Windows nt network administration
TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.
Johannes Helmig Posted On July 28, Johannes Helmig Posted On May 9, Johannes Helmig Posted On February 4, Johannes Helmig Posted On December 2, Johannes Helmig Posted On July 9, Johannes Helmig Posted On July 5, Johannes Helmig Posted On June 24, Both protocols deliver data between the Application Layer and the Internet Layer.
Applications programmers can choose whichever service is more appropriate for their specific applications. The User Datagram Protocol gives application programs direct access to a datagram delivery service, like the delivery service that IP provides. This allows applications to exchange messages over the network with a minimum of protocol overhead. UDP is an unreliable, connectionless datagram protocol. As noted previously, unreliable merely means that there are no techniques in the protocol for verifying that the data reached the other end of the network correctly.
Within your computer, UDP will deliver data correctly. UDP uses bit Source Port and Destination Port numbers in word 1 of the message header, to deliver data to the correct applications process. Figure shows the UDP message format. Why do applications programmers choose UDP as a data transport service? There are a number of good reasons. If the amount of data being transmitted is small, the overhead of creating connections and ensuring reliable delivery may be greater than the work of re-transmitting the entire data set.
Applications that fit a query-response model are also excellent candidates for using UDP. The response can be used as a positive acknowledgment to the query.
Imposing another layer of acknowledgment on any of these types of applications is inefficient. The server responds with the requested information. Applications that require the transport protocol to provide reliable data delivery use TCP because it verifies that data is delivered across the network accurately and in the proper sequence.
TCP is a reliable , connection-oriented , byte-stream protocol. Simply stated, a system using PAR sends the data again, unless it hears from the remote system that the data arrived successfully.
The unit of data exchanged between cooperating TCP modules is called a segment see Figure Each segment contains a checksum that the recipient uses to verify that the data is undamaged. If the data segment is received undamaged, the receiver sends a positive acknowledgment back to the sender. If the data segment is damaged, the receiver discards it. After an appropriate time-out period, the sending TCP module re-transmits any segment for which no positive acknowledgment has been received.
Among Event Viewer's features, it:. Another part of the registry, the local computer portion, contains configuration settings that you can manage along with user profiles. Using the System Policy Editor , you can create a system policy to control user work environments and actions and to enforce system configuration for all computers running Windows NT Workstation and Windows NT Server. With system policies, you can control some aspects of user work environments without enforcing the restrictions of a mandatory user profile.
You can restrict what users can do from the desktop, such as which options in Control Panel they can use, and customize parts of the desktop or configure network settings. On computers running Windows NT Workstation or Windows NT Server, user profiles automatically create and maintain the desktop settings for each user's work environment on the local computer.
Although you can save user profiles in shared network directories on SunLink Server computers, user profiles have no effect on those particular computers--only on the clients served by them. In Windows NT and Windows 95, a user profile is created for each user when the user logs on to a computer for the first time. User profiles provide the following advantages to users:. When users log on to their workstations, they receive the desktop settings as they existed when they logged off.
Several users can use the same computer, with each receiving a customized desktop when they log on. User profiles stored on a server enable the profiles to follow users to any computer running the Windows NT or SunLink Server software on the network. These are called roaming user profiles. You can create customized user profiles and assign them to users to provide consistent work environments that are appropriate to their tasks.
Detailed information about these and the previously described Windows NT tools, as well as instructions for using them, are included in the tools' online help and your Windows NT network documentation.
Solaris Easy Access Server 3.
0コメント