of 45
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
1/45
R A V EE N DA R S WA MI N AT H A N
1
Implementing and
Supporting MicrosoftWindows XP Professional
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
2/45
Agenda2
Configuring Hardware on a Computer Running
Microsoft Windows XP Professional Managing Disks
Configuring and Managing File Systems
Configuring the Desktop Environment
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
3/45
3
Installing a Device Driver
Using Device Manager
Installing a Printer
Determining Which Hardware Resources are required
Determining Available Hardware Resources are required
Configuring Hardware on a Computer Running Microsoft
Windows XP Professional
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
4/45
Determining Which Hardware
Resources are required4
Interrupts Hardware devices use interrupts (IRQ) to send messages. The microprocessor knows this as an interrupt request (IRQ). The microprocessor uses
this information to determine which device needs its attention and the type of attentionthat it needs.
Windows XP Professional provides 16 IRQs, numbered 0 to 15, that are assigned todevices.
For example, Windows XP Professional assigns IRQ 1 to the keyboard. Input/output (I/O) ports
I/O ports are a section of memory that a hardware device uses to communicate with theo eratin s stem.
When a microprocessor receives an IRQ, the operating system checks the I/O portaddress to retrieve additional information about what the hardware device wants it to do. An I/O port is represented as a hexadecimal number.
Direct memory access (DMA) DMAs are channels that allow a hardware device, such as a floppy disk drive, to access
memory directly, without interrupting the microprocessor. DMA channels speed up access to memory. Windows XP Professional has eight DMA channels, numbered 0 through 7.
Memory Many hardware devices, such as a network interface card (NIC), use onboard memory or
reserve system memory. This reserved memory is unavailable for use by other devices or Windows XP
Professional.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
5/45
Determining Available Hardware
Resources are required5
Device Manager, View menu, Select Resources By Connection.
The Device Manager displays the resources that are currently in use (for example,IRQs).
You might need to change hardware resource assignments.
,
another device.
You might also encounter two hardware devices requesting the same hardwareresource, resulting in a conflict.
When you change a hardware resource, print the content of Device Manager.
This provides you with a record of the hardware configuration.
If you encounter problems, you can use the printout to verify the hardware resourceassignments.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
6/45
Managing Disks6
Working with Disk Management
Working with Basic Disks Working with Dynamic Disks
Pre arin Disks When U radin to Windows XP
Professional Managing Disks
Defragmenting Volumes
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
7/45
Disk Management7
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
8/45
Disk Management8
To open Disk Management window, at run prompt,
type compmgmt.msc It is also available at Administrative Tools in Control
Panel as Computer Management
We can perform Creating and deleting a partition
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
9/45
Basic Disks9 Basic storage uses normal partition tables supported by MS-DOS,
Microsoft Windows 95, Microsoft Windows 98, Microsoft
Windows Millennium Edition (Me), Microsoft Windows NT,Microsoft Windows 2000, and Windows XP.
A disk initialized for basic storage is called a basicdisk. A basicdisk contains basic volumes, such as primary partitions, extendedpar ons, an og ca r ves.
Additionally, basic volumes include multidisk volumes that arecreated by using Windows NT 4.0 or earlier, such as volume sets,stripe sets, mirror sets, and stripe sets with parity.
Windows XP does not support these multidisk basic volumes. Any
volume sets, stripe sets, mirror sets, or stripe sets with paritymust be backed up and deleted or converted to dynamic disksbefore you install Windows XP Professional.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
10/45
Dynamic Disks10 Dynamic storage is supported in Windows 2000 and Windows XP Professional.
A disk initialized for dynamic storage is called a dynamic disk. A dynamic disk contains dynamic volumes, such as simple volumes, spanned
volumes, striped volumes, mirrored volumes, and RAID-5 volumes.
NOTE: Dynamic disks are not supported on portable computers or on Windows XPHome Edition-based computers.
You cannot create mirrored volumes or RAID-5 volumes on Windows XP HomeEdition, Windows XP Professional, or Windows XP 64-Bit Edition-basedcomputers.
