure encapsulated connection using PPP  encryption over a TCP /IP  based network  such as the Internet

  • L2TP is an industry standard protocol  designed to run over Frame Relay, X25 and ATM specially modified by Microsoft to run over TCP /IP  using the IPSec encryption methods and implementing header compression and tunnel authentication .

 

My Network Places

  • You can use My Network Places to both maneuver around the network  and also to configure your current computers settings on the network and the Internet

Windows 2000 Printing

  • Windows 2000  provides you with an improved printer installation  wizard, which is both easy to use and quick.

  • There are two sorts of printers  installed on a windows 2000 system: a Local Printer and a Network Printer.

  • Local printers  installed on a computer can be shared on a network  if a network has been setup.

  • High levels of security may be set on the printer in secure operating systems such as Windows NT  and Windows 2000 .

  • Printer Properties can be used to view and configure our printer hardware configuration  and security with the network .

 

Questions

 

  1. What are the components of the administrative tools ? (Choose all that apply)

    1. Computer Management

    2. Data Sources

    3. System Diagnostics

    4. Registry Checker

    5. Task bar

  2. What are the components of the administrative tools? (Choose all that apply)

    1. Regedit

    2. Rdisk

    3. Telnet  services

    4. Event viewer

    5. performance

  3. What system components can be monitored using performance? (Choose all that apply)

    1. The processor

    2. The programs

    3. The Memory

    4. The network

    5. The monitors

  4. What are the different ways we can improve the system security in windows 2000? (Choose all that apply)

    1. Using local security policy

    2. Using the regedit

    3. Using Computer management

    4. Using services

    5. Using regedt32

  5. What are the features of a VPN? (Choose all that apply)

    1. VPN  stands for Virtual private network

    2. We can use PPTP  protocol

    3. We can use L2TP

    4. PPTP  can be used over the internet

    5. L2TP can be used over the internet

 

Answers

1.      A,B,C

2.      C,D,E

3.      A,C,D

4.      A,C

5.      A,B,C,D

 

Google
 
Web web site