Chapter Six- Introducing Windows Server
Chapter Six- Introducing Windows Server
System Administration
Introducing Windows Server and
Controlling Processes
Objectives
02/25/2025
Introduction to Operating Systems
An operating system (OS) is a set of basic programming instructions to
computer hardware, forming a layer of programming code on which most
other functions of the computer are built.
The kernel is the programming code that is the core of the operating system.
Code is a general term that refers to instructions written in a computer
programming language.
Computer hardware consists of physical devices such as the central
processing unit (CPU), circuit boards, the monitor and keyboard, and disk
drives.
Cont’d
Two types of operating systems will be covered in this book:
Desktop operating system – installed on a personal computer (PC)
type of computer that is used by one person at a time, and that may or
may not be connected to a network.
Examples of installations are desktop computers, laptops, and iMac
computers
Server operating system – installed on a more powerful computer
that is connected to a network and enables multiple users to access
information such as e-mail, files, and software.
Examples of hardware with a server OS include traditional
server hardware, rack-mounted server hardware, and blade
servers.
Cont’d
02/25/2025
Tasks of Operating Systems
02/25/2025
Introduction to Operating Systems
02/25/2025
Role of a Server Operating System
02/25/2025
Windows Server 2008 Editions
02/25/2025
Windows 2008 Standard Edition
Up to 4 physical processors allowed
Available in 32-bit or 64-bit versions
32-bit version supports up to 4 GB of RAM, 64-bit version up to 32 GB
Lacks more advanced features, such as clustering
64-bit version can install one virtual instance of Server 2008 Standard
Edition with Hyper-V
02/25/2025
Windows Server 2008 Enterprise Edition
02/25/2025
Windows Server 2008 Datacenter Edition
All the features of Enterprise Edition
Up to 32 physical processors in 32-bit version, 64 processors in 64-bit
Extra fault tolerance features: hot-add and hot-replace memory or CPU
Can’t be purchased as individual license, only through volume license or
through OEMs original equipment manufacturer(pre-installed)
Unlimited number of virtual instances
02/25/2025
Windows Web Server 2008
02/25/2025
System Requirements (All editions)
xx
02/25/2025
Windows Server 2008 Core Technologies
02/25/2025
NTFS
02/25/2025
Active Directory
02/25/2025
Microsoft Management Console (MMC)
02/25/2025
Disk Management
02/25/2025
File and Printer Sharing
Shadow copies
Disk quotas
Distributed File System (DFS)
Also possible to configure options that allow redundancy, version control,
and user storage restrictions.
02/25/2025
Windows Networking Concepts
02/25/2025
Cont’d
02/25/2025
Windows Networking Components
Network Interface
Composed of two parts; the network interface card (NIC) and the device
driver software
Network Protocol
Specifies the rules and format of communication between network
devices
Network Client and Server Software
Network client sends requests to a server to access network resources
Network server software receives requests for shared network resources
and makes those resources available to a network client
02/25/2025
Internet Information Services
02/25/2025
Windows Server 2008 Roles
02/25/2025
Active Directory Certificate Services
02/25/2025
Active Directory Domain Services
Active Directory Domain Services (AD DS) installs Active Directory and
turns Windows Server 2008 into a domain controller
Read Only Domain Controller (RODC)
Provides the same authentication and authorization services as a
standard domain controller
Changes cannot be made on an RODC directly
Updated periodically by replication from standard domain controllers
02/25/2025
Other Active Directory Related Roles
02/25/2025
Application Server
02/25/2025
DHCP Server
02/25/2025
DNS Server
DNS Server resolves the names of Internet computers and computers that
are members of a Windows Domain to their assigned IP addresses.