You can use a Windows XP Professional-based com uter to create a mirrored or
RAID-5 volume on remote computers that are running Windows 2000 Server,Windows 2000 Advanced Server, or Windows 2000 Datacenter Server. You must have administrative privileges on the remote computer to do this. Storage types are separate from the file system type. A basic or dynamic disk can contain any combination of FAT16, FAT32, or NTFS
partitions or volumes.
A disk system can contain any combination of storage types. However, all volumes on the same disk must use the same storage type.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
11/45
Dynamic Disks11
Avolume is a storage unit made from free space on one or more disks. It can be formatted with a file systemand assigned a drive letter. Volumes on dynamic disks can have any of the following layouts: simple, spanned,mirrored, striped, or RAID-5.
Asimple volume uses free space from a single disk. It can be a single region on a disk or consist of multiple,
concatenated regions. A simple volume can be extended within the same disk or onto additional disks. If asimple volume is extended across multiple disks, it becomes a spanned volume.
Aspanned volume is created from free disk space that is linked together from multiple disks. You can extend aspanned volume onto a maximum of 32 disks. A spanned volume cannot be mirrored and is not fault-tolerant.
Astriped volume is a volume whose data is interleaved across two or more physical disks. The data on thistype of volume is allocated alternately and evenly to each of the physical disks. A striped volume cannot bemirrored or extended and is not fault-tolerant. Striping is also known as RAID-0.
Amirrored volume is a fault-tolerant volume whose data is duplicated on two physical disks. All of the data onone volume is copied to another disk to provide data redundancy. If one of the disks fails, the data can still beaccessed from the remaining disk. A mirrored volume cannot be extended. Mirroring is also known as RAID-1.
ARAID-5 volume is a fault-tolerant volume whose data is striped across an array of three or more disks. Parity(a calculated value that can be used to reconstruct data after a failure) is also striped across the disk array. If aphysical disk fails, the portion of the RAID-5 volume that was on that failed disk can be re-created from theremaining data and the parity. A RAID-5 volume cannot be mirrored or extended.
The system volume contains the hardware-specific files that are needed to load Windows (for example, Ntldr,Boot.ini, and Ntdetect.com). The system volume can be, but does not have to be, the same as the boot volume.
The boot volume contains the Windows operating system files that are located in the %Systemroot% and%Systemroot%\System32 folders. The boot volume can be, but does not have to be, the same as the system
volume.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
12/45
Operating System Storage Types Storage Types Storage Types Partition Styles Partition Styles
Basic Volumes Dynamic Simple, Spanned,
and Striped Volumes
Dynamic Mirrored and
RAID-5 Volumes
MBR Disks GPT Disks
Windows XP Home Edition X X
Windows XP Professional X X X
Windows XP Professional
x64 Edition
X X X X
Windows 2000 Professional X X X
Windows 2000 Server
family
X X X X
Windows Server 2003
family
X X X X X
12
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
13/45
Preparing Dis s W en Upgrading toWindows XP Professional
13
In the lower-right pane, right-click the basic disk that you want toconvert, and then clickConvert to Dynamic Disk.
Select the check box that is next to the disk that you want to convert(if it is not already selected), and then clickOK. ClickDetails if you want to view the list of volumes in the disk. ClickConvert. ClickYeswhen ou are rom ted to convert the disk and then
clickOK. After you convert a basic disk to a dynamic disk, local access to the
dynamic disk is limited to Windows 2000 and Windows XPProfessional.
Additionally, after you convert a basic disk to a dynamic disk, thedynamic volumes cannot be changed back to partitions.
You must first delete all dynamic volumes on the disk and thenconvert the dynamic disk back to a basic disk.
If you want to keep your data, you must first back up the data or moveit to another volume.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
14/45
Defragmenting Volumes14
Fragmentation occurs when the operating system
cannot or will not allocate enough contiguous spaceto store a complete file as a unit, but instead putsparts of it in gaps between other files
e ragmen a on s a process a re uces eamount of fragmentation in file systems.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
15/45
Defragmenting Volumes15 Option 1
Open My Computer. Right-click the local disk volume that you want to defragment, and then click
Properties. On the Tools tab, clickDefragment Now.
ClickDefragment.
Option 2 Start Computer Management MMC (Compmgmt.msc). ClickDisk Defragmenter. Click the volume that you want to defragment, and then clickDefragment.
Option 3 Start Disk Defragmenter MMC (Dfrg.msc). Click the volume that you want to defragment, and then clickDefragment.
Limitations It can defragment only local volumes. It can defragment only one volume at a time. It cannot defragment one volume while it is scanning another. It cannot be scheduled.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
16/45
Configuring and Managing File Systems16
Working with File Systems
Managing Data Compression Securing Data by Using EFS
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
17/45
Working with File Systems
Afile system is the structurein which files are named,
stored, and organized. File systems supported by
Windows XP Professional
Operating System FAT16 FAT32 NTFS
Windows XP X X X
Windows Server 2003 X X X
Windows 2000 X X X
NTFS. You can use any
combination of these filesystems on a hard disk, but
each volume on a hard diskcan be formatted by usingonly one file system
Windows NT 4.0* X X
Windows 95 OSR2, Windows 98, and Windows Me X X
Windows 95 (prior to OSR2) X
MS-DOS X
17
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
18/45
NTFS File Systems
18
Robust, reliable performance NTFS guarantees the consistency of the volume by using standard transaction logging and
recovery techniques. In the event of a system failure, NTFS uses its log file and checkpoint information to restore the
consistency of the file system when the computer is restarted. In the event of a bad-sector error, NTFS dynamically remaps the cluster containing the bad
sector and allocates a new cluster for the data. NTFS also marks the cluster as bad and no longer uses it.
Built-in security features When you set permissions on a file or folder, you specify the groups and users whose access you
want to restrict or allow and then select the type of access. For example, you can let one group read the contents of a file, let another group make changes
to the file, and prevent all other groups from accessing the file. The Encrypting File System (EFS) is the technology used to store encrypted files on NTFS
.
After you encrypt a file or folder, you work with the encrypted file or folder just as you do withany other files and folders. However, an intruder who tries to access your encrypted files orfolders is prevented from doing so, even if the intruder has physical access to the computer.
Supports large volumes Using the default cluster size (4 KB) for large volumes, you can create an NTFS volume up to 16
terabytes. You can create NTFS volumes up to 256 terabytes using the maximum cluster size of 64 KB.
NTFS also supports larger files and more files per volume than FAT.
NTFS manages disk space more efficiently than FAT by using smaller cluster sizes. Forexample, a 30-GB NTFS volume uses 4-KB clusters. The same volume formatted by using FAT32 uses 16-KB clusters. Using smaller clusters
reduces wasted space on hard disks.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
19/45
NTFS File Systems19 Designed for storage growth
By enabling disk quotas, you can track and control disk space usage for NTFS volumes. You can configure whether users are allowed to exceed their limit, and you can also configure Windows XP Professional
to log an event when a user exceeds a specified warning level or quota limit. To create extra disk space, you can compress files on NTFS volumes. Compressed files can be read and written by any Windows-based application without first being decompressed by
another program. If you run out of drive letters or need to create additional space that is accessible from an existing folder, you can mount a
volume at any empty folder on a local NTFS volume to create a mounted drive. Mounted drives make data more accessible and give you the flexibility to manage data storage based on your work
environment and system usage. You can increase the size of most NTFS volumes by adding unallocated space from the same disk or from another disk.
Other advanced features found only on NTFS volumes parse es cons st o arge, consecut ve areas o zeros.
NTFS manages sparse files by tracking the starting and ending point of the sparse file, as well as its useful (nonzero) data. The unused space in a sparse file is made available as free space. The NTFS change journal provides a persistent log of changes made to files on a volume. NTFS maintains the change journal by tracking information about added, deleted, and modified files for each volume. Programs such as Indexing Service can take advantage of the change journal to boost search performance. Hard links are NTFS-based links to a file on an NTFS volume. By creating hard links, you can have a single file in multiple folders without duplicating the file. You can also create multiple hard links for a file in a folder if you use different file names for the hard links. Because all the hard links reference the same file, applications can open any of the hard links and modify the file.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
20/45
20
Description Limit
Maximum file size 16 terabytes
Maximum volume size 256 terabytes
Files per volume 4,294,967,295
NTFS Size Limits
FAT32 Size LimitsDescription Limit
FAT Size Limits
Maximum file size 4 GB
Maximum volume size 32 GB
Files per volume 4,177,920
Maximum number of files and subfolders within a
single folder
65,534 (The use of long file names can significantly reduce the number of available files and subfolders
within a folder.)
Description Limit
Maximum file size 4 GB
Maximum volume size 4 GB
Files per volume Approximately 65,536 (216
files)
Maximum number of files and folders within the root folder 512 (Long file names can reduce the number of available files and folders in the root folder.)
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
21/45
Format Options21
Formatting a Volume
You choose a file system when you format a volume.
During the format, Windows XP Professional places key file systemstructures on the volume.
These structures include the boot sector, the file allocation table (for FAT
volumes), and the master file table (for NTFS volumes). Depending on theprogram you use to format a volume, you can also choose one or more ofthe following formatting options.
Format Option
ere e p on s
Available Where the Option Is Available
ere e p on s
Available Where the Option Is Available
Setup My Computer or Windows Explorer Disk Management Format Command
Volume label No option to create a
volume label.
Available for all volumes. Available for all
volumes.
Use the /v:label parameter to specify the
volume label.
Quick format Available for all
volumes.
Available for all volumes. Available for all
volumes.
Use the /q parameter to specify the quick
format option.
Enablecompression
No option to compressthe volume.
Available for NTFS volumes. Available for NTFSvolumes.
Use the /c parameter to enablecompression for NTFS volumes.
Allocation unit
(cluster) size
Uses the default cluster
size only.
Offers default cluster sizes for FAT volumes and cluster sizes
up to 4 KB for NTFS volumes.
Offers all available
cluster sizes.
Use the /a:size parameter to specify the
cluster size.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
22/45
NTFS Folder Permissions22
Read See files and subfolders in the folder and view folder ownership, permissions, and attributes (such as Read-Only, Hidden,
Archive, and System)
Write Create new files and subfolders within the folder, change folder attributes, and view folder ownership and permissions
List Folder Contents See the names of files and subfolders in the folder
Read & Execute Move through folders to reach other files and folders, even if the users don't have permission for those folders, and
perform actions permitted by the Read permission and the List Folder Contents permission
Modify Delete the folder plus perform actions permitted by the Write permission and the Read & Execute permission
Full Control Change permissions, take ownership, and delete subfolders and files, plus perform actions permitted by all other NTFS
folder permissions
You can deny permission to a user account or group. To deny all access to a user account or group for afolder, deny the Full Control permission.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
23/45
NTFS File Permission23
Read Read the file, and view file attributes, ownership, and permissions
Write Overwrite the file, change file attributes, and view file ownership and permissions
Read & Execute Run applications, plus perform the actions permitted by the Read permission
Modify Modify and delete the file, plus perform the actions permitted by the Write
permission and the Read & Execute permission
Full Control Change permissions and take ownership, plus perform the actions permitted by
all other NTFS file permission
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
24/45
24
Access Control List NTFS stores an access control list(ACL) with every file and folder on an NTFS volume. The ACL contains a list of all user accounts and groups that have been assigned permissions for the file or
folder, as well as the permissions that they have been assigned. When a user attempts to gain access to a resource, the ACL must contain an entry, called an access control
entry (ACE), for the user account or a group to which the user belongs. The entry must allow the type of access that is requested (for example, Read access) for the user to gain
access. If no ACE exists in the ACL, the user can't access the resource.