When installing Active Directory, you can specify an existing DNS
server or install DNS on the same server as Active Directory
02/25/2025
Fax Server
Provides tools to managed shared fax resources and allow users to send
and receive faxes
After the role is installed, you can
Manage users who have access to fax resources
Configure fax devices
Create rules for routing incoming and outgoing faxes
Monitor and log use of fax resources
02/25/2025
File Services
02/25/2025
Hyper-V
02/25/2025
Network Policy and Access Services
02/25/2025
Print Services
02/25/2025
Terminal Services
02/25/2025
UDDI Services
02/25/2025
Web Server (IIS)
02/25/2025
Windows Deployment Services
02/25/2025
New Features in Windows Server 2008
Server Manager
Server Core
Hyper-V virtualization
Storage management enhancements
Networking enhancements
Network Access Protection
Windows Deployment Services
New Active Directory roles
Terminal Services enhancements
02/25/2025
Server Manager
02/25/2025
Server Core
02/25/2025
Cont’d
02/25/2025
Cont’d
Server Core lacks the ability to install the following server roles (and their
optional features):
Application Server
Active Directory Rights Management Services
Fax Server
UDDI Services
Windows Deployment Services
Active Directory Certificate Services
Network Policy and Access Services
Terminal Services
Active Directory Federation Services
02/25/2025
Cont’d
xx
02/25/2025
Hyper-V
02/25/2025
Cont’d
Hyper-V Requirements:
64-bit version of Windows Server 2008 Standard, Enterprise, or
Datacenter Edition
A server running a 64-bit processor with virtualization support and
hardware data execution protection.
Enough free memory and disk space to run virtual machines and store
virtual hard drives. Virtual machines use the same amount of memory
and disk space resources as a physical machine.
02/25/2025
Cont’d
c
02/25/2025
Storage Management Enhancements
02/25/2025
Networking Enhancements
02/25/2025
Network Access Protection
02/25/2025
Windows Deployment Services
02/25/2025
New Active Directory Roles
02/25/2025
Terminal Services Enhancements
RemoteApp
Rather than accessing a program on a server through remote desktop,
the application appears as if it is actually running locally
Terminal Services Web Access (TS Web Access)
Allows users to access applications through a web browser, requiring
no additional software for the client if running Vista
Can list available RemoteApp programs
Allows secure, encrypted connections using Secure HTTP (HTTPS)
without the need for a VPN
02/25/2025
Summary
02/25/2025
System Administration
Controlling Processes
02/25/2025
Control process
02/25/2025
PID, PPID, UID, GID
02/25/2025
Cont’d
02/25/2025
Cont’d
Unix-like operating systems identify users within the kernel by a value
called a user identifier, often abbreviated to UID or User ID.
The UID, along with the GID and other access control criteria, is used to
determine which system resources a user can access.
The password file maps textual usernames to UIDs, but in the kernel, only
UID's are used.
02/25/2025
Cont’d
The effective UID (euid) of a process is used for most access checks. It is
also used as the owner for files created by that process.
GID:
A group identifier, often abbreviated to GID, is a numeric value used to
represent a specific group.
The range of values for a GID varies amongst different systems;
at the very least, a GID can be between 0 and 32,767, with one restriction:
the login group for the superuser must have GID 0.
02/25/2025
Priority and nice value
02/25/2025
Priority vs. nice
02/25/2025
Cont’d
You can check the first by running command nice -n 3 top.
It will show that top process has NI 3 and PR 23.
But for running nice -n -7 top in most Linux systems you need to have root
privileges because actually the lower PR value is the higher actual priority
is.
02/25/2025
Signals, process states, etc.
02/25/2025
Cont’d
Signals may also be delivered in an unpredictable way, out of sequence
with the program due to the fact that signals may originate outside of the
currently executing process.
Another way to view signals is that it is a mechanism for
handling asynchronous events.
As opposed to synchronous events, which is when a standard program
executes iterative, that is, one line of code following another.
02/25/2025
Cont’d
02/25/2025
Cont’d
#> killall cat The killall command will send a signal to all processes
named cat that says "terminate."
The actually signal being sent is SIGTERM,
whose purposes is to communicate a termination request to a given
process,
but the process does not actually have to terminate … more on that later.
02/25/2025
1. Periodic process
1. What is cron?
Cron is a standard Unix utility that is used to schedule commands for
automatic execution at specific intervals.
For instance, you might have a script that produces web statistics that you
want to run once a day automatically at 5:00 AM.
Commands involving cron are referred to as "cron jobs.
Cron in the Account Control Center
The ACC has a built-in interface for cron. We recommend that all
customers use the ACC cron interface, although advanced users may use
cron manually.
02/25/2025
SystemThank
Administration
You…..!!!
02/25/2025