Multi le NTFS Permissions You can assign multiple permissions to a user account and to each group of which the user is a member. To assign permissions, you must understand the rules and priorities by which NTFS assigns and combines
multiple permissions and NTFS permissions inheritance.
Effective Permissions A user's effective permissions for a resource are the sum of the NTFS permissions that you assign to the
individual user account and to all of the groups to which the user belongs. If a user has Read permission for a folder and is a member of a group with Write permission for the same
folder, the user has both Read and Write permissions for that folder.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
25/45
Overriding Permissions
25
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
26/45
Inherit Permissions26
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
27/45
Copying Files and Folders27
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
28/45
Moving Files and Folders28
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
29/45
Shared Folders29
Shared Folder Permissions apply to folders only
Apply to Users who connect to folder from networkonly
Default if Full Control and available for Everyone
Permissions Multiple
Deny
NTFS
Administrative Shared Folder
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
30/45
Managing Data Compression30
Create compressed files both on FAT and NTFS
You can directly open from the compressed folders You can encrypt compressed folders
You can compress without decreasing performance
When you have selected the option of Encrypting yourfolder, we cannot do Compression
You can also Compress your drive or Volume
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
31/45
Disk Quota31
Tracks and control quota on per user per volume basis Ignores Compression when calculating space
Free space reports on XP will show the space free on available Users Quota SA can do the following Set a disk quota limit to specify the amount of disk space for each user. Set a disk quota warning to specify when Windows XP Professional should log an
event, indicating that the user is nearing his or her limit. Enforce disk quota limits and deny users access if they exceed their limit, or allow
them continued access. Log an event when a user exceeds a specified disk space threshold. The threshold could be when users exceed their quota limit or when they exceed
their warning level.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
32/45
32
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
33/45
Disk Quota33
Status A red traffic light indicates that disk quotas are disabled.
A yellow traffic light indicates that Windows XP Professional isrebuilding disk quota information.
A green traffic light indicates that the disk quota system isactive.
Monitoring The amount of hard disk space that each user uses Users who are over their quota warning threshold, signified by
a yellow triangle Users who are over their quota limit, signified by a red circle The warning threshold and the disk quota limit for each user
ecur ng a a y s ng
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
34/45
ecur ng a a y s ng
34
The Microsoft Encrypting File System (EFS) provides encryption fordata in NTFS files stored on disk.
This encryption is public key-based and runs as an integratedsystem service, making it easy to manage, difficult to attack, andtransparent to the file owner.
If a user who attempts to access an encrypted NTFS file has therivate ke to that file the file can be decr ted so that the user can
open the file and work with it transparently as a normal document. A user without the private key is denied access. Windows XP Professional also includes the Cipher command, which
provides the ability to encrypt and decrypt files and folders from acommand prompt.
Windows XP Professional also provides a recovery agent. In theevent that the owner loses the private key, the recovery agent canstill recover the encrypted file.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
35/45
35 Features Transparent encryption
In EFS, file encryption does not require the file owner to decrypt and re-encrypt the file on eachuse. Decryption and encryption happen transparently on file reads and writes to disk.
Strong protection of encryption keys Public key encryption resists all but the most sophisticated methods of attack. Therefore, in EFS,
the file encryption keys areencrypted using a public key from the user's certificate. (Note thatWindows XP Professional and Windows 2000 use X.509 v3 certificates.)
The list of encrypted file encryption keys is stored with the encrypted file and is unique to it. Todecrypt the file encryption keys, the file owner supplies a private key, which only he or she has.
Integral data-recovery system If the owner's private key is unavailable, the recovery agent can open the file using his or her own
Securing Data by Using EFS
private ey. There can e more than one recovery agent, each with a i erent pu lic ey, ut atleast one public recovery key must be present on the system to encrypt a file.
Secure temporary and paging files Many applications create temporary files while you edit a document, and these temporary files can
be left unencrypted on the disk. On computers running Windows XP Professional, EFS can beimplemented at the folder level, so any temporary copies of an encrypted file are also encrypted,provided that all files are on NTFS volumes.
EFS resides in the Windows operating system kernel and uses the nonpaged pool to store fileencryption keys, ensuring that they are never copied to the paging file.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
36/45
36 Encrypting The recommended method to encrypt files is to create an NTFS folder and then encrypt
the folder. To encrypt a folder, in the Properties dialog box for the folder, click theGeneral tab.
In the General tab, click Advanced, and then select the Encrypt Contents To Secure Datacheck box.
All files placed in the folder are encrypted and the folder is now marked for encryption. Folders that are marked for encryption are not actually encrypted; only the files within
the folder are encrypted. Compressed files cannot be encrypted, and encrypted files cannot be compressed.
Decry ting
Securing Data by Using EFS
Decrypting a folder or file refers to clearing the Encrypt Contents To Secure Data check
box in a folder's or file's Advanced Attributes dialog box, which you access from thefolder's or file's Properties dialog box.
Once decrypted, the file remains so until you select the Encrypt Contents To Secure Datacheck box.
The only reason you might want to decrypt a file would be if other people needed accessto the folder or file-for example, if you want to share the folder or make the file availableacross the network.
Recovery Agent Default Recovery Agent is the Administrator
Con iguring TCP IP Addressing and Name
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
37/45
Con iguring TCP IP Addressing and NameResolution
37
Configuring IP Addresses
Troubleshooting IP Addresses Determining TCP/IP Name Resolution Methods
Confi urin a DNS and WINS Client
Connecting to a Remote Host
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
38/45
Configuring IP Addresses38
Configure TCP/IP to use a static IP address
Configure TCP/IP to obtain an IP addressautomatically
Explain Automatic Private IP Addressing
Disable Automatic Private IP Addressing
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
39/45
Configure a static IP address39
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
40/45
Configure a dynamic IP address40
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
41/45
Automatic Private IP Addressing41
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
42/45
Troubleshooting Tools to test TCP/IP42 Route
Netstat IPconfig
Ping Hostname Arp
Tracert ftp telnet Rcp Finger Rsh
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
43/45
43 In Windows XP Professional, TCP/IP allows a computer to communicate over a networkwith another computer by using a host name or a NetBIOS name in place of an IP address.
Domain Name System (DNS). A global, distributed database based on a hierarchical naming system. The hierarchical naming structure of DNS complements the hierarchical planning structure
implemented in the Active Directory directory service, and is used as its naming service. DNS name resolution is used on the Internet to map friendly names to IP addresses, andvice versa. In Microsoft Windows 2000, Microsoft Windows Server 2003, and MicrosoftWindows XP environments, DNS is the default name resolution method.
NetBIOS over TCP IP NetBT . Provides name resolution and connection services for clients using Microsoft Windows 95,
Microsoft Windows 98, and Microsoft Windows Millennium Edition (Windows Me)operating systems, applications, and services.
Microsoft Windows 2000 Server and Windows Server 2003 include a NetBIOS name serverknown as the Windows Internet Name Service (WINS).
When one computer attempts to communicate with another computer using one of thesemechanisms for name resolution, the device name must be resolved to an IP address andultimately to a hardware address.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
44/45
Connecting to a Remote Host44 The first component configures a system to act as a remote host and is simply
called Remote Desktop. The second component, called Remote Desktop Connection, configures a system
to act as a remote client and allows it to access the remote host. Remote Desktop feature is based on Microsoft's Terminal Services technology
and uses the Remote Desktop Protocol (RDP) to allow a client to connect to aremote host. Under RDP, which works across a TCP/IP connection, the client system is
allowed to send keyboard and mouse input to the remote host to run applicationslocated on the host system.
e os sys em en uses o sen screen an au o n orma on ac o e
client system. In addition to input and output data transmission, RDP allows the sharing of
certain resources between the client and remote host systems. Any devices connected to the serial and parallel ports on the client system are
accessible to applications running on the host system.
8/2/2019 Microsoft Power Point - Implementing and Supporting Microsoft Windows XP Professional - Day 2
45/45
Configuring Remote Desktop